jackkuo commited on
Commit
8e213da
·
verified ·
1 Parent(s): 26adadd

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +1 -0
  2. 0dFIT4oBgHgl3EQf3CsM/content/tmp_files/2301.11379v1.pdf.txt +1704 -0
  3. 0dFIT4oBgHgl3EQf3CsM/content/tmp_files/load_file.txt +0 -0
  4. 2dE1T4oBgHgl3EQf5gVO/content/tmp_files/2301.03512v1.pdf.txt +1103 -0
  5. 2dE1T4oBgHgl3EQf5gVO/content/tmp_files/load_file.txt +0 -0
  6. 6NE1T4oBgHgl3EQf6wWy/content/tmp_files/2301.03527v1.pdf.txt +690 -0
  7. 6NE1T4oBgHgl3EQf6wWy/content/tmp_files/load_file.txt +0 -0
  8. 8dA0T4oBgHgl3EQfOv8t/content/tmp_files/2301.02164v1.pdf.txt +763 -0
  9. 8dA0T4oBgHgl3EQfOv8t/content/tmp_files/load_file.txt +439 -0
  10. B9E3T4oBgHgl3EQfUAr7/content/tmp_files/2301.04448v1.pdf.txt +1048 -0
  11. B9E3T4oBgHgl3EQfUAr7/content/tmp_files/load_file.txt +0 -0
  12. BdE2T4oBgHgl3EQfngiP/content/tmp_files/2301.04009v1.pdf.txt +1075 -0
  13. BdE2T4oBgHgl3EQfngiP/content/tmp_files/load_file.txt +0 -0
  14. E9A0T4oBgHgl3EQfBP8f/content/tmp_files/2301.01972v1.pdf.txt +2939 -0
  15. E9A0T4oBgHgl3EQfBP8f/content/tmp_files/load_file.txt +0 -0
  16. G9E4T4oBgHgl3EQfgQ3v/content/tmp_files/2301.05116v1.pdf.txt +0 -0
  17. G9E4T4oBgHgl3EQfgQ3v/content/tmp_files/load_file.txt +0 -0
  18. ItFKT4oBgHgl3EQfdy7h/content/tmp_files/2301.11822v1.pdf.txt +830 -0
  19. ItFKT4oBgHgl3EQfdy7h/content/tmp_files/load_file.txt +0 -0
  20. LNFQT4oBgHgl3EQfUDZM/content/tmp_files/2301.13295v1.pdf.txt +0 -0
  21. LNFQT4oBgHgl3EQfUDZM/content/tmp_files/load_file.txt +0 -0
  22. O9FJT4oBgHgl3EQf1S22/content/tmp_files/2301.11651v1.pdf.txt +901 -0
  23. O9FJT4oBgHgl3EQf1S22/content/tmp_files/load_file.txt +0 -0
  24. QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf +3 -0
  25. RtFKT4oBgHgl3EQfiy45/content/tmp_files/2301.11843v1.pdf.txt +2161 -0
  26. RtFKT4oBgHgl3EQfiy45/content/tmp_files/load_file.txt +0 -0
  27. TtAyT4oBgHgl3EQfVvcM/content/tmp_files/2301.00147v1.pdf.txt +1578 -0
  28. TtAyT4oBgHgl3EQfVvcM/content/tmp_files/load_file.txt +0 -0
  29. UdFJT4oBgHgl3EQfNSxs/content/tmp_files/2301.11477v1.pdf.txt +319 -0
  30. UdFJT4oBgHgl3EQfNSxs/content/tmp_files/load_file.txt +312 -0
  31. VNE4T4oBgHgl3EQfnQ0i/content/tmp_files/2301.05174v1.pdf.txt +888 -0
  32. VNE4T4oBgHgl3EQfnQ0i/content/tmp_files/load_file.txt +0 -0
  33. VdE4T4oBgHgl3EQfnQ2t/content/tmp_files/2301.05175v1.pdf.txt +1722 -0
  34. VdE4T4oBgHgl3EQfnQ2t/content/tmp_files/load_file.txt +0 -0
  35. WtFJT4oBgHgl3EQfPSye/content/tmp_files/2301.11486v1.pdf.txt +0 -0
  36. WtFJT4oBgHgl3EQfPSye/content/tmp_files/load_file.txt +0 -0
  37. XdE4T4oBgHgl3EQfNgwX/content/tmp_files/2301.04956v1.pdf.txt +886 -0
  38. XdE4T4oBgHgl3EQfNgwX/content/tmp_files/load_file.txt +0 -0
  39. YNE4T4oBgHgl3EQfNwyH/content/tmp_files/2301.04959v1.pdf.txt +1367 -0
  40. YNE4T4oBgHgl3EQfNwyH/content/tmp_files/load_file.txt +0 -0
  41. YtE5T4oBgHgl3EQfCw7_/content/tmp_files/2301.05400v1.pdf.txt +694 -0
  42. YtE5T4oBgHgl3EQfCw7_/content/tmp_files/load_file.txt +504 -0
  43. ZdFLT4oBgHgl3EQfWC9a/content/tmp_files/2301.12055v1.pdf.txt +1432 -0
  44. ZdFLT4oBgHgl3EQfWC9a/content/tmp_files/load_file.txt +0 -0
  45. ZtE2T4oBgHgl3EQfZgcV/content/tmp_files/2301.03864v1.pdf.txt +1171 -0
  46. ZtE2T4oBgHgl3EQfZgcV/content/tmp_files/load_file.txt +0 -0
  47. d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf +0 -0
  48. d9E0T4oBgHgl3EQf5gJF/content/tmp_files/2301.02751v1.pdf.txt +145 -0
  49. d9E0T4oBgHgl3EQf5gJF/content/tmp_files/load_file.txt +155 -0
  50. dNE0T4oBgHgl3EQfWgC_/vector_store/index.pkl +3 -0
.gitattributes CHANGED
@@ -257,3 +257,4 @@ KdAyT4oBgHgl3EQff_ia/content/2301.00351v1.pdf filter=lfs diff=lfs merge=lfs -tex
257
  79E2T4oBgHgl3EQflQc0/content/2301.03986v1.pdf filter=lfs diff=lfs merge=lfs -text
258
  k9FIT4oBgHgl3EQfriuF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
259
  hNE4T4oBgHgl3EQfrQ2w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
257
  79E2T4oBgHgl3EQflQc0/content/2301.03986v1.pdf filter=lfs diff=lfs merge=lfs -text
258
  k9FIT4oBgHgl3EQfriuF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
259
  hNE4T4oBgHgl3EQfrQ2w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
260
+ QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf filter=lfs diff=lfs merge=lfs -text
0dFIT4oBgHgl3EQf3CsM/content/tmp_files/2301.11379v1.pdf.txt ADDED
@@ -0,0 +1,1704 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ LINEAR QUADRATIC REGULATION CONTROL FOR FALLING
2
+ LIQUID FILMS
3
+ OSCAR A. HOLROYD∗, RADU CIMPEANU∗, AND SUSANA N. GOMES∗
4
+ Abstract.
5
+ We propose and analyse a new methodology based on linear-quadratic regulation
6
+ (LQR) for stabilizing falling liquid films via blowing and suction at the base. LQR methods enable
7
+ rapidly responding feedback control by precomputing a gain matrix, but are only suitable for systems
8
+ of linear ordinary differential equations (ODEs).
9
+ By contrast, the Navier-Stokes equations that
10
+ describe the dynamics of a thin liquid film flowing down an inclined plane are too complex to
11
+ stabilise with standard control-theoretical techniques.
12
+ To bridge this gap we use reduced-order
13
+ models – the Benney equation and a weighted-residual integral boundary layer model – obtained
14
+ via asymptotic analysis to derive a multi-level control framework. This framework consists of an
15
+ LQR feedback control designed for a linearised and discretised system of ODEs approximating the
16
+ reduced-order system, which are then applied to the full Navier-Stokes system. The control scheme
17
+ is tested via direct numerical simulation (DNS), and compared to analytical predictions of linear
18
+ stability thresholds and minimum required actuator numbers. Comparing the strategy between the
19
+ two reduced-order models we show that in both cases we can successfully stabilise towards a uniform
20
+ flat film across their respective ranges of valid parameters, with the more accurate weighted-residual
21
+ model outperforming the Benney-derived controls.
22
+ The weighted-residual controls are also found
23
+ to work successfully far beyond their anticipated range of applicability. The proposed methodology
24
+ increases the feasibility of transferring robust control techniques towards real-world systems, and is
25
+ also generalisable to other forms of actuation.
26
+ Key words. Feedback control, Stabilisation, Falling liquid films, Asymptotic analysis, Reduced-
27
+ order modelling, Direct numerical simulation
28
+ 1. Introduction. Modelling and stabilisation of falling liquid films is a funda-
29
+ mental problem at the intersection of fluid dynamics, asymptotic analysis, and control
30
+ theory. Manipulation of these multi-scale systems is key to a number of industrial
31
+ applications ranging from coating flows in liquid crystal display devices to microchip
32
+ manufacture.
33
+ Such systems have a high degree of complexity, which makes them
34
+ challenging to model, control and simulate accurately and efficiently.
35
+ Although the control of complex systems is a challenge found in a wide range of
36
+ applied sciences – from preventing ice buildup on aerofoils [34] to avoiding obstacles in
37
+ self-driving vehicles [33] and crowd management [8] – falling liquid films are a proto-
38
+ typical example of such a control problem. Governed by the two-phase Navier-Stokes
39
+ equations, these are multi-scale setups used in many applications as well as beautiful
40
+ day-to-day phenomena such as wavy films on a window on a rainy day. The resulting
41
+ flow becomes unstable above a critical Reynolds number (a parameter depending on
42
+ velocity, inclination angle, film thickness, and fluid density), exhibiting a rich set of
43
+ behaviours starting with two-dimensional (2D) waves and leading to 3D spatiotempo-
44
+ ral chaos. Since the 1960s the problem has attracted much analytical focus, resulting
45
+ in a number of periodic reduced-order models [6, 43, 47, 58] based on the assumption
46
+ that perturbations are ‘long-wave’, i.e. their wavelength is much larger than their
47
+ amplitude. Such models range from single equation models describing the dynam-
48
+ ics of the liquid film height, to systems of multiple equations describing the height,
49
+ downstream flux, and potentially additional independent quantities. A broad range
50
+ of thin-film models are covered extensively in two reviews by Craster and Matar [11]
51
+ and Kalliadasis et al. [22], and these models were recently coupled with validation
52
+ in experimental settings by Denner et al. [13].
53
+ More recently, Richard et al [42],
54
+ ∗Mathematics
55
+ Institute,
56
+ University
57
+ of
58
+ Warwick,
59
+ Coventry
60
+ CV4
61
+ 7AL,
62
+ UK
63
64
+ 1
65
+ arXiv:2301.11379v1 [math.OC] 26 Jan 2023
66
+
67
+ 2
68
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
69
+ Usha, Chattopadhyay, and Tiwari [53], Mukhopadhyay, Ruyer-Quil, and Usha [28]
70
+ have provided new insights into how two-equation models behave, particularly when
71
+ attempting to apply them beyond their expected range of validity.
72
+ Thin liquid films have numerous industrial applications, most notably in coating
73
+ flows [57], heat and mass transfer [56], thin-film thermoelectric cooling [12], as well as
74
+ ice accretion prevention on aircraft surfaces [27]. These applications require control-
75
+ ling the interface to a specific shape, whether that be flat for coating flows or highly
76
+ corrugated for heat transfer. There are almost as many physical input mechanisms
77
+ as there are applications, and there is an extensive body of literature dealing with
78
+ the effects that these have on stability and the critical Reynolds number above which
79
+ unstable modes exist. These include heating and cooling of the fluid [5], electric [52]
80
+ or magnetic [2] fields, porous [31] or deformable [15] walls, and many more. Here,
81
+ as shown in Figure 1, we focus on blowing and suction through the base via dis-
82
+ crete actuators [50], since they act over faster (and therefore more computationally
83
+ accessible) timescales, and their effect on the overall flow control is greater. While
84
+ continuous controls, i.e., controls applied through the entire domain (flow base), are
85
+ more mathematically tractable, discrete controls applied through small holes or slots
86
+ are a necessary step towards real applications, since applying blowing and suction
87
+ controls throughout the whole domain is unfeasible.
88
+ In the last two decades, the field has progressed from studying the effects that
89
+ static, predetermined alterations to the system (such as fixed heating patterns or cor-
90
+ rugated baseplates) can produce towards feedback control, where information from
91
+ the interface is used to update control inputs as the film evolves in time. Armaou
92
+ and Christofides [3, 9] and more recently Gomes, Papageorgiou, and Pavliotis [18] and
93
+ Gomes et al. [17, 19], studied the simplest thin-film model, the Kuramoto-Sivashinsky
94
+ (KS) equation, from both analytic and computational perspectives, and successfully
95
+ applied methods from linear control theory based on [60]. Thompson et al [49] further
96
+ extended these results to the Benney [6] and weighted-residual [43] equations using a
97
+ family of linear-quadratic regulator (LQR) methods. However these long-wave models
98
+ remain one stage removed from the physical system that they approximate. Unfor-
99
+ tunately, the full two-phase Navier-Stokes system is too complex and nonlinear to
100
+ directly extend the previous work on long-wave models. Cimpeanu, Gomes, and Pa-
101
+ pageorgiou [10] first analysed aspects of model reduction applicability, and delineated
102
+ the discrepancies between thin-film modelling and direct numerical simulation (DNS)
103
+ approaches. They considered a scenario in which actuator input is simply propor-
104
+ tional to the observed interfacial deviation at its position, which previous numerical
105
+ evidence suggested could successfully stabilise the unperturbed (flat) state of the
106
+ Benney and weighted-residual systems [49], the so-called Nusselt solution. They then
107
+ showed how this model information can be interpreted and transferred into a more
108
+ accurate simulation framework to successfully stabilise the full Navier-Stokes system
109
+ via DNS. Nevertheless, a rigorous optimal control approach capable of surpassing
110
+ the limitations of proportional control setups remains a challenge yet to be addressed.
111
+ An alternative approach which incorporated model predictive control (MPC) was pro-
112
+ posed by Wray, Cimpeanu and Gomes [59] in the context of electrostatic actuation.
113
+ This includes designing optimal controls for reduced-order models and enhanced in-
114
+ teraction between model and simulation techniques, where any re-initialisation of the
115
+ optimal control problem uses readings from a direct numerical simulation of the full
116
+ problem. The computational cost of this framework may however prove prohibitive
117
+ in real-world contexts.
118
+ In this work we aim to close the gap between robust controls designed for long-
119
+
120
+ FALLING LIQUID FILM CONTROL
121
+ 3
122
+ wave models and more physically relevant systems such as those governed by the
123
+ two-phase Navier-Stokes equations, ultimately bringing real-world applications closer
124
+ within reach. The paper is structured as follows. In section 2 we begin with a de-
125
+ scription of the models that make up the two-tier hierarchical structure of the control
126
+ framework: the two-phase Navier-Stokes equations as the target system and either the
127
+ Benney or weighted-residual model as the control system. In section 3 we outline the
128
+ control method: a set of discrete actuators injecting and removing fluid at the base of
129
+ the film. We further simplify these reduced-order models to a system of linear partial
130
+ differential equations (PDEs), and finally to a finite set of ODEs, which permits the
131
+ use of a linear-quadratic regulator, an established control-theoretical technique. We
132
+ then demonstrate for the first time that, by applying this control strategy to the full
133
+ Benney, weighted-residual, and Navier-Stokes systems, there is good agreement be-
134
+ tween the linear predictions and a series of nonlinear numerical experiments. Finally,
135
+ in section 4 we illustrate that this agreement spans a large region of the parameter
136
+ space corresponding to physically relevant fluids. Furthermore, our stability analysis
137
+ results indicate that the control performance significantly exceeds the range of validity
138
+ of the underpinning model assumptions in certain regions of the explored parameter
139
+ space.
140
+ 2. Governing Equations. We consider a thin film of fluid flowing down a plane
141
+ tilted at an angle θ from the horizontal, as shown in Figure 1. We restrict ourselves to
142
+ 2D flows, largely to make the problem more computationally tractable. Nevertheless,
143
+ this setup exhibits a highly nontrivial and physically rich behaviour, while also cap-
144
+ turing the initial wave development stages before cross-flow effects begin to appear in
145
+ 3D contexts [22]. In many control scenarios manipulating the dynamics of these early
146
+ stages is the key objective (and only realisable strategy) of the control framework
147
+ before highly nonlinear and often undesirable flow features arise.
148
+ We use a coordinate system rotated with the plane, where x points downstream
149
+ and y is the perpendicular distance to the wall. There is a free surface at the upper
150
+ interface of the fluid at y = h(x, t) where the fluid and gas meet. We inject and remove
151
+ fluid through the rigid lower wall regions as dictated by our resulting control strat-
152
+ egy, with no-slip and impermeability conditions governing the remaining uncontrolled
153
+ boundary. Finally, we consider periodic boundary conditions in the x-direction; while
154
+ an experiment would be realised on an open domain with inflow and outflow, the
155
+ speed with which a wave fully develops after the inlet [13] means that for sufficiently
156
+ large domains – which we consider here – periodic boundary conditions provide a
157
+ reasonable approximation. Furthermore, periodicity allows us to perform the analysis
158
+ performed in section 4 below, which would be more challenging, if not impossible, to
159
+ undertake given the inability to compute eigenvalues of the problem explicitly with
160
+ open boundaries.
161
+ The problem is governed by the conservation of mass and momentum in both
162
+ the liquid film and the gas above it, coupled at the interface. Typically, the large
163
+ density and viscosity ratios between the two media mean that we can consider the gas
164
+ region to be hydrodynamically passive, and can ignore the flow in the gas, and model
165
+ the liquid film alone. The fluid flow is governed by the acceleration due to gravity
166
+ g, the inclination angle θ, and the physical properties of the liquid phase: constant
167
+ density ρ, viscosity µ and surface tension coefficient γ. A full list of physically-relevant
168
+ parameters and the values used in this investigation can be found in Appendix A.
169
+ For a liquid film with mean height hs, the uncontrolled system admits a uniform
170
+ solution known as the Nusselt solution [30], where h(x, t) = hs, which has a parabolic
171
+
172
+ 4
173
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
174
+ y
175
+ x
176
+ v
177
+ u
178
+ θ
179
+ h(x, t)
180
+ f(x, t)
181
+ 1
182
+ Fig. 1. Diagrammatic representation of a falling liquid film under gravity with basal forcing f.
183
+ Controls are applied through the wall at y = 0, and the behaviour of the interface h is governed by
184
+ the fluid parameters and the inclination angle θ.
185
+ velocity profile with surface velocity Us = ρgh2
186
+ s sin θ
187
+
188
+ . We then nondimensionalise the
189
+ problem based on the length scale hs, velocity scale Us and pressure scale µUs
190
+ hs , defining
191
+ the Reynolds and capillary numbers
192
+ (2.1)
193
+ Re = ρUshs
194
+ µ
195
+ ,
196
+ Ca = µUs
197
+ γ ,
198
+ which measure the relative importance of inertial and viscous terms, and of gravity
199
+ and surface tension, respectively.
200
+ 2.1. Navier-Stokes equations. The full liquid film flow is governed by the 2D
201
+ Navier-Stokes equations, which are solved for velocity u(x, y, t) = (u, v) and pressure
202
+ p(x, y, t) under the action of external forces.
203
+ The governing (nondimensionalised)
204
+ internal momentum equations are
205
+ Re(ut + uux + vuy) = −px + 2 + uxx + uyy,
206
+ (2.2)
207
+ Re(vt + uvx + vvy) = −py − 2 cot θ + vxx + vyy,
208
+ (2.3)
209
+ and the continuity equation reads
210
+ (2.4)
211
+ ux + vy = 0.
212
+ The system is completed by its boundary conditions: periodic boundaries in the
213
+ x-direction, no-slip and fluid injection/removal at the wall,
214
+ (2.5)
215
+ u = 0,
216
+ v = f(x, t),
217
+ the nonlinear dynamic stress balance (or momentum jump) at the interface, y =
218
+ h(x, t),
219
+ (vx + uy)(1 − h2
220
+ x) + 2hx(vy − ux) = 0,
221
+ (2.6)
222
+ p −
223
+ 2
224
+ 1 + h2x
225
+ (vy + uxh2
226
+ x − hx(vx + uy)) = − 1
227
+ Ca
228
+ hxx
229
+ (1 + h2x)3/2 ,
230
+ (2.7)
231
+ and finally the kinematic boundary condition
232
+ (2.8)
233
+ ht = v − uhx.
234
+ In lieu of physical experiments, we perform computational analogues by simu-
235
+ lating the Navier-Stokes equations using a volume-of-fluid approach developed by
236
+ Popinet [37]. The methodology is well known, following more than two decades of
237
+
238
+ FALLING LIQUID FILM CONTROL
239
+ 5
240
+ successful development and usage in the community [37, 38, 39], and therefore we
241
+ restrict our attention to details relevant to our particular setting in Appendix B.
242
+ Defining the down-slope flux q(x, t) by integrating over the height of the film
243
+ (2.9)
244
+ q(x, t) =
245
+ � h
246
+ 0
247
+ u(x, y, t) dy,
248
+ we combine (2.4), (2.5), and (2.8) to obtain the 1D mass conservation equation
249
+ (2.10)
250
+ ht + qx = f.
251
+ We can continue to use the Navier-Stokes equations to compute q, or we can use
252
+ one of a number of simplified models for the flux. Here we consider the Benney [6]
253
+ and weighted-residual [43] equations, which are valid in the long-wave limit. By using
254
+ a pair of reduced-order models we are better able to gauge the relative capabilities
255
+ of both, weighing model and computational complexity against control performance.
256
+ The following pair of reduced-order models are based on first-order asymptotic expan-
257
+ sions in the long-wave parameter ϵ = 1/L (where L is the aspect ratio of the domain).
258
+ In addition to the requirement that ϵ ≪ 1, we make the assumption that Re = O(1)
259
+ and Ca = O(ϵ2) to retain inertial and surface tension effects, and that f = O(ϵ) so
260
+ that the magnitude of the imposed control is comparable to the perturbed flow.
261
+ 2.2. Benney equation. The first choice of model for the downstream flux is
262
+ the Benney system [6], which was extended to include the effects of O(ϵ) controls by
263
+ Thompson, Tseluiko, and Papageorgiou [50]. This enslaves the flux to the interfacial
264
+ height h via
265
+ (2.11)
266
+ q(x, t) = h3
267
+ 3
268
+
269
+ 2 − 2hx cot θ + hxxx
270
+ Ca
271
+
272
+ + Re
273
+ �8h6hx
274
+ 15
275
+ − 2h4f
276
+ 3
277
+
278
+ ,
279
+ resulting in a single equation for the evolution of the interface when coupled to (2.10).
280
+ The system above is a significant improvement over equations such as the KS equation
281
+ – the simplest nonlinear model of thin film flows [47]. While capturing some important
282
+ aspects of the chaotic behaviour of falling liquid films such as travelling waves, the
283
+ KS equation is more useful as a paradigmatic example in a dynamical systems sense
284
+ than as a predictive model outside of a very restricted region of the parameter space.
285
+ However, the Benney system exhibits undesirable behaviours such as unphysical finite-
286
+ time blow-up outside of a narrow range of parameters corresponding to low Reynolds
287
+ numbers [41], as is demonstrated in Figure 2.
288
+ 2.3. Weighted-residual system. To overcome the unrealistic behaviour de-
289
+ scribed above, Ruyer-Quil and Manneville [43, 44] proposed an improved weighted-
290
+ residual methodology based on approximating u by a truncated sum of basis functions
291
+ satisfying no-slip boundary conditions at the wall (2.5) and zero tangential stress at
292
+ the interface (2.6). Here we use the first-order truncation, which matches well with
293
+ the second-order truncation up to Re ≈ 5 [43], a significant improvement over pre-
294
+ vious models [45]. When combined with the basal forcing this results in a separate
295
+ evolution equation for the flux [50]
296
+ (2.12) 2Re
297
+ 5 h2qt+q = h3
298
+ 3
299
+
300
+ 2 − 2hx cot θ + hxxx
301
+ Ca
302
+
303
+ +Re
304
+ �18q2hx
305
+ 35
306
+ − 34hqqx
307
+ 35
308
+ + hqf
309
+ 5
310
+
311
+ ,
312
+ which together with (2.10) forms a system of two PDEs for the height h(x, t) and the
313
+ flux q(x, t). Equation (2.12) better captures many features of the full Navier-Stokes
314
+
315
+ 6
316
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
317
+ film, such as spontaneous back-flow [32], and Figure 2 illustrates how it provides a
318
+ good match for the interfacial shape even at moderate Reynolds and capillary num-
319
+ bers. However, it does overestimate the amplitude of the capillary ripples, as observed
320
+ by Ruyer-Quil and Manneville [43] for the weighted-residuals system and also for other
321
+ first-order models [1]. Unlike the Benney equation, it also does not exhibit unphys-
322
+ ical finite-time blow-up, although it too diverges from the Navier-Stokes model at
323
+ moderate Reynolds numbers, Re ≈ 10 [43].
324
+ 0
325
+ 1
326
+ 2
327
+ t = 0
328
+ h
329
+ 0
330
+ 1
331
+ 2
332
+ t = 2
333
+ h
334
+ 0
335
+ 1
336
+ 2
337
+ t = 50
338
+ h
339
+ 0
340
+ 5
341
+ 10
342
+ 15
343
+ 20
344
+ 25
345
+ 30
346
+ 0
347
+ 1
348
+ 2
349
+ t = 300
350
+ x
351
+ h
352
+ 4
353
+ Fig. 2. Evolution of interfacial heights h for Navier-Stokes (black), weighted-residual (red),
354
+ and Benney (blue) systems, with peaks shifted to 3L/4. Here, the parameters used are Re = 10,
355
+ Ca = 0.05, θ = π/3. The Benney equation blows up shortly after t = 2, but the weighted-residual
356
+ and Navier-Stokes interfaces have very similar structures aside from some spurious oscillations in
357
+ the weighted-residual case, which are observable at t = 300 above.
358
+ 3. Control methodology. We focus on controlling the interface towards the
359
+ Nusselt solution, which under our nondimensionalisation is the uniform film h(x, t) =
360
+ 1.
361
+ All the controls we consider are a class of time-dependent controls known as
362
+ feedback controls, which we introduce here. Take a controlled quantity x governed by
363
+ the system
364
+ (3.1)
365
+ xt = Ax + Bu,
366
+ y = Cx,
367
+ where u is the control, y is some observation of the system, and A, B, and C are
368
+ arbitrary operators describing the uncontrolled system dynamics, the control actua-
369
+ tion mechanism, and the observations respectively. In the case of feedback controls,
370
+ we have the restriction that u = Ky for some operator K, so that the system can be
371
+ written in closed-loop form
372
+ (3.2)
373
+ xt = (A + BKC)x.
374
+ An overview of some important control theory definitions is provided in Appendix C.
375
+ In the case of falling liquid films, the full system (2.2)–(2.8) is too complex for
376
+ standard (linear) control-theoretical techniques to be tractable. Instead, we design
377
+ feedback controls for the reduced-order models presented in subsections 2.2 and 2.3
378
+
379
+ FALLING LIQUID FILM CONTROL
380
+ 7
381
+ and apply them to the full Navier-Stokes system by passing the Navier-Stokes in-
382
+ terfacial height to the feedback control scheme. The full framework is pictured in
383
+ Figure 3.
384
+ Initial condition
385
+ 1
386
+ Apply controls
387
+ 4
388
+ Time step
389
+ 5
390
+ Reduced order model
391
+ 2
392
+ Compute controls
393
+ 3
394
+ 2
395
+ Fig. 3. Multi-layer control methodology for the control of Navier-Stokes thin liquid films. From
396
+ the initial condition, we treat the interface as though it were described by the chosen reduced-order
397
+ model and generate the feedback control accordingly. We then apply this control to the full model
398
+ and time step forward to repeat the process.
399
+ Given the difficulties in observing both the height [24, 55] and flux [20] of falling
400
+ liquid films, it is understandable that in our case we might wish to express our control
401
+ f as a function of time only, known as offline control (as can be done when generating
402
+ controls for the KS equation for instance, see [14]).
403
+ Unfortunately, as shown by
404
+ Cimpeanu, Gomes, and Papageorgiou [10], although such hierarchical controls show
405
+ promising initial dampening, they invariably fail over longer timescales, as the Navier-
406
+ Stokes model eventually diverges from the chosen long-wave model, and the action
407
+ of the control no longer affects the intended state, with the Navier-Stokes system
408
+ ultimately converging back to its uncontrolled behaviour.
409
+ 3.1. Control actuation mechanism. Although the control term f in (2.10)–
410
+ (2.12) is general, in this study we restrict ourselves to controls taking the form of
411
+ Dirac-delta distributions injecting or removing fluid at the wall at a finite number
412
+ of locations x1, . . . , xM – which is more experimentally achievable than continuous
413
+ controls, i.e. controls applied everywhere in the domain. Furthermore, both due to
414
+ realistic considerations and computational restrictions imposed by the direct numeri-
415
+ cal simulation setup, we must approximate these point sources by finite regions which
416
+ we select to be smooth, periodic functions (shown in Figure 4), of the type
417
+ (3.3)
418
+ d(x) = A exp
419
+ �cos(2πx/L) − 1
420
+ ω2
421
+
422
+ ,
423
+ where ω controls the width of the function, and A is chosen so that
424
+ � L
425
+ 0 d(x) dx = 1.
426
+ More refined discretisations support smaller values of ω, and d(x) → δ(x) as ω → 0.
427
+ The basal forcing term f is thus
428
+ (3.4)
429
+ f(x, t) =
430
+ M
431
+
432
+ i=1
433
+ ui(t)d(x − xi),
434
+
435
+ 8
436
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
437
+ where ui(t) are the individual, time-dependent, control amplitudes. Despite the prac-
438
+ tical difficulties of obtaining full observations, the main goal of this investigation is
439
+ to test the feasibility of the control methodology, and so for the moment we assume
440
+ we are able to observe the full interface h(x). This means that C, the observation
441
+ operator from (3.2), is the identity. We will address the observability of the problem,
442
+ as well as issues introduced by noisy or partial observations of the interface, in future
443
+ work.
444
+ Note that, since the domain has periodic boundaries on the left and right, the
445
+ problem is translationally invariant, and so x1, . . . , xM should be evenly placed along
446
+ the base. For 3D and non-periodic flows, the optimal placement of the actuators is a
447
+ nontrivial problem [51].
448
+ Finally, we introduce a cost functional to compare different control strategies,
449
+ taking into account the 2-norms of the deviation from the target state and penalising
450
+ the use of the controls. We thus define the total cost of a control by
451
+ (3.5)
452
+ κ =
453
+ � ∞
454
+ 0
455
+ � L
456
+ 0
457
+ βˆh(x)2 + (1 − β)f 2 dx dt,
458
+ where ˆh(x) = h(x) − 1 is the deviation of the interface from the target uniform state,
459
+ and the parameter β controls the relative importance of the interfacial deviation and
460
+ the magnitude of the controls.
461
+ 3.2. Linear-Quadratic Regulator (LQR). Despite the long-wave simplifi-
462
+ cation to one of the two reduced-order models, control methodologies for nonlinear
463
+ PDEs of the type considered here are still a rapidly developing area of active research,
464
+ with the most relevant efforts by Boujo and Sellier [7], Lunz [25], or the current au-
465
+ thors [10, 18, 49]. In spite of these recent advances, we cannot directly choose the
466
+ optimal control operator K with analytical methods. To make this problem tractable,
467
+ we assume that the perturbation away from the Nusselt solution (ˆh = h − 1 = 0,
468
+ ˆq = q −2/3 = 0, ˆf = 0) is small, so that we can linearise (2.11) to obtain the equation
469
+ (3.6)
470
+ ˆht =
471
+
472
+ −2∂x +
473
+ �2 cot θ
474
+ 3
475
+ − 8Re
476
+ 15
477
+
478
+ ∂xx −
479
+ 1
480
+ 3Ca ∂xxxx
481
+
482
+ ˆh +
483
+
484
+ 1 + 2Re
485
+ 3 ∂x
486
+
487
+ ˆf.
488
+ We then discretise to form a system of N ODEs,
489
+ (3.7)
490
+ dˆh
491
+ dt = Jˆh + Ψu,
492
+ u = KΦˆh.
493
+ Here, J ∈ RN×N captures the system dynamics, Ψ ∈ RN×M is the linearised actuator
494
+ matrix, and Φ ∈ RN×N is the linearised observation matrix (which we take to be the
495
+ identity). K ∈ RM×N is the gain matrix, which is chosen to minimise the discrete
496
+ cost
497
+ (3.8)
498
+ c =
499
+ � ∞
500
+ 0
501
+ ˆhTUˆh + uTV u dt,
502
+ where U = βL
503
+ N I ∈ RN×N and V = (1 − β)I ∈ RM×M are matrices whose entries are
504
+ chosen so as to form the discrete analogue of the continuous cost (3.5). The process is
505
+ similar for the weighted-residual system, but with twice the system size at each stage,
506
+ since there are two unknowns, ˆh and ˆq. The linearisation of (2.12) results in
507
+ ˆht = −ˆqx + ˆf,
508
+ (3.9)
509
+ ˆqt =
510
+ � 5
511
+ Re +
512
+ �4
513
+ 7 − 5 cot θ
514
+ 3Re
515
+
516
+ ∂x +
517
+ 5
518
+ 6ReCa ∂xxx
519
+
520
+ ˆh −
521
+ � 5
522
+ 2Re + 34
523
+ 21∂x
524
+
525
+ ˆq +
526
+ �1
527
+ 3
528
+
529
+ ˆf,
530
+ (3.10)
531
+
532
+ FALLING LIQUID FILM CONTROL
533
+ 9
534
+ and the resulting discretised system has 2N equations rather than N. Finally, al-
535
+ though we are assuming full observations of the interfacial height, Thompson et
536
+ al. [49] showed that it is sufficient to use the leading order approximation ˆq = 2ˆh
537
+ to remove the need to directly observe the flux, incurring a small penalty in the size
538
+ of the largest eigenvalue but not fundamentally affecting stability. This is especially
539
+ important because the flux is challenging to measure in an application setting [20].
540
+ This setup forms a classic problem in control theory: the linear-quadratic regu-
541
+ lator (LQR) problem, which is a subset of a broader class of static output feedback
542
+ (SOF) problems in which one can also have restricted observations (i.e. rank(Φ) < N).
543
+ Here, we provide an overview of how this class of problems is solved. For more details
544
+ see [21, 48].
545
+ For the discretised linear control system (3.7), we write the cost as
546
+ (3.11)
547
+ c =
548
+ � ∞
549
+ 0
550
+ ˆhTUˆh + uTV u dt =
551
+ � ∞
552
+ 0
553
+ ˆhT(U + ΦTKTV KΦ)ˆh dt,
554
+ where U, V are assumed to be symmetric positive definite matrices.
555
+ If we suppose there exists a symmetric, positive semi-definite matrix P such that
556
+ (3.12)
557
+ d
558
+ dt(ˆhTPˆh) = −ˆhT(U + ΦTKTV KΦ)ˆh,
559
+ then, as long as the controlled system matrix A = J + ΨKΦ is asymptotically stable,
560
+ i.e., all its eigenvalues have negative real part, we can write (3.11) as
561
+ c = ˆh(0)TPˆh(0) − lim
562
+ t→∞
563
+ ˆh(t)TPˆh(t)
564
+ = ˆh(0)TPˆh(0).
565
+ (3.13)
566
+ By expanding out the left hand side of (3.12) and observing that this is true for all
567
+ initial conditions ˆh(0) ∈ RN, we have
568
+ (3.14)
569
+ ATP + PA + U + ΦTKTV KΦ = 0.
570
+ This further implies that the choice of P is independent of the initial condition ˆh(0),
571
+ and so
572
+ (3.15)
573
+ c = tr(PX),
574
+ where X = ˆh(0)ˆh(0)T. Since we wish to choose an optimal K for all initial condi-
575
+ tions, we set X = E[ˆh(0)ˆh(0)T] = I, the identity matrix, as we assume all initial
576
+ perturbations ˆh(0) are equally likely.
577
+ The problem thus becomes equivalent to selecting K to minimise (3.15) subject
578
+ to the constraint (3.14). This can be solved via Lagrange multipliers. Defining the
579
+ symmetric matrix of Lagrange multipliers S, we then have the resulting Hamiltonian
580
+ (3.16)
581
+ H = tr(PI) + tr((ATP + PA + U + ΦTKTV KΦ)S).
582
+ By setting ∂SH = ∂P H = ∂KH = 0 we have the conditions for the solution to the
583
+ SOF problem:
584
+ 0 = ATP + PA + U + ΦTKTV KΦ,
585
+ (3.17)
586
+ 0 = AS + SAT + I,
587
+ (3.18)
588
+ 0 = V KΦSΦT + ΨTPSΦT.
589
+ (3.19)
590
+
591
+ 10
592
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
593
+ The final condition can be more usefully written as
594
+ (3.20)
595
+ K = −V −1ΨTPSΦT(ΦSΦT)−1.
596
+ Equations (3.17)–(3.19) cannot be solved directly, and so an iterative procedure
597
+ must be used. However, in the special case of the LQR problem where we have Φ = I,
598
+ we may discard (3.18) and rewrite (3.17) and (3.20) as
599
+ 0 = JTP + PJ + U − PΨV −1ΨTP,
600
+ (3.21)
601
+ K = −V −1ΨTP.
602
+ (3.22)
603
+ Equation (3.21), which is known as the continuous algebraic Riccati equation
604
+ (CARE), can be solved for P directly, and then used to compute K. The structure
605
+ of the matrices J, U, V , and Ψ – with U and V diagonal, J periodic banded and Ψ
606
+ having translational symmetries – means that the specific CARE for this problem is
607
+ typically well-conditioned. Thus we can make use of the classical eigenvector approach
608
+ described by MacFarlane [26], Potter [40] and Vaughan [54]. Alternatively, Schur [23]
609
+ and generalised eigenvector [4] approaches may offer improved numerical stability
610
+ for larger systems (which would be encountered in 3D) and more unstable regimes
611
+ (where some of the interim matrices used in the classical method become singular or
612
+ near-singular).
613
+ We note that equations (3.15) and (3.22) illustrate why the single parameter β is
614
+ sufficient to fully explore the cost-space with regards to K: if we instead introduce a
615
+ pair of control parameters α and β so that
616
+ (3.23)
617
+ U ′ = αU = αβL
618
+ N I,
619
+ V ′ = αV = α(1 − β)I,
620
+ we can set the entries of U ′ and V ′ independently. The cost is then
621
+ (3.24)
622
+ c′ = αc = 1
623
+ 2 tr(αPX) = 1
624
+ 2 tr(P ′X).
625
+ Carrying the new cost matrices through to (3.22) we have
626
+ (3.25)
627
+ K′ = −(V ′)−1ΨTP ′ = −(αV )−1ΨTαP = K.
628
+ The above result indicates that scaling the cost makes no difference to the optimal K,
629
+ and so a single parameter describing the ratio of significance of the two components is
630
+ sufficient. Gibson [16] showed that, under certain conditions, the discretised feedback
631
+ operator K does converge to its infinite-dimensional counterpart K.
632
+ Once the optimal gain matrix K has been computed, we can calculate the mth
633
+ actuator amplitude as um = Km · ˆh(t), where Km is the mth row of K and · denotes
634
+ the inner product. This means that Km,i can be interpreted as describing the im-
635
+ portance of the ith entry of ˆh to um. As can be seen in Figure 4, this allows us to
636
+ examine the rows of K to develop an understanding of how the controls operate. The
637
+ weighted-residual gains are tightly clustered around the location of the actuator across
638
+ a wide range of Reynolds numbers, with minimal up- and down-stream contributions.
639
+ By contrast, the Benney gains are much broader and depend more strongly on the
640
+ interfacial shape away from the actuator location. They also are much more sensitive
641
+ to the Reynolds number (it is worth noting that, for Re = 30, the Benney-derived
642
+ controls fail to stabilise the Navier-Stokes system).
643
+ With a method to compute the gain matrix for the two reduced-order models we
644
+ are now well-positioned to deploy the methodology described in Figure 3 and direct
645
+ it towards the modelled physical system of interest.
646
+
647
+ FALLING LIQUID FILM CONTROL
648
+ 11
649
+ 0
650
+ 5
651
+ 10
652
+ 15
653
+ 20
654
+ 25
655
+ 30
656
+ −1
657
+ −0.5
658
+ 0
659
+ 0.5
660
+ 1
661
+ 1.5
662
+ 2
663
+ x
664
+ Feedback gain
665
+ Actuator shape
666
+ B, Re = 0.5
667
+ B, Re = 10
668
+ B, Re = 30
669
+ WR, Re = 0.5
670
+ WR, Re = 10
671
+ WR, Re = 30
672
+ 3
673
+ Fig. 4. The second row of the gain matrix computed using either the Benney equation (in blue)
674
+ or weighted-residual system (in red) as the reduced-order model, as Re varies and Ca is fixed at
675
+ 0.05. The gains are shown alongside the corresponding actuator (in black). Although the weighted-
676
+ residual gains remain clustered around the actuator, the Benney gains have significant nonlocal
677
+ contributions.
678
+ 3.3. Preliminary results. Previous work by Thompson et al. [49] confirmed
679
+ that LQR controls with full observations are able to stabilise both the Benney and
680
+ weighted-residual systems. The same authors also found that the Benney controls
681
+ stabilise the weighted-residual model. In Figure 5 we can see that for a similar pa-
682
+ rameter regime (Re = 5, Ca = 0.05 – selected such that Re is not so high so as
683
+ to make numerical simulation difficult, and Ca is large enough that surface tension
684
+ alone cannot stabilise the liquid film with properties experimentally aligned with a
685
+ relatively thick and viscous oil flow), these controls can be extended to the Navier-
686
+ Stokes system, where we achieve similar results. Figure 5 shows how the interface is
687
+ allowed to develop from a small sinusoidal perturbation into a travelling wave, before
688
+ the application of controls at t = 0. Representative interfacial snapshots are pictured
689
+ in Figure 5. The interfacial deviation then decays exponentially, suggesting that the
690
+ use of linear models to design the gain matrix is appropriate in both cases.
691
+ 4. Stability analysis. It is encouraging to see that we can control the film in
692
+ the specific setting of Figure 5, but a better aim is to predict the stabilisability of
693
+ the system given the flow parameters Re, Ca, θ and number of controls M. Since
694
+ we lack a closed-form expression for either the continuous control f(h), or its discrete
695
+ counterpart ΨKˆh, we cannot directly estimate the stability properties of the controlled
696
+ system. However, we can predict the damping rate by finding the largest eigenvalue
697
+ λ∗ of the controlled system matrix A = J + ΨKΦ and compare that to rates fitted to
698
+ the data produced in our numerical simulations.
699
+ From Figure 6 we observe that the Benney-derived controls directly stabilise the
700
+ Benney and weighted-residual systems (in a similar setup to that used by Thomp-
701
+ son et al. [49]) over a wide range of Reynolds numbers, and that their ability to
702
+ stabilise towards the uniform film extends to the hierarchical controls applied to the
703
+ Navier-Stokes film. We note that the weighted-residual and Navier-Stokes systems
704
+ are stabilised even above the stability threshold, after which the linearised weighted-
705
+ residual model predicts that five actuators are not sufficient to stabilise the uniform
706
+
707
+ 12
708
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
709
+ 0
710
+ 1
711
+ 2 t = 0
712
+ h
713
+ t = 0
714
+ 0
715
+ 1
716
+ 2 t = 0.1
717
+ h
718
+ t = 0.1
719
+ 0
720
+ 1
721
+ 2 t = 1
722
+ h
723
+ t = 1
724
+ 0
725
+ 5
726
+ 10 15 20 25 30
727
+ 0
728
+ 1
729
+ 2 t = 10
730
+ x
731
+ h
732
+ 0
733
+ 5
734
+ 10 15 20 25 30
735
+ t = 10
736
+ x
737
+ t = 0
738
+ −1
739
+ 0
740
+ 1
741
+ t = 0
742
+ f
743
+ t = 0.1
744
+ −1
745
+ 0
746
+ 1
747
+ t = 0.1
748
+ f
749
+ t = 1
750
+ −1
751
+ 0
752
+ 1
753
+ t = 1
754
+ f
755
+ t = 10
756
+ −1
757
+ 0
758
+ 1
759
+ t = 10
760
+ f
761
+ −100
762
+ −50
763
+ 0
764
+ 50
765
+ 100
766
+ 10−5
767
+ 10−4
768
+ 10−3
769
+ 10−2
770
+ 10−1
771
+ 100
772
+ t
773
+ |h − 1|
774
+ 8
775
+ Fig. 5.
776
+ Interfacial shapes before and after the controls are switched on: Benney equation
777
+ derived controls in blue (left), weighted-residual derived controls in red (centre). A travelling wave
778
+ is allowed to develop until t = 0, when the controls are activated. Both controls successfully damp
779
+ out the perturbation, with the control amplitudes decreasing in proportion to |h − 1|. We note that,
780
+ although similar, the controls are not identical – see the second and fourth rows in particular. In
781
+ both cases (Benney in blue, weighted-residual in red) the 2-norm of the deviation of the interface
782
+ from the target state decays exponentially (right). After t ≈ 50 the deviation is small enough that
783
+ machine precision interferes with computing the deviation. In these simulations we used Re = 5,
784
+ Ca = 0.05.
785
+ 0
786
+ 10
787
+ 20
788
+ 30
789
+ 40
790
+ 50
791
+ −0.5
792
+ −0.4
793
+ −0.3
794
+ −0.2
795
+ −0.1
796
+ 0
797
+ 0.1
798
+ Re
799
+ λ∗
800
+ stability threshold
801
+ linearised Benney
802
+ linearised WR
803
+ Benney
804
+ WR
805
+ NS
806
+ 5
807
+ Fig. 6. Comparison of (fitted) damping rates for Benney-derived LQR control applied to Benney
808
+ (blue), weighted-residual (red), and Navier-Stokes (black) systems (all solid) to the predictions from
809
+ the linearised systems of ODEs. Here, we used M = 5 controls and Ca = 0.05. For all three systems,
810
+ the numerical models break down at sufficiently large Re.
811
+ state.
812
+ All three models display unphysical blow-up at sufficiently large Reynolds num-
813
+ bers. Although this is expected behaviour in the case of the Benney film [29], in
814
+ the case of the weighted-residual and Navier-Stokes models this is attributed to the
815
+ eventual breakdown of the controls as the Benney model finally loses the last of its
816
+
817
+ FALLING LIQUID FILM CONTROL
818
+ 13
819
+ predictive capacity at larger values of Re.
820
+ 0
821
+ 10
822
+ 20
823
+ 30
824
+ 40
825
+ 50
826
+ −0.5
827
+ −0.4
828
+ −0.3
829
+ −0.2
830
+ −0.1
831
+ 0
832
+ 0.1
833
+ Re
834
+ λ∗
835
+ stability threshold
836
+ linearised Benney
837
+ linearised WR
838
+ Benney
839
+ WR
840
+ NS
841
+ 6
842
+ Fig. 7. Comparison of (fitted) damping rates for weighted-residual-derived LQR control ap-
843
+ plied to Benney (blue), weighted-residual (red), and Navier-Stokes (black) systems (all solid) to the
844
+ predictions from the linearised systems of ODEs. Here, we used M = 5 controls Ca = 0.05.
845
+ While the Benney-derived control rules stabilise all three models (at least for
846
+ small-to-moderate Reynolds numbers), the weighted-residual derived controls fail to
847
+ stabilise the Benney equation for Re > 7, in agreement with the linear predictions
848
+ given by the eigenvalues of A. The weighted-residual and Navier-Stokes models have
849
+ reasonable agreement with the linear damping rates but remain stabilisable even at
850
+ Re = 50, when the linear system is not.
851
+ In order to make analytical progress, we turn to an equivalent way to produce the
852
+ gain matrix K, where we first convert (3.7) to Fourier space (so ˜h = Fˆh, where F is
853
+ the Fourier transform). We can then reorder the wavenumbers to separate stable and
854
+ unstable modes:
855
+ (4.1)
856
+ d˜h
857
+ dt = ˜J˜h + ˜Ψ ˜K˜h =
858
+ � ˜Ju
859
+ 0
860
+ 0
861
+ ˜Js
862
+
863
+ ˜h +
864
+ �˜Ψu
865
+ ˜Ψs
866
+
867
+ ˜K˜h.
868
+ Concentrating on the unstable modes more explicitly, i.e.,
869
+ d
870
+ dt
871
+ �˜hu
872
+ ˜hs
873
+
874
+ =
875
+ � ˜Ju
876
+ 0
877
+ 0
878
+ ˜Js
879
+ � �˜hu
880
+ ˜hs
881
+
882
+ +
883
+ �˜Ψu
884
+ ˜Ψs
885
+
886
+ ˜K
887
+ �˜hu
888
+ ˜hs
889
+
890
+ =
891
+ � ˜Ju + ˜Ψu ˜Ku
892
+ 0
893
+ ˜Ψs ˜Ks
894
+ ˜Js
895
+ � �˜hu
896
+ ˜hs
897
+
898
+ ,
899
+ (4.2)
900
+ we find that since the matrix on the right-hand side of (4.2) is block lower triangular,
901
+ the controls leave the eigenvalues of the stable modes unchanged, and so they remain
902
+ stable. We thus reduce the control problem to
903
+ (4.3)
904
+ d˜hu
905
+ dt = ˜Ju˜hu + ˜Ψu ˜Ku˜hu.
906
+ By solving the problem in Fourier space it is clear that – for the purely linear case
907
+ at least – we should expect that M actuators would be sufficient to control any
908
+
909
+ 14
910
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
911
+ system satisfying M ≥ rank( ˜Ju). This would amount to one control per unstable
912
+ mode plus one more to satisfy conservation of mass, as pointed out by Armaou and
913
+ Christofides [9].
914
+ The rank of the unstable Jacobian ˜Ju corresponds to the number of unstable
915
+ modes of the linearised system ((3.6) or (3.9) and (3.10)). We compute this rank for a
916
+ perturbation with wavenumber k, where the linearised Benney equation has a single
917
+ eigenvalue
918
+ (4.4)
919
+ λ = −2ik +
920
+ �8Re
921
+ 15 − 2
922
+ 3 cot θ −
923
+ 1
924
+ 3Ca k2
925
+
926
+ k2,
927
+ and the weighted-residual system has a pair of eigenvalues that solve the quadratic
928
+ equation
929
+ (4.5)
930
+ λ2 +
931
+ � 5
932
+ 2Re + 34
933
+ 21ik
934
+
935
+ λ +
936
+ � 5
937
+ Re ik −
938
+ �4
939
+ 7 − 5 cot θ
940
+ 3Re
941
+
942
+ k2 +
943
+ 5
944
+ 6ReCa k4
945
+
946
+ = 0.
947
+ Setting the real part ℜ(λ) = 0 we can solve for the critical wavenumber k0 (the
948
+ boundary between stable and unstable unimodal systems). For both (4.4) and (4.5),
949
+ this is
950
+ (4.6)
951
+ k0 = ±
952
+
953
+ Ca
954
+ �8
955
+ 5Re − 2 cot θ
956
+
957
+ .
958
+ After rescaling to account for L ̸= 2π, this expression admits a single zero eigenmode
959
+ and pairs of positive and negative modes with k < k0, resulting in the number of
960
+ unstable modes being
961
+ (4.7)
962
+ nu = 1 + 2
963
+ � L
964
+ 2π k0
965
+
966
+ = 1 + 2
967
+
968
+ L
969
+
970
+
971
+ Ca
972
+ �8
973
+ 5Re − 2 cot θ
974
+ ��
975
+ .
976
+ In Figure 8 we compare our predictions for nu from expression (4.7) to the min-
977
+ imum number of controls required to stabilise the film in our numerical experiments
978
+ of the Navier-Stokes system as Re and Ca vary. We see that, as expected, the system
979
+ is stabilisable at M ≥ nu in all cases. In fact, in the majority of the parameter space,
980
+ the minimum number of actuators required to stabilise the uniform state is lower than
981
+ the number predicted by the linear analysis, particularly at lower Reynolds numbers.
982
+ As previous work by Salamon, Armstrong, and Brown [45] and Ruyer-Quil and Man-
983
+ neville [43] shows that important physical characteristics such as travelling wave speed
984
+ begin to diverge from DNS results at Re ≈ 5, the fact that controls based on a lin-
985
+ earisation of these equations match (or even exceed) the expected performance up to
986
+ Re ≈ 100 is remarkable. However, after this point it becomes clear that we are reach-
987
+ ing the limit of the model’s validity, and the ability of the controls to stabilise the
988
+ uniform state becomes less predictable. We note that at larger Reynolds and capillary
989
+ numbers the film takes much longer to respond to the effects of the controls, making it
990
+ more challenging to assess whether the uniform state is stabilisable. By dynamically
991
+ estimating the sign of the fitted damping rate we can avoid running simulations over
992
+ unfeasibly long times.
993
+ 5. Conclusion. The research presented herein has demonstrated new and sig-
994
+ nificant capabilities in terms of design and analysis of optimal feedback controls for
995
+
996
+ FALLING LIQUID FILM CONTROL
997
+ 15
998
+ 100
999
+ 101
1000
+ 102
1001
+ 10−4
1002
+ 10−3
1003
+ 10−2
1004
+ 1
1005
+ 1
1006
+ 1
1007
+ 1
1008
+ 1
1009
+ 1
1010
+ 1
1011
+ 1
1012
+ 1
1013
+ 1
1014
+ 1
1015
+ 1
1016
+ 1
1017
+ 1
1018
+ 1
1019
+ 1
1020
+ 1
1021
+ 1
1022
+ 1
1023
+ 1
1024
+ 1
1025
+ 1
1026
+ 1
1027
+ 1
1028
+ 1
1029
+ 1
1030
+ 1
1031
+ 1
1032
+ 1
1033
+ 1
1034
+ 1
1035
+ 1
1036
+ 1
1037
+ 1
1038
+ 1
1039
+ 1
1040
+ 1
1041
+ 1
1042
+ 1
1043
+ 1
1044
+ 1
1045
+ 1
1046
+ 1
1047
+ 1
1048
+ 1
1049
+ 1
1050
+ 1
1051
+ 1
1052
+ 1
1053
+ 1
1054
+ 1
1055
+ 1
1056
+ 1
1057
+ 1
1058
+ 1
1059
+ 1
1060
+ 1
1061
+ 1
1062
+ 1
1063
+ 1
1064
+ 1
1065
+ 1
1066
+ 1
1067
+ 1
1068
+ 1
1069
+ 1
1070
+ 1
1071
+ 1
1072
+ 1
1073
+ 1
1074
+ 1
1075
+ 1
1076
+ 1
1077
+ 1
1078
+ 1
1079
+ 1
1080
+ 1
1081
+ 1
1082
+ 1
1083
+ 1
1084
+ 1
1085
+ 1
1086
+ 1
1087
+ 1
1088
+ 1
1089
+ 1
1090
+ 1
1091
+ 1
1092
+ 1
1093
+ 1
1094
+ 1
1095
+ 1
1096
+ 1
1097
+ 1
1098
+ 1
1099
+ 1
1100
+ 1
1101
+ 1
1102
+ 1
1103
+ 1
1104
+ 1
1105
+ 1
1106
+ 1
1107
+ 1
1108
+ 1
1109
+ 1
1110
+ 1
1111
+ 1
1112
+ 1
1113
+ 1
1114
+ 1
1115
+ 1
1116
+ 1
1117
+ 1
1118
+ 1
1119
+ 1
1120
+ 1
1121
+ 1
1122
+ 1
1123
+ 1
1124
+ 1
1125
+ 1
1126
+ 1
1127
+ 1
1128
+ 1
1129
+ 1
1130
+ 1
1131
+ 1
1132
+ 1
1133
+ 1
1134
+ 1
1135
+ 1
1136
+ 1
1137
+ 1
1138
+ 1
1139
+ 1
1140
+ 1
1141
+ 1
1142
+ 1
1143
+ 1
1144
+ 1
1145
+ 1
1146
+ 1
1147
+ 1
1148
+ 1
1149
+ 1
1150
+ 1
1151
+ 1
1152
+ 1
1153
+ 1
1154
+ 1
1155
+ 1
1156
+ 1
1157
+ 1
1158
+ 1
1159
+ 1
1160
+ 1
1161
+ 1
1162
+ 1
1163
+ 1
1164
+ 1
1165
+ 1
1166
+ 1
1167
+ 1
1168
+ 1
1169
+ 1
1170
+ 1
1171
+ 1
1172
+ 1
1173
+ 1
1174
+ 1
1175
+ 1
1176
+ 1
1177
+ 1
1178
+ 1
1179
+ 1
1180
+ 1
1181
+ 1
1182
+ 1
1183
+ 1
1184
+ 1
1185
+ 1
1186
+ 1
1187
+ 1
1188
+ 1
1189
+ 1
1190
+ 1
1191
+ 1
1192
+ 1
1193
+ 1
1194
+ 1
1195
+ 1
1196
+ 1
1197
+ 1
1198
+ 1
1199
+ 1
1200
+ 1
1201
+ 1
1202
+ 1
1203
+ 1
1204
+ 1
1205
+ 1
1206
+ 1
1207
+ 1
1208
+ 1
1209
+ 1
1210
+ 1
1211
+ 1
1212
+ 1
1213
+ 1
1214
+ 1
1215
+ 1
1216
+ 1
1217
+ 1
1218
+ 1
1219
+ 1
1220
+ 1
1221
+ 1
1222
+ 1
1223
+ 1
1224
+ 1
1225
+ 1
1226
+ 1
1227
+ 1
1228
+ 1
1229
+ 1
1230
+ 1
1231
+ 1
1232
+ 1
1233
+ 1
1234
+ 1
1235
+ 1
1236
+ 1
1237
+ 1
1238
+ 1
1239
+ 1
1240
+ 1
1241
+ 1
1242
+ 1
1243
+ 1
1244
+ 1
1245
+ 1
1246
+ 1
1247
+ 1
1248
+ 1
1249
+ 1
1250
+ 1
1251
+ 1
1252
+ 1
1253
+ 1
1254
+ 1
1255
+ 1
1256
+ 1
1257
+ 1
1258
+ 1
1259
+ 1
1260
+ 1
1261
+ 1
1262
+ 3
1263
+ 3
1264
+ 1
1265
+ 1
1266
+ 1
1267
+ 1
1268
+ 1
1269
+ 1
1270
+ 1
1271
+ 1
1272
+ 1
1273
+ 1
1274
+ 1
1275
+ 1
1276
+ 1
1277
+ 1
1278
+ 1
1279
+ 1
1280
+ 1
1281
+ 3
1282
+ 3
1283
+ 3
1284
+ 1
1285
+ 1
1286
+ 1
1287
+ 1
1288
+ 1
1289
+ 1
1290
+ 1
1291
+ 1
1292
+ 1
1293
+ 1
1294
+ 1
1295
+ 1
1296
+ 1
1297
+ 1
1298
+ 1
1299
+ 3
1300
+ 3
1301
+ 3
1302
+ 3
1303
+ 3
1304
+ 1
1305
+ 1
1306
+ 1
1307
+ 1
1308
+ 1
1309
+ 1
1310
+ 1
1311
+ 1
1312
+ 1
1313
+ 1
1314
+ 1
1315
+ 1
1316
+ 1
1317
+ 3
1318
+ 3
1319
+ 3
1320
+ 3
1321
+ 3
1322
+ 3
1323
+ 3
1324
+ 1
1325
+ 1
1326
+ 1
1327
+ 1
1328
+ 1
1329
+ 1
1330
+ 1
1331
+ 1
1332
+ 1
1333
+ 1
1334
+ 1
1335
+ 1
1336
+ 3
1337
+ 3
1338
+ 3
1339
+ 3
1340
+ 3
1341
+ 3
1342
+ 3
1343
+ 3
1344
+ 1
1345
+ 1
1346
+ 1
1347
+ 1
1348
+ 1
1349
+ 1
1350
+ 1
1351
+ 1
1352
+ 1
1353
+ 1
1354
+ 1
1355
+ 3
1356
+ 3
1357
+ 3
1358
+ 3
1359
+ 5
1360
+ 5
1361
+ 5
1362
+ 5
1363
+ 7
1364
+ 1
1365
+ 1
1366
+ 1
1367
+ 1
1368
+ 1
1369
+ 1
1370
+ 1
1371
+ 1
1372
+ 1
1373
+ 1
1374
+ 3
1375
+ 3
1376
+ 5
1377
+ 5
1378
+ 5
1379
+ 5
1380
+ 5
1381
+ 7
1382
+ 7
1383
+ 9
1384
+ 1
1385
+ 1
1386
+ 1
1387
+ 1
1388
+ 1
1389
+ 1
1390
+ 1
1391
+ 1
1392
+ 1
1393
+ 3
1394
+ 5
1395
+ 5
1396
+ 5
1397
+ 5
1398
+ 5
1399
+ 5
1400
+ 7
1401
+ 7
1402
+ 9
1403
+ 11
1404
+ Re
1405
+ Ca
1406
+ 1
1407
+ 3
1408
+ 5
1409
+ 7
1410
+ 9
1411
+ 11
1412
+ 7
1413
+ Fig. 8. The minimum number of actuators required to stabilise the Navier-Stokes film compared
1414
+ to the number of unstable modes of the linearised weighted-residual system (red). The number of
1415
+ controls needed to stabilise the uniform film never exceeds the number of unstable modes of the linear
1416
+ system nu as given in (4.7). The ranges for the two parameters cover a broad range of different
1417
+ fluids, select examples are listed in Appendix A. Videos of selected instances of film evolution and
1418
+ control are available as supplementary material.
1419
+ complex physical systems. The stabilisation of the canonical multi-scale framework of
1420
+ a thin liquid film falling down an inclined plane by employing reduced-order models
1421
+ such as the Benney and first-order weighted-residual equations has been used as the
1422
+ physical setup for our proposed methodology. We developed an LQR approach via
1423
+ blowing and suction controls which has been shown to outperform the predictions
1424
+ of linear stability theory, and can successfully function beyond the region of model
1425
+ validity for either the Benney- or the weighted-residual-derived controls.
1426
+ We have shown that even the crude controls used here far exceed their expected
1427
+ performance, and this opens up numerous avenues for future work. It remains to be
1428
+ seen whether higher-order models such as the second-order weighted-residual integral
1429
+ boundary layer model proposed by Ruyer-Quil and Manneville [43] can be used to fur-
1430
+ ther improve the type of control demonstrated here. In addition, it would be desirable
1431
+ to remove the control dependence on discretisation by developing infinite-dimensional
1432
+ controls, which might also allow for an improved analysis of control performance.
1433
+ Although here we have performed numerical experiments to showcase the control
1434
+ efficacy, physical experiments on real fluids are an obvious next step that we hope our
1435
+ work will inspire. In order to achieve this in practice there are a number of useful
1436
+ assumptions that must be relaxed, namely the 2D nature of the flow and periodic
1437
+ boundary condition formulation. The additional dimension will allow for cross-flow
1438
+ instabilities (an interaction which needs to be further quantified), and the boundaries
1439
+ can also affect the stability of the film [35]. The blowing and suction controls used in
1440
+ the present work offer a valuable theoretical foundation permitting a comprehensive
1441
+ examination of control performance for this system. We envision realistic embodi-
1442
+ ments thereof to require further analysis. Nevertheless, the developed methodological
1443
+ platform offers a promising springboard for both mathematical progress and trans-
1444
+ fer towards other forms of actuation within related control mechanisms. Finally, we
1445
+ recognise that the assumption that full observations of the interfacial height are avail-
1446
+
1447
+ 16
1448
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
1449
+ able is often unrealistic. In these scenarios, adaptations of the LQR method such as
1450
+ static and dynamic output feedback controls have been used to stabilise long-wave
1451
+ models [49], and so we are hopeful that future methods underpinned by the present
1452
+ work will generalise to the full Navier-Stokes system, and further to physical experi-
1453
+ ments.
1454
+ Appendix A. Parameter values.
1455
+ Although the majority of the results in this
1456
+ paper are applied to the dimensionless systems governed by the dimensionless numbers
1457
+ L, θ, Re, and Ca, it is important not to forget the physical roots of these systems. For
1458
+ all of the numerical simulations in this work, we have fixed the aspect ratio L = 30,
1459
+ the inclination angle θ = π/3, gravitational acceleration g = 9.807ms−2, and control
1460
+ width ω = 0.1. A range of values for the dimensional parameters (and the resulting
1461
+ dimensionless numbers) is provided in Table 1. A wide range of physical configurations
1462
+ of interest are thus described by a parametric envelope given by 100 < Re < 102 and
1463
+ 10−4 < Ca < 10−2.
1464
+ Fluid
1465
+ ρ ( kgm−3)
1466
+ µ ( kgm−1 s−1)
1467
+ γ ( Nm−1)
1468
+ Re
1469
+ Ca
1470
+ Water
1471
+ 999.8
1472
+ 8.91 × 10−4
1473
+ 0.072
1474
+ 28.2
1475
+ 0.0018
1476
+ Ethanol
1477
+ 789.5
1478
+ 1.06 × 10−3
1479
+ 0.022
1480
+ 12.6
1481
+ 0.0047
1482
+ Pentane
1483
+ 626.0
1484
+ 2.24 × 10−4
1485
+ 0.018
1486
+ 178
1487
+ 0.0045
1488
+ Nitrogen
1489
+ 3.44
1490
+ 6.88 × 10−6
1491
+ 0.0085
1492
+ 5.69
1493
+ 5.26 × 10−5
1494
+ Table 1
1495
+ Parameters (and resulting dimensionless numbers) for a range of physical fluids with a Nusselt
1496
+ film height of 175 × 10−6 m.
1497
+ Appendix B. Numerical simulations.
1498
+ The Navier-Stokes equations ((2.2),
1499
+ (2.3), and (2.5)–(2.7)) are solved on a finite domain Ω = [0, L] × [0, 8] (the permissive
1500
+ height setup has been designed to prevent spurious pressure waves in the gas affect-
1501
+ ing the film) using the volume-of-fluid (VOF) method [46]. The computations were
1502
+ performed using Basilisk [36], a free extension to the C language designed to simplify
1503
+ writing code to numerically solve PDEs. It solves the incompressible Navier-Stokes
1504
+ equations on an adaptive quadtree grid [39] using the Bell-Collela-Glaz advection
1505
+ scheme with a CFL-limited time step, and an implicit viscosity solver (as did its pre-
1506
+ decessor, Gerris [37, 38]). The grid spacing ranges from L × 2−8 (covering the liquid
1507
+ film) to L × 2−6 (smoothing out spurious pressure waves in the gas at the top of the
1508
+ finite computational domain). The time step is capped at 0.05 to prevent sudden
1509
+ jumps in the actuator inputs.
1510
+ Since the control strategy is fundamentally agnostic to the specifics of the PDE
1511
+ system being controlled aside from the entries of the linearised matrices J and Ψ, the
1512
+ control code can be largely separated from the fluid simulation code. It would thus
1513
+ be relatively easy to transfer the same framework to a different problem.
1514
+ The Benney and weighted-residual equations are solved using second-order finite-
1515
+ difference stencils for the spacial grid and a second-order backward finite-difference
1516
+ scheme (BDF2) in time as, in Thompson, Tseluiko, and Papageorgiou [50].
1517
+ The
1518
+ resulting problem is fully implicit and is solved via direct Newton iteration. All the
1519
+ computations in this paper were performed on a grid with a spacing of L × 2−8 to
1520
+ match the resolution of the Basilisk grid.
1521
+ Appendix C. Control theory fundamentals.
1522
+ Here we provide a brief over-
1523
+ view of some important definitions in control theory relevant to our study. For more
1524
+
1525
+ FALLING LIQUID FILM CONTROL
1526
+ 17
1527
+ detailed aspects we refer the interested reader to the seminal work of Zabczyk [60].
1528
+ Suppose we have the linear control system
1529
+ (C.1)
1530
+ ˆht = Jˆh + Ψu,
1531
+ u = Ky,
1532
+ y = Φˆh,
1533
+ which can be written ˆht = (J + ΨKΦ)ˆh. The pair (J, Ψ) is controllable if, for any
1534
+ pair of states ˆh0, ˆh1 ∈ RN there exists a control u that takes ˆh from ˆh0 to ˆh1 in
1535
+ finite time. The pair (J, Φ) is observable if for all initial conditions ˆh0 ∈ RN there
1536
+ exists a time T > 0 after which ˆh0 is uniquely determined from the observations
1537
+ {y(t)|t ∈ [0, T]}.
1538
+ Controllability and observability are duals, that is, if (J, Ψ) is
1539
+ controllable then (J∗, Ψ∗) (where ·∗ is the conjugate transpose) is observable and
1540
+ conversely if (J, Φ) is observable then (J∗, Φ∗) is controllable.
1541
+ We can check if a pair (J, Ψ) is controllable with the Kalman rank condition:
1542
+ (J, Ψ) is controllable if rank([J|Ψ]) = N, where
1543
+ (C.2)
1544
+ [J|Ψ] = [Ψ JΨ J2Ψ . . . JN−1Ψ]
1545
+ is known as the controllability matrix.
1546
+ In this paper, we are concerned with controlling towards the state ˆh = 0 rather
1547
+ than an arbitrary interface (see Thompson et al. [49]), and so we require a weaker
1548
+ form of controllability. For this we require (J, Ψ) to be stabilisable, which means that
1549
+ there exists a gain matrix K such that J +ΨK is stable (i.e. has strictly negative real
1550
+ parts to all its eigenvalues). Similarly, in this case (J, Φ) is detectable if we can choose
1551
+ an L such that J + LΦ is stable, corresponding to being able to observe all of the
1552
+ unstable modes of the system. As for controllability and observability, stabilisability
1553
+ and detectability are dual properties (simply set L = K∗ and vice versa).
1554
+ Supplementary Material.
1555
+ Supplementary material showing the evolution of
1556
+ the interface before and after the application of controls alongside the corresponding
1557
+ 2-norm deviations across a range of Reynolds and capillary numbers will be available
1558
+ upon publication.
1559
+ The version of the code used for this paper, along with installation instructions
1560
+ and documentation, can be found on GitHub.
1561
+ On a single core a full simulation
1562
+ (for instance the one shown in Figure 5) takes ∼ 10 hours for the Navier-Stokes and
1563
+ weighted-residual systems (the Benney system is considerably faster).
1564
+ Acknowledgements.
1565
+ Oscar Holroyd is grateful for the computing resources
1566
+ supplied by the University of Warwick Scientific Computing Research Technology
1567
+ Platform (SCRTP) and funding from the UK Engineering and Physical Sciences Re-
1568
+ search Council (EPSRC) grant EP/S022848/1 for the University of Warwick Centre
1569
+ for Doctoral Training in Modelling of Heterogeneous Systems (HetSys). Radu Cim-
1570
+ peanu and Susana Gomes also acknowledge EPSRC support via grant EP/V051385/1.
1571
+ For the purpose of open access, the authors have applied a Creative Commons Attri-
1572
+ bution (CC BY) licence to any arising Author Accepted Manuscript version.
1573
+ REFERENCES
1574
+ [1] S. Alekseenko, V. E. Nakoryakov, and B. G. Pokusaev, Wave flow of liquid films, Begell
1575
+ house, 1994.
1576
+ [2] M. Amaouche, H. A. Abderrahmane, and L. Bourdache, Hydromagnetic thin film flow:
1577
+ Linear stability, Phys. Rev. E, 88 (2013), p. 023028.
1578
+ [3] A. Armaou and P. D. Christofides, Feedback control of the kuramoto–sivashinsky equation,
1579
+ Phys. D, 137 (2000), pp. 49–61.
1580
+
1581
+ 18
1582
+ O. A. HOLROYD, R. CIMPEANU, AND S. N. GOMES
1583
+ [4] W. F. Arnold and A. J. Laub, Generalized eigenproblem algorithms and software for algebraic
1584
+ riccati equations, Proc. IEEE, 72 (1984), pp. 1746–1754.
1585
+ [5] S. G. Bankoff, Stability of liquid flow down a heated inclined plane, Int. J. Heat Mass Tran.,
1586
+ 14 (1971), pp. 377–385.
1587
+ [6] D. J. Benney, Long waves on liquid films, J. Math. Phys., 45 (1966), pp. 150–155.
1588
+ [7] E. Boujo and M. Sellier, Pancake making and surface coating: optimal control of a gravity-
1589
+ driven liquid film, Phys. Rev. Fluids, 4 (2019), p. 064802.
1590
+ [8] M. Burger, M. Di Francesco, P. A. Markowich, and M. T. Wolfram, On a mean field
1591
+ game optimal control approach modeling fast exit scenarios in human crowds, in 52nd
1592
+ IEEE Conference on Decision and Control, IEEE, 2013, pp. 3128–3133.
1593
+ [9] P. D. Christofides and A. Armaou, Global stabilization of the kuramoto-sivashinsky equation
1594
+ via distributed output feedback control, Systems Control Lett., 39 (2000), pp. 283–294.
1595
+ [10] R. Cimpeanu, S. N. Gomes, and D. T. Papageorgiou, Active control of liquid film flows:
1596
+ beyond reduced-order models, Nonlinear Dyn., 104 (2021), pp. 267–287.
1597
+ [11] R. V. Craster and O. K. Matar, Dynamics and stability of thin liquid films, Rev. Modern
1598
+ Phys., 81 (2009), p. 1131.
1599
+ [12] J. Darabi, M. M. Ohadi, and D. DeVoe, An electrohydrodynamic polarization micropump
1600
+ for electronic cooling, J. Microelectromech. Syst., 10 (2001), pp. 98–106.
1601
+ [13] F. Denner, A. Charogiannis, M. Pradas, C. N. Markides, B. G. M. van Wachem, and
1602
+ S. Kalliadasis, Solitary waves on falling liquid films in the inertia-dominated regime, J.
1603
+ Fluid Mech., 837 (2018), pp. 491–519.
1604
+ [14] P. Gao, Optimal distributed control of the kuramoto-sivashinsky equation with pointwise state
1605
+ and mixed control-state constraints, IMA J. Math. Control Inform., 33 (2016), pp. 791–811.
1606
+ [15] Gaurav and V. Shankar, Stability of gravity-driven free-surface flow past a deformable solid
1607
+ at zero and finite reynolds number, Phys. Fluids, 19 (2007), p. 024105.
1608
+ [16] J. S. Gibson, Linear-quadratic optimal control of hereditary differential systems: infinite di-
1609
+ mensional riccati equations and numerical approximations, SIAM J. Control Optim., 21
1610
+ (1983), pp. 95–139.
1611
+ [17] S. N. Gomes, S. Kalliadasis, D. T. Papageorgiou, G. A. Pavliotis, and M. Pradas,
1612
+ Controlling roughening processes in the stochastic kuramoto–sivashinsky equation, Phys.
1613
+ D, 348 (2017), pp. 33–43.
1614
+ [18] S. N. Gomes, D. T. Papageorgiou, and G. A. Pavliotis, Stabilizing non-trivial solutions of
1615
+ the generalized kuramoto–sivashinsky equation using feedback and optimal control, IMA J.
1616
+ Appl. Math., 82 (2017), pp. 158–194.
1617
+ [19] S. N. Gomes, M. Pradas, S. Kalliadasis, D. Papageorgiou, and G. A. Pavliotis, Control-
1618
+ ling spatiotemporal chaos in active dissipative-dispersive nonlinear systems, Phys. Rev. E,
1619
+ 92 (2015), p. 022912.
1620
+ [20] C. Heining, T. Pollak, and M. Sellier, Flow domain identification from free surface velocity
1621
+ in thin inertial films, J. Fluid Mech., 720 (2013), pp. 338–356.
1622
+ [21] T. Johnson and M. Athans, On the design of optimal constrained dynamic compensators for
1623
+ linear constant systems, IEEE Trans. Automat. Control, 15 (1970), pp. 658–660.
1624
+ [22] S. Kalliadasis, C. Ruyer-Quil, B. Scheid, and M. G. Velarde, Falling liquid films, vol. 176,
1625
+ Springer Science & Business Media, 2011.
1626
+ [23] A. Laub, A schur method for solving algebraic riccati equations, IEEE Trans. Automat. Con-
1627
+ trol, 24 (1979), pp. 913–921.
1628
+ [24] J. Liu and J. P. Gollub, Onset of spatially chaotic waves on flowing films, Phys. Rev. Lett.,
1629
+ 70 (1993), p. 2289.
1630
+ [25] D. Lunz, Minimizing deformation of a thin fluid film driven by fluxes of momentum and heat,
1631
+ Phys. Rev. E, 103 (2021), p. 033105.
1632
+ [26] A. G. J. MacFarlane, An eigenvector solution of the optimal linear regulator problem, Int. J.
1633
+ Electron., 14 (1963), pp. 643–654.
1634
+ [27] M. R. Moore, M. S. Mughal, and D. T. Papageorgiou, Ice formation within a thin film
1635
+ flowing over a flat plate, J. Fluid Mech., 817 (2017), pp. 455–489.
1636
+ [28] S. Mukhopadhyay, C. Ruyer-Quil, and R. Usha, Modelling falling film flow: an adjustable
1637
+ formulation, J. Fluid Mech., 952 (2022), p. R3.
1638
+ [29] C. Nakaya, Long waves on a thin fluid layer flowing down an inclined plane, Phys. Fluids, 18
1639
+ (1975), pp. 1407–1412.
1640
+ [30] W. Nusselt, Der w¨armeaustausch am berieselungsk¨uler, Z. Ver. Dtsch. Ing., 67 (1923), pp. 206–
1641
+ 216.
1642
+ [31] K. A. Ogden, S. J. D. D’Alessio, and J. P. Pascal, Gravity-driven flow over heated, porous,
1643
+ wavy surfaces, Phys. Fluids, 23 (2011), p. 122102.
1644
+ [32] A. Oron, O. Gottlieb, and E. Novbari, Numerical analysis of a weighted-residual integral
1645
+
1646
+ FALLING LIQUID FILM CONTROL
1647
+ 19
1648
+ boundary-layer model for nonlinear dynamics of falling liquid films, Eur. J. Mech. B Fluids,
1649
+ 28 (2009), pp. 1–36.
1650
+ [33] B. Paden, M. ˇC´ap, S. Z. Yong, D. Yershov, and E. Frazzoli, A survey of motion planning
1651
+ and control techniques for self-driving urban vehicles, IEEE Trans. Int. Veh., 1 (2016),
1652
+ pp. 33–55.
1653
+ [34] J. Palacios, E. Smith, J. Rose, and R. Royer, Instantaneous de-icing of freezer ice via
1654
+ ultrasonic actuation, AIAA J., 49 (2011), pp. 1158–1167.
1655
+ [35] T. Pollak, A. Haas, and N. Aksel, Side wall effects on the instability of thin gravity-driven
1656
+ films - from long-wave to short-wave instability, Phys. Fluids, 23 (2011), p. 094110.
1657
+ [36] S. Popinet, Basilisk, http://basilisk.fr (accessed 2022-09-01).
1658
+ [37] S. Popinet, Gerris: a tree-based adaptive solver for the incompressible euler equations in
1659
+ complex geometries, J. Comput. Phys., 190 (2003), pp. 572–600.
1660
+ [38] S. Popinet, An accurate adaptive solver for surface-tension-driven interfacial flows, J. Com-
1661
+ put. Phys., 228 (2009), pp. 5838–5866.
1662
+ [39] S. Popinet, A quadtree-adaptive multigrid solver for the serre–green–naghdi equations, J. Com-
1663
+ put. Phys., 302 (2015), pp. 336–358.
1664
+ [40] J. E. Potter, Matrix quadratic solutions, SIAM J. Appl. Math., 14 (1966), pp. 496–501.
1665
+ [41] A. Pumir, P. Manneville, and Y. Pomeau, On solitary waves running down an inclined
1666
+ plane, J. Fluid Mech., 135 (1983), pp. 27–50.
1667
+ [42] G. L. Richard, M. Gisclon, C. Ruyer-Quil, and J. P. Vila, Optimization of consistent
1668
+ two-equation models for thin film flows, Eur. J. Mech. B Fluids, 76 (2019), pp. 7–25.
1669
+ [43] C. Ruyer-Quil and P. Manneville, Improved modeling of flows down inclined planes, Eur.
1670
+ Phys. J. B, 15 (2000), pp. 357–369.
1671
+ [44] C. Ruyer-Quil and P. Manneville, Further accuracy and convergence results on the modeling
1672
+ of flows down inclined planes by weighted-residual approximations, Phys. Fluids, 14 (2002),
1673
+ pp. 170–183.
1674
+ [45] T. R. Salamon, R. C. Armstrong, and R. A. Brown, Traveling waves on vertical films:
1675
+ Numerical analysis using the finite element method, Phys. Fluids, 6 (1994), pp. 2202–2220.
1676
+ [46] R. Scardovelli and S. Zaleski, Direct numerical simulation of free-surface and interfacial
1677
+ flow, Annu. Rev. Fluid Mech., 31 (1999), pp. 567–603.
1678
+ [47] G. I. Sivashinsky and D. M. Michelson, On irregular wavy flow of a liquid film down a
1679
+ vertical plane, Prog. Theor. Phys., 63 (1980), pp. 2112–2114.
1680
+ [48] V. L. Syrmos, C. T. Abdallah, P. Dorato, and K. Grigoriadis, Static output feedback – a
1681
+ survey, Automatica J. IFAC, 33 (1997), pp. 125–137.
1682
+ [49] A. B. Thompson, S. N. Gomes, G. A. Pavliotis, and D. T. Papageorgiou, Stabilising falling
1683
+ liquid film flows using feedback control, Phys. Fluids, 28 (2016), p. 012107.
1684
+ [50] A. B. Thompson, D. Tseluiko, and D. T. Papageorgiou, Falling liquid films with blowing
1685
+ and suction, J. Fluid Mech., 787 (2016), pp. 292–330.
1686
+ [51] R. J. Tomlin and S. N. Gomes, Point-actuated feedback control of multidimensional interfaces,
1687
+ IMA J. Appl. Math., 84 (2019), pp. 1112–1142.
1688
+ [52] D. Tseluiko and D. T. Papageorgiou, Wave evolution on electrified falling films, J. Fluid
1689
+ Mech., 556 (2006), pp. 361–386.
1690
+ [53] R. Usha, G. Chattopadhyay, and N. Tiwari, Evolution of a thin film down an incline: A
1691
+ new perspective, Phys. Fluids, 32 (2020), p. 013603.
1692
+ [54] D. Vaughan, A nonrecursive algebraic solution for the discrete riccati equation, IEEE Trans.
1693
+ Automat. Control, 15 (1970), pp. 597–599.
1694
+ [55] M. Vlachogiannis and V. Bontozoglou, Experiments on laminar film flow along a periodic
1695
+ wall, J. Fluid Mech., 457 (2002), pp. 133–156.
1696
+ [56] P. C. Wayner Jr, The effect of interfacial mass transport on flow in thin liquid films, Colloid.
1697
+ Surf., 52 (1991), pp. 71–84.
1698
+ [57] S. J. Weinstein and K. J. Ruschak, Coating flows, Annu. Rev. Fluid Mech., 36 (2004), p. 29.
1699
+ [58] A. W. Wray and R. Cimpeanu, Reduced-order modelling of thick inertial flows around rotating
1700
+ cylinders, J. Fluid Mech., 898 (2020).
1701
+ [59] A. W. Wray, R. Cimpeanu, and S. N. Gomes, Electrostatic control of the navier-stokes
1702
+ equations for thin films, Phys. Rev. Fluids, 7 (2022), p. L122001.
1703
+ [60] J. Zabczyk, Mathematical control theory: an introduction, Birkenh¨auser, 1992.
1704
+
0dFIT4oBgHgl3EQf3CsM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2dE1T4oBgHgl3EQf5gVO/content/tmp_files/2301.03512v1.pdf.txt ADDED
@@ -0,0 +1,1103 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, 2022
2
+ 1
3
+ SCENE: Reasoning about Traffic Scenes using
4
+ Heterogeneous Graph Neural Networks
5
+ Thomas Monninger†,1, Julian Schmidt†,2,3,
6
+ Jan Rupprecht2, David Raba2, Julian Jordan2,
7
+ Daniel Frank4, Steffen Staab4,5 and Klaus Dietmayer3, Senior Member, IEEE
8
+ Abstract—Understanding traffic scenes requires considering
9
+ heterogeneous information about dynamic agents and the static
10
+ infrastructure. In this work we propose SCENE, a methodology
11
+ to encode diverse traffic scenes in heterogeneous graphs and to
12
+ reason about these graphs using a heterogeneous Graph Neural
13
+ Network encoder and task-specific decoders. The heterogeneous
14
+ graphs, whose structures are defined by an ontology, consist of
15
+ different nodes with type-specific node features and different
16
+ relations with type-specific edge features. In order to exploit
17
+ all the information given by these graphs, we propose to use
18
+ cascaded layers of graph convolution. The result is an encoding
19
+ of the scene. Task-specific decoders can be applied to predict
20
+ desired attributes of the scene. Extensive evaluation on two
21
+ diverse binary node classification tasks show the main strength
22
+ of this methodology: despite being generic, it even manages to
23
+ outperform task-specific baselines. The further application of
24
+ our methodology to the task of node classification in various
25
+ knowledge graphs shows its transferability to other domains.
26
+ Index Terms—Semantic Scene Understanding, AI-Based Meth-
27
+ ods, Behavior-Based Systems
28
+ I. INTRODUCTION
29
+ U
30
+ NDERSTANDING traffic scenes is important for an
31
+ autonomous vehicle such that it may develop a safe,
32
+ effective and efficient plan of how to move forward. For
33
+ instance, whether a stationary car is parked or just temporarily
34
+ stopped determines whether the autonomous vehicle should
35
+ wait or overtake. Understanding of traffic scenes requires
36
+ reasoning about dynamic agents and static infrastructure in
37
+ order to predict the intents of nearby dynamic agents (e.g.,
38
+ Manuscript received: August 26, 2022; Revised: November 21, 2022;
39
+ Accepted: December 20, 2022.
40
+ This paper was recommended for publication by Editor Markus Vincze
41
+ upon evaluation of the Associate Editor and Reviewers’ comments. This
42
+ work was supported by the BMWK within the project ”KI Delta Learning”
43
+ (F¨orderkennzeichen 19A19013A) and the Deutsche Forschungsgemeinschaft
44
+ (DFG, German Research Foundation) under Germany’s Excellence Strategy -
45
+ EXC 2075 – 390740016. (Corresponding author: Julian Schmidt)
46
+ †Thomas Monninger and Julian Schmidt are co-first authors. The order was
47
+ determined alphabetically.
48
+ 1Thomas Monninger is with Mercedes-Benz R&D North America, Sunny-
49
+ vale, CA, USA (e-mail: [email protected])
50
+ 2Julian Schmidt, Jan Rupprecht, David Raba and Julian Jordan are with
51
+ Mercedes-Benz AG, R&D, Stuttgart, Germany (e-mail: {julian.sj.schmidt,
52
+ jan.rupprecht, david.raba, julian.jordan}@mercedes-benz.com)
53
+ 3Julian Schmidt and Klaus Dietmayer are with Ulm University, Institute
54
+ of Measurement, Control and Microtechnology, Ulm, Germany (e-mail:
55
56
+ 4Daniel Frank and Steffen Staab are with University of Stuttgart, Institute
57
+ of Parallel and Distributed Systems, Stuttgart, Germany (e-mail: {daniel.frank,
58
+ steffen.staab}@ipvs.uni-stuttgart.de)
59
+ 5Steffen Staab is with University of Southampton, Electronics and Com-
60
+ puter Science, Southampton, United Kingdom
61
+ Dynamic
62
+ Agents
63
+ Static
64
+ Infrastructure
65
+ GNN
66
+ GNN
67
+ Heterogeneous
68
+ Scene Graph
69
+ Task-Speci�c
70
+ Decoder
71
+ GNN Encoder
72
+ Fig. 1. Overview of SCENE: The traffic scene is modeled in a heterogeneous
73
+ scene graph with different node types and different relation types between
74
+ these nodes. The combination of a generic GNN architecture, making use of
75
+ cascaded layers of graph convolution, and a task-specific decoder is used to
76
+ predict relevant information about the given scene.
77
+ parked or temporarily stopped). To this end, the vehicle needs
78
+ to correctly estimate which sensory information is reliable
79
+ and it must reason about the relative positions, features and
80
+ trajectories of dynamic agents.
81
+ © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including
82
+ reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or
83
+ reuse of any copyrighted component of this work in other works.
84
+ Information about dynamic
85
+ agents is conveyed by the perception systems of autonomous
86
+ vehicles. We raise the hypothesis that considering additional
87
+ heterogeneous entities in a traffic scene might add valu-
88
+ able information. In particular, reasoning should also involve
89
+ knowledge about static infrastructure, which may either be
90
+ perceived or in our case is provided by a High Definition
91
+ (HD) map. Thus, the problem of understanding traffic scenes
92
+ boils down to integrating a plenitude of heterogeneous data,
93
+ which may change over time, and reasoning about it in order to
94
+ predict intents of nearby traffic agents. This is difficult because
95
+ data from heterogeneous sources may be structured in a myriad
96
+ of ways and reasoning may require deriving complex relations
97
+ and patterns across this heterogeneous data.
98
+ Related
99
+ work
100
+ has
101
+ tackled
102
+ the
103
+ problem
104
+ of
105
+ scene
106
+ understanding from heterogeneous data by using machine
107
+ learning approaches to reason about the scene. Existing
108
+ machine learning approaches that jointly leverage information
109
+ about dynamic agents and static infrastructure, so far, have
110
+ been based on rasterized representations (e.g., [1]), have been
111
+ handcrafted and task-specific (e.g., [2]) or have been limited
112
+ in their ability to consider heterogeneous data (e.g., [3]).
113
+ Shortcomings of rasterized representations lie in the loss of
114
+ information and task-specific approaches lack the ability to
115
+ generalize to further tasks.
116
+ arXiv:2301.03512v1 [cs.CV] 9 Jan 2023
117
+
118
+ 2
119
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, 2022
120
+ We propose SCENE (SCene Encoding NEtwork), a graph-
121
+ based methodology to encode and perform reasoning about
122
+ a traffic scene. An overview of SCENE is given in Fig. 1.
123
+ Inputs to SCENE are features provided by upstream perception
124
+ components, which represent dynamic agents over a dura-
125
+ tion of 3 s, as well as the abstract representation of static
126
+ infrastructure, in our case given in an HD map. This input is
127
+ encoded in a heterogeneous scene graph with different node
128
+ types and a set of typed relations between nodes. In addition
129
+ to this expressive representation, we provide the means for
130
+ versatile reasoning and predictions in traffic scene graphs
131
+ using a novel architecture based on Graph Neural Networks
132
+ (GNNs). With this work we contribute to the research on
133
+ heterogeneous GNNs, defined by a recent survey as a core
134
+ field of future work [4]. Our GNN model learns from examples
135
+ how information about dynamic agents and static infrastructure
136
+ of a traffic scene may be integrated and reasoned about,
137
+ such that it can correctly predict unknown characteristics of
138
+ entities or relations. In order to show that this methodology
139
+ is not task-specific, we evaluate it on two different binary
140
+ node-classification tasks that correspond to the predictions (i)
141
+ whether a car is parked or temporarily stopped and (ii) whether
142
+ perceived information is reliable or not.
143
+ Our main contributions are:
144
+ • We propose a novel way to model information about
145
+ dynamic agents and static infrastructure of traffic scenes
146
+ in one heterogeneous graph structure with edge features,
147
+ allowing for an extensible and generic representation.
148
+ • We propose a novel GNN architecture that is able to
149
+ perform reasoning on this heterogeneous graph.
150
+ • We extensively evaluate our proposed methodology on
151
+ two diverse learning tasks.
152
+ • We quantify the effect of including heterogeneous data
153
+ about additional scene entities and relations for those
154
+ learning tasks in detailed ablation studies.
155
+ • We show that our GNN architecture transfers to applica-
156
+ tions beyond scene understanding, by applying it to the
157
+ task of node classification in knowledge graphs.
158
+ II. RELATED WORK
159
+ In this section, related work regarding reasoning about
160
+ traffic scenes is discussed. Existing approaches focus on the
161
+ prediction of intents and trajectories of agents.
162
+ A. Grid-based Approaches
163
+ Grid-based approaches rasterize information in a bird’s-eye
164
+ view grid with multiple channels and use Convolutional Neural
165
+ Networks (CNN) to learn from patterns in the given data in
166
+ order to perform reasoning about the traffic scene. One option
167
+ is to use raw sensor data as input and project it into a bird’s-
168
+ eye view grid. [5]. Most recent approaches receive dynamic
169
+ agents, extracted and processed from an upstream perception
170
+ component, and information about the static infrastructure as
171
+ input and render both into different channels of a grid [1], [6],
172
+ [7], [8]. Different to the heterogeneous graph from our work,
173
+ a grid cannot represent complex relationships in an abstract
174
+ form, e.g., the right of way between lanes [3], [9].
175
+ B. Hybrid Approaches
176
+ Hybrid approaches introduce a graph-based representation
177
+ of the provided dynamic agents, but keep the grid-based
178
+ representation for the static infrastructure. The graph-based
179
+ representation of agents allows for an agent-wise encoding,
180
+ considering semantic attributes and temporal information. Rea-
181
+ soning on these encodings is done via GNNs [10], [11], [12],
182
+ which can consider edges in the graph to derive complex
183
+ interaction patterns between agents. In contrast to our work,
184
+ these hybrid approaches still come with the aforementioned
185
+ limitations of not representing complex relationships that
186
+ involve static infrastructure.
187
+ C. Graph-based Approaches
188
+ Graph-based approaches model both, dynamic agents and
189
+ static infrastructure via graph structures. This idea of holisti-
190
+ cally modeling scenes in a graph structure and reasoning on
191
+ it originated from the field of image retrieval [13].
192
+ Since graph-based approaches work on sparse graphs in-
193
+ stead of dense grids, these approaches tend to be more memory
194
+ efficient [14]. Analogously to the hybrid approaches, GNNs
195
+ are used to model interactions between dynamic agents.
196
+ Early work of Ulbrich et al. [15] proposes an ontology for
197
+ representing a scene graph for autonomous driving, but do
198
+ not provide means for reasoning on the graph. Tian et al. [16]
199
+ propose a simplified approach by not modeling lanes explicitly.
200
+ This is a limitation compared to our work because their ap-
201
+ proach cannot capture topological nor regulatory relationships
202
+ between lanes.
203
+ Gao et al. [17] propose VectorNet, which shares the concept
204
+ of creating one global graph and serves as a baseline in our
205
+ evaluations. In contrast, their graph is homogeneous and fully-
206
+ connected. The homogeneous representation is obtained by
207
+ learning a node embedding for each of the heterogeneous
208
+ entities in the scene, including dynamic agents and static in-
209
+ frastructure (e.g., crosswalks and lanes). Their fully-connected
210
+ graph has only one type of edges, which requires the network
211
+ to implicitly learn different semantic relations between nodes
212
+ based on their embeddings. As a drawback, their representa-
213
+ tion does not capture edge features. However, edge features
214
+ enable the inclusion of additional relational information in the
215
+ graph, which we evaluate as advantageous in our ablation
216
+ study. The use of edge features in general is very limited
217
+ in recent publications. Approaches either only use spatial
218
+ relations as edge features (e.g., distances or headings between
219
+ dynamic agents) [18], [19], or intermediate representations by
220
+ combining information of two connected nodes [20], [21].
221
+ Li et al. [22] use one graph to model the interactions
222
+ between an ego vehicle and its nearby vehicles (ego-thing
223
+ graph) and one graph to model interactions between the ego
224
+ vehicle and its static infrastructure (ego-stuff graph). For the
225
+ ego-stuff graph, only graph edges between the node of the
226
+ ego vehicle and stuff nodes are allowed. This modeling limits
227
+ their reasoning to the ego vehicle only, while our approach
228
+ is capable of also reasoning over patterns between non-ego
229
+ vehicles. Kumar et al. [23] lift that restriction and create a
230
+ heterogeneous graph in which all agents are fully connected
231
+
232
+ MONNINGER AND SCHMIDT et al.: SCENE
233
+ 3
234
+ to each other as well as to nodes of the static infrastructure
235
+ within a fixed radius. Still, no relations between the static
236
+ infrastructure are explicitly modeled in the graph. Both ap-
237
+ proaches suffer from the aforementioned limitation that the
238
+ graph contains no explicitly modeled edge features between
239
+ entities of the static infrastructure.
240
+ Other approaches [3], [9], [14] explicitly model the lane
241
+ topology in a graph in order to incorporate knowledge about
242
+ the static infrastructure. These approaches utilize specialized
243
+ mechanisms in the inference process to include lane informa-
244
+ tion, allowing a transductive exchange of information between
245
+ agents via the underlying lanes. However, they do not cover
246
+ other entities of the static infrastructure, such as crosswalks or
247
+ traffic lights. In contrast, our methodology is generic and freely
248
+ extensible in a sense that it can capture various information in
249
+ a heterogeneous graph by using typed nodes. Furthermore, our
250
+ methodology allows for modeling relations with arbitrary type
251
+ and edge features between these nodes, which we demonstrate
252
+ to be a valuable addition. The result is one heterogeneous
253
+ graph that explicitly models all aspects of a given traffic scene
254
+ without limitations to specific use cases.
255
+ III. METHODOLOGY
256
+ This section describes our proposed methodology. Firstly,
257
+ we define a graph ontology to model the given dynamic
258
+ agents and static infrastructure in a heterogeneous scene graph.
259
+ Secondly, we use a learning-based approach to predict relevant
260
+ information from this scene graph.
261
+ A. Heterogeneous Scene Graph Ontology
262
+ We represent a scene by a directed heterogeneous graph
263
+ G = (V, E, T , R, φ). Every node vi ∈ V has a feature vector
264
+ vi. The edge ej,r,i = (vj, r, vi) ∈ E between the source node
265
+ vj and the destination node vi with the relation type r ∈ R has
266
+ a feature vector ej,r,i. The type of node v is defined by the type
267
+ operator φ : V → T , with T being the set of allowed node
268
+ types. We define the domain type operator dom : R → T
269
+ and range type operator ran : R → T to map a relation
270
+ type r to the source and target node types, respectively. Each
271
+ relation type r has a fixed source and destination node type:
272
+ ∀(vj, r, vi)
273
+ φ(vj) ∈ dom(r) and φ(vi) ∈ ran(r).
274
+ Fig. 2 illustrates our used node types and our used relation
275
+ types between these node types. Each node and edge has
276
+ a corresponding feature vector. The relation types belong to
277
+ three groups. Relations between agents are of type interacts.
278
+ They are dynamically generated for each pair based on the
279
+ assumption that all agents can interact with each other. Re-
280
+ lations between agents and map entities are of the types on,
281
+ under and crosses. All valid relations are dynamically derived
282
+ from the geometric constellation. The remaining relation types
283
+ link map entities and are given by the HD map.
284
+ B. Reasoning on the Heterogeneous Scene Graph
285
+ Reasoning on the generated heterogeneous scene graph is
286
+ done with the encoder-decoder architecture presented below.
287
+ The encoder first aggregates information of a traffic scene into
288
+ crosswalk
289
+ light
290
+ lane
291
+ agent
292
+ stop
293
+ interacts
294
+ on
295
+ under
296
+ conflict
297
+ connection
298
+ precedence
299
+ overlaps
300
+ controls
301
+ crosses
302
+ signals
303
+ stops
304
+ Fig. 2.
305
+ Node types and allowed relation types of the proposed ontology.
306
+ Different colors are used to indicate the order of our proposed flow of
307
+ information.
308
+ embeddings of the agent nodes. From these embeddings, task-
309
+ specific decoders can directly predict agent-specific attributes
310
+ (e.g., intents or trajectories). Encoder and decoder are jointly
311
+ trained with task-specific data in a supervised manner. The
312
+ focus of this work is the generic encoder.
313
+ 1) Encoder: Multiple layers of graph convolution are cas-
314
+ caded to aggregate information regarding the heterogeneous
315
+ scene. Thanks to their invariance properties [24], graph con-
316
+ volutional layers can learn general, abstract patterns from con-
317
+ crete scenes. We show that this principle works for different
318
+ classification tasks.
319
+ For graph convolution, a variety of operators is applicable.
320
+ We follow the principle described in [25], allowing to incorpo-
321
+ rate edge features in the established Graph Attention Network
322
+ (GAT) operator [26]. For better error propagation and to avoid
323
+ over-smoothing, we add a residual connection for Θs,r · vi to
324
+ the operator. The update of node vi under consideration of
325
+ neighboring nodes connected via the relation type r is given
326
+ by
327
+ v′
328
+ i,r = EdgeGATr(vi) =
329
+ Θs,r · vi+
330
+ ���
331
+ K
332
+ k=1
333
+
334
+
335
+
336
+ j∈Nr(vi)
337
+ αk
338
+ j,r,i
339
+
340
+ Θk
341
+ n,r · vj + Θk
342
+ e,r · ej,r,i
343
+
344
+
345
+ � .
346
+ (1)
347
+ Θ is used to denote learnable weight matrices for the trans-
348
+ formation of features of the node to update (s=self), neigh-
349
+ boring nodes (n=neighbor) and edge features (e=edge). K
350
+ corresponds to the number of attention heads and ∥ denotes
351
+ the concatenation operator. Attention weights are obtained by
352
+ αk
353
+ j,r,i = softmaxr,i
354
+
355
+ LeakyReLU
356
+
357
+ ak
358
+ r
359
+ T [Θk
360
+ n,r · vi||Θk
361
+ n,r · vj||Θk
362
+ e,r · ej,r,i]
363
+ ��
364
+ ,
365
+ (2)
366
+ with a corresponding to a learnable vector. softmaxr,i stands
367
+ for the normalization by all incoming edges of node i con-
368
+ nected via relation type r.
369
+
370
+ 4
371
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, 2022
372
+ While EdgeGAT is able to aggregate information of one
373
+ specific relation type, reasoning on a heterogeneous graph
374
+ requires aggregating information of neighboring nodes that are
375
+ possibly connected via different relation types. Adapted from
376
+ Schlichtkrull et al. [27], we define the node update of one
377
+ heterogeneous GNN layer as
378
+ v′
379
+ i = ReLU
380
+ ��
381
+ r∈R
382
+ v′
383
+ i,r
384
+
385
+ .
386
+ (3)
387
+ We denote the combination of EdgeGAT and the aggregation
388
+ of the resulting embeddings over multiple relation types as
389
+ HetEdgeGAT.
390
+ We propose to use cascaded layers of HetEdgeGAT in order
391
+ to aggregate information of the scene into agent nodes. The
392
+ flow of information towards the agent nodes is represented by
393
+ the color of the relation types in Fig. 2: The first layer aggre-
394
+ gates information into crosswalk nodes (green). Subsequent
395
+ layers aggregate information into lane nodes (blue) and agent
396
+ nodes (red). The last layer of graph convolution then considers
397
+ social interaction between agents and updates the agent nodes
398
+ again (pink).
399
+ 2) Decoder: The decoder is task-specific. We use a Multi-
400
+ layer Perceptron (MLP) and apply it to the encodings of agent
401
+ nodes for the two binary node classification tasks considered
402
+ in the experiments section.
403
+ IV. EXPERIMENTS
404
+ In this section we describe the extensive evaluation of our
405
+ proposed methodology.
406
+ A. Learning Tasks
407
+ We evaluate our methodology on two diverse binary node
408
+ classification tasks:
409
+ 1) Classification whether an agent is parked or not. We
410
+ consider one prior publication introducing and address-
411
+ ing this task as a baseline [2].
412
+ 2) Classification whether an agent is a ghost or not. Ghosts
413
+ are unreliable detections of agents by upstream per-
414
+ ception components that do not exist in real world,
415
+ i.e., false positive detections. We are not aware of
416
+ prior publications that consider static infrastructure for
417
+ this task. Comparison is done with an approach that
418
+ considers only dynamic information [28].
419
+ B. Dataset
420
+ Experiments are carried out on a large-scale, in-house
421
+ dataset with over 22 400 sequences, each coming with 3 s of
422
+ temporal history. They are extracted from in-vehicle recordings
423
+ from different areas in Germany and the U.S. with a sampling
424
+ rate of 10 Hz. Camera, LiDAR and Radar detections are fused
425
+ together in order to detect surrounding dynamic agents. The
426
+ dataset includes diverse environments (e.g., urban, rural and
427
+ highway) as well as diverse scenarios (e.g., driving and yield-
428
+ ing). To the best of our knowledge, there is no publicly avail-
429
+ able dataset for scene understanding that similarly provides
430
+ manually annotated semantic attributes for dynamic agents in
431
+ TABLE I
432
+ NODE TYPE-SPECIFIC FEATURES
433
+ Node type
434
+ Features
435
+ agent
436
+ • State vector (position, velocity, acceleration, yaw, yaw rate) with
437
+ corresponding covariances
438
+ • Tracking properties (e.g., max. velocity, tracked time)
439
+ • Bounding box dimensions
440
+ • Estimate of agent type (e.g., car, truck, two-wheeler)
441
+ • Sensor specific detection and existence probabilities
442
+ • Existence confidence calculated according to [28]
443
+ • Trajectory of the past three seconds as a series of positional and
444
+ angular differences
445
+ lane
446
+ • Type (car, bike, shoulder, parking)
447
+ • Geometric properties (length, min. and max. width, max. curvature)
448
+ • Maximum legal speed
449
+ • Left and right boundary types
450
+ • Turn type
451
+ crosswalk
452
+ • Is signaled
453
+ stop
454
+ • Type (e.g., stop, crosswalk, yield)
455
+ light
456
+ • Type (e.g., car, pedestrian)
457
+ • State (e.g., red, yellow)
458
+ • Is deactivatable
459
+ TABLE II
460
+ RELATION TYPE-SPECIFIC EDGE FEATURES
461
+ Relation type
462
+ Features
463
+ interacts
464
+ • Geometric differences (position, velocity, angle)
465
+ under
466
+ • Assignment probability
467
+ • Frenet state (position, velocity) at agent position
468
+ • Lane properties at agent position
469
+ • Gap to lane boundaries at agent position
470
+ • Behavior primitive of agent in lane (e.g., following, crossing)
471
+ connection
472
+ • Type (e.g., precede, left neighbor)
473
+ conflict
474
+ • Type (e.g., cross, merge)
475
+ precedence
476
+ • Type (e.g., higher, lower)
477
+ stops
478
+ • Longitudinal position in lane
479
+ combination with an extensively attributed heterogeneous HD
480
+ map.
481
+ By deriving correspondences between manually annotated
482
+ agents and agent detections from upstream perception com-
483
+ ponents, more than 430 000 labels per training tasks are
484
+ generated. For our experiments, we use a dataset split of 60%
485
+ (training), 30% (validation) and 10% (testing).
486
+ C. Model Implementation Details
487
+ We use an extensive set of features for nodes and edges in
488
+ the scene graph to explicitly model all available knowledge of
489
+ the scene. Features are provided by the upstream perception
490
+ components and the HD map. Table I and Table II list the
491
+ used feature sets for each node type and each relation type.
492
+ To propagate uncertainty of the perception component to the
493
+ model, the feature vectors of agent nodes contain covariances
494
+ and confidence values. All features that express a category
495
+ type are one-hot encoded. While this set of features is given
496
+ by our perception and HD map, the proposed methodology
497
+ can use any arbitrary set of features.
498
+ Details of the final implementation are shown in Fig. 3,
499
+ including the dimensions of all feature vectors. The features
500
+ of all nodes and edges are type-specifically encoded with a
501
+ single linear layer and ReLU. Static and temporal aspects of
502
+ agents are encoded separately and concatenated thereafter. The
503
+ static encoding uses a linear layer with ReLU. The temporal
504
+ encoding uses a Gated Recurrent Unit (GRU) and ReLU to
505
+
506
+ MONNINGER AND SCHMIDT et al.: SCENE
507
+ 5
508
+ 1
509
+ 16
510
+ 50
511
+ Agent
512
+ Features
513
+ 30x3
514
+ Agent
515
+ Trajectory
516
+ 1
517
+ Crosswalk
518
+ Features
519
+ 12
520
+ Light
521
+ Features
522
+ 5
523
+ Stop
524
+ Features
525
+ 21
526
+ Lane
527
+ Features
528
+ 5
529
+ Connection
530
+ Features
531
+ 5
532
+ Con�ict
533
+ Features
534
+ 6
535
+ Precedence
536
+ Features
537
+ 15
538
+ Under
539
+ Features
540
+ 3
541
+ Interacts
542
+ Features
543
+ 64
544
+ Linear
545
+ 64
546
+ GRU
547
+ 32
548
+ Linear
549
+ 16
550
+ Linear
551
+ 16
552
+ Linear
553
+ Linear
554
+ 64
555
+ 64
556
+ Linear
557
+ Predicted
558
+ Binary Label
559
+ 64
560
+ 128
561
+ Linear
562
+ HetEdgeGAT
563
+ Encoder
564
+ Decoder
565
+ 64
566
+ 1
567
+ Stops
568
+ Features
569
+ 16
570
+ Linear
571
+ 16
572
+ Linear
573
+ 16
574
+ Linear
575
+ 16
576
+ Linear
577
+ 16
578
+ Linear
579
+ 16
580
+ Linear
581
+ 16
582
+ Linear
583
+
584
+
585
+
586
+
587
+ Fig. 3. Implementation details of the SCENE encoder and the task-specific MLP-decoder: Four cascaded layers of HetEdgeGAT (green, blue, red, pink) are
588
+ used to combine information of nodes of different types and their relations in order to update the feature vector of agent nodes. Residual connections (orange)
589
+ prevent over-smoothing. For the two binary node classification tasks, an MLP is then used to generate a classification score.
590
+ process the trajectory feature. Following the idea of [3], the
591
+ trajectory feature contains a fixed-length series of positional
592
+ and angular differences of the last 30 timesteps (3 s). We add
593
+ a binary flag that indicates whether an entry contains a valid
594
+ measurement for each timestep.
595
+ In order to avoid over-smoothing, which is one of the main
596
+ issues of multilayer GNNs [29], we exploit two concatenated
597
+ residual connections (orange). These allow the decoder to
598
+ combine high and low-level features of agent nodes.
599
+ Binary cross-entropy is used as a loss function. The model
600
+ is trained with Adam optimizer [30] with a learning rate of
601
+ 10−5 and a batch size of 32. Dropout with a rate of 0.3 is
602
+ used for the two linear layers of the decoder.
603
+ D. Baselines
604
+ For both tasks, we compare our generic methodology to
605
+ multiple task-specific and generic baselines.
606
+ 1) Task-specific Baselines for the Parked Attribute: The
607
+ velocity baseline evaluates the velocity of each car in a given
608
+ scene. Stationary cars (zero velocity) are labeled as parked and
609
+ vice versa.
610
+ The logistic regression baseline uses a handcrafted set of
611
+ features based on the inputs provided by upstream perception
612
+ components and the HD map. This baseline has been specifi-
613
+ cally designed for classifying the parked attribute.
614
+ We also consider two approaches of one prior publication
615
+ addressing parked car classification [2], namely the heuristic
616
+ approach and the MLP approach, which operates on only three
617
+ features for each agent. Both approaches utilize features that
618
+ contain information about the agent and one underlying lane.
619
+ We call these baselines heuristic and MoveMLP3.
620
+ 2) Task-specific Baseline for the Ghost Attribute: The ex-
621
+ istence confidence baseline gives an estimate about the exis-
622
+ tence of an agent. This baseline approach [28] uses a method
623
+ based on Dempster-Shafer evidence theory to estimate a fused
624
+ existence confidence about an agent based on detections from
625
+ multiple sensor modalities. Note that the resulting existence
626
+ confidence is also part of the input features of agent nodes.
627
+ A comparison to this baseline therefore shows the benefit of
628
+ additionally considering social context and map context.
629
+ 3) Generic Baselines: The MLP baseline contains four
630
+ linear layers with ReLU between these layers. It operates
631
+ directly on the features of agent nodes and does not process
632
+ the graph structure. In comparison to our proposed model, this
633
+ baseline shows the effect of neglecting relational information
634
+ about social context, defined by nearby dynamic agents, and
635
+ map context, defined by the static infrastructure.
636
+ The R-GCN baseline applies the Relational Graph Convo-
637
+ lutional Network [27], typically used as a common approach to
638
+ reason about knowledge graphs, to our scene graph. We extend
639
+ the original R-GCN approach by introducing edge features,
640
+ which allows our implementation of R-GCN to use the same
641
+ input features as SCENE. After four layers of R-GCN, an MLP
642
+ decoder is used to predict the labels. Feature vector sizes of
643
+ nodes and edges are similar to the ones used in SCENE.
644
+ To compare our methodology to the current-state-of-the-
645
+ art in scene encoding, we adapt VectorNet [17] to our input
646
+ representation. The VectorNet-like baselines therefore rely
647
+ on learning from a fully-connected, homogeneous graph. In
648
+ contrast to SCENE, the features of all heterogeneous nodes
649
+ are type-specificially encoded into a joint feature space with
650
+ size 64 to get a homogeneous graph. The vanilla VectorNet-
651
+ like baseline does not use edge features. In order to allow a fair
652
+ comparison to SCENE, we also extend the original VectorNet
653
+ approach by the introduction of edge features. All existing
654
+ edges are type-specifically encoded to a size of 16. To obtain
655
+ the required fully-connected graph, edges are instantiated with
656
+ a zero vector of size 16 between all nodes that are not yet
657
+ connected. A binary flag concatenated to the edge feature
658
+ vector is used to indicate whether an edge is valid (1) or invalid
659
+ (0). Despite this leading to a fully-connected, homogeneous
660
+ graph, connectivity information of our initial scene graph is
661
+ still conserved in the edge features. One layer of EdgeGAT
662
+ is used on the resulting fully-connected graph. Similar to
663
+ SCENE, the labels are then predicted with an MLP decoder.
664
+
665
+ 6
666
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, 2022
667
+ TABLE III
668
+ RESULTS ON THE TEST SET
669
+ Method
670
+ Parked
671
+ Ghost
672
+ F1 (%)
673
+ Acc (%)
674
+ F1 (%)
675
+ Acc (%)
676
+ Velocity
677
+ 76.51
678
+ 81.41
679
+ -
680
+ -
681
+ Logistic regression
682
+ 89.79
683
+ 93.21
684
+ -
685
+ -
686
+ Heuristic [2]
687
+ 86.75
688
+ 90.47
689
+ -
690
+ -
691
+ MoveMLP3 [2]
692
+ 88.56±0.15 92.78±0.07 -
693
+ -
694
+ Existence confidence [28]
695
+ -
696
+ -
697
+ 53.48
698
+ 66.01
699
+ Naive prior
700
+ 0.00
701
+ 67.33
702
+ 66.88
703
+ 50.24
704
+ MLP
705
+ 75.79±0.89 83.23±0.40 79.93±0.67 80.73±0.44
706
+ R-GCN [27]
707
+ 89.68±0.81 93.11±0.58 78.76±0.36 79.87±0.24
708
+ VectorNet-like [17]
709
+ 73.90±1.43 82.71±0.74 74.63±4.17 75.84±1.68
710
+ VectorNet-like (w/ edge feat) [17]
711
+ 89.18±1.28 93.08±0.75 80.93±1.26 81.40±0.98
712
+ Ours (using HetEdgeGAT)1
713
+ 91.17±0.71 94.29±0.46 80.56±0.77 81.44±0.71
714
+ Ours (using HetEdgeGatedGCN)
715
+ 90.09±0.29 93.54±0.15 82.42±1.33 82.83±1.07
716
+ Ours (using HetEdgeSAGE)
717
+ 91.11±0.43 94.19±0.34 80.72±1.23 81.68±0.71
718
+ Ours (using HetEdgeGAT)∗
719
+ 90.16±1.42 93.49±1.10 81.05±1.26 81.93±0.80
720
+ 1Selected for all further experiments.
721
+ ∗Multi-task training.
722
+ E. Metrics
723
+ F-Score (F1) and accuracy (Acc) are used for evaluation.
724
+ F. Quantitative Results
725
+ The models were trained over five random seeds to min-
726
+ imize stochasticity in the results. The resulting average and
727
+ standard deviation of the performance metrics on the test
728
+ split are shown in Table III. Besides GAT, we evaluated
729
+ our approach using different operators for graph convolution,
730
+ including variants of Gated Graph Convolutional Neural Net-
731
+ works (EdgeGatedGCN) [31] and GraphSAGE (EdgeSAGE)
732
+ [32]. They all consistently perform well, which suggests
733
+ that the graph convolution operator is interchangeable, also
734
+ with regards to the architecture. Therefore, our methodology
735
+ can benefit from upcoming advances in the field of GNNs.
736
+ HetEdgeGAT was selected for all further experiments because
737
+ it uses the least number of parameters. Also, Schmidt et al.
738
+ [33] show that the resulting attention weights of interacts
739
+ relations offer additional interpretability, as they are a direct
740
+ measure for interactions.
741
+ Comparing the results of our methodology with the MLP
742
+ baseline supports our initial hypothesis that our proposed way
743
+ of modeling a scene in a heterogeneous scene graph adds
744
+ valuable information.
745
+ Our generic methodology outperforms all task-specific and
746
+ generic baselines on both tasks. The last row in Table III
747
+ shows the result of the model simultaneously trained on both
748
+ learning tasks. The performance is on par with the single-
749
+ task setup, which supports the indication that our method
750
+ works as a generic scene encoder. The VectorNet-like baseline
751
+ extended with edge features performs much better than the
752
+ vanilla VectorNet-like baseline, which supports the intuition
753
+ that adding relational attributes provides valuable information
754
+ for scene understanding. Comparing the average number of
755
+ Floating-Point Operations (FLOPs) of the VectorNet-like base-
756
+ line with edge features (6.24·108 FLOPs) and our SCENE ap-
757
+ proach (4.57 · 107 FLOPs) shows that our approach has more
758
+ than an order of magnitude less computational complexity. The
759
+ higher complexity of the VectorNet-like baselines comes from
760
+ TABLE IV
761
+ CONTEXT ABLATION STUDY ON THE TEST SET
762
+ Context
763
+ #Params
764
+ Parked
765
+ Ghost
766
+ Agent Lane Remaining
767
+ F1 (%)
768
+ Acc (%)
769
+ F1 (%)
770
+ Acc (%)
771
+ 50k
772
+ 75.35±0.70 82.96±0.54 80.13±1.14 80.70±0.59
773
+
774
+ 59k
775
+ 81.85±2.80 88.31±2.00 79.85±0.51 80.69±0.43
776
+
777
+
778
+ 99k
779
+ 91.03±1.46 94.28±0.89 80.63±0.63 81.40±0.47
780
+
781
+
782
+
783
+ 118k
784
+ 91.17±0.71 94.29±0.46 80.56±0.77 81.44±0.71
785
+ TABLE V
786
+ ARCHITECTURAL ABLATION STUDY ON THE TEST SET
787
+ Architecture
788
+ #Params
789
+ Parked
790
+ Ghost
791
+ Temp Res
792
+ Edge feat2
793
+ F1 (%)
794
+ Acc (%)
795
+ F1 (%)
796
+ Acc (%)
797
+ 77k
798
+ 89.47±1.19 93.28±0.63 77.42±0.96 78.74±0.85
799
+
800
+
801
+ 101k
802
+ 90.47±0.76 93.92±0.45 80.26±0.55 80.92±0.55
803
+
804
+
805
+ 102k
806
+ 90.81±1.17 94.06±0.72 80.12±1.47 81.02±1.26
807
+
808
+
809
+ 111k
810
+ 89.06±0.72 92.92±0.60 77.13±0.46 78.71±0.23
811
+
812
+
813
+
814
+ 118k
815
+ 91.17±0.71 94.29±0.46 80.56±0.77 81.44±0.71
816
+ 2In contrast to the temporal and residual architectural measures, edge features
817
+ introduce additional information into the graph.
818
+ applying convolution over the fully-connected graph, which
819
+ also results in significantly higher GPU memory requirements
820
+ and training time than our approach.
821
+ G. Ablation Studies
822
+ In two ablation studies we analyze how well our approach
823
+ can leverage the various sources of information and the
824
+ effectiveness of our architectural measures.
825
+ Table IV ablates the value of various sources of information
826
+ coming from the dynamic agents and static infrastructure and
827
+ the ability of our approach to leverage this information. With-
828
+ out any context at all, the model performs the classification
829
+ tasks with the features of agent nodes only. Our experiments
830
+ show that considering social interactions to nearby agents
831
+ (agent context), lane information (lane context) and informa-
832
+ tion given by crosswalks, stops and lights (remaining context)
833
+ can have a strong positive effect on model performance. The
834
+ relevance of each contextual aspect differs between tasks.
835
+ The remaining context has only a small effect, since much
836
+ information is implicitly present in the lane model already.
837
+ Overall, the results show that incrementally adding further
838
+ context information improves model performance. This con-
839
+ firms the value of the additional information as hypothesized
840
+ in the introduction as well as the capability of the generic
841
+ model to exploit the provided information.
842
+ Table V ablates the performance of our approach in terms
843
+ of applied architectural measures. These measures are the
844
+ temporal encoding of each agent’s trajectory, the residual
845
+ connections and the inclusion of edge features in the layers of
846
+ graph convolution. The results indicate that omitting individual
847
+ architectural measures decreases model performance compared
848
+ to applying the full set of measures. This is particularly
849
+ noteworthy for the edge features, suggesting a benefit of
850
+ adding relational information to the graph. The architecture
851
+ that combines all measures either excels or comes very close to
852
+ the best results. This suggests that the individual architectural
853
+ measures benefit from each other.
854
+
855
+ MONNINGER AND SCHMIDT et al.: SCENE
856
+ 7
857
+ Parked classification
858
+ Parked classification
859
+ Ghost classification
860
+ Fig. 4. Qualitative results of SCENE for the classification of the parked attribute (left and center) and the classification of the ghost attribute (right). The
861
+ upper row shows the front camera frame, which is one of multiple sensors used by upstream perception, and the lower row renders the corresponding scene
862
+ with lanes in gray. Bounding boxes of agents are drawn as rectangles, with the past trajectory visualized by an orange line. The color of the rectangle outline
863
+ indicates the ground-truth label and the fill color indicates the label predicted by our model. Green corresponds to an agent being labeled as non-parked or
864
+ non-ghost. Red corresponds to an agent being labeled as parked or ghost. All agents are correctly classified as indicated by matching fill and outline colors.
865
+ A purple outline indicates a missing label. The autonomous vehicle is colored in blue.
866
+ H. Qualitative Results
867
+ Fig. 4 shows qualitative results for both tasks. Color codes
868
+ are described in the caption of the figure. In the three examples
869
+ all agents with available ground-truth label are correctly clas-
870
+ sified, which is represented by consistent coloring of outline
871
+ and fill.
872
+ The figure on the left shows an urban scenario with vehicles
873
+ parked on the road side (red) and vehicles driving in the center
874
+ (green). Interestingly, the vehicle with white paint inside the
875
+ paved intersection is parked, which is correctly predicted by
876
+ our model.
877
+ The figure displayed in the center is a rare case where two
878
+ cars are parked on the left lane of a highway on-ramp. Again,
879
+ those are correctly classified by our model. The prediction is
880
+ likely supported by the humans nearby, which are detected by
881
+ the system (purple outline due to no parked label for agents of
882
+ type human) and provide social context to the parked vehicles.
883
+ The figure on the right shows a highway scenario, where
884
+ all nearby agents besides one are correctly classified as non-
885
+ ghost (green outline and fill). The prediction of the one ghost
886
+ agent (red fill) can be confirmed by its trajectory showing a
887
+ wrong direction of travel. This specific detection is probably
888
+ caused by sensor reflections of a bridge. The corresponding
889
+ ground-truth label also classifies it as ghost (red outline).
890
+ V. TRANSFERABILITY TO OTHER APPLICATIONS
891
+ As an extension to evaluating the prediction of unknown
892
+ characteristics of traffic agents, in this section we show that,
893
+ without any modifications, the use of cascaded layers of graph
894
+ convolution can be transferred to applications that go beyond
895
+ the domain of scene understanding. We therefore apply our
896
+ methodology for the task of node classification to multiple
897
+ knowledge graphs of different sizes. The source code of
898
+ these experiments, including our graph convolution operator,
899
+ is publicly available3.
900
+ A. Datasets
901
+ Evaluation is done on four publicly available heterogeneous
902
+ knowledge graph datasets, namely AIFB, MUTAG, BGS and
903
+ 3Source code: https://github.com/schmidt-ju/scene
904
+ TABLE VI
905
+ ACCURACY (%) ON THE MASKED NODES OF KNOWLEDGE GRAPHS
906
+ Dataset
907
+ WL [36]
908
+ RDF2Vec [37] Walk Tree [35] R-GCN [27] Ours
909
+ AIFB
910
+ 80.55±0.00
911
+ 88.88±0.00
912
+ 89.44±2.08
913
+ 95.83±0.62 95.83±1.96
914
+ MUTAG
915
+ 80.88±0.00 67.20±1.24
916
+ 73.82±5.61
917
+ 73.23±0.48
918
+ 75.44±2.50
919
+ BGS
920
+ 86.20±0.00
921
+ 87.24±0.89
922
+ 86.90±1.38
923
+ 83.10±0.80
924
+ 92.41±2.72
925
+ AM
926
+ 87.37±0.00
927
+ 88.33±0.61
928
+ 86.77±0.59
929
+ 89.29±0.35
930
+ 90.05±1.07
931
+ AM [34]. The datasets cover varying graph sizes, ranging from
932
+ small (AIFB, 8 285 nodes) to large (AM, 1 666 764 nodes)
933
+ [27]. Given classes for some nodes of a target node type, the
934
+ goal is to correctly classify the classes of masked target nodes.
935
+ B. Model and Results
936
+ We remove low-degree nodes and initialize the features
937
+ of each node with a learnable bias vector. Four layers of
938
+ HetEdgeGAT are arranged in cascaded form. The first two
939
+ layers sequentially update all nodes not of type target based on
940
+ neighboring nodes of the same and of other types. The second
941
+ two layers sequentially aggregate information into nodes of
942
+ type target by considering neighboring nodes of other types
943
+ and of type target. The model is trained full-batch with cross-
944
+ entropy loss. Average accuracy and standard deviation for ten
945
+ runs is reported in Table VI. Results of the compared methods
946
+ are taken from prior publications [27], [35], [36], [37].
947
+ Despite the task being different from predicting unknown
948
+ characteristics of traffic agents, the results show that our
949
+ methodology manages to yield state-of-the-art performance for
950
+ the task of node classification in knowledge graphs.
951
+ VI. CONCLUSION
952
+ This paper proposes a method using cascaded layers of
953
+ graph convolution in order to predict relevant information from
954
+ heterogeneous graphs and examines it on the task of reasoning
955
+ about traffic scenes. Combining the cascaded layers of graph
956
+ convolution with our novel way for modeling traffic scenes
957
+ in heterogeneous graphs results in a generic and extensible
958
+ method to reason about traffic scenes. The heterogeneous
959
+ graph ontology can be extended with additional types or
960
+ features of nodes and edges. Our methodology outperforms all
961
+
962
+ 8
963
+ IEEE ROBOTICS AND AUTOMATION LETTERS. PREPRINT VERSION. ACCEPTED DECEMBER, 2022
964
+ task-specific baselines on two diverse tasks. Furthermore, we
965
+ compared it to multiple generic state-of-the-art encoders and
966
+ demonstrated that our method has significant advantages with
967
+ regard to performance metrics and computational complexity.
968
+ The application of our methodology to the task of node
969
+ classification in knowledge graphs indicates another key prop-
970
+ erty of our methodology: it is, without any modifications,
971
+ applicable to areas that go beyond the domain of scene
972
+ understanding. By making source code and GNN operator
973
+ publicly available, we contribute to the progress in this field.
974
+ REFERENCES
975
+ [1] J. Hong, B. Sapp, and J. Philbin, “Rules of the road: Predicting driving
976
+ behavior with a convolutional model of semantic interactions,” in 2019
977
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition
978
+ (CVPR), 2019, pp. 8446–8454.
979
+ [2] K. Behrendt, O. Mangin, N. Bhakta, and S. Lefevre, “Is this car going to
980
+ move? parked car classification for automated vehicles,” in 2019 IEEE
981
+ Intelligent Vehicles Symposium (IV), 2019, pp. 541–548.
982
+ [3] M. Liang, B. Yang, R. Hu, Y. Chen, R. Liao, S. Feng, and R. Urta-
983
+ sun, “Learning lane graph representations for motion forecasting,” in
984
+ Computer Vision – ECCV 2020, 2020, pp. 541–556.
985
+ [4] Z. Wu, S. Pan, F. Chen, G. Long, C. Zhang, and P. S. Yu, “A
986
+ Comprehensive Survey on Graph Neural Networks,” IEEE Transactions
987
+ on Neural Networks and Learning Systems, vol. 32, no. 1, pp. 4–24,
988
+ 2021.
989
+ [5] S. Casas, W. Luo, and R. Urtasun, “Intentnet: Learning to predict
990
+ intention from raw sensor data,” in Proceedings of the Conference
991
+ on Robot Learning, ser. Proceedings of Machine Learning Research,
992
+ vol. 87.
993
+ PMLR, 2018, pp. 947–956.
994
+ [6] M. Bansal, A. Krizhevsky, and A. S. Ogale, “Chauffeurnet: Learning
995
+ to drive by imitating the best and synthesizing the worst,” in Robotics:
996
+ Science and Systems XV, 2019.
997
+ [7] Y. Chai, B. Sapp, M. Bansal, and D. Anguelov, “Multipath: Multiple
998
+ probabilistic anchor trajectory hypotheses for behavior prediction,” in
999
+ Proceedings of the Conference on Robot Learning, ser. Proceedings of
1000
+ Machine Learning Research, vol. 100.
1001
+ PMLR, 2020, pp. 86–99.
1002
+ [8] N. Djuric, V. Radosavljevic, H. Cui, T. Nguyen, F.-C. Chou, T.-H.
1003
+ Lin, N. Singh, and J. Schneider, “Uncertainty-aware short-term motion
1004
+ prediction of traffic actors for autonomous driving,” in 2020 IEEE Winter
1005
+ Conference on Applications of Computer Vision (WACV), 2020, pp.
1006
+ 2084–2093.
1007
+ [9] W. Zeng, M. Liang, R. Liao, and R. Urtasun, “Lanercnn: Distributed
1008
+ representations for graph-centric motion forecasting,” in 2021 IEEE/RSJ
1009
+ International Conference on Intelligent Robots and Systems (IROS),
1010
+ 2021, pp. 532–539.
1011
+ [10] T. Salzmann, B. Ivanovic, P. Chakravarty, and M. Pavone, “Trajectron++:
1012
+ Dynamically-feasible trajectory forecasting with heterogeneous data,” in
1013
+ Computer Vision – ECCV 2020, 2020, pp. 683–700.
1014
+ [11] C. Tang and R. R. Salakhutdinov, “Multiple futures prediction,” in
1015
+ Advances in Neural Information Processing Systems (NeurIPS), vol. 32,
1016
+ 2019.
1017
+ [12] T. Gilles, S. Sabatini, D. Tsishkou, B. Stanciulescu, and F. Moutarde,
1018
+ “Home: Heatmap output for future motion estimation,” in 2021 IEEE
1019
+ International Intelligent Transportation Systems Conference (ITSC),
1020
+ 2021, pp. 500–507.
1021
+ [13] J. Johnson, R. Krishna, M. Stark, L.-J. Li, D. A. Shamma, M. S.
1022
+ Bernstein, and L. Fei-Fei, “Image retrieval using scene graphs,” in 2015
1023
+ IEEE Conference on Computer Vision and Pattern Recognition (CVPR),
1024
+ 2015, pp. 3668–3678.
1025
+ [14] S. Khandelwal, W. Qi, J. Singh, A. Hartnett, and D. Ramanan, “What-if
1026
+ motion prediction for autonomous driving,” 2020.
1027
+ [15] S. Ulbrich, T. Nothdurft, M. Maurer, and P. Hecker, “Graph-based con-
1028
+ text representation, environment modeling and information aggregation
1029
+ for automated driving,” in 2014 IEEE Intelligent Vehicles Symposium
1030
+ (IV), 2014, pp. 541–547.
1031
+ [16] Y. Tian, A. Carballo, R. Li, and K. Takeda, “Road scene graph:
1032
+ A semantic graph-based scene representation dataset for intelligent
1033
+ vehicles,” 2020.
1034
+ [17] J. Gao, C. Sun, H. Zhao, Y. Shen, D. Anguelov, C. Li, and C. Schmid,
1035
+ “Vectornet: Encoding hd maps and agent dynamics from vectorized
1036
+ representation,” in 2020 IEEE/CVF Conference on Computer Vision and
1037
+ Pattern Recognition (CVPR), 2020, pp. 11 522–11 530.
1038
+ [18] Y. Ma, X. Zhu, S. Zhang, R. Yang, W. Wang, and D. Manocha,
1039
+ “Trafficpredict: Trajectory prediction for heterogeneous traffic-agents,”
1040
+ in The Thirty-Third Conference on Artificial Intelligence (AAAI), 2019,
1041
+ pp. 6120–6127.
1042
+ [19] J. Li, H. Ma, Z. Zhang, and M. Tomizuka, “Social-wagdat: Interaction-
1043
+ aware trajectory prediction via wasserstein graph double-attention net-
1044
+ work,” 2020.
1045
+ [20] J. Li, F. Yang, M. Tomizuka, and C. Choi, “Evolvegraph: Multi-agent
1046
+ trajectory prediction with dynamic relational reasoning,” in Advances in
1047
+ Neural Information Processing Systems (NeurIPS), vol. 33, 2020.
1048
+ [21] Y. Hu, W. Zhan, and M. Tomizuka, “Scenario-transferable semantic
1049
+ graph reasoning for interaction-aware probabilistic prediction,” IEEE
1050
+ Transactions on Intelligent Transportation Systems, vol. 23, no. 12, pp.
1051
+ 23 212–23 230, 2022.
1052
+ [22] C. Li, Y. Meng, S. H. Chan, and Y.-T. Chen, “Learning 3d-aware ego-
1053
+ centric spatial-temporal interaction via graph convolutional networks,”
1054
+ in 2020 IEEE International Conference on Robotics and Automation
1055
+ (ICRA), 2020, pp. 8418–8424.
1056
+ [23] S. Kumar, Y. Gu, J. Hoang, G. C. Haynes, and M. Marchetti-Bowick,
1057
+ “Interaction-based trajectory prediction over a hybrid traffic graph,”
1058
+ in 2021 IEEE/RSJ International Conference on Intelligent Robots and
1059
+ Systems (IROS), 2021, pp. 5530–5535.
1060
+ [24] N. Keriven and G. Peyr´e, “Universal invariant and equivariant graph
1061
+ neural networks,” Advances in Neural Information Processing Systems
1062
+ (NeurIPS), vol. 32, pp. 7092–7101, 2019.
1063
+ [25] Z. Wang, J. Chen, and H. Chen, “Egat: Edge-featured graph atten-
1064
+ tion network,” in Artificial Neural Networks and Machine Learning –
1065
+ ICANN 2021, 2021, pp. 253–264.
1066
+ [26] P. Veliˇckovi´c, G. Cucurull, A. Casanova, A. Romero, P. Li`o, and
1067
+ Y. Bengio, “Graph attention networks,” International Conference on
1068
+ Learning Representations (ICLR), 2018.
1069
+ [27] M. Schlichtkrull, T. N. Kipf, P. Bloem, R. van den Berg, I. Titov,
1070
+ and M. Welling, “Modeling relational data with graph convolutional
1071
+ networks,” in The Semantic Web, 2018, pp. 593–607.
1072
+ [28] M. Aeberhard, S. Paul, N. Kaempchen, and T. Bertram, “Object
1073
+ existence probability fusion using dempster-shafer theory in a high-
1074
+ level sensor data fusion architecture,” in 2011 IEEE Intelligent Vehicles
1075
+ Symposium (IV), 2011, pp. 770–775.
1076
+ [29] J. Zhou, G. Cui, S. Hu, Z. Zhang, C. Yang, Z. Liu, L. Wang, C. Li, and
1077
+ M. Sun, “Graph neural networks: A review of methods and applications,”
1078
+ AI Open, vol. 1, pp. 57–81, 2020.
1079
+ [30] D. P. Kingma and J. Ba, “Adam: A method for stochastic optimization,”
1080
+ in 3rd International Conference on Learning Representations (ICLR),
1081
+ 2015.
1082
+ [31] X. Bresson and T. Laurent, “Residual gated graph convnets,” 2018.
1083
+ [32] W. Hamilton, Z. Ying, and J. Leskovec, “Inductive representation
1084
+ learning on large graphs,” in Advances in Neural Information Processing
1085
+ Systems (NeurIPS), vol. 30, 2017.
1086
+ [33] J. Schmidt, J. Jordan, F. Gritschneder, and K. Dietmayer, “Crat-pred:
1087
+ Vehicle trajectory prediction with crystal graph convolutional neural net-
1088
+ works and multi-head self-attention,” in 2022 International Conference
1089
+ on Robotics and Automation (ICRA), 2022, pp. 7799–7805.
1090
+ [34] P. Ristoski, G. K. D. de Vries, and H. Paulheim, “A collection of
1091
+ benchmark datasets for systematic evaluations of machine learning on
1092
+ the semantic web,” in The Semantic Web, 2016, pp. 186–194.
1093
+ [35] G. Vandewiele, B. Steenwinckel, F. Ongenae, and F. De Turck, “Induc-
1094
+ ing a decision tree with discriminative paths to classify entities in a
1095
+ knowledge graph,” in SEPDA2019, the 4th International Workshop on
1096
+ Semantics-Powered Data Mining and Analytics, 2019, pp. 1–6.
1097
+ [36] N. Shervashidze, P. Schweitzer, E. J. van Leeuwen, K. Mehlhorn,
1098
+ and K. M. Borgwardt, “Weisfeiler-lehman graph kernels,” Journal of
1099
+ Machine Learning Research, vol. 12, pp. 2539–2561, 2011.
1100
+ [37] P. Ristoski, J. Rosati, T. D. Noia, R. D. Leone, and H. Paulheim,
1101
+ “Rdf2vec: Rdf graph embeddings and their applications,” The Semantic
1102
+ Web, vol. 10, pp. 721–752, 2019.
1103
+
2dE1T4oBgHgl3EQf5gVO/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6NE1T4oBgHgl3EQf6wWy/content/tmp_files/2301.03527v1.pdf.txt ADDED
@@ -0,0 +1,690 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–7 (2022)
2
+ Preprint 10 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ Covariance Matrix of Fast Radio Bursts Dispersion
5
+ Robert Reischke⋆1 and Steffen Hagstotz†2,3
6
+ 1 Ruhr University Bochum, Faculty of Physics and Astronomy, Astronomical Institute (AIRUB),
7
+ German Centre for Cosmological Lensing, 44780 Bochum, Germany
8
+ 2 Universitäts-Sternwarte, Fakultät für Physik, Ludwig-Maximilians Universität München,
9
+ Scheinerstraße 1, D-81679 München, Germany
10
+ 3 Excellence Cluster ORIGINS, Boltzmannstraße 2, D-85748 Garching, Germany
11
+ 10 January 2023
12
+ ABSTRACT
13
+ The dispersion of fast radio bursts (FRBs) is a measure of the large-scale electron distribution.
14
+ It enables measurements of cosmological parameters, especially of the expansion rate and the
15
+ cosmic baryon fraction. The number of events is expected to increase dramatically over the
16
+ coming years, and of particular interest are bursts with identified host galaxy and therefore
17
+ redshift information. In this paper, we explore the covariance matrix of the dispersion mea-
18
+ sure (DM) of FRBs induced by the large-scale structure, as bursts from a similar direction on
19
+ the sky are correlated by long wavelength modes of the electron distribution. We derive ana-
20
+ lytical expressions for the covariance matrix and examine the impact on parameter estimation
21
+ from the FRB dispersion measure - redshift relation. The covariance also contains additional
22
+ information that is missed by analysing the events individually. For future samples containing
23
+ over ∼ 300 FRBs with host identification over the full sky, the covariance needs to be taken
24
+ into account for unbiased inference, and the effect increases dramatically for smaller patches
25
+ of the sky.
26
+ Key words: cosmology: theory, large-scale structure of Universe, radio continuum: transients
27
+ 1
28
+ INTRODUCTION
29
+ Fast radio bursts (FRBs) are very short transients lasting usually only a few milliseconds, with a frequency range from ∼ 100 MHz to several
30
+ GHz. The original pulse gets dispersed due to free electrons in the ionised intergalactic medium. This leads to a delayed arrival time of the
31
+ pulse frequencies ∆t(ν) ∝ ν−2, where the proportionality constant is called dispersion measure (DM) (e.g. Thornton et al. 2013; Petroff et al.
32
+ 2015; Connor et al. 2016; Champion et al. 2016; Chatterjee et al. 2017) and is related the column density of electrons along the line-of-sight
33
+ to the FRB.
34
+ While the mechanism for the radio emission is still under debate, their isotropic occurrence and large observed DM suggest an extra-
35
+ galactic origin for the vast majority of events (even though some might also be galactic, see Andersen et al. 2020), so that the DM can be
36
+ used to test the distribution of diffuse electrons in the large-scale structure (LSS). Several authors therefore proposed to use the DM inferred
37
+ from FRBs as a cosmological probe, using either the average dispersion measure up to a given redshift (Zhou et al. 2014; Walters et al. 2018;
38
+ Hagstotz et al. 2022; Macquart et al. 2020; Wu et al. 2022; James et al. 2022) or the statistics of DM fluctuations (Masui & Sigurdson 2015;
39
+ Shirasaki et al. 2017; Rafiei-Ravandi et al. 2020; Reischke et al. 2021; Bhattacharya et al. 2021; Takahashi et al. 2021; Rafiei-Ravandi et al.
40
+ 2021; Reischke et al. 2022). While the former requires host identification to acquire an independent redshift estimate, the latter can be done
41
+ without it, as the homogeneous component can serve as a (noisy) estimate for the redshift. Angular statistics of the DM are formally very
42
+ similar to cosmic shear since one is dealing with projections of cosmic fields. In this paper, however, we will focus on the homogeneous
43
+ component of the DM, the so-called DM−z relation, which can be employed in similar ways as supernovae Ia (SN Ia) measurements (see e.g.
44
+ Riess et al. 2022; Brout et al. 2022, for the most recent results). The dispersion is used as a distance estimate and consequently as a probe
45
+ of the geometry of the Universe. The total amplitude of the dispersion is also sensitive to the overall baryon content, the ionisation fraction
46
+ and the Hubble constant. These are perfectly degenerate at the background level, so additional information about some of these quantities
47
+ have to be considered to constrain the remaining one. A common choice is to adapt a prior on the baryon density coming from big bang
48
+ nucleosynthesis as described in Hagstotz et al. (2022) in order to measure the Hubble parameter at late times.
49
+ Studies that employ FRBs to measure either the cosmic baryon density Macquart et al. (2020) or the Hubble constant Hagstotz et al.
50
+ ⋆ E-mail: [email protected]
51
+ † E-mail: steff[email protected]
52
+ © 2022 The Authors
53
+ arXiv:2301.03527v1 [astro-ph.CO] 9 Jan 2023
54
+
55
+ 2
56
+ Reischke & Hagstotz
57
+ (2022) treat the individual bursts and their DM as independent. However, since the signal from an FRB travels through the large-scale
58
+ structure (LSS), events within angular proximity on the sky become correlated. In this paper, we intend to fill this gap in current analyses
59
+ and are concerned with deriving the covariance and its consequences for using the mean FRB dispersion for the inference of astrophysical
60
+ and cosmological parameters. We emphasise that even though the observed signal does only depend on the cosmological background, the
61
+ covariance itself is sensitive to fluctuations and therefore to perturbations charaterised by the 2-point correlation function of the electron
62
+ distribution.
63
+ The paper is structured as follows: In Section 2 we summarise the theory of FRBs, the DM and derive the expression for the covariance
64
+ matrix. Section 3 presents and discusses the results for a current sample of FRBs (Petroff et al. 2016) and the prospects for future analysis
65
+ with FRBs. Finally, we summarise our findings in Section 4. Throughout the paper we fix the cosmological parameters to a ΛCDM model
66
+ with the best-fit values from the Planck mission Aghanim et al. (2020a) and vary only one parameter for illustration, usually chosen to be the
67
+ Hubble constant H0.
68
+ 2
69
+ TESTING THE COSMOLOGICAL BACKGROUND WITH FAST RADIO BURSTS
70
+ In this section we will review the basic theoretical framework of FRBs and how it is related to properties of the LSS. We will then derive
71
+ main result of this paper, the covariance matrix for FRBs with host identification induced by the correlated LSS along nearby lines of sight.
72
+ 2.1
73
+ Dispersion Measure
74
+ Cosmological tests using FRBs with host identification, that is with an independent redshift estimate, aim to fit the DM-z diagram. The DM
75
+ itself is estimated from the pulse’s dispersion
76
+ ∆t ∝ DMtot(ˆx, z) ν−2 ,
77
+ (1)
78
+ defining the estimated DM of an FRB at the sky position ˆx and redshift z. Dispersion itself is caused by scattering with the free electrons
79
+ along the line of sight. These electrons are either associated with the host halo, with the Milky Way, or with the large-scale structure (LSS).
80
+ Therefore, the average total contribution can be split into three parts:
81
+ DMtot(ˆx, z) = DMhost(z) + DMMW(ˆx) + DMLSS(z, ˆx) .
82
+ (2)
83
+ Here the contribution from the Milky Way does not depend on redshift, since it is a local effect. Likewise the contribution from the host does
84
+ not depend on the direction. The LSS contribution, however, depends both on redshift and direction, which will become important later on.
85
+ Note that each of these contributions takes the form of a PDF with scatter around the mean values.
86
+ For this work, we will focus on the contribution from the LSS. We write explicitly
87
+ DMLSS(ˆx, z) =
88
+ � z
89
+ 0
90
+ ne(ˆx, z′) fIGM(z′) 1 + z′
91
+ H(z′) dz′ ,
92
+ (3)
93
+ where ne(ˆx, z) is the comoving cosmic free electron density, H(z) = H0E(z) is the Hubble function with the expansion function E(z) and the
94
+ Hubble constant H0. The overall DM is usually multiplied with the fraction fIGM(z) of electrons in the IGM that are not bound in structures.
95
+ For redshifts z < 3 almost all baryons are ionised, it is thus useful to express the electron density by the number of baryons in the Universe:
96
+ ne(ˆx, z) = χe
97
+ ρb(ˆx, z)
98
+ mp
99
+ = χe
100
+ ¯ρb
101
+ mp
102
+ �1 + δe(ˆx, z)) ,
103
+ (4)
104
+ with the baryon density ρb, the proton mass mp and the electron fraction
105
+ χe = YH + 1
106
+ 2YHe
107
+ (5)
108
+ ≈ 1 − 1
109
+ 2YHe ,
110
+ (6)
111
+ calculated from the primordial hydrogen and helium abundances YH and YHe. Here, we assume YH ≈ 1 − YHe and YHe = 0.24, found to high
112
+ precision both by CMB measurements (Aghanim et al. 2020a) and by spectroscopic observations of metal-poor gas clouds (Aver et al. 2015).
113
+ The baryon number density in Equation (4) is commonly expanded around its background value ¯ρb/mp with the electron density contrast
114
+ δe, whose mean vanishes by definition. Hence the DM is in principle a probe of the LSS by measuring DM statistics. This, however, requires
115
+ a larger sample of FRBs than currently available.
116
+ The electron fraction in the IGM in Equation (3) is calculated by subtracting the fraction bound in stars, compact objects and the dense
117
+ interstellar medium (ISM)
118
+ fIGM(z) = 1 − f⋆(z) − fISM(z) .
119
+ (7)
120
+ We compute1 f⋆ and fISM using the estimates of star formation rate and ISM mass fraction from Fukugita & Peebles (2004); Madau &
121
+ 1 The code for the calculations is publicly available at https://github.com/FRBs/FRB, provided by Macquart et al. (2020).
122
+ MNRAS 000, 1–7 (2022)
123
+
124
+ Covariance matrix for located FRBs
125
+ 3
126
+ 10−2
127
+ 10−1
128
+ 100
129
+ zi
130
+ 10−2
131
+ 10−1
132
+ 100
133
+ zj
134
+ 26
135
+ 31
136
+ 36
137
+ 41
138
+ 46
139
+ 51
140
+ 56
141
+ 61
142
+ 66
143
+ 71
144
+ Cij(ℓ = 2)
145
+ 10−2
146
+ 10−1
147
+ 100
148
+ zi
149
+ 10−2
150
+ 10−1
151
+ 100
152
+ zj
153
+ 0.000
154
+ 0.125
155
+ 0.250
156
+ 0.375
157
+ 0.500
158
+ 0.625
159
+ 0.750
160
+ 0.875
161
+ 1.000
162
+ 1.125
163
+ Cij(ℓ = 128)
164
+ 0.25
165
+ 0.50
166
+ 0.75
167
+ 1.00
168
+ 1.25
169
+ 1.50
170
+ 1.75
171
+ 2.00
172
+ zi
173
+ 0.25
174
+ 0.50
175
+ 0.75
176
+ 1.00
177
+ 1.25
178
+ 1.50
179
+ 1.75
180
+ 2.00
181
+ zj
182
+ 0.000
183
+ 0.003
184
+ 0.006
185
+ 0.009
186
+ 0.012
187
+ 0.015
188
+ 0.018
189
+ 0.021
190
+ 0.024
191
+ Cij(ℓ = 1090)
192
+ Figure 1. Angular power Cij(ℓ) for different multipoles in the (zi, zj)-plane as defined in Equation (18). Note that the colour scale changes and as well as the
193
+ axis scaling of the rightmost plot.
194
+ Dickinson (2014). We keep fIGM = 0.84 constant for the purposes of this paper. Putting everything together, we write the DM – redshift
195
+ relation in Equation (3) as
196
+ DMLSS(ˆx, z) = 3Ωb0H0
197
+ 8πGmp
198
+ χe fIGM
199
+ � z
200
+ 0
201
+ 1 + z′
202
+ E(z′)
203
+ �1 + δe(ˆx, z′)�dz′ ,
204
+ (8)
205
+ with the dimensionless baryon density parameter Ωb0 and the dimensionless expansion function E(z) = H(z)/H0. Averaging Equation (8)
206
+ provides the well known mean DM-redshift relation:
207
+ DMLSS(z) � ⟨DMLSS(ˆx, z)⟩ = 3Ωb0H0
208
+ 8πGmp
209
+ χe fIGM
210
+ � z
211
+ 0
212
+ 1 + z′
213
+ E(z′) dz′ .
214
+ (9)
215
+ The measurement of FRBs together with a host redshift yields pairs {DMi, zi} and can be used to constrain any parameter from Equation (9)
216
+ in addition to the cosmic expansion history.
217
+ 2.2
218
+ Covariance of the LSS component
219
+ Observations of FRBs with host identification consist of a set of NFRB measurements �DMi, ˆxi, zi
220
+ �, i = 1, ..., NFRB, with the observed DM, the
221
+ direction of the burst ˆxi and its redshift. We are interested in the contribution to the covariance induced by the LSS between events labelled
222
+ i, j:
223
+ covi j �
224
+
225
+ DMLSS(ˆxi, zi)DMLSS(ˆx j, z j)
226
+
227
+ − DMLSS(zi)DMLSS(z j).
228
+ (10)
229
+ Using Equation (8) and Equation (9) one finds
230
+ covi j =
231
+ � zi
232
+ 0
233
+ dz′
234
+ iWDM(z′
235
+ i)
236
+ � zj
237
+ 0
238
+ dz′
239
+ j WDM(z′
240
+ j)
241
+
242
+ δe(ˆxi, z′
243
+ i)δe(ˆxj, z′
244
+ j)
245
+
246
+ ,
247
+ (11)
248
+ with the DM weight function:
249
+ WDM(z) = 3Ωb0H0
250
+ 8πGmp
251
+ χe fIGM
252
+ 1 + z
253
+ E(z) .
254
+ (12)
255
+ What is left is to do is to work out the correlator in the integrand:
256
+
257
+ δe(ˆxi, zi)δe(ˆx j, zj)
258
+
259
+ =
260
+
261
+ d3k
262
+ (2π)3 eik·(xi−x j)Pe(k, zi, z j) ,
263
+ (13)
264
+ where we introduced the electron power spectrum and carried out the k′-integration. Expanding the exponential into plane waves yields:
265
+
266
+ δe(ˆxi, zi)δe(ˆx j, zj)
267
+
268
+ = 2
269
+ π
270
+
271
+ k2dk
272
+
273
+ dΩkPe(k, zi, zj)
274
+
275
+ ℓ,ℓ′
276
+
277
+ m,m′
278
+ iℓ(−i)ℓ′Yℓm(ˆk)Y∗
279
+ ℓm( ˆxi) jℓ(kχi)Y∗
280
+ ℓ′m′(ˆk)Yℓ′m′( ˆxi) jℓ′(kχi)
281
+ (14)
282
+ = 2
283
+ π
284
+
285
+ k2dkPe(k, zi, z j)
286
+
287
+
288
+
289
+ m
290
+ Y∗
291
+ ℓm( ˆxi)jℓ(kχi)Yℓm( ˆxi)jℓ(kχi)
292
+ (15)
293
+ =
294
+ 1
295
+ 2π2
296
+
297
+
298
+ (2ℓ + 1)
299
+
300
+ k2dkPe(k, zi, zj) jℓ(kχi) jℓ(kχj)Pℓ(cos θ) .
301
+ (16)
302
+ In the last step, we made use of the isotropy of cosmological fields and used
303
+
304
+ m
305
+ Yℓm( ˆxi)Y∗
306
+ ℓm( ˆxi) = 2ℓ + 1
307
+
308
+ Pℓ(cos θ) ,
309
+ (17)
310
+ MNRAS 000, 1–7 (2022)
311
+
312
+ 4
313
+ Reischke & Hagstotz
314
+ FRB190523
315
+ FRB190711
316
+ FRB181112
317
+ FRB190611
318
+ FRB180924
319
+ FRB190102
320
+ FRB121102
321
+ FRB190608
322
+ FRB180916
323
+ FRB190523
324
+ FRB190711
325
+ FRB181112
326
+ FRB190611
327
+ FRB180924
328
+ FRB190102
329
+ FRB121102
330
+ FRB190608
331
+ FRB180916
332
+ 0.0
333
+ 0.5
334
+ 1.0
335
+ 1.5
336
+ 2.0
337
+ 2.5
338
+ 3.0
339
+ 3.5
340
+ log10(covij)
341
+ 0.3
342
+ 0.4
343
+ 0.5
344
+ 0.6
345
+ 0.7
346
+ 0.8
347
+ 0.9
348
+ 1.0
349
+ 1.1
350
+ h
351
+ posterior
352
+ full covij
353
+ diagonal covii
354
+ Figure 2. Left: Covariance matrix, Equation (18), for the FRB catalogue (Petroff et al. 2016) with host identification. Right: Posterior distribution of the Hubble
355
+ constant (or other any amplitude of the DM), similar to the analysis carried out in Hagstotz et al. (2022). The solid blue lines use the accurate covariance matrix,
356
+ while the dashed orange lines only use the diagonal elements, i.e. the events are uncorrelated. Parameter dependence of the covariance does not change the
357
+ results for this sample.
358
+ with the Legendre polynomials Pℓ(x) and we denote the angular separation between pairs of FRBs as ˆxi· ˆxj = cos θ. Furthermore, x = (ˆxχ, χ),
359
+ where χ = ∥x∥, with the comoving distance χ(z). Thus, altogether, by using Pe(k, zi, z j) = �Pe(k, zi)Pe(k, z j), we arrive at
360
+ covi j(cos θ, zi, z j) =
361
+ 1
362
+ 2π2
363
+
364
+
365
+ (2ℓ + 1)Pℓ(ˆxi · ˆx j)
366
+
367
+ k2dk
368
+ � zi
369
+ 0
370
+ dz′
371
+ iWDM(z′
372
+ i)
373
+
374
+ Pe(k, z′
375
+ i) jℓ(kχi)
376
+ � zj
377
+ 0
378
+ dz′
379
+ j WDM(z′
380
+ j)
381
+
382
+ Pe(k, z′
383
+ j) jℓ(kχj)
384
+ =
385
+
386
+
387
+ 2ℓ + 1
388
+
389
+ Pℓ(cos θ)Cij(ℓ) ,
390
+ (18)
391
+ which defines the angular power spectrum Cij(ℓ) between the two fields i and j. To calculate the electron power spectrum, we use HMX (Mead
392
+ et al. 2015, 2020; Tröster et al. 2022). In order to carry out the sum over ℓ, we collect multipoles up to ℓ = 5 × 104 on the diagonal and for
393
+ the other entries take up to ℓ = 100/|ˆxi − ˆx j| into account.
394
+ 2.3
395
+ Remarks on parameter dependence of the covariance
396
+ Since the covariance in Equation (22) depends on cosmological parameters, it contains additional information. There has been a long debate in
397
+ the cosmological community whether it is necessary to account for this dependence or not. Current LSS (e.g. Asgari et al. 2021; Abbott et al.
398
+ 2022) or CMB measurements (Aghanim et al. 2020b) adjust the covariance interatively, that is they chose a fiducial cosmology, perform the
399
+ inference for preliminary model parameters, update the covariance matrix to the preliminary best-fit model and start the inference again. This
400
+ process is repeated until convergence is reached. Carron (2013) discussed the assumption of a parameter (in)dependent covariance matrices
401
+ when two-point statistics are used as the model and data, showing that the (Gaussian) covariance matrix never carries any independent
402
+ information (as it is again just a product of two-point functions) and is rather a sign of non-Gaussian information. In Reischke et al. (2017) the
403
+ overall parameter dependence of the cosmic shear two-point covariance was investigated with analytic methods and ray-tracing simulations.
404
+ This work was followed up by Kodwani et al. (2019), where the effect of a parameter dependent covariance matrix on the inference process
405
+ with future LSS surveys was investigated and found to be negligible. However, one should keep in mind that these papers worked with
406
+ averaged data and not simulated realisations of the data. The situation studied in this paper is different since the average DM - redshift
407
+ relation only contains information about the cosmological background, while the correlations in the data are induced by the perturbations
408
+ characterised by the electron power spectrum. Therefore the covariance matrix contains additional information without any double-counting.
409
+ 3
410
+ RESULTS AND DISCUSSION
411
+ In this section we present the results for the covariance matrix. We start by discussing some intermediate results for the angular power spectra
412
+ in the (zi, zj)-plane. Figure 1 shows the corresponding covariance for three different multipoles, ℓ = 2, 128, 1090, from left to right. The
413
+ colour bar encodes the covariance in redshift at these fixed angular scales ℓ ∼ θ−1. All covariances have a clear rectangular structure which
414
+ stems from the integration bounds in Equation (18) reflecting the fact that the DM of two FRBs is only correlated for redshifts z ≤ min(zi, z j).
415
+ Furthermore, the structure of the covariance also shows that on larger angular scales the correlation is stronger at lower redshifts. This can be
416
+ understood by the fact that the Bessel function jℓ(kχ) peaks around kχ = ℓ + 0.5, thus small ℓ require small χ and hence z to reach the peak
417
+ MNRAS 000, 1–7 (2022)
418
+
419
+ Covariance matrix for located FRBs
420
+ 5
421
+ of the power spectrum at k ≈ 0.01 h−1Mpc. Lastly, we also note that the variance obtained from Equation (18), i.e.
422
+ σ2
423
+ i =
424
+
425
+
426
+ (2ℓ + 1)Cii(ℓ)/(4π),
427
+ (19)
428
+ agrees well with the results from the empirical formula presented in (McQuinn 2014; Zhang et al. 2021):
429
+ p(∆) ∝ ∆−β exp
430
+ �(∆−α − C0)2
431
+ 2α2σ2
432
+
433
+ ,
434
+ (20)
435
+ with α = β = 3, ∆ = DMLSS/⟨DMLSS⟩ and the fitting values from N-body simulations presented in table 1 of Zhang et al. (2021). At redshift
436
+ z = 0.1 we find 10 per-cent agreement with our analytical approach.
437
+ 3.1
438
+ Current Data
439
+ We now turn to current data using all FRBs from the FRB catalogue (Petroff et al. 2016) with host identification. For illustrative purposes,
440
+ we use them to fit the Hubble constant by putting a tight prior on the baryon density parameter Ωb0. There are more events available at
441
+ the time of writing (James et al. 2022), but including a slightly larger sample does not affect the role of the covariance. In Hagstotz et al.
442
+ (2022) the value of the physical density parameter, ωb = Ωb0h2, as measured by big bang nucleosynthesis (Cooke et al. 2018) was used,
443
+ changing the overall scaling with h slightly. With the approach followed here, one could think of the constraints just by looking at any linear
444
+ amplitude parameter of the DM, Equation (9). In Figure 2 we show the covariance matrix on the left for the 9 host-identified FRBs from
445
+ the FRBCAT. Clearly the variance is largest for the highest redshifts, the cross-covariance, however, is largest between FRB190102 and
446
+ FRB190611 which are in close proximity on the sky. Withal, the correlation coefficient is below 0.2. The right panel shows the fit to the
447
+ Hubble constant H0 = 100 h kms−1Mpc−1 for these 9 FRBs. We assume a Gaussian likelihood
448
+ χ2(θ) = log det C(θ) + (d − µ(θ))T C−1(θ) (d − µ(θ)) ,
449
+ (21)
450
+ where we made the dependence on the parameters θ explicit. The covariance consists out of three contributions
451
+ C = CLSS + CMW + Chost ,
452
+ (22)
453
+ and the components of CLSS are given by Equation (18), while we assume for the Milky Way CMW = σ2
454
+ MWI, with σMW = 30 and the host
455
+ Chost = σ2
456
+ hostI, with σhost = 50/(1 + z)
457
+ The results are shown on the right side of Figure 2, where the solid blue line denotes the posterior using the full covariance matrix,
458
+ while the assumption of independent events (taking only the diagonal of the covariance into account) leads to the dashed orange result. For
459
+ the small sample size available right now, both approaches agree very well. In this case, the parameter dependence of the covariance is also
460
+ still negligible. As we explain in the next section, this changes once the samples grow larger.
461
+ 3.2
462
+ Future Data
463
+ In order to illustrate when the proper treatment of correlated errors in the FRB dispersion becomes important, we now generate synthetic
464
+ samples containing a total number of NFRB FRBs distributed over redshift. For the redshift distribution, we assume a standard magnitude
465
+ limited sample (e.g. Reischke et al. 2021):
466
+ n(z) ∝ z2 exp(−zα) ,
467
+ (23)
468
+ with α = 5. Next, we draw random positions for each FRB uniformly over patches in the sky with sky fractions fsky = 1, 10−2 and 10−3,
469
+ so that the effective number density is n = f −1
470
+ skyNFRB/(4π). For this sample, we calculate the covariance matrix Equation (18) of the LSS
471
+ component which in turn yields the final covariance via Equation (22). We used this full covariance matrix to sample the NFRB DM values
472
+ for the generated events, completing the triples �DMi, ˆxi, zi
473
+ � in our synthetic catalog.
474
+ In Figure 3 we show the correlation coefficient rij = covij/(coviicov jj)1/2 for 500 FRBs distributed over different parts of the sky. While
475
+ the covariance for a few hundred events distributed over the full sphere is dominated by the diagonal elements, the same number of FRBs
476
+ distributed on a small fraction of the sky leads to a tight correlation due to the small angular separation of events.
477
+ The full covariance modelling is crucial for parameter estimation from larger FRB catalogs. In Figure 4 we show the posterior of h
478
+ from several synthetic catalogues of 500 events distributed over various fractions of the sky. The catalogue is always generated using the
479
+ true covariance matrix, and analysed using either the full covariance (blue solid) or only the diagonal (assuming uncorrelated events, orange
480
+ dashed). Thick lines are showing the average over many realisations, while single realisations of the data and the corresponding inference are
481
+ shown with shaded lines. The assumption of uncorrelated DMs leads to a severe underestimation of the error by 40%, 60% and up to 85% for
482
+ events covering either the full sky, or fsky = 10−2 and fsky = 10−3 respectively. While a linear parameter cannot be biased on average, single
483
+ realisations using the diagonal correlation matrix can easily show more than 3σ deviation from the true value used to generate the samples.
484
+ In the lower panels of Figure 4 we show the effect of the additional cosmological information contained in the covariance of the samples.
485
+ We compare again inference using the full, parameter-dependent covariance matrix (solid blue) with the case of a fixed covariance matrix
486
+ (dashed red). The width of the posterior shrinks by 30%, 45% and up to 70% depending on the sky fraction.
487
+ In Figure 5 we demonstrate the influence of the covariance as a function of the number of observed FRBs, again for the same sky
488
+ fractions. Note that the synthetic data used in Figure 4 is not necessarily the same as in Figure 5, but both are compatible with the full
489
+ covariance. The solid line shows the maximum posterior values while the shaded areas correspond to the 95% confidence interval. From the
490
+ plots it is noticeable that the uncertainty on h is severely underestimated for NFRB ≥ 300 even for a full sky sample when using a diagonal
491
+ MNRAS 000, 1–7 (2022)
492
+
493
+ 6
494
+ Reischke & Hagstotz
495
+ 0
496
+ 100
497
+ 200
498
+ 300
499
+ 400
500
+ 0
501
+ 100
502
+ 200
503
+ 300
504
+ 400
505
+ fsky = 1
506
+ fsky = 10−3
507
+ −5
508
+ −4
509
+ −3
510
+ −2
511
+ −1
512
+ 0
513
+ log10(rij)
514
+ Figure 3. Correlation coefficient, rij = covij/(coviicov jj)1/2, for 500 FRBs with host identification for a full sky (lower half) compared to the same sample
515
+ only on a small subset fsky = 10−3 of the sky (upper half), where the correlation of the data points becomes much stronger. The number of events corresponds
516
+ to n ≈ 5 × 10−3 deg−2 for the full sky sample, and n ≈ 5 deg−2 for the case of a small sky fraction.
517
+ posterior
518
+ fsky = 1
519
+ full covij
520
+ diagonal covii
521
+ fsky = 10−2
522
+ fsky = 10−3
523
+ −0.10
524
+ −0.05
525
+ 0.00
526
+ 0.05
527
+ 0.10
528
+ ∆h/h
529
+ posterior
530
+ fsky = 1
531
+ covij(θ)
532
+ covij(θ0)
533
+ −0.10
534
+ −0.05
535
+ 0.00
536
+ 0.05
537
+ 0.10
538
+ ∆h/h
539
+ fsky = 10−2
540
+ −0.10
541
+ −0.05
542
+ 0.00
543
+ 0.05
544
+ 0.10
545
+ ∆h/h
546
+ fsky = 10−3
547
+ Figure 4. Upper panels: Posterior distribution for various samples of 500 FRBs drawn with the respective covariance plotted in Figure 3. Solid blue lines use
548
+ the full covariance, while dashed orange lines treat the FRBs as independent and just use the diagonal of the covariance matrix and underestimate the true error
549
+ severely by 40%, 60% and 85% for the respective panels. The x-axis shows the relative deviation from the fiducial value (used to generate the synthetic data).
550
+ Thick lines denote the average effect over many realisations, and shaded lines show different realisations of the noisy data. Single realisations analysed using
551
+ diagonal covariance can lead to false parameter estimations. Lower panels: Posterior distributions either using a parameter-dependent covariance (solid blue)
552
+ or a fixed covariance (dashed red). The cosmological dependence of the covariance matrix contains additional information, shrinking the error bars by 30%,
553
+ 45% and 70% for the respective sky fractions compared to a covariance calculated at fixed parameters.
554
+ covariance. Although significant biases are unlikely to arise in this scenario, 3σ deviations from the true underlying value are possible if the
555
+ covariance between events is neglected. For fsky = 10−3 these effects are already present for smaller NFRB and the error can be misestimated
556
+ by up to 50 per-cent for NFRB as low as 40. While the last case is mostly of academical nature, selecting subsets of close by FRBs which are
557
+ close by and ignoring there covariance might be dangerous.
558
+ We close this section with a short comparison with the approach used in e.g. Macquart et al. (2020),Wu et al. (2022) or James et al.
559
+ (2022). These works use a likelihood derived from the one-point probability distribution function of DMLSS and take into account the full
560
+ non-Gaussianity of the DM distribution since it is measured directly from numerical simulations. While this captures the high DM tail of the
561
+ distribution, the final likelihood is still dominated by the variance rather than its skewness. On the other hand, it then is generally difficult to
562
+ take the covariance between different FRBs into account since in principle an NFRB-point function is needed to obtain the accurate shape of
563
+ the likelihood. Measuring all necessary moments from numerical simulations is inherently difficult due to the high noise in these estimates.
564
+ Furthermore, it is challenging to include the parameter dependence in these approaches, since the numerical simulations are only evaluated
565
+ at a single cosmology, although some of it has already been taken care of by looking at the relative DM, i.e. compared to the background
566
+ MNRAS 000, 1–7 (2022)
567
+
568
+ Covariance matrix for located FRBs
569
+ 7
570
+ 200
571
+ 400
572
+ 600
573
+ 800
574
+ 1000
575
+ NFRB
576
+ −0.10
577
+ −0.05
578
+ 0.00
579
+ 0.05
580
+ 0.10
581
+ 0.15
582
+ ∆h/h
583
+ fsky = 1
584
+ fsky = 1
585
+ fsky = 1
586
+ full covij
587
+ diagonal covii
588
+ 200
589
+ 400
590
+ 600
591
+ 800
592
+ 1000
593
+ NFRB
594
+ fsky = 10−2
595
+ fsky = 10−2
596
+ fsky = 10−2
597
+ 200
598
+ 400
599
+ 600
600
+ 800
601
+ 1000
602
+ NFRB
603
+ fsky = 10−3
604
+ fsky = 10−3
605
+ fsky = 10−3
606
+ Figure 5. Best fit values and 95% confidence interval (shaded bands) against the number of FRBs with host identification generated with a known redshift
607
+ distribution for a full sky sample, fsky = 1 and fsky = 10−2, fsky = 10−3 from left to right. Results from synthetic data analysed either using only the diagonal
608
+ covariance (orange) or the full covariance including off-diagonal elements (blue). The diagonal covariance underestimates the true error, so the inferred value
609
+ of h is offset from the fiducial value.
610
+ cosmology. It would be interesting which effect is more important: the correlation or the high DM tail of the distribution. We refer this
611
+ investigation to future work.
612
+ 4
613
+ CONCLUSIONS
614
+ In this paper we have investigated the impact of the LSS induced correlation between FRBs with host identification. We have derived the
615
+ covariance matrix in harmonic and real space for FRBs observed at redshift z and ˆxi position. This new covariance matrix was then used to
616
+ reanalyse the FRBs from the FRB catalogue (Petroff et al. 2016) and to explore the influence on a single parameter, the Hubble constant h,
617
+ measured from current and future samples. Our main findings can be summarised as follows:
618
+ (i) The number of current FRBs with host identification does not require the inclusion of the covariance between them as the statistical
619
+ significance of the measurement is too low. Here we find similar results as Hagstotz et al. (2022).
620
+ (ii) For a full sky sample we find that the Hubble constant h or any other linear model parameter picks up an underestimated error of
621
+ roughly 50 per-cent for 500 FRBs in the best case. In the worst case there can be significant biases for any single realisation of the data. This
622
+ situation becomes even more serious if the number of FRBs increases.
623
+ (iii) If the parameter dependence of the covariance is not accounted for, biases can arise already for smaller numbers of FRBs in the case
624
+ of partial sky fraction. We generally advise to take the dependence on the model parameters of the covariance (diagonal or not) into account,
625
+ as it contains complementary information to the background dispersion measure.
626
+ (iv) When small patches of the sky are observed (fsky = 10−3 or smaller) the influence of the full covariance can be seen already for
627
+ NFRB = 40, leading to underestimated errors.
628
+ We therefore conclude that the LSS covariance matrix of the DM of FRBs with host identification can become important in the future when
629
+ more such FRBs (∼ 102) have been observed. Here we only investigated isotropically distributed FRB samples over sky patches of different
630
+ sizes. In case of a more complex selection function the results found here might become more severe, but we leave this for future work.
631
+ Another issue is the inclusion of the non-Gaussian structure of the likelihood which in principle is naturally included in approaches using
632
+ a formula fitted to numerical simulations (Macquart et al. 2020; Wu et al. 2022; James et al. 2022). These, however, lack the possibility to
633
+ account for the correlations between the different FRBs. This approach is feasible at the moment, but will lead to errorneous conclusions in
634
+ the future. Lastly, there are studies investigating the possibility to constrain reionization with FRBs (Heimersheim et al. 2022). These studies,
635
+ due to their high redshift FRBs would be much stringer affected by the covariance matrix due to the longer integration path.
636
+ Data Availability: The data and code underlying this article will be shared on request to the corresponding author.
637
+ ACKNOWLEDGMENTS
638
+ RR is supported by the European Research Council (Grant No. 770935). SH was supported by the Excellence Cluster ORIGINS which is
639
+ funded by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany’s Excellence Strategy - EXC-2094 -
640
+ 390783311. SH and RR acknowledge support by Institut Pascal at Université Paris-Saclay during the Paris-Saclay Astroparticle Symposium
641
+ 2022, with the support of the P2IO Laboratory of Excellence (program “Investissements d’avenir” ANR-11-IDEX-0003-01 Paris-Saclay and
642
+ ANR-10-LABX-0038), the P2I axis of the Graduate School of Physics of Université Paris-Saclay, as well as IJCLab, CEA, APPEC, IAS,
643
+ OSUPS, and the IN2P3 master project UCMN.
644
+ MNRAS 000, 1–7 (2022)
645
+
646
+ 8
647
+ Reischke & Hagstotz
648
+ REFERENCES
649
+ Abbott T. M. C., et al., 2022, Phys. Rev. D, 105, 023520
650
+ Aghanim N., et al., 2020a, Astron. Astrophys., 641, A6
651
+ Aghanim N., et al., 2020b, Astron. Astrophys., 641, A6
652
+ Andersen B., et al., 2020, Nature, 587, 54
653
+ Asgari M., et al., 2021, Astron. Astrophys., 645, A104
654
+ Aver E., Olive K. A., Skillman E. D., 2015, JCAP, 07, 011
655
+ Bhattacharya M., Kumar P., Linder E. V., 2021, Phys. Rev. D, 103, 103526
656
+ Brout D., et al., 2022, Astrophys. J., 938, 110
657
+ Carron J., 2013, Astronomy & Astrophysics, 551, A88
658
+ Champion D. J., et al., 2016, Monthly Notices of the Royal Astronomical Society, 460, L30
659
+ Chatterjee S., et al., 2017, Nature, 541, 58
660
+ Connor L., Sievers J., Pen U.-L., 2016, Monthly Notices of the Royal Astronomical Society, 458, L19
661
+ Cooke R. J., Pettini M., Steidel C. C., 2018, ApJ, 855, 102
662
+ Fukugita M., Peebles P. J. E., 2004, Astrophys. J., 616, 643
663
+ Hagstotz S., Reischke R., Lilow R., 2022, Mon. Not. Roy. Astron. Soc., 511, 662
664
+ Heimersheim S., Sartorio N. S., Fialkov A., Lorimer D. R., 2022, The Astrophysical Journal, 933, 57
665
+ James C. W., et al., 2022, Monthly Notices of the Royal Astronomical Society, 516, 4862
666
+ Kodwani D., Alonso D., Ferreira P., 2019, The Open Journal of Astrophysics, 2, 10.21105/astro.1811.11584
667
+ Macquart J.-P., et al., 2020, Nature, 581, 391
668
+ Madau P., Dickinson M., 2014, Ann. Rev. Astron. Astrophys., 52, 415
669
+ Masui K. W., Sigurdson K., 2015, Physical Review Letters, 115, 121301
670
+ McQuinn M., 2014, The Astrophysical Journal Letters, 780, L33
671
+ Mead A. J., Peacock J. A., Heymans C., Joudaki S., Heavens A. F., 2015, MNRAS, 454, 1958
672
+ Mead A. J., Tröster T., Heymans C., Van Waerbeke L., McCarthy I. G., 2020, Astron. Astrophys., 641, A130
673
+ Petroff E., et al., 2015, MNRAS, 447, 246
674
+ Petroff E., et al., 2016, Publications of the Astronomical Society of Australia, 33, e045
675
+ Rafiei-Ravandi M., Smith K. M., Masui K. W., 2020, Phys. Rev. D, 102, 023528
676
+ Rafiei-Ravandi M., et al., 2021, Astrophys. J., 922, 42
677
+ Reischke R., Kiessling A., Schäfer B. M., 2017, MNRAS, 465, 4016
678
+ Reischke R., Hagstotz S., Lilow R., 2021, Phys. Rev. D, 103, 023517
679
+ Reischke R., Hagstotz S., Lilow R., 2022, Monthly Notices of the Royal Astronomical Society, 512, 285
680
+ Riess A. G., et al., 2022, Astrophys. J. Lett., 934, L7
681
+ Shirasaki M., Kashiyama K., Yoshida N., 2017, Physical Review D, 95, 083012
682
+ Takahashi R., Ioka K., Mori A., Funahashi K., 2021, Mon. Not. Roy. Astron. Soc., 502, 2615
683
+ Thornton D., et al., 2013, Science, 341, 53
684
+ Tröster T., et al., 2022, Astron. Astrophys., 660, A27
685
+ Walters A., Weltman A., Gaensler B. M., Ma Y.-Z., Witzemann A., 2018, The Astrophysical Journal, 856, 65
686
+ Wu Q., Zhang G.-Q., Wang F.-Y., 2022, Monthly Notices of the Royal Astronomical Society, 515, L1
687
+ Zhang Z. J., Yan K., Li C. M., Zhang G. Q., Wang F. Y., 2021, Astrophys. J., 906, 49
688
+ Zhou B., Li X., Wang T., Fan Y.-Z., Wei D.-M., 2014, Physical Review D, 89, 107303
689
+ MNRAS 000, 1–7 (2022)
690
+
6NE1T4oBgHgl3EQf6wWy/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8dA0T4oBgHgl3EQfOv8t/content/tmp_files/2301.02164v1.pdf.txt ADDED
@@ -0,0 +1,763 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Emergence of anyonic correlations from spin and charge dynamics in one dimension
2
+ Oleksandr Gamayun,1 Eoin Quinn,2 Kemal Bidzhiev,3 and Mikhail B. Zvonarev2
3
+ 1Faculty of Physics, University of Warsaw, ul. Pasteura 5, 02-093 Warsaw, Poland
4
+ 2Universit´e Paris-Saclay, CNRS, LPTMS, 91405, Orsay, France
5
+ 3PASQAL, 7 rue L´eonard de Vinci, 91300 Massy, France
6
+ (Dated: January 6, 2023)
7
+ We propose a transformation for spin and charge degrees of freedom in one-dimensional lattice
8
+ systems, constrained to have no doubly occupied sites, that allows direct access to the dynamical
9
+ correlations of the system. The transformation delivers particle creation and annihilation operators
10
+ in a form of a spinless particle and a non-local operator acting on the space of states of a spin-
11
+ 1/2 chain. This permits a decomposition of dynamical correlation functions as a convolution of
12
+ those for impenetrable anyons together with those of a spin chain. Further analysis can be done by
13
+ methods tailored for each part of the convolution, greatly increasing the impact and flexibility of
14
+ the approach.
15
+ The physics of many-body quantum systems incorpo-
16
+ rates effects from interaction and statistics of bare par-
17
+ ticles.
18
+ The emerging quasi-particles could inherit the
19
+ statistics of their non-interacting peers, free fermions
20
+ turning into a Fermi liquid, and free bosons into a Bose-
21
+ Einstein condensate. Reducing a system’s dimensionality
22
+ enhances interaction effects and masks out signatures of
23
+ the statistics of the constitutent particles.
24
+ In one di-
25
+ mension, arbitrarily weak repulsion precludes a macro-
26
+ scopic occupation of a single state with the zero momen-
27
+ tum, that is, destroys the Bose-Einstein condensate [1].
28
+ Furthermore, interactions may transform bosonic excita-
29
+ tion spectrum into a fermionic one, an example being the
30
+ bosons repelling each other through a δ-function poten-
31
+ tial of infinite strength, the system known as the Tonks-
32
+ Girardeau gas, whose excitation spectrum is identical to
33
+ that of a free Fermi gas [2].
34
+ The interplay of spin and charge degrees of freedom
35
+ could be particularly intricate in one dimension. Systems
36
+ having linear excitation spectrum at low energies fall into
37
+ a Luttinger liquid (LL) universality class regardless of the
38
+ statistics of the bare particles. Spin and charge degrees
39
+ of freedom of the microscopic theory are represented by
40
+ commuting terms in the LL Hamiltonian and factor out
41
+ in the dynamical correlation functions, the phenomenon
42
+ referred to as spin-charge separation [3, 4]. Accounting
43
+ for non-linearities of the excitation spectrum within the
44
+ effective field theory approach requires proper modifica-
45
+ tion of the LL description, the cases studied recently
46
+ being spin and charge dynamics above the highly de-
47
+ generate ground state (spin-incoherent regime, Refs. [5–
48
+ 7]), in presence of the quadratic branch of the excita-
49
+ tion spectrum (itinerant ferromagnetic regime, Refs. [8–
50
+ 12]), and in the vicinity of the edge of excitation spec-
51
+ trum, Ref. [13].
52
+ Whether and how the concept of the
53
+ spin-charge separation may be extended beyond the LL
54
+ effective field theory description is a challenging open
55
+ question, relevant, in particular, for ultracold gas exper-
56
+ iments [14].
57
+ Studying systems with no double occupancy (NDO)
58
+ constraint (any two particles cannot occupy the same
59
+ lattice site) is a must for understanding how spin and
60
+ charge degrees of freedom are coupled at all energy scales.
61
+ Disregarding the unoccupied sites (“squeezing” the lat-
62
+ tice) reduces the space of states of the original system
63
+ containing N spin-1/2 particles to the space of states
64
+ of the spin-1/2 chain of length N.
65
+ The state of indi-
66
+ vidual spins on the squeezed lattice could be controlled
67
+ and manipulated directly by ultracold quantum gas mi-
68
+ croscopy [15–17]. On the theory side, some dynamical
69
+ correlation functions have been evaluated by making use
70
+ of the coordinate representation for the many body wave
71
+ functions, whose structure is very special due to the NDO
72
+ constraint [18–21]. The formalism of the second quanti-
73
+ zation, expressing basic microscopic fields of the system
74
+ in terms of the collective spin and charge variables, could
75
+ serve as a systemic approach revealing contributions from
76
+ spin and charge dynamics into any correlation function.
77
+ However, such a formalism has not been developed so far.
78
+ In this Letter we present a transformation from the
79
+ spin-1/2 fermions subjected to the NDO constraint to the
80
+ collective charge (spinless fermions on a lattice) and spin
81
+ (spin-1/2 operators on another lattice) variables. These
82
+ collective charge and spin variables commute with each
83
+ other, and enter into the transformation in a highly non-
84
+ local way, as shown in Eqs. (9)–(12). Being used for cor-
85
+ relation functions, the transformation leads to the charge
86
+ dynamics of the impenetrable anyons, whose statistical
87
+ angle is averaged out with the weight function defined by
88
+ spin configurations.
89
+ Transformation to spin and charge variables.— We
90
+ consider spin-1/2 fermions on an infinite one-dimensional
91
+ lattice. There, ˆψ†
92
+ jα, ˆψjα, and ˆnjα = ˆψ†
93
+ jα ˆψjα are the cre-
94
+ ation, annihilation, and the particle number operators for
95
+ a site j (−∞ ≤ j ≤ ∞), and α =↑, ↓ is the spin index.
96
+ The local spin vector ˆs(j) = (ˆsx(j), ˆsy(j), ˆsz(j)) can be
97
+ represented as
98
+ ˆs(j) = 1
99
+ 2
100
+
101
+ ˆψ†
102
+ j↑
103
+ ˆψ†
104
+ j↓
105
+
106
+ σ
107
+ � ˆψj↑
108
+ ˆψj↓
109
+
110
+ ,
111
+ (1)
112
+ arXiv:2301.02164v1 [cond-mat.quant-gas] 5 Jan 2023
113
+
114
+ 2
115
+ where σ = (σx, σy, σz) is the vector composed of the
116
+ three Pauli matrices. The spin-ladder operators ˆs±(j) =
117
+ ˆsx(j) ± iˆsy(j) read ˆs+(j) = ˆψ†
118
+ j↑ ˆψj↓ and ˆs−(j) = ˆψ†
119
+ j↓ ˆψj↑,
120
+ respectively.
121
+ We require the total number of fermions
122
+ in the system, ˆN = �
123
+ j ˆnj, to be a conserved quantity.
124
+ There could only be either zero or one fermion on each
125
+ site,
126
+ ˆnj ≡ ˆnj↑ + ˆnj↓ = {0, 1},
127
+ (2)
128
+ due to the NDO constraint. The projection operator
129
+ ˆ
130
+ X =
131
+
132
+
133
+ j=−∞
134
+ (1 − ˆnj↑ˆnj↓)
135
+ (3)
136
+ applied to the basis state |Ψ⟩ = ˆψ†
137
+ j1α1 · · · ˆψ†
138
+ jNαN |0⟩ elimi-
139
+ nates those with any number of double occupancies. The
140
+ remaining ones can be uniquely identified as a product
141
+ of the states |f⟩ and |ℓ⟩:
142
+ |Ψ⟩ = |f⟩ ⊗ |ℓ⟩.
143
+ (4)
144
+ Here, |f⟩ = ˆc†
145
+ j1 · · · ˆc†
146
+ jN |0⟩ is defined by spinless fermions
147
+ on an infitite lattice placed at the positions of the origi-
148
+ nal spin-1/2 fermions. The vacuum |0⟩ for the states |Ψ⟩
149
+ and |f⟩ contains no fermions, ˆψj|0⟩ = 0, and ˆcj|0⟩ = 0,
150
+ respectively.
151
+ The state |ℓ⟩ = |α1 · · · αN⟩ of a spin-
152
+ 1/2 chain of length N can be represented as |ℓ⟩ =
153
+ ˆℓ−(m1) · · · ˆℓ−(mM)| ⇑⟩. The set {m1, . . . , mM} indicates
154
+ the positions of the down-spins among {α1, . . . , αN}, M
155
+ being the total number of the down-spins.
156
+ For exam-
157
+ ple, | ↑↓↑↓↓⟩ gives {m1, m2, m3} = {2, 4, 5}. The vac-
158
+ uum | ⇑⟩ is the spin-up polarized state. The operator
159
+ ˆℓ(m) = σ(m)/2 acts on the spin state of the mth parti-
160
+ cle, and ˆℓ± = ˆℓx ± iˆℓy.
161
+ We now express spin-1/2 fermion fields via operators
162
+ acting into the spaces formed by |f⟩ and |ℓ⟩. The number
163
+ of particles to the left from the jth site is
164
+ ˆ
165
+ Nj =
166
+ j
167
+
168
+ a=−∞
169
+ ˆna.
170
+ (5)
171
+ Here, ˆnj = ˆc†
172
+ jˆcj acting onto |f⟩ corresponds to ˆnj defined
173
+ by Eq. (2), acting onto |Ψ⟩. Note that the spectrum of the
174
+ operator ˆ
175
+ Nj is integer-valued. Any operator ˆO depending
176
+ on ˆ
177
+ Nj can be understood by the following formula:
178
+ ˆO( ˆ
179
+ Nj) =
180
+
181
+
182
+ m=−∞
183
+ ˆO(m)δm, ˆ
184
+ Nj.
185
+ (6)
186
+ The operator ˆO(m) characterizes the state of mth parti-
187
+ cle, and the Kronecker delta
188
+ δm, ˆ
189
+ Nj =
190
+ � 2π
191
+ 0
192
+
193
+ 2π eiλ( ˆ
194
+ Nj−m)
195
+ (7)
196
+ 1
197
+ N + 1
198
+ m′
199
+ Pm′,N+1
200
+ N + 1
201
+ m
202
+ PN+1,m
203
+ N + 1
204
+ m′ − 1
205
+ PN+1,mPm′,N+1
206
+ FIG. 1.
207
+ Shown is the action of the operator P onto the states
208
+ of the spin chain. The arrows indicate the directions of the
209
+ transfer of the local states. The outcome of the action of the
210
+ composition PN+1,mPm′,N+1 is illustrated for m′ > m.
211
+ is equal to one for the lattice site at which the mth par-
212
+ ticle is located, and is equal to zero otherwise. The com-
213
+ position law
214
+ ˆO1( ˆ
215
+ Nj) ˆO2( ˆ
216
+ Nj) =
217
+
218
+
219
+ m=−∞
220
+ ˆO1(m) ˆO2(m)δm, ˆ
221
+ Nj
222
+ (8)
223
+ stems directly from Eqs. (6) and (7).
224
+ We propose the following expressions for the fermion
225
+ creation operators
226
+ ˆψ†
227
+ j↑ =P ˆ
228
+ Nj, ˆ
229
+ Nˆc†
230
+ j,
231
+ (9)
232
+ ˆψ†
233
+ j↓ =P ˆ
234
+ Nj, ˆ
235
+ N ˆℓ−( ˆN)ˆc†
236
+ j.
237
+ (10)
238
+ and the corresponding annihilation operators
239
+ ˆψj↑ =ˆcj ˆη( ˆN)P†
240
+ ˆ
241
+ Nj, ˆ
242
+ N,
243
+ (11)
244
+ ˆψj↓ =ˆcj ˆℓ+( ˆN)P†
245
+ ˆ
246
+ Nj, ˆ
247
+ N.
248
+ (12)
249
+ The operator ˆη = ˆℓ+ˆℓ− = | ↑⟩⟨↑ | in Eq. (11) acts on the
250
+ site of the spin chain defined by the value of the number
251
+ operator ˆN. A way to interpret the dependence on ˆ
252
+ Nj is
253
+ explained by Eqs. (6) and (7). The cyclic shift operator
254
+ Pm,m′ on a lattice encompassing the sites from m to m′
255
+ is
256
+ Pm,m′ = Πm,m+1Πm+1,m+2 · · · Πm′−1,m′.
257
+ (13)
258
+ The permutation operator Πm,m′ interchanges the states
259
+ on the sites m and m′, in case of spin-1/2 particles it
260
+ reads
261
+ Πm,m′ = 1
262
+ 2[σ(m) ⊗ σ(m′) + I ⊗ I].
263
+ (14)
264
+ Here, I is the identity matrix. Evidently, Π is its own
265
+ inverse, (Πm,m′)2 = I, Hermitian, Π†
266
+ m,m′ = Πm,m′,
267
+ and unitary, Π†
268
+ m,m′Πm,m′ = I.
269
+ This implies Pm′,m =
270
+ P−1
271
+ m,m′ = P†
272
+ m,m′. The action of the operator (13) onto the
273
+ states of the spin chain is illustrated in Fig. 1. Note that
274
+
275
+ 3
276
+ the local spin operator (1) consists of the pairs ˆψ†
277
+ jα ˆψjα′
278
+ where ˆψ† and ˆψ are taken at the same site j. As a con-
279
+ sequence, the permutation operators cancels out when
280
+ using Eqs. (9)–(12), leading to the representation
281
+ ˆs(j) = ˆnjˆℓ( ˆ
282
+ Nj)
283
+ (15)
284
+ already known in the literature [12].
285
+ We demonstrate
286
+ how efficacious are Eqs. (9)–(12) in revealing the contri-
287
+ butions from the spin and charge degrees of freedom into
288
+ the dynamical correlation functions in the remaining part
289
+ of the Letter.
290
+ Hamiltonian.— We apply the transformations (9)–(12)
291
+ to the Hamiltonian
292
+ ˆH = ˆHf + ˆHℓ,
293
+ (16)
294
+ where
295
+ ˆHf = ˆ
296
+ X
297
+
298
+ ���−th
299
+
300
+
301
+ j=−∞
302
+ α=↑,↓
303
+ ( ˆψ†
304
+ jα ˆψj+1α + H.c.) − h ˆN
305
+ +1
306
+ 2
307
+
308
+
309
+ jj′=−∞
310
+ : ˆnjUj−j′ ˆnj′ :
311
+
312
+ ��� ˆ
313
+ X
314
+ (17)
315
+ is SU(2)-invariant, and the term
316
+ ˆHℓ = 2B ˆ
317
+ X ˆSz ˆ
318
+ X,
319
+ ˆSz =
320
+
321
+
322
+ j=−∞
323
+ ˆsz(j)
324
+ (18)
325
+ breaks this symmetry due to the magnetic field B applied
326
+ along the z-projection of the total spin. The symbols H.c.
327
+ and : · · · : in Eq. (17) stand for the Hermitian conjugate
328
+ and the normal ordering, respectively. The projection op-
329
+ erator ˆ
330
+ X, given by Eq. (3), imposes the NDO constraint.
331
+ Note that the on-site interaction term : ˆn2
332
+ j : U0/2 im-
333
+ plies an infinite energy cost for having two particles on
334
+ any site in the U0 → ∞ limit. This way, the use of ˆ
335
+ X
336
+ is equivalent to letting U0 → ∞ in the Hamiltonian (16)
337
+ with no ˆ
338
+ X. The actual value of U0 is irrelevant when ˆ
339
+ X
340
+ is used, since ˆ
341
+ X : ˆn2
342
+ j : ˆ
343
+ X = 0.
344
+ Using the transformation (9)–(12) we get Eq. (17) writ-
345
+ ten in terms of the spinless fermions exclusively,
346
+ ˆHf = −th
347
+
348
+
349
+ j=−∞
350
+ (ˆc†
351
+ jˆcj+1 + H.c.) − h ˆN
352
+ + 1
353
+ 2
354
+
355
+
356
+ j,j′=−∞
357
+ : ˆnjUj−j′ ˆnj′ :
358
+ (19)
359
+ and Eq. (18) containing the spinless fermions as well as
360
+ the spin operators,
361
+ ˆHℓ = 2B
362
+
363
+
364
+ j=−∞
365
+ ˆnj ˆℓz( ˆ
366
+ Nj).
367
+ (20)
368
+ Amazingly, the action of ˆHf ( ˆHℓ) onto the state (4) is
369
+ non-trivial for the |f⟩ (|ℓ⟩) part only:
370
+ ˆHf|Ψ⟩ = Ef|f⟩ ⊗ |ℓ⟩,
371
+ ˆHℓ|Ψ⟩ = |f⟩ ⊗ Eℓ|ℓ⟩.
372
+ (21)
373
+ The energy Eℓ = 2BLz, where Lz is the eigenvalue of the
374
+ operator ˆLz = �N
375
+ m=1 ˆℓz(m), measuring the z-projection
376
+ of the total spin for the state |ℓ⟩ of the spin chain. Hence,
377
+ the spin degeneracy of the Hamiltonian (16) takes place
378
+ for any Lz ̸= ±N/2. Furthermore, ˆHℓ = 0 for B = 0,
379
+ implying 2N-fold degeneracy as long as the system is not
380
+ put into a finite volume with some boundary conditions.
381
+ Field-field correlation functions in thermal state.—We
382
+ consider the one-body correlation functions, describing
383
+ the particle propagation,
384
+
385
+ p (j − j′, t) = 1
386
+ Z ⟨ ˆψjα(t) ˆψ†
387
+ j′α(0)⟩T ,
388
+ α =↑, ↓,
389
+ (22)
390
+ and the hole propagation,
391
+
392
+ h(j − j′, t) = 1
393
+ Z ⟨ ˆψ†
394
+ jα(t) ˆψj′α(0)⟩T ,
395
+ α =↑, ↓,
396
+ (23)
397
+ evaluated at temperature T, chemical potential h, and
398
+ magnetic field B, on a thermals state
399
+ ⟨· · · ⟩T =
400
+
401
+
402
+ N=0
403
+
404
+ f,ℓ
405
+ ⟨Ψ|e−β ˆ
406
+ H · · · |Ψ⟩,
407
+ (24)
408
+ where |Ψ⟩ is given by Eq. (4).
409
+ The sum over f runs
410
+ through all possible values of the free-particle momenta
411
+ characterizing the N-fermion state |f⟩.
412
+ The sum over
413
+ ℓ runs through all possible configurations of the z-
414
+ projection of the spins, Z is the grand partition function,
415
+ and β = T −1. The symmetry
416
+ G↑
417
+ p(h)(j − j′, t; h, B) = G↓
418
+ p(h)(j − j′, t; h, −B)
419
+ (25)
420
+ makes it sufficient to evaluate G↑ only.
421
+ Using Eqs. (6)–(12) we factorize the matrix element
422
+ from Eq. (22) into two parts,
423
+ ⟨Ψ| ˆψj↑(t) ˆψ†
424
+ j′↑(0)|Ψ⟩ =
425
+
426
+
427
+ m,m′=−∞
428
+ � 2π
429
+ 0
430
+
431
+
432
+ dλ′
433
+
434
+ e−iλm+iλ′m′e−β(Ef +Eℓ)Cp(λ, λ′; j − j′; t)S(m, m′).
435
+ (26)
436
+ The first one encompasses the contributions from the
437
+ state |f⟩ of spinless fermions,
438
+ Cp(λ, λ′; j − j′; t) = ⟨f|ˆcj(t)eiλ ˆ
439
+ Nj(t)e−iλ′ ˆ
440
+ Nj′(0)ˆc†
441
+ j′|f⟩.
442
+ (27)
443
+ Its non-trivial time evolution is governed by the Hamil-
444
+ tonian (19). The second one involves the state |ℓ⟩ of the
445
+ spin chain, and the existence of the free fermions is only
446
+ noticed through their total number N, which defines the
447
+
448
+ 4
449
+ length of the chain,
450
+ S(m, m′) = ⟨ℓ|PN+1,mPm′,N+1|ℓ⟩
451
+ = ⟨ℓ|
452
+ max{m,m′}−1
453
+
454
+ j=min{m,m′}
455
+ [1
456
+ 2I + ˆℓz(j)]|ℓ⟩.
457
+ (28)
458
+ This part is time-independent, since the cyclic shift op-
459
+ erator, Eq. (13) does not change the value of the z-
460
+ projection of the total spin, Lz. The action of the oper-
461
+ ator PN+1,mPm′,N+1, illustrated in Fig. 1, leads to van-
462
+ ishing S if any spin between the sites m and m′ is pointed
463
+ down. This way we get the right hand side of Eq. (28).
464
+ We proceed further by substituting Eq. (28) into
465
+ Eq. (22) and taking the sum over the spin configurations,
466
+
467
+
468
+ e−βEℓS(m, m′) = [2 cosh(βB)]N
469
+ ν|m−m′|
470
+ ,
471
+ (29)
472
+ where ν = 1 + e2βB. We get
473
+ G↑
474
+ p(j − j′, t) = 1
475
+ Z
476
+
477
+ {N}
478
+ e−β ˜
479
+ Ef
480
+ � 2π
481
+ 0
482
+
483
+
484
+ dλ′
485
+
486
+ × Cp(λ, λ′; j − j′; t)
487
+
488
+
489
+ m,m′=−∞
490
+ e−iλm+iλ′m′
491
+ ν|m−m′|
492
+ ,
493
+ (30)
494
+ where
495
+ ˜Ef = Ef − 1
496
+ β N ln[2 cosh(βB)],
497
+ (31)
498
+ and the sum over {N} encompasses the ones over N
499
+ and f.
500
+ The partition function Z can be taken over
501
+ the fermion configurations f with the energies given by
502
+ Eq. (31). We have
503
+
504
+
505
+ m,m′=−∞
506
+ e−iλm+iλ′m′
507
+ ν|m−m′|
508
+ = 2πδ(λ − λ′)F(λ; T),
509
+ (32)
510
+ where
511
+ F(λ; ν) = 1 +
512
+
513
+
514
+ m=1
515
+ ν−m(eimλ + e−imλ).
516
+ (33)
517
+ Therefore,
518
+ G↑
519
+ p(j − j′, t) =
520
+ � 2π
521
+ 0
522
+
523
+ 2π F(λ; ν)Cp(λ; j − j′; t; T),
524
+ (34)
525
+ where
526
+ Cp(λ; j − j′; t; T) = 1
527
+ Z
528
+
529
+ {N}
530
+ e−β ˜
531
+ Ef Cp(λ; j − j′; t),
532
+ (35)
533
+ and we write Cp(λ) in place of Cp(λ, λ) in order to lighten
534
+ notations.
535
+ The summation on the right hand side of
536
+ Eq. (35) represents the definition of the thermal state
537
+ for the spinless fermions with the spectum given by ˜Ef.
538
+ The hole correlation function (23) is treated the same
539
+ way as the particle one. The result is given by Eqs. (34)
540
+ and (35) with Cp replaced by
541
+ Ch(λ; j − j′; t) = ⟨f|eiλ ˆ
542
+ Nj(t)ˆc†
543
+ j(t)ˆcj′e−iλ ˆ
544
+ Nj′(0)|f⟩.
545
+ (36)
546
+ Emergence of impenetrable anyons.— The operator
547
+ ˆaj = ˆcje−iλ ˆ
548
+ Nj satisfies the commutation relations
549
+ ˆajˆa†
550
+ j′ + e−iλϵ(j−j′)ˆa†
551
+ j′ˆaj = δjj′,
552
+ (37)
553
+ ˆajˆaj′ + eiλϵ(j−j′)ˆaj′ˆaj = 0,
554
+ (38)
555
+ where ϵ(x) = |x|/x, and ϵ(0) = 0. This is the fermion-
556
+ anyon mapping discussed in Ref. [22]. The function Cp(λ)
557
+ turns into
558
+ Cp(−λ; j − j′; t) = ⟨f|ˆaj(t)ˆa†
559
+ j′(0)|f⟩,
560
+ (39)
561
+ which is a correlation function of the impenetrable
562
+ anyons on a lattice, the variable λ being the statistical
563
+ angle.
564
+ The emergence of the anyon correlation function and
565
+ its subsequent integration over λ with the function F in
566
+ Eq. (34) could be understood as follows. Let us consider
567
+ a system with M spin-up and N − M spin-down par-
568
+ ticles. Pick one spin-up particle among them, and pull
569
+ it through the whole system, subsequently interchanging
570
+ its coordinate with those of the other particles. The in-
571
+ terchanges with the spin-down particles are non-trivial:
572
+ the spin part of the wave function could give any phase
573
+ factor since its symmetry is not restricted by the fermion
574
+ symmetry of the total wave function. We stress that for-
575
+ malizing our a posteriori explanation of the structure of
576
+ Eq. (34) by examining exact finite-N wave functions in
577
+ the coordinate representations (given, for example, in the
578
+ Refs. [21, 23]) goes beyond the scope of the Letter.
579
+ Place
580
+ among
581
+ other
582
+ approaches.—
583
+ The
584
+ Hamilto-
585
+ nian (16) with Uj−j′ = 0 represents the exactly solvable
586
+ t − 0 model, also known as the Hubbard model in the
587
+ limit of infinitely strong repulsion [24]. There, Eq. (34)
588
+ has been obtained in the form of a Fredholm determinant
589
+ with the use of the exact wave functions in the coordi-
590
+ nate representation [21, 23, 25]. The transformation (9)–
591
+ (12) leading to Eq. (34), combined with the ones given
592
+ in Ref. [26] for the function (27) bring us the same Fred-
593
+ holm determinant representation through much shorter
594
+ calculations.
595
+ Note that the model (16) is also exactly
596
+ solvable when Uj−j′ = Uδj,j′±1. In this case, the Hamil-
597
+ tonian (19) can be mapped onto the one of the XXZ
598
+ Heisenberg magnet, and the function (27) can, in princi-
599
+ ple, be calculated by the Bethe Ansatz method.
600
+ Special attention has been paid in the literature to
601
+ the model in the T → 0 limit. Its ground state is non-
602
+ degenerate and spin-up (-down) polarized for B negative
603
+
604
+ 5
605
+ (positive). In the former case, Eq. (34) describes a spin-
606
+ up fermion propagating through a gas of the other spin-
607
+ up fermions. We have F = 2πδ(λ) in Eq. (33), hence
608
+ G↑
609
+ p = ⟨ˆcj(t)ˆc†
610
+ j′⟩. In the latter case, Eq. (34) describes
611
+ a spin-up fermion (an impurity particle) propagating
612
+ through a gas of spin-down fermions. We have F = 1,
613
+ and the long time and distance asymptotic behaviour of
614
+ G↑
615
+ p reveals the logarithmic diffusion phenomenon [8, 9].
616
+ The non-degeneracy of the ground state at B ̸= 0 stands
617
+ in a sharp contrast to the high degeneracy at B = 0,
618
+ where F is given by Eq. (33) with ν = 2. This regime is
619
+ known as the spin-incoherent one [5–7]. A challenge put
620
+ forward in the aforementioned works was to find a low-
621
+ energy effective field theory, since the low-enegry spec-
622
+ trum of spin excitations cannot be linearized for B > 0
623
+ and B = 0, and the LL theory is inapplicable. The repre-
624
+ sentation (34) resolves this problem in the following way:
625
+ the LL theory in applicable to the function Cp; the spin
626
+ excitations are accounted for by the integral over λ with
627
+ the weight function F without any approximation, which
628
+ is equivalent to counting the number of worldlines within
629
+ the first-quantized path integral approach implemented
630
+ in Refs. [6, 8].
631
+ ACKNOWLEDGEMENTS
632
+ We thank V. Cheianov and K. Seetharam for fruitful dis-
633
+ cussions. O.G. acknowledges support from the Polish Na-
634
+ tional Agency for Academic Exchange (NAWA) through
635
+ the Grant No. PPN/ULM/2020/1/00247. O.G. is grate-
636
+ ful to Galileo Galilei Institute for hospitality and support
637
+ during the scientific program on “Randomness, Integra-
638
+ bility, and Universality”, where part of this work was
639
+ done. The work of E. Q. is supported by Grant No. ANR-
640
+ 16-CE91-0009-01.
641
+ K.B. thanks S. Bocini, V. Mari´c,
642
+ L. Zadnik and M. Fagotti for useful discussions.
643
+ The
644
+ work of K.B. was partially supported by the European
645
+ Research Council under the Starting Grant No. 805252
646
+ LoCoMacro. The work of M. B. Z. is supported by Grant
647
+ No. ANR-16-CE91-0009-01 and CNRS grant PICS06738.
648
+ M. B. Z. acknowledges Russian Quantum Center and
649
+ Prof. A. Fedorov for their hospitality during the work.
650
+ [1] L. Pitaevskii and S. Stringari, Bose-Einstein Condensa-
651
+ tion (Oxford University Press, Oxford, 2003).
652
+ [2] M. Girardeau, Relationship between systems of impene-
653
+ trable bosons and fermions in one dimension, J. Math.
654
+ Phys. 1, 516 (1960).
655
+ [3] A. O. Gogolin, A. A. Nersesyan, and A. M. Tsvelik,
656
+ Bosonization and Strongly Correlated Systems (Cam-
657
+ bridge University Press, Cambridge, 1999).
658
+ [4] T. Giamarchi, Quantum Physics in One Dimension (Ox-
659
+ ford University Press, Oxford, 2004).
660
+ [5] V. V. Cheianov and M. B. Zvonarev, Nonunitary
661
+ Spin-Charge Separation in a One-Dimensional Fermion
662
+ Gas, Phys. Rev. Lett. 92, 176401 (2004), arXiv:cond-
663
+ mat/0308470.
664
+ [6] G. A. Fiete and L. Balents, Green’s Function for Mag-
665
+ netically Incoherent Interacting Electrons in One Dimen-
666
+ sion, Phys. Rev. Lett. 93, 226401 (2004), arXiv:cond-
667
+ mat/0403744.
668
+ [7] G. A. Fiete, Colloquium: The spin-incoherent Luttinger
669
+ liquid, Rev. Mod. Phys. 79, 801 (2007), arXiv:cond-
670
+ mat/0611597.
671
+ [8] M. B. Zvonarev, V. V. Cheianov, and T. Giamarchi, Spin
672
+ dynamics in a one-dimensional ferromagnetic Bose gas,
673
+ Phys. Rev. Lett. 99, 240404 (2007), arXiv:0708.3638.
674
+ [9] S. Akhanjee and Y. Tserkovnyak, Spin-charge separation
675
+ in a strongly correlated spin-polarized chain, Phys. Rev.
676
+ B 76, 140408(R) (2007), arXiv:0708.4012.
677
+ [10] A.
678
+ Kamenev
679
+ and
680
+ L.
681
+ I.
682
+ Glazman,
683
+ Dynamics
684
+ of
685
+ a
686
+ one-dimensional spinor Bose liquid:
687
+ A phenomeno-
688
+ logical approach, Phys. Rev. A 80, 011603 (2009),
689
+ arXiv:0808.0479.
690
+ [11] M. B. Zvonarev, V. V. Cheianov, and T. Giamarchi, Edge
691
+ exponent in the dynamic spin structure factor of the
692
+ Yang-Gaudin model, Phys. Rev. B 80, 201102 (2009),
693
+ 0905.0598.
694
+ [12] M. B. Zvonarev, V. V. Cheianov, and T. Giamarchi,
695
+ Dynamical Properties of the One-Dimensional Spin-
696
+ 1/2 Bose-Hubbard Model near a Mott-Insulator to
697
+ Ferromagnetic-Liquid Transition, Phys. Rev. Lett. 103,
698
+ 110401 (2009), arXiv:0811.2676.
699
+ [13] A. Imambekov, T. L. Schmidt, and L. I. Glazman, One-
700
+ dimensional quantum liquids:
701
+ Beyond the Luttinger
702
+ liquid paradigm, Rev. Mod. Phys. 84, 1253 (2012),
703
+ arXiv:1110.1374.
704
+ [14] R. Senaratne, D. Cavazos-Cavazos, S. Wang, F. He, Y.-
705
+ T. Chang, A. Kafle, H. Pu, X.-W. Guan, and R. G.
706
+ Hulet, Spin-charge separation in a one-dimensional Fermi
707
+ gas with tunable interactions, Science 376, 1305 (2022),
708
+ arXiv:2111.11545.
709
+ [15] T. A. Hilker, G. Salomon, F. Grusdt, A. Omran, M. Boll,
710
+ E. Demler, I. Bloch, and C. Gross, Revealing hid-
711
+ den antiferromagnetic correlations in doped Hubbard
712
+ chains via string correlators, Science 357, 484 (2017),
713
+ arXiv:1702.00642.
714
+ [16] G. Salomon, J. Koepsell, J. Vijayan, T. A. Hilker, J. Ne-
715
+ spolo, L. Pollet, I. Bloch, and C. Gross, Direct observa-
716
+ tion of incommensurate magnetism in Hubbard chains,
717
+ Nature 565, 56 (2019), arXiv:1803.08892.
718
+ [17] J.
719
+ Vijayan,
720
+ P.
721
+ Sompet,
722
+ G.
723
+ Salomon,
724
+ J.
725
+ Koepsell,
726
+ S. Hirthe, A. Bohrdt, F. Grusdt, I. Bloch, and C. Gross,
727
+ Time-resolved observation of spin-charge deconfinement
728
+ in fermionic Hubbard chains, Science 367, 186 (2020),
729
+ arXiv:1905.13638.
730
+ [18] M. Ogata and H. Shiba, Bethe-ansatz wave function, mo-
731
+ mentum distribution, and spin correlation in the one-
732
+ dimensional strongly correlated Hubbard model, Phys.
733
+ Rev. B 41, 2326 (1990).
734
+ [19] A. V. Zabrodin and A. A. Ovchinnikov, Spin-density cor-
735
+ relator of a one-dimensional Fermi gas with strong inter-
736
+ action, Soviet Physics - JETP (English Translation) 69,
737
+ 750 (1989).
738
+ [20] A. V. Zabrodin and A. A. Ovchinnikov, Single-particle
739
+ density matrix of a one-dimensional system of spin 1/2
740
+ Fermi particles, Theor. Math. Phys. 85, 1321 (1990).
741
+
742
+ 6
743
+ [21] A. G. Izergin, A. G. Pronko, and N. I. Abarenkova,
744
+ Temperature correlators in the one-dimensional Hubbard
745
+ model in the strong coupling limit, Phys. Lett. A 245,
746
+ 537 (1998), hep-th/9801167.
747
+ [22] M. D. Girardeau, Anyon-fermion mapping and applica-
748
+ tions to ultracold gases in tight waveguides, Phys. Rev.
749
+ Lett. 97, 100402 (2006), arXiv:cond-mat/0604357.
750
+ [23] A. G. Izergin and A. G. Pronko, Temperature correlators
751
+ in the two-component one-dimensional gas, Nucl. Phys.
752
+ B 520, 594 (1998), arXiv:solv-int/9801004.
753
+ [24] F. H. L. Essler, H. Frahm, F. G¨ohmann, A. Kl¨umper,
754
+ and V. E. Korepin, The One-Dimensional Hubbard Model
755
+ (Cambridge University Press, Cambridge, 2005).
756
+ [25] A. G. Izergin and A. G. Pronko, Correlators in the one-
757
+ dimensional two-component Bose and Fermi gases, Phys.
758
+ Lett. A 236, 445 (1997).
759
+ [26] M. B. Zvonarev, V. V. Cheianov, and T. Giamarchi,
760
+ The time-dependent correlation function of the Jordan-
761
+ Wigner operator as a Fredholm determinant, J. Stat.
762
+ Mech. 2009, P07035 (2009), arXiv:0812.4059.
763
+
8dA0T4oBgHgl3EQfOv8t/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,439 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf,len=438
2
+ page_content='Emergence of anyonic correlations from spin and charge dynamics in one dimension Oleksandr Gamayun,1 Eoin Quinn,2 Kemal Bidzhiev,3 and Mikhail B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
3
+ page_content=' Zvonarev2 1Faculty of Physics, University of Warsaw, ul.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
4
+ page_content=' Pasteura 5, 02-093 Warsaw, Poland 2Universit´e Paris-Saclay, CNRS, LPTMS, 91405, Orsay, France 3PASQAL, 7 rue L´eonard de Vinci, 91300 Massy, France (Dated: January 6, 2023) We propose a transformation for spin and charge degrees of freedom in one-dimensional lattice systems, constrained to have no doubly occupied sites, that allows direct access to the dynamical correlations of the system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
5
+ page_content=' The transformation delivers particle creation and annihilation operators in a form of a spinless particle and a non-local operator acting on the space of states of a spin- 1/2 chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
6
+ page_content=' This permits a decomposition of dynamical correlation functions as a convolution of those for impenetrable anyons together with those of a spin chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
7
+ page_content=' Further analysis can be done by methods tailored for each part of the convolution, greatly increasing the impact and flexibility of the approach.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
8
+ page_content=' The physics of many-body quantum systems incorpo- rates effects from interaction and statistics of bare par- ticles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
9
+ page_content=' The emerging quasi-particles could inherit the statistics of their non-interacting peers, free fermions turning into a Fermi liquid, and free bosons into a Bose- Einstein condensate.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
10
+ page_content=' Reducing a system’s dimensionality enhances interaction effects and masks out signatures of the statistics of the constitutent particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
11
+ page_content=' In one di- mension, arbitrarily weak repulsion precludes a macro- scopic occupation of a single state with the zero momen- tum, that is, destroys the Bose-Einstein condensate [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
12
+ page_content=' Furthermore, interactions may transform bosonic excita- tion spectrum into a fermionic one, an example being the bosons repelling each other through a δ-function poten- tial of infinite strength, the system known as the Tonks- Girardeau gas, whose excitation spectrum is identical to that of a free Fermi gas [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
13
+ page_content=' The interplay of spin and charge degrees of freedom could be particularly intricate in one dimension.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
14
+ page_content=' Systems having linear excitation spectrum at low energies fall into a Luttinger liquid (LL) universality class regardless of the statistics of the bare particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
15
+ page_content=' Spin and charge degrees of freedom of the microscopic theory are represented by commuting terms in the LL Hamiltonian and factor out in the dynamical correlation functions, the phenomenon referred to as spin-charge separation [3, 4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
16
+ page_content=' Accounting for non-linearities of the excitation spectrum within the effective field theory approach requires proper modifica- tion of the LL description, the cases studied recently being spin and charge dynamics above the highly de- generate ground state (spin-incoherent regime, Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
17
+ page_content=' [5– 7]), in presence of the quadratic branch of the excita- tion spectrum (itinerant ferromagnetic regime, Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
18
+ page_content=' [8– 12]), and in the vicinity of the edge of excitation spec- trum, Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
19
+ page_content=' [13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
20
+ page_content=' Whether and how the concept of the spin-charge separation may be extended beyond the LL effective field theory description is a challenging open question, relevant, in particular, for ultracold gas exper- iments [14].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
21
+ page_content=' Studying systems with no double occupancy (NDO) constraint (any two particles cannot occupy the same lattice site) is a must for understanding how spin and charge degrees of freedom are coupled at all energy scales.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
22
+ page_content=' Disregarding the unoccupied sites (“squeezing” the lat- tice) reduces the space of states of the original system containing N spin-1/2 particles to the space of states of the spin-1/2 chain of length N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
23
+ page_content=' The state of indi- vidual spins on the squeezed lattice could be controlled and manipulated directly by ultracold quantum gas mi- croscopy [15–17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
24
+ page_content=' On the theory side, some dynamical correlation functions have been evaluated by making use of the coordinate representation for the many body wave functions, whose structure is very special due to the NDO constraint [18–21].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
25
+ page_content=' The formalism of the second quanti- zation, expressing basic microscopic fields of the system in terms of the collective spin and charge variables, could serve as a systemic approach revealing contributions from spin and charge dynamics into any correlation function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
26
+ page_content=' However, such a formalism has not been developed so far.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
27
+ page_content=' In this Letter we present a transformation from the spin-1/2 fermions subjected to the NDO constraint to the collective charge (spinless fermions on a lattice) and spin (spin-1/2 operators on another lattice) variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
28
+ page_content=' These collective charge and spin variables commute with each other, and enter into the transformation in a highly non- local way, as shown in Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
29
+ page_content=' (9)–(12).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
30
+ page_content=' Being used for cor- relation functions, the transformation leads to the charge dynamics of the impenetrable anyons, whose statistical angle is averaged out with the weight function defined by spin configurations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
31
+ page_content=' Transformation to spin and charge variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
32
+ page_content='— We consider spin-1/2 fermions on an infinite one-dimensional lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
33
+ page_content=' There, ˆψ† jα, ˆψjα, and ˆnjα = ˆψ† jα ˆψjα are the cre- ation, annihilation, and the particle number operators for a site j (−∞ ≤ j ≤ ∞), and α =↑, ↓ is the spin index.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
34
+ page_content=' The local spin vector ˆs(j) = (ˆsx(j), ˆsy(j), ˆsz(j)) can be represented as ˆs(j) = 1 2 � ˆψ† j↑ ˆψ† j↓ � σ � ˆψj↑ ˆψj↓ � , (1) arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
35
+ page_content='02164v1 [cond-mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
36
+ page_content='quant-gas] 5 Jan 2023 2 where σ = (σx, σy, σz) is the vector composed of the three Pauli matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
37
+ page_content=' The spin-ladder operators ˆs±(j) = ˆsx(j) ± iˆsy(j) read ˆs+(j) = ˆψ† j↑ ˆψj↓ and ˆs−(j) = ˆψ† j↓ ˆψj↑, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
38
+ page_content=' We require the total number of fermions in the system, ˆN = � j ˆnj, to be a conserved quantity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
39
+ page_content=' There could only be either zero or one fermion on each site, ˆnj ≡ ˆnj↑ + ˆnj↓ = {0, 1}, (2) due to the NDO constraint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
40
+ page_content=' The projection operator ˆ X = ∞ � j=−∞ (1 − ˆnj↑ˆnj↓) (3) applied to the basis state |Ψ⟩ = ˆψ† j1α1 · · · ˆψ† jNαN |0⟩ elimi- nates those with any number of double occupancies.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
41
+ page_content=' The remaining ones can be uniquely identified as a product of the states |f⟩ and |ℓ⟩: |Ψ⟩ = |f⟩ ⊗ |ℓ⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
42
+ page_content=' (4) Here, |f⟩ = ˆc† j1 · · · ˆc† jN |0⟩ is defined by spinless fermions on an infitite lattice placed at the positions of the origi- nal spin-1/2 fermions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
43
+ page_content=' The vacuum |0⟩ for the states |Ψ⟩ and |f⟩ contains no fermions, ˆψj|0⟩ = 0, and ˆcj|0⟩ = 0, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
44
+ page_content=' The state |ℓ⟩ = |α1 · · · αN⟩ of a spin- 1/2 chain of length N can be represented as |ℓ⟩ = ˆℓ−(m1) · · · ˆℓ−(mM)| ⇑⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
45
+ page_content=' The set {m1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
46
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
47
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
48
+ page_content=' , mM} indicates the positions of the down-spins among {α1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
49
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
50
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
51
+ page_content=' , αN}, M being the total number of the down-spins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
52
+ page_content=' For exam- ple, | ↑↓↑↓↓⟩ gives {m1, m2, m3} = {2, 4, 5}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
53
+ page_content=' The vac- uum | ⇑⟩ is the spin-up polarized state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
54
+ page_content=' The operator ˆℓ(m) = σ(m)/2 acts on the spin state of the mth parti- cle, and ˆℓ± = ˆℓx ± iˆℓy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
55
+ page_content=' We now express spin-1/2 fermion fields via operators acting into the spaces formed by |f⟩ and |ℓ⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
56
+ page_content=' The number of particles to the left from the jth site is ˆ Nj = j � a=−∞ ˆna.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
57
+ page_content=' (5) Here, ˆnj = ˆc† jˆcj acting onto |f⟩ corresponds to ˆnj defined by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
58
+ page_content=' (2), acting onto |Ψ⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
59
+ page_content=' Note that the spectrum of the operator ˆ Nj is integer-valued.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
60
+ page_content=' Any operator ˆO depending on ˆ Nj can be understood by the following formula: ˆO( ˆ Nj) = ∞ � m=−∞ ˆO(m)δm, ˆ Nj.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
61
+ page_content=' (6) The operator ˆO(m) characterizes the state of mth parti- cle, and the Kronecker delta δm, ˆ Nj = � 2π 0 dλ 2π eiλ( ˆ Nj−m) (7) 1 N + 1 m′ Pm′,N+1 N + 1 m PN+1,m N + 1 m′ − 1 PN+1,mPm′,N+1 FIG.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
62
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
63
+ page_content=' Shown is the action of the operator P onto the states of the spin chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
64
+ page_content=' The arrows indicate the directions of the transfer of the local states.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
65
+ page_content=' The outcome of the action of the composition PN+1,mPm′,N+1 is illustrated for m′ > m.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
66
+ page_content=' is equal to one for the lattice site at which the mth par- ticle is located, and is equal to zero otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
67
+ page_content=' The com- position law ˆO1( ˆ Nj) ˆO2( ˆ Nj) = ∞ � m=−∞ ˆO1(m) ˆO2(m)δm, ˆ Nj (8) stems directly from Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
68
+ page_content=' (6) and (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
69
+ page_content=' We propose the following expressions for the fermion creation operators ˆψ† j↑ =P ˆ Nj, ˆ Nˆc† j, (9) ˆψ† j↓ =P ˆ Nj, ˆ N ˆℓ−( ˆN)ˆc† j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
70
+ page_content=' (10) and the corresponding annihilation operators ˆψj↑ =ˆcj ˆη( ˆN)P† ˆ Nj, ˆ N, (11) ˆψj↓ =ˆcj ˆℓ+( ˆN)P† ˆ Nj, ˆ N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
71
+ page_content=' (12) The operator ˆη = ˆℓ+ˆℓ− = | ↑⟩⟨↑ | in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
72
+ page_content=' (11) acts on the site of the spin chain defined by the value of the number operator ˆN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
73
+ page_content=' A way to interpret the dependence on ˆ Nj is explained by Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
74
+ page_content=' (6) and (7).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
75
+ page_content=' The cyclic shift operator Pm,m′ on a lattice encompassing the sites from m to m′ is Pm,m′ = Πm,m+1Πm+1,m+2 · · · Πm′−1,m′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
76
+ page_content=' (13) The permutation operator Πm,m′ interchanges the states on the sites m and m′, in case of spin-1/2 particles it reads Πm,m′ = 1 2[σ(m) ⊗ σ(m′) + I ⊗ I].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
77
+ page_content=' (14) Here, I is the identity matrix.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
78
+ page_content=' Evidently, Π is its own inverse, (Πm,m′)2 = I, Hermitian, Π† m,m′ = Πm,m′, and unitary, Π† m,m′Πm,m′ = I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
79
+ page_content=' This implies Pm′,m = P−1 m,m′ = P† m,m′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
80
+ page_content=' The action of the operator (13) onto the states of the spin chain is illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
81
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
82
+ page_content=' Note that 3 the local spin operator (1) consists of the pairs ˆψ† jα ˆψjα′ where ˆψ† and ˆψ are taken at the same site j.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
83
+ page_content=' As a con- sequence, the permutation operators cancels out when using Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
84
+ page_content=' (9)–(12), leading to the representation ˆs(j) = ˆnjˆℓ( ˆ Nj) (15) already known in the literature [12].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
85
+ page_content=' We demonstrate how efficacious are Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
86
+ page_content=' (9)–(12) in revealing the contri- butions from the spin and charge degrees of freedom into the dynamical correlation functions in the remaining part of the Letter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
87
+ page_content=' Hamiltonian.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
88
+ page_content='— We apply the transformations (9)–(12) to the Hamiltonian ˆH = ˆHf + ˆHℓ, (16) where ˆHf = ˆ X � ���−th ∞ � j=−∞ α=↑,↓ ( ˆψ† jα ˆψj+1α + H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
89
+ page_content='c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
90
+ page_content=') − h ˆN +1 2 ∞ � jj′=−∞ : ˆnjUj−j′ ˆnj′ : � ��� ˆ X (17) is SU(2)-invariant, and the term ˆHℓ = 2B ˆ X ˆSz ˆ X, ˆSz = ∞ � j=−∞ ˆsz(j) (18) breaks this symmetry due to the magnetic field B applied along the z-projection of the total spin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
91
+ page_content=' The symbols H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
92
+ page_content='c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
93
+ page_content=' and : · · · : in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
94
+ page_content=' (17) stand for the Hermitian conjugate and the normal ordering, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
95
+ page_content=' The projection op- erator ˆ X, given by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
96
+ page_content=' (3), imposes the NDO constraint.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
97
+ page_content=' Note that the on-site interaction term : ˆn2 j : U0/2 im- plies an infinite energy cost for having two particles on any site in the U0 → ∞ limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
98
+ page_content=' This way, the use of ˆ X is equivalent to letting U0 → ∞ in the Hamiltonian (16) with no ˆ X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
99
+ page_content=' The actual value of U0 is irrelevant when ˆ X is used, since ˆ X : ˆn2 j : ˆ X = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
100
+ page_content=' Using the transformation (9)–(12) we get Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
101
+ page_content=' (17) writ- ten in terms of the spinless fermions exclusively, ˆHf = −th ∞ � j=−∞ (ˆc† jˆcj+1 + H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
102
+ page_content='c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
103
+ page_content=') − h ˆN + 1 2 ∞ � j,j′=−∞ : ˆnjUj−j′ ˆnj′ : (19) and Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
104
+ page_content=' (18) containing the spinless fermions as well as the spin operators, ˆHℓ = 2B ∞ � j=−∞ ˆnj ˆℓz( ˆ Nj).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
105
+ page_content=' (20) Amazingly, the action of ˆHf ( ˆHℓ) onto the state (4) is non-trivial for the |f⟩ (|ℓ⟩) part only: ˆHf|Ψ⟩ = Ef|f⟩ ⊗ |ℓ⟩, ˆHℓ|Ψ⟩ = |f⟩ ⊗ Eℓ|ℓ⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
106
+ page_content=' (21) The energy Eℓ = 2BLz, where Lz is the eigenvalue of the operator ˆLz = �N m=1 ˆℓz(m), measuring the z-projection of the total spin for the state |ℓ⟩ of the spin chain.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
107
+ page_content=' Hence, the spin degeneracy of the Hamiltonian (16) takes place for any Lz ̸= ±N/2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
108
+ page_content=' Furthermore, ˆHℓ = 0 for B = 0, implying 2N-fold degeneracy as long as the system is not put into a finite volume with some boundary conditions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
109
+ page_content=' Field-field correlation functions in thermal state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
110
+ page_content='—We consider the one-body correlation functions, describing the particle propagation, Gα p (j − j′, t) = 1 Z ⟨ ˆψjα(t) ˆψ† j′α(0)⟩T , α =↑, ↓, (22) and the hole propagation, Gα h(j − j′, t) = 1 Z ⟨ ˆψ† jα(t) ˆψj′α(0)⟩T , α =↑, ↓, (23) evaluated at temperature T, chemical potential h, and magnetic field B, on a thermals state ⟨· · · ⟩T = ∞ � N=0 � f,ℓ ⟨Ψ|e−β ˆ H · · · |Ψ⟩, (24) where |Ψ⟩ is given by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
111
+ page_content=' (4).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
112
+ page_content=' The sum over f runs through all possible values of the free-particle momenta characterizing the N-fermion state |f⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
113
+ page_content=' The sum over ℓ runs through all possible configurations of the z- projection of the spins, Z is the grand partition function, and β = T −1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
114
+ page_content=' The symmetry G↑ p(h)(j − j′, t;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
115
+ page_content=' h, B) = G↓ p(h)(j − j′, t;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
116
+ page_content=' h, −B) (25) makes it sufficient to evaluate G↑ only.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
117
+ page_content=' Using Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
118
+ page_content=' (6)–(12) we factorize the matrix element from Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
119
+ page_content=' (22) into two parts, ⟨Ψ| ˆψj↑(t) ˆψ† j′↑(0)|Ψ⟩ = ∞ � m,m′=−∞ � 2π 0 dλ 2π dλ′ 2π e−iλm+iλ′m′e−β(Ef +Eℓ)Cp(λ, λ′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
120
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
121
+ page_content=' t)S(m, m′).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
122
+ page_content=' (26) The first one encompasses the contributions from the state |f⟩ of spinless fermions, Cp(λ, λ′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
123
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
124
+ page_content=' t) = ⟨f|ˆcj(t)eiλ ˆ Nj(t)e−iλ′ ˆ Nj′(0)ˆc† j′|f⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
125
+ page_content=' (27) Its non-trivial time evolution is governed by the Hamil- tonian (19).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
126
+ page_content=' The second one involves the state |ℓ⟩ of the spin chain, and the existence of the free fermions is only noticed through their total number N, which defines the 4 length of the chain, S(m, m′) = ⟨ℓ|PN+1,mPm′,N+1|ℓ⟩ = ⟨ℓ| max{m,m′}−1 � j=min{m,m′} [1 2I + ˆℓz(j)]|ℓ⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
127
+ page_content=' (28) This part is time-independent, since the cyclic shift op- erator, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
128
+ page_content=' (13) does not change the value of the z- projection of the total spin, Lz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
129
+ page_content=' The action of the oper- ator PN+1,mPm′,N+1, illustrated in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
130
+ page_content=' 1, leads to van- ishing S if any spin between the sites m and m′ is pointed down.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
131
+ page_content=' This way we get the right hand side of Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
132
+ page_content=' (28).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
133
+ page_content=' We proceed further by substituting Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
134
+ page_content=' (28) into Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
135
+ page_content=' (22) and taking the sum over the spin configurations, � ℓ e−βEℓS(m, m′) = [2 cosh(βB)]N ν|m−m′| , (29) where ν = 1 + e2βB.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
136
+ page_content=' We get G↑ p(j − j′, t) = 1 Z � {N} e−β ˜ Ef � 2π 0 dλ 2π dλ′ 2π × Cp(λ, λ′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
137
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
138
+ page_content=' t) ∞ � m,m′=−∞ e−iλm+iλ′m′ ν|m−m′| , (30) where ˜Ef = Ef − 1 β N ln[2 cosh(βB)], (31) and the sum over {N} encompasses the ones over N and f.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
139
+ page_content=' The partition function Z can be taken over the fermion configurations f with the energies given by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
140
+ page_content=' (31).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
141
+ page_content=' We have ∞ � m,m′=−∞ e−iλm+iλ′m′ ν|m−m′| = 2πδ(λ − λ′)F(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
142
+ page_content=' T), (32) where F(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
143
+ page_content=' ν) = 1 + ∞ � m=1 ν−m(eimλ + e−imλ).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
144
+ page_content=' (33) Therefore, G↑ p(j − j′, t) = � 2π 0 dλ 2π F(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
145
+ page_content=' ν)Cp(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
146
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
147
+ page_content=' t;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
148
+ page_content=' T), (34) where Cp(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
149
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
150
+ page_content=' t;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
151
+ page_content=' T) = 1 Z � {N} e−β ˜ Ef Cp(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
152
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
153
+ page_content=' t), (35) and we write Cp(λ) in place of Cp(λ, λ) in order to lighten notations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
154
+ page_content=' The summation on the right hand side of Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
155
+ page_content=' (35) represents the definition of the thermal state for the spinless fermions with the spectum given by ˜Ef.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
156
+ page_content=' The hole correlation function (23) is treated the same way as the particle one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
157
+ page_content=' The result is given by Eqs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
158
+ page_content=' (34) and (35) with Cp replaced by Ch(λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
159
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
160
+ page_content=' t) = ⟨f|eiλ ˆ Nj(t)ˆc† j(t)ˆcj′e−iλ ˆ Nj′(0)|f⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
161
+ page_content=' (36) Emergence of impenetrable anyons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
162
+ page_content='— The operator ˆaj = ˆcje−iλ ˆ Nj satisfies the commutation relations ˆajˆa† j′ + e−iλϵ(j−j′)ˆa† j′ˆaj = δjj′, (37) ˆajˆaj′ + eiλϵ(j−j′)ˆaj′ˆaj = 0, (38) where ϵ(x) = |x|/x, and ϵ(0) = 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
163
+ page_content=' This is the fermion- anyon mapping discussed in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
164
+ page_content=' [22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
165
+ page_content=' The function Cp(λ) turns into Cp(−λ;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
166
+ page_content=' j − j′;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
167
+ page_content=' t) = ⟨f|ˆaj(t)ˆa† j′(0)|f⟩, (39) which is a correlation function of the impenetrable anyons on a lattice, the variable λ being the statistical angle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
168
+ page_content=' The emergence of the anyon correlation function and its subsequent integration over λ with the function F in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
169
+ page_content=' (34) could be understood as follows.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
170
+ page_content=' Let us consider a system with M spin-up and N − M spin-down par- ticles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
171
+ page_content=' Pick one spin-up particle among them, and pull it through the whole system, subsequently interchanging its coordinate with those of the other particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
172
+ page_content=' The in- terchanges with the spin-down particles are non-trivial: the spin part of the wave function could give any phase factor since its symmetry is not restricted by the fermion symmetry of the total wave function.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
173
+ page_content=' We stress that for- malizing our a posteriori explanation of the structure of Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
174
+ page_content=' (34) by examining exact finite-N wave functions in the coordinate representations (given, for example, in the Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
175
+ page_content=' [21, 23]) goes beyond the scope of the Letter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
176
+ page_content=' Place among other approaches.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
177
+ page_content='— The Hamilto- nian (16) with Uj−j′ = 0 represents the exactly solvable t − 0 model, also known as the Hubbard model in the limit of infinitely strong repulsion [24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
178
+ page_content=' There, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
179
+ page_content=' (34) has been obtained in the form of a Fredholm determinant with the use of the exact wave functions in the coordi- nate representation [21, 23, 25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
180
+ page_content=' The transformation (9)– (12) leading to Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
181
+ page_content=' (34), combined with the ones given in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
182
+ page_content=' [26] for the function (27) bring us the same Fred- holm determinant representation through much shorter calculations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
183
+ page_content=' Note that the model (16) is also exactly solvable when Uj−j′ = Uδj,j′±1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
184
+ page_content=' In this case, the Hamil- tonian (19) can be mapped onto the one of the XXZ Heisenberg magnet, and the function (27) can, in princi- ple, be calculated by the Bethe Ansatz method.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
185
+ page_content=' Special attention has been paid in the literature to the model in the T → 0 limit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
186
+ page_content=' Its ground state is non- degenerate and spin-up (-down) polarized for B negative 5 (positive).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
187
+ page_content=' In the former case, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
188
+ page_content=' (34) describes a spin- up fermion propagating through a gas of the other spin- up fermions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
189
+ page_content=' We have F = 2πδ(λ) in Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
190
+ page_content=' (33), hence G↑ p = ⟨ˆcj(t)ˆc† j′⟩.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
191
+ page_content=' In the latter case, Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
192
+ page_content=' (34) describes a spin-up fermion (an impurity particle) propagating through a gas of spin-down fermions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
193
+ page_content=' We have F = 1, and the long time and distance asymptotic behaviour of G↑ p reveals the logarithmic diffusion phenomenon [8, 9].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
194
+ page_content=' The non-degeneracy of the ground state at B ̸= 0 stands in a sharp contrast to the high degeneracy at B = 0, where F is given by Eq.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
195
+ page_content=' (33) with ν = 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
196
+ page_content=' This regime is known as the spin-incoherent one [5–7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
197
+ page_content=' A challenge put forward in the aforementioned works was to find a low- energy effective field theory, since the low-enegry spec- trum of spin excitations cannot be linearized for B > 0 and B = 0, and the LL theory is inapplicable.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
198
+ page_content=' The repre- sentation (34) resolves this problem in the following way: the LL theory in applicable to the function Cp;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
199
+ page_content=' the spin excitations are accounted for by the integral over λ with the weight function F without any approximation, which is equivalent to counting the number of worldlines within the first-quantized path integral approach implemented in Refs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
200
+ page_content=' [6, 8].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
201
+ page_content=' ACKNOWLEDGEMENTS We thank V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
202
+ page_content=' Cheianov and K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
203
+ page_content=' Seetharam for fruitful dis- cussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
204
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
205
+ page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
206
+ page_content=' acknowledges support from the Polish Na- tional Agency for Academic Exchange (NAWA) through the Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
207
+ page_content=' PPN/ULM/2020/1/00247.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
208
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
209
+ page_content='G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
210
+ page_content=' is grate- ful to Galileo Galilei Institute for hospitality and support during the scientific program on “Randomness, Integra- bility, and Universality”, where part of this work was done.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
211
+ page_content=' The work of E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
212
+ page_content=' Q.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
213
+ page_content=' is supported by Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
214
+ page_content=' ANR- 16-CE91-0009-01.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
215
+ page_content=' K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
216
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
217
+ page_content=' thanks S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
218
+ page_content=' Bocini, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
219
+ page_content=' Mari´c, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
220
+ page_content=' Zadnik and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
221
+ page_content=' Fagotti for useful discussions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
222
+ page_content=' The work of K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
223
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
224
+ page_content=' was partially supported by the European Research Council under the Starting Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
225
+ page_content=' 805252 LoCoMacro.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
226
+ page_content=' The work of M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
227
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
228
+ page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
229
+ page_content=' is supported by Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
230
+ page_content=' ANR-16-CE91-0009-01 and CNRS grant PICS06738.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
231
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
232
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
233
+ page_content=' Z.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
234
+ page_content=' acknowledges Russian Quantum Center and Prof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
235
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
236
+ page_content=' Fedorov for their hospitality during the work.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
237
+ page_content=' [1] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
238
+ page_content=' Pitaevskii and S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
239
+ page_content=' Stringari, Bose-Einstein Condensa- tion (Oxford University Press, Oxford, 2003).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
240
+ page_content=' [2] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
241
+ page_content=' Girardeau, Relationship between systems of impene- trable bosons and fermions in one dimension, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
242
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
243
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
244
+ page_content=' 1, 516 (1960).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
245
+ page_content=' [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
246
+ page_content=' O.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
247
+ page_content=' Gogolin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
248
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
249
+ page_content=' Nersesyan, and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
250
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
251
+ page_content=' Tsvelik, Bosonization and Strongly Correlated Systems (Cam- bridge University Press, Cambridge, 1999).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
252
+ page_content=' [4] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
253
+ page_content=' Giamarchi, Quantum Physics in One Dimension (Ox- ford University Press, Oxford, 2004).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
254
+ page_content=' [5] V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
255
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
256
+ page_content=' Cheianov and M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
257
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
258
+ page_content=' Zvonarev, Nonunitary Spin-Charge Separation in a One-Dimensional Fermion Gas, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
259
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
260
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
261
+ page_content=' 92, 176401 (2004), arXiv:cond- mat/0308470.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
262
+ page_content=' [6] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
263
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
264
+ page_content=' Fiete and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
265
+ page_content=' Balents, Green’s Function for Mag- netically Incoherent Interacting Electrons in One Dimen- sion, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
266
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
267
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
268
+ page_content=' 93, 226401 (2004), arXiv:cond- mat/0403744.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
269
+ page_content=' [7] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
270
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
271
+ page_content=' Fiete, Colloquium: The spin-incoherent Luttinger liquid, Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
272
+ page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
273
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
274
+ page_content=' 79, 801 (2007), arXiv:cond- mat/0611597.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
275
+ page_content=' [8] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
276
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
277
+ page_content=' Zvonarev, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
278
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
279
+ page_content=' Cheianov, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
280
+ page_content=' Giamarchi, Spin dynamics in a one-dimensional ferromagnetic Bose gas, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
281
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
282
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
283
+ page_content=' 99, 240404 (2007), arXiv:0708.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
284
+ page_content='3638.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
285
+ page_content=' [9] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
286
+ page_content=' Akhanjee and Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
287
+ page_content=' Tserkovnyak, Spin-charge separation in a strongly correlated spin-polarized chain, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
288
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
289
+ page_content=' B 76, 140408(R) (2007), arXiv:0708.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
290
+ page_content='4012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
291
+ page_content=' [10] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
292
+ page_content=' Kamenev and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
293
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
294
+ page_content=' Glazman, Dynamics of a one-dimensional spinor Bose liquid: A phenomeno- logical approach, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
295
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
296
+ page_content=' A 80, 011603 (2009), arXiv:0808.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
297
+ page_content='0479.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
298
+ page_content=' [11] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
299
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
300
+ page_content=' Zvonarev, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
301
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
302
+ page_content=' Cheianov, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
303
+ page_content=' Giamarchi, Edge exponent in the dynamic spin structure factor of the Yang-Gaudin model, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
304
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
305
+ page_content=' B 80, 201102 (2009), 0905.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
306
+ page_content='0598.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
307
+ page_content=' [12] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
308
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
309
+ page_content=' Zvonarev, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
310
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
311
+ page_content=' Cheianov, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
312
+ page_content=' Giamarchi, Dynamical Properties of the One-Dimensional Spin- 1/2 Bose-Hubbard Model near a Mott-Insulator to Ferromagnetic-Liquid Transition, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
313
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
314
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
315
+ page_content=' 103, 110401 (2009), arXiv:0811.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
316
+ page_content='2676.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
317
+ page_content=' [13] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
318
+ page_content=' Imambekov, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
319
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
320
+ page_content=' Schmidt, and L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
321
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
322
+ page_content=' Glazman, One- dimensional quantum liquids: Beyond the Luttinger liquid paradigm, Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
323
+ page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
324
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
325
+ page_content=' 84, 1253 (2012), arXiv:1110.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
326
+ page_content='1374.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
327
+ page_content=' [14] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
328
+ page_content=' Senaratne, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
329
+ page_content=' Cavazos-Cavazos, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
330
+ page_content=' Wang, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
331
+ page_content=' He, Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
332
+ page_content='- T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
333
+ page_content=' Chang, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
334
+ page_content=' Kafle, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
335
+ page_content=' Pu, X.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
336
+ page_content='-W.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
337
+ page_content=' Guan, and R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
338
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
339
+ page_content=' Hulet, Spin-charge separation in a one-dimensional Fermi gas with tunable interactions, Science 376, 1305 (2022), arXiv:2111.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
340
+ page_content='11545.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
341
+ page_content=' [15] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
342
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
343
+ page_content=' Hilker, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
344
+ page_content=' Salomon, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
345
+ page_content=' Grusdt, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
346
+ page_content=' Omran, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
347
+ page_content=' Boll, E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
348
+ page_content=' Demler, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
349
+ page_content=' Bloch, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
350
+ page_content=' Gross, Revealing hid- den antiferromagnetic correlations in doped Hubbard chains via string correlators, Science 357, 484 (2017), arXiv:1702.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
351
+ page_content='00642.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
352
+ page_content=' [16] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
353
+ page_content=' Salomon, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
354
+ page_content=' Koepsell, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
355
+ page_content=' Vijayan, T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
356
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
357
+ page_content=' Hilker, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
358
+ page_content=' Ne- spolo, L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
359
+ page_content=' Pollet, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
360
+ page_content=' Bloch, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
361
+ page_content=' Gross, Direct observa- tion of incommensurate magnetism in Hubbard chains, Nature 565, 56 (2019), arXiv:1803.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
362
+ page_content='08892.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
363
+ page_content=' [17] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
364
+ page_content=' Vijayan, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
365
+ page_content=' Sompet, G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
366
+ page_content=' Salomon, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
367
+ page_content=' Koepsell, S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
368
+ page_content=' Hirthe, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
369
+ page_content=' Bohrdt, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
370
+ page_content=' Grusdt, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
371
+ page_content=' Bloch, and C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
372
+ page_content=' Gross, Time-resolved observation of spin-charge deconfinement in fermionic Hubbard chains, Science 367, 186 (2020), arXiv:1905.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
373
+ page_content='13638.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
374
+ page_content=' [18] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
375
+ page_content=' Ogata and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
376
+ page_content=' Shiba, Bethe-ansatz wave function, mo- mentum distribution, and spin correlation in the one- dimensional strongly correlated Hubbard model, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
377
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
378
+ page_content=' B 41, 2326 (1990).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
379
+ page_content=' [19] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
380
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
381
+ page_content=' Zabrodin and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
382
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
383
+ page_content=' Ovchinnikov, Spin-density cor- relator of a one-dimensional Fermi gas with strong inter- action, Soviet Physics - JETP (English Translation) 69, 750 (1989).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
384
+ page_content=' [20] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
385
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
386
+ page_content=' Zabrodin and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
387
+ page_content=' A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
388
+ page_content=' Ovchinnikov, Single-particle density matrix of a one-dimensional system of spin 1/2 Fermi particles, Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
389
+ page_content=' Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
390
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
391
+ page_content=' 85, 1321 (1990).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
392
+ page_content=' 6 [21] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
393
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
394
+ page_content=' Izergin, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
395
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
396
+ page_content=' Pronko, and N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
397
+ page_content=' I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
398
+ page_content=' Abarenkova, Temperature correlators in the one-dimensional Hubbard model in the strong coupling limit, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
399
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
400
+ page_content=' A 245, 537 (1998), hep-th/9801167.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
401
+ page_content=' [22] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
402
+ page_content=' D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
403
+ page_content=' Girardeau, Anyon-fermion mapping and applica- tions to ultracold gases in tight waveguides, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
404
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
405
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
406
+ page_content=' 97, 100402 (2006), arXiv:cond-mat/0604357.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
407
+ page_content=' [23] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
408
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
409
+ page_content=' Izergin and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
410
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
411
+ page_content=' Pronko, Temperature correlators in the two-component one-dimensional gas, Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
412
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
413
+ page_content=' B 520, 594 (1998), arXiv:solv-int/9801004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
414
+ page_content=' [24] F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
415
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
416
+ page_content=' L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
417
+ page_content=' Essler, H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
418
+ page_content=' Frahm, F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
419
+ page_content=' G¨ohmann, A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
420
+ page_content=' Kl¨umper, and V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
421
+ page_content=' E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
422
+ page_content=' Korepin, The One-Dimensional Hubbard Model (Cambridge University Press, Cambridge, 2005).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
423
+ page_content=' [25] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
424
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
425
+ page_content=' Izergin and A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
426
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
427
+ page_content=' Pronko, Correlators in the one- dimensional two-component Bose and Fermi gases, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
428
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
429
+ page_content=' A 236, 445 (1997).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
430
+ page_content=' [26] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
431
+ page_content=' B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
432
+ page_content=' Zvonarev, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
433
+ page_content=' V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
434
+ page_content=' Cheianov, and T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
435
+ page_content=' Giamarchi, The time-dependent correlation function of the Jordan- Wigner operator as a Fredholm determinant, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
436
+ page_content=' Stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
437
+ page_content=' Mech.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
438
+ page_content=' 2009, P07035 (2009), arXiv:0812.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
439
+ page_content='4059.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/8dA0T4oBgHgl3EQfOv8t/content/2301.02164v1.pdf'}
B9E3T4oBgHgl3EQfUAr7/content/tmp_files/2301.04448v1.pdf.txt ADDED
@@ -0,0 +1,1048 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04448v1 [gr-qc] 11 Jan 2023
2
+ Emergent diffeomorphism invariance in toy models
3
+ Hrvoje Nikoli´c
4
+ Theoretical Physics Division, Rudjer Boˇskovi´c Institute,
5
+ P.O.B. 180, HR-10002 Zagreb, Croatia
6
+ e-mail: [email protected]
7
+ January 12, 2023
8
+ Abstract
9
+ Conceptual difficulties in semiclassical and quantum gravity arise from dif-
10
+ feomorphism invariance of classical general relativity.
11
+ With a motivation to
12
+ shed some light on these difficulties, we study a class of toy models for which
13
+ one-dimensional diffeomorphism invariance, namely time-reparametrization in-
14
+ variance, emerges at the classical level from energy conservation. An attempt
15
+ to quantize the models while taking the invariance seriously leads to toy ver-
16
+ sions of the problem of time in quantum gravity, of the cosmological constant
17
+ problem, and of the black hole firewall problem. Nevertheless, all these prob-
18
+ lems are easily resolved by taking into account that the invariance emerges only
19
+ at the classical level, while the fundamental theory that needs to be quantized
20
+ is not diffeomorphism invariant.
21
+ Keywords: diffeomorphism invariance; time in quantum gravity; cosmological con-
22
+ stant; black hole firewall
23
+ 1
24
+ Introduction
25
+ Classical general relativity [1, 2, 3] is one of the most elegant theories in physics.
26
+ Its most distinguished feature is diffeomorphism invariance, or invariance under ac-
27
+ tive general transformations of spacetime coordinates, which implies that spacetime
28
+ metric is a dynamical quantity.
29
+ But this elegance is a blessing and a curse.
30
+ It’s
31
+ a blessing in classical physics, but a curse in quantum physics because we still do
32
+ not fully understand how to quantize gravity [4, 5, 6], that is, how to implement
33
+ diffeomorphism invariance at the quantum level. The problems appear not only in
34
+ fully quantum gravity, but also in the semiclassical approximation [7, 8] where only
35
+ matter is quantized while gravity is treated classically. The problems that appear
36
+ are not only technical, but also conceptual.
37
+ The three conceptual problems that
38
+ 1
39
+
40
+ stand out are the problem of time in quantum gravity [9, 10, 11, 12], the cosmolog-
41
+ ical constant problem [13, 14, 15, 16, 17], and the black hole information paradox
42
+ [18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32].
43
+ One possibility that potentially could help to resolve these conceptual problems is
44
+ the idea that general relativity and its diffeomorphism invariance is emergent, rather
45
+ than fundamental, while the underlying more fundamental theory rests on entirely
46
+ different principles. This idea can be realized in condensed-matter inspired theories
47
+ such as induced gravity [33], as well as in string theory [6]. However, there is no
48
+ any direct experimental evidence for such a more fundamental theory.
49
+ Moreover,
50
+ promising theoretical candidates such as string theory are still poorly understood in
51
+ their most fundamental terms. Consequently, it is very difficult to study the idea of
52
+ emergent diffeomorphism invariance in realistic models. In this paper, therefore, we
53
+ study this idea in toy models, similar to the toy models in [11, 9, 34] studied before
54
+ in the context of the problem of time in quantum gravity. In these models, the 4-
55
+ dimensional spacetime diffeomorphism invariance of general relativity is replaced with
56
+ a 1-dimensional diffeomorphism invariance realized as time-reparametrization invari-
57
+ ance. Even though such models cannot solve the problems of realistic 4-dimensional
58
+ systems with gravity, it is hoped that such simple models can at least serve as a
59
+ conceptual inspiration for dealing with more difficult realistic theories.
60
+ The paper is organized as follows.
61
+ In Sec. 2 we first introduce a class of toy
62
+ models without diffeomorphism invariance and then explain how 1-dimensional dif-
63
+ feomorphism invariance emerges from conservation of energy, namely, as a way to
64
+ implement the constraint that the classical system has definite energy. In Sec. 3 we
65
+ explain how the 1-dimensional diffeomorphism invariance leads to a toy version of
66
+ the problem of time in quantum gravity, and how the problem resolves when one
67
+ recalls that the diffeomorphism invariance is not fundamental. Similarly, in Sec. 4
68
+ we explain how the 1-dimensional diffeomorphism invariance leads to a toy version of
69
+ the cosmological constant problem, and how the problem resolves when one recalls
70
+ that the diffeomorphism invariance is not fundamental. Likewise, in Sec. 5 we find
71
+ a solution of the constraint that in some aspects resembles the behavior in a black
72
+ hole exterior, explain how the diffeomorphism invariance can be used to extend the
73
+ solution to a region resembling the behavior in a black hole interior, and point out
74
+ that the interior is actually unphysical because the diffeomorphism invariance is not
75
+ fundamental. The non-existence of the interior can be understood as a toy version
76
+ of the black hole firewall [35, 36], which plays a key role in some approaches to solv-
77
+ ing the black hole information paradox. In Sec. 6 we briefly speculate how these toy
78
+ models could perhaps be generalized to real 4-dimensional diffeomorphism invariance.
79
+ Finally, in Sec. 7 we present a qualitative discussion of our results.
80
+ 2
81
+
82
+ 2
83
+ The model and emergent diffeomorphism invari-
84
+ ance
85
+ 2.1
86
+ The model
87
+ We study a system with N dynamical degrees of freedom described by the collective
88
+ configuration variable q(t) = {q1(t), . . . , qN(t)}, the dynamics of which is described
89
+ by the action
90
+ A =
91
+
92
+ dt L(q, ˙q),
93
+ (1)
94
+ where the dot denotes the derivative with respect to time t and
95
+ L(q, ˙q) =
96
+ N
97
+
98
+ a=1
99
+ ma ˙q2
100
+ a
101
+ 2
102
+ − V (q).
103
+ (2)
104
+ The canonical momenta are well defined
105
+ pa = ∂L
106
+ ∂ ˙qa
107
+ = ma ˙qa,
108
+ (3)
109
+ so the Hamiltonian is
110
+ H(q, p) =
111
+ N
112
+
113
+ a=1
114
+ pa ˙qa − L =
115
+ N
116
+
117
+ a=1
118
+ p2
119
+ a
120
+ 2ma
121
+ + V (q)
122
+ (4)
123
+ and can be interpreted as the energy of the system.
124
+ The system can be treated
125
+ either classically of quantum mechanically, in a straightforward manner. In particu-
126
+ lar, quantization can be performed via canonical quantization and dynamics can be
127
+ described by the Schr¨odinger equation
128
+ H|ψ(t)⟩ = i¯h∂t|ψ(t)⟩
129
+ (5)
130
+ as usual, where H is the operator. Since the action does not have any a priori gauge
131
+ or diffeomorphism invariance, the quantization is straightforward.
132
+ 2.2
133
+ Emergent diffeomorphism invariance
134
+ Since the Hamiltonian H does not have an explicit time dependence, it is conserved.
135
+ In classical physics, this means that H has some definite constant value E of energy,
136
+ so we can write it as H(q, p) = E, or
137
+ H(q, p) = 0,
138
+ (6)
139
+ where
140
+ H(q, p) ≡ H(q, p) − E.
141
+ (7)
142
+ 3
143
+
144
+ In the configuration space, the fact that the Hamiltonian has the value E can be
145
+ written as
146
+ N
147
+
148
+ a=1
149
+ ma ˙q2
150
+ a
151
+ 2
152
+ + V (q) − E = 0.
153
+ (8)
154
+ If we imagine that (2) describes a whole Universe, then E is the energy of that
155
+ Universe.
156
+ The inhabitants of this Universe observe only one value of E, but the
157
+ theory cannot say which one. For the inhabitants of this Universe, the constant E is
158
+ a fundamental constant the value of which can be determined from experiments.
159
+ Since E appears as a fundamental constant, it seems natural to incorporate the
160
+ value of this constant into an effective action. One possibility is to incorporate the con-
161
+ straint (8) into the action by adding the Lagrange multiplier term λ [�
162
+ a ma ˙q2
163
+ a/2 + V (q) − E].
164
+ However, there is a much more interesting way to incorporate the constraint (8) into
165
+ the action. We do that not by introducing a Lagrange multiplier λ, but by introducing
166
+ a new configuration variable g(t) > 0 and replacing the action (1) with
167
+ ˜A =
168
+
169
+ dt√g
170
+ � N
171
+
172
+ a=1
173
+ ma ˙q2
174
+ a
175
+ 2g
176
+ − V (q) + E
177
+
178
+ .
179
+ (9)
180
+ Since this action does not depend on time derivatives of g(t), the g(t) is not a dy-
181
+ namical variable and the equation of motion for this variable is a constraint equation.
182
+ More precisely, the equation of motion δ ˜A/δg = 0 gives
183
+
184
+ 1
185
+ 2√g
186
+ � N
187
+
188
+ a=1
189
+ ma ˙q2
190
+ a
191
+ 2g
192
+ + V (q) − E
193
+
194
+ = 0,
195
+ (10)
196
+ which reduces to the constraint (8) if g = 1. But what is the rational for taking g = 1?
197
+ The answer is that the action (9) has the property of diffeomorphism invariance which
198
+ allows us to choose for g(t) any positive function we want, so g(t) = 1 is nothing but
199
+ a convenient choice of “gauge”. Since this diffeomorphism invariance is crucial, let us
200
+ explain it in more detail.
201
+ The g in (9) appears in two terms, which are proportional to
202
+ dt√g,
203
+ ˙q2
204
+ a
205
+ g = dq2
206
+ a
207
+ g dt2.
208
+ (11)
209
+ Thus g appears either in the combination √gdt =
210
+
211
+ g dt2 or g dt2 = (√gdt)2. This
212
+ implies that the action is invariant under arbitrary transformations that keep
213
+ dτ 2 ≡ g(t)dt2
214
+ (12)
215
+ invariant.
216
+ The dτ 2 is very much analogous to the spacetime line element ds2 =
217
+ gµν(x)dxµdxν in general relativity, so we see that g in (12) corresponds to g00 in
218
+ general relativity. Likewise, 1/g corresponds to g00. Just like general relativity is
219
+ invariant under arbitrary 4-dimensional spacetime diffeomorphisms xµ → x′µ = f µ(x)
220
+ 4
221
+
222
+ which keep ds2 = gµν(x)dxµdxν invariant, the action (9) is invariant under arbitrary
223
+ 1-dimensional time diffeomorphisms
224
+ t → t′ = f(t)
225
+ (13)
226
+ which keep (12) invariant. The invariance g dt2 = g′dt′2 implies that g transforms as
227
+ g → g′ =
228
+ � dt
229
+ dt′
230
+ �2
231
+ g.
232
+ (14)
233
+ This 1-dimensional diffeomorphism invariance is also known in literature under the
234
+ name time-reparametrization invariance [5, 12, 10].
235
+ To summarize, we have started from the action (1) without diffeomorphism invari-
236
+ ance and, from the fact that energy has some constant value E in classical mechanics,
237
+ derived the corresponding action (9) with 1-dimensional diffeomorphism invariance.
238
+ In this way, the 1-dimensional diffeomorphism invariance is emergent from classical
239
+ energy conservation.
240
+ 2.3
241
+ The constraint in the canonical form
242
+ Now we want to develop some formal tools that will be used in further sections. The
243
+ action (9) can also be written as
244
+ ˜A =
245
+
246
+ dt ˜L(q, ˙q, g) =
247
+
248
+ dt√g L(q, ˙q, g),
249
+ (15)
250
+ where
251
+ L(q, ˙q, g) =
252
+ N
253
+
254
+ a=1
255
+ ma ˙q2
256
+ a
257
+ 2g
258
+ − V (q) + E,
259
+ ˜L(q, ˙q, g) = √gL(q, ˙q, g).
260
+ (16)
261
+ The corresponding canonical momenta are
262
+ ˜pa = ∂ ˜L
263
+ ∂ ˙qa
264
+ = ma ˙qa
265
+ √g ,
266
+ pg = ∂ ˜L
267
+ ∂ ˙g = 0,
268
+ (17)
269
+ so the Hamiltonian is
270
+ ˜H(q, ˜p, g) =
271
+ N
272
+
273
+ a=1
274
+ ˜pa ˙qa − ˜L = √g H(q, ˜p),
275
+ (18)
276
+ where
277
+ H(q, ˜p) =
278
+ N
279
+
280
+ a=1
281
+ ˜p2
282
+ a
283
+ 2ma
284
+ + V (q) − E.
285
+ (19)
286
+ 5
287
+
288
+ The canonical equation of motion for pg is
289
+ ˙pg = −∂ ˜H
290
+ ∂g = − 1
291
+ 2√gH.
292
+ (20)
293
+ However, in (17) we have seen that pg = 0, which implies ˙pg = 0, so (20) implies
294
+
295
+ 1
296
+ 2√gH = 0,
297
+ (21)
298
+ which is identical to the constraint (10). Thus, since g > 0, we see that the constraint
299
+ (10), or (21), can also be written as the Hamiltonian constraint
300
+ H(q, ˜p) = 0,
301
+ (22)
302
+ or equivalently
303
+ ˜H(q, ˜p, g) = 0.
304
+ (23)
305
+ In the gauge g = 1, this reduces to the constraint (6).
306
+ 3
307
+ The problem of time in quantum gravity
308
+ Seduced by the beauty and elegance of the action with 1-dimensional diffeomorphism
309
+ invariance, one may be tempted to quantize it. The problem is, how to implement
310
+ the Hamiltonian constraint (22) in the quantum theory? The most natural approach
311
+ is to implement it as the constraint on physical states
312
+ H(q, ˜p)|ψ⟩ = 0,
313
+ (24)
314
+ where H(q, ˜p) is the quantum operator obtained via standard canonical quantization.
315
+ This constraint implies also
316
+ ˜H(q, ˜p, g)|ψ⟩ = 0,
317
+ (25)
318
+ which is the quantum version of (23). However, the time evolution of the state should
319
+ be described by the corresponding Schr¨odinger equation
320
+ ˜H(q, ˜p, g)|ψ(t)⟩ = i¯h∂t|ψ(t)⟩,
321
+ (26)
322
+ so compatibility with (25) implies
323
+ ∂t|ψ(t)⟩ = 0.
324
+ (27)
325
+ Hence the state does not depend on time. But we know that the real world, or even
326
+ the toy world described by the toy model in Sec. 2.1, depends on time. Where does
327
+ the dependence on time come from, if the quantum state |ψ(t)⟩ does not depend on
328
+ time? This is the toy version of the problem of time in quantum gravity [9, 10, 11, 12].
329
+ Within our model, it is not difficult to understand where the problem comes
330
+ from and how it should be resolved. In general, whenever a quantum system has a
331
+ 6
332
+
333
+ well defined energy E, its wave function has trivial time dependence proportional to
334
+ e−iEt/¯h, which is just a time-dependent phase without any physical consequences. To
335
+ have a genuine time-dependent state in quantum mechanics, the state must not have
336
+ a well defined energy. Instead, the state must be in a superposition of two or more
337
+ different energies.
338
+ So what is wrong with (25)? This quantum constraint originates from the classical
339
+ action (9) in which the energy E is fixed. In fact, the whole diffeomorphism invariance
340
+ of (9) emerged from a desire to implement the classical value E of energy into the
341
+ action.
342
+ There is nothing wrong with it in classical physics, where energy indeed
343
+ has a well defined value. However, requiring that the quantum system should also
344
+ have a definite value of energy is wrong, because the energy of a quantum system
345
+ is, in general, uncertain. In other words, it is wrong to quantize the diffeomorphism
346
+ invariant effective action (9). What needs to be quantized is the original action (1),
347
+ which is not diffeomorphism invariant and leads to the proper Schr¨odinger equation
348
+ (5) without the problem of time. The emergent diffeomorphism invariance is only
349
+ valid at the classical level, where energy is well defined. At the quantum level, where
350
+ energy is uncertain, there is no diffeomorphism invariance.
351
+ To conclude, the problem of time in the toy version of quantum gravity originates
352
+ from taking the diffeomorphism invariance too seriously. When one takes into account
353
+ that this invariance is only emergent at the classical level, while fundamental quantum
354
+ theory does not have this invariance, the problem of time disappears in an obvious
355
+ way.
356
+ 4
357
+ The cosmological constant problem
358
+ Among the N degrees of freedom, let us suppose that Nheavy of them are “heavy”
359
+ and the rest Nlight = N − Nheavy are “light”.
360
+ We call them “heavy” and “light”
361
+ degrees because we assume that one can use a semiclassical approximation in which
362
+ the Nheavy degrees are treated classically, while the rest Nlight of them are quantized.
363
+ For simplicity, we also assume that V (q) can be split as
364
+ V (q) = Vheavy(qheavy) + Vlight(qlight),
365
+ (28)
366
+ where qheavy = {qb | b = 1, . . . , Nheavy} are heavy degrees, and qlight = {qa | a =
367
+ 1, . . . , Nlight} are light degrees.
368
+ Thus the classical constraint (10) can be written
369
+ as
370
+
371
+ Nheavy
372
+
373
+ b=1
374
+ mb ˙q2
375
+ b
376
+ 2g
377
+ − Vheavy(qheavy) =
378
+ Nlight
379
+
380
+ a=1
381
+ ma ˙q2
382
+ a
383
+ 2g
384
+ + Vlight(qlight) − E,
385
+ (29)
386
+ or more concisely
387
+ − Hheavy = Hlight − E,
388
+ (30)
389
+ with a self-explaining notation. This is a classical equation, but as we said, the idea
390
+ is to treat it semi-classically, so that the light degrees are quantized while the heavy
391
+ degrees are left classical. Thus one replaces (30) with a semiclassical equation
392
+ − Hheavy = ⟨ψ|Hlight|ψ⟩ − E,
393
+ (31)
394
+ 7
395
+
396
+ where ⟨ψ|Hlight|ψ⟩ is the mean value of the operator Hlight in the quantum state |ψ⟩.
397
+ Next suppose that Vlight(qlight) is the potential of Nlight harmonic oscillators
398
+ Vlight(qlight) =
399
+ Nlight
400
+
401
+ a=1
402
+ kaq2
403
+ a
404
+ 2 .
405
+ (32)
406
+ Then the operator Hlight can be written in the usual quantum harmonic oscillator
407
+ form
408
+ Hlight =
409
+ Nlight
410
+
411
+ a=1
412
+ ¯hωa
413
+
414
+ A†
415
+ aAa + 1
416
+ 2
417
+
418
+ ,
419
+ (33)
420
+ where ωa =
421
+
422
+ ka/ma, while A†
423
+ a and Aa are the raising and lowering operators, respec-
424
+ tively. In particular, in the quantum ground state defined by Aa|0⟩ = 0 we have
425
+ ⟨0|Hlight|0⟩ =
426
+ Nlight
427
+
428
+ a=1
429
+ ¯hωa
430
+ 2 ,
431
+ (34)
432
+ so the semiclassical equation (31) becomes
433
+ − Hheavy =
434
+ Nlight
435
+
436
+ a=1
437
+ ¯hωa
438
+ 2
439
+ − E.
440
+ (35)
441
+ By contrast, the ground state energy of the classical harmonic oscillator is zero, so
442
+ the classical version of (35) is
443
+ − Hheavy = −E.
444
+ (36)
445
+ But Nlight is supposed to be very large, after all this is the number of light degrees
446
+ in the whole toy Universe. Thus, there is a large discrepancy between the classical
447
+ equation (36) and the semiclassical equation (35). The semiclassical equation (35)
448
+ can also be written as
449
+ − Hheavy = −Eeff,
450
+ (37)
451
+ where
452
+ − Eeff = −E +
453
+ Nlight
454
+
455
+ a=1
456
+ ¯hωa
457
+ 2 .
458
+ (38)
459
+ The effective energy Eeff contains a very large contribution from the quantum zero-
460
+ point energy.
461
+ Finally, suppose that the inhabitants of the toy Universe measure Eeff and find a
462
+ value
463
+ − Eeff ≪
464
+ Nlight
465
+
466
+ a=1
467
+ ¯hωa
468
+ 2 .
469
+ (39)
470
+ Then it is the problem to explain why −Eeff is so small; why is it much smaller than
471
+ its natural value given by the right-hand side of (39)?
472
+ 8
473
+
474
+ Clearly, this problem is analogous to the cosmological constant problem in semi-
475
+ classical gravity [13, 14, 15, 16, 17]. Eq. (30) multiplied with g
476
+ − Hheavyg = Hlightg − Eg
477
+ (40)
478
+ is analogous to the 00-component of the Einstein equation which, in appropriate units,
479
+ can be written as
480
+ Gµν = Tµν + Λgµν,
481
+ (41)
482
+ where Gµν is the Einstein tensor depending only on gravitational degrees, Tµν is the
483
+ energy-momentum tensor of matter, and Λ is the cosmological constant. In this anal-
484
+ ogy, “heavy” degrees are analogous to the gravitational degrees, “light” degrees are
485
+ analogous to the matter degrees, and the constant −E is analogous to the cosmo-
486
+ logical constant. In the semiclassical approximation one performs a quantization of
487
+ matter while keeping gravity classical, so (41) is replaced with
488
+ Gµν = ⟨Ψ|Tµν|Ψ⟩ + Λgµν,
489
+ (42)
490
+ the 00-component of which is analogous to (31) multiplied with g
491
+ − Hheavyg = ⟨ψ|Hlight|ψ⟩g − Eg.
492
+ (43)
493
+ In particular, in the matter ground state |Ψ⟩ = |0⟩ one finds a very large quantum
494
+ contribution analogous to (34), so there is a large discrepancy between the value of
495
+ cosmological constant defined by the quantum ground state and the small value of
496
+ cosmological constant found from cosmological observations [13, 14, 15, 16, 17].
497
+ Within our model, it is not difficult to understand where the problem comes
498
+ from and how it should be resolved. In the diffeomorphism invariant action (9), the
499
+ constant energy −E has physical consequences because it is coupled to g via the
500
+ term proportional to √gE. This is analogous to the cosmological constant coupled
501
+ to gravity via the term proportional to
502
+
503
+ | det gµν|Λ. On the other hand, the action
504
+ (1) with (2) is not diffeomorphism invariant and hence does not contain √g. As a
505
+ consequence, adding a constant E to the Lagrangian (2) does not have any physical
506
+ consequences. In the corresponding quantum theory described by the Schr¨odinger
507
+ equation (5), the Hamiltonian is shifted by a constant value −E, which changes the
508
+ phase of the quantum state by an additional phase factor eiEt/¯h, which does not have
509
+ any physical consequences. The quantum ground state energy further shifts this value
510
+ from E to Eeff as given by (38), but the new phase factor eiEefft/¯h still does not have
511
+ any physical consequences.
512
+ Hence the conclusion is very similar to that in Sec. 3. The toy version of the
513
+ cosmological constant problem originates from taking the diffeomorphism invariance
514
+ too seriously. When one takes into account that this invariance is only emergent at
515
+ the classical level, while fundamental quantum theory does not have this invariance,
516
+ the toy cosmological constant problem disappears in an obvious way.
517
+ 9
518
+
519
+ 5
520
+ Black hole and firewall
521
+ 5.1
522
+ The model
523
+ Consider a subsystem described by only two degrees of freedom q(t) = {x(t), y(t)},
524
+ and suppose that the subsystem is invariant under rotations in the x-y plane. Suppose
525
+ also that E = 0. Under these conditions, the action (9) reduces to
526
+ ˜A =
527
+
528
+ dt√g
529
+ �m( ˙x2 + ˙y2)
530
+ 2g
531
+ − V (x, y)
532
+
533
+ ,
534
+ (44)
535
+ where V (x, y) = V (x2 +y2). Due to the rotational symmetry, it is convenient to work
536
+ in polar coordinates
537
+ z =
538
+
539
+ x2 + y2,
540
+ ϕ = arctgy
541
+ x,
542
+ (45)
543
+ with ranges
544
+ z ∈ [0, ∞),
545
+ ϕ ∈ [0, 2π),
546
+ (46)
547
+ where the values ϕ = 0 and ϕ = 2π are identified. Note that z is the usual radial
548
+ coordinate, but we denote it with z, rather than with r, for the reasons that will
549
+ become clear later. Thus the action (44) can be written as
550
+ ˜A =
551
+
552
+ dt√g
553
+ ���m( ˙z2 + z2 ˙ϕ2)
554
+ 2g
555
+ − V (z2)
556
+
557
+ ,
558
+ (47)
559
+ and the corresponding constraint (10) reduces to
560
+ m( ˙z2 + z2 ˙ϕ2)
561
+ 2g
562
+ + V (z2) = 0.
563
+ (48)
564
+ To get an interesting solution of the constraint, let us suppose that the potential
565
+ V (z2) for small z has a form of an inverted harmonic oscillator
566
+ V (z2) = −kz2
567
+ 2 ,
568
+ (49)
569
+ with k > 0. Thus, assuming in addition that ϕ(t) = 0 and choosing the gauge
570
+ g(t) = 1,
571
+ (50)
572
+ the constraint (48) finally reduces to
573
+ m ˙z2
574
+ 2
575
+ − kz2
576
+ 2
577
+ = 0,
578
+ (51)
579
+ which is a differential equation for z(t)
580
+ �dz(t)
581
+ dt
582
+ �2
583
+ = γ2z2(t),
584
+ (52)
585
+ where γ =
586
+
587
+ k/m. We will see that (52) describes a motion analogous to the radial
588
+ motion of a particle around a black hole with a horizon at z = 0.
589
+ 10
590
+
591
+ 5.2
592
+ Analogy with a black hole
593
+ The solution of the differential equation (52) is
594
+ z(t) = z(0)e±γt.
595
+ (53)
596
+ The solution z(t) = z(0)e−γt can be visualized as radial infalling towards z = 0. The
597
+ infalling exponentially slows down as z = 0 is approached, and it takes an infinite
598
+ time t to reach z = 0. Likewise, the solution z(t) = z(0)eγt is a time inversion of the
599
+ infalling, it describes an escaping from small z towards z → ∞. However, if it starts
600
+ from z(0) = 0, then it can never escape; it remains trapped at z(t) = 0 forever. This
601
+ behavior is very much analogous to infalling towards the black hole, or escaping from
602
+ it. In particular, it takes an infinite time to reach the black hole horizon, from the
603
+ point of view of observer staying at a fixed non-zero distance from the horizon. Also,
604
+ an object initially at the horizon can never escape from it. We see that the point
605
+ z = 0 is analogous to the black hole horizon.
606
+ Moreover, the analogy with black holes does not stop here. The solution (53) is
607
+ obtained in the gauge (50), but the theory is diffeomorphism invariant under time
608
+ reparametrizations (13). Thus we can introduce a new time variable t′ defined im-
609
+ plicitly by
610
+ e−γt = 1 − γt′,
611
+ (54)
612
+ so the infalling solution z(t) = z(0)e−γt can be written as
613
+ z(t(t′)) = z(0)[1 − γt′].
614
+ (55)
615
+ Now the point z = 0 is reached after a finite time t′ = 1/γ. Furthermore, the solution
616
+ (55) can be extended to negative values of z (this is the reason why we denote it with
617
+ z, rather than with r), reached at times t′ > 1/γ. This is analogous to the Kruskal
618
+ extension (see e.g. [1, 2, 3]) of the Schwarzschild solution in general relativity, where
619
+ in appropriate spacetime coordinates a freely falling object reaches the horizon after
620
+ a finite time and the Schwarzschild solution is extended beyond the horizon, thus
621
+ describing not only the black hole exterior, but also its interior. Hence, the region
622
+ of negative z in the toy model is analogous to the black hole interior behind the
623
+ Schwarzschild horizon.
624
+ 5.3
625
+ Effective spacetime
626
+ The analogy above can also be made more explicit by introducing an effective space-
627
+ time metric. The constraint (52) can be written as γ2z2dt2 − dz2 = 0, which can
628
+ be interpreted as motion of a relativistic massless particle in a spacetime with the
629
+ effective metric
630
+ ds2
631
+ eff = Ω(t, z)[γ2z2dt2 − dz2],
632
+ (56)
633
+ where Ω(t, z) > 0 is an arbitrary conformal factor. This effective metric has a horizon
634
+ at z = 0. In particular, the metric in the square bracket has the same form as the
635
+ Rindler metric [37, 1]
636
+ ds2
637
+ Rindler = a2z2dt2 − dz2,
638
+ (57)
639
+ 11
640
+
641
+ associated with an observer at z = 1/a accelerating with proper acceleration a. The
642
+ Rindler horizon at z = 0 is known to have many similarities with the black hole
643
+ horizon [37, 7, 8].
644
+ Since (56) has a coordinate singularity at z = 0, we want to see what happens
645
+ with this singularity after the coordinate transformation (54). By applying (54) to
646
+ (56), we get
647
+ ds2
648
+ eff = Ω
649
+ � γ2z2dt′2
650
+ (1 − γt′)2 − dz2
651
+
652
+ ,
653
+ (58)
654
+ which is still singular at z = 0. However, the singular quantity
655
+ g′
656
+ 00 =
657
+ Ωγ2z2
658
+ (1 − γt′)2
659
+ (59)
660
+ is in fact regular along the infalling trajectory (55), i.e.
661
+ g′
662
+ 00
663
+ traj
664
+ = Ωγ2z2(0)
665
+ (60)
666
+ is regular provided that the initial position obeys z(0) ̸= 0.
667
+ A standard way to completely remove the coordinate singularity at the horizon
668
+ z = 0 is to introduce the new spacetime coordinates
669
+ T = z shγt,
670
+ Z = z chγt.
671
+ (61)
672
+ Indeed, an elementary calculus shows that dT 2 − dZ2 = γ2z2dt2 − dz2, so (56) can be
673
+ written as
674
+ ds2
675
+ eff = Ω[dT 2 − dZ2].
676
+ (62)
677
+ In these coordinates the relativistic massless particle obeys dT 2 − dZ2 = 0, so the
678
+ infalling solution is
679
+ Z(T) = Z(0) − T,
680
+ (63)
681
+ which corresponds to (55).
682
+ Now we want to express the position of the horizon z = 0 in the T, Z coordinates.
683
+ Inserting z = 0 into (61) gives (T, Z) = (0, 0), if t is finite. But what about the limit
684
+ t → ±∞? In this limit (61) gives Z/T = ±1 for any z, including the limit z → 0,
685
+ so the two lines Z = ±T are also consistent with z = 0. Thus the horizon is the
686
+ union of the point (T, Z) = (0, 0) (corresponding to finite t) and the lines Z = ±T
687
+ (corresponding to t → ±∞). But this union is simply the two lines Z = ±T, so we
688
+ conclude that the horizon is the two lines Z = ±T. The line Z = T is the future
689
+ horizon, which is characteristic for a black hole, while the line Z = −T is the past
690
+ horizon, which is characteristic for a white hole.
691
+ Thus we see that the infalling solution (63) crosses the future horizon Z = T and
692
+ extends beyond the future horizon, which corresponds to the extension beyond the
693
+ analogue horizon z = 0 in (55).
694
+ Finally note that the effective spacetime metric can be introduced not only for the
695
+ potential (49), but also for any potential V (x, y) in (44), provided that it is negative.
696
+ The constraint resulting from (44) is
697
+ m( ˙x2 + ˙y2)
698
+ 2g
699
+ + V (x, y) = 0,
700
+ (64)
701
+ 12
702
+
703
+ which in the gauge g = 1 can be written as
704
+ − 2V (x, y)
705
+ m
706
+ dt2 − dx2 − dy2 = 0.
707
+ (65)
708
+ This can be interpreted as motion of a relativistic massless particle in a spacetime
709
+ with the effective metric
710
+ ds2
711
+ eff = Ω(t, x, y)
712
+
713
+ −2V (x, y)
714
+ m
715
+ dt2 − dx2 − dy2
716
+
717
+ ,
718
+ (66)
719
+ where Ω(t, x, y) > 0 is an arbitrary conformal factor. This metric has the relativis-
720
+ tic signature (+ − −), provided that V (x, y) < 0. Taking Ω = 1 for convenience
721
+ and defining the effective “Newtonian” gravitational potential φgrav(x, y) through the
722
+ standard relation [3]
723
+ g00(x, y) = 1 + 2φgrav(x, y),
724
+ (67)
725
+ we see that the potentials V and φgrav are related as
726
+ φgrav(x, y) = −V (x, y)
727
+ m
728
+ − 1
729
+ 2.
730
+ (68)
731
+ The important message of (68) is that φgrav corresponds to −V , rather than to V as
732
+ one might naively expect. In particular, we see that a repulsive potential V such as
733
+ (49) corresponds to an attractive gravitational potential φgrav.
734
+ 5.4
735
+ The firewall
736
+ We have seen that the solution (55) can be extended to negative values of z, and
737
+ that this extension is analogous to the extension of black hole behind the horizon.
738
+ However, in the toy model, the extension is conceptually problematic. How can the
739
+ extension to negative values of z be compatible with the fact that the z-coordinate
740
+ was restricted to non-negative values by definition, in Eq. (46)? The answer is that it
741
+ cannot! Only non-negative values of z are physical. The region of space with negative
742
+ z does not exist. The motivation for extension to negative values of z has arisen from
743
+ (55), which, in turn, has arisen from a new time coordinate introduced in (54). But
744
+ the original model (1) with (2) is not diffeomorphism invariant, i.e. it does not allow
745
+ arbitrary redefinitions of the time coordinate. From this point of view, the gauge (50)
746
+ is not merely an arbitrary choice, but the correct physical value of g. The negative
747
+ values of z have arisen from taking the diffeomorphism invariance too seriously, while
748
+ this invariance is just an emergent feature resulting from a formalism that encoded
749
+ the classical value of energy E into the action, as described in Sec. 2.2.
750
+ The conclusion above that there is no region behind z = 0 is completely classi-
751
+ cal, it does not involve any quantum physics. Nevertheless, a semiclassical version
752
+ resembling Hawking radiation can also be constructed. Suppose that two entangled
753
+ particles are created at z > 0, one infalling and the other escaping, thus mimicking
754
+ 13
755
+
756
+ the Hawking pair. Suppose also that the potential V (z2), given by (49) for small z,
757
+ is defined for all z ≥ 0 as
758
+ V (z2) =
759
+
760
+ −kz2/2
761
+ for z ≤ z0
762
+ −V0
763
+ for z ≥ z0,
764
+ (69)
765
+ where
766
+ z0 =
767
+
768
+ 2V0
769
+ k .
770
+ (70)
771
+ This potential can be visualized as a flat valley at the constant potential −V0 for
772
+ z > z0, with a hill of height V0, radius z0, and the top at z = 0. It mimics a stationary
773
+ black hole approximated with flat geometry for r ≥ r0, which is justified if r0 is much
774
+ larger than the Schwarzschild radius. To mimic a non-stationary evaporating black
775
+ hole, we modify (69) and (70) to
776
+ V (z2, t)
777
+ =
778
+ � −k(t)z2/2
779
+ for z < z0(t)
780
+ −V0
781
+ for z ≥ z0(t),
782
+ (71)
783
+ z0(t)
784
+ =
785
+
786
+ 2V0
787
+ k(t),
788
+ (72)
789
+ where k(t) is an increasing function that, after a large but finite time t∗, becomes
790
+ infinite k(t∗) = ∞. Thus the radius z0(t) shrinks and becomes zero at time t∗, which
791
+ mimics the shrinking of the evaporating black hole. The information paradox can now
792
+ be formulated as follows. The peak of the infalling wave packet follows approximately
793
+ the classical trajectory (55), thus entering the region behind z = 0, i.e. behind the
794
+ top of the hill. But at late times t > t∗ the potential is V (z2) = −V0, so there is no
795
+ hill and hence no region behind the top of the hill. It looks as if the infalling particle
796
+ disappears at late times, so the remaining escaping particle in the mixed state seems
797
+ to contradict unitarity of quantum mechanics. This is the toy version of the black
798
+ hole information paradox. The solution of the paradox is that the region behind z = 0
799
+ never existed in the first place. As we said, the motivation for extension to negative
800
+ values of z originated from (55), which, in turn, originated from introducing a new
801
+ time coordinate in (54), which, however, is not allowed in the fundamental theory
802
+ without diffeomorphism invariance.
803
+ Remarkably, the non-existence of the region behind z = 0 in the toy model has an
804
+ analogy in black hole physics. With a motivation to resolve the black hole information
805
+ paradox [18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32] in semiclassical
806
+ gravity, it has been proposed that the black hole interior does not exist; the black
807
+ hole horizon represents a physical boundary called firewall [35, 36, 27]. The problem
808
+ with the firewall is to reconcile it with standard classical general relativity, which
809
+ predicts that the black hole interior exists, and that the horizon is not a physical
810
+ boundary. But such a standard view of classical general relativity is a consequence
811
+ of the 4-dimensional diffeomorphism invariance. Alternatively, if the 4-dimensional
812
+ diffeomorphism invariance in general relativity is emergent in a way similar to the
813
+ emergence of the 1-dimensional diffeomorphism invariance in our toy model, then the
814
+ 14
815
+
816
+ 4-dimensional diffeomorphism invariance should not be taken too seriously even in
817
+ the classical theory. If so, then the existence of the black hole interior resulting from
818
+ the Kruskal extension should not be trusted. Such an alternative view of classical
819
+ gravity, if correct, makes the firewall perfectly compatible with classical physics, which
820
+ resolves the firewall problem.
821
+ Hence the conclusion is similar to that in Secs. 3 and 4. The toy version of the
822
+ firewall problem originates from taking the diffeomorphism invariance too seriously.
823
+ When one takes into account that this invariance is only emergent, while the funda-
824
+ mental theory does not have this invariance, the toy firewall problem disappears in
825
+ an obvious way.
826
+ 6
827
+ Towards emergent 4-dimensional diffeomorphism
828
+ invariance
829
+ The motivation for studying the toy models with 1-dimensional diffeomorphism invari-
830
+ ance is to teach us something about the real 4-dimensional diffeomorphism invariance,
831
+ namely, about real classical, semiclassical and quantum gravity. So the question is,
832
+ how the ideas of the toy models can be generalized to 4-dimensional diffeomorphism
833
+ invariance? Unfortunately, we do not have a full answer to that question. A full
834
+ answer would be tantamount to having a full theory of quantum gravity, which, of
835
+ course, we do not have. Nevertheless, inspired by the toy models, we sketch an idea
836
+ how such a generalization might look like. What we present here can be thought of
837
+ as a gist of a research program based on a series of educated guesses1, which at the
838
+ current level is very far from a fully developed theory.
839
+ Our starting point of view is that the spacetime curvature emerges from a massless
840
+ spin-2 field [38, 39, 40, 41, 42], and not the other way around. Roughly, this means
841
+ that in the formula
842
+ gµν(x) = ηµν + φspin-2
843
+ µν
844
+ (x),
845
+ (73)
846
+ relating the curved spacetime metric gµν(x) to the flat Minkowski metric ηµν and
847
+ the massless spin-2 field φspin-2
848
+ µν
849
+ (x), the quantities on the right-hand side are more
850
+ fundamental than that on the left-hand side. Philosophically, such a view complies
851
+ much better with string theory than with loop quantum gravity. In the fundamental
852
+ theory, the formula (73) is expected to be valid only in some approximative sense.
853
+ We assume that there is some fundamental action A[φ] without diffeomorphism
854
+ invariance, where φ = φ(x) is a collective symbol for all fundamental dynamical fields
855
+ φ = {φmatt, φspin-2, . . .}.
856
+ (74)
857
+ Here φmatt are the usual “matter” fields of spins 0, 1
858
+ 2 and 1, the field φspin-2 is the
859
+ massless spin-2 field, and the ellipses are possible other fields beyond the Standard
860
+ 1“Educated guess” is (supposed to be) a well balanced term, between the over-pretentious “con-
861
+ jecture” and over-cynical “wishful thinking”.
862
+ 15
863
+
864
+ Model of particle physics. The x denotes a spacetime position in 4 or more dimen-
865
+ sions. From the action A[φ] one can derive the symmetrized energy-momentum tensor
866
+ Tµν[φ; x], which is conserved when the equations of motion
867
+ δA/δφ(x) = 0
868
+ (75)
869
+ are satisfied. In classical physics the fields φ(x) attain some definite values Φ(x),
870
+ where Φ(x) is a definite solution of (75). Thus we can define
871
+ Eµν(x) ≡ Tµν[Φ; x],
872
+ (76)
873
+ which is a generalization of the definite energy E appearing in (8). For example, in
874
+ a classical vacuum in Minkowski spacetime, the Eµν(x) may take the form
875
+ Eµν(x) = −Ληµν,
876
+ (77)
877
+ where Λ is a constant. But whatever the Eµν(x) is, in classical physics we can always
878
+ write
879
+ Tµν[φ; x] − Eµν(x) = 0,
880
+ (78)
881
+ which is a generalization of (8).
882
+ In some limit one expects that Tµν[φ; x] can be
883
+ decomposed as
884
+ Tµν[φ; x] = T matt
885
+ µν
886
+ [φ; x] + T spin-2
887
+ µν
888
+ [φ; x] + . . . .
889
+ (79)
890
+ With this decomposition, (78) looks very much like the Einstein equation (41) written
891
+ in the non-geometric spin-2 language.
892
+ Now the idea is to think of (78) as a constraint derived from a new action ˜A[φ, g],
893
+ where g(x) = {gµν(x)} is a symmetric tensor field. By analogy with (9), one expects
894
+ that the new action ˜A[φ, g] is diffeomorphism invariant, so that the diffeomorphism-
895
+ covariant equation
896
+ δ ˜A/δgµν(x) = 0
897
+ (80)
898
+ reduces to (78) when the gauge for gµν is chosen appropriately. One also expects
899
+ that, in a certain limit, the action ˜A[φ, g] reduces to the usual gravitational action
900
+ with the matter term, the Einstein-Hilbert term, and the cosmological term. This is,
901
+ roughly, how the 4-dimensional diffeomorphism is expected to emerge at the classical
902
+ level. However, the fundamental action that needs to be quantized in this scheme is
903
+ A[φ], not ˜A[φ, g].
904
+ With this approach, it it easy to see that there is no problem of time in quantum
905
+ gravity, simply because the fundamental action A[φ] does not have a Hamiltonian
906
+ constraint. The Hamiltonian H derived from A[φ] does not need to vanish on-shell.
907
+ Likewise, there is no cosmological constant problem, in the sense that energy (asso-
908
+ ciated with H) of the quantum ground state does not have physical consequences.
909
+ Finally, the quantum time evolution defined by e−iHt/¯h is unitary, so all quantum pro-
910
+ cesses, including Hawking radiation, are compatible with unitarity. Nevertheless, at
911
+ this level, it is not clear how exactly the information paradox associated with Hawk-
912
+ ing radiation resolves. Since the quantum theory lacks diffeomorphism invariance,
913
+ the firewall scenario discussed in Sec. 5.4 scenario seems plausible. In the same spirit,
914
+ 16
915
+
916
+ since quantum gravity is not fundamentally geometrical in this picture, inherently
917
+ geometrical proposals involving wormholes, such as ER=EPR [43] and black hole is-
918
+ lands [44], seem less plausible. Nevertheless, at the current level of understanding of
919
+ the ideas sketched above, it is impossible to make definite precise claims about the
920
+ quantum nature of black holes.
921
+ 7
922
+ Discussion and conclusion
923
+ In this paper we have constructed toy versions of the problem of time in quantum
924
+ gravity, of the cosmological constant problem, and of the black hole firewall problem.
925
+ Within the models, the problems originate from taking the 1-dimensional diffeomor-
926
+ phism invariance too seriously. This 1-dimensional diffeomorphism invariance, real-
927
+ ized as time-reparametrization invariance, is emergent, rather than fundamental, and
928
+ when one takes it into account the problems disappear in a rather natural way. The
929
+ problem of time disappears because quantum energy is uncertain in the absence of
930
+ fundamental time-reparametrization invariance. The cosmological constant problem
931
+ disappears because a shift of energy by a constant does not have physical conse-
932
+ quences in the absence of fundamental time-reparametrization invariance. The black
933
+ hole firewall problem disappears because a firewall at the horizon may be completely
934
+ compatible with classical physics when the diffeomorphism invariance is interpreted
935
+ as emergent, rather than fundamental.
936
+ Note also that the physical irrelevance of vacuum energy in the context of the cos-
937
+ mological constant problem is compatible with the Casimir effect. The description of
938
+ Casimir effect in terms of vacuum energy is just an effective macroscopic description,
939
+ while the fundamental microscopic origin of Casimir effect lies in van der Waals forces
940
+ [45, 46, 47]. In particular, it can be understood in terms of a toy model [47] similar
941
+ to that of the present paper.
942
+ In our toy models, the solutions of the problems of time and of the cosmological
943
+ constant are rather generic; the solutions do not depend on details of the models. In
944
+ particular, even though the cosmological constant problem is discussed for quantum
945
+ harmonic oscillators, the solution of the problem works in essentially the same way
946
+ for any other interaction V (q) that leads to a non-zero quantum ground state energy.
947
+ By contrast, our solution of the toy black hole firewall problem is not so generic,
948
+ it depends on details of the model. Perhaps different models could suggest totally
949
+ different solutions of the black hole information paradox, without any hints for the
950
+ existence of firewalls. Or perhaps some models would describe classical states resem-
951
+ bling black holes, but without any hints how to solve the information paradox. More
952
+ research is needed to better understand how the lack of fundamental diffeomorphism
953
+ invariance may, or may not, help to solve the information paradox.
954
+ More importantly, it is not at all clear whether such toy 1-dimensional ideas can,
955
+ and should, be generalized to the real 4-dimensional diffeomorphism invariance of
956
+ general relativity. In Sec. 6 we have sketched how such a generalization might look
957
+ like, but it is far from a fully developed theory. Nevertheless, the conceptual simplicity
958
+ of solutions of the toy problems seems suggestive, so we believe that this conceptual
959
+ 17
960
+
961
+ simplicity could at least serve as a source of inspiration for further research.
962
+ In any case, we believe that our analysis of the toy models with emergent diffeo-
963
+ morphism invariance may influence how physicists think about general relativity at
964
+ an intuitive level. A change of intuition may also induce new technical results and,
965
+ hopefully, contribute to better understanding of semiclassical and quantum gravity.
966
+ Acknowledgements
967
+ The author is grateful to T. Juri´c for discussions. This work was supported by the
968
+ Ministry of Science of the Republic of Croatia.
969
+ References
970
+ [1] C.W. Misner, K.S. Thorne and J.A. Wheeler, Gravitation (W.H. Freeman and
971
+ Company, San Francisco, 1973).
972
+ [2] R.M. Wald, General Relativity (The University of Chicago Press, Chicago, 1984).
973
+ [3] S.M. Carroll, Spacetime and Geometry (Addison Wesley, San Francisco, 2004).
974
+ [4] C. Kiefer, Quantum Gravity (Oxford University Press, 2012).
975
+ [5] C. Rovelli, Quantum Gravity (Cambridge University Press, 2004).
976
+ [6] K. Becker, M. Becker and J.H. Schwarz, String Theory and M-Theory (Cam-
977
+ bridge University Press, 2007).
978
+ [7] N.D. Birrell and P.C.W. Davies, Quantum Fields in Curved Space (Cambridge
979
+ University Press, 1982).
980
+ [8] V. Mukhanov and S. Winitzki, Introduction to Quantum Effects in Gravity (Cam-
981
+ bridge University Press, 2007).
982
+ [9] K.V. Kuchaˇr, Proceedings of the 4th Canadian Conference on General Relativity
983
+ and Relativistic Astrophysics (World Scientific, Singapore, 1992); reprinted in
984
+ Int. J. Mod. Phys. D 20 (Suppl. 1), 3 (2011).
985
+ [10] C.J. Isham, gr-qc/9210011.
986
+ [11] T. Padmanabhan, Int. J. Mod. Phys. A 4, 4735 (1989).
987
+ [12] E. Anderson, The Problem of Time: Quantum Mechanics Versus General Rela-
988
+ tivity (Springer International Publishing AG, 2017).
989
+ [13] S. Weinberg, Rev. Mod. Phys. 61, 1 (1989).
990
+ [14] S. Nobbenhuis, Found. Phys. 36, 613 (2006); gr-qc/0411093.
991
+ 18
992
+
993
+ [15] V.
994
+ Sahni
995
+ and
996
+ A.
997
+ Starobinsky,
998
+ Int.
999
+ J.
1000
+ Mod.
1001
+ Phys.
1002
+ D
1003
+ 9,
1004
+ 373
1005
+ (2000);
1006
+ astro-ph/9904398.
1007
+ [16] S.M. Carroll, Living Rev. Rel. 4, 1 (2001); astro-ph/0004075.
1008
+ [17] T. Padmanabhan, Phys. Rep. 380, 235 (2003); hep-th/0212290.
1009
+ [18] S.B. Giddings, Phys. Rev. D 46, 1347 (1992); hep-th/9203059.
1010
+ [19] J.A. Harvey and A. Strominger, hep-th/9209055.
1011
+ [20] J. Preskill, hep-th/9209058.
1012
+ [21] D.N. Page, hep-th/9305040.
1013
+ [22] S.B. Giddings, hep-th/9412138.
1014
+ [23] A. Strominger, hep-th/9501071.
1015
+ [24] S.D. Mathur, Lect. Notes Phys. 769, 3 (2009); arXiv:0803.2030.
1016
+ [25] S.D. Mathur, Class. Quant. Grav. 26, 224001 (2009); arXiv:0909.1038.
1017
+ [26] S. Hossenfelder, L. Smolin, Phys. Rev. D 81, 064009 (2010); arXiv:0901.3156.
1018
+ [27] F.S. D¨undar, arXiv:1409.0474.
1019
+ [28] D. Harlow, Rev. Mod. Phys. 88, 15002 (2016); arXiv:1409.1231.
1020
+ [29] J. Polchinski, arXiv:1609.04036.
1021
+ [30] S. Chakraborty and K. Lochan, Universe 3, 55 (2017); arXiv:1702.07487.
1022
+ [31] D. Marolf, Rept. Prog. Phys. 80, 092001 (2017); arXiv:1703.02143.
1023
+ [32] A. Fabbri and J. Navarro-Salas, Modeling Black Hole Evaporation (Imperial Col-
1024
+ lege Press, London, 2005).
1025
+ [33] A.D. Sakharov, Dokl. Akad. Nauk SSSR 177, 70 (1967).
1026
+ [34] H. Nikoli´c, Eur. Phys. J. C 42, 365 (2005); hep-th/0407228.
1027
+ [35] A. Almheiri, D. Marolf, J. Polchinski, J. Sully, JHEP 1302, 062 (2013);
1028
+ arXiv:1207.3123.
1029
+ [36] A. Almheiri, D. Marolf, J. Polchinski, D. Stanford, J. Sully, JHEP 1309, 018
1030
+ (2013); arXiv:1304.6483.
1031
+ [37] W. Rindler, Am. J. Phys. 34, 1174 (1966).
1032
+ [38] R.P. Feynman, Feynman Lectures on Gravitation (Addison-Wesley Pub. Com-
1033
+ pany, Massachusetts, 1995).
1034
+ 19
1035
+
1036
+ [39] S. Weinberg, Phys. Lett. 9, 357 (1964); S. Weinberg, Phys. Rev. 135, 1049
1037
+ (1964).
1038
+ [40] W.E. Thirring, Ann. Phys. 16, 96 (1961).
1039
+ [41] H. Nikoli´c, Gen. Rel. Grav. 31, 1211 (1999); gr-qc/9901057.
1040
+ [42] S. Deser, Gen. Rel. Grav. 42, 641 (2010); arXiv:0910.2975.
1041
+ [43] J. Maldacena, L. Susskind, Fortsch. Phys. 61, 781 (2013); arXiv:1306.0533.
1042
+ [44] A. Almheiri, T. Hartman, J. Maldacena, E. Shaghoulian, A. Tajdini, Rev. Mod.
1043
+ Phys. 93, 35002 (2021); arXiv:2006.06872.
1044
+ [45] R.L. Jaffe, Phys. Rev. D 72, 021301 (2005); hep-th/0503158.
1045
+ [46] H. Nikoli´c, Phys. Lett. B 761, 197 (2016); arXiv:1605.04143.
1046
+ [47] H. Nikoli´c, Ann. Phys. 383, 181 (2017); arXiv:1702.03291.
1047
+ 20
1048
+
B9E3T4oBgHgl3EQfUAr7/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BdE2T4oBgHgl3EQfngiP/content/tmp_files/2301.04009v1.pdf.txt ADDED
@@ -0,0 +1,1075 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On the Complexity of the Two-Stage Majority Rule*
2
+ Yongjie Yang
3
+ Chair of Economic Theory, Saarland University, Saarb¨ucken, Germany
4
5
+ Abstract
6
+ Sequential voting rules have been extensively used in parliamentary and legislative decision making. After observing
7
+ that the prevalent successive and the amendment rules fail several fundamental axioms, Horan and Sprumont [2021]
8
+ proposed very recently a two-stage sequential rule which satisfies a variety of desirable properties. This paper examines
9
+ this rule by investigating the complexity of AGENDA CONTROL, COALITION MANIPULATION, POSSIBLE WINNER,
10
+ NECESSARY WINNER, and eight standard election control problems. Our study offers a comprehensive understanding
11
+ of the complexity landscape of these problems.
12
+ keywords: parameterized complexity, successive rule, amendment rule, two-stage majority rule, NP-hard, W[2]-hard
13
+ 1
14
+ Introduction
15
+ Exploring the complexity of strategic voting problems has been being a vibrant topic in computational social choice (see,
16
+ e.g., [7, 17, 22, 25, 33]). The motivation is that malicious strategic voting may undermine election results, and it is widely
17
+ believed that complexity could serve as a barrier against strategic actions [3, 4]. In particular, to what extent a voting rule
18
+ resists strategic voting has been commonly recognized as an important factor to valuate the applicability of the rule. Over
19
+ the past three decades, the complexity of many different strategic voting problems under numerous voting rules has been
20
+ established [5, 20]. Needless to say, as long as a new meritorious voting rule in terms of axiomatic properties has emerged,
21
+ comparing it with existent rules with respect to their resistance degree to strategic voting becomes of great importance.
22
+ This paper aims to complete the complexity landscape of several strategic voting problems under a sequential voting
23
+ rule proposed recently by Horan and Sprumont [26]. Taking into as input preferences of voters over candidates and an
24
+ agenda over candidates (a linear order specifying the priorities of candidates being considered during the decision-making
25
+ process), a sequential rule outputs one candidate as the winner. Sequential rules are exceedingly useful in parliamentary
26
+ and legislative decision making. So far, the successive and the amendment rules are among the two most popular sequential
27
+ rules used in many countries [34]. However, these two rules fail several fundamental axioms from a theoretical point of
28
+ view. This motivates Horan and Sprumont [26] to study a new rule called two-stage majority rule (TSMR), which has been
29
+ shown to satisfy a variety of desirable axiomatic properties many of which are failed by the successive and the amendment
30
+ rules.
31
+ The work of Horan and Sprumont [26] naturally raises the question of whether the newly proposed rule is comparable
32
+ to the successive and the amendment rules in terms of their resistance to strategic voting. This paper aims to answer this
33
+ question. In addition, we also study two winner determination problems in the setting where only partial information on
34
+ voters’ preferences are available. Our main contributions are as follows.
35
+ (1) We study the AGENDA CONTROL problem, which models the scenario where an external agent empowered to set
36
+ the agenda attempts to make a distinguished candidate the winner.
37
+ (2) We study the COALITION MANIPULATION problem in which a set of voters, called manipulators, aim to make a
38
+ distinguished candidate the winner by coordinating their votes.
39
+ (3) We study eight standard election control problems, namely, CCAV, CCDV, CCAC, CCDC, DCAV, DCDV,
40
+ DCAC, and DCDC, where “CC”/“DC” stands for “constructive control”/“destructive control”, the third letter
41
+ “A”/“D” stands for “adding”/“deleting”, and the last letter “V”/“C” stands for “voters”/“candidates”. These prob-
42
+ lems model the scenario where a powerful external agent aims to make a distinguished candidate the winner (con-
43
+ structive) or not the winner (destructive) by adding or deleting a limited number of voters or candidates.
44
+ (4) We study the POSSIBLE WINNER and the NECESSARY WINNER problems under TSMR. These two problems are
45
+ relevant to the setting where only partial information on the preferences of voters and agenda are known. POSSIBLE
46
+ WINNER consists in determining which candidates have positive chances to win at least one completion of the
47
+ partial input, and NECESSARY WINNER consists in determining which candidates necessarily win regardless of the
48
+ missing information.
49
+ *A preliminary version will appear in the proceedings of AAMAS 2023.
50
+ 1
51
+ arXiv:2301.04009v1 [cs.GT] 10 Jan 2023
52
+
53
+ (5) For the above problems, we offer a comprehensive (parameterized) complexity landscape. Particularly, for the eight
54
+ election control problems, we study both the special case where the given distinguished candidate p is the first one,
55
+ and the case where p is the last one in the agenda. We refer to Table 1 for a summary of our concrete results as well
56
+ as previous results for the successive rule and the amendment rule.
57
+ Table 1: A summary of the complexity of many voting problems under several sequential rules. Our main results are in
58
+ bold face. In the table, “first”, “last”, and “last” mean that the distinguished candidate is respectively the first one, the
59
+ last one, and not the last one in the agenda. P-results spanning two rows hold for the general case, i.e., that they hold
60
+ regardless of the position of the distinguished candidate in the agenda. In addition, m is the number of candidates, n is the
61
+ number of votes, nrg is the number of registered votes, and k is the solution size.
62
+ CCAV
63
+ CCDV
64
+ CCAC
65
+ CCDC
66
+ TSMR
67
+ first W[2]-h (k +nrg, Thm. 3) W[2]-h (k,n−k, Thms. 5, 6) W[2]-h (k, Thm. 9)
68
+ P (Thm. 10)
69
+ last W[2]-h (k +nrg, Thm. 4) W[2]-h (k,n−k, Thms. 7, 8)
70
+ immune (Cor. 1)
71
+ successive
72
+ [29, 45]
73
+ first
74
+ P
75
+ P
76
+ immune
77
+ W[1]-h (k, m−k)
78
+ last
79
+ W[1]-h (k +nrg)
80
+ W[2]-h (k)
81
+ W[2]-h (k)
82
+ P
83
+ amendment
84
+ first
85
+ W[1]-h (k +nrg)
86
+ W[1]-h (k)
87
+ immune
88
+ P
89
+ P
90
+ last
91
+ W[2]-h (k +nrg)
92
+ W[2]-h (k)
93
+ DCAV
94
+ DCDV
95
+ DCAC
96
+ DCDC
97
+ TSMR
98
+ last W[2]-h (k +nrg, Thm. 11) W[2]-h (k,n−k, Thms. 12, 13) P (Thm. 14)
99
+ P (Cor. 3)
100
+ last
101
+ P [4]
102
+ P [4]
103
+ successive
104
+ [29, 45]
105
+ first
106
+ P
107
+ P
108
+ W[2]-h (k)
109
+ immune
110
+ last
111
+ P
112
+ W[1]-h (k,m−k)
113
+ amendment
114
+ first
115
+ P
116
+ P
117
+ P
118
+ immune
119
+ last
120
+ W[1]-h (k)
121
+ W[2]-h (k)
122
+ P
123
+ AGENDA CONTROL COALITION MANIPULATION
124
+ POSSIBLE WINNER
125
+ NECESSARY WINNER
126
+ TSMR
127
+ P (Thm. 1)
128
+ P (Thm. 2)
129
+ NP-h (Thms. 16, 17)
130
+ P (Thm. 15)
131
+ successive
132
+ [8]
133
+ P
134
+ P
135
+ NP-h
136
+ P
137
+ amendment
138
+ P
139
+ P
140
+ NP-h
141
+ coNP-h
142
+ 1.1
143
+ Related Works
144
+ AGENDA CONTROL is arguably one of the most popular problems in the setting of sequential rules and has a long
145
+ history of study (see, e.g., [6, 32]). However, the complexity of AGENDA CONTROL was only first studied recently [8].
146
+ It should be pointed out that the complexity of some analogous problems in the setting of knockout tournaments has
147
+ been studied earlier [1, 3, 4, 11, 30, 39, 40]. COALITION MANIPULATION is a natural generalization of the well-known
148
+ MANIPULATION problem [3], and was first studied by Conitzer, Sandholm, and Lang [12]. We refer to [5, 13, 36, 37, 38]
149
+ for detailed results on the complexity of this problem for many traditional rules (i.e., voting rules like Borda, Maximin,
150
+ etc., which do not need an agenda to determine the winner). The constructive control problems were first studied by
151
+ Bartholdi, Tovey, and Trick [4], and their destructive counterparts were initiated by Hemaspaandra et al. [24]. Heretofore
152
+ the complexity of these problems for many rules has been extensively investigated. We refer to the book chapters [5, 20]
153
+ for important progress by 2016, and refer to [19, 33, 42, 43, 44] for some recent new results. The complexity of POSSIBLE
154
+ WINNER and NECESSARY WINNER for the successive and the amendment rules has been studied by Bredereck et al. [8].
155
+ These two problems for traditional voting rules were first studied by Konczak and Lang [28], and the complexity of the
156
+ problems for many rules has been subsequently established [9, 10, 41].
157
+ 1.2
158
+ Organization
159
+ The remainder of the paper is organized as follows. In Section 2, we give the formal definitions of important notions used
160
+ in the paper. Then, in Section 3, we unfold our concrete results for the strategic problems including AGENDA CONTROL,
161
+ COALITION MANIPULATION, and the eight standard election control problems. Then, we study the POSSIBLE WINNER
162
+ and the NECESSARY WINNER problems in Section 4. Finally, Section 5 summarizes our results and layouts some topics
163
+ for future research.
164
+ 2
165
+ Preliminaries
166
+ We assume the reader is familiar with basic notions in graph theory, complexity theory, and parameterized complexity
167
+ theory [2, 14, 15, 35].
168
+ 2
169
+
170
+ Let [i] be the set of positive integers equal to or smaller than i. For a binary relation R, we often use xRy to denote
171
+ (x,y) ∈ R.
172
+ 2.1
173
+ Graphs
174
+ An undirected graph is a tuple G = (N,A) where N is a set of vertices and A is a set of edges. An edge between two
175
+ vertices v and v′ is denoted by {v,v′}. We use ΓG(v) to denote the set of neighbors of v in G, i.e., ΓG(v) = {v′ ∈ N :
176
+ {v,v′} ∈ A}.
177
+ A digraph is a tuple G = (N,A) where N is a set of vertices and A is a set of arcs. Each arc from a vertex a to a vertex b
178
+ is denoted by (a,b). The set of inneighbors of a vertex a in G is Γ−
179
+ G(a) = {b ∈ N : (b,a) ∈ A}, and the set of outneighbors
180
+ of a in G is Γ+
181
+ G(a) = {b ∈ N : (a,b) ∈ A}. When it is clear which graph G is discussed, we drop the index G from the
182
+ notions. An oriented graph is a digraph so that between every two vertices there is at most one arc.
183
+ For a graph G (be it directed or undirected) and a subset S of vertices, the subgraph of G induced by S is denoted
184
+ by G[S].
185
+ 2.2
186
+ Elections and Voting Rules
187
+ An election is a tuple (C,V) of a set of candidates C and a multiset of votes V where every ≻∈ V is defined as a linear
188
+ order over C. For two candidates c,c′ ∈ C, we say that c is ranked before c′ in a vote ≻ if c ≻ c′. In addition, we say that c
189
+ is ranked immediately before c′ if c ≻ c′ and there are no other candidates ranked between them. A vote ≻ specifies the
190
+ preference of a voter casting ≻ where a is preferred to b if a is ranked before b. For notational brevity, we sometimes
191
+ write a preference in the format of a sequence of candidates from the most preferred one to the least preferred one. For
192
+ instance, by saying a vote with the preference a b c, we mean that a is ranked before b, and b ranked before c in the vote.
193
+ An agenda ▷ is a linear order over C. For c ∈ C, we call candidates before c in ▷ the predecessors of c, and call
194
+ those after c the successors of c. A sequential rule τ maps each election (C,V) and an agenda ▷ to a single candidate
195
+ τ(C,V,▷) ∈ C, the winner.
196
+ For c,c′ ∈ C, we use nV(c,c′) to denote the number of votes in V ranking c before c′. We say c beats (resp. ties) c′
197
+ with respect to V if nV(c,c′) > nV(c′,c) (resp. nV(c,c′) = nV(c′,c)). A candidate is a weak Condorcet winner if it is not
198
+ beaten by anyone else. In addition, a candidate is a Condorcet winner if it beats all the other candidates. The majority
199
+ graph of an election E = (C,V), denoted GE, is an oriented graph with the vertex set C, and there is an arc from c ∈ C to
200
+ c′ ∈ C if and only if nV(c,c′) > nV(c′,c).
201
+ • Two-stage majority rule (TSMR) This procedure takes two steps. Let G denote the majority graph of (C,V).
202
+ Moreover, let G1 be the subdigraph of G with only forward arcs with respect to ▷, i.e., G1 takes C as the vertex set
203
+ and there is an arc from c to c′ in G1 if and only if c▷c′ and there is an arc from c to c′ in G. Let C′ ⊆ C be the set
204
+ of candidates without inneighbors in G1. Then, the procedure returns the right-most candidate in C′ as the winner,
205
+ i.e., the c ∈ C′ such that c′ ▷c for all c′ ∈ C′ \{c}.
206
+ We also give the formal definitions of the successive and amendment rules as they are closely related to our discussions.
207
+ • Successive For a candidate c ∈ C and a subset C′ ⊆ C \ {c}, we say c beats C′ if there is a strict majority of votes
208
+ each of which ranks c before all candidates in C′. The successive winner is the first one who beats the set of all her
209
+ successors.
210
+ • Amendment This procedure takes |C| rounds, where each round determines a temporary winner. Precisely, the
211
+ winner of the first round is the first candidate in the agenda. The winner of round i where i ≥ 2 is determined as
212
+ follows. Let c be the winner of round i−1, and let c′ be the i-th candidate in the agenda. The winner of round i is c
213
+ if c beats c′, and is c′ otherwise. The amendment winner is the winner of the last round.
214
+ We note that the successive rule and the amendment rule have been also studied under several other names (cf. [6, 21]).
215
+ Example 1. Let C = {a,b,c,d}, and let V be a set of three votes respectively with the preferences b d c a, c a b d, and
216
+ a d b c. The majority graph of (C,V), three different agendas, and the winners under different rules and agendas are
217
+ shown below. For TSMR, arcs NOT in G1 (backward arcs with respect to ▷i) are drawn as dashed lines.
218
+ a
219
+ b
220
+ c
221
+ d
222
+ agenda ▷1
223
+ a
224
+ b
225
+ c
226
+ d
227
+ agenda ▷2
228
+ a
229
+ b
230
+ c
231
+ d
232
+ agenda ▷3
233
+ ▷1
234
+ ▷2
235
+ ▷3
236
+ TSMR
237
+ a
238
+ b
239
+ a
240
+ successive
241
+ d
242
+ a
243
+ d
244
+ amendment
245
+ d
246
+ a
247
+ c
248
+ winners
249
+ The first and the last candidates in the agenda are somehow related to (weak) Condorcet winner, as summarized below.
250
+ Observation 1. For an election (C,V) and an agenda ▷ over C, the following hold.
251
+ 3
252
+
253
+ (1) The first or the second candidate in ▷ is the amendment winner of (C,V) if and only if it is the Condorcet winner
254
+ of (C,V).
255
+ (2) The last one in ▷ is the TSMR winner of (C,V) if and only if it is a weak Condorcet winner of (C,V).
256
+ (3) If the successive winner of (C,V) is the first one in ▷, then the successive winner is also the Condorcet winner
257
+ of (C,V).
258
+ (4) If the first candidate in ▷ is the Condorcet winner of (C,V), then it is also the TSMR winner of (C,V).
259
+ (5) If the last one in ▷ is a weak Condorcet winner of (C,V), it is also the successive and the amendment winner
260
+ of (C,V).
261
+ (6) The converses of (3)–(5) do not necessarily hold.
262
+ 2.3
263
+ Other Useful Notions
264
+ Throughout the paper, unless stated otherwise, for a set S we use −→S to denote an arbitrary but fixed linear order over S.
265
+ Once such an −→S is used, ←−S denotes then the reverse of −→S . For S′ ⊆ S, we use −→S [S′] to denote −→S restricted to S′, and
266
+ use −→S \S′ to denote −→S [S\S′].
267
+ 2.4
268
+ Problem Formulations
269
+ For a sequential voting rule τ, we study the following problems defined in [8].
270
+ AGENDA CONTROL
271
+ Given:
272
+ An election (C,V) and a distinguished candidate p ∈ C.
273
+ Question: Is there an agenda ▷ over C so that p is the winner of (C,V,▷) with respect to τ, i.e., p = τ(C,V,▷)?
274
+ COALITION MANIPULATION
275
+ Given:
276
+ An election (C,V), a distinguished candidate p ∈ C, an agenda ▷ over C, and a positive integer k.
277
+ Question: Is there a multiset V ′ of k votes over C so that p = τ(C,V ∪V ′,▷)?
278
+ For a partial order R over a set X, a linear extension of R is a linear order over X containing R, i.e., a linear order R′ so
279
+ that (x,y) ∈ R implies (x,y) ∈ R′ for all x,y ∈ X.
280
+ A partial election is a tuple (C,V) where V is a multiset of partial orders over C. An election (C,V ′) is a completion of
281
+ a partial election (C,V) if V ′ and V are one-to-one correspondence so that every v′ ∈ V ′ is a linear extension of its image.
282
+ A partial agenda over C is a partial order over C.
283
+ POSSIBLE WINNER
284
+ Given:
285
+ A partial election (C,V), a distinguished candidate p ∈ C, and a partial agenda ▷ over C.
286
+ Question: Is there a completion (C,V ′) of (C,V) and a linear extension ▷′ of ▷ so that p = τ(C,V ′,▷)?
287
+ NECESSARY WINNER
288
+ Given:
289
+ A partial election (C,V), a distinguished candidate p ∈ C, and a partial agenda ▷ over C
290
+ Question: Is p the τ winner of every completion of (C,V,▷), i.e., p = τ(C,V ′,▷′) for all (C,V ′) being a completion
291
+ of (C,V) and ▷′ being a linear extension of ▷?
292
+ We also study eight standard control problems which are special cases of the following problems.
293
+ CONSTRUCTIVE MULTIMODE CONTROL
294
+ Given:
295
+ An election (C∪D,V ∪W) with a set C of (registered) candidates,1 a set D of unregistered candidates, a mul-
296
+ tiset V of registered votes, a multiset W of unregistered votes, a distinguished candidate p ∈ C, an agenda ▷
297
+ over C∪D, and four integers kAV, kDV, kAC, and kDC such that kAV ≤ |W|, kDV ≤ |V|, kAC ≤ |D|, and kDC ≤ |C|.
298
+ Question: Are there V ′ ⊆V, W ′ ⊆W, C′ ⊆C\{p}, and D′ ⊆ D such that |V ′| ≤ kDV, |W ′| ≤ kAV, |C′| ≤ kDC, |D′| ≤ kAC,
299
+ and p wins ((C \C′)∪D′,(V \V ′)∪W ′,▷′) with respect to τ where ▷′ is ▷ restricted to (C \C′)∪D′?
300
+ In DESTRUCTIVE MULTIMODE CONTROL, we have the same input as CONSTRUCTIVE MULTIMODE CONTROL,
301
+ and are asked whether there are V ′, W ′, C′, and D′ as in the above definition such that p is not the τ winner of ((C \C′)∪
302
+ D′,(V \V ′)∪W ′,▷′).
303
+ The eight standard control problems studied in the paper are special cases of CONSTRUCTIVE MULTIMODE CONTROL
304
+ and DESTRUCTIVE MULTIMODE CONTROL. The specifications of the eight standard control problems are summarized
305
+ in Table 2.
306
+ 4
307
+
308
+ Table 2: Special cases of CONSTRUCTIVE/DESTRUCTIVE MULTIMODE CONTROL. Here, X is either CC standing for
309
+ constructive control or DC standing for destructive control.
310
+ problems
311
+ restrictions
312
+ XAV
313
+ kAC = kDC = kDV = 0, D = /0
314
+ XAC
315
+ kDC = kAV = kDV = 0, W = /0
316
+ XDV
317
+ kAC = kDC = kAV = 0, D = W = /0
318
+ XDC
319
+ kAC = kAV = kDV = 0, D = W = /0
320
+ For simplicity, when we study a problem in Table 2, we use k to denote the integer in the input not required to be 0, and
321
+ omit components in the input requested to be 0 or /0. For example, an instance of CCAV is written as ((C,V ∪W), p,▷,k),
322
+ where k represents kAV.
323
+ Our hardness results are based on reductions from the following problem.
324
+ RED-BLUE DOMINATING SET (RBDS)
325
+ Given:
326
+ A bipartite graph G with bipartition (R,B) where vertices in R and B are referred to as red vertices and blue
327
+ vertices respectively, and a positive integer κ ≤ |B|.
328
+ Question: Is there a subset B′ ⊆ B of cardinality κ that dominates R, i.e., |B′| = κ and every vertex in R has at least one
329
+ neighbor from B′ in the graph G?
330
+ RBDS is NP-hard [23], and from a parameterized complexity point of view it is W[2]-complete with respect to κ [16].
331
+ 2.5
332
+ Remarks
333
+ Most previous studies make the assumption that there are no ties in elections (see, e.g., [26, 29]). Our results are presented
334
+ without this assumption, but all of them still hold when the no-tie assumption is made. This is clear for polynomial-time
335
+ solvability results. Regarding hardness results for voter control problems, some of our reductions can be slightly adapted
336
+ to show the same hardness if the no-tie assumption is adopted, and others directly apply to the case with the no-tie
337
+ assumption. We note that in these problems the no-tie assumption means that after the addition or the deletion of votes
338
+ there are no ties. All our other reductions directly apply to the case with the no-tie assumption, because in these reductions
339
+ the elections constructed do not admit ties and the feasible solutions do not remove the assumption.
340
+ All our reductions take polynomial time. Therefore, a problem shown to be W[2]-hard in the paper is also NP-hard.
341
+ We won’t explicitly state the NP-hardness in the corresponding theorems.
342
+ 3
343
+ Strategic Problems
344
+ In this section, we study the complexity of many strategic voting problems for TSMR.
345
+ 3.1
346
+ Agenda Control and Manipulation
347
+ We first present a P-algorithm for AGENDA CONTROL.
348
+ Theorem 1. Agenda Control for TSMR is in P.
349
+ Proof. Let I = ((C,V), p) be an instance of AGENDA CONTROL. Let G be the majority graph of (C,V). We construct an
350
+ agenda ▷ as follows. Let A = C \(Γ−
351
+ G(p)∪{p}) be the set of candidates which beat or tie with p with respect to V. We
352
+ fill all candidates from A in any arbitrary order before p in the agenda ▷. Then, we fill candidates from Γ−
353
+ G(p) into the
354
+ agenda iteratively as follows. First, let S = A. In each iteration we compute the set S′ = Γ+
355
+ G(S), and fill candidates from S′
356
+ in the subsequent |S′| positions in the agenda ▷ after those from S. Then, we update S := S∪S′. The iterations terminate
357
+ until S′ defined above turned out to be empty.
358
+ After the iterations terminate, if all candidates C are in the agenda ▷, p is the TSMR winner of (C,V) with respect
359
+ to ▷. Thus, in this case, we conclude that I is a Yes-instance. If, however, there are still some candidates not filled in the
360
+ agenda, we conclude that I is a No-instance. The reason is as follows. By the above iterations, in this case it holds that (1)
361
+ none of C \S is beaten by anyone from S, and (2) everyone in C \S beats p. Condition (2) entails everyone in C \S being
362
+ after p in the agenda. However, as long as this is the case, Condition (1) warrants the winning of someone from C\S.
363
+ For COALITION MANIPULATION, we have again a P-algorithm.
364
+ Theorem 2. Coalition Manipulation for TSMR is in P.
365
+ 5
366
+
367
+ Proof. Let I = (C,V), p,▷,k) be an instance of COALITION MANIPULATION. Let B be the set of predecessors of p, and
368
+ let B′ be the set of successors of p in the agenda ▷. Let V ′ be the multiset of k votes with the same preference p −→
369
+ B −→
370
+ B′,
371
+ where −→
372
+ B and −→
373
+ B′ are respectively the linear orders over B and B′ consistent with ▷, i.e., −→
374
+ B = ▷[B] and −→
375
+ B′ = ▷[B′]. If p is
376
+ the TSMR winner of (C,V ∪V ′,▷), we conclude that I is a Yes-instance; otherwise, we conclude that I is a No-instance.
377
+ The algorithm clearly runs in polynomial time. It remains to prove its correctness. To this end, we assume that I is a
378
+ Yes-instance, and to complete the proof it suffices to show that I has a feasible solution V ′ so that every vote in V ′ has the
379
+ same preference p −→
380
+ B −→
381
+ B′. Observe first that I has a feasible solution where p is ranked in the first place in all votes. Let U
382
+ be a feasible solution of I where p is in the top in all votes in U. If U equals V ′ defined above, we are done. Otherwise, we
383
+ show below how to transform U into V ′ without destroying the feasibility of the solution. If there exists at least one vote
384
+ ≻∈ U and two candidates b ∈ B and b′ ∈ B′ so that b′ is ranked immediately before b in ≻, we do the following. Let ≻′
385
+ be the vote obtained from ≻ by swapping b and b′, and let U′ = U \{≻}∪{≻′}. It is easy to verify that every candidate
386
+ who is beaten by at least one of her predecessors with respect to V ∪U is also beaten by at least one of her predecessors
387
+ with respect to V ∪U′, and everyone who is beaten by p with respect to V ∪U is still beaten by p with respect to V ∪U′.
388
+ Therefore, p still wins after the swap of b and b′. After the swapping operations are exhaustively applied, we obtain a
389
+ feasible solution W of I where p is ranked in the top, and all candidates in B are ranked before all candidates in B′ in
390
+ very vote of W. If W = V ′, we are done. Otherwise, there exists at least one vote ≻∈ W such that one of the following
391
+ conditions holds:
392
+ • ∃a,b ∈ B s.t. a is ranked immediately before b in ≻ and b▷a;
393
+ • ∃a′,b′ ∈ B′ s.t. a′ is ranked immediately before b′ in ≻ and b′ ▷a′.
394
+ Then, analogous to the above discussion, we can swap a and b (resp. a′ and b′) in ≻ without changing the winning status
395
+ of p. After the swapping operations are exhaustively used, we eventually obtain V ′.
396
+ 3.2
397
+ Constructive Controls
398
+ In this section, we study constructive control problems for TSMR. We first present results for control by adding/deleting
399
+ votes. We show that these problems are W[2]-hard with respect to several meaningful parameters, for both the special
400
+ case where the distinguished candidate is the first one in the agenda and the case where the distinguished candidate is the
401
+ last one in the agenda.
402
+ Theorem 3. CCAV for TSMR is W[2]-hard with respect to the number of added votes plus the number of registered votes.
403
+ Moreover, this holds even when the distinguished candidate is the first one in the agenda.
404
+ Proof. We prove the theorem via a reduction from RBDS. Let (G = (R∪B,A),κ) be an instance of RBDS. We construct
405
+ an instance of CCAV for TSMR as follows. We create for each vertex in G a candidate denoted by the same symbol
406
+ for simplicity. In addition, we create a candidate p. Let C = B ∪ R ∪ {p}. The agenda is ▷ = (p,−→
407
+ B ,−→
408
+ R ). We create the
409
+ following registered votes:
410
+ • κ votes with the preference ←−
411
+ B ←−
412
+ R p; and
413
+ • one vote with the preference ←−
414
+ R p ←−
415
+ B .
416
+ Let V be the multiset of the above κ + 1 registered votes. We create |B| unregistered votes corresponding to B. In
417
+ particular, for each b ∈ B, we create one vote ≻b with the preference
418
+ p
419
+ �←−
420
+ R \ΓG(b)
421
+
422
+ b
423
+ �←−
424
+ R [ΓG(b)]
425
+ � �←−
426
+ B \{b}
427
+
428
+ .
429
+ Let W be the set of the above |B| unregistered votes. Finally, we set k = κ. The instance of CCAV for TSMR is
430
+ ((C,V ∪W), p,▷,k). In the following we show the correctness of the reduction.
431
+ (⇒) Suppose that there exists B′ ⊆ B such that |B′| = κ and B′ dominates R in G. Let W ′ = {≻b: b ∈ B′} be the
432
+ set of the κ unregistered votes corresponding to B′. We show below that p becomes the TSMR winner of the election
433
+ E = (C,V ∪W ′). Obviously, |V ∪W ′| = 2κ +1. As one of the registered votes ranks p before B, and all the κ votes in W ′
434
+ rank p before B too, there are κ +1 votes in V ∪W ′ ranking p before B. So, none of B is the winner of E . Let us consider
435
+ a candidate r ∈ R. Note that there are κ registered votes which rank B before R. As B′ dominates R, there is at least one
436
+ b ∈ B′ so that r ∈ ΓG(b). By the definition of ≻b, b is ranked before r in ≻b. Therefore, there are in total κ +1 votes in
437
+ V ∪W ′ which rank b before r, precluding the winning of r. As this holds for all r ∈ R, and all candidates from B are before
438
+ all candidates from R in the agenda ▷, none of R is the winner either. This leaves only the possibility that p is the winner.
439
+ (⇐) Suppose that there exists a subset W ′ ⊆ W of at most κ votes so that p is the TSMR winner of (C,V ∪W ′).
440
+ Observe that W ′ must contain exactly κ votes since otherwise someone in B precludes p from winning. Observe that all
441
+ candidates in R beat p with respect to V ∪W ′ no matter which votes are contained in W ′. Furthermore, everyone in R
442
+ beats all her predecessors in R with respect to V ∪W ′. So, if p wins (C,V ∪W ′) it must be that every r ∈ R is beaten by
443
+ 6
444
+
445
+ someone in B. This implies that for every r ∈ R, there is at least one vote in W ′ which ranks some b ∈ B before r. By the
446
+ construction of the unregistered votes, this vote must be ≻b such that b dominates r. it follows that B′ = {b ∈ B :≻b∈ W ′}
447
+ dominates R. This implies that the RBDS instance is a Yes-instance.
448
+ Now we consider the case where the distinguished candidate is the last one in the agenda. Recall that the last one
449
+ in the agenda is the TSMR winner if and only if it is a weak Condorcet winner (Observation 1). The W[1]-hardness of
450
+ CCAV for Condorcet winner established by Liu et al. [29] can be adapted to show the same hardness for weak Condorcet
451
+ winner2. We strengthen the result by establishing a W[2]-hard reduction, excluding the possibility of being complete
452
+ to W[1].
453
+ Theorem 4. CCAV for TSMR is W[2]-hard with respect to the number of added votes plus the number of registered votes
454
+ even when the distinguished candidate is the last one in the agenda.
455
+ Proof. We prove the theorem via a reduction from RBDS. Let (G,κ) be an instance of RBDS, where G = (R∪B,A) is a
456
+ bipartite graph. We create an instance of CCAV as follows. The candidate set is C = R∪{p,q}. Let ▷ = (−→
457
+ R ,q, p). We
458
+ create a multiset V of κ registered votes as follows:
459
+ • κ −1 votes with the preference q p −→
460
+ R ;
461
+ • one vote with the preference q −→
462
+ R p.
463
+ For each b ∈ B we create one unregistered vote ≻b with the preference
464
+ �−→
465
+ R \ΓG(b)
466
+
467
+ p
468
+ �−→
469
+ R [ΓG(b)]
470
+
471
+ q. For a given
472
+ B′ ⊆ B, let W(B′) = {≻b: b ∈ B} be the multiset of unregistered votes corresponding to B′. Let k = κ. The instance of
473
+ CCAV is ((C,V ∪W(B)), p,▷,k). It remains to show the correctness of the reduction.
474
+ (⇒) Assume that there exists B′ ⊆ B such that |B′| = κ and B′ dominates R. Let E = (C,V ∪W(B′)). We show that
475
+ the CCAV instance is a Yes-instance by showing that p is the TSMR winner of E . First, observe that p ties q in E . As B′
476
+ dominates R, for every r ∈ R there is at least one b ∈ B′ which dominates r. This implies that in the vote ≻b∈ W(B′), p is
477
+ ranked before r, and hence p is not beaten by r in E . As p is the last one in the agenda, it follows that p wins E .
478
+ (⇐) Assume that there exists B′ ⊆ B such that |B′| ≤ k = κ and p is the TSMR winner of E = (C,V ∪W(B′)).
479
+ This means that p is not beaten by anyone else in E . Therefore, |B′| = k, since otherwise q beats p. It follows that
480
+ |V ∪W(B′)| = 2κ. Let r ∈ R. As we have exactly κ −1 registered votes ranking p before r in V, there is at least one b ∈ B′
481
+ so that p is ranked before r in the vote ≻b. By the definition of ≻b, this implies that b dominates r. It follows that B′
482
+ dominates R. Thus, the RBDS instance is a Yes-instance.
483
+ Let us move on to constructive control by deleting votes. In this case we have two natural parameters: the solution
484
+ size k and its dual parameter n−k where n is the number of votes. We show that the problem is W[2]-hard with respect
485
+ to both parameters, even when the distinguished candidate is the first or the last one in the agenda. The following four
486
+ theorems summarize these results.
487
+ Theorem 5. CCDV for TSMR is W[2]-hard with respect to the number of deleted votes even when the distinguished
488
+ candidate is the first one in the agenda.
489
+ Proof. We prove the theorem via a reduction from RBDS. Let (G,κ) be an instance of RBDS where G = (B ∪ R,A) is
490
+ a bipartite graph. We assume that G does not contain any isolated vertices, κ ≥ 4, and every red vertex is of degree ℓ
491
+ where ℓ ≥ 1. These assumptions do not change the W[2]-hardness of the problem. 3 We construct an instance of CCDV
492
+ as follows. The candidate set is C = R∪{p,q,q′}, and the agenda is ▷ = (p,q′,−→
493
+ R ,q). We create the following six groups
494
+ of votes:
495
+ • a multiset V1 of ℓ+1 votes with the preference
496
+ q′ p q ←−
497
+ R ;
498
+ • a multiset V2 of κ +ℓ−2 votes with the preference
499
+ q p ←−
500
+ R q′;
501
+ • a multiset V3 of |B|−κ +1 votes with the preference
502
+ ←−
503
+ R p q q′;
504
+ 2For this, we mean the problem of determining if we can add a limited number of votes to make a particular candidate a weak Condorcet winner.
505
+ 3The assumption that G does not contain any isolated vertices and κ ≥ 4 are clear. If an instance does not satisfy the second assumption, we can
506
+ obtain an equivalent instance by the following operation: letting ℓ be the maximum degree of vertices in R, for each red vertex r ∈ R of degree strictly
507
+ smaller than ℓ, we create new degree-1 vertices adjacent only to r until r has degree exactly ℓ. An important observation for the equivalency to the two
508
+ instances is that there is an optimal solution (a subset B′ ⊆ B dominating R with the minimum cardinality) of the new instance which does not contain
509
+ any of the newly introduced degree-1 vertices.
510
+ 7
511
+
512
+ • a singleton V4 of one vote with the preference
513
+ ←−
514
+ R q p q′;
515
+ • a multiset V5 of κ −2 votes with the preference
516
+ ←−
517
+ R q′ p q;
518
+ • for every blue vertex b ∈ B, we create one vote ≻b with the preference
519
+ q q′ �←−
520
+ R [ΓG(b)]
521
+
522
+ p
523
+ �←−
524
+ R \ΓG(b)
525
+
526
+ .
527
+ Let V denote the multiset of the above 2|B| + κ + 2ℓ − 1 votes. For a given B′ ⊆ B, let V(B′) = {≻b: b ∈ B′} be the
528
+ multiset of votes created for vertices in B′. We complete the construction by setting k = κ. The instance of CCDV is
529
+ ((C,V), p,▷,k) which can be constructed in polynomial time. It remains to show the correctness of the reduction.
530
+ (⇒) Assume that there exists B′ ⊆ B such that |B′| = κ and B′ dominates R. Let E = (C,V \V(B′)). We show below
531
+ that p is the TSMR winner of E with respect to the agenda ▷. To this end, it suffices to show that p beats everyone else
532
+ in E . Let r ∈ R. As B′ dominates R, there exists b ∈ B′ such that b dominates r, and thus ≻b ranks r before p. As there are in
533
+ total |B|−ℓ votes in V(B) ranking p before r, we know that there are at least |B|−ℓ−κ +1 votes in V(B)\V(B′) ranking p
534
+ before r. As all votes in V1 ∪V2 rank p before all candidates in R, there are at least |B|−ℓ−κ +1+ℓ+κ +ℓ−1 = |B|+ℓ
535
+ votes ranking p before r in E . As |V \V(B′)| = 2|B|+2ℓ−2, we know that p beats r in E . It is easy to verify that there
536
+ are |B|+ℓ votes ranking p before q and q′ in V \V(B′), meaning that p beats both q and q′ in E too. In summary, p beats
537
+ everyone else in the election E and hence is the winner of E .
538
+ (⇐) Assume that there exists V ′ ⊆ V such that |V ′| ≤ k = κ and p is the TSMR winner of E = (C,V \V ′). Observe
539
+ that by the construction of the votes and the assumption that κ ≥ 4, no matter which at most k votes are contained in V ′,
540
+ every candidate in C \ {p} beats all her predecessors in C \ {p}. Then, as p is the first candidate in the agenda and p
541
+ wins E , we know that p beats all the other candidates. It follows that V ′ and V1 ∪V3 ∪V5 are disjoint and |V ′| = κ, since
542
+ otherwise p cannot beat q in E . Similarly, it holds that V ′ and V2 ∪V4 are disjoint, since otherwise p cannot beat q′. As
543
+ a consequence, it holds that V ′ ⊆ V(B). Without loss of generality, let B′ ⊆ B be such that V(B′) = V ′. We claim that B′
544
+ dominates R. Assume, for the sake of contradiction, that this is not the case. Let r ∈ R be a red vertex not dominated by
545
+ any vertex in B′. Then, by the construction of the votes, all votes in V(B′) rank p before r. This implies that there are in
546
+ total at most |B| − ℓ − κ + |V1 ∪V2| = |B| + ℓ − 1 votes ranking p before r in E . In other words, p is beaten by r in E .
547
+ However, in this case p cannot be the TSMR winner of E , a contradiction.
548
+ Theorem 6. CCDV for TSMR is W[2]-hard with respect to the number of votes not deleted even when the distinguished
549
+ candidate is the first one in the agenda.
550
+ Proof. We prove the theorem via a reduction from RBDS. Let (G,κ) be an instance of RBDS where G = (B ∪ R,A)
551
+ is a bipartite graph. As in the proof of Theorem 5, we assume that every red vertex has degree exactly ℓ for some
552
+ positive integer ℓ. We construct an instance of CCDV as follows. The candidate set is C = R∪{p,q}, and the agenda is
553
+ ▷ = (p,−→
554
+ R ,q). We create the following three groups of votes:
555
+ • a multiset V1 of κ votes with the preference p q ←−
556
+ R ;
557
+ • a singleton V2 of one vote with the preference ←−
558
+ R p q;
559
+ • for every blue vertex b ∈ B, one vote ≻b with the preference
560
+ q
561
+ �←−
562
+ R \ΓG(b)
563
+
564
+ p
565
+ �←−
566
+ R [ΓG(b)]
567
+
568
+ .
569
+ Let V denote the multiset of the above |B|+κ +1 votes. For a given B′ ⊆ B, we use V(B′) = {≻b: b ∈ B′} to denote the
570
+ multiset of votes corresponding to B′. We complete the construction by setting k = |B| − κ. The instance of CCDV is
571
+ ((C,V), p,▷,k), which can be constructed in polynomial time. It remains to show the correctness of the reduction.
572
+ (⇒) Assume that there exists B′ ⊆ B such that |B′| = κ and B′ dominates R. Let E = (C,V1 ∪V(B′)). We show below
573
+ that p is the TSMR winner of E with respect to the agenda ▷. To this end, it suffices to show that p beats everyone else
574
+ in E . Let r ∈ R. As B′ dominates R, there is at least one b ∈ B′ such that b dominates r, and hence ≻b ranks p before r.
575
+ Therefore, in total there are κ + 1 votes in E ranking p before r. Clearly, there are κ + 1 votes in E ranking p before q.
576
+ As |V1 ∪V(B′)| = 2κ +1, we know that p beats all the other candidates in E , and hence p is the winner of E .
577
+ (⇐) Assume that there exists V ′ ⊆ V such that |V ′| ≤ k = |B| − κ and p is the TSMR winner of the election E =
578
+ (C,V \V ′). Observe first that V ′ ⊆ V(B) and |V ′| = k, since otherwise q is not beaten by any of her predecessors, leading
579
+ to q winning E , a contradiction. So, without loss of generality, let B′ ⊆ B be such that |B′| = k = |B|−κ and V(B′) = V ′.
580
+ Let B = B \ B′. Obviously, |B| = κ and |V \V ′| = 2κ + 1. By the construction of the votes, no matter which k votes
581
+ are contained in V(B′), everyone from C \ {p} beats all her predecessors in C \ {p}. As p is the first candidate in the
582
+ 8
583
+
584
+ agenda, the winning of p in E implies that p beats all the other candidates. We claim that B dominates R. Assume, for the
585
+ sake of contradiction, that this is not the case. Let r ∈ R be a red vertex not dominated by any vertex in B. Then, by the
586
+ construction of the votes, all votes in V(B) rank r before p. As the only vote in V2 also ranks r before p, there are in total
587
+ |B|+1 = κ +1 votes ranking r before p in E , contradicting that p beats r in E .
588
+ Theorem 7. CCDV for TSMR is W[2]-hard with respect to the number of deleted votes. This holds even if the distin-
589
+ guished candidate is the last one in the agenda.
590
+ Proof. We prove the theorem by a reduction from RBDS. Let (G,κ) be an instance of RBDS, where G = (R∪B,A) is a
591
+ bipartite graph. We assume that G does not contain any isolated vertices, κ ≥ 4, and every red vertex is of degree ℓ where
592
+ ℓ ≥ 1. These assumptions do not change the W[2]-hardness of the problem.4 Let C = R∪{p,q}, and let ▷ be an agenda
593
+ over C where p is the last one (the relative orders of other candidates do not matter). We create the following 2|B|+2ℓ+κ
594
+ votes in V:
595
+ • |B|+1 votes with the preference ←−
596
+ R p q;
597
+ • ℓ+κ votes with the preference q p ←−
598
+ R ;
599
+ • ℓ−1 votes with the preference p q ←−
600
+ R ; and
601
+ • for each blue vertex b ∈ B, one vote ≻b with the preference
602
+ q
603
+ �←−
604
+ R [ΓG(b)]
605
+
606
+ p
607
+ �←−
608
+ R \ΓG(b)
609
+
610
+ .
611
+ For a given B′ ⊆ B, let V(B′) = {≻b: b ∈ B′} be the multiset of votes corresponding to B′. Finally, we set k = κ. The
612
+ instance of CCDV is ((C,V), p,▷,k). In the following, we prove the correctness of the reduction.
613
+ (⇒) Assume that there exists B′ ⊆ B of cardinality κ such that B′ dominates R. Let E = (C,V \V(B′)). Clearly,
614
+ |V \V(B′)| = 2|B| + 2ℓ. We show below that p is not beaten by anyone else in E and hence is the TSMR winner of E .
615
+ As all votes in V(B′) rank q before p, it holds that nV\V(B′)(p,q) = (|B| + 1) + (ℓ − 1) = |B| + ℓ, meaning that p ties q
616
+ in E . Moreover, as B′ dominates R, for every r ∈ R, there exists b ∈ B′ dominating r. By the construction of the votes, r is
617
+ ranked before p in the vote ≻b∈ V(B′). It follows that at most κ −1 votes in V(B′) rank p before r. By the construction
618
+ of the votes, we know that there are at least (ℓ + κ) + (ℓ − 1) + (|B| − ℓ) − (κ − 1) = |B| + ℓ votes ranking p before r
619
+ in V \V(B′), implying that p ties r in E .
620
+ (⇐) Assume there exists V ′ ⊆ V such that |V ′| ≤ k and p is the TSMR winner of E = (C,V \V ′) with respect to ▷.
621
+ As p is the last one in the agenda, it holds that p beats or ties everyone else in E . As a consequence, all votes in V ′ must
622
+ rank q before p and, moreover, it must be that |V ′| = k = κ, since otherwise p is beaten by q in E . There are two groups of
623
+ votes ranking q before p: those corresponding to the blue vertices, and those with the preference q p ←−
624
+ R . We may assume
625
+ that all votes in V ′ are from V(B). Indeed, if V ′ contained some vote with the preference q p ←−
626
+ R , we can obtain another
627
+ feasible solution V ′′ from V ′ by replacing this vote with any vote in V(B)\V ′. Let r ∈ R. As nV(r, p) = (|B|+1)+ℓ and
628
+ |V \V ′| = 2|B| + 2ℓ, we know that there is at least one vote ≻b∈ V ′ which ranks r before p. By the reduction, we know
629
+ that the vertex b corresponding to ≻b dominates r. It is clear now that B′ = {b ∈ B :≻b∈ V ′} dominates R, implying that
630
+ the RBDS instance is a Yes-instance.
631
+ Theorem 8. CCDV for TSMR is W[2]-hard with respect to the number of votes not deleted. This holds even when the
632
+ distinguished candidate is the last one in the agenda.
633
+ Proof. We prove the theorem by a reduction from RBDS. Let (G,κ) be an instance of RBDS, where G is a bipartite
634
+ graph with the vertex bipartition (R,B). We create an instance of CCDV as follows. Let C = R ∪ {q, p}. Let ▷ be an
635
+ agenda over C where p is in the last position. We create the following votes:
636
+ • a multiset V1 of κ −1 votes with the preference p q −→
637
+ R ;
638
+ • a singleton V2 of one vote with the preference −→
639
+ R p q; and
640
+ • for each blue vertex b ∈ B, one vote ≻b with the preference
641
+ q
642
+ �−→
643
+ R \ΓG(b)
644
+
645
+ p
646
+ �−→
647
+ R [ΓG(b)]
648
+
649
+ .
650
+ 4The assumption that G does not contain any isolated vertices and κ ≥ 4 are clear. If an instance does not satisfy the second assumption, we can
651
+ obtain an equivalent instance by the following operation: letting ℓ be the maximum degree of vertices in R, for each red vertex r ∈ R of degree strictly
652
+ smaller than ℓ, we create new degree-1 vertices adjacent only to r until r has degree exactly ℓ. An important observation for the equivalency to the two
653
+ instances is that there is an optimal solution (a subset B′ ⊆ B dominating R with the minimum cardinality) of the new instance which does not contain
654
+ any of the newly introduced degree-1 vertices.
655
+ 9
656
+
657
+ For a given B′ ⊆ B, we use V(B′) = {≻b: b ∈ B′} to denote the set of votes created for the blue vertices in B′. Let
658
+ V = V1 ∪V2 ∪V(B). Clearly, |V| = |B|+κ. Finally, let k = |B|−κ. The instance of CCDV is ((C,V), p,▷,k). We prove
659
+ the correctness as follows.
660
+ (⇒) Assume that there exists B′ ⊆ B such that |B′| = κ and B′ dominates R. Let V ′ = V1 ∪V2 ∪V(B′), and let
661
+ E = (C,V ′). We claim that p is the TSMR winner of E . As p is the last candidate in the agenda, it suffices to show that p
662
+ is not beaten by any other candidates in E . It is clear that p ties q in E . Let r ∈ R be a red vertex. As B′ dominates R,
663
+ there exists b ∈ B′ dominating r. From the construction of the votes, p is ranked before r in the vote ≻b. Therefore, there
664
+ are at least |V1|+1 = κ votes ranking p before r in V ′, implying that p is not beaten by r. As this holds for all r ∈ R, the
665
+ correctness for this direction follows.
666
+ (⇐) Assume that there exists V ′ ⊆ V so that |V ′| ≥ 2κ and p is the TSMR winner of (C,V ′). As |V1| + |V2| = κ
667
+ and all votes in V(B) rank q in the first place, it must be that (V1 ∪V2) ⊆ V ′ and V ′ contains exactly κ votes from V(B),
668
+ since otherwise q will be the winner of (C,V ′), contradicting the winning of p. Let V(B′) = V ′ ∩V(B), where B′ ⊆ B.
669
+ As just discussed, |V(B′)| = κ. We claim that B′ dominates R. Suppose for contradiction that this is not the case. Then,
670
+ there exists r ∈ R not dominated by any vertex in B′. From the construction of the votes, r is ranked before p in all votes
671
+ of V(B′). Together with the vote in V2, there are κ +1 votes in V ′ ranking r before p, meaning that r beats p. However, in
672
+ this case, p cannot be the winner of (C,V ′), a contradiction. As |B′| = κ, the RBDS instance is a Yes-instance.
673
+ Let us now explore the complexity landscape of constructive control by adding or deleting candidates. Unlike voter
674
+ controls, we have only one hardness result as stated in the following theorem.
675
+ Theorem 9. CCAC for TSMR is W[2]-hard with respect to the number of added candidates. This holds even when the
676
+ distinguished candidate is the first one in the agenda.
677
+ Proof. We prove the theorem via a reduction from RBDS. Let (G = (R∪B,A),κ) be an instance of RBDS. We construct
678
+ an instance of CCAC for TSMR as follows. For each vertex in G we create one candidate denoted by the same symbol
679
+ for notational simplicity. In addition, we create a distinguished candidate p. Let C = R∪{p} and let D = B. Besides, let
680
+ k = κ and let ▷ = (p,−→
681
+ B ,−→
682
+ R ). We create a multiset V of votes in some way so that
683
+ • everyone in R beats all her predecessors in R∪{p};
684
+ • p beats everyone in B; and
685
+ • for each r ∈ R and each b ∈ B, if b dominates r in G, then b beats r; otherwise, r beats b.
686
+ By the famous McGarvey’s theorem [31] such votes can be constructed in polynomial time. The instance of CCAC
687
+ for TSMR is ((C ∪D,V), p,▷,k).
688
+ The correctness of the reduction is easy to see. In particular, if there exists B′ ⊆ B of κ vertices dominating R, then
689
+ after adding the candidates corresponding to B′, every r ∈ R has at least one predecessor from B′ who beats her, excluding
690
+ the winning of r. Candidates in B′ cannot win as they are beaten by p. Therefore, after adding these candidates, p becomes
691
+ the winner. If, however, the RBDS instance is a No-instance, no matter which at most k candidates from B are added,
692
+ there is at least one candidate in R who beats all her predecessors in the resulting election. In this case we cannot add at
693
+ most k candidates to make p the winner.
694
+ When the distinguished candidate is the last one in the agenda, we have the following corollary as a consequence of
695
+ Observation 1 and the immunity of weak Condorcet to CCAC [4].
696
+ Corollary 1. If the distinguished candidate is the last in the agenda, TSMR is immune to CCAC.
697
+ For CCDC, a greedy P-algorithm can be easily obtained.
698
+ Theorem 10. CCDC for TSMR is in P.
699
+ Proof. Let I = ((C,V), p,▷,k) be an instance of CCDC. To solve I, we first remove all predecessors of p in ▷ who beat p
700
+ with respect to V. Then, we iteratively remove each successor c of p so that c is not beaten by any of her predecessors.
701
+ After the removals, p becomes the TSMR winner. We conclude that I is a Yes-instance if and only if at most k candidates
702
+ are removed in total.
703
+ 3.3
704
+ Destructive Controls
705
+ Now we start the exploration on destructive control problems. One may expect more tractability results, because destruc-
706
+ tive controls are generally easy to solve compared with their constructive counterparts. Nevertheless, let us start with a
707
+ hardness result.
708
+ Theorem 11. DCAV for TSMR is W[2]-hard with respect to the number of added votes plus the number of registered
709
+ votes. Moreover, this holds even when the distinguished candidate is the first one in the agenda.
710
+ 10
711
+
712
+ Proof. We prove the theorem via a reduction from RBDS. Let (G = (R∪B,A),κ) be an instance of RBDS. We construct
713
+ an instance of DCAV for TSMR as follows. Let C = R∪{p,q} and let ▷ = (p,−→
714
+ R ,q). We create the following registered
715
+ votes:
716
+ • κ −1 votes with the preference p q −→
717
+ R .
718
+ • two votes with the preference p −→
719
+ R q.
720
+ • one vote with the preference q p −→
721
+ R .
722
+ Let V be the multiset of the above κ +2 registered votes. The unregistered votes are created according to B. In particular,
723
+ for each b ∈ B, we create one vote ≻b with the preference
724
+ �−→
725
+ R \ΓG(b)
726
+
727
+ q p
728
+ �−→
729
+ R [ΓG(b)]
730
+
731
+ .
732
+ For a given B′ ⊆ B, let W(B′) = {≻b: b ∈ B′} be the multiset of unregistered votes corresponding to B′. For simplicity,
733
+ let W = W(B) be the set of the above |B| unregistered votes. Let k = κ. The instance of DCAV is ((C,V ∪W), p,▷,k).
734
+ We prove the correctness of the reduction as follows.
735
+ (⇒) Suppose that there is a B′ ⊆ B of κ vertices which dominate R in G. Then, one can check that q beats or ties every
736
+ other candidate with respect to V ∪W(B′), implying that q is the winner of (C,V ∪W(B′)). Thus, in this case the instance
737
+ of DCAV is a Yes-instance.
738
+ (⇐) Suppose that there exists a subset W ′ ⊆W of at most k votes so that p is not the TSMR winner of E = (C,V ∪W ′).
739
+ Observe that no matter which at most k votes are contained in W ′, p beats all candidates in R, implying that the only
740
+ candidate which is able to preclude p from winning is q. As q is the last candidate in the agenda ▷, q is the winner if
741
+ and only if q beats or ties everyone else. This implies that W ′ contains exactly κ votes since otherwise p beats q in E .
742
+ Moreover, for each r ∈ R, at least one vote in W ′ ranks q before r. By the construction of the unregistered votes, an
743
+ unregistered vote ≻b ranks q before r if and only if b dominates r in G. This implies that the set of vertices corresponding
744
+ to W ′ dominates R, and hence the instance of RBDS is a Yes-instance.
745
+ It is known that DCAV and DCDV for weak Condorcet winner is polynomial-time solvable [24]. By Observation 1,
746
+ we have the following corollary.
747
+ Corollary 2 ([24]). DCAV and DCDV for TSMR are in P if the distinguished candidate is in the last position of the
748
+ agenda.
749
+ However, the complexity of DCDV increases if the distinguished candidate is not the last one in the agenda.
750
+ Theorem 12. DCDV for TSMR is W[2]-hard with respect to the number of deleted votes. This holds as long as the
751
+ distinguished candidate is not the last one in the agenda.
752
+ Proof. The reduction is the same as the one in the proof of Theorem 7 with only the difference that q is the distinguished
753
+ candidate. The correctness hinges upon the fact that no matter which at most k votes are deleted, q beats all candidates
754
+ in R, which leaves p the unique candidate preventing q from winning and, moreover, this holds as long as q is not the last
755
+ one in the agenda.
756
+ Parameterizing by the dual parameter of the solution size yields the same result.
757
+ Theorem 13. DCDV is W[2]-hard with respect to the number of votes not deleted. This holds as long as the distinguished
758
+ candidate is not the last one in the agenda.
759
+ Proof. The reduction is the same as the one in the proof of Theorem 8 with only the difference that q is the distinguished
760
+ candidate. The correctness arguments are the same as in the proof of Theorem 12.
761
+ For destructive control by modifying candidates, we have polynomial-time solvability results, regardless of the posi-
762
+ tion of the distinguished candidate in the agenda.
763
+ Theorem 14. DCAC for TSMR is in P.
764
+ Proof. Let I = ((C ∪D,V), p,▷,k) be an instance of DCAC. We assume that k ≥ 1 and p is the winner of (C,V), since
765
+ otherwise I can be solved trivially. Our algorithm goes as follows.
766
+ As p wins (C,V), p is not beaten by any of her predecessors, and each successor c ∈ C \ {p} of p is beaten by at
767
+ least one of c’s predecessors. If there exists c ∈ D which is before p in the agenda and beats p, we conclude that I is a
768
+ Yes-instance because p does not win (C ∪{c},V). Additionally, if there exists c ∈ D so that p▷c, and c is not beaten by
769
+ any of her predecessors in C, we also determine I to be a Yes-instance, since p does not win (C ∪{c},V). If neither of the
770
+ two cases occurs, then no matter which unregistered candidates are added, p remains the winner. Therefore, in this case,
771
+ we conclude that I is a No-instance.
772
+ The following result is a consequence of Theorem 10.
773
+ Corollary 3. DCDC for TSMR is in P.
774
+ 11
775
+
776
+ 4
777
+ Possible and Necessary Winner
778
+ In this section, we study NECESSARY WINNER and POSSIBLE WINNER for TSMR. Bredereck et al. [8] showed that
779
+ except NECESSARY WINNER for the successive rule which is polynomial-time solvable, other cases of the two problems
780
+ for the successive and the amendment rules are computationally hard (NP-hardness for POSSIBLE WINNER and coNP-
781
+ hardness for NECESSARY WINNER). We show below that TSMR behaves the same as the successive rule in terms
782
+ their complexity of determining possible and necessary winners, though the proofs for these results for the two rules are
783
+ different.
784
+ Theorem 15. Necessary Winner for TSMR is in P.
785
+ Proof. Let I = ((C,V), p,▷) be an instance of NECESSARY WINNER. We determine if there is a completion of (C,V)
786
+ and a completion of the agenda ▷ so that p is not the TSMR winner of the completion. Note that p is not the winner if
787
+ and only if
788
+ (1) either some of her predecessor beats her,
789
+ (2) or some of her successor c is not beaten by any of the predecessors of c.
790
+ We consider first if there is a completion leading to the occurrence of Case 1. For this purpose, let B = {c ∈ C \{p} :
791
+ (p,c) ̸∈ ▷} be the set of all candidates that can be predecessors of p in some completion of ▷. We consider candidates
792
+ in B one by one, and for each considered c ∈ B, we greedily complete the preference profile to determine if there exists at
793
+ least one completion so that c beats p. More precisely, for every partial vote ≻∈ V such that (p,c) ̸∈≻, we complete it so
794
+ that c is ranked before p. If in the completion of (C,V) obtained this way c beats p, we conclude that I is a No-instance.
795
+ If we cannot draw the conclusion that I is a No-instance above, we consider whether it is possible to male the second
796
+ case happen. To this end, we enumerate all candidates which can be successors of p in some completion of the partial
797
+ agenda. More precisely, these candidates are those in B′ = {c ∈ C \ {p} : (c, p) ̸∈ ▷}. For each enumerated c ∈ B′, we
798
+ compute the minimum set Ac of candidates that can be successors of c under the restriction that p is before c in the agenda,
799
+ and then we greedily complete the preference profile to check if they can be completed so that c is not beaten by anyone
800
+ in Ac. More precisely, for each enumerated c ∈ B′, we compute Ac = {c′ ∈C : (c′,c) ∈ ▷}, and for each partial vote ≻∈V,
801
+ we complete ≻ so that c is ranked as higher as possible, i.e., we complete ≻ so that c is ranked below all candidates in
802
+ {c′ ∈ C : (c′,c) ∈≻} and is above all the other candidates. If in the completion c is not beaten by anyone from Ac, we
803
+ conclude that I is a No-instance.
804
+ If none of the above enumerations provides us a conclusion that I is a No-instance, we conclude that I is a Yes-
805
+ instance.
806
+ Unlike the above problems, we show that POSSIBLE WINNER becomes NP-hard.
807
+ Theorem 16. Possible Winner for TSMR is NP-hard, even if the given agenda is complete and the distinguished candidate
808
+ is the first one in the agenda.
809
+ Proof. We prove the theorem via a reduction from RBDS. Let (G,κ) be an instance of RBDS where G is a bipartite
810
+ graph with the partition (B,R). We assume that G does not contain any isolated vertices, and all vertices in R have the
811
+ same degree ℓ where ℓ ≥ 1. We create an instance of POSSIBLE WINNER for TSMR as follows. Let C = R∪{p,q} and
812
+ let ▷ = (p,q,−→
813
+ R ). We create five groups of votes as follows, where only the first group of votes are incomplete:
814
+ • for each b ∈ B, one partial vote ≻b with the following partial preference
815
+ �←−
816
+ R [ΓG(b)]
817
+
818
+ p
819
+ �←−
820
+ R \ΓG(b)
821
+
822
+ and
823
+ q
824
+ �←−
825
+ R \ΓG(b)
826
+
827
+ ;
828
+ • a multiset V1 of |B| votes with the preference ←−
829
+ R q p;
830
+ • a multiset V2 of 2ℓ+κ votes with the preference q ←−
831
+ R p;
832
+ • a multiset V3 of ℓ+2κ +1 votes with the preference ←−
833
+ R p q;
834
+ • a multiset V4 of ℓ+κ votes with the preference p q ←−
835
+ R .
836
+ Let V(B) = {≻b: b ∈ B} be the set of the |B| partial votes in the first group. Let V be the multiset of the above 2|B| +
837
+ 4ℓ + 4κ + 1 votes, and let V(B) = V \V(B). The instance of POSSIBLE WINNER is ((C,V), p,▷). Clearly, the above
838
+ construction can be done in polynomial time. We show below that the RBDS instance is a Yes-instance if and only if the
839
+ constructed POSSIBLE WINNER instance is a Yes-instance.
840
+ (⇒) Suppose that there is a subset B′ ⊆ B such that |B′| = κ and B′ dominates R. We complete each ≻b where b ∈ B
841
+ as follows:
842
+ • if b ∈ B′, we complete it as q
843
+ �←−
844
+ R [ΓG(b)]
845
+
846
+ p
847
+ �←−
848
+ R \ΓG(b)
849
+
850
+ ,
851
+ 12
852
+
853
+ • otherwise, we complete it as
854
+ �←−
855
+ R [ΓG(b)]
856
+
857
+ p q
858
+ �←−
859
+ R \ΓG(b)
860
+
861
+ .
862
+ It is fairly easy to verify that with respect to the completion p beats q, and q beats all candidates in R. Then, by the
863
+ definition of the agenda, p is the TSMR winner with respect to the above completion of (C,V).
864
+ (⇐) Suppose that there is a completion V ′ of V(B) so that p wins the completion E = (C,V(B) ∪V ′) of (C,V).
865
+ Observe that in all completions of (C,V), everyone in R beats all her predecessors in R ∪ {p}. Then, by the definition
866
+ of the agenda, and the fact that p wins E , it holds that (1) q beats all candidates in R, and (2) q is beaten by p in E .
867
+ As V(B) contains exactly 2ℓ+3κ +1 votes (those in V3 ∪V4) ranking p before q, Condition (2) implies that there are at
868
+ least |B| − κ votes in V ′ ranking p before q. Let B′ be the subset of B corresponding to votes in V ′ ranking p before q,
869
+ and let B′′ = B \ B′. Clearly, |B′′| ≤ κ. We show below that Condition (1) implies that B′′ dominates R. For the sake
870
+ of contradiction, assume that there exists r ∈ R not dominated by any vertex in B′′. In other words, all the ℓ neighbors
871
+ of r in G are contained in B′. This implies that there are ℓ votes in V ′ (the ℓ completions of votes corresponding to the ℓ
872
+ neighbors of r) ranking r before q. Together with the |B|+ℓ+2κ +1 votes (V1 ∪V3) in V(B) ranking r before q, we have
873
+ |B| + 2ℓ + 2κ + 1 votes ranking r before q, implying that r beats q in E . However, this is impossible since otherwise r
874
+ beats all her predecessors in E which contradicts that p wins E . This completes the proof that B′′ dominates R. Then,
875
+ from |B′′| ≤ κ, we know that the RBDS instance is a Yes-instance.
876
+ Our reduction in the proof of Theorem 16 is completely different from those used in [8] for showing the NP-hardness
877
+ of POSSIBLE WINNER for the successive and the amendment rules. In fact, their reductions are from the INDEPENDENT
878
+ SET and VERTEX COVER problems, while our reduction is from RBDS. Moreover, in their reductions for POSSIBLE
879
+ WINNER under the successive and the amendment rules the distinguished candidate is respectively the penultimate and
880
+ the third candidates in the agenda. Our reduction can be adapted to show the NP-hardness of POSSIBLE WINNER for
881
+ TSMR when the distinguished candidate is the i-th candidate in the agenda for every constant i, by adding i−1 dummy
882
+ candidates before p in the agenda, and ranking all of them below all the other candidates in all votes.
883
+ Notice that POSSIBLE WINNER for TSMR becomes polynomial-time solvable if the given agenda is complete and p
884
+ is the last one in the agenda. This follows from Observation 1 and the polynomial-time solvability of determining if a
885
+ partial election can be completed so that a candidate becomes a (weak) Condorcet winner [28].5 By Observation 1, the
886
+ result in [28] also implies that POSSIBLE WINNER for the amendment rule becomes polynomial-time solvable if the given
887
+ agenda is complete and p is in the top-2 positions , and their algorithm also applies to the determination for the winning
888
+ of a particular candidate as a weak Condorcet winner. So, there is a radical complexity shift for the amendment rule as
889
+ the distinguished candidate moves from the second place to the third place in the agenda. Our next result also reveals a
890
+ seamless complexity shift for TSMR as p moves from the last position just one position up.
891
+ Theorem 17. Possible Winner for TSMR is NP-hard even when the given agenda is complete with the distinguished
892
+ candidate being the penultimate candidate in the agenda.
893
+ Proof. We prove the theorem via a reduction from RBDS. Let (G,κ) be an instance of RBDS where G = (B ∪ R,A) is
894
+ a bipartite graph and 1 ≤ κ ≤ |B|. Similar to the previous proofs, we assume that every red vertex has degree exactly ℓ
895
+ where ℓ > 0 in the graph G. We construct an instance of POSSIBLE WINNER as follows. Let C = R ∪ {p,q,q′} and let
896
+ ▷ = (q′,−→
897
+ R , p,q). We create five groups of votes where only the first group of contains partial votes.
898
+ • For every b ∈ B, we create one partial vote ≻b with the following partial preference
899
+ �−→
900
+ R \ΓG(b)
901
+
902
+ q′
903
+ and
904
+ q p
905
+ �−→
906
+ R [ΓG(b)]
907
+
908
+ .
909
+ Let V(B) be the set of the |B| partial votes corresponding to B.
910
+ • We create a multiset V1 of |B|+1 votes with the preference
911
+ q′ q −→
912
+ R p.
913
+ • We create a multiset V2 of 2κ votes with the preference
914
+ q p −→
915
+ R q′.
916
+ • We create a multiset V3 of κ votes with the preference
917
+ q p q′ −→
918
+ R .
919
+ 5The result in [28] is for Condorcet winner but the algorithm also accommodates weak Condorcet winner.
920
+ 13
921
+
922
+ • Finally, we create a multiset V4 of κ votes with the preference
923
+ −→
924
+ R p q′ q.
925
+ Let V be the multiset of the above 2|B| + 4κ + 1 votes, and let V(B) = V \V(B). The instance of POSSIBLE WINNER
926
+ is ((C,V), p,▷) which can be constructed in polynomial time. In the following, we prove that the RBDS instance is a
927
+ Yes-instance if and only if the constructed instance of POSSIBLE WINNER is a Yes-instance.
928
+ (⇒) Suppose that there is a subset B′ ⊆ B such that |B′| = κ, and B′ dominates R. We complete each vote ≻b∈ V(B)
929
+ as follows.
930
+ • if b ∈ B′, we complete it as
931
+ �−→
932
+ R \ΓG(b)
933
+
934
+ q′ q p
935
+ �−→
936
+ R [ΓG(b)]
937
+
938
+ ,
939
+ • otherwise, we complete it as
940
+ q p
941
+ �−→
942
+ R \ΓG(b)
943
+
944
+ q′ �−→
945
+ R [ΓG(b)]
946
+
947
+ .
948
+ It is easy to verify that after completing votes as above, p beats all her predecessors in ▷, and q is beaten by her predeces-
949
+ sor q′, which implies that p is the TSMR winner of the completion.
950
+ (⇐) Assume that there is a completion V ′ of V(B) so that p wins the election E = (C,V(B) ∪V ′). Observe that no
951
+ matter how we complete the votes, q beats all her predecessors except q′. As p wins E , it must be that q′ beats q in E .
952
+ This implies that there are at least κ partial votes in V(B) which are completed so that q′ is ranked before q. There is only
953
+ one such completion for each partial vote ≻b∈ V(B), i.e., the completion with the preference
954
+ �−→
955
+ R \ΓG(b)
956
+
957
+ q′ q p
958
+ �−→
959
+ R [ΓG(b)]
960
+
961
+ .
962
+ Let B′ ⊆ B be such that the partial votes corresponding to B′ are completed this way. As just discussed, |B′| ≥ κ. Without
963
+ loss of generality, let us assume that |B′| = κ +t for some nonnegative integer t. Observe further that as p wins E and |V|
964
+ is odd, p beats all candidates in R. For every r ∈ R, there are in total 3κ votes in V(B) (precisely, votes in V2 ∪V3) which
965
+ rank p before r. This implies there are at least |B| − κ + 1 completions of partial votes in V(B) which rank p before r.
966
+ Then, from |B \ B′| = |B| − κ −t, it follows that there are at least t + 1 completions of partial votes corresponding to B′
967
+ where p is ranked before r. By the definitions of these completions, p is ranked before r in a completion corresponding
968
+ to some b ∈ B′ if and only if r is a neighbor of b in G. Therefore, every r ∈ R has at least t + 1 neighbors in B′ in the
969
+ graph G. Then, by removing any arbitrary t vertices from B′, we obtain a κ-subset of B that dominate R, and hence the
970
+ RBDS instance is a Yes-instance.
971
+ It would be interesting to see if similar complexity shift also applies to the successive rule. This mounts to determining
972
+ the complexity of POSSIBLE WINNER for the successive rule when the agenda is compete with the distinguished candidate
973
+ being the last one. We leave it as an open question.
974
+ 5
975
+ Conclusion
976
+ We conducted the (parameterized) complexity of many well-motivated voting problems under the recently proposed voting
977
+ rule TSMR, with respect to the solution size and the dual parameters. We obtained fruitful results including polynomial-
978
+ time solvability results, NP-hardness results, W[1]-hardness results, and W[2]-hardness results. Particularly, many of our
979
+ hardness results hold even when the distinguished candidate is the first or the last one in the agenda. Our exploration
980
+ offers a complete picture of the complexity of these problems under TSMR, enabling us to compare TSMR with the
981
+ successive and the amendment rules. See Table 1. Our results indicate that TSMR resists most of the control problems,
982
+ but is vulnerable to agenda control and coalition manipulation. In addition, we showed that NECESSARY WINNER is
983
+ polynomial-time solvable while POSSIBLE WINNER turned out to be NP-hard. Compared with previous works, our study
984
+ suggests that TSMR behaves at least well as the other two important sequential rules regarding their resistance to strategic
985
+ voting problems, and their complexity of calculating possible and necessary winners. We point out that our exploration
986
+ is a pure theoretic analysis, and whether many problems are hard to solve in specific practical settings demands further
987
+ investigation. For more details, we refer to Table 1.
988
+ An important topic for future research is to investigate if restricting the preference domains (e.g., single-peaked/crossing
989
+ preferences, top-monotonicity preferences, etc.) radically changes the complexity. We refer to [18, 27] for a comprehen-
990
+ sive survey on many restricted preference domains.
991
+ 14
992
+
993
+ References
994
+ [1] Aziz, H., Gaspers, S., Mackenzie, S., Mattei, N., Stursberg, P., Walsh, T.: Fixing balanced knockout and double
995
+ elimination tournaments. Artif. Intell. 262, 1–14 (2018)
996
+ [2] Bang-Jensen, J., Gutin, G.Z. (eds.): Classes of Directed Graphs. Springer Monographs in Mathematics. Springer
997
+ (2018)
998
+ [3] Bartholdi III, J.J., Tovey, C.A., Trick, M.A.: The computational difficulty of manipulating an election. Soc. Choice
999
+ Welfare 6(3), 227–241 (1989)
1000
+ [4] Bartholdi III, J.J., Tovey, C.A., Trick, M.A.: How hard is it to control an election? Math. Comput. Model. 16(8-9),
1001
+ 27–40 (1992)
1002
+ [5] Baumeister, D., Rothe, J.: Preference aggregation by voting. In: J. Rothe (ed.) Economics and Computation: An
1003
+ Introduction to Algorithmic Game Theory, Computational Social Choice, and Fair Division, chap. 4, pp. 197–325.
1004
+ Springer, Heidelberg (2016)
1005
+ [6] Black, D.: The Theory of Committees and Elections. Cambridge University Press (1958)
1006
+ [7] Boehmer, N., Bredereck, R., Faliszewski, P., Niedermeier, R.: Winner robustness via swap- and shift-bribery: Pa-
1007
+ rameterized counting complexity and experiments. In: IJCAI, pp. 52–58 (2021)
1008
+ [8] Bredereck, R., Chen, J., Niedermeier, R., Walsh, T.: Parliamentary voting procedures: Agenda control, manipulation,
1009
+ and uncertainty. J. Artif. Intell. Res. 59, 133–173 (2017)
1010
+ [9] Chakraborty, V., Delemazure, T., Kimelfeld, B., Kolaitis, P.G., Relia, K., Stoyanovich, J.: Algorithmic techniques
1011
+ for necessary and possible winners. Trans. Data Sci. 2(3), Nr. 22 (2021)
1012
+ [10] Chakraborty, V., Kolaitis, P.G.: Classifying the complexity of the possible winner problem on partial chains. In:
1013
+ AAMAS, pp. 297–305 (2021)
1014
+ [11] Conitzer, V., Lang, J., Xia, L.: How hard is it to control sequential elections via the agenda? In: IJCAI, pp. 103–108
1015
+ (2009)
1016
+ [12] Conitzer, V., Sandholm, T., Lang, J.: When are elections with few candidates hard to manipulate? J. ACM. 54(3),
1017
+ Nr. 14 (2007)
1018
+ [13] Conitzer, V., Walsh, T.: Barriers to manipulation in voting. In: F. Brandt, V. Conitzer, U. Endriss, J. Lang, A. Pro-
1019
+ caccia (eds.) Handbook of Computational Social Choice, chap. 6, pp. 127–145. Cambridge University Press (2016)
1020
+ [14] Cygan, M., Fomin, F.V., Kowalik, L., Lokshtanov, D., Marx, D., Pilipczuk, M., Pilipczuk, M., Saurabh, S.: Parame-
1021
+ terized Algorithms. Springer (2015)
1022
+ [15] Downey, R.: A parameterized complexity tutorial. In: LATA, pp. 38–56 (2012)
1023
+ [16] Downey, R.G., Fellows, M.R., Stege, U.: Parameterized complexity: A framework for systematically confronting
1024
+ computational intractability. In: Contemporary Trends in Discrete Mathematics: From DIMACS and DIMATIA to
1025
+ the Future, pp. 49–99 (1999)
1026
+ [17] Elkind, E., Gan, J., Obraztsova, S., Rabinovich, Z., Voudouris, A.A.: Protecting elections by recounting ballots.
1027
+ Artif. Intell. 290, Nr. 103,401 (2021)
1028
+ [18] Elkind, E., Lackner, M., Peters, D.: Preference restrictions in computational social choice: A survey. CoRR (2022).
1029
+ https://arxiv.org/pdf/2205.09092.pdf
1030
+ [19] Erd´elyi, G., Neveling, M., Reger, C., Rothe, J., Yang, Y., Zorn, R.: Towards completing the puzzle: Complexity of
1031
+ control by replacing, adding, and deleting candidates or voters. Auton. Agent Multi-Ag. 35(2), Nr. 41 (2021)
1032
+ [20] Faliszewski, P., Rothe, J.: Control and bribery in voting. In: F. Brandt, V. Conitzer, U. Endriss, J. Lang, A. Procaccia
1033
+ (eds.) Handbook of Computational Social Choice, chap. 7, pp. 146–168. Cambridge University Press (2016)
1034
+ [21] Farquharson, R.: Theory of Voting. New Haven: Yale University Press (1969)
1035
+ [22] Fitzsimmons, Z., Hemaspaandra, E.: Insight into voting problem complexity using randomized classes. In: IJCAI,
1036
+ pp. 293–299 (2022)
1037
+ [23] Garey, M., Johnson, D.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman,
1038
+ New York (1979)
1039
+ 15
1040
+
1041
+ [24] Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: Anyone but him: The complexity of precluding an alternative.
1042
+ Artif. Intell. 171(5-6), 255–285 (2007)
1043
+ [25] Hemaspaandra, E., Hemaspaandra, L.A., Rothe, J.: The complexity of online bribery in sequential elections. J.
1044
+ Comput. Syst. Sci. 127, 66–90 (2022)
1045
+ [26] Horan, S., Sprumont, Y.: Two-stage majoritarian chocie. Theor. Econ. 17(2), 521–537 (2022)
1046
+ [27] Karpov, A.V.: Structured preferences: A literature survey. Autom. Remote. Control. 83(9), 1329–1354 (2022)
1047
+ [28] Konczak, K., Lang, J.: Voting procedures with incomplete preferences. In: M-PREF (2005). http://www.
1048
+ eecs.harvard.edu/cs286r/courses/fall11/papers/KL05.pdf
1049
+ [29] Liu, H., Feng, H., Zhu, D., Luan, J.: Parameterized computational complexity of control problems in voting systems.
1050
+ Theor. Comput. Sci. 410(27-29), 2746–2753 (2009)
1051
+ [30] Manurangsi, P., Suksompong, W.: Fixing knockout tournaments with seeds. In: L.D. Raedt (ed.) IJCAI, pp. 412–418
1052
+ (2022)
1053
+ [31] McGarvey, D.C.: A theorem on the construction of voting paradoxes. Econometrica 21(4), 608–610 (1953)
1054
+ [32] Miller, N.R.: Graph-theoretical approaches to the theory of voting. AM. J. Polit. Sci. 21(4), 769–803 (1977)
1055
+ [33] Neveling, M., Rothe, J.: Control complexity in Borda elections: Solving all open cases of offline control and some
1056
+ cases of online control. Artif. Intell. 298, Nr. 103,508 (2021)
1057
+ [34] Rasch, B.E.: Parliamentary floor voting procedures and agenda setting in Europe. Legis. Stud. Quart. 25(1), 3–23
1058
+ (2000)
1059
+ [35] Tovey, C.A.: Tutorial on computational complexity. Interfaces 32(3), 30–61 (2002)
1060
+ [36] Veselova, Y.A.: Computational complexity of manipulation: A survey. Autom. Remote. Control. 77(3), 369–388
1061
+ (2016)
1062
+ [37] Walsh, T.: Is computational complexity a barrier to manipulation? Ann. Math. Artif. Intell. 62(1-2), 7–26 (2011)
1063
+ [38] Walsh, T.: Where are the hard manipulation problems? J. Artif. Intell. Res. 42, 1–29 (2011)
1064
+ [39] Williams, V.V.: Fixing a tournament. In: M. Fox, D. Poole (eds.) AAAI, pp. 895–900 (2010)
1065
+ [40] Williams, V.V.: Knockout tournaments. In: F. Brandt, V. Conitzer, U. Endriss, J. Lang, A. Procaccia (eds.) Handbook
1066
+ on Computational Social Choice, chap. 19, pp. 453–474. Cambridge University Press (2016)
1067
+ [41] Xia, L., Conitzer, V.: Determining possible and necessary winners given partial orders. J. Artif. Intell. Res. 41,
1068
+ 25–67 (2011)
1069
+ [42] Yang, Y.: The complexity of control and bribery in majority judgment. In: AAMAS, pp. 1169–1177 (2017)
1070
+ [43] Yang, Y.: On the complexity of Borda control in single-peaked elections. In: AAMAS, pp. 1178–1186 (2017)
1071
+ [44] Yang, Y.: On the complexity of constructive control under nearly single-peaked preferences. In: ECAI, pp. 243–250
1072
+ (2020)
1073
+ [45] Yang, Y.: On the complexity of controlling amendment and successive winners. In: AAMAS, pp. 1768–1770 (2022)
1074
+ 16
1075
+
BdE2T4oBgHgl3EQfngiP/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9A0T4oBgHgl3EQfBP8f/content/tmp_files/2301.01972v1.pdf.txt ADDED
@@ -0,0 +1,2939 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01972v1 [math.GT] 5 Jan 2023
2
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
3
+ SO YAMAGATA
4
+ Abstract. Khovanov [11] introduced a bigraded cohomology theory of links whose graded Euler characteristic is the Jones
5
+ polynomial. The theory was subsequently applied to the chromatic polynomial of graph [9], resulting in a categorification
6
+ known as the “chromatic homology”. Much as in the Khovanov homology, in the chromatic homology the chromatic poly-
7
+ nomial can be obtained by taking the Euler characteristic of the chromatic homology. In the present paper, we introduce a
8
+ combinatorial description of enhanced states that can be applied to analysis of the homology in an explicit way by hand. Using
9
+ the new combinatorial description, we show a splitting property of the chromatic homology. Finally, as an application of the
10
+ description, we compute the chromatic homology of the complete graph.
11
+ 1. Introduction
12
+ Khovanov [11] introduced a bigraded cohomology theory of links whose graded Euler characteristic is the Jones
13
+ polynomial. The theory was subsequently applied to the chromatic polynomial of graph [9], resulting in a categori-
14
+ fication known as the “chromatic homology”. Much as in the Khovanov homology, in the chromatic homology the
15
+ chromatic polynomial can be obtained by taking the Euler characteristic of the chromatic homology. Several results
16
+ on the chromatic homology have been obtained. In 2006, Helme-Guizon et al. [7] studied torsions in the chromatic
17
+ homology and presented a vanishing theorem of the homology based on their results. Specifically, they determined
18
+ which graphs have the homology that contains torsion. They also proved a thickness-type theorem for the homology
19
+ groups, and gave computations of the homology of polygon graphs with coefficients in the general algebra. A study by
20
+ Lawrance and Sazdanovic [14] showed that the torsion of the chromatic homology is of order two. The first group of
21
+ the homology was studied by Pabiniak et al. [15], and they also gave many interesting conjecture about the homology
22
+ with algebras other than A2 = Z/(x2). Helme-Guizon and colleagues [4] showed that the chromatic homology with
23
+ a rational coefficient can be determined by the chromatic polynomial, proving that the homologies of the “knight”
24
+ pair are isomorphic. In 2018, Sazdanovic and Scofield [17] studied the span of the homology and considered how the
25
+ homology changes when a cycle graph is added to the given graph. The chromatic homology with arbitral algebra
26
+ was observed in a study by Helme-Guizon and Rong [8]. Providing another perspective, homology theories for the
27
+ chromatic polynomial have also been observed [3], [19].
28
+ The chromatic homology is interesting not only in itself but also in relation to other areas of study. The relation
29
+ to Hochschild homology was investigated by Przytycki [16], who showed that the Hochschild homology of the unital
30
+ algebra is isomorphic to the chromatic homology over the algebra of a cycle graph. With respect to the topology of
31
+ configuration spaces, Baranovsky and Sazdanovic [1] showed that the E1-term of the Bendersky-Gitler-type spectral
32
+ sequence converging to the homology of the graph configuration space is given by the chromatic complex. B¨okstedt and
33
+ Minuz [2] subsequently studied the relation between the work of Baranovsky and Sazdanovic [1] and Kriz’s rational
34
+ model for the configuration space [12].
35
+ There are also variants of the chromatic homology. In an analysis by Jasso-Hernandez and Rong [10], the Tutte
36
+ homology was provided as a categorification of the Tutte polynomial. The categorification of the chromatic polynomial
37
+ of embedded graphs was studied iby Loebl and Moffatt [13]. The categorification of the Stanley’s chromatic symmetric
38
+ function was introduced by Sazdanovic and Yip [18]. As an analogy of the chromatic homology, Dancsco and Licata [5]
39
+ provided several homology theories for hyperplane arrangement as a categorification of several polynomials associated
40
+ with the combinatorics of hyperplane arrangement. In particular, it is easily seen that the characteristic homology, a
41
+ categorification of the characteristic polynomial, of the braid arrangement is isomorphic to the chromatic homology of
42
+ the complete graph.
43
+ 2020 Mathematics Subject Classification. 57M15, 57M27, 05C15.
44
+ Key words and phrases. chromatic homology, chromatic polynomial, categorification, complete graph.
45
+ 1
46
+
47
+ 2
48
+ SO YAMAGATA
49
+ In the present paper, we introduce a combinatorial description of enhanced states which would be useful to ana-
50
+ lyze the homology in an explicit way by hand. Using the description we show a splitting property of the chromatic
51
+ homology. More precisely, we show the following theorem.
52
+ Theorem 1.1 (Theorem 3.3). Let G be a graph and e be its edge that is not a bridge. Then, we have the following split
53
+ exact sequence
54
+ (1)
55
+ 0 → Hi, j(G/e) → Hi+1, j(G) → Hi+1, j(G − e) → 0
56
+ for i, j.
57
+ If we sum over j, we have the split exact sequence
58
+ (2)
59
+ 0 → Hi(G/e) → Hi+1(G) → Hi+1(G − e) → 0
60
+ for i.
61
+ This result would allow us to compute the chromatic homology in an inductive way. Actually, as an application
62
+ of the theorem, we can describe the chromatic homology of the complete graph recursively. The description of the
63
+ homology was firstly conjectured by Hasegawa and the author in [9].
64
+ Theorem 1.2 (Conjecture 6.8 [9]). For n ≥ 4 the chromatic homology groups of a complete graph Kn are given as
65
+ (3)
66
+ Hi(Kn) =
67
+ 
68
+ Z{n}
69
+ i = 0
70
+ Hi−1(Kn−1)⊕(n−2) ⊕ Hi(Kn−1){1}
71
+ 1 ≤ i ≤ n − 2
72
+ 0
73
+ i ≥ n − 1.
74
+ Remark that Theorem 1.2 also gives the characteristic homology, introduced in [5], of the braid arrangement, which
75
+ would be the first result for the explicit calculation of the homology.
76
+ This paper is organized as follows. In Section 2, we recall basic notions from graph theory, and the construction
77
+ of the chromatic homology. In Section 3, we introduce the combinatorial description of enhanced states, and show
78
+ a splitting property of the chromatic homology. In Section 4, we compute the chromatic homology of the complete
79
+ graph.
80
+ 2. Preliminaries
81
+ 2.1. Graph and its chromatic polynomial. In this subsection let us recall the basic notions of graph theory.
82
+ Let G = (V(G), E(G)) be a graph with vertex set V(G) and edge set E(G). If there is an order on the set E(G), the graph
83
+ is called ordered. Throughout this paper we assume the following.
84
+ • The graph G is connected;
85
+ • The vertices of G are indexed by {i ∈ N | 1 ≤ i ≤ #V(G)};
86
+ • The graph G is ordered lexicographically with respect to pairs of numbers representing edges, i.e., for (i1i2),
87
+ (j1 j2) ∈ E(G), (i1i2) < (j1 j2) if (i1i2) < (j1 j2) as a lexicographic order.
88
+ Let us take an edge e ∈ E(G) of a graph G. We define the deletion of G denoted by G − e as a graph obtained by just
89
+ deleting e from G, and the contraction of G denoted by G/e as a graph obtained by collapsing two end vertices of e
90
+ into a single vertex along e. For a subset s ⊂ E(G), a spanning graph denoted by [G : s] is a graph (V(G), s). An edge
91
+ e ∈ E(G) is called a bridge if the number of connected components of G − e is one more than that of G.
92
+ For a positive integer λ define a coloring by a map c : [λ] → V(G) with a condition that c(i) � c(j), i, j ∈ [λ] if
93
+ (i, j) ∈ E(G). Let PG(λ) be the number of different colorings of a graph G using at most λ colors. For any graph G
94
+ the PG(λ) is a well-defined polynomial of λ known as the chromatic polynomial. It is well-known that the chromatic
95
+ polynomial satisfies the deletion-contraction relation, i.e., for any edge e ∈ E(G) the relation
96
+ (4)
97
+ PG(λ) = PG−e(λ) − PG/e(λ)
98
+ holds.
99
+
100
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
101
+ 3
102
+ 2.2. Chromatic homology. Let us review the construction of the chromatic homology. Most of the exposition here
103
+ is based on [9]. Let M = ⊕ j≥0M j be a graded Z-module, where {M j} denotes the set of homogeneous elements with
104
+ degree j. We call the power series
105
+ q dimM =
106
+
107
+
108
+ j=0
109
+ q j · rank (M j)
110
+ the graded dimension of M, where rank (M j) = dimQ M j ⊗Z Q. For a graded Z-module M we define M{l} j = M j−l;
111
+ that is, all of the degrees are increased by l, and the module satisfies q dimM{l} = ql · q dimM.
112
+ Helme-Guizon and Rong [9] give two equivalent constructions of the chromatic homology. One is the cubic complex
113
+ construction, and the other is the enhanced state construction. For our purposes in this subsection, it is sufficient to
114
+ review only the latter construction.
115
+ Let G = (V(G), E(G)) be an ordered graph and s ⊂ E(G). Let E1, . . ., Ed be connected components of a spanning graph
116
+ [G : s]. Consider a map c : ∪d
117
+ h=1Eh → Z[x]/(x2) called the coloring which gives a color 1 or x on each component Eh,
118
+ h = 1, . . ., d of the graph G. We call the colored graph an enhanced state and denote it by S = (s, c). For an enhanced
119
+ state S = (s, c) define
120
+ i(S ) = #s, and j(S ) = #{h ∈ [d] | c(Eh) = x}.
121
+ Let Ci, j(G) be a Z-module generated by enhanced states S of G with i(S ) = i and j(S ) = j. We define the differential
122
+ di, j : Ci, j(G) → Ci+1, j(G) by
123
+ (5)
124
+ di, j(G) =
125
+
126
+ e∈E(G)\s
127
+ (−1)n(e)S e,
128
+ where n(e) is the number of edges in s that are ordered before e and S e = (se, ce) is an enhanced state defined as
129
+ follows. Let se = s ∪ {e} and E1, . . . , Ed be the components of [G : s]. If e is a bridge of Ea and Eb, a � b, then define
130
+ a map ce(Ea ∪ Eb ∪ {e}) = c(Ea)c(Eb). If e is not a bridge and an edge in some connected component Ea, then define
131
+ se = s ∪ {e} and ce(Ea ∪ {e}) = c(Ea).
132
+ Let Ci(G) = ⊕ j≥0Ci, j(G) and di = ⊕ j≥0di, j. Notice that the differential satisfies the property di+1di = 0, and thus
133
+ C(G) = (Ci(G), di) is a chain complex. With the above notations the group
134
+ (6)
135
+ Hi(G) =
136
+ Ker
137
+
138
+ di : Ci(G) → Ci+1(G)
139
+
140
+ Im �di−1 : Ci−1(G) → Ci(G)�
141
+ is called the graph homology or chromatic (graph) homology. In the present paper we call it simply chromatic
142
+ homology. For an enhanced state S = (s, c) of G/e, let ˜s = s∪{e} and ˜c be coloring of components of [G : ˜s]. Then, by
143
+ defining a map αi−1, j(S ) = (˜s, ˜c) and extending it linearly, we obtain a homomorphism αi−1, j : Ci−1, j(G/e) → Ci, j(G).
144
+ For an enhanced state S = (s, c) of G define a map βi, j : Ci, j(G) → Ci, j(G − e) in such a way that if e � s, then
145
+ βi, j(S ) = S , and if e ∈ s, then βi, j(S ) = 0. Again, by extending the map βi, j linearly we obtain the homomorphism
146
+ βi, j : Ci, j(G) → Ci, j(G − e). By summing over j we have homomorphisms αi : Ci−1(G/e) → Ci(G) and βi : Ci(G) →
147
+ Ci(G − e), respectively. We abbreviate the maps by α and β. The following lemma holds.
148
+ Lemma 2.1 (Lemma 3.1 [9]). α and β are chain maps such that 0 → Ci−1, j(G/e)
149
+ α−→ Ci, j(G)
150
+ β−→ Ci, j(G − e) → 0 is a
151
+ short exact sequence.
152
+ By the Zig-Zag lemma the following theorem holds.
153
+ Theorem 2.2 (Theorem 3.2 [9]). Given a graph G and an edge e of G, for each j there is a long exact sequence
154
+ 0 → H0, j(G)
155
+ β∗
156
+ −→ H0, j(G − e)
157
+ γ∗
158
+ −→ H0, j(G/e)
159
+ α∗
160
+ −−→ H1, j(G)
161
+ β∗
162
+ −→ H1, j(G − e)
163
+ γ∗
164
+ −→
165
+ H1, j(G/e) → · · · → . . . Hi, j(G)
166
+ β∗
167
+ −→ Hi, j(G − e)
168
+ γ∗
169
+ −→ Hi, j(G/e)
170
+ α∗
171
+ −−→ Hi+1, j(G) → . . .
172
+ If we sum over j, we have a degree-preserving long exact sequence:
173
+ 0 → H0(G)
174
+ β∗
175
+ −→ H0(G − e)
176
+ γ∗
177
+ −→ H0(G/e)
178
+ α∗
179
+ −−→ H1(G)
180
+ β∗
181
+ −→ H1(G − e)
182
+ γ∗
183
+ −→
184
+ H1(G/e) → · · · → Hi(G)
185
+ β∗
186
+ −→ Hi(G − e)
187
+ γ∗
188
+ −→ Hi(G/e)
189
+ α∗
190
+ −−→ Hi+1(G) → . . .
191
+
192
+ 4
193
+ SO YAMAGATA
194
+ 2.3. A combinatorial description of enhanced states. In this subsection, let us introduce a combinatorial description
195
+ of enhanced states. Let S = (s, c) be an enhanced state and E1, . . . , Ed1, P1, . . ., Pd2 be connected components of [G : s],
196
+ where each Eh, h = 1, . . ., d1 is a connected subgraph of [G : s] with at least one edge, and each Pk, k = 1, . . ., d2
197
+ is a vertex. As an abuse of symbol let us denote the edge set E(Eh) by Eh. Using this notation, we can describe
198
+ enhanced states as follows. Order the components Eh, h = 1, . . ., d1 are followed by Pk, k = 1, . . ., d2 and separate
199
+ each component by the symbol “|” of the form E1 | . . . | Ed1 | P1 | . . . | Pd2. Remark that we do not make particular
200
+ assumptions about the ordering of the components. Put x above the component Eh or Pk if its corresponding component
201
+ is colored x.
202
+ Let G be a graph and S = (s, c) ∈ Ci, j(G) be an enhanced state. For the components E, E′, P, P′ of S and an edge
203
+ e ∈ E(G), we denote a new component obtained by adding the edge e to the component(s) as follows.
204
+ Ee : if e connects E itself;
205
+ �EE′�e : if e is a bridge connecting E and E′;
206
+ (EP)e : if e is a bridge connecting E and P;
207
+ �PP′�e : if e is a bridge connecting P and P′.
208
+ For fixed 1 ≤ i1 < · · · < it < · · · < ip ≤ d1, 1 ≤ k1 < · · · < kt′ < · · · < kq ≤ d2, p + q = j let S = (s, c) =
209
+ E1 | . . . |
210
+ x
211
+ Eit | . . . | Ed1 | P1 | . . . |
212
+ x
213
+ Pkt′ | . . . | Pd2 be an enhanced state of Ci, j(G), where �d1
214
+ h=1 #Eh = i. For an edge
215
+ e ∈ E(G) \ �d1
216
+ h=1 Eh we denote an enhanced state in which the edge e is added to S by S ∪ e. More precisely, S ∪ e is
217
+ one of the following:
218
+ (x)
219
+ Ee
220
+ a ≔
221
+
222
+ E1 | . . . |
223
+ x
224
+ Eit | . . . |
225
+ (x)
226
+ Ee
227
+ a | . . . | Ed1 | P1 | . . . |
228
+ x
229
+ Pkt′ | . . . | Pd2
230
+
231
+ if e connects Ea itself;
232
+ (x)
233
+ (EaEb)e ≔
234
+
235
+ E1 | . . . |
236
+ x
237
+ Eit | . . . |
238
+ (x)
239
+ (EaEb)e | . . . | Ed1 | P1 | . . . |
240
+ x
241
+ Pkt′ | . . . | Pd2
242
+
243
+ if e is a bridge connecting Ea and Eb;
244
+ (x)
245
+ (EaPα)e ≔
246
+
247
+ E1 | . . . |
248
+ x
249
+ Eit | . . . |
250
+ (x)
251
+ (EaPα)e | . . . | Ed1 | P1 | . . . |
252
+ x
253
+ Pkt′ | . . . | Pd2
254
+
255
+ if e is a bridge connecting Ea and Pα;
256
+ (x)
257
+
258
+ PαPβ
259
+ �e ≔
260
+ E1 | . . . |
261
+ x
262
+ Eit | . . . | Ed1 |
263
+ (x)
264
+
265
+ PαPβ
266
+ �e | P1 | . . . |
267
+ x
268
+ Pkt′ | . . . | Pd2
269
+ 
270
+ if e = (PαPβ) ∈ E(G).
271
+ Remark 2.3. If any two components K, K′ are connected by a bridge e, then K and K′ are replaced by (KK′)e. If e
272
+ connects two components that are both colored x, then we regard the enhanced state S ∪ e as 0.
273
+ The following figures express the corresponding enhanced states S ∪ e. In the figures, each circle represents a
274
+ connected component of the enhanced state S and each point represents a vertex, both possibly with color x.
275
+ E1
276
+ x
277
+ Eit
278
+ (x)
279
+ Ee
280
+ a
281
+ Ed1
282
+ P1
283
+ x
284
+ Pkt′
285
+ Pd2
286
+ · · ·
287
+ · · ·
288
+ · · ·
289
+ · · ·
290
+ · · ·
291
+ e
292
+ Figure 1.
293
+ (x)
294
+ Ee
295
+ a
296
+ For a component E and two edges, e, f, of G we denote a component obtained by adding the two edges e, f to the
297
+ same component E by Ee, f. We denote the enhanced state obtained by adding two edges e, f in this order to S by
298
+ S ∪ e · f. For n ≥ 3, ((S ∪ e1) ∪ e2) · · · ∪ en = S ∪ e1 · e2 · . . . · en is determined inductively.
299
+ For an enhanced state S and distinct edges e, f we give an anti-commutative structure as follows:
300
+ (7)
301
+ S ∪ e · f = −S ∪ f · e.
302
+ This is compatible with the fact that the changing the order in which the edges are added results in a change in the
303
+ number of edges ordered before e or f.
304
+
305
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
306
+ 5
307
+ E1
308
+ x
309
+ Eit
310
+ (x)
311
+ Ea
312
+ (x)
313
+ Eb
314
+ Ed1
315
+ P1
316
+ x
317
+ Pkt′
318
+ Pd2
319
+ · · ·
320
+ · · ·
321
+ · · ·
322
+ · · ·
323
+ · · ·
324
+ · · ·
325
+ e
326
+ Figure 2.
327
+ (x)
328
+ (EaEb)e
329
+ E1
330
+ x
331
+ Eit
332
+ (x)
333
+ Ea
334
+ Ed1
335
+ P1
336
+ x
337
+ Pkt′
338
+ (x)
339
+
340
+ Pd2
341
+ · · ·
342
+ · · ·
343
+ · · ·
344
+ · · ·
345
+ · · ·
346
+ · · ·
347
+ e
348
+ Figure 3.
349
+ (x)
350
+ (EaPα)e
351
+ E1
352
+ x
353
+ Eit
354
+ Ed1
355
+ P1
356
+ x
357
+ Pkt′
358
+ (x)
359
+
360
+ (x)
361
+
362
+ Pd2
363
+ · · ·
364
+ · · ·
365
+ · · ·
366
+ · · ·
367
+ · · ·
368
+ · · ·
369
+ e
370
+ Figure 4.
371
+ (x)
372
+ (PαPβ)e
373
+ For a component E we denote its vertex set by v(E), and a full subgraph of G with vertex set v(E) by Fv(E); that is,
374
+ Fv(E) is a subgraph (E(Fv(E)), V(Fv(E))) of G defined by E(Fv(E)) = {(ab) | a, b ∈ v(E), (ab) ∈ E(G)}, V(Fv(E)) = v(E).
375
+ We denote the graph Fv(E) and its edge set E(Fv(E)) by the same symbol FE for simplicity. For components E1, E2
376
+ define a new graph E1 ∧ E2 as a graph (V(E1 ∧ E2), E(E1 ∧ E2)), where V(E1 ∧ E2) = v(E1) ∪ v(E2), E(E1 ∧ E2) =
377
+ E1 ∪ E2 ∪ {(ab) ∈ E(G) | a ∈ v(E1), b ∈ v(E2)}.
378
+ With the above notations we introduce a combinatorial description of a differential ∂i, j : Ci, j(G) → Ci+1, j(G) as
379
+ follows.
380
+ ∂i, j �
381
+ E1 | . . . |
382
+ x
383
+ Eit | . . . | Ed1 | P1 | . . . |
384
+ x
385
+ Pkt′ | . . . | Pd2
386
+
387
+ (8)
388
+ =
389
+
390
+ 1≤a≤d1
391
+
392
+ e∈FEa \Ea
393
+ (−1)n(e) (x)
394
+ Ee
395
+ a ∪ e +
396
+
397
+ 1≤a<b≤d1
398
+
399
+ e∈FEa ∧FEb \FEa ∪FEb
400
+ (−1)n(e)
401
+ (x)
402
+ (EaEb)e ∪ e
403
+ (9)
404
+ +
405
+
406
+ 1≤a≤d1
407
+ 1≤α≤d2
408
+
409
+ e∈FEa ∧Pα\FEa
410
+ (−1)n(e)
411
+ (x)
412
+ (EaPα)e ∪ e +
413
+
414
+ 1≤α<β≤d2
415
+ e=(PαPβ)
416
+ (−1)n(e)
417
+ (x)
418
+ (PαPβ)e ∪ e
419
+ (10)
420
+ where n(e) is the number of edges ordered before e.
421
+ Example 2.4. Consider a complete graph G = K6 with six vertices (see the left-hand image in Figure 5) and its
422
+ enhanced state S = (s, c) ∈ C4,2(G) (see the right-hand image in Figure 5).
423
+ The enhanced state S can be written as
424
+ x
425
+ 12, 13, 23 | 46 |
426
+ x
427
+ 5.
428
+
429
+ 6
430
+ SO YAMAGATA
431
+ 1
432
+ 2
433
+ 3
434
+ 4
435
+ 5
436
+ 6
437
+ x
438
+ 1
439
+ x
440
+ 1
441
+ 2
442
+ 3
443
+ 4
444
+ 5
445
+ 6
446
+ Figure 5. Complete graph G = K6 and enhanced state S = (s, c) ∈ C4,2(G)
447
+ In this example, the differential ∂4,2 would be calculated as follows.
448
+ ∂4,2 �
449
+ x
450
+ 12, 13, 23 | 46 |
451
+ x
452
+ 5
453
+
454
+ =
455
+
456
+ x
457
+ 12, 13, 23 | 46 |
458
+ x
459
+ 5
460
+
461
+ ∪ (14) +
462
+
463
+ x
464
+ 12, 13, 23 | 46 |
465
+ x
466
+ 5
467
+
468
+ ∪ (16) −
469
+
470
+ x
471
+ 12, 13, 23 | 46 |
472
+ x
473
+ 5
474
+
475
+ ∪ (24) −
476
+
477
+ x
478
+ 12, 13, 23 | 46 |
479
+ x
480
+ 5
481
+
482
+ ∪ (26)
483
+
484
+
485
+ x
486
+ 12, 13, 23 | 46 |
487
+ x
488
+ 5
489
+
490
+ ∪ (34) −
491
+
492
+ x
493
+ 12, 13, 23 | 46 |
494
+ x
495
+ 5
496
+
497
+ ∪ (36) −
498
+
499
+ x
500
+ 12, 13, 23 | 46 |
501
+ x
502
+ 5
503
+
504
+ ∪ (45) +
505
+
506
+ x
507
+ 12, 13, 23 | 46 |
508
+ x
509
+ 5
510
+
511
+ ∪ (56)
512
+ =
513
+ x
514
+ 12, 13, 14, 23, 46 |
515
+ x
516
+ 5 +
517
+ x
518
+ 12, 13, 16, 23, 46 |
519
+ x
520
+ 5 −
521
+ x
522
+ 12, 13, 23, 24, 46 |
523
+ x
524
+ 5 −
525
+ x
526
+ 12, 13, 23, 26, 46 |
527
+ x
528
+ 5
529
+
530
+ x
531
+ 12, 13, 23, 34, 46 |
532
+ x
533
+ 5 −
534
+ x
535
+ 12, 13, 23, 36, 46 |
536
+ x
537
+ 5 −
538
+ x
539
+ 12, 13, 23 |
540
+ x
541
+ 45, 46 +
542
+ x
543
+ 12, 13, 23 |
544
+ x
545
+ 46, 56.
546
+ For the later reference let us give a list of descriptions of S ∪ e · f below, where we omit color x for simplicity.
547
+ (I) Ee
548
+ a ∪ f =
549
+ 
550
+ Ee
551
+ a | E f
552
+ b ≔
553
+
554
+ E1 | . . . | Ee
555
+ a | . . . | E f
556
+ b | . . . | Ed1 | P1 | . . . | Pd2
557
+
558
+ if f connects Eb itself;
559
+ Ee, f
560
+ a
561
+ | ≔
562
+
563
+ E1 | . . . | Ee, f
564
+ a
565
+ | . . . | Ed1 | P1 | . . . | Pd2
566
+
567
+ if f connects Ee
568
+ a itself;
569
+ Ee
570
+ a | (EbEc) f ≔
571
+
572
+ E1 | . . . | Ee
573
+ a | . . . | (EbEc) f | . . . | Ed1 | P1 | . . . | Pd2
574
+
575
+ if f connects Eb and Ec;
576
+ �Ee
577
+ aEb
578
+ � f | ≔
579
+
580
+ E1 | . . . | �Ee
581
+ aEb
582
+ � f | . . . | Ed1 | P1 | . . . | Pd2
583
+
584
+ if f connects Ee
585
+ a and Eb;
586
+ Ee
587
+ a | (EbPα)f ≔
588
+
589
+ E1 | . . . | Ee
590
+ a | . . . | (EbPα)f | . . . | Ed1 | P1 | . . . | Pd2
591
+
592
+ if f connects Eb and Pα;
593
+ �Ee
594
+ aPα
595
+ � f | ≔
596
+
597
+ E1 | . . . | �Ee
598
+ aPα
599
+ � f | . . . | Ed1 | P1 | . . . | Pd2
600
+
601
+ if f connects Ee
602
+ a and Pα;
603
+ Ee
604
+ a |
605
+
606
+ PαPβ
607
+ �f ≔
608
+
609
+ E1 | . . . | Ee
610
+ a | . . . | Ed1 |
611
+
612
+ PαPβ
613
+ � f | P1 | . . . | Pd2
614
+
615
+ if f =
616
+
617
+ PαPβ
618
+
619
+ ∈ E(G);
620
+ (II) (EaEb)e ∪ f =
621
+ 
622
+ (EaEb)e | E f
623
+ c ≔
624
+
625
+ E1 | . . . | (EaEb)e | . . . | E f
626
+ c | . . . | Ed1 | P1 | . . . | Pd2
627
+
628
+ if f connects Ec itself;
629
+
630
+ EaE f
631
+ b
632
+ �e | ≔
633
+
634
+ E1 | . . . |
635
+
636
+ EaE f
637
+ b
638
+ �e | . . . | Ed1 | P1 | . . . | Pd2
639
+
640
+ if f connects Eb itself
641
+
642
+ E f
643
+ aEb
644
+ �e | ≔
645
+
646
+ E1 | . . . |
647
+
648
+ E f
649
+ aEb
650
+ �e | . . . | Ed1 | P1 | . . . | Pd2
651
+
652
+ if f connects Ea itself
653
+ (EaEb)e, f | ≔
654
+
655
+ E1 | . . . | (EaEb)e, f | . . . | Ed1 | P1 | . . . | Pd2
656
+
657
+ if f(� e) connects Ea and Eb;
658
+ (EaEb)e | (EcEd)f ≔
659
+
660
+ E1 | . . . | (EaEb)e | . . . | (EcEd)f | . . . | Ed1 | P1 | . . . | Pd2
661
+
662
+ if f connects Ec and Ed;
663
+ (EaEb)e (EaEc) f | ≔
664
+
665
+ E1 | . . . | (EaEb)e (EaEc)f | . . . | Ed1 | P1 | . . . | Pd2
666
+
667
+ if f connects Ea and Ec;
668
+ (EaEb)e (EbEc) f | ≔
669
+
670
+ E1 | . . . | (EaEb)e (EbEc)f | . . . | Ed1 | P1 | . . . | Pd2
671
+
672
+ if f connects Eb and Ec;
673
+ (EaEb)e | (EcPα) f ≔
674
+
675
+ E1 | . . . | (EaEb)e | . . . | (EcPα) f | . . . | Ed1 | P1 | . . . | Pd2
676
+
677
+ if f connects Ec and Pα;
678
+ (EaEb)e (EaPα)f | ≔
679
+
680
+ E1 | . . . | ((EaEb)e Pα)f | . . . | Ed1 | P1 | . . . | Pd2
681
+
682
+ if f connects Ea and Pα;
683
+ (EaEb)e (EbPα)f | ≔
684
+
685
+ E1 | . . . | ((EaEb)e Pα)f | . . . | Ed1 | P1 | . . . | Pd2
686
+
687
+ if f connects Eb and Pα;
688
+ (EaEb)e |
689
+
690
+ PαPβ
691
+ �f ≔
692
+
693
+ E1 | . . . | (EaEb)e | . . . | Ed1 |
694
+
695
+ PαPβ
696
+ � f | P1 | . . . | Pd2
697
+
698
+ if f =
699
+
700
+ PαPβ
701
+
702
+ ∈ E(G);
703
+
704
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
705
+ 7
706
+ (III) (EaPα)e ∪ f =
707
+ 
708
+ (EaPα)e | E f
709
+ b ≔
710
+
711
+ E1 | . . . | (EaPα)e | . . . | E f
712
+ b | . . . | Ed1 | P1 | . . . | Pd2
713
+
714
+ if f connects Eb itself;
715
+
716
+ E f
717
+ a Pα
718
+ �e | ≔
719
+
720
+ E1 | . . . |
721
+
722
+ E f
723
+ aPα
724
+ �e | . . . | Ed1 | P1 | . . . | Pd2
725
+
726
+ if f connects Ea itself;
727
+ (EaPα)e, f | ≔
728
+
729
+ E1 | . . . | (EaPα)e, f | . . . | Ed1 | P1 | . . . | Pd2
730
+
731
+ if f connects (EaPα)e itself;
732
+ (EaPα)e | (EbEc)f ≔
733
+
734
+ E1 | . . . | (EaPα)e | . . . | (EbEc)f | . . . | Ed1 | P1 | . . . | Pd2
735
+
736
+ if f connects Eb and Ec;
737
+ (EaPα)e (EaEb) f | ≔
738
+
739
+ E1 | . . . | (EaPα)e (EaEb) f | . . . | Ed1 | P1 | . . . | Pd2
740
+
741
+ if f connects Ea and Eb;
742
+ (EaPα)e |
743
+
744
+ EbPβ
745
+ � f ≔
746
+
747
+ E1 | . . . | (EaPα)e | . . . |
748
+
749
+ EbPβ
750
+ �f | . . . | Ed1 | P1 | . . . | Pd2
751
+
752
+ if f connects Eb and Pβ;
753
+ (EaPα)e �
754
+ EaPβ
755
+ � f | ≔
756
+
757
+ E1 | . . . | (EaPα)e �
758
+ EaPβ
759
+ � f | . . . | Ed1 | P1 | . . . | Pd2
760
+
761
+ if f connects Ea and Pβ;
762
+ (EaPα)e |
763
+
764
+ PβPγ
765
+ � f ≔
766
+
767
+ E1 | . . . | (EaPα)e | . . . | Ed1 |
768
+
769
+ PβPγ
770
+ � f | P1 | . . . | Pd2
771
+
772
+ if f =
773
+
774
+ PβPγ
775
+
776
+ ∈ E(G);
777
+ (EaPα)e �
778
+ PαPβ
779
+ �f | ≔
780
+
781
+ E1 | . . . | (EaPα)e �
782
+ PαPβ
783
+ �f | . . . | Ed1 | P1 | . . . | Pd2
784
+
785
+ if f =
786
+
787
+ PαPβ
788
+
789
+ ∈ E(G);
790
+ (IV)
791
+
792
+ PαPβ
793
+ �e ∪ f =
794
+ 
795
+ E f
796
+ a |
797
+
798
+ PαPβ
799
+ �e ≔
800
+
801
+ E1 | . . . | E f
802
+ a | . . . | Ed1 |
803
+
804
+ PαPβ
805
+ �e | P1 | . . . | Pd2
806
+
807
+ if f connects Ea itself;
808
+ (EaEb) f |
809
+
810
+ PαPβ
811
+ �e ≔
812
+
813
+ E1 | . . . | (EaEb)f | . . . | Ed1 |
814
+
815
+ PαPβ
816
+ �e | P1 | . . . | Pd2
817
+
818
+ if f connects Ea and Eb;
819
+
820
+ EaPγ
821
+ �f |
822
+
823
+ PαPβ
824
+ �e ≔
825
+
826
+ E1 | . . . |
827
+
828
+ EaPγ
829
+ �f | . . . | Ed1 |
830
+
831
+ PαPβ
832
+ �e | P1 | . . . | Pd2
833
+
834
+ if f connects Ea and Pγ;
835
+ (EaPα)f �
836
+ PαPβ
837
+ �e | ≔
838
+
839
+ E1 | . . . | (EaPα) f �
840
+ PαPβ
841
+ �e | . . . | Ed1 | P1 | . . . | Pd2
842
+
843
+ if f connects Ea and Pα;
844
+
845
+ EaPβ
846
+ � f �
847
+ PαPβ
848
+ �e | ≔
849
+
850
+ E1 | . . . |
851
+
852
+ EaPβ
853
+ � f �
854
+ PαPβ
855
+ �e | . . . | Ed1 | P1 | . . . | Pd2
856
+
857
+ if f connects Ea and Pβ;
858
+
859
+ PαPβ
860
+ �e |
861
+
862
+ PγPδ
863
+ � f ≔
864
+
865
+ E1 | . . . | Ed1 |
866
+
867
+ PαPβ
868
+ �e |
869
+
870
+ PγPδ
871
+ �f | P1 | . . . | Pd2
872
+
873
+ if f =
874
+
875
+ PγPδ
876
+
877
+ ∈ E(G);
878
+
879
+ PαPβ
880
+ �e �
881
+ PαPγ
882
+ � f | ≔
883
+
884
+ E1 | . . . | Ed1 |
885
+
886
+ PαPβ
887
+ �e �
888
+ PαPγ
889
+ �f | P1 | . . . | Pd2
890
+
891
+ if f =
892
+
893
+ PαPγ
894
+
895
+ ∈ E(G);
896
+
897
+ PαPβ
898
+ �e �
899
+ PβPγ
900
+ � f | ≔
901
+
902
+ E1 | . . . | Ed1 |
903
+
904
+ PαPβ
905
+ �e �
906
+ PβPγ
907
+ �f | P1 | . . . | Pd2
908
+
909
+ if f =
910
+
911
+ PβPγ
912
+
913
+ ∈ E(G);
914
+ 3. A splitting property of the chromatic homology
915
+ In this section we show a splitting property of the chromatic homology using the combinatorial description of en-
916
+ hanced states introduced in the previous section. The following proposition gives the generators of Ker (∂i, j : Ci, j(G) →
917
+ Ci+1, j(G)) for any connected graph G.
918
+ Proposition 3.1. Let G be a connected graph. The generators of Ker (∂i, j : Ci, j(G) → Ci+1, j(G)) consist of the
919
+ following two types of elements.
920
+ (I) For fixed (i1, . . ., ip, k1, . . ., kq), 1 ≤ i1 < · · · < it < · · · < ip ≤ d1, 1 ≤ k1 < · · · < kt′ < · · · < kq ≤ d2, p + q = j, and
921
+ Eh, h = 1, . . ., d1 with �d1
922
+ h=1 #Eh = i − 1
923
+ (11)
924
+
925
+ e∈E(G)\�d1
926
+ h=1 Eh
927
+ (−1)n(e) �
928
+ E1 | . . . |
929
+ x
930
+ Eit | . . . | Ed1 | P1 | . . . |
931
+ x
932
+ Pkt′ | . . . | Pd2
933
+
934
+ ∪ e.
935
+ (II) For fixed d1, d2 with d1 + d2 = j and �d1
936
+ h=1 #Eh = i,
937
+ (12)
938
+ x
939
+ E1 | . . . |
940
+ x
941
+ Ed1 |
942
+ x
943
+ P1 | . . . |
944
+ x
945
+ Pd2,
946
+ where each Eh is full of edges, i.e., FEh = Eh holds for h = 1, . . ., d1.
947
+ Proof. (I) Let us show that elements of the form (11) are in Ker ∂i, j. This can be written as
948
+
949
+ e∈E(G)\�d1
950
+ h=1 Eh
951
+ (−1)n(e) �
952
+ E1 | . . . |
953
+ x
954
+ Eit | . . . | Ed1 | P1 | . . . |
955
+ x
956
+ Pkt′ | . . . | Pd2
957
+
958
+ ∪ e
959
+ (13)
960
+
961
+ 8
962
+ SO YAMAGATA
963
+ =
964
+
965
+ 1≤a≤d1
966
+
967
+ e∈FEa \Ea
968
+ (−1)n(e) (x)
969
+ Ee
970
+ a ∪ e +
971
+
972
+ 1≤a<b≤d1
973
+
974
+ e∈FEa ∧FEb \FEa ∪FEb
975
+ (−1)n(e)
976
+ (x)
977
+ (EaEb)e ∪ e
978
+ (14)
979
+ +
980
+
981
+ 1≤a≤d1
982
+ 1≤α≤d2
983
+
984
+ e∈FEa ∧Pα\FEa
985
+ (−1)n(e)
986
+ (x)
987
+ (EaPα)e ∪ e +
988
+
989
+ 1≤α<β≤d2
990
+ e=(PαPβ)
991
+ (−1)n(e)
992
+ (x)
993
+ (PαPβ)e ∪ e
994
+ (15)
995
+ Let us compute the boundary of each term of (14) and (15). In the rest of this computation, we omit the color x for
996
+ simplicity, which does not affect any of the computations.
997
+ ∂i, j
998
+ 
999
+
1000
+ 1≤a≤d1
1001
+
1002
+ e∈FEa \Ea
1003
+ (−1)n(e) (x)
1004
+ Ee
1005
+ a ∪ e
1006
+  =
1007
+
1008
+ 1≤a≤d1
1009
+
1010
+ e∈FEa \Ea
1011
+ (−1)n(e)∂i, j
1012
+ � (x)
1013
+ Ee
1014
+ a ∪ e
1015
+
1016
+ (16)
1017
+ =
1018
+
1019
+ 1≤a,b≤d1
1020
+ a�b
1021
+
1022
+ e∈FEa \Ea
1023
+ f∈FEb \Eb
1024
+ (−1)n(e)+n(f) �
1025
+ Ee
1026
+ a | E f
1027
+ b
1028
+
1029
+ ∪ e · f
1030
+ (17)
1031
+ +
1032
+
1033
+ 1≤a≤d1
1034
+
1035
+ e, f∈FEa \Ea
1036
+ e� f
1037
+ (−1)n(e)+n(f) �
1038
+ Ee, f
1039
+ a
1040
+ |
1041
+
1042
+ ∪ e · f
1043
+ (18)
1044
+ +
1045
+
1046
+ 1≤a,b,c≤d1
1047
+ b<c
1048
+ b,c�a
1049
+
1050
+ e∈FEa \Ea
1051
+ f∈FEb ∧FEc \FEb ∪FEc
1052
+ (−1)n(e)+n(f) �
1053
+ Ee
1054
+ a | (EbEc) f �
1055
+ ∪ e · f
1056
+ (19)
1057
+ +
1058
+
1059
+ 1≤a,b≤d1
1060
+ a�b
1061
+
1062
+ e∈FEa \Ea
1063
+ f∈FEa ∧FEb \FEa ∪FEb
1064
+ (−1)n(e)+n(f) ��Ee
1065
+ aEb
1066
+ �f |
1067
+
1068
+ ∪ e · f
1069
+ (20)
1070
+ +
1071
+
1072
+ 1≤a,b≤d1
1073
+ a�b
1074
+ 1≤α≤d2
1075
+
1076
+ e∈FEa \Ea
1077
+ f∈FEb ∧Pα\FEα
1078
+ (−1)n(e)+n(f) �
1079
+ Ee
1080
+ a | (EbPα) f�
1081
+ ∪ e · f
1082
+ (21)
1083
+ +
1084
+
1085
+ 1≤a≤d1
1086
+ 1≤α≤d2
1087
+
1088
+ e∈FEa \Ea
1089
+ f∈FEa ∧Pα\FEa
1090
+ (−1)n(e)+n(f) �
1091
+ (Ee
1092
+ aPα) f |
1093
+
1094
+ ∪ e · f
1095
+ (22)
1096
+ +
1097
+
1098
+ 1≤a≤d1
1099
+ 1≤α<β≤d2
1100
+
1101
+ e∈FEa \Ea
1102
+ f=(PαPβ)
1103
+ (−1)n(e)+n(f) �
1104
+ Ee
1105
+ a |
1106
+
1107
+ PαPβ
1108
+ � f�
1109
+ ∪ e · f
1110
+ (23)
1111
+ ∂i, j
1112
+ 
1113
+
1114
+ 1≤a<b≤d1
1115
+
1116
+ e∈FEa ∧FEb \FEa ∪FEb
1117
+ (−1)n(e) (EaEb)e ∪ e
1118
+  =
1119
+
1120
+ 1≤a<b≤d1
1121
+
1122
+ e∈FEa ∧FEb \FEa ∪FEb
1123
+ (−1)n(e)∂i, j ((EaEb)e ∪ e)
1124
+ (24)
1125
+ =
1126
+
1127
+ 1≤a<b≤d1
1128
+ 1≤c≤d1
1129
+ c�a,b
1130
+
1131
+ e∈FEa ∧FEb \FEa ∪FEb
1132
+ f∈FEc \Ec
1133
+ (−1)n(e)+n(f) �
1134
+ (EaEb)e | E f
1135
+ c
1136
+
1137
+ ∪ e · f
1138
+ (25)
1139
+ +
1140
+
1141
+ 1≤a<b≤d1
1142
+
1143
+ e∈FEa ∧FEb \FEa ∪FEb
1144
+ f∈FEb \Eb
1145
+ (−1)n(e)+n(f) ��
1146
+ EaE f
1147
+ b
1148
+ �e |
1149
+
1150
+ ∪ e · f
1151
+ (26)
1152
+ +
1153
+
1154
+ 1≤a<b≤d1
1155
+
1156
+ e∈FEa ∧FEb \FEa ∪FEb
1157
+ f∈FEa \Ea
1158
+ (−1)n(e)+n(f) ��
1159
+ E f
1160
+ aEb
1161
+ �e |
1162
+
1163
+ ∪ e · f
1164
+ (27)
1165
+ +
1166
+
1167
+ 1≤a<b≤d1
1168
+
1169
+ e, f∈FEa ∧FEb \FEa ∪FEb
1170
+ e� f
1171
+ (−1)n(e)+n(f) �
1172
+ (EaEb)e, f |
1173
+
1174
+ ∪ e · f
1175
+ (28)
1176
+
1177
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
1178
+ 9
1179
+ +
1180
+
1181
+ 1≤a<b≤d1
1182
+ 1≤c<d≤d1
1183
+ (a,b)�(c,d)
1184
+
1185
+ e∈FEa ∧FEb \FEa ∪FEb
1186
+ f∈FEc ∧FEd \FEc ∪FEd
1187
+ (−1)n(e)+n(f) �
1188
+ (EaEb)e | (EcEd)f �
1189
+ ∪ e · f
1190
+ (29)
1191
+ +
1192
+
1193
+ 1≤a<b≤d1
1194
+ 1≤c≤d1
1195
+ c�a,b
1196
+
1197
+ e∈FEa ∧FEb \FEa ∪FEb
1198
+ f∈FEa ∧FEc \FEa ∪FEc
1199
+ (−1)n(e)+n(f) �
1200
+ (EaEb)e (EaEc) f |
1201
+
1202
+ ∪ e · f
1203
+ (30)
1204
+ +
1205
+
1206
+ 1≤a<b≤d1
1207
+ 1≤c≤d1
1208
+ c�a,b
1209
+
1210
+ e∈FEa ∧FEb \FEa ∪FEb
1211
+ f∈FEb ∧FEc \FEb ∪FEc
1212
+ (−1)n(e)+n(f) �
1213
+ (EaEb)e (EbEc) f |
1214
+
1215
+ ∪ e · f
1216
+ (31)
1217
+ +
1218
+
1219
+ 1≤a<b≤d1
1220
+ 1≤c≤d1
1221
+ c�a,b
1222
+ 1≤α≤d2
1223
+
1224
+ e∈FEa ∧FEb \FEa ∪FEb
1225
+ f∈FEc ∧Pα\FEc
1226
+ (−1)n(e)+n(f) �
1227
+ (EaEb)e | (EcPα)f �
1228
+ ∪ e · f
1229
+ (32)
1230
+ +
1231
+
1232
+ 1≤a<b≤d1
1233
+ 1≤α≤d2
1234
+
1235
+ e∈FEa ∧FEb \FEa ∪FEb
1236
+ f∈FEa ∧Pα\FEa
1237
+ (−1)n(e)+n(f) �
1238
+ (EaEb)e (EaPα)f |
1239
+
1240
+ ∪ e · f
1241
+ (33)
1242
+ +
1243
+
1244
+ 1≤a<b≤d1
1245
+ 1≤α≤d2
1246
+
1247
+ e∈FEa ∧FEb \FEa ∪FEb
1248
+ f∈FEb ∧Pα\FEb
1249
+ (−1)n(e)+n(f) �
1250
+ (EaEb)e (EbPα)f |
1251
+
1252
+ ∪ e · f
1253
+ (34)
1254
+ +
1255
+
1256
+ 1≤a<b≤d1
1257
+ 1≤α<β≤d2
1258
+
1259
+ e∈FEa ∧FEb \FEa ∪FEb
1260
+ f=(PαPβ)
1261
+ (−1)n(e)+n(f) �
1262
+ (EaEb)e |
1263
+
1264
+ PαPβ
1265
+ � f�
1266
+ ∪ e · f
1267
+ (35)
1268
+ ∂i, j
1269
+ 
1270
+
1271
+ 1≤a≤d1
1272
+ 1≤α≤d2
1273
+
1274
+ e∈FEa ∧Pα\FEa
1275
+ (−1)n(e) (EaPα)e ∪ e
1276
+ 
1277
+ (36)
1278
+ =
1279
+
1280
+ 1≤a≤d1
1281
+ 1≤α≤d2
1282
+
1283
+ e∈FEa ∧Pα\FEa
1284
+ (−1)n(e)∂i, j ((EaPα)e ∪ e)
1285
+ (37)
1286
+ =
1287
+
1288
+ 1≤a,b≤d1
1289
+ a�b
1290
+ 1≤α≤d2
1291
+
1292
+ e∈FEa ∧Pα\FEa
1293
+ f∈FEb \Eb
1294
+ (−1)n(e)+n(f) �
1295
+ (EaPα)e | E f
1296
+ b
1297
+
1298
+ ∪ e · f
1299
+ (38)
1300
+ +
1301
+
1302
+ 1≤a≤d1
1303
+ 1≤α≤d2
1304
+
1305
+ e∈Ea∧Pα\FEa
1306
+ f∈FEa \Ea
1307
+ (−1)n(e)+n(f) ��
1308
+ E f
1309
+ aPα
1310
+ �e |
1311
+
1312
+ ∪ e · f
1313
+ (39)
1314
+ +
1315
+
1316
+ 1≤a≤d1
1317
+ 1≤α≤d2
1318
+
1319
+ e, f∈FEa ∧Pα\FEa
1320
+ e� f
1321
+ (−1)n(e)+n(f) �
1322
+ (EaPα)e, f |
1323
+
1324
+ ∪ e · f
1325
+ (40)
1326
+ +
1327
+
1328
+ 1≤a≤d1
1329
+ 1≤b<c≤d1
1330
+ b,c�a
1331
+ 1≤α≤d2
1332
+
1333
+ e∈FEa ∧Pα\FEa
1334
+ f∈FEb ∧FEc \FEb ∪FEc
1335
+ (−1)n(e)+n(f) �
1336
+ (EaPα)e | (EbEc)f �
1337
+ ∪ e · f
1338
+ (41)
1339
+ +
1340
+
1341
+ 1≤a,b≤d1
1342
+ a�b
1343
+ 1≤α≤d2
1344
+
1345
+ e∈FEa ∧Pα\FEa
1346
+ f∈FEa ∧FEb \FEa ∪FEb
1347
+ (−1)n(e)+n(f) �
1348
+ (EaPα)e (EaEb) f |
1349
+
1350
+ ∪ e · f
1351
+ (42)
1352
+ +
1353
+
1354
+ 1≤a,b≤d1
1355
+ a�b
1356
+ 1≤α,β≤d2
1357
+ α�β
1358
+
1359
+ e∈FEa ∧Pα\FEa
1360
+ f∈FEb ∧Pβ\FEb
1361
+ (−1)n(e)+n(f) �
1362
+ (EaPα)e |
1363
+
1364
+ EbPβ
1365
+ � f�
1366
+ ∪ e · f
1367
+ (43)
1368
+
1369
+ 10
1370
+ SO YAMAGATA
1371
+ +
1372
+
1373
+ 1≤a≤d1
1374
+ 1≤α,β≤d2
1375
+ α�β
1376
+
1377
+ e∈FEa ∧Pα\FEa
1378
+ f∈Ea∧Pβ\FEa
1379
+ (−1)n(e)+n(f) �
1380
+ (EaPα)e �
1381
+ EaPβ
1382
+ � f |
1383
+
1384
+ ∪ e · f
1385
+ (44)
1386
+ +
1387
+
1388
+ 1≤a≤d1
1389
+ 1≤α≤d2
1390
+ 1≤β<γ≤d2
1391
+ β,γ�α
1392
+
1393
+ e∈FEa ∧Pα\FEa
1394
+ f=(PβPγ)
1395
+ (−1)n(e)+n(f) �
1396
+ (EaPα)e |
1397
+
1398
+ PβPγ
1399
+ �f �
1400
+ ∪ e · f
1401
+ (45)
1402
+ +
1403
+
1404
+ 1≤a≤d1
1405
+ 1≤α<β≤d2
1406
+
1407
+ e∈FEa ∧Pα\FEa
1408
+ f=(PαPβ)
1409
+ (−1)n(e)+n(f) �
1410
+ (EaPα)e �
1411
+ PαPβ
1412
+ �f |
1413
+
1414
+ ∪ e · f
1415
+ (46)
1416
+ +
1417
+
1418
+ 1≤a≤d1
1419
+ 1≤β<α≤d2
1420
+
1421
+ e∈FEa ∧Pα\FEa
1422
+ f=(PβPα)
1423
+ (−1)n(e)+n(f) �
1424
+ (EaPα)e �
1425
+ PβPα
1426
+ �f |
1427
+
1428
+ ∪ e · f
1429
+ (47)
1430
+ ∂i, j
1431
+ 
1432
+
1433
+ 1≤α<β≤d2
1434
+ e=(PαPβ)
1435
+ (−1)(n(e)) �
1436
+ PαPβ
1437
+ �e ∪ e
1438
+ 
1439
+ (48)
1440
+ =
1441
+
1442
+ 1≤α<β≤d2
1443
+ e=(PαPβ)
1444
+ (−1)(n(e))∂i, j ��
1445
+ PαPβ
1446
+ �e ∪ e
1447
+
1448
+ (49)
1449
+ =
1450
+
1451
+ 1≤a≤d1
1452
+ 1≤α<β≤d2
1453
+
1454
+ e=(PαPβ)
1455
+ f∈FEa \Ea
1456
+ (−1)n(e)+n(f) �
1457
+ E f
1458
+ a |
1459
+
1460
+ PαPβ
1461
+ �e�
1462
+ ∪ e · f
1463
+ (50)
1464
+ +
1465
+
1466
+ 1≤a<b≤d1
1467
+ 1≤α<β≤d2
1468
+
1469
+ e=(PαPβ)
1470
+ f∈FEa ∧FEb \FEa ∪FEb
1471
+ (−1)n(e)+n(f) �
1472
+ (EaEb)f |
1473
+
1474
+ PαPβ
1475
+ �e�
1476
+ ∪ e · f
1477
+ (51)
1478
+ +
1479
+
1480
+ 1≤a≤d1
1481
+ 1≤α<β≤d2
1482
+
1483
+ e=(PαPβ)
1484
+ f∈FEa ∧Pα\FEa
1485
+ (−1)n(e)+n(f) ��
1486
+ EaPγ
1487
+ � f |
1488
+
1489
+ PαPβ
1490
+ �e�
1491
+ ∪ e · f
1492
+ (52)
1493
+ +
1494
+
1495
+ 1≤a≤d1
1496
+ 1≤α<β≤d2
1497
+ 1≤γ≤d2
1498
+ γ�α,β
1499
+
1500
+ e=(PαPβ)
1501
+ f∈FEa ∧Pγ\FEa
1502
+ (−1)n(e)+n(f) �
1503
+ (EaPα) f �
1504
+ PαPβ
1505
+ �e |
1506
+
1507
+ ∪ e · f
1508
+ (53)
1509
+ +
1510
+
1511
+ 1≤a≤d1
1512
+ 1≤α<β≤d2
1513
+
1514
+ e=(PαPβ)
1515
+ f∈FEa ∧Pβ\FEa
1516
+ (−1)n(e)+n(f) ��
1517
+ EaPβ
1518
+ � f �
1519
+ PαPβ
1520
+ �e |
1521
+
1522
+ ∪ e · f
1523
+ (54)
1524
+ +
1525
+
1526
+ 1≤α<β≤d2
1527
+ 1≤γ<δ≤d2
1528
+ (α,β)�(γ,δ)
1529
+ e=(PαPβ), f=(PγPδ)
1530
+ (−1)n(e)+n(f) ��
1531
+ PαPβ
1532
+ �e |
1533
+
1534
+ PγPδ
1535
+ �f �
1536
+ ∪ e · f
1537
+ (55)
1538
+ +
1539
+
1540
+ 1≤α<β≤d2
1541
+ 1≤γ≤d2
1542
+ γ�α,β
1543
+ e=(PαPβ), f=(PαPγ)
1544
+ (−1)n(e)+n(f) ��
1545
+ PαPβ
1546
+ �e �
1547
+ PαPγ
1548
+ �f |
1549
+
1550
+ ∪ e · f
1551
+ (56)
1552
+ +
1553
+
1554
+ 1≤α<β≤d2
1555
+ 1≤γ≤d2
1556
+ γ�α,β
1557
+ e=(PαPβ), f=(PβPγ)
1558
+ (−1)n(e)+n(f) ��
1559
+ PαPβ
1560
+ �e �
1561
+ PβPγ
1562
+ � f |
1563
+
1564
+ ∪ e · f
1565
+ (57)
1566
+
1567
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
1568
+ 11
1569
+ By the following computations we can see that
1570
+ ∂i, j
1571
+ 
1572
+
1573
+ e∈E(G)\�d1
1574
+ h=1 Eh
1575
+ (−1)n(e) �
1576
+ E1 | . . . |
1577
+ x
1578
+ Eit | . . . | Ed1 | P1 | . . . |
1579
+ x
1580
+ Pkt′ | . . . | Pd2
1581
+
1582
+ ∪ e
1583
+  = 0.
1584
+ (17) =
1585
+
1586
+ 1≤a<b≤d1
1587
+
1588
+ e∈FEa \Ea
1589
+ f∈FEb \Eb
1590
+ (−1)n(e)+n(f) �
1591
+ Ee
1592
+ a | E f
1593
+ b
1594
+
1595
+ ∪ e · f +
1596
+
1597
+ 1<b<a≤d1
1598
+
1599
+ e∈FEa \Ea
1600
+ f∈FEb \Eb
1601
+ (−1)n(f)+n(e) �
1602
+ E f
1603
+ b | Ee
1604
+ a
1605
+
1606
+ ∪ e · f
1607
+ = 0.
1608
+ (18) =
1609
+
1610
+ 1≤a≤d1
1611
+ 
1612
+
1613
+ e∈FEa \Ea
1614
+
1615
+ f∈FEa \Ea∪{e}
1616
+ (−1)n(e)+n(f) �
1617
+ Ee, f
1618
+ a
1619
+ |
1620
+
1621
+ ∪ e · f +
1622
+
1623
+ f∈FEa \Ea
1624
+
1625
+ e∈FEa \Ea∪{ f}
1626
+ (−1)n(e)+n(f) �
1627
+ Ee, f
1628
+ a
1629
+ |
1630
+
1631
+ ∪ f · e
1632
+ 
1633
+ = 0.
1634
+ (19) + (25) =
1635
+
1636
+ 1≤a<b<c≤d1
1637
+
1638
+ e∈FEa \Ea
1639
+ f∈FEb ∧FEc \FEb ∪FEc
1640
+ (−1)n(e)+n(f) �
1641
+ Ee
1642
+ a | (EbEc) f�
1643
+ ∪ e · f
1644
+ +
1645
+
1646
+ 1≤c<a<b≤d1
1647
+
1648
+ f∈FEc \Ec
1649
+ e∈FEa ∧FEb \FEa ∪FEb
1650
+ (−1)n(e)+n(f) �
1651
+ E f
1652
+ c | (EaEb)e�
1653
+ ∪ e · f
1654
+ +
1655
+
1656
+ 1≤b<a<c≤d1
1657
+
1658
+ e∈FEa \Ea
1659
+ f∈FEb ∧FEc \FEb ∪FEc
1660
+ (−1)n(e)+n(f) �
1661
+ (EbEc) f | Ee
1662
+ a
1663
+
1664
+ ∪ e · f
1665
+ +
1666
+
1667
+ 1≤a<c<b≤d1
1668
+
1669
+ e∈FEa ∧FEb \FEa ∪FEb
1670
+ f∈FEc \Ec
1671
+ (−1)n(e)+n(f) �
1672
+ (EaEb)e | E f
1673
+ c
1674
+
1675
+ ∪ e · f
1676
+ +
1677
+
1678
+ 1≤b<c<a≤d1
1679
+
1680
+ e∈FEa \Ea
1681
+ f∈FEb ∧FEc \FEb ∪FEc
1682
+ (−1)n(e)+n(f) �
1683
+ (EbEc) f | Ee
1684
+ a
1685
+
1686
+ ∪ e · f
1687
+ +
1688
+
1689
+ 1≤a<b<c≤d1
1690
+
1691
+ e∈FEa ∧FEb \FEa ∪FEb
1692
+ f∈FEc \Ec
1693
+ (−1)n(e)+n(f) �
1694
+ (EaEb)e | E f
1695
+ c
1696
+
1697
+ ∪ e · f
1698
+ = 0
1699
+ (20) + (26) + (27) =
1700
+
1701
+ 1≤a<b≤d1
1702
+
1703
+ e∈FEa \Ea
1704
+ f∈FEa ∧FEb \FEa ∪FEb
1705
+ (−1)n(e)+n(f) ��Ee
1706
+ aEb
1707
+ �f |
1708
+
1709
+ ∪ e · f
1710
+ +
1711
+
1712
+ 1≤a<b≤d1
1713
+
1714
+ e∈FEa ∧FEb \FEa ∪FEb
1715
+ f∈FEa \Ea
1716
+ (−1)n(e)+n(f) ��
1717
+ E f
1718
+ aEb
1719
+ �e |
1720
+
1721
+ ∪ e · f
1722
+ +
1723
+
1724
+ 1≤b<a≤d1
1725
+
1726
+ e∈FEa \Ea
1727
+ f∈FEa ∧FEb \FEa ∪FEb
1728
+ (−1)n(e)+n(f) ��
1729
+ Ee
1730
+ bEa
1731
+ �f |
1732
+
1733
+ ∪ e · f
1734
+ +
1735
+
1736
+ 1≤a<b≤d1
1737
+
1738
+ e∈FEa ∧FEb \FEa ∪FEb
1739
+ f∈FEa
1740
+ (−1)n(e)+n(f) ��
1741
+ EaE f
1742
+ b
1743
+ �e |
1744
+
1745
+ ∪ e · f
1746
+ = 0
1747
+
1748
+ 12
1749
+ SO YAMAGATA
1750
+ (21) + (38) =
1751
+
1752
+ 1≤a,b≤d1
1753
+ a�b
1754
+ 1≤α≤d2
1755
+
1756
+ e∈FEa \Ea
1757
+ f∈Eb∧Pα\FEb
1758
+ (−1)n(e)+n(f) �
1759
+ Ee
1760
+ a | (EbPα) f �
1761
+ ∪ e · f +
1762
+
1763
+ 1≤a,b≤d1
1764
+ a�b
1765
+ 1≤α≤d2
1766
+
1767
+ e∈FEa ∧Pα\FEa
1768
+ f∈FEb \Eb
1769
+ (−1)n(e)+n(f) �
1770
+ E f
1771
+ b | (EaPα)e�
1772
+ ∪ e · f
1773
+ = 0
1774
+ (22) + (39) =
1775
+
1776
+ 1≤a≤d1
1777
+ 1≤α≤d2
1778
+
1779
+ e∈FEa \Ea
1780
+ f∈FEa ∧Pα\FEa
1781
+ (−1)n(e)+n(f) ��Ee
1782
+ aPα
1783
+ �f |
1784
+
1785
+ ∪ e · f +
1786
+
1787
+ 1≤a≤d1
1788
+ 1≤b≤d2
1789
+
1790
+ e∈Ea∧Pα\FEa
1791
+ f∈FEa \Ea
1792
+ (−1)n(e)+n(f) ��
1793
+ E f
1794
+ aPα
1795
+ �e |
1796
+
1797
+ ∪ e · f
1798
+ = 0
1799
+ (23) + (50) =
1800
+
1801
+ 1≤a≤d1
1802
+ 1≤α<β≤d2
1803
+
1804
+ e∈FEa \Ea
1805
+ f=(PαPβ)
1806
+ (−1)n(e)+n(f) �
1807
+ Ee
1808
+ a |
1809
+
1810
+ PαPβ
1811
+ �f �
1812
+ ∪ e · f +
1813
+
1814
+ 1≤a≤d1
1815
+ 1≤α<β≤d2
1816
+
1817
+ e=(PαPβ)
1818
+ f∈FEa \Ea
1819
+ (−1)n(e)+n(f) ��
1820
+ PαPβ
1821
+ �e | E f
1822
+ a
1823
+
1824
+ ∪ e · f
1825
+ = 0
1826
+ (28) =
1827
+
1828
+ 1≤a<b≤d1
1829
+
1830
+ e∈FEa ∧FEb \FEa ∪FEb
1831
+
1832
+ f∈FEa ∧FEb \FEa ∪FEb ∪{e}
1833
+ (−1)n(e)+n(f) �
1834
+ (EaEb)e, f |
1835
+
1836
+ ∪ e · f
1837
+ +
1838
+
1839
+ 1≤a<b≤d1
1840
+
1841
+ f∈FEa ∧FEb \FEa ∪FEb
1842
+
1843
+ e∈FEa ∧FEb \FEa ∪FEb ∪{ f}
1844
+ (−1)n(e)+n(f) �
1845
+ (EaEb)e, f |
1846
+
1847
+ ∪ f · e
1848
+ = 0
1849
+ (29) =
1850
+
1851
+ 1≤a<b<c<d≤d1
1852
+
1853
+ e∈FEa ∧FEb \Ea∪Eb
1854
+ f∈FEc ∧FEd \Ec∪Ed
1855
+ (−1)n(e)+n(f) �
1856
+ (EaEb)e | (EcEd) f�
1857
+ ∪ e · f
1858
+ +
1859
+
1860
+ 1≤c<d<a<b≤d1
1861
+
1862
+ e∈FEa ���FEb \Ea∪Eb
1863
+ f∈FEc ∧FEd \Ec∪Ed
1864
+ (−1)n(e)+n(f) �
1865
+ (EcEd) f | (EaEb)e�
1866
+ ∪ e · f
1867
+ +
1868
+
1869
+ 1≤a<c<b<d≤d1
1870
+
1871
+ e∈FEa ∧FEb \Ea∪Eb
1872
+ f∈FEc ∧FEd \Ec∪Ed
1873
+ (−1)n(e)+n(f) �
1874
+ (EaEb)e | (EcEd)f �
1875
+ ∪ e · f
1876
+ +
1877
+
1878
+ 1≤c<a<d<b≤d1
1879
+
1880
+ e∈FEa ∧FEb \Ea∪Eb
1881
+ f∈FEc ∧FEd \Ec∪Ed
1882
+ (−1)n(e)+n(f) �
1883
+ (EcEd) f | (EaEb)e�
1884
+ ∪ e · f
1885
+ +
1886
+
1887
+ 1≤c<a<b<d≤d1
1888
+
1889
+ e∈FEa ∧FEb \Ea∪Eb
1890
+ f∈FEc ∧FEd \Ec∪Ed
1891
+ (−1)n(e)+n(f) �
1892
+ (EaEb)e | (EcEd)f �
1893
+ ∪ e · f
1894
+ +
1895
+
1896
+ 1≤a<c<d<b≤d1
1897
+
1898
+ e∈FEa ∧FEb \Ea∪Eb
1899
+ f∈FEc ∧FEd \Ec∪Ed
1900
+ (−1)n(e)+n(f) �
1901
+ (EcEd) f | (EaEb)e�
1902
+ ∪ e · f
1903
+ = 0
1904
+ (30) =
1905
+
1906
+ 1≤a<b<c≤d1
1907
+
1908
+ e∈FEa ∧FEb \FEa ∪FEb
1909
+ f∈FEa ∧FEc \FEa ∪FEc
1910
+ (−1)n(e)+n(f) �
1911
+ (EaEb)e (EaEc)f |
1912
+
1913
+ ∪ e · f
1914
+ +
1915
+
1916
+ 1≤a<c<b≤d1
1917
+
1918
+ e∈FEa ∧FEb \FEa ∪FEb
1919
+ f∈FEa ∧FEc \FEa ∪FEc
1920
+ (−1)n(e)+n(f) �
1921
+ (EaEc) f (EaEb)e |
1922
+
1923
+ ∪ f · e
1924
+ +
1925
+
1926
+ 1≤c<a<b≤d1
1927
+
1928
+ e∈FEa ∧FEb \FEa ∪FEb
1929
+ f∈FEa ∧FEc \FEa ∪FEc
1930
+ (−1)n(e)+n(f) �
1931
+ (EcEa) f (EaEb)e |
1932
+
1933
+ ∪ f · e
1934
+
1935
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
1936
+ 13
1937
+ = 0
1938
+ (31) =
1939
+
1940
+ 1≤a<b<c≤d1
1941
+
1942
+ e∈FEa ∧FEb \FEa ∪FEb
1943
+ f∈FEb ∧FEc \FEb ∪FEc
1944
+ (−1)n(e)+n(f) �
1945
+ (EaEb)e (EbEc)f |
1946
+
1947
+ ∪ e · f
1948
+ +
1949
+
1950
+ 1≤a<c<b≤d1
1951
+
1952
+ e∈FEa ∧FEb \FEa ∪FEb
1953
+ f∈FEb ∧FEc \FEb ∪FEc
1954
+ (−1)n(e)+n(f) �
1955
+ (EaEb)e (EcEb)f |
1956
+
1957
+ ∪ e · f
1958
+ +
1959
+
1960
+ 1≤c<a<b≤d1
1961
+
1962
+ e∈FEa ∧FEb \FEa ∪FEb
1963
+ f∈FEb ∧FEc \FEb ∪FEc
1964
+ (−1)n(e)+n(f) �
1965
+ (EcEb) f (EaEb)e |
1966
+
1967
+ ∪ f · e
1968
+ = 0
1969
+ (32) + (41) =
1970
+
1971
+ 1≤a<b<d1
1972
+ 1≤c≤d1
1973
+ c�a,b
1974
+ 1≤α≤d2
1975
+
1976
+ e∈FEa ∧FEb \FEa ∪FEb
1977
+ f∈FEc ∧Pα\FEc
1978
+ (−1)n(e)+n(f) �
1979
+ (EaEb)e | (EcPα)f �
1980
+ ∪ e · f
1981
+ +
1982
+
1983
+ 1≤a≤d1
1984
+ 1≤b<c≤d1
1985
+ b,c�a
1986
+ 1≤α≤d2
1987
+
1988
+ e∈FEa ∧Pα\FEa
1989
+ f∈FEb ∧FEc \FEb ∪FEc
1990
+ (−1)n(e)+n(f) ��
1991
+ (EbEc) f | EaPα
1992
+ �e�
1993
+ ∪ e · f
1994
+ = 0
1995
+ (33) + (34) + (42) =
1996
+
1997
+ 1≤a<b≤d1
1998
+ 1≤α≤d2
1999
+
2000
+ e∈FEa ∧FEb \FEa ∪FEb
2001
+ f∈FEa ∧Pα\FEa
2002
+ (−1)n(e)+n(f) �
2003
+ (EaEb)e (EaPα) f |
2004
+
2005
+ ∪ e · f
2006
+ +
2007
+
2008
+ 1≤a<b≤d1
2009
+ 1≤α≤d2
2010
+
2011
+ e∈FEa ∧Pα\FEa
2012
+ f∈FEb ∧FEa \FEb ∪FEa
2013
+ (−1)n(e)+n(f) �
2014
+ (EaEb) f (EaPα)e |
2015
+
2016
+ ∪ e · f
2017
+ +
2018
+
2019
+ 1≤a<b≤d1
2020
+ 1≤α≤d2
2021
+
2022
+ e∈FEa ∧FEb \FEa ∪FEb
2023
+ f∈FEb ∧Pα\FEb
2024
+ (−1)n(e)+n(f) �
2025
+ (EaEb)e (EbPα) f |
2026
+
2027
+ ∪ e · f
2028
+ +
2029
+
2030
+ 1≤b<a≤d1
2031
+ 1≤α≤d2
2032
+
2033
+ e∈FEa ∧Pα\FEa
2034
+ f∈FEι ∪Ea \FEι ∪FEa
2035
+ (−1)n(e)+n(f) �
2036
+ (EaEb)f (EbPα)e |
2037
+
2038
+ ∪ e · f
2039
+ = 0
2040
+ (35) + (51) =
2041
+
2042
+ 1≤a<b≤d1
2043
+ 1≤α<β≤d2
2044
+
2045
+ e∈FEa ∧FEb \FEa ∪FEb
2046
+ f=(PαPβ)
2047
+
2048
+ (EaEb)e |
2049
+
2050
+ PαPβ
2051
+ �f �
2052
+ ∪ e · f +
2053
+
2054
+ 1≤a<b≤d1
2055
+ 1≤α<β≤d2
2056
+
2057
+ e=(PαPβ)
2058
+ f∈FEa ∧FEb \FEa ∪FEb
2059
+
2060
+ (EaEb) f |
2061
+
2062
+ PαPβ
2063
+ �e�
2064
+ ∪ e · f
2065
+ = 0
2066
+ (40) =
2067
+
2068
+ 1≤a≤d1
2069
+ 1≤α≤d2
2070
+
2071
+ e∈FEa ∧Pα\FEa
2072
+
2073
+ f∈FEa ∧Pα\FEa ∪{e}
2074
+ (−1)n(e)+n(f) �
2075
+ (EaPα)e, f |
2076
+
2077
+ ∪ e · f
2078
+ +
2079
+
2080
+ 1≤a≤d1
2081
+ 1≤α≤d2
2082
+
2083
+ f∈FEa ∧Pα\FEa
2084
+
2085
+ e∈FEa ∧Pα\FEa ∪{ f}
2086
+ (−1)n(e)+n(f) �
2087
+ (EaPα)e, f |
2088
+
2089
+ ∪ f · e
2090
+ = 0
2091
+
2092
+ 14
2093
+ SO YAMAGATA
2094
+ (43) =
2095
+
2096
+ 1≤a<b≤d1
2097
+ 1≤α<β≤d2
2098
+
2099
+ e∈Ea∧Pα\FEa
2100
+ f∈Eb∧Pβ\FEb
2101
+ (−1)n(e)+n(f) �
2102
+ (EaPα)e |
2103
+
2104
+ EbPβ
2105
+ �f �
2106
+ ∪ e · f +
2107
+
2108
+ 1≤b<a≤d1
2109
+ 1≤β<α≤d2
2110
+
2111
+ e∈Ea∧Pα\FEa
2112
+ f∈Eb∧Pβ\FEb
2113
+ (−1)n(e)+n(f) ��
2114
+ EbPβ
2115
+ �f | (EaPα)e�
2116
+ ∪ e · f
2117
+ +
2118
+
2119
+ 1≤a<b≤d1
2120
+ 1≤β<α≤d2
2121
+
2122
+ e∈Ea∧Pα\FEa
2123
+ f∈Eb∧Pβ\FEb
2124
+ (−1)n(e)+n(f) �
2125
+ (EaPα)e |
2126
+
2127
+ EbPβ
2128
+ � f�
2129
+ ∪ e · f +
2130
+
2131
+ 1≤b<a≤d1
2132
+ 1≤α<β≤d2
2133
+
2134
+ e∈Ea∧Pα\FEa
2135
+ f∈Eb∧Pβ\FEb
2136
+ (−1)n(e)+n(f) ��
2137
+ EbPβ
2138
+ � f | (EaPα)e�
2139
+ ∪ e · f
2140
+ = 0
2141
+ (44) =
2142
+
2143
+ 1≤a≤d1
2144
+ 1≤α<β≤d2
2145
+
2146
+ e∈FEa ∧Pα\FEa
2147
+ f∈FEa ∧Pβ\FEa
2148
+ (−1)n(e)+n(f) �
2149
+ (EaPα)e �
2150
+ EaPβ
2151
+ � f |
2152
+
2153
+ ∪ e · f +
2154
+
2155
+ 1≤a≤d1
2156
+ 1≤β<α≤d2
2157
+
2158
+ e∈FEa ∧Pα\FEa
2159
+ f∈FEa ∧Pβ\FEa
2160
+ (−1)n(e)+n(f) ��
2161
+ EaPβ
2162
+ �f (EaPα)e |
2163
+
2164
+ ∪ e · f
2165
+ = 0
2166
+ (45) + (52) =
2167
+
2168
+ 1≤a≤d1
2169
+ 1≤α≤d2
2170
+ 1≤β<γ≤d2
2171
+ β,γ�α
2172
+
2173
+ e∈FEa ∧Pα\FEa
2174
+ f=(PβPγ)
2175
+ (−1)n(e)+n(f) �
2176
+ (EaPα)e |
2177
+
2178
+ PβPγ
2179
+ � f�
2180
+ ∪ e · f
2181
+ +
2182
+
2183
+ 1≤a≤d1
2184
+ 1≤α<β≤d2
2185
+ 1≤γ≤d2
2186
+ γ�α,β
2187
+
2188
+ e∈FEa ∧Pγ\FEa
2189
+ f=(PαPβ)
2190
+ (−1)n(e)+n(f) ��
2191
+ EaPγ
2192
+ � f |
2193
+
2194
+ PαPβ
2195
+ �e�
2196
+ ∪ e · f
2197
+ = 0
2198
+ (46) + (53) =
2199
+
2200
+ 1≤a≤d1
2201
+ 1≤α<β≤d2
2202
+
2203
+ e∈FEa ∧Pα\FEa
2204
+ f=(PαPβ)
2205
+ (−1)n(e)+n(f) �
2206
+ (EaPα)e �
2207
+ PαPβ
2208
+ � f |
2209
+
2210
+ ∪ e · f
2211
+ +
2212
+
2213
+ 1≤a≤d1
2214
+ 1≤α<β≤d2
2215
+
2216
+ e=(PαPβ)
2217
+ f∈Ea∧Pα\FEa
2218
+ (−1)n(e)+n(f) �
2219
+ (EaPα)f �
2220
+ PαPβ
2221
+ �e |
2222
+
2223
+ ∪ e · f
2224
+ = 0
2225
+ (47) + (54) =
2226
+
2227
+ 1≤a≤d1
2228
+ 1≤β<α≤d2
2229
+
2230
+ e∈FEa ∧Pα\FEa
2231
+ f=(PβPα)
2232
+ (−1)n(e)+n(f) �
2233
+ (EaPα)e |
2234
+
2235
+ PβPα
2236
+ � f�
2237
+ ∪ e · f
2238
+ +
2239
+
2240
+ 1≤a≤d1
2241
+ 1≤α<β≤d2
2242
+
2243
+ e=(PαPβ)
2244
+ f∈FEa ∧Pβ\FEa
2245
+ (−1)n(e)+n(f) ��
2246
+ EaPβ
2247
+ �f |
2248
+
2249
+ PαPβ
2250
+ �e�
2251
+ ∪ e · f
2252
+ = 0
2253
+ (55) =
2254
+
2255
+ 1≤α<β<γ<δ≤d2
2256
+ (−1)n(e)+n(f) ��
2257
+ PαPβ
2258
+ �e |
2259
+
2260
+ PγPδ
2261
+ �f �
2262
+ ∪ e · f +
2263
+
2264
+ 1≤γ<δ<α<β≤d2
2265
+ (−1)n(e)+n(f) ��
2266
+ PγPδ
2267
+ � f |
2268
+
2269
+ PαPβ
2270
+ �e�
2271
+ ∪ e · f
2272
+ +
2273
+
2274
+ 1≤α<γ<β<δ≤d2
2275
+ (−1)n(e)+n(f) ��
2276
+ PαPβ
2277
+ �e |
2278
+
2279
+ PγPδ
2280
+ � f �
2281
+ ∪ e · f +
2282
+
2283
+ 1≤γ<α<δ<β≤d2
2284
+ (−1)n(e)+n(f) ��
2285
+ PγPδ
2286
+ � f |
2287
+
2288
+ PαPβ
2289
+ �e�
2290
+ ∪ e · f
2291
+ +
2292
+
2293
+ 1≤γ<α<β<δ≤d2
2294
+ (−1)n(e)+n(f) ��
2295
+ PγPδ
2296
+ �f |
2297
+
2298
+ PαPβ
2299
+ �e�
2300
+ ∪ e · f +
2301
+
2302
+ 1≤α<γ<δ<β≤d2
2303
+ (−1)n(e)+n(f) ��
2304
+ PαPβ
2305
+ �e |
2306
+
2307
+ PγPδ
2308
+ �f �
2309
+ ∪ e · f
2310
+ = 0
2311
+
2312
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
2313
+ 15
2314
+ (56) + (57) =
2315
+
2316
+ 1≤α<β<γ≤d2
2317
+ (−1)n(e)+n(f) ��
2318
+ PαPβ
2319
+ �e �
2320
+ PαPγ
2321
+ �f |
2322
+
2323
+ ∪ e · f +
2324
+
2325
+ 1≤α<γ<β≤d2
2326
+ (−1)n(e)+n(f) ��
2327
+ PαPβ
2328
+ �e �
2329
+ PαPγ
2330
+ �f |
2331
+
2332
+ ∪ e · f
2333
+ +
2334
+
2335
+ 1≤α<β<γ≤d2
2336
+ (−1)n(e)+n(f) ��
2337
+ PαPβ
2338
+ �e �
2339
+ PβPγ
2340
+ �f |
2341
+
2342
+ ∪ e · f +
2343
+
2344
+ 1≤γ<α<β≤d2
2345
+ (−1)n(e)+n(f) ��
2346
+ PγPα
2347
+ �f |
2348
+
2349
+ PαPβ
2350
+ �e�
2351
+ ∪ e · f
2352
+ +
2353
+
2354
+ 1≤α<γ<β≤d2
2355
+ (−1)n(e)+n(f) ��
2356
+ PαPγ
2357
+ �e �
2358
+ PβPγ
2359
+ �f |
2360
+
2361
+ ∪ e · f +
2362
+
2363
+ 1≤γ<α<β≤d2
2364
+ (−1)n(e)+n(f) ��
2365
+ PγPβ
2366
+ � f �
2367
+ PαPβ
2368
+ �e |
2369
+
2370
+ ∪ e · f
2371
+ = 0
2372
+ (II) Since all components of the element of the form (12) are colored x and each component Eh, h = 1, . . ., d is full
2373
+ of edges, only bridges can be added. Thus, the element is obviously that of Ker ∂i, j(G).
2374
+ Conversely, let us consider S ∈ Ker ∂i, j. We show that there are only two cases for the S : (I) S is the sum of a
2375
+ finite number of enhanced states such that all of them share i − 1 edges and the position of color x in common; (II) all
2376
+ components E1, . . ., Ed1, P1 . . . , Pd2 of the S are colored x and they are full of edges; i.e., FEa = Ea holds for all a.
2377
+ (I) Given S ∈ Ker ∂i, j, let us find a finite number of enhanced states S h, h = 1, . . ., l such that S = S 1 +· · ·+S l and l
2378
+ is minimal as possible. For fixed 1 ≤ i1 < · · · < it < · · · < ip ≤ d1, 1 ≤ k1 < · · · < kt′ < · · · < kq ≤ d2 take the enhanced
2379
+ state S e of the form
2380
+ S e =
2381
+
2382
+ E1 | . . . |
2383
+ x
2384
+ Eit | . . . | Ed1 | P1 | . . . |
2385
+ x
2386
+ Pkt′ | . . . | Pd2
2387
+
2388
+ ∪ e,
2389
+ and S of the form
2390
+ S =
2391
+
2392
+ e∈E(G)\�d1
2393
+ h=1 Eh
2394
+ (−1)n(e)S e,
2395
+ where �d1
2396
+ h=1 #Eh = i−1. In this case, we can see that S ∈ Ker ∂i, j by the former computations. Notice that the set E(G)\
2397
+ �d1
2398
+ h=1 Eh is the set of all edges which can be added to the enhanced state E1 | . . . |
2399
+ x
2400
+ Eit | . . . | Ed1 | P1 | . . . |
2401
+ x
2402
+ Pkt′ | . . . | Pd2.
2403
+ For the set B = {e ∈ E(G) | e connects two components which are colored x} the enhanced state S ∈ Ker ∂i, j is the sum
2404
+ of #
2405
+
2406
+ E(G) \ �d1
2407
+ h=1 Eh
2408
+
2409
+ − #B terms. Let us show that the number #
2410
+
2411
+ E(G) \ �d1
2412
+ h=1 Eh
2413
+
2414
+ − #B is minimal. Let us assume
2415
+ that the minimal number is less than #
2416
+
2417
+ E(G) \ �d1
2418
+ h=1 Eh
2419
+
2420
+ −#B, say l with l < #
2421
+
2422
+ E(G) \ �d1
2423
+ h=1 Eh
2424
+
2425
+ −#B. Then, there exist
2426
+ enhanced states S i1, . . . , S iM−l ∈ {S 1, . . ., S M} such that ∂i, j(S 1 + · · ·+ S M) = ∂i, j(S 1 + · · ·+ S M − (S i1 + · · ·+ S iM−l)) = 0,
2427
+ in particular, we have �M−l
2428
+ p=1 ∂i, j(S ip) = 0, where M = #
2429
+
2430
+ E(G) \ �d1
2431
+ h=1 Eh
2432
+
2433
+ − #B. On the other hand, non-vanishing terms
2434
+ exist in the boundary �M−l
2435
+ p=1 ∂i, j(S ip). Actually, for the set X = {e ∈ E(G) | S ip ∋ e, p = 1, . . ., M − l} the boundary
2436
+ ∂i, j
2437
+ 
2438
+
2439
+ 1≤a≤d1
2440
+
2441
+ e∈(FEa \Ea)∩X
2442
+ (−1)n(e) (x)
2443
+ Ee
2444
+ a ∪ e
2445
+  =
2446
+
2447
+ 1≤a≤d1
2448
+
2449
+ e∈(FEa \Ea)∩X
2450
+ (−1)n(e)∂i, j
2451
+ � (x)
2452
+ Ee
2453
+ a ∪ e
2454
+
2455
+ has the terms
2456
+
2457
+ 1≤a<b≤d1
2458
+
2459
+ e∈(FEa \Ea)∩X
2460
+ f∈FEb \Eb
2461
+ (−1)n(e)+n(f) �
2462
+ Ee
2463
+ a | E f
2464
+ b
2465
+
2466
+ ∪ e · f +
2467
+
2468
+ 1≤a<b≤d1
2469
+
2470
+ e∈(FEa \Ea)
2471
+ f∈(FEb \Eb)∩X
2472
+ (−1)n(e)+n(f)+1 �
2473
+ Ee
2474
+ a | E f
2475
+ b
2476
+
2477
+ ∪ e · f � 0.
2478
+ Thus, l = #
2479
+
2480
+ E(G) \ �d1
2481
+ h=1 Eh
2482
+
2483
+ − #B is the minimal number of the terms of the sum S = S 1 + · · · + S l such that the
2484
+ element S is in Ker ∂i, j if all enhanced sates S h, h = 1, . . ., l share i − 1 edges and the position of color x.
2485
+ Now, let us fix f ∈ E(G) \ �d1
2486
+ h=1 Eh and consider S e denoted by
2487
+ S e =
2488
+
2489
+ E1 | . . . |
2490
+ x
2491
+ Eit | . . . | Ed1 | P1 | . . . |
2492
+ x
2493
+ Pkt′ | . . . | Pd2
2494
+
2495
+ ∪ f · e ∈ Ci, j(G), e ∈ E(G) \
2496
+ d1
2497
+
2498
+ h=1
2499
+ Eh,
2500
+ where # �d1
2501
+ h=1 Eh = i − 2, and for fixed 1 ≤ i1 < · · · < it < · · · < ip ≤ d1, 1 ≤ k1 < · · · < kt′ < · · · < kq ≤ d2 components
2502
+ Eit, Pkt′ are colored x. Let us take an enhanced state T ∈ Ci, j(G) such that for some
2503
+ S e′ ∈
2504
+ S e
2505
+ ������� S e =
2506
+
2507
+ E1 | . . . |
2508
+ x
2509
+ Eit | . . . | Ed1 | P1 | . . . |
2510
+ x
2511
+ Pkt′ | . . . | Pd2
2512
+
2513
+ ∪ f · e, e ∈ E(G) \
2514
+ d1
2515
+
2516
+ h=1
2517
+ Eh
2518
+ 
2519
+
2520
+ 16
2521
+ SO YAMAGATA
2522
+ the number of common edges of T and S e is i − 2. Specifically, assume T to be of the form
2523
+ T =
2524
+
2525
+ E1 | . . . |
2526
+ x
2527
+ Eit | . . . | Ed1 | P1 | . . . |
2528
+ x
2529
+ Pkt′ | . . . | Pd2
2530
+
2531
+ ∪ f ′ · e,
2532
+ where f ′(� f) and e(� f ′) ∈ E(G) \ �d1
2533
+ h=1 Eh are fixed. Then, any term of ∂i, j(S e′) is of the form
2534
+ (−1)n(g) �
2535
+ E1 | . . . |
2536
+ x
2537
+ Eit | . . . | Ed1 | P1 | . . . |
2538
+ x
2539
+ Pkt′ | . . . | Pd2
2540
+
2541
+ ∪ f · e′ · g,
2542
+ where g(� e, f) ∈ E(G) \ �d1
2543
+ h=1 Eh, while any term of ∂i, j(T) is of the form
2544
+ (−1)n(g) �
2545
+ E1 | . . . |
2546
+ x
2547
+ Eit | . . . | Ed1 | P1 | . . . |
2548
+ x
2549
+ Pkt′ | . . . | Pd2
2550
+
2551
+ ∪ f ′ · e · g.
2552
+ Since f ′ � f, these two cannot be canceled by each other. Thus, if there exists such T in the sum S = S 1 + · · · + S l ∈
2553
+ Ker ∂i, j, the sum should be of the form S = �l1
2554
+ h=1 S h + �l2
2555
+ k=1 Tk such that S h, h = 1, . . ., l1 and Tk, k = 1, . . ., l2 have
2556
+ i − 1 common edges and the position of color x respectively, and S h, Tk have i − 2 edges commonly for any h, k,
2557
+ whose construction needs to take more than #
2558
+
2559
+ E(G) \ �d1
2560
+ h=1 Eh
2561
+
2562
+ elements of Ci, j(G), which results in a contraction of
2563
+ the minimality of l.Thus, S 1, . . ., S l should have i − 1 edges in common.
2564
+ Let us next show that for S ∈ Ker ∂i, j we cannot choose finite enhanced states S h, h = 1, . . ., l such that S =
2565
+ S 1 + · · · + S l and S h, h = 1, . . ., l share i − 1 edges but not the position of color x. We show this fact in a constructive
2566
+ way. For arbitrarily fixed S 1 ∈ Ci, j(G), let us assume that there exist enhanced states S h, h = 1, . . ., l such that
2567
+ ∂i, j(S 1 + S 2 + · · · + S l) = 0 holds. Choose S 1 ∈ Ci, j(G) of the form
2568
+ S 1 = . . . | Eτ | . . . |
2569
+ x
2570
+ Eit1 | . . . | Ea1 | . . . |
2571
+ x
2572
+ Eit2 | . . . | Ea2 | . . . |
2573
+ x
2574
+ Pkt′ | . . . | Pα | . . . ,
2575
+ where # �d1
2576
+ h=1 Eh = i, and for fixed 1 ≤ i1 < · · · < it < · · · < ip ≤ d1, 1 ≤ k1 < · · · < kt′ < · · · < kq ≤ d2 components
2577
+ Eit, Pkt′ are colored x. Notice that in the rest of the construction we do not care about the position of label x of the
2578
+ components Pkt′ for simplicity.
2579
+ Let us consider the term
2580
+ x
2581
+
2582
+ EτEit1
2583
+ �e of ∂i, j(S 1). To cancel the term we need to add S 2 ∈ Ci, j(G) of the form
2584
+ (A) : . . . |
2585
+ x
2586
+ Eτ | . . . |
2587
+ ˆx
2588
+ Eit1 | . . . | Ea1 | . . . |
2589
+ (x)
2590
+ Eit2 | . . . | Ea2 | . . . or
2591
+ (B) : . . . | Eτ | . . . |
2592
+ x
2593
+ Eit1 | . . . | Ea1 | . . . |
2594
+ ˆx
2595
+ Eit2 | . . . |
2596
+ x
2597
+ Ea2 | . . . .
2598
+ If we take S 2 of the form (A), the boundary ∂i, j(S 2) would have the term
2599
+ x
2600
+
2601
+ EτEit1
2602
+ �e, so the term is canceled in ∂i, j(S 1 −
2603
+ S 2). Then, to delete the term �EτEa1
2604
+ �e of ∂i, j(S 1) we need to add an enhanced state S 3 of the form
2605
+ (C) : . . . | Eτ | . . . |
2606
+ ˆx
2607
+ Eit1 | . . . | Ea1 | . . . |
2608
+ (x)
2609
+ Eit2 | . . . |
2610
+ x
2611
+ Ea2 | . . . or
2612
+ (D) : . . . | Eτ | . . . |
2613
+ x
2614
+ Eit1 | . . . | Ea1 | . . . |
2615
+ ˆx
2616
+ Eit2 | . . . |
2617
+ x
2618
+ Ea2 | . . . .
2619
+ If (C) is the case, the term
2620
+
2621
+ Eit1 Ea
2622
+ �e appears in ∂i, j(S 1 − S 2 − S 3), and we need to add an enhanced state S 4 ∈ Ci, j(G)
2623
+ such that the terms
2624
+ x
2625
+
2626
+ Eit1 Ea1
2627
+ �e and �EiτEa1
2628
+ �e are deleted in ∂i, j(S 1 − S 2 − S 3 − S 4), but such an enhanced state does
2629
+ not exist. On the other hand, if (D) is the case, the term
2630
+ x
2631
+
2632
+ EτEit1
2633
+ �e reappears. Thus, both approaches result in new
2634
+ terms–which cannot be deleted by adding new enhanced states– appearing every time we add enhanced states in such
2635
+ a way that any term of ∂i, j(S 1) is deleted, and thus, we cannot construct the element of Ker ∂i, j if S 2 is of the form (A).
2636
+ Next, let us take S 2 of the form (B). In this case, the boundary ∂i, j(S 2) would have the terms
2637
+ x
2638
+
2639
+ EτEit1
2640
+ �e and �EτEa1
2641
+ �e,
2642
+ so the same terms of ∂i, j(S 1) can be canceled in ∂i, j(S 1 − S 2). In a similar way if we take S h, 3 ≤ h ≤ p of the form
2643
+ . . . | Eτ | . . . |
2644
+ (x)
2645
+ Eit1 | . . . | Ea1 | . . . |
2646
+ (x)
2647
+ Eit2 | . . . |
2648
+ (x)
2649
+ Ea2 | . . . |
2650
+ ˆx
2651
+ Eith | . . . |
2652
+ x
2653
+ Eah−1 | . . .
2654
+
2655
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
2656
+ 17
2657
+ we can delete terms of the form
2658
+ x
2659
+
2660
+ EτEith
2661
+ �e and �EτEah
2662
+ �, h = 1, . . ., p. But again in this construction, the term(s) of the
2663
+ form
2664
+ (x)
2665
+ �EτEim
2666
+ �e for some m appears in ∂i, j(S 1 − S 2 − · · ·− S p). The term also cannot be deleted by adding new enhanced
2667
+ states.Thus, this approach is also inappropriate for the construction.
2668
+ Therefore, enhanced states S h, h = 1, . . ., l of the sum S = S 1 + · · · + S l ∈ Ker ∂i, j hold the property that they have
2669
+ i − 1 edges and the position of the color x commonly, and thus we obtain the element of the form of type (I).
2670
+ (II) Let us take S ∈ Ker ∂i, j of the form
2671
+ S 2 =
2672
+
2673
+ E1 | . . . |
2674
+ x
2675
+ Eit | . . . | Ed1 | P1 | . . . |
2676
+ x
2677
+ Pkt′ | . . . | Pd2
2678
+
2679
+ .
2680
+ A similar observation as the one that we cannot take enhanced states S h, h = 1, . . ., l such that S = S 1+· · ·+S l ∈ Ker ∂i, j
2681
+ and S h, h = 1, . . ., l share i − 1 edges but not the position of color x, can be applied if j < d1 + d2. Thus, we cannot
2682
+ take a finite number of enhanced states S 1, . . ., S l ∈ Ci, j(G) such that S = S 1 + · · · + S l ∈ Ker ∂i, j.
2683
+ Next, let us consider j = d1 + d2. Take an element S ∈ Ci,d1+d2(G) of the form
2684
+ x
2685
+ E1 | . . . |
2686
+ x
2687
+ Ed1 |
2688
+ x
2689
+ P1 | . . . |
2690
+ x
2691
+ Pd2.
2692
+ By the form of ∂i,s+t(S ) the terms (EaEb)e, (EaPα)e,
2693
+
2694
+ PαPβ
2695
+ �e are 0. To obtain the element of Ker ∂i,s+t for each
2696
+ component Ee
2697
+ a, a = 1, . . ., s should be non-existent; equivalently, all components of S are full of edges, i.e., FEa = Ea
2698
+ holds for all a.
2699
+
2700
+ Proposition 3.2. Let G be a graph and e be its edge that is not a bridge. Then, for any i, j, the connecting homomor-
2701
+ phism γi, j of the following diagram is a 0-map:
2702
+ 0
2703
+ 0
2704
+ 0
2705
+ 0
2706
+ Ker δi−1, j
2707
+ Ker di, j
2708
+ Ker ∂i, j
2709
+ 0
2710
+ Ci−1, j(G/e)
2711
+ Ci, j(G)
2712
+ Ci, j(G − e)
2713
+ 0
2714
+ 0
2715
+ Ci, j(G/e)
2716
+ Ci+1, j(G)
2717
+ Ci+1, j(G − e)
2718
+ 0
2719
+ coker δi−1, j
2720
+ coker di, j
2721
+ coker ∂i, j
2722
+ 0
2723
+ 0
2724
+ 0
2725
+ 0
2726
+ αi−1, j
2727
+ βi, j
2728
+ δi−1, j
2729
+ di, j
2730
+ ∂i, j
2731
+ αi, j
2732
+ βi+1, j
2733
+ γi, j
2734
+
2735
+ 18
2736
+ SO YAMAGATA
2737
+ Proof. First, let us take S
2738
+ S =
2739
+ x
2740
+ E1 | . . . |
2741
+ x
2742
+ Ed1 |
2743
+ x
2744
+ P1 | . . . |
2745
+ x
2746
+ Pd2 ∈ Ker ∂i, j,
2747
+ where d1+d2 = j, �d1
2748
+ h=1 #Eh = i and Eh, h = 1, . . ., d1 are full of edges as components of an enhanced state of Ci, j(G−e)
2749
+ except for e as components of an enhanced state of Ci, j(G). Consider S ∪ e ∈ Ci, j(G). By definition βi, j(S ∪ e) = S and
2750
+ we have
2751
+ di, j(S ∪ e) =
2752
+
2753
+ 1≤a≤d1
2754
+
2755
+ e∈FEa \Ea
2756
+ (−1)n(e) � x
2757
+ E1 | . . . |
2758
+ x
2759
+ Ee
2760
+ a | . . . |
2761
+ x
2762
+ Ed1 |
2763
+ x
2764
+ P1 | . . . |
2765
+ x
2766
+ Pd2
2767
+
2768
+ ∪ e.
2769
+ Take an element S /e ∈ Ci−1, j(G/e) in such a way that
2770
+ S /e =
2771
+
2772
+ 1≤a≤d1
2773
+
2774
+ e∈FEa \Ea
2775
+ (−1)n(e)
2776
+ � x
2777
+ E1 | . . . |
2778
+ x
2779
+ E/e
2780
+ a | . . . |
2781
+ x
2782
+ Ed1 |
2783
+ x
2784
+ P1 | . . . |
2785
+ x
2786
+ Pd2
2787
+
2788
+ ∪ e,
2789
+ where
2790
+ x
2791
+ E/e
2792
+ p is a component defined by contracting e of
2793
+ x
2794
+ Ee
2795
+ p. Then, we have S /e ∈ Ci−1, j(G/e) such that αi−1, j(S /e) = S ∪e.
2796
+ By commutativity of the diagram, the element sending the given enhanced state S ∈ Ker ∂i, j by γi, j is 0 ∈ cokerδi−1, j.
2797
+ Next, let us take
2798
+ S =
2799
+
2800
+ e∈E(G)\�d1
2801
+ h=1 Eh
2802
+ (−1)n(f)(E1 | . . . |
2803
+ x
2804
+ Eit | . . . | Ed1 | P1 | . . . |
2805
+ x
2806
+ Pkt′ | . . . | Pd2) ∪ e ∈ Ker ∂i, j,
2807
+ where for fixed 1 ≤ i1 < · · · < it < · · · < ip ≤ d1 and 1 ≤ k1 < · · · < kt′ < · · · < kq ≤ d2 components Ei1, . . ., Eip,
2808
+ Pk1, . . . , Pkq, p + q = j are colored x. Consider S ∪ e ∈ Ci, j(G). By definition we have βi, j(S ∪ e) = S . By Proposition
2809
+ 3.1 the enhanced state S ∪ e is also an element in Ker di, j. Then, again by commutativity of the diagram the element
2810
+ S ∈ Ker ∂i, j corresponds to 0 ∈ coker δi−1, j.
2811
+
2812
+ By Proposition 3.2 if e is not a bridge, then we have a short exact sequence
2813
+ (58)
2814
+ 0 → Hi, j(G/e) → Hi+1, j(G) → Hi+1, j(G − e) → 0.
2815
+ for i, j.
2816
+ Next, consider a map
2817
+ ϕi+1, j : Ci+1, j(G − e) → Ci+1, j(G)
2818
+ that sends an enhanced state S ∈ Ci+1, j(G − e) to S ′ ∈ Ci+1, j(G) such that S and S ′ are the same form as graphs. Then,
2819
+ since e in not a bridge, if S ∈ Ker ∂i+1, j, then S ′ = ϕi, j(S ) ∈ Ker di+1, j. In particular, the maps ϕi, j induce sections
2820
+ ¯ϕi+1, j : Hi+1, j(G − e) → Hi+1, j(G)
2821
+ of the sequence (58) for all i, j, and thus we can see that the sequences split for all i, j. The following is the main
2822
+ theorem of the present paper.
2823
+ Theorem 3.3. Let G be a graph and e be its edge that is not a bridge. Then, we have the following split exact sequence
2824
+ (59)
2825
+ 0 → Hi, j(G/e) → Hi+1, j(G) → Hi+1, j(G − e) → 0
2826
+ for i, j.
2827
+ If we sum over j, we have the split exact sequence
2828
+ (60)
2829
+ 0 → Hi(G/e) → Hi+1(G) → Hi+1(G − e) → 0
2830
+ for i.
2831
+
2832
+ A SPLITTING PROPERTY OF THE CHROMATIC HOMOLOGY
2833
+ 19
2834
+ 4. Chromatic homology for the complete graph
2835
+ As an example, let us compute the chromatic homology of the complete graph Kn with n (n ≥ 4) vertices. Fix a
2836
+ vertex v0 ∈ V(Kn) and define the graph Gm as
2837
+ G0 = Kn
2838
+ Gm+1 = Gm \ e,
2839
+ where e ∈ E(Kn) contains v0 as its end vertex. We have the following lemma.
2840
+ Lemma 4.1. If m ≤ n − 2, the graph Gm has just one connected component.
2841
+ Proof. It suffices to show that to obtain two connected components we need to remove at least n − 1 edges. Let us
2842
+ assume Kn = Kn1 ∧ Kn2 for arbitrarily fixed n1, n2(≥ 1) with n1 + n2 = n. Then, to obtain two connected components,
2843
+ we need to remove at least # �Kn1 ∧ Kn2 \ E(Kn1) ∪ E(Kn2)� = n1n2 = n1(n − n1) edges.
2844
+ Consider
2845
+ n1(n − n1) − (n − 1) = (n1 − 1)(n − n1 − 1).
2846
+ Since n1 ≥ 1, n2 = n − n1 ≥ 1, the formula obviously must be (n1 − 1)(n − n1 − 1) ≥ 0. Thus, to obtain at least two
2847
+ connected components by removing some edges from Kn, the number of removed edges should be at least n − 1. In
2848
+ particular, the number of the connected components is always one when we remove any n1 ≤ n − 2 edges.
2849
+
2850
+ By Lemma 4.1 it follows that when m ≤ n − 2, e is not a bridge, and thus we can apply Theorem 3.3 for the graphs
2851
+ Gm, 1 ≤ m ≤ n − 2. In particular, since Kn/e = Kn−1, we have the following proposition.
2852
+ Proposition 4.2. For 1 ≤ j ≤ n − 2, we have the following split exact sequence
2853
+ 0 → Hi, j(Kn−1) → Hi+1, j(Gm) → Hi+1, j(Gm+1) → 0
2854
+ for i, j.
2855
+ By summing up by j we have the split exact sequence
2856
+ 0 → Hi(Kn−1) → Hi+1(Gm) → Hi+1(Gm+1) → 0
2857
+ for i.
2858
+ Thus, as a corollary of Proposition 4.2 we obtain a recursive description of the chromatic homology of the complete
2859
+ graph.
2860
+ Theorem 4.3 (Conjecture 6.8 [9]). For n ≥ 4 the chromatic homology groups of a complete graph Kn are given
2861
+ recursively as
2862
+ (61)
2863
+ Hi(Kn) =
2864
+ 
2865
+ Z{n}
2866
+ i = 0
2867
+ Hi−1(Kn−1)⊕(n−2) ⊕ Hi(Kn−1){1}
2868
+ 1 ≤ i ≤ n − 2
2869
+ 0
2870
+ i ≥ n − 1.
2871
+ Proof. To begin with, let us consider H0(Kn). By Proposition 3.1 we can see that H0(Kn) ≃ Ker
2872
+
2873
+ ∂0 : C0(Kn) → C1(Kn)
2874
+
2875
+ is generated by only
2876
+ x
2877
+ P1 | . . . |
2878
+ x
2879
+ P j | . . . |
2880
+ x
2881
+ Pn. Thus, we have H0(Kn) = Z{n}. The case i ≥ n − 1 is also obvious. By
2882
+ Lemma 4.1 if we remove at least n − 1 edges, then there would exist two-component enhanced states which are of the
2883
+ form
2884
+ (x)
2885
+ E1 |
2886
+ (x)
2887
+ E2 in Ci(Kn). That is, Ci(Kn) contains enhanced states of the form
2888
+ (x)
2889
+ E and
2890
+ (x)
2891
+ EE′, and thus we have Ker ∂i, j = 0.
2892
+ Finally, let us show the case 1 ≤ i ≤ n − 2. By Proposition 4.2 we can write Hi(Kn) as follows:
2893
+ Hi(Kn) = Hi(G0) = Hi−1(Kn−1) ⊕ Hi(G1)
2894
+ Hi(G1) = Hi−1(Kn−1) ⊕ Hi(G2)
2895
+ Hi(G2) = Hi−1(Kn−1) ⊕ Hi(G3)
2896
+ · · · · · · · · ·· · · · · · · · · · · ·· · · · · ·
2897
+ Hi(Gn−3) = Hi−1(Kn−1) ⊕ Hi(Gn−2).
2898
+
2899
+ 20
2900
+ SO YAMAGATA
2901
+ Remark that since Gn−2 is a graph obtained by adding a pendant edge, which is an edge of G such that one of the end
2902
+ vertices has no edges, to the complete graph Kn−1, we have Hi(Gn−2) ≃ Hi(Kn−1){1}, and thus we obtain
2903
+ Hi−1(Kn−1)⊕(n−2) ⊕ Hi(Kn−1){1},
2904
+ which completes the proof.
2905
+
2906
+ Remark 4.4. Theorem 4.3 also gives the characteristic homology, introduced in [5], of the braid arrangement, which
2907
+ would be the first result for the explicit calculation of the homology.
2908
+ Remark 4.5. It would be interesting to generalize the Theorem 3.3 with the general algebra Z[x]/(xm), i.e., the chro-
2909
+ matic homology of graphs with colors in Z[x]/(xm). Such a generalization might lead to further developments in the
2910
+ study of chromatic homology, including insights into the conjectures given by Pabiniak et al. [15].
2911
+ References
2912
+ [1] V. Baranovsky and R. Sazdanovic, Graph homology and graph configuration spaces, Journal of Homotopy and Related Structures, 7, 223-235
2913
+ (2012).
2914
+ [2] M. B¨okstedt and E. Minuz, Graph cohomologies and rational homotopy type of configuration spaces, arXiv:1904.01452 [math.AT].
2915
+ [3] A. Chandler and R. Sazdanovic, A broken circuit model for chromatic homology theories, European Journal of Combinatorics, 104, 103538
2916
+ (2022).
2917
+ [4] M. Chmutov and S. Chmutov, and Y. Rong, Knight move for chromatic graph cohomology, European Journal of Combinatorics, 29 (1), 311-321
2918
+ (2008).
2919
+ [5] Z. Dancso and A. Licata, Odd Khovanov homology for hyperplane arrangements, Journal of Algebra, 436 (15), 102-144 (2015).
2920
+ [6] A. Hasegawa, Khovanonv homology of graph and quandles, Master’s thesis, Department of Mathematics, Hokkaido University (2020).
2921
+ [7] L. Helme-Guizon, J. Przytycki, and Y. Rong, Torsion in graph homology, Fundamenta Mathematicae 190 (1), 139-177 (2006).
2922
+ [8] L. Helme-Guizon and Y. Rong, Graph Cohomologies from Arbitrary Algebras, arXiv:0506023 [math.QA].
2923
+ [9] L. Helme-Guizon and Y. Rong, A categorification for the chromatic polynomial, Algebraic & Geometric Topology, 5(4), 1365-1388 (2005).
2924
+ [10] E. F. Jasso-Hernandez and Y. Rong, A categorification for the Tutte polynomial, Algebraic & Geometric Topology, 6(5), 2031-2049 (2006).
2925
+ [11] M. Khovanov, A categorification of the Jones polynomial, Duke Mathematical Journal, 101, 359-426 (2000).
2926
+ [12] I. Kriz, On the rational homotopy type of configuration spaces, Annals of Mathematics, 139(2), 227-237 (1994).
2927
+ [13] M. Loebl and I. Moffatt, The chromatic polynomial of fatgraphs and its categorification, Advances in Mathematics, 217 (4), 1558-1587 (2008).
2928
+ [14] A. M. Lowrance and R. Sazdanovic, Chromatic homology, Khovanov homology, and torsion, Topology and its Applications, 222, 77-99 (2017).
2929
+ [15] M. D. Pabiniak, JH. Przytycki, and R. Sazdanovi´c, On the first group of the chromatic cohomology of graphs, Geometriae Dedicata, 140, 19-48
2930
+ (2009).
2931
+ [16] JH. Przytycki, When the theories meet: Khovanov homology as Hochschild homology of links, Quantum Topology, 1(2), 93-109 (2010).
2932
+ [17] R. Sazdanovic and D. Scofield, Patterns in Khovanov link and chromatic graph homology, Journal of Knot Theory and Its Ramifications, 27
2933
+ (3), 1840007 (2018).
2934
+ [18] R. Sazdanovic and M. Yip, A categorification of the chromatic symmetric function, Journal of Combinatorial Theory, Series A, 154, 218-246
2935
+ (2018).
2936
+ [19] Z. Zhuang, On the homology theory for the chromatic polynomials, arXiv:2107.03671 [math.GT].
2937
+ Department of Applied Mathematics, Faculty of Science, Fukuoka University, Fukuoka, 814-0180, Japan.
2938
+ Email address: [email protected]
2939
+
E9A0T4oBgHgl3EQfBP8f/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
G9E4T4oBgHgl3EQfgQ3v/content/tmp_files/2301.05116v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
G9E4T4oBgHgl3EQfgQ3v/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ItFKT4oBgHgl3EQfdy7h/content/tmp_files/2301.11822v1.pdf.txt ADDED
@@ -0,0 +1,830 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11822v1 [math.AP] 27 Jan 2023
2
+ LAGRANGIAN STABILITY FOR A SYSTEM OF NON-LOCAL
3
+ CONTINUITY EQUATIONS UNDER OSGOOD CONDITION
4
+ MARCO INVERSI AND GIORGIO STEFANI
5
+ Abstract. We extend known existence and uniqueness results of weak measure solu-
6
+ tions for systems of non-local continuity equations beyond the usual Lipschitz regularity.
7
+ Existence of weak measure solutions holds for uniformly continuous vector fields and
8
+ convolution kernels, while uniqueness follows from a Lagrangian stability estimate under
9
+ an additional Osgood condition.
10
+ 1. Introduction
11
+ 1.1. Statement of the problem. For fixed T ∈ (0, +∞) and k, d ∈ N, we consider the
12
+ system of non-local continuity equations
13
+
14
+
15
+
16
+ ∂t̺i + div (̺i V i(t, x, ̺ ∗ ηi))
17
+ =
18
+ 0,
19
+ t ∈ (0, T), x ∈ Rd,
20
+ ̺i(0)
21
+ =
22
+ ¯̺i,
23
+ i = 1, . . . , k,
24
+ (1.1)
25
+ where the unknown ̺ = (̺1, . . . , ̺k) ∈ L∞([0, T]; M+(Rd)k) is a time-dependent k-vector
26
+ of non-negative Borel measures on Rd, the initial datum ¯̺ = (¯̺1, . . . , ¯̺k) ∈ M+(Rd)k is a
27
+ k-vector of non-negative Borel measures,
28
+ V = (V 1, . . . , V k) ∈ L∞([0, T]; Cb(Rd × Rk; Rd)k)
29
+ (1.2)
30
+ is a uniformly-in-time bounded continuous k-vector field and
31
+ ηi = (ηi,1, . . . , ηi,k) ∈ L∞([0, T]; Cb(Rd; Rk))
32
+ (1.3)
33
+ is a uniformly-in-time bounded continuous k-vector of convolution kernels, with the con-
34
+ volution ̺ ∗ ηi = (̺1 ∗ ηi,1, . . . , ̺k ∗ ηi,k) occurring in the space variable only.
35
+ In the
36
+ entire paper, we frequently consider the 1-norm (i.e., the sum of the absolute values of
37
+ the entries) on both vectors and matrices. In particular, |̺| = |̺1| + · · · + |̺k| and thus
38
+ ∥̺∥M = ∥̺1∥M+· · ·+∥̺k∥M for all ̺ ∈ M(Rd). When considering other norms, constants
39
+ depending on d and/or k may be dropped without notice.
40
+ Date: January 30, 2023.
41
+ 2020 Mathematics Subject Classification. Primary 35L65. Secondary 34A30.
42
+ Key words and phrases. Non-local continuity equation, Lagrangian stability, Osgood condition.
43
+ Acknowledgements. The authors thank Gianluca Crippa for several useful comments on a preliminary
44
+ version of this work. The first-named author is partially funded by the SNF grant FLUTURA: Fluids,
45
+ Turbulence, Advection No. 212573. The second-named author is member of the Istituto Nazionale di
46
+ Alta Matematica (INdAM), Gruppo Nazionale per l’Analisi Matematica, la Probabilità e le loro Appli-
47
+ cazioni (GNAMPA), is partially supported by the INdAM–GNAMPA 2022 Project Analisi geometrica in
48
+ strutture subriemanniane, codice CUP_E55F22000270001, and has received funding from the European
49
+ Research Council (ERC) under the European Union’s Horizon 2020 research and innovation program
50
+ (grant agreement No. 945655).
51
+ 1
52
+
53
+ 2
54
+ M. INVERSI AND G. STEFANI
55
+ Solutions of the system (1.1) are understood in the usual distributional sense, which is
56
+ well-set thanks to (1.2) and (1.3).
57
+ Definition 1.1 (Weak solution). We say that ̺ ∈ L∞([0, T]; M+(Rd)k) is a weak solution
58
+ of the system (1.1) starting from the initial datum ¯̺ ∈ M+(Rd)k if
59
+ � T
60
+ 0
61
+
62
+ Rd
63
+
64
+ ∂tϕ + V i(t, x, ̺ ∗ ηi) · ∇ϕ
65
+
66
+ d̺i(t, x) dt +
67
+
68
+ Rd ϕ(0, x) d¯̺i(x) = 0
69
+ (1.4)
70
+ for each i = 1, . . ., k and any ϕ ∈ C∞
71
+ c ([0, T) × Rd).
72
+ Any weak solution in the sense of Definition 1.1 admits a weakly continuous repre-
73
+ sentative in duality with the space C0(Rd) of continuous functions vanishing at infinity,
74
+ see [2, Lem. 8.1.2] and [1, 14]. So, from now on, we restrict our attention to weakly-
75
+ continuous weak solutions ̺ ∈ C([0, T]; M+(Rd)k−w∗) only.
76
+ The system (1.1) is used in several physical situations—for instance, pedestrian traffic,
77
+ sedimentation models and supply chains—to describe the time evolution of the density
78
+ of a vectorial quantity (e.g., pedestrians or particles), possibly concentrating in some
79
+ points or along hypersurfaces. Far from being complete, we refer the reader for example
80
+ to [4, 10–13, 16, 18, 21, 24, 25] for a panoramic on the related literature. Because of the
81
+ physical relevance of the system (1.1), here we deal with non-negative solutions only.
82
+ The system (1.1) can be also interpreted in the sense of the Control Theory. Indeed,
83
+ the convolution kernel η can be viewed as a non-local control for the (non-linear) PDE
84
+ in (1.1). Therefore, assuming V is fixed for simplicity, any stability result for the solutions
85
+ of the system (1.1) in terms of the convolution kernel η yields a continuous dependence
86
+ of the curve t �→ ̺t[η] solving (1.1) in terms of the control η.
87
+ The well-posedness of the system (1.1) was established in [14], provided that V and η
88
+ are bounded and Lipschitz continuous uniformly in time, namely,
89
+ V ∈ L∞([0, T]; Lipb(Rd × Rk; Rd)k)
90
+ and
91
+ η ∈ L∞([0, T]; Lipb(Rd; Rk)k).
92
+ (1.5)
93
+ The crucial ingredient of [14] is a stability estimate (in terms of the 1-Wasserstein distance
94
+ between two solutions, see [14, Prop. 4.2]) which, in turn, allows to obtain existence and
95
+ uniqueness of the solution of (1.1) via a fix point argument. The idea of exploiting the
96
+ Lipschitz regularity to gain stability of trajectories has been later applied to several other
97
+ related problems, see [5,7,9,17,23] and the references therein for instance.
98
+ 1.2. Main results. The aim of the present note is to prove the well-posedness of the
99
+ system (1.1) under less restrictive assumptions than (1.5), that is, to extend the existence
100
+ and uniqueness result of [14] beyond the Lipschitz regularity. Our interest is motivated
101
+ by some recent works [1,3,6,15,19,20] dealing with non-Lipschitz velocity fields.
102
+ Our first main result deals with the existence of weak solutions of the system (1.1), in
103
+ the spirit of the celebrated Peano’s Theorem. To this aim, we consider the following struc-
104
+ tural hypotheses (where modulus of continuity means a non-decreasing concave function
105
+ vanishing continuously at zero):
106
+ (V ) The vector field V ∈ L∞([0, T]; Cb(Rd × Rk; Rd)k) satisfies
107
+ ess sup
108
+ t∈[0,T]
109
+ |V (t, x, u) − V (t, y, v)| ≤ ωV (|x − y| + |u − v|)
110
+ ∀x, y ∈ Rd, u, v ∈ Rk,
111
+ (1.6)
112
+ where ωV : [0, +∞) → [0, +∞) is a modulus of continuity.
113
+
114
+ LAGRANGIAN STABILITY FOR A NON-LOCAL CE SYSTEM UNDER OSGOOD CONDITION
115
+ 3
116
+ (η) For each i = 1, . . ., k, the convolution kernel ηi ∈ L∞([0, T]; C0(Rd; Rk)) satisfies
117
+ ess sup
118
+ t∈[0,T]
119
+ |ηi(t, x) − ηi(t, y)| ≤ ωη(|x − y|)
120
+ ∀x, y ∈ Rd,
121
+ (1.7)
122
+ where ωη : [0, +∞) → [0, +∞) is a modulus of continuity.
123
+ Theorem 1.2 (Existence). If (V ) and (η) hold, then the system (1.1) admits a weak
124
+ solution starting from any given initial datum in M+(Rd)k.
125
+ To prove Theorem 1.2, we first consider the smoothed functions Vε and ηε and obtain
126
+ a weak solution ̺ε of the corresponding system (1.1) for all ε > 0 in virtue of the main
127
+ result of [14]. Then, we pass to the limit as ε → 0+ showing that ̺ε (weakly) converges
128
+ to a weak solution of the system (1.1). The needed a priori compactness is achieved via
129
+ an Aubin–Lion-type Lemma which is inspired by [15, Th. A.1].
130
+ In order to achieve uniqueness of weak solutions of the system (1.1), we need to impose
131
+ a further Osgood condition on the composition of the two moduli of continuity of V and η:
132
+ (O) for each λ > 0, it holds
133
+
134
+ 0+
135
+ dr
136
+ ωV (r + λ ωη(r)) = +∞.
137
+ For example, condition (O) is satisfied as soon as ωV ◦ ωη is a log-linear function, such
138
+ as r| log r|, r log | log r| and similar, with r > 0 sufficiently small.
139
+ Our uniqueness result deals with Lagrangian weak solutions of the system (1.1).
140
+ Definition 1.3 (Lagrangian weak solution). A weak solution ̺ ∈ L∞([0, T]; M+(Rd)k)
141
+ of the system (1.1) starting from the initial datum ¯̺ ∈ M+(Rd)k is Lagrangian if
142
+ ̺i(t, ·) = Xi(t, ·)#¯̺i,
143
+ i = 1, . . ., k,
144
+ where Xi : [0, T] × Rd → Rd is the (classical) solution of the ODE
145
+
146
+
147
+
148
+
149
+
150
+ d
151
+ dt Xi(t, x)
152
+ =
153
+ V i�
154
+ t, Xi(t, x), ̺ ∗ ηi(t, Xi(t, x))
155
+
156
+ ,
157
+ t ∈ (0, T), x ∈ Rd,
158
+ Xi(0, x)
159
+ =
160
+ x,
161
+ x ∈ Rd.
162
+ (1.8)
163
+ Thanks to Proposition 1.4 below, the Osgood condition in (O) ensures the well-posed-
164
+ ness of the ODE in (1.8).
165
+ Proposition 1.4 (Associated vector field). Let assumptions (V ) and (η) be in force. If
166
+ ̺ ∈ C([0, T]; M+(Rd)k−w∗) is a weak solution of the system (1.1) starting from the initial
167
+ datum ¯̺ ∈ M+(Rd)k, then the vector field
168
+ bi
169
+ V,η,̺(t, x) = V i�
170
+ t, x, ̺ ∗ ηi(t, x)
171
+
172
+ ,
173
+ t ∈ [0, T], x ∈ Rd, i = 1, . . ., k,
174
+ (1.9)
175
+ appearing in (1.8) satisfies b ∈ L∞([0, T]; Cb(Rd; Rd)k) with
176
+ ess sup
177
+ t∈[0,T]
178
+ |bV,η,̺(t, x) − bV,η,̺(t, y)| ≲ ωV
179
+
180
+ |x − y| + ∥¯̺∥M ωη(|x − y|)
181
+
182
+ ∀x, y ∈ Rd.
183
+ With the above notation, our main uniqueness result reads as follows.
184
+ Theorem 1.5 (Uniqueness). If (V ), (η) and (O) hold, then (1.1) admits a unique La-
185
+ grangian weak solution starting from any given initial datum in M+(Rd)k.
186
+
187
+ 4
188
+ M. INVERSI AND G. STEFANI
189
+ The word “Lagrangian” in Theorem 1.5 can be dropped, since any weak solution of the
190
+ system (1.1) is in fact Lagrangian because of [1, Th. 1] (also see [8]) and of Proposition 1.4.
191
+ However, this regularity result is not at all elementary, so we prefer to state Theorem 1.5
192
+ for Lagrangian solutions only in order to emphasize what is possible to achieve just relying
193
+ on our elementary approach.
194
+ The strategy of [14] exploits the linearity of ωη in an essential way. Indeed, the au-
195
+ thors need the Lipschitz continuity of η in order to recover the 1-Wasserstein distance
196
+ between two weak solutions of (1.1) in terms of its dual Kantorovich–Rubinstein formu-
197
+ lation (see [14, Lem. 4.1]). We do not know if the strategy of [14] can be adapted to deal
198
+ with a more general modulus of continuity ωη.
199
+ To overcome this issue, we adopt a different point of view, which is inspired by the
200
+ elementary uniqueness result achieved in the recent work [15]. Instead of controlling the
201
+ 1-Wasserstein distance between two weak solutions of the system (1.1), we exploit their
202
+ Lagrangian property to quantitatively estimate the difference between the two associated
203
+ ODE flows, thus providing a Lagrangian stability of weak solutions from which Theo-
204
+ rem 1.5 immediately follows.
205
+ Theorem 1.6 (Lagrangian stability). Let V, U ∈ L∞([0, T]; Cb(Rd×Rk; Rd)k) satisfy (1.6)
206
+ with the same modulus of continuity ωV and let η, ν ∈ L∞([0, T]; C0(Rd; Rk)k) satisfy (1.7)
207
+ with the same same modulus of continuity ωη. Let ̺, σ ∈ C([0, T]; M+(Rd)k −w∗) be
208
+ two weak solutions of the system (1.1) starting from the initial data ¯̺, ¯σ ∈ M+(Rd)k,
209
+ with vector fields V, U and convolution kernels η, ν, respectively. Assume that ̺, σ are
210
+ Lagrangian, namely, ̺ = X(t, ·)#¯̺ and σ = Y (t, ·)#¯σ for t ∈ [0, T], where X, Y are the
211
+ flows solving the corresponding ODEs in (1.8). Then, there exists a modulus of continuity
212
+ Ω: [0, +∞) → [0, +∞), only depending on
213
+ T, ∥¯̺∥M, ∥¯σ∥M, ∥η∥L∞(C), ∥ν∥L∞(C), ωV , ωη,
214
+ such that
215
+ sup
216
+ t∈[0,T]
217
+ ∥X(t, ·) − Y (t, ·)∥L∞ ≤ Ω
218
+
219
+ ∥¯̺ − ¯σ∥M + ∥V − U∥L∞(C) + ∥ν − η∥L∞(C)
220
+
221
+ .
222
+ (1.10)
223
+ The modulus of continuity Ω in Theorem 1.6 can be explicitly computed as soon as one
224
+ can invert the integral function
225
+ GV,η,λ(r) =
226
+ � r
227
+ r0
228
+ ds
229
+ ωV (s + λ ωη(s)),
230
+ r ≥ 0, r0 > 0,
231
+ (1.11)
232
+ naturally brought by the Osgood condition assumed in (O). In fact, the stability esti-
233
+ mate (1.10) follows by simply differentiating a localized integral distance between the flows
234
+ with respect to the time variable, and then applying the classical Bihari–LaSalle inequality
235
+ (see [22, Th. 2.3.1] for instance) with Osgood modulus of continuity r → ωV (r + λ ωη(r)),
236
+ for some specific parameter λ > 0 depending on ∥¯̺∥M and ∥¯σ∥M.
237
+ Theorem 1.6 clearly rephrases as a stability result of the flow of the ODE in (1.8). From
238
+ the point of view of Control Theory, the stability estimate in (1.10) yields a continuous
239
+ dependence of the (Lagrangian) solutions of the system (1.1), i.e., of the flows induced
240
+ by the corresponding ODE in (1.8), in terms of the (non-local) control given by the
241
+ convolution kernel, as well as of the velocity vector field and of the initial datum.
242
+
243
+ LAGRANGIAN STABILITY FOR A NON-LOCAL CE SYSTEM UNDER OSGOOD CONDITION
244
+ 5
245
+ 2. Proofs
246
+ 2.1. Existence of weak solutions. To prove Theorem 1.2, we need some preliminary
247
+ results. We begin with an Aubin–Lions-type Lemma, which is inspired by [15, Th. A.1].
248
+ Lemma 2.1 (Compactness). Let (̺n)n∈N ⊂ C([0, T]; M(Rd)−w∗) be such that
249
+ sup
250
+ n∈N ∥̺n∥L∞(M) < +∞.
251
+ (2.1)
252
+ Assume that, for each ϕ ∈ C∞
253
+ c (Rd), the functions Fn[ϕ]: [0, T] → R, given by
254
+ Fn[ϕ](t) =
255
+
256
+ Rd ϕ d̺n(t, ·),
257
+ t ∈ [0, T],
258
+ are uniformly equicontinuous on [0, T], that is,
259
+ ∀ε > 0 ∃δ > 0 : s, t ∈ [0, T], |s − t| < δ =⇒ sup
260
+ n∈N |Fn[ϕ](s) − Fn[ϕ](t)| < ε.
261
+ (2.2)
262
+ Then, there exist a subsequence (̺nk)k∈N and ̺ ∈ C([0, T], M(Rd)−w∗) such that
263
+ lim
264
+ k→+∞ sup
265
+ t∈[0,T]
266
+ ����
267
+
268
+ Rd ϕ d̺nk(t, ·) −
269
+
270
+ Rd ϕ d̺(t, ·)
271
+ ���� = 0
272
+ (2.3)
273
+ for all ϕ ∈ C0(Rd).
274
+ Proof. Let D ⊂ Cc(Rd) be a countable and dense set in C0(Rd).
275
+ In virtue of (2.1)
276
+ and (2.2), for each ϕ ∈ D the sequence (Fn[ϕ])n∈N is equibounded and equicontinuous
277
+ on [0, T]. By Ascoli–Arzelà Theorem and a standard diagonal argument, we can find a
278
+ subsequence (nk)k∈N such that, for each ϕ ∈ D, the sequence (Fnk[ϕ])k∈N is uniformly
279
+ convergent to some F[ϕ] ∈ C([0, T]), with
280
+ ∥F[ϕ]∥L∞([0,T]) ≤ ∥ϕ∥L∞ sup
281
+ n∈N ∥̺n∥L∞(M).
282
+ (2.4)
283
+ By construction, the function ϕ �→ F[ϕ](t) is a continuous linear functional on D for
284
+ each t ∈ [0, T]. Thus, for each fixed t ∈ [0, T], we can extend the map ϕ �→ F[ϕ](t) to a
285
+ linear and continuous functional on C0(Rd) for which we keep the same notation. A plain
286
+ approximation argument readily proves that, for each ϕ ∈ C0(Rd), the map t �→ F[ϕ](t)
287
+ is continuous on [0, T] and satisfies (2.4). By Riesz’s Representation Theorem, for each
288
+ t ∈ [0, T] there exists a finite Borel measure ̺(t, ·) ∈ M(Rd) such that
289
+ F[ϕ](t) =
290
+
291
+ Rd ϕ d̺(t, ·)
292
+ for all ϕ ∈ C0(Rd),
293
+ so that ̺ ∈ C([0, T]; M(Rd)−w∗). Finally, in virtue of (2.1) and (2.4), for ϕ ∈ C0(Rd)
294
+ and ψ ∈ D, we can estimate
295
+ sup
296
+ t∈[0,T]
297
+ |Fnk[ϕ](t) − F[ϕ](t)| ≤ sup
298
+ t∈[0,T]
299
+ |Fnk[ψ](t) − F[ψ](t)| + 2 ∥ψ − ϕ∥L∞ sup
300
+ n∈N ∥̺n∥L∞(M)
301
+ and the desired (2.3) readily follows.
302
+
303
+ In order to exploit Lemma 2.1, we need the following mass preservation property for
304
+ weak solutions of the system (1.1).
305
+
306
+ 6
307
+ M. INVERSI AND G. STEFANI
308
+ Lemma 2.2 (Mass preservation). Let V and η be as in (1.2) and (1.3), respectively. If
309
+ ̺ ∈ C([0, T]; M+(Rd)k−w∗) is a weak solution of the system (1.1) starting from the initial
310
+ datum ̺ ∈ M+(Rd)k, then
311
+ ∥̺i(t, ·)∥M = ∥¯̺i∥M
312
+ (2.5)
313
+ for t ∈ [0, T] and i = 1, . . ., k.
314
+ Proof. Let i ∈ {1, . . ., k} be fixed.
315
+ By applying (1.4) to the test function ϕ(t, x) =
316
+ α(t) β(x), (t, x) ∈ [0, T] × Rd, where α ∈ C∞
317
+ c ([0, T)) and β ∈ C∞
318
+ c (Rd), we get
319
+ � T
320
+ 0
321
+
322
+ Rd
323
+
324
+ α′β + α V i(t, x, ̺ ∗ ηi) · ∇β
325
+
326
+ d̺i(t, ·) dt + α(0)
327
+
328
+ Rd β(x) d¯̺i = 0.
329
+ Since α ∈ C∞
330
+ c ([0, T)) is arbitrary and ̺ ∈ C([0, T]; M+(Rd)k−w∗), we infer that
331
+ t �→
332
+
333
+ Rd β d̺i(t, ·) ∈ AC1,1([0, T]; R)
334
+ (2.6)
335
+ with
336
+
337
+ Rd β d̺i(t, ·) =
338
+
339
+ Rd β d¯̺i +
340
+ � t
341
+ 0
342
+
343
+ Rd V i(s, ·, ̺ ∗ ηi) · ∇β d̺i(s, ·) ds
344
+ (2.7)
345
+ for all t ∈ [0, T]. Now let t ∈ [0, T] be fixed. We let (βR)R>0 ⊂ C∞
346
+ c (Rd) be such that
347
+ βR ≥ 0,
348
+ supp βR ⊂ B2R,
349
+ βR = 1 on BR,
350
+ ∥∇βR∥L∞ ≤ 2
351
+ R
352
+ for all R > 0. By the Monotone Convergence Theorem, we infer that
353
+ lim
354
+ R→+∞
355
+
356
+ Rd βR d̺i(t, ·) = ∥̺i(t, ·)∥M
357
+ as well as
358
+ lim
359
+ R→+∞
360
+
361
+ Rd βR d¯̺i = ∥¯̺i∥M.
362
+ Since
363
+ ����
364
+ � t
365
+ 0
366
+
367
+ Rd V i(s, ·, ̺ ∗ ηi) · ∇βR d̺i(s, ·) ds
368
+ ���� ≤ 2
369
+ R ∥̺i∥L∞(M) ∥V i∥L∞(C)
370
+ for all R > 0, we get (2.5) by applying (2.7) to βR and passing to the limit as R → +∞.
371
+
372
+ We are ready to prove our existence result.
373
+ Proof of Theorem 1.2. Let (ℓε)ε>0 ⊂ C∞
374
+ c (Rd+k) and (ε)ε>0 ∈ C∞
375
+ c (Rd) be two families of
376
+ standard non-negative mollifiers and set
377
+ V i,j
378
+ ε (t, ·) = V i,j(t, ·) ∗ ℓε,
379
+ ηi,j
380
+ ε = ηi,j(t, ·) ∗ ε,
381
+ where in both cases the (component-wise) convolution occur in the spatial variables only.
382
+ Since Vε and ηε clearly satisfy the Lipschitz property (1.5) for each ε > 0, by [14, Th. 1.1]
383
+ there exists a weak solution
384
+ ̺ε ∈ C([0, T], M+(Rd)k−w∗)
385
+ of the system (1.1) starting from the initial datum ¯̺ ∈ M+(Rd)k, so that
386
+ � T
387
+ 0
388
+
389
+ Rd
390
+
391
+ ∂tϕ + V i
392
+ ε (t, ·, ̺ε ∗ ηi
393
+ ε) · ∇ϕ
394
+
395
+ d̺i
396
+ ε(t, ·) dt +
397
+
398
+ Rd ϕ(0, ·) d¯̺i = 0
399
+ (2.8)
400
+ for each i = 1, . . ., k and ε > 0 and ϕ ∈ C∞
401
+ c ([0, T) × Rd).
402
+
403
+ LAGRANGIAN STABILITY FOR A NON-LOCAL CE SYSTEM UNDER OSGOOD CONDITION
404
+ 7
405
+ Now let i ∈ {1, . . ., k} be fixed. We claim that (any sequence in) the family (̺i
406
+ ε)ε>0
407
+ satisfies the assumptions (2.1) and (2.2) of Lemma 2.1. Indeed, from Lemma 2.2 we get
408
+ ∥̺i
409
+ ε(t, ·)∥M = ∥¯̺i∥M
410
+ (2.9)
411
+ for all t ∈ [0, T] and ε > 0, from which (2.1) immediately follows. To prove (2.2), we
412
+ simply argue as in the proof of Lemma 2.2. Recalling (2.6) and (2.7), we easily recognize
413
+ that the time derivative of the function
414
+ Fε[β](t) =
415
+
416
+ Rd β(·) d̺i
417
+ ε(t, ·),
418
+ t ∈ [0, T],
419
+ (2.10)
420
+ is bounded by
421
+ ����
422
+
423
+ Rd V i
424
+ ε (t, x, ̺ε ∗ ηi
425
+ ε) · ∇β d̺i
426
+ ε(t, x)
427
+ ���� ≤ ∥V i∥L∞(C) ∥∇β∥L∞ ∥¯̺i∥M
428
+ for a.e. t ∈ [0, T] and for each ε > 0. In particular, the family (Fε[β])ε>0 in (2.10) is
429
+ equi-Lipschitz and thus satisfies (2.2).
430
+ Therefore, by Lemma 2.1, we find a sequence
431
+ (̺εn)n∈N ⊂ C([0, T]; M+(Rd)k−w∗) and ̺ ∈ C([0, T]; M+(Rd)k−w∗) such that
432
+ lim
433
+ n→+∞ sup
434
+ t∈[0,T]
435
+ ����
436
+
437
+ Rd β d̺εn(t, ·) −
438
+
439
+ Rd β d̺(t, ·)
440
+ ���� = 0
441
+ (2.11)
442
+ for all β ∈ C0(Rd).
443
+ To conclude, we just need to prove that ̺ is a weak solution of (1.1) starting from the
444
+ initial datum ¯̺. We do so by passing to the limit in (2.8) along (εn)n∈N as n → +∞ for
445
+ each given ϕ ∈ C∞
446
+ c ([0, +∞) × Rd). Indeed, on the one side, since
447
+ lim
448
+ n→+∞
449
+
450
+ Rd ∂tϕ d̺i
451
+ εn(t, ·) =
452
+
453
+ Rd ∂tϕ d̺i(t, ·)
454
+ because of (2.11) and
455
+ ����
456
+
457
+ Rd ∂tϕ d̺i
458
+ εn(t, ·)
459
+ ���� ≤ ∥∂tϕ∥L∞ ∥¯̺i∥M
460
+ because of (2.9), for all t ∈ [0, T], by the Dominated Convergence Theorem we infer that
461
+ lim
462
+ n→+∞
463
+ � T
464
+ 0
465
+
466
+ Rd ∂tϕ d̺i
467
+ εn(t, ·) dt =
468
+ � T
469
+ 0
470
+
471
+ Rd ∂tϕ d̺i(t, ·) dt.
472
+ (2.12)
473
+ On the other side, since ηi(t, ·) ∈ C0(Rd) in virtue of the assumption (η), we have that
474
+ ηi
475
+ εn(t, ·) → ηi(t, ·) in C0(Rd) as n → +∞, so that
476
+ lim
477
+ n→+∞
478
+
479
+ ̺εn(t, ·) ∗ ηi
480
+ εn(t, ·)
481
+
482
+ (x) = lim
483
+ n→+∞
484
+
485
+ Rd ηi
486
+ εn(t, x − y) d̺εn(t, y)
487
+ =
488
+
489
+ Rd ηi(t, x − y) d̺(t, y) =
490
+
491
+ ̺(t, ·) ∗ ηi(t, ·)
492
+
493
+ (x)
494
+ (2.13)
495
+ for each x ∈ Rd and all t ∈ [0, T] as a weak-strong convergent pair, due to (2.11).
496
+ Moreover, again in virtue of (2.9) and (η), we can estimate
497
+ ∥̺εn(t, ·) ∗ ηi
498
+ εn(t, ·)∥ ≤ ∥̺i∥M ∥ηi∥L∞(C)
499
+ and
500
+ ���
501
+
502
+ ̺εn(t, ·) ∗ ηi
503
+ εn(t, ·)
504
+
505
+ (x) −
506
+
507
+ ̺εn(t, ·) ∗ ηi
508
+ εn(t, ·)
509
+
510
+ (y)
511
+ ���
512
+
513
+
514
+ Rd
515
+ ���ηi
516
+ εn(t, x − ·) − ηi
517
+ εn(t, y − ·)
518
+ ��� d̺εn(t, ·) ≤ ωη(|x − y|) ∥̺i∥M
519
+
520
+ 8
521
+ M. INVERSI AND G. STEFANI
522
+ for all n ∈ N and t ∈ [0, T]. By Arzelà–Ascoli’s Theorem, we thus get that the pointwise
523
+ convergence in (2.13) must be uniform on compact sets in Rd, uniformly in t ∈ [0, T]. An
524
+ analogous argument relying on the assumption (V ) proves that also V i
525
+ εn(t, ·) → V i(t, ·) as
526
+ n → +∞ uniformly on compact sets in Rd, uniformly in t ∈ [0, T]. Again by (2.11), by
527
+ weak-strong convergence and by the Dominated Convergence Theorem, we hence get
528
+ lim
529
+ n→+∞
530
+ � T
531
+ 0
532
+
533
+ Rd V i
534
+ εn(t, ·, ̺εn ∗ ηi
535
+ εn) · ∇ϕ d̺i
536
+ εn(t, ·) dt =
537
+ � T
538
+ 0
539
+
540
+ Rd V i(t, ·, ̺ ∗ ηi) · ∇ϕ d̺i(t, ·) dt.
541
+ (2.14)
542
+ Thus, the conclusion follows by combining (2.12) with (2.14).
543
+
544
+ 2.2. Lagrangian stability. We deal with the Lagrangian stability of weak solutions. We
545
+ begin with the proof of Proposition 1.4.
546
+ Proof of Proposition 1.4. Let t ∈ [0, T] be fixed. Given x, y ∈ Rd and i ∈ {1, . . ., k}, in
547
+ virtue of assumption (η) and of Lemma 2.2, we can estimate
548
+ |̺ ∗ ηi(t, x) − ̺ ∗ ηi(t, y)| ≤
549
+ k
550
+
551
+ j=1
552
+
553
+ Rd |ηi,j(t, x − z) − ηi,j(t, y − z)| d̺j(t, z)
554
+
555
+ k
556
+
557
+ j=1
558
+
559
+ Rd ωη(|x − y|) d̺k(t, z) = ∥̺(t, ·)∥M ωη(|x − y|)
560
+ = ∥¯̺∥M ωη(|x − y|).
561
+ Thus, thanks to assumption (V ), we get that
562
+ ���V i�
563
+ t, x, ̺ ∗ ηi(t, x)
564
+
565
+ − V i�
566
+ t, y, ̺ ∗ ηi(t, y)
567
+ ���� ≤ ωV
568
+
569
+ |x − y| + |̺ ∗ ηi(t, x) − ̺ ∗ ηi(t, y)|
570
+
571
+ ≤ ωV
572
+
573
+ |x − y| + ∥¯̺∥M ωη(|x − y|)
574
+
575
+ and the conclusion immediately follows.
576
+
577
+ We conclude our paper with the proof of Theorem 1.6.
578
+ Proof of Theorem 1.6. Let V, U, η, ν, ¯̺, ¯σ, X, Y and ̺, σ be as in the statement.
579
+ Fix
580
+ ζ ∈ C(Rd) with ζ ≥ 0 and
581
+
582
+ Rd ζ(x) dx = 1. Letting µ ∈ M+(Rd) be defined by µ =
583
+ |¯̺| + |¯σ| + ζ L d, we consider the quantity
584
+ Qζ(t) =
585
+ k
586
+
587
+ i=1
588
+
589
+
590
+ Rd |Xi(t, ·) − Y i(t, ·)| dµ
591
+ for all t ∈ [0, T]. Note that t �→ Qζ(t) is well defined and Lipschitz, with Qζ(0) = 0 and
592
+ |Qζ(s) − Qζ(t)| ≤ k (∥U∥L∞(C) + ∥V ∥L∞(C)) |s − t|
593
+ for all s, t ∈ [0, T]. Therefore, for a.e. t ∈ [0, T], we can write
594
+ Q′
595
+ ζ(t) ≤
596
+ k
597
+
598
+ i=1
599
+
600
+
601
+ Rd |V i(t, Xi, ̺ ∗ ηi(t, Xi)) − Ui(t, Y i, σ ∗ νi(t, Y i))| dµ
602
+
603
+ k
604
+
605
+ i=1
606
+ (1)i + (2)i + (3)i + (4)i,
607
+
608
+ LAGRANGIAN STABILITY FOR A NON-LOCAL CE SYSTEM UNDER OSGOOD CONDITION
609
+ 9
610
+ where (dropping the variables of X and Y for notational convenience)
611
+ (1)i = −
612
+
613
+ Rd |V i(t, Xi, ̺ ∗ ηi(t, Xi)) − V i(t, Y i, ̺ ∗ ηi(t, Y i))| dµ,
614
+ (2)i = −
615
+
616
+ Rd |V i(t, Y i, ̺ ∗ ηi(t, Y i)) − V i(t, Y i, σ ∗ ηi(t, Y i))| dµ,
617
+ (3)i = −
618
+
619
+ Rd |V i(t, Y i, σ ∗ ηi(t, Y i)) − V i(t, Y i, σ ∗ νi(t, Y i))| dµ,
620
+ (4)i = −
621
+
622
+ Rd |V i(t, Y i, σ ∗ νi(t, Y i)) − Ui(t, Y i, σ ∗ νi(t, Y i))| dµ.
623
+ We now estimate each term separately at a given t ∈ [0, T]. By Proposition 1.4 and
624
+ Jensen’s inequality, we can easily estimate the first term as
625
+ (1)i ≤ −
626
+
627
+ Rd ωV
628
+
629
+ |Xi − Y i| + ∥¯̺∥M ωη(|Xi − Y i|)
630
+
631
+
632
+ ≤ ωV
633
+
634
+
635
+
636
+ Rd |Xi − Y i| dµ + ∥¯̺∥M ωη
637
+
638
+
639
+
640
+ Rd |Xi − Y i| dµ
641
+ ��
642
+ ≤ ωV
643
+
644
+ Qζ(t) + ∥µ∥M ωη(Qζ(t))
645
+
646
+ .
647
+ Concerning the second term, since
648
+ |(̺ − σ) ∗ ηi(t, x)| =
649
+ ����
650
+
651
+ Rd ηi(t, x − y) d(X#¯̺(y) − Y#¯σ(y))
652
+ ����
653
+
654
+ k
655
+
656
+ j=1
657
+
658
+ Rd |ηi,j(t, x − Xj) − ηi,j(t, x − Y j)| d¯̺j +
659
+
660
+ Rd |ηi,j(t, x − Y j)| d|¯̺j − ¯σj|
661
+
662
+ k
663
+
664
+ j=1
665
+
666
+ Rd ωη(|Xj − Y j|) d¯̺j + ∥η∥L∞(C)∥¯̺j − ¯σj∥M
667
+
668
+
669
+ Rd ωη
670
+
671
+
672
+ k
673
+
674
+ j=1
675
+ |Xj − Y j|
676
+
677
+  d|¯̺| + ∥η∥L∞(C)∥¯̺ − ¯σ∥M
678
+ for all x ∈ Rd, again by Jensen’s inequality we get
679
+ (2)i ≤ −
680
+
681
+ Rd ωV
682
+
683
+ |(̺ − σ) ∗ ηi(t, Y i)|
684
+
685
+
686
+ ≤ ωV
687
+ ��
688
+ Rd ωη
689
+ � k
690
+
691
+ i=1
692
+ |Xi − Y i|
693
+
694
+ d|¯̺| + ∥η∥L∞(C)∥¯̺ − ¯σ∥M
695
+
696
+ ≤ ωV
697
+
698
+ ∥µ∥M ωη(Qζ(t)) + ∥η∥L∞(C)∥¯̺ − ¯σ∥M
699
+
700
+ ≤ ωV
701
+
702
+ Qζ(t) + ∥µ∥M ωη(Qζ(t))
703
+
704
+ + ωV
705
+
706
+ ∥η∥L∞(C)∥¯̺ − ¯σ∥M
707
+
708
+ .
709
+ The last two terms can be trivially estimated as
710
+ (3)i ≤ ωV
711
+
712
+ ∥σ∥L∞(M) ∥η − ν∥L∞(C)
713
+
714
+ = ωV
715
+
716
+ ∥¯σ∥M ∥η − ν∥L∞(C)
717
+
718
+ ≤ ωV
719
+
720
+ ∥µ∥M ∥η − ν∥L∞(C)
721
+
722
+ thanks to Lemma 2.2, and
723
+ (4)i ≤ ∥V − U∥L∞(C).
724
+
725
+ 10
726
+ M. INVERSI AND G. STEFANI
727
+ Putting everything altogether, we conclude that
728
+ Q′
729
+ ζ(t) ≲ ωV
730
+
731
+ Qζ(t) + λ ωη(Qζ(t))
732
+
733
+ + M,
734
+ where λ = ∥̺∥M + ∥σ∥M + 1 and
735
+ M = ωV
736
+
737
+ ∥η∥L∞(C)∥¯̺ − ¯σ∥M
738
+
739
+ + ωV
740
+
741
+ λ ∥η − ν∥L∞(C))
742
+
743
+ + ∥V − U∥L∞(C).
744
+ At this point, we just need to recall the Osgood condition assumed in (O) and the integral
745
+ function in (1.11). Indeed, by the classical Bihari–LaSalle inequality (see [22, Th. 2.3.1]
746
+ for instance), we find a modulus of continuity Ω: [0, +∞) → [0, +∞), only depending on
747
+ T, ∥¯̺∥M, ∥¯σ∥M, ∥η∥L∞(C), ∥ν∥L∞(C), ωV , ωη,
748
+ such that
749
+ sup
750
+ t∈[0,T]
751
+ Qζ(t) ≤ Ω
752
+
753
+ ∥¯̺ − ¯σ∥M + ∥V − U∥L∞(C) + ∥ν − η∥L∞(C)
754
+
755
+ .
756
+ (2.15)
757
+ We remark that Ω is independent of ζ, as long as we choose ζ ≥ 0 and ∥ζ∥L1 = 1. To
758
+ conclude, we choose a family (ζx0,ε)ε>0 of standard mollifiers around x0 ∈ Rd. Since the
759
+ flows X(t, ·), Y (t, ·) are continuous maps, we deduce that
760
+ lim
761
+ ε→0+ Qζx0,ε(t) = |X(t, x0) − Y (t, x0)|.
762
+ (2.16)
763
+ Thus, (1.10) follows from (2.15) and (2.16) and the proof is complete.
764
+
765
+ References
766
+ [1] L. Ambrosio and P. Bernard, Uniqueness of signed measures solving the continuity equation for
767
+ Osgood vector fields, Atti Accad. Naz. Lincei Rend. Lincei Mat. Appl. 19 (2008), no. 3, 237–245.
768
+ [2] L. Ambrosio, N. Gigli, and G. Savaré, Gradient flows in metric spaces and in the space of probability
769
+ measures, Second, Lectures in Mathematics ETH Zürich, Birkhäuser Verlag, Basel, 2008.
770
+ [3] L. Ambrosio, S. Nicolussi Golo, and F. Serra Cassano, Classical flows of vector fields with exponential
771
+ or sub-exponential summability (2022). Preprint, available at arXiv:2208.01381.
772
+ [4] D. Armbruster, D. Marthaler, C. Ringhofer, K. Kempf, and T. Jo, A continuum model for a re-
773
+ entrant factory, Oper. Res. 54 (2006), no. 5, 933–950.
774
+ [5] A. Bressan and W. Shen, On traffic flow with nonlocal flux: a relaxation representation, Arch. Ration.
775
+ Mech. Anal. 237 (2020), no. 3, 1213–1236.
776
+ [6] E. Brué and Q.-H. Nguyen, Sobolev estimates for solutions of the transport equation and ODE flows
777
+ associated to non-Lipschitz drifts, Math. Ann. 380 (2021), no. 1-2, 855–883.
778
+ [7] J. A. Carrillo, F. James, F. Lagoutière, and N. Vauchelet, The Filippov characteristic flow for the
779
+ aggregation equation with mildly singular potentials, J. Differential Equations 260 (2016), no. 1,
780
+ 304–338.
781
+ [8] A. Clop, H. Jylhä, J. Mateu, and J. Orobitg, Well-posedness for the continuity equation for vector
782
+ fields with suitable modulus of continuity, J. Funct. Anal. 276 (2019), no. 1, 45–77.
783
+ [9] G. M. Coclite, N. De Nitti, A. Keimer, and L. Pflug, On existence and uniqueness of weak solutions
784
+ to nonlocal conservation laws with BV kernels, Z. Angew. Math. Phys. 73 (2022), no. 6, Paper No.
785
+ 241, 10.
786
+ [10] R. M. Colombo, M. Herty, and M. Mercier, Control of the continuity equation with a non local flow,
787
+ ESAIM Control Optim. Calc. Var. 17 (2011), no. 2, 353–379.
788
+ [11] R. M. Colombo and M. Lécureux-Mercier, An analytical framework to describe the interactions
789
+ between individuals and a continuum, J. Nonlinear Sci. 22 (2012), no. 1, 39–61.
790
+ [12]
791
+ , Nonlocal crowd dynamics models for several populations, Acta Math. Sci. Ser. B (Engl. Ed.)
792
+ 32 (2012), no. 1, 177–196.
793
+
794
+ LAGRANGIAN STABILITY FOR A NON-LOCAL CE SYSTEM UNDER OSGOOD CONDITION
795
+ 11
796
+ [13] R. M. Colombo, F. Marcellini, and E. Rossi, Biological and industrial models motivating nonlocal
797
+ conservation laws: a review of analytic and numerical results, Netw. Heterog. Media 11 (2016), no. 1,
798
+ 49–67.
799
+ [14] G. Crippa and M. Lécureux-Mercier, Existence and uniqueness of measure solutions for a system of
800
+ continuity equations with non-local flow, NoDEA Nonlinear Differential Equations Appl. 20 (2013),
801
+ no. 3, 523–537.
802
+ [15] G. Crippa and G. Stefani, An elementary proof of existence and uniqueness for the Euler flow in
803
+ localized Yudovich spaces (2021). Preprint, available at arXiv:2110.15648v2.
804
+ [16] M. Di Francesco and S. Fagioli, Measure solutions for non-local interaction PDEs with two species,
805
+ Nonlinearity 26 (2013), no. 10, 2777–2808.
806
+ [17] J. H. M. Evers, S. C. Hille, and A. Muntean, Measure-valued mass evolution problems with flux
807
+ boundary conditions and solution-dependent velocities, SIAM J. Math. Anal. 48 (2016), no. 3, 1929–
808
+ 1953.
809
+ [18] A. Keimer and L. Pflug, Existence, uniqueness and regularity results on nonlocal balance laws, J.
810
+ Differential Equations 263 (2017), no. 7, 4023–4069.
811
+ [19] J. La, Regularity and drift by Osgood vector fields (2022). Preprint, available at arXiv:2206.14237v1.
812
+ [20] H. Li and D. Luo, A unified treatment for ODEs under Osgood and Sobolev type conditions, Bull.
813
+ Sci. Math. 139 (2015), no. 1, 114–133.
814
+ [21] A. Mackey, T. Kolokolnikov, and A. L. Bertozzi, Two-species particle aggregation and stability of
815
+ co-dimension one solutions, Discrete Contin. Dyn. Syst. Ser. B 19 (2014), no. 5, 1411–1436.
816
+ [22] B. G. Pachpatte, Inequalities for differential and integral equations, Mathematics in Science and
817
+ Engineering, vol. 197, Academic Press, Inc., San Diego, CA, 1998.
818
+ [23] B. Piccoli and F. Rossi, Generalized Wasserstein distance and its application to transport equations
819
+ with source, Arch. Ration. Mech. Anal. 211 (2014), no. 1, 335–358.
820
+ [24] J. Rubinstein, Evolution equations for stratified dilute suspensions, Phys. Fluids A 2 (1990), no. 1,
821
+ 3–6.
822
+ [25] K. Zumbrun, On a nonlocal dispersive equation modeling particle suspensions, Quart. Appl. Math.
823
+ 57 (1999), no. 3, 573–600.
824
+ (M. Inversi) Department Mathematik und Informatik, Universität Basel, Spiegelgasse 1,
825
+ 4051 Basel, Switzerland
826
+ Email address: [email protected]
827
+ (G. Stefani) Scuola Internazionale Superiore di Studi Avanzati (SISSA), via Bonomea 265,
828
+ 34136 Trieste (TS), Italy
829
830
+
ItFKT4oBgHgl3EQfdy7h/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
LNFQT4oBgHgl3EQfUDZM/content/tmp_files/2301.13295v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
LNFQT4oBgHgl3EQfUDZM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
O9FJT4oBgHgl3EQf1S22/content/tmp_files/2301.11651v1.pdf.txt ADDED
@@ -0,0 +1,901 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On particle dynamics near the Schwarzschild singularity
2
+ A. Radosz
3
+ Faculty of Basic Problems of Technology (Wroclaw),
4
+ Wroclaw University of Science and Technology, 50-370Wroclaw, Poland∗
5
+ A. V. Toporensky
6
+ Sternberg Astronomical Institute, Lomonosov Moscow
7
+ State University and Kazan Federal University,
8
+ Kremlevskaya 18, Kazan 420008, Russia†
9
+ O. B. Zaslavskii
10
+ Department of Physics and Technology,
11
+ Kharkov V.N. Karazin National University,
12
+ 4 Svoboda Square, Kharkov 61022, Ukraine‡
13
+ The problem of the speed of the objects inside the Schwarzschild black hole is
14
+ considered. The general result is that the value of the relative speed of the objects
15
+ following their non-zero angular momentum trajectories, both of geodesic and non-
16
+ geodesic character, when approaching the ultimate singularity, tends to the value of
17
+ speed of light. There is only one exception when both objects move in the same plane
18
+ and have parallel angular momenta. This outcome appears to have a deeper sense: it
19
+ reflects the anisotropic character of the dynamics of interior of this particular black
20
+ hole. The result in question means that near the singularity, collisions of two particles
21
+ lead to an indefinitely large energy in the center of mass frame. Aforementioned
22
+ properties have their counterpart in the phenomenon of an indefinitely large blueshift
23
+ near the singularity.
24
+ PACS numbers: 04.20.-q; 04.20.Cv; 04.70.Bw
25
+ ∗Electronic address: [email protected]
26
+ †Electronic address: [email protected]
27
+ ‡Electronic address: [email protected]
28
+ arXiv:2301.11651v1 [gr-qc] 27 Jan 2023
29
+
30
+ 2
31
+ I.
32
+ INTRODUCTION.
33
+ The studies of the properties of the strong gravitational fields and in particular the
34
+ properties of the black holes (BH) have got in a recent decade a significant theoretical but
35
+ also experimental impact.
36
+ The development of the theoretical interest has been mainly
37
+ related to the BSW-like effect: two-particle collisions undergoing in the vicinity of the BH’s
38
+ horizon would lead to the unbounded energy release [1]. The first ever picture of the BH
39
+ namely, supermassive M-87 BH [2], gravitational waves emission following two BHs merger
40
+ [3] and the intriguing temporarily varying radiation emission of the accretion disk of the
41
+ sources of the strong gravitational field [4] - [7] are the most important recent experimental
42
+ aspects of the presence of the strong gravitational fields.
43
+ In this broad landscape of the BHs associated phenomena, there has been the steadily
44
+ growing interest in the studies of the BH’s interior.
45
+ The progress in the understanding
46
+ (mostly kinematical) phenomena undergoing inside the Schwarzschild’s black hole has been
47
+ based on two features. One is a particular property of the black hole’s horizon: the speed of
48
+ a test particle following geodesic and approaching the horizon tends to that of light, V → 1
49
+ in the static frame. The other one is an anisotropic character BH’s interior: exterior of the
50
+ Schwarzschild black hole is a static and isotropic but its interior, also called T-”sphere” [8] is
51
+ anisotropic and dynamic, whose spatial-like section is a hypercylinder of R1 ×S2 symmetry.
52
+ It is expanding longitudinally, along homogeneity direction R and contracting transversely,
53
+ perpendicularly to this direction in the angular coordinates of the sphere S2 (see e.g. [8], [9]).
54
+ Interplay of these two features has allowed to find an interpretation of variety of seemingly
55
+ contradicting outcomes. One can invoke the case of a test object radially falling towards
56
+ the horizon, whose speed increases to 1 with respect to the static frame, but after crossing
57
+ the horizon the speed turns out to be decreasing to zero [10], as if the test particle being
58
+ hampered inside horizon.
59
+ It is also worth mentioning that this non-monotonic behavior of a 3-velocity is a spe-
60
+ cific property of the observers, static outside and resting inside horizon [10] and does not
61
+ appear in the frame connected with Lemaˆıtre coordinates. Indeed, it was shown that the
62
+ 3-velocity with respect to the Lemaˆıtre frame at a horizon can take any value from 0 to
63
+ 1, and this velocity decreases in a monotonic way (if it is not equal to zero identically) in
64
+ the Schwarzschild black hole reaching 0 at a singularity (if the angular momentum is zero)
65
+
66
+ 3
67
+ [11]. Thus some kinematical properties of particles falling into a black hole can be more
68
+ easily interpreted in a coordinate system, different from the one offered by Schwarzschild
69
+ coordinates (after mutual exchange of a spatial and temporal coordinates). Another nice
70
+ feature of the frame in question is that hypersurfaces of a constant Lemaˆıtre time are flat,
71
+ so, for example, the proper distance between two points at the same radius is simply the
72
+ difference in their static coordinates r which is useful for visualizing the properties of a free
73
+ fall. The price paid for it consists in loosing some symmetry properties of the space-time
74
+ under study, since the metric in the Lemaˆıtre frame depends upon both spatial and temporal
75
+ coordinates, turning the equations of motion into a rather cumbersome form. In the present
76
+ paper we will deal mostly with the Schwarzschild coordinate frame, however, noticing the
77
+ difference between that one and the Lemaˆıtre frame in some aspects.
78
+ Another apparently self-contradicting example is the observation that the speed of a
79
+ uniformly accelerated test particle (that initially increases) eventually decreases to zero
80
+ value (see e.g. [12]). The cause in both cases is the longitudinal expansion of this particular
81
+ space-time, extremely violent in its final stage, that brings eventually all of the objects
82
+ (moving along homogeneity axis) to the state of relative rest.
83
+ This expansion is also responsible for the for the indefinitely large Doppler redshift near
84
+ the singularity. Namely, the Doppler frequency shift d is defined as the the ratio of the
85
+ frequencies, d = ωr
86
+ ωs recorded by a receiver, ωr and by a sender ωs. An object falling radially
87
+ from the outer space initial position’s r0 records the radiation emitted at r0 as redshifted and
88
+ the redshift d monotonically decreases, reaching value 1/2 on the horizon and then tends to
89
+ zero, when approaching to the ultimate singularity. This may be interpreted as a conclusion
90
+ about the growing darkness inside Schwarzschild black hole.
91
+ This, however, appears to be incorrect if we consider massless particles with non-zero
92
+ angular momentum. It leads to a bright ring around a singularity (see page B-25 of [13]). A
93
+ careful analytical study of red/blue shift for such massless particles have been recently done
94
+ in [14]. Namely, it was shown that if an object following a non-zero angular momentum
95
+ geodesic perceives the zero-angular momentum light ray incoming from the outer space
96
+ sources it turns out to be not red- but blueshifted. Moreover, an object following zero-
97
+ angular momentum trajectory records a non-zero angular momentum light ray as blueshifted;
98
+ in both cases the blueshift is indefinite near the singularity. Therefore, the Doppler redshift
99
+ described for the radially infalling objects recording radial radiation turns out to be an
100
+
101
+ 4
102
+ exception but not the rule. Thus, the interior of the Schwarzschild black hole does not turn
103
+ to be darker, as it has been sometimes believed (see e.g. [15], [16])) but turns out to be
104
+ getting brighter when approaching the singularity. All these results can be rather easily
105
+ explained using the properties of peculiar velocities inside a horizon, as it was shown in [18].
106
+ Motivated by those findings, we are going to make a revision of the seemingly well-
107
+ understood properties of the time-like geodesics inside the Schwarzschild BH. The aim of
108
+ this paper is to reconsider the question of the relative speed of the particles inside the
109
+ horizon in a general case of non-zero angular momentum trajectories of one or both of the
110
+ particles. One finds that such a relative speed may tend to the speed of light in some cir-
111
+ cumstances; then the question of unbounded energy collision will be revised with a rather
112
+ challenging outcome. Finally, we will present an argument that the effects described in this
113
+ paper and those discussed in the context of the blueshift are both direct outcomes of the
114
+ anisotropic character of the dynamics of the interior of Schwarzschild BH. It is also argued
115
+ that although anisotropic dynamics is a common property for all of the BHs interior, the
116
+ critical contraction, as specified below is a particular feature of the Schwarzschild BH that
117
+ causes the indefinite blueshift and, at the same time, leads to the unbounded energy colli-
118
+ sions. Therefore, we are going to discuss in detail the problem: how the critical contraction
119
+ affects the dynamics of the test objects in the vicinity of the ultimate singularity (although
120
+ their final fate is beyond the scope of our considerations). We shall consider the problem of
121
+ the relative speed of the massive test objects. We examine separately two cases: geodesic
122
+ motion and motion under the action of some finite force. In doing so, we assume that, in
123
+ general, particles have non-zero angular momenta.
124
+ The paper is organized as follows. In Sec. II we define the line element and the tetrad for
125
+ resting observer inside Schwarzschild BH and we apply them (Sec. III) for description of the
126
+ kinematics of a freely falling test particle. In Sec. IV the anisotropy of the this space-time is
127
+ described. Particle collisions are analyzed in the following three sections: V - general setup,
128
+ VI - in-plane collisions, VII - different planes collisions. In Secs. VIII-IX the effects of action
129
+ of external force are described. In Sec. X we consider the effect of tidal forces. Discussion
130
+ and final remarks are presented in the final section.
131
+
132
+ 5
133
+ II.
134
+ METRIC, TETRAD
135
+ Let us consider the black hole metric
136
+ ds2 = −fdt2 + dr2
137
+ f
138
+ + r2dω2.
139
+ (1)
140
+ Here, f(r+) = 0, where r+ is the radius of the event horizon. Our main concern is the
141
+ Schwarzschild metric for which f = 1 − r+
142
+ r . We will also discuss very briefly the case of the
143
+ Reissner-Nordstr¨om metric. Inside the horizon, the mutual role of temporal, t and spatial, r,
144
+ coordinates interchanges. We can choose T = −r, y = t, where −r+ ≤ T ≤ 0, −∞ < y < ∞
145
+ [17]. Then
146
+ ds2 = −dT 2
147
+ g
148
+ + gdy2 + T 2dω2,
149
+ (2)
150
+ where g = −f.
151
+ In what follows, it is convenient to use the tetrad attached to a resting observer with
152
+ constant spatial, y, θ, φ coordinates. Such an observer follows a geodesic that has no analogue
153
+ in the outer part of space-time [9]. Namely, in the coordinates (T, y, θ, φ)
154
+ ˆh(0)µ = − 1
155
+ √g(1, 0, 0, 0),
156
+ (3)
157
+ ˆh(1)µ = (0, √g, 0, 0),
158
+ (4)
159
+ ˆh(2)µ = (0, 0, |T| , 0)
160
+ ˆh(3)µ = (0, 0, 0, |T| sin θ).
161
+ (5)
162
+ III.
163
+ MOTION OF A FREE PARTICLE
164
+ Outside the horizon there exists the time-like Killing vector that corresponds to the time
165
+ translation and it leads to the conservation of a particle’s energy. Inside the horizon it be-
166
+ comes a space-like one and this leads to the conservation of the y-component of momentum.
167
+ The angular momentum is conserved everywhere.
168
+ Then, the four-velocity uµ of a particle that moves within the plane θ = π
169
+ 2 has the form
170
+ in the coordinate system (2)
171
+ uµ = (P, − p
172
+ g, 0, L
173
+ T 2),
174
+ (6)
175
+
176
+ 6
177
+ where
178
+ P =
179
+
180
+ p2 + g(L2
181
+ T 2 + 1),
182
+ (7)
183
+ p = −uy is the specific conserved momentum (the sign minus is chosen to keep the maximum
184
+ similarity with the region outside the horizon), L = uφ is the specific, conserved angular
185
+ momentum.
186
+ The corresponding tetrad components read
187
+ u(a) = uµh(a)
188
+ µ
189
+ = ( P
190
+ √g, − p
191
+ √g, 0, L
192
+ |T|).
193
+ (8)
194
+ Then, one can obtain (see Sec. 8 in [18]) that the three-velocity has components
195
+ V (1) = − p
196
+ P ,
197
+ (9)
198
+ V (3) = L√g
199
+ |T| P .
200
+ (10)
201
+ The absolute value of the velocity V =
202
+
203
+ (V (1))2 + (V (3))2,
204
+ V =
205
+
206
+ 1 − g
207
+ P 2.
208
+ (11)
209
+ The Lorentz gamma factor
210
+ γ =
211
+ 1
212
+
213
+ 1 − V 2 = P
214
+ √g.
215
+ (12)
216
+ For given p and L, the velocity under discussion obeys the condition
217
+ V 2
218
+ 1 − V 2 = p2
219
+ g + L2
220
+ T 2.
221
+ (13)
222
+ If the singularity is being approached, T → 0, g → ∞.
223
+ Then, if L ̸= 0, we have
224
+ |V | ≈ 1 − 1
225
+ 2
226
+ �T
227
+ L
228
+ �2
229
+ .
230
+ (14)
231
+ In doing so, V (1) → 0, V (3) → ±1.
232
+ If L = 0, V (3) = 0. In the limit under discussion V (1) → 0.
233
+ Thus, in any case V (1) → 0.
234
+
235
+ 7
236
+ IV.
237
+ GEOMETRY AND DYNAMICS
238
+ The above result can be given the following geometric interpretation. The space-time
239
+ described by the line element (2) may be referred to as a T-”sphere” [8]. It has got some
240
+ particular properties: it is non-static, homogeneous, finite in time extent. It has a hyper-
241
+ cylindrical a space-like section V 3 = R1×S2 with no symmetry center, open (−∞ < y < ∞)
242
+ in radial, homogeneity direction R1. This may be regarded as an anisotropic cosmological
243
+ model, expanding longitudinally and contracting transversely in a two-sphere S2 of radius
244
+ |T| (see also [9] - [12]). Expansion along y axis is finally getting extremely violent: all of
245
+ the objects are carried away in such a manner that their ”own” speeds are getting negligible
246
+ - they are finally in a relative rest. And that is the meaning of the first of the results of
247
+ the former section: the resting (in y axis) observer measures the speed of the test object
248
+ travelling along this axis as diminishing to zero, V → 0, as is seen from (13) when L = 0
249
+ and the singularity is approached, so g → ∞.
250
+ If the velocity vector of a test object has got a transverse (to y axis) component, i.e.
251
+ its angular momentum is non-zero, L ̸= 0, it is also carried away transversely due to the
252
+ transverse contraction. This transverse contraction is of critical character: hypercylinder
253
+ V 3 collapses to the line as the radius of the two-sphere tends to zero. All of the massive
254
+ and massless particles are carried away in the following manner. The value of the speed of
255
+ the massive test objects as measured by resting observers goes to that of light, V → 1, and
256
+ the light rays (massless test objects) are perceived by the resting observer as indefinitely
257
+ blueshifted [14].
258
+ Then, the following interesting question arises: what is relative speed of the two observers
259
+ depending on their angular momenta?
260
+ If particles collide, whether their energy in the
261
+ center of mass frame remains finite or grows indefinitely? In particular, it concerns particles
262
+ travelling with (a) parallel, (b) antiparallel angular momenta. These questions are considered
263
+ below.
264
+
265
+ 8
266
+ V.
267
+ PARTICLE COLLISIONS: GENERAL SETUP
268
+ Now, we consider collisions of two particles of masses m1 and m2 and briefly analyze the
269
+ behavior of the energy Ec.m. in the center of mass at the point of collision. By definition,
270
+ E2
271
+ c.m. = −PµP µ,
272
+ (15)
273
+ where P µ = m1uµ
274
+ 1 + m2uµ
275
+ 2 is the total four-momentum. Then,
276
+ E2
277
+ c.m. = m2
278
+ 1 + m2
279
+ 2 + 2m1m2γ12,
280
+ (16)
281
+ where w has the meaning of the relative speed, the Lorentz factor of relative motion
282
+ γ12 = −u1µu2µ =
283
+ 1
284
+
285
+ 1 − w2
286
+ (17)
287
+ should not be confused with the individual gamma factor of each particle (12).
288
+ Below, we discuss two cases separately.
289
+ VI.
290
+ PARTICLES MOVE IN THE SAME PLANE
291
+ Then, it follows from (6) and (17) that
292
+ γ12 = P1P2 − p1p2
293
+ g
294
+ − L1L2
295
+ T 2 ,
296
+ (18)
297
+ It is instructive to describe collisions in terms of kinematics characteristics. One can
298
+ define the angle ψ between particles 1 and 2 according to
299
+ cos ψ =
300
+ ⃗V1⃗V2
301
+ V1V2
302
+ ,
303
+ (19)
304
+ where ⃗V1⃗V2 = V (1)
305
+ 1
306
+ V (1)
307
+ 2
308
+ + V (3)
309
+ 1
310
+ V (3)
311
+ 2
312
+ . Then, it follows from (9), (10) that
313
+ cos ψ =
314
+ 1
315
+
316
+ p2
317
+ 1 + g L2
318
+ 1
319
+ T 2
320
+
321
+ p2
322
+ 2 + g L2
323
+ 2
324
+ T 2
325
+ (p1p2 + L1L2g
326
+ T 2
327
+ ),
328
+ (20)
329
+ γ12 = γ1γ2(1 − cos ψ).
330
+ (21)
331
+ Our main concern is the behavior of γ12 near the singularity.
332
+ For fixed L1, L2, the
333
+ absolute velocity of each particle in the limit when the singularity is approached, can take
334
+ only two values: either V = 0 or V = 1 [18], [20]. Below, we enumerate different sub-cases
335
+ separately depending on the angular momentum of each particle.
336
+
337
+ 9
338
+ A.
339
+ A L1 = 0 = L2.
340
+ Then,
341
+ P =
342
+
343
+ p2 + g.
344
+ (22)
345
+ For g → ∞ we have
346
+ γ12 ≈ 1 + w2
347
+ 2 ,
348
+ (23)
349
+ where
350
+ w ≈ |p1 − p2|
351
+ √g
352
+ → 0.
353
+ (24)
354
+ Also,
355
+ V1 → 0, V2 → 0,
356
+ (25)
357
+ cos ψ → sign(p1p2),
358
+ (26)
359
+ If a particle entered the interior of the horizon from its exterior, p > 0. If it entered from
360
+ the left (mirror) region, p < 0. Thus in a physically relevant case when both particles came
361
+ from infinity, ψ → 0.
362
+ B.
363
+ B L1 = 0, L2 = L ̸= 0
364
+ γ12 ≈
365
+ ����
366
+ L
367
+ T
368
+ ���� → ∞,
369
+ (27)
370
+ w2 ≈ 1 − T 2
371
+ L2 → 1,
372
+ (28)
373
+ V1 → 0, V2 → 1,
374
+ (29)
375
+ cos ψ → 0.
376
+ (30)
377
+ C.
378
+ C L1L2 > 0
379
+ γ12 → L2
380
+ 1 + L2
381
+ 2
382
+ L1L2
383
+ ,
384
+ (31)
385
+ w → |L2
386
+ 1 − L2
387
+ 2|
388
+ L2
389
+ 1 + L2
390
+ 2
391
+ < 1,
392
+ (32)
393
+
394
+ 10
395
+ V1 → 1, V2 → 1,
396
+ (33)
397
+ cos ψ ≈ 1 − T 2
398
+ g
399
+ (p1L2 − p2L1)2
400
+ L2
401
+ 1L2
402
+ 2
403
+ .
404
+ (34)
405
+ Particles move almost parallel to each other near the singularity.
406
+ D.
407
+ D L1L2 < 0
408
+ γ12 ≈ 2|L1L2|
409
+ T 2
410
+ → ∞,
411
+ (35)
412
+ w ≈ 1 −
413
+ T 4
414
+ 4L2
415
+ 1L2
416
+ 2
417
+ → 1,
418
+ (36)
419
+ V1 → 1, V2 → 1,
420
+ (37)
421
+ cos ψ → −1.
422
+ (38)
423
+ This means that head-on collision occurs, ψ → π.
424
+ Now, we can summarize the results of the present section.
425
+ L1
426
+ L2
427
+ w
428
+ ψ
429
+ A 0
430
+ 0
431
+ 0
432
+ 0
433
+ B 0
434
+ ̸= 0
435
+ 1
436
+ π
437
+ 2
438
+ C ̸= 0 ̸= 0, L2 parallel to L1
439
+ separated from 1 0
440
+ D ̸= 0 ̸= 0, L2 antiparallel to L1 1
441
+ π
442
+ Table 1. Types of particles collisions near the singularity
443
+ VII.
444
+ PARTICLES MOVE WITHIN DIFFERENT PLANES
445
+ As is well-known, in the case of conserved angular momentum a particle moves within
446
+ a plane. According to above consideration, we can choose this plane to be θ = π
447
+ 2 for, say,
448
+ particle 1. However, in general, this is not the case for particle 2, the variable θ will be
449
+ varying in time. Will it significantly affect the results for the relative velocity and Lorentz
450
+ factor γ12 near the singularity? To answer this question, we generalize the results of the
451
+ previous section. Omitting the details of derivation, we give the corresponding formulas
452
+ below. Now,
453
+ uµ = (P, − p
454
+ g, σQ
455
+ T 2 ,
456
+ L
457
+ T 2 sin2 θ),
458
+ (39)
459
+
460
+ 11
461
+ where σ = ±1,
462
+ Q =
463
+
464
+ L2
465
+ tot −
466
+ L2
467
+ sin2 θ,
468
+ (40)
469
+ P =
470
+
471
+ p2 + g(1 + L2
472
+ tot
473
+ T 2 ),
474
+ (41)
475
+ it is implied that
476
+ Ltot ≥ |L|
477
+ sin θ.
478
+ (42)
479
+ Here, the integral of motion Ltot has the meaning of the total angular momentum of a
480
+ particle, while L is its component corresponding to a variable φ. Then, for V (a) = (V (1),
481
+ V (2), V (3)) one finds
482
+ V ((a) = (− p
483
+ P , σQ√g
484
+ |T| P ,
485
+ L√g
486
+ |T| P sin θ),
487
+ (43)
488
+ eq. (12) is still valid but now with (41). Obviously,
489
+ V⊥ =
490
+
491
+ (V (2))2 + (V (3))2 =
492
+ √g
493
+ |T| P Ltot.
494
+ (44)
495
+ We assume that for particle 1 θ = π
496
+ 2, Q1 = 0, L1tot = |L1|. Then, in the point of collision
497
+ both particles have the same coordinates, so θ = π
498
+ 2 for particle 2 as well. It is convenient to
499
+ introduce an angle α for particle 2. so that L2 = Ltot cos α, where cos α can have any sign.
500
+ Then, in the point of collision we have for particle 2
501
+ uµ = (P, − p
502
+ g, L2tot sin α
503
+ T 2
504
+ , L2tot cos α
505
+ T 2
506
+ ).
507
+ (45)
508
+ Eqs. (18), (21) are also valid but in P the quantity Ltot appears instead of L.
509
+ Now,
510
+ cos ψ =
511
+ 1
512
+
513
+ p2
514
+ 1 + g L2
515
+ 1
516
+ T 2
517
+ 1
518
+
519
+ p2
520
+ 2 + g L2
521
+ 2tot
522
+ T 2
523
+ (p1p2 + L1L2g
524
+ T 2
525
+ ),
526
+ (46)
527
+ γ12 = P1P2 − p1p2
528
+ g
529
+ − L1L2
530
+ T 2 .
531
+ (47)
532
+ When a singularity is approached, V (1) → 0 as before, while V⊥ → 1, so V → 1 as well.
533
+ Let us denote the cases A-D depend on the L1, L2 in the manner similar to that in the
534
+ former section. Then, one can see that cases A and B coincide with those from Table 1.
535
+ Indeed, if one of angular momenta is zero, one can choose the equatorial plane for another
536
+ particle to be θ = π
537
+ 2, so nothing new happens. Obviously, case D is similar to that from
538
+ Table 1. It remains to check what happens in case C. Then,
539
+
540
+ 12
541
+ cos ψ →
542
+ L2
543
+ L2tot
544
+ = cos α,
545
+ (48)
546
+ ψ = α. Taking into account that V1 → 1 and V2 → 1, we see that according to (21), in case
547
+ C a new possibility arises :
548
+ γ12 ≈ |L1| (L2tot − L2)
549
+ T 2
550
+ ,
551
+ (49)
552
+ so γ12 → ∞ in spite of L1L2 > 0. Such a possibility was absent when both particles had been
553
+ moving within the same plane (see Table 1 above). The similar phenomenon for massless
554
+ particles was discussed in [19].
555
+ VIII.
556
+ MOTION UNDER THE ACTION OF FORCE
557
+ Let now some force act on a particle. Then, the equations of motion formally retain their
558
+ form but the quantities p and L cease to be integrals of motion and become the functions
559
+ of time. If there is an acceleration aµ, one finds its tetrad components using (3) - (5) that
560
+ (assuming θ = π
561
+ 2)
562
+ a(3) = |T| aφ = aφ
563
+ |T|,
564
+ (50)
565
+ a(y) = √gay = ay
566
+ √g,
567
+ (51)
568
+ a(ˆt) = − aT
569
+ √g = aT
570
+ √g.
571
+ (52)
572
+ If ξµ is the Killing vector, it is easy to notice that
573
+ d
574
+ dτ (ξµuµ) = ξµaµ.
575
+ (53)
576
+ Then,
577
+ dp
578
+ dτ = ay = √ga(y),
579
+ (54)
580
+ dL
581
+ dτ = aφ = |T| a(3),
582
+ (55)
583
+ where we used the same definitions p = −uy and L = uφ as for free particles. Now,
584
+ p2
585
+ g −
586
+
587
+ uT�2
588
+ g
589
+ + L2
590
+ T 2 = −1,
591
+ (56)
592
+
593
+ 13
594
+ where
595
+ uT = dT
596
+ dτ =
597
+
598
+ p2 + g(1 + L2
599
+ T 2).
600
+ (57)
601
+ It follows from equations of motion that
602
+ dp
603
+ dT = −dp
604
+ dr =
605
+ √ga(y)
606
+
607
+ p2 + g(1 + L2
608
+ T 2)
609
+ ,
610
+ (58)
611
+ dL
612
+ dT = −dL
613
+ dr =
614
+ |T| a(3)
615
+
616
+ p2 + g(1 + L2
617
+ T 2)
618
+ .
619
+ (59)
620
+ It is clear from (58), (59) that p and L remain finite, if a(y) and a(3) are finite.
621
+ This has important consequences for the properties of velocities. In particular, in the
622
+ tetrad (3) - (5) V (1) → 0 and V (3) → ±1, if L ̸= 0 (V (3) = 0 for L = 0). These conclusions
623
+ are valid for any finite E, L[20], so they apply to the case under discussion as well.
624
+ IX.
625
+ WHEN PARTICLE VELOCITY CAN APPROACH THE SPEED OF LIGHT
626
+ It follows from the above consideration that eq. (13) indeed retains its validity, if the
627
+ constants of motion p and L are replaced by their momentary values p(T) and L(T). In
628
+ turn, this has an important consequence. For a finite acceleration, the velocity can reach
629
+ the limiting value V = 1 only in two cases: when approaching the horizon and/or singularity.
630
+ In the first case, the right hand side of (13) diverges due to the first term where g → 0. In
631
+ the second one it does so due to the second term where T → 0.
632
+ All these conclusions are obtained with the assumption that a(i) are finite and hence p and
633
+ L are finite as well. If we relax the requirement of finiteness of a(i), an additional possibility
634
+ opens that V → 1 due to unbounded acceleration and, correspondingly, unbounded p and
635
+ L. Thus there are three possibilities for getting V → 1: (i) horizon, (ii) singularity, (iii)
636
+ infinite acceleration.
637
+ This result is valid for the velocities with respect to the Lemaˆıtre frame as well. Moreover,
638
+ it is valid with respect to a general radially free falling system formed by particles with the
639
+ specific energy e0. It is known that in such a general case the radial component of velocity
640
+ of a particle with specific energy e is given by (see [20])
641
+ V (1) = P0e − Pe0
642
+ e0e − PP0
643
+ (60)
644
+
645
+ 14
646
+ and the angular component is
647
+ V (3) =
648
+ Lf
649
+ r(e0e − PP0),
650
+ (61)
651
+ where
652
+ P0 =
653
+
654
+ e2
655
+ 0 − f.
656
+ (62)
657
+ Formulae of the present paper for the components of velocity of an individual particle
658
+ can be thought of as a particular case e0 = 0 (corresponding to a resting observer) of
659
+ these general formulae. Assuming that e is finite, we see that V (3) < 1 as it should be
660
+ and V (3) → 1 at singularity. As for the radial component, substituting P and P0 into the
661
+ condition V (1) = 1 and considering finite e we get, after a simple algebra, that f = 0. This
662
+ means that V (1) can take the value 1 at the horizon only, provided e is finite. It is worth
663
+ noting that this result is valid for any spherically symmetric static space-times since we do
664
+ not specify the function f. The coordinate system e0 = 0 considered here becomes singular
665
+ at the horizon itself. However, discussion contained in Sec. VI explains, why V (1) = 1 for
666
+ more general systems is safe from physical point of view (note, that unlike a singularity we
667
+ have equality, not a limit here!).
668
+ X.
669
+ MOTION WITH RESPECT TO A FRAME VERSUS MOTION OF NEARBY
670
+ PARTICLES
671
+ Apart from the behavior of velocity with respect to a fixed frame, another interesting
672
+ question is mutual movement of nearby points. The properties of such a motion can be very
673
+ different from the motion with respect to a fixed frame, even if one of the points considered
674
+ is at rest with respect to the coordinate system in question. The reason is that the velocity
675
+ with respect to a frame is a local entity, while a distance between two points is a space-like
676
+ variable. Indeed, consider the radial motion. The velocity along the leg of a hypercylinder
677
+ in metric (2) is known to decrease and vanish in a singularity [18], [20]. As for the distance
678
+ to a nearby point, it increases as it can be clearly seen from the form of the metrics (1),
679
+ (2). At the singularity the proper distance diverges. The picture is similar to the Big Rip
680
+ cosmological singularity, apart from the fact that the Big Rip is isotropic.
681
+ In popular books, when describing influence of tidal forces to an unhappy observer, falling
682
+ freely into a black hole, authors usually illustrate the text by emotional pictures of an ob-
683
+
684
+ 15
685
+ server ”spaghettified” in the direction toward a singularity. This has no sense in coordinates
686
+ like T, y since (i) they are homogeneous inside a horizon, and (ii) a singularity, being space-
687
+ like and in absolute future for an observer, is not present in any of an observer’s T = const
688
+ slices. By itself, ”spaghettization” does occur but has another meaning: if we make a series
689
+ of snapshots of cross-sections T = const for different T, the object extends more and more
690
+ when T grows approaching T = 0.
691
+ Another picture arises in the Lemaˆıtre coordinates. Singularity is present in the sections
692
+ of constant Lemaˆıtre time, so the direction towards a singularity makes sense. Since for
693
+ two radially separated particles singularity occur at different moments of the proper time
694
+ τ along the trajectory, the separation between two points reaches its finite maximum when
695
+ the ”inner” particle hits a singularity (in this context the word ”hits” is conditional since
696
+ the singularity is space-like, we use it for brevity only).
697
+ It is easy to estimate this maximum for a pure radial motion. Suppose two particles,
698
+ being at rest with respect to the Lemaˆıtre system are separated by some distance. Let a
699
+ particle move with E = m, so it would start its motion from the rest at infinity. Then, it
700
+ is known (see, e.g. eq. 2.3.12 of [22]) that if a particle moves from some r to rf < r, the
701
+ proper time is equal to
702
+ τ(r, rf) = (2/3)r−1/2
703
+ g
704
+ (r3/2 − r3/2
705
+ f ).
706
+ (63)
707
+ In particular, the proper time between a given position r and the singularity r = 0 is
708
+ obtained from (63) if we put there r = 0, so
709
+ τ(r, 0) = (2/3)r−1/2
710
+ g
711
+ r3/2.
712
+ (64)
713
+ It is also worth mentioning that for such a particle the Lemaˆıtre time coincides with the
714
+ proper one (see, e.g. eq. 14 of [18]). Also, the proper distance in this case is equal to the
715
+ difference of the coordinate values of r.
716
+ Let we have two such particles initially separated by the coordinate distance l. We want
717
+ to find the location rf of the ”outer” particle initially located at r+l, at the moment τ when
718
+ the ”inner” particle hits the singularity. Equating τ(r + l, rf) = τ(r, 0), assuming small l
719
+ and expanding the right hand side with respect to l/r we get
720
+ rf = [(3/2)l]2/3r1/3,
721
+ (65)
722
+ which gives for the ratio
723
+ rf/l = (3/2)2/3(r/l)1/3.
724
+ (66)
725
+
726
+ 16
727
+ Thus small absolute displacements remain small. However, relative displacement may be
728
+ arbitrary large.
729
+ As a trilling example we can consider the following situation: suppose that different parts
730
+ of human body (l ∼ 1m) start to move geodesically after tidal acceleration gt exceeds the
731
+ free fall acceleration at the surface of Earth (gE ∼ 10m/s2 ∼ 10−16m−1 in natural units
732
+ c = 1). For small l, gt ≈ rgl/r3 (see, e.g. page B-20 of [13]). Thus free fall begins at
733
+ r = (rgl/gE)1/3. Using these data we can estimate
734
+ rf/l ∼ 60r1/9
735
+ g ,
736
+ (67)
737
+ where rg is expressed in meters.
738
+ This indeed indicates ”spagettization” - the size in r-
739
+ direction enlarges from about 100 times for a stellar mass black hole to about 1000 times
740
+ for a supermassive (109 solar masses) one (note, that the dependence upon black hole mass
741
+ is rather weak).
742
+ For the motion in the angular direction the situation is quite opposite. Suppose we have
743
+ a particle with a zero angular momentum, so it falls along φ = 0 line, and a nearby particle
744
+ does so with some small but non-zero L. We know that V (3) of the second particle tends to 1
745
+ when the singularity is approached. Does this mean that the proper distance between these
746
+ two particles increase rapidly? The answer is ”no” as the direct dependence φ(r) in the
747
+ Schwarzschild metric shows (Fig.1). In this picture we plot V (3) of a particle with L = m2
748
+ inside a horizon. It tends to 1 near a singularity. In the same plot we show the distance
749
+ from the line φ = 0 to this particle (we assume that this particle crosses the line φ = 0
750
+ at the horizon) which is equal to rφ. This distance first increases due to non-zero L (as it
751
+ would be in a flat space also), then it starts to decrease despite growing velocity V (3). The
752
+ contraction in the angular direction overcomes, and the distance in the φ direction appears
753
+ to be always smaller than it would be without gravity.
754
+ This picture is qualitatively the same in the Lemaˆıtre coordinates as well.
755
+ The only
756
+ difference is that V (3) in static coordinate always vanishes at a horizon (this is a counterpart
757
+ of the statement that radial velocity is always 1 at a horizon), while the analog of this value
758
+ with respect to the Lemaˆıtre system can take any value from 0 to 1.
759
+ As for the angle φ itself, it reaches a finite value at singularity. This value grows with
760
+ growing L, tending to π for L → ∞ (see eq.21of [12]).
761
+
762
+ 17
763
+ FIG. 1: The angular component V (3) of velocity of a particle with L = m2 inside a horizon (green)
764
+ and distance to the particle in angular direction from the radius φ = 0 crossed by this particle at
765
+ a horizon (blue). The unit for V (3) is c, the unit for the distance is rg.
766
+
767
+ 0.8-
768
+ 0.6
769
+ 0.4-
770
+ 0.2-
771
+ 0.1
772
+ 0.2
773
+ 0.3
774
+ 0.4
775
+ 0.5
776
+ 0.6
777
+ 0.7
778
+ 0.8
779
+ 60
780
+ 1.0
781
+ 118
782
+ XI.
783
+ DISCUSSION AND CONCLUSIONS
784
+ In this paper we have considered dynamical phenomena in the vicinity of the singularity of
785
+ the Schwarzschild space-time. In this case one can regard horizon’s interior as an anisotropic,
786
+ dynamical V 4 space-time with a hypercylinder V 3 = R1 × S2 space-like sections. There is
787
+ a longitudinal, R1-expansion and transversal, S2-contraction. Due to extremely violent R1-
788
+ expansion in its final stage one could expect the asymptotic state of mutual rest of all the
789
+ particles moving along y-direction (see e.g
790
+ [12]). This picture has been completed by a
791
+ Doppler’s blueshift, for the case of transverse component of trajectories: a light-like, non-
792
+ zero angular momentum geodesics have been recorded blueshifted [14]. We have verified
793
+ here the kinematics of the test particles following time-like, non-zero angular momentum
794
+ trajectories of both geodesic and non-geodesic character.
795
+ If a test particle moves along
796
+ an arbitrary non-zero angular momentum trajectory, then its speed as measured by resting
797
+ observers, those with constant spatial coordinates, approaches that of light, w → 1 as T → 0.
798
+ Previously, it was found that this is valid for geodesic trajectories [18], [20]. Now, we showed
799
+ that this is valid for an arbitrary finite force.
800
+ If, instead of one particle, we take the two particles following non-zero angular momenta
801
+ trajectories, their relative velocity w → 1 with only one exceptional case. It occurs if both
802
+ particles move in the same plane and have parallel angular momenta; then the value of their
803
+ relative speed w is smaller than that of light, w < 1. This also happens if both particles
804
+ have zero angular momenta. Otherwise, non-zero angular momentum of a test particle is a
805
+ necessary and sufficient condition for w → 1.
806
+ It should be pointed out that there exists the reason, common for both the indefinite
807
+ blueshift for the class of non-zero angular momentum light-like geodesics and indefinite
808
+ tendency of the relative speed of the particles following their non-zero angular momentum
809
+ trajectories to the speed of light when approaching the ultimate singularity T → 0 of
810
+ Schwarzschild BH’s interior. This effect is caused by a contraction in the course of highly
811
+ anisotropic dynamics of space-time. Indeed, when approaching T → 0, [8] the hypercylinder
812
+ is critically contracting, i.e. the radius |T| of the two-sphere, diminishes to the zero value,
813
+ T → 0. This critical contraction carries all of the objects, massive and massless, in such a
814
+ way that the light recorded by a resting or moving along y-axis observer turns out to be
815
+ indefinitely blueshifted and the speed of a test particle as measured by resting or moving
816
+
817
+ 19
818
+ along y axis observer tends indefinitely to the speed of light, w → 1. When two colliding
819
+ massive particles follow their non-zero angular momenta trajectories, then in general they
820
+ experience head-on collision and their relative speed approaches that of light. (For motion
821
+ within the same plane and the same directions of the angular momenta the effect is moderate:
822
+ the relative speed of the colliding particles is found to be smaller than the speed of light,
823
+ w < 1. This is an analogy of the finding in [14] where for motion within the same plane and
824
+ the same directions of the angular momenta of the observer and the light a finite blueshift
825
+ is found).
826
+ The result w → 1 may be regarded as a center of mass energy collision tending to infinity.
827
+ This interpretation provides a particular perspective. All of the variety of the BSW effect,
828
+ unbounded energy collisions in the vicinity of the black hole horizons, outer or inner, have
829
+ lead to the conclusion about arbitrary large limit which, however, is not reached in any
830
+ particular collision, so an infinite limit cannot be realized.
831
+ This is called a principle of
832
+ kinematic censorship [21]. Meanwhile, in the case under discussion this principle is violated
833
+ when T → 0 (r → 0). This is probably quite natural since in the singularity itself all known
834
+ laws of physics can be violated and geometry as such ceases to exist.
835
+ Since exact vanishing of angular momentum and exact coinciding of planes of motion for
836
+ two particles represent zero-measure set of initial conditions and cannot be exactly satisfied
837
+ in any realistic physical situation, we can conclude that tending w to 1 at a singularity
838
+ is unavoidable. Correspondingly, indefinite growth of Ec.m. is general feature for particle
839
+ collisions near the singularity.
840
+ It is also shown for spherically symmetric space-times of a quite general form that a
841
+ particle velocity can approach the speed of light only in three cases: (i) on the horizon, (ii)
842
+ in the singularity, (iii) when a proper acceleration diverges.
843
+ XII.
844
+ ACKNOWLEDGEMENT
845
+ The work of AT is supported by the Program of Competitive Growth of Kazan Federal
846
+ University and by the Interdisciplinary Scientific and Educational School of Moscow Uni-
847
+ versity in Fundamental and Applied Space Research. O. Z. thanks H. V. Ovcharenko for
848
+
849
+ 20
850
+ useful discussion.
851
+ [1] M. Ba˜nados, J. Silk and S.M. West, Kerr black holes as particle accelerators to arbitrarily
852
+ high energy, Phys. Rev. Lett. 103, 111102 (2009). arXiv:0909.0169
853
+ [2] The Event Horizon Telescope Collaboration: First M87 Event Horizon Telescope Results. I.
854
+ The shadow of the supermassive black hole. 2019 ApJL 875 L1.
855
+ [3] B. P. Abbott, R. Abbott, T. D. Abbott, M. R. Abernathy, F. Acernese, K. Ackley, C. Adams
856
+ et al. Observation of gravitational waves from a binary black hole merger. Phys. Review Lett.
857
+ 116, 061102 (2016). arXiv:1602.03837
858
+ [4] M. Brightman et al., Breaking the limit: Super-Eddington accretion onto black holes and
859
+ neutron stars, Bull. Am. Astron. Soc. 51, 352 (2019). arXiv:1903.06844
860
+ [5] P.C. Fragile, S.M. Etheridge, P. Anninos, B. Mishra and W. Klu´zniak, Relativistic viscous
861
+ radiation hydrodynamic simulations of geometrically thin disks. Part I. Thermal and other
862
+ instabilities, Astrophys. J. 857, 1 (2018). arXiv:1803.06423.
863
+ [6] D. Farrah et al., Stellar and black hole assembly in z < 0.3 infrared-luminous mergers: inter-
864
+ mittent starbursts versus super-Eddington accretion, Mon. Not. Roy. Astron. Soc. 513, 4770
865
+ (2022) arXiv:2205.00037
866
+ [7] J.E. Jacak,
867
+ Quantum contribution to luminosity of quasars,
868
+ JCAP10,
869
+ 092 (2022).
870
+ arXiv:2110.13651
871
+ [8] V.A. Ruban, Spherically Symmetric T-models in the general theory of relativity, Gen. Rel.
872
+ and Grav., 33, 375 (2001)
873
+ [9] R. Doran, F.S. Lobo, P. Crawford, Interior of a Schwarzschild black hole revisited. Found.
874
+ Phys. 38, 160 (2008). arXiv:gr-qc/0609042
875
+ [10] A. T. Augousti, P. Gusin, B. Ku´smierz, J. Masajada, A. Radosz. On the speed of a test
876
+ particle inside the Schwarzschild event horizon and other kinds of black holes, Gen. Relat.
877
+ Grav. 50, 131 (2018).
878
+ [11] A. V. Toporensky, O. B. Zaslavskii, Zero-momentum trajectories inside a black hole and high
879
+ energy particle collisions, JCAP 12, 063 (2019). arXiv:1808.05254
880
+ [12] A. Radosz, P. Gusin, A. T. Augousti and F. Formalik. Inside spherically symmetric black
881
+ holes or how a uniformly accelerated particle may slow down. Eur. Phys. J.C 79, 876 (2019)
882
+
883
+ 21
884
+ [13] E.Taylor and J.Wheeler, Exploring Black Holes: Introduction to General Relativity (Addison
885
+ Wesley Longman, 2000).
886
+ [14] O. B. Zaslavskii, Redshift/blueshift inside the Schwarzschild black hole, Gen. Relat. Grav. 52,
887
+ 37 (2020). arXiv:1910.00669.
888
+ [15] A. J. S. Hamilton, G. Polhemus, Stereoscopic visualization in curved spacetime: seeing deep
889
+ inside a black hole, New J. Phys. 12, 123027 (2010). arXiv:1012.4043
890
+ [16] L. E. Gurevich and E. B. Gliner, General relativity after Einstein. Moscow, 1972 (In Russian).
891
+ [17] I. D. Novikov, Sov. Astron. — AJ 5, 423 (1961) (Astron. Zh. 38, 564 (1961)).
892
+ [18] A. V. Toporensky and O. B. Zaslavskii,
893
+ Flow and peculiar velocities for generic motion in
894
+ spherically symmetric black holes, Gravit. and Cosmol. 27, 126 (2021). arXiv:2011.08048.
895
+ [19] H. V. Ovcharenko and and O. B. Zaslavskii, In preparation.
896
+ [20] A. V. Toporensky and O. B. Zaslavskii, General radially moving references frames in the black
897
+ hole background, arXiv:2210.03670.
898
+ [21] Yu. V. Pavlov and O. B. Zaslavskii, Kinematic censorship as a constraint on allowed scenarios
899
+ of high energy particle collisions, Grav. Cosmol. 25, 390 (2019). [arXiv:1805.07649].
900
+ [22] V.P. Frolov and I.D. Novikov, Physics of black holes (Kluwer Academic, Dordrecht, 1998)
901
+
O9FJT4oBgHgl3EQf1S22/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:43d2aeeebabb4caffbb9a1539355d5fc4a4f39ca1d37f7dcc903cdad913a2ab5
3
+ size 2436908
RtFKT4oBgHgl3EQfiy45/content/tmp_files/2301.11843v1.pdf.txt ADDED
@@ -0,0 +1,2161 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Reading and Reasoning over Chart Images for Evidence-based
2
+ Automated Fact-Checking
3
+ Mubashara Akhtar, Oana Cocarascu and Elena Simperl
4
+ Department of Informatics, King’s College London
5
+ {mubashara.akhtar,oana.cocarascu,elena.simperl}@kcl.ac.uk
6
+ Abstract
7
+ Evidence data for automated fact-checking
8
+ (AFC) can be in multiple modalities such as
9
+ text, tables, images, audio, or video. While
10
+ there is increasing interest in using images for
11
+ AFC, previous works mostly focus on detect-
12
+ ing manipulated or fake images. We propose
13
+ a novel task, chart-based fact-checking, and
14
+ introduce ChartBERT as the first model for
15
+ AFC against chart evidence. ChartBERT lever-
16
+ ages textual, structural and visual information
17
+ of charts to determine the veracity of textual
18
+ claims.
19
+ For evaluation, we create ChartFC,
20
+ a new dataset of 15, 886 charts. We system-
21
+ atically evaluate 75 different vision-language
22
+ (VL) baselines and show that ChartBERT out-
23
+ performs VL models, achieving 63.8% accu-
24
+ racy. Our results suggest that the task is com-
25
+ plex yet feasible, with many challenges ahead.
26
+ 1
27
+ Introduction
28
+ Charts are often used to present data in news ar-
29
+ ticles, reports, scientific publications, and across
30
+ social media posts (Lo et al., 2022; Zhang et al.,
31
+ 2021). For example, in recent years, charts have
32
+ been widely used to guide policymakers in decid-
33
+ ing health policies and to communicate COVID
34
+ information with the general public; a popular ex-
35
+ ample is the coronavirus dashboard by Johns Hop-
36
+ kins University,1 which was integrated in several
37
+ websites (Perkel, 2020).
38
+ Misinformation can spread through charts in var-
39
+ ious ways. Previous works in data visualization
40
+ have discussed how misleading chart design can
41
+ cause misinformation (Lo et al., 2022). However, a
42
+ more subtle form of misinformation occurs during
43
+ chart interpretation (e.g. through invalid compar-
44
+ isons, framing correlation as causation, or spread-
45
+ ing of misleading claims). To identify these mis-
46
+ information types not only the stand-alone chart
47
+ but the chart together with its message need to be
48
+ 1https://coronavirus.jhu.edu/map.html
49
+ Claim: Both Thane Baker and Nate Cartmell were ranked
50
+ last.
51
+ Evidence:
52
+ Label: Supports
53
+ Figure 1: An example from the ChartFC dataset where
54
+ the claim is supported by the evidence chart.
55
+ considered jointly (Lo et al., 2022). In this work,
56
+ we focus on verifying whether charts support or
57
+ refute claims about them.
58
+ There has been substantial progress in automated
59
+ fact-checking (AFC) in recent years, with a fo-
60
+ cus on verifying claims against text (Wang, 2017;
61
+ Thorne et al., 2018; Schuster et al., 2021; Thorne
62
+ et al., 2021; Diggelmann et al., 2020), table (Aly
63
+ et al., 2021; Diggelmann et al., 2020; Chen et al.,
64
+ 2020a; Akhtar et al., 2022), and image (Yao et al.,
65
+ 2022; Zlatkova et al., 2019; Qu et al., 2022) evi-
66
+ dence. Previous work has widely ignored claim
67
+ verification against chart images. There are sev-
68
+ eral challenges related to chart fact-checking as
69
+ opposed to other evidence modalities: the struc-
70
+ tural information, text in charts, and location of
71
+ text need to be considered jointly for chart under-
72
+ standing. Text plays a key role and is used, for
73
+ example, as bar labels, chart titles, or in legends
74
+ to explain the use of colors. Moreover, verifying
75
+ claims against charts requires different reasoning
76
+ arXiv:2301.11843v1 [cs.CL] 27 Jan 2023
77
+
78
+ usain bolt
79
+ 1
80
+ andy stanfield
81
+ 2
82
+ carl lewis
83
+ 2
84
+ shawn crawford
85
+ 2
86
+ athlete
87
+ don quarrie
88
+ 5
89
+ pietro mennea
90
+ 5
91
+ charlie paddock
92
+ 7
93
+ frankie fredericks
94
+ 7
95
+ nate cartmell
96
+ 9
97
+ thanebaker
98
+ 6
99
+ 0
100
+ 2
101
+ 4
102
+ 6
103
+ 8
104
+ ranktypes, e.g. retrieving values, finding extremes, or
105
+ calculating a sum.
106
+ To address these challenges, we propose the
107
+ chart fact-checking task where, given a text claim
108
+ and a chart, the goal is to classify if it supports or
109
+ refutes the claim. We introduce ChartBERT as the
110
+ first model for AFC against chart evidence com-
111
+ prising (i) an OCR-based reading component to
112
+ extract text and structural information from chart
113
+ images; (ii) a sequence generation component to
114
+ process the extracted information; and (iii) an en-
115
+ coding component that extends the BERT archi-
116
+ tecture (Devlin et al., 2019) with three additional
117
+ structural embeddings to jointly learn textual and
118
+ structural representations of chart images.
119
+ Moreover, we release ChartFC as the first bench-
120
+ mark for chart-based AFC, created using TabFact
121
+ (Chen et al., 2020a) as a seed dataset. Our dataset
122
+ contains 15.9k human-written claims and bars of
123
+ different colors, orientations, and backgrounds (see
124
+ Figure 1 for an example). Our highest-performing
125
+ ChartBERT model achieves 63.8% accuracy on
126
+ ChartFC. We compare ChartBERT to 75 vision-
127
+ language (VL) baselines, combining five vision
128
+ encoders, three language encoders, and five fu-
129
+ sion methods. The best-performing VL model is
130
+ a transformer-based (Vaswani et al., 2017), dual
131
+ encoder architecture that uses a simple, yet effec-
132
+ tive fusion block: concatenation and gated recur-
133
+ rent units (GRUs) (Bahdanau et al., 2015). Our
134
+ results suggest that state-of-the-art VL approaches
135
+ struggle with the proposed task, calling for more
136
+ research.
137
+ Our contributions are as follows: 1) we pro-
138
+ pose the chart fact-checking task and build Chart-
139
+ BERT as the first chart fact-checking model; 2)
140
+ we introduce ChartFC, the first dataset for AFC
141
+ with chart evidence; 3) we systematically evalu-
142
+ ate state-of-the-art language/vision encoders and
143
+ fusion methods on the proposed task, highlighting
144
+ challenges and providing an analysis of common
145
+ reasoning types that contribute to failures.2
146
+ 2
147
+ Related Work
148
+ 2.1
149
+ Verifying Claims against Evidence
150
+ Evidence-based fact-checking aims to predict
151
+ claims’ veracity given evidence data. While many
152
+ datasets focus on text (Thorne et al., 2018; Kotonya
153
+ and Toni, 2020; Schuster et al., 2021; Wang, 2017)
154
+ 2The ChartFC dataset, trained models, and our code are
155
+ available at github/link/to/chartfc.com.
156
+ and table evidence (Chen et al., 2020a; Gupta et al.,
157
+ 2020; Aly et al., 2021; Wang et al., 2021a; Akhtar
158
+ et al., 2022), human fact-checkers use a wider range
159
+ of modalities for verification (Nakov et al., 2021b;
160
+ Alam et al., 2021). They consult experts and extract
161
+ information from databases, text, tables, graphics,
162
+ and audio/video material from numerous sources.3
163
+ Charts influence how messages are perceived
164
+ (Pandey et al., 2014). For example, Lee et al. (2021)
165
+ use the term “counter-visualization” to describe
166
+ data visualizations by the anti-vaccination commu-
167
+ nities in the US who created charts from publicly
168
+ available data and interpreted them in a way that
169
+ challenged the narrative of the pandemic, leading
170
+ to disinformation.
171
+ 2.2
172
+ Automated Fact-Checking with Images
173
+ Given that claims and evidence can be conveyed
174
+ through different modalities, interest in AFC with
175
+ images has increased recently (Nakov et al., 2021a;
176
+ Cao et al., 2020; Alam et al., 2021; Yao et al., 2022;
177
+ Sharma et al., 2022). Previous tasks focus mainly
178
+ on detecting manipulated or fake images rather than
179
+ on evidence-based claim verification (Blaier et al.,
180
+ 2021; Kiela et al., 2020; Alam et al., 2021; Sharma
181
+ et al., 2022; Abdali, 2022). Whilst manipulated or
182
+ fake images can be detected using the image only,
183
+ claim verification requires understanding the claim
184
+ and evidence jointly.
185
+ 2.3
186
+ Chart Images in Other NLP Tasks
187
+ Two tasks related to chart fact-checking are
188
+ chart question answering and chart summarization.
189
+ Given a chart image, the summarization task re-
190
+ quires to generate a summary of the chart in natural
191
+ language text (Kantharaj et al., 2022; Tan et al.,
192
+ 2022). For question answering (chartQA) the an-
193
+ swer to natural language questions is extracted
194
+ from chart images. However, different to claim
195
+ verification, questions typically provide strong in-
196
+ dicators for the correct answers. Existing chartQA
197
+ datasets are either small (Kim et al., 2020) or
198
+ comprise automatically-generated, template-based
199
+ questions (Chaudhry et al., 2020; Kahou et al.,
200
+ 2018; Kafle et al., 2018).
201
+ 3
202
+ ChartBERT Model
203
+ We introduce ChartBERT, a first BERT-based chart
204
+ fact-checking model. Our model consists of (i) a
205
+ 3https://ballotpedia.org/The_methodologies_of_
206
+ fact-checking
207
+
208
+ Figure 2: The ChartBERT architecture.
209
+ reading component which extracts text and struc-
210
+ tural information from charts (Section 3.2); (ii) a
211
+ component for generating textual sequences from
212
+ the information previously extracted (Section 3.3);
213
+ and (iii) a BERT-based encoder with additional
214
+ structural embeddings for the text extracted from
215
+ charts (Section 3.4). The model architecture is
216
+ shown in Figure 2.
217
+ 3.1
218
+ Task Formulation
219
+ Following previous AFC work (Chen et al., 2020a;
220
+ Aly et al., 2021; Thorne et al., 2018; Wang et al.,
221
+ 2021b), we view chart fact-checking as a classifi-
222
+ cation task where, given a natural language claim
223
+ and a piece of evidence (i.e. the chart image), the
224
+ goal is to decide if the evidence supports or refutes
225
+ the claim. We use support/refute as labels for claim
226
+ classification instead of true/false as we only as-
227
+ sess the claim veracity given the provided evidence
228
+ rather than claiming universal statements.
229
+ Each ChartFC sample i = (ci, imgi, yi) com-
230
+ prises a natural language claim ci, a chart image
231
+ imgi (see Figure 1 for an example), and a label
232
+ yi ∈ {supports, refutes}.
233
+ 3.2
234
+ Reading Text from Chart Images
235
+ Given an image imgi, the reading component ex-
236
+ tracts text and structural information. First, we
237
+ detect text regions in the chart using a Tesser-
238
+ act OCR model (Kay, 2007).
239
+ Specifically, for
240
+ each image, the model extracts n text regions
241
+ Ti = {t1, t2, ..., tn}nj=1, where each region tj con-
242
+ sists of textj, a sequence of m tokens, and a rect-
243
+ angular bounding box bj that surrounds the text
244
+ region in the chart. The bounding box is a tuple
245
+ bj = (xj, yj, wj, hj) where xj and yj are the pixel
246
+ coordinates of the top left point of the box, and wj
247
+ and hj represent the width and height of the box in
248
+ pixels. Thus, for each image imgi we obtain the
249
+ following output oi:
250
+ oi = fR(imgi) = {(textj, xj, yj, wj, hj)}nj=1
251
+ 3.3
252
+ Text Sequence Generation
253
+ Next, we process the reading component’s output
254
+ into a text sequence si consisting of m tokens:
255
+ si = fSeqGen(oi) = [s1, s2, ...sm]
256
+ We compare two approaches as follows.
257
+ Concatenation: The concatenation method pro-
258
+ cesses the text regions (i.e. tj ∈ Ti) based on their
259
+ coordinates xj and yj so that texts that are close in
260
+ the chart are also close in the generated sequence.
261
+ The chart text is concatenated into one sequence
262
+ and tokens that belong to different text regions are
263
+ separated using a [; ] token. Thus, for the chart Fig-
264
+ ure 1 we obtain a text sequence starting with “usain
265
+ bolt ; 1 ; andy stanfield ; 2 ; [...].”
266
+ Template: We use the structural information (i.e.
267
+ x, y, wj, hj) to fill templates and generate text se-
268
+ quences. We evaluate three templates (an example
269
+ for each template, extracted from Figure 1, is pro-
270
+ vided in brackets):
271
+ tmp1: entry [num] : [lx] is [textx]; [ly] is [texty]
272
+ (entry one: athlete is usain bolt ; rank is 1);
273
+ tmp2: “row [num] : [lx] is [textx]; [ly] is [texty]”
274
+ (“row 0: athlete is usain bolt ; rank is 1”);
275
+ tmp3: “[lx] is [textx] when [ly] is [texty]”
276
+ (“athlete is usain bolt when rank is 1”).
277
+ The placeholder [lx] is replaced with the x-axis
278
+ label from the chart (e.g. “rank” in Figure 1). Simi-
279
+ larly, the y-axis label (e.g. “athlete”) replaces [ly].
280
+ Based on the coordinates, we classify a bounding
281
+ boxes that contain axes labels (i.e. the boxes with
282
+ the largest y coordinates).
283
+ A counter starting from one replaces [num] and
284
+ numbers the bars in the chart. We fill [texty] and
285
+ and [textx] with text regions detected as bar labels
286
+ and axis ticks given their positions.
287
+ 3.4
288
+ Encoding and Classification
289
+ ChartBERT captures the structure of charts through
290
+ three learned embeddings: the x coordinate embed-
291
+ ding which captures the horizontal location of the
292
+ text in the chart, the y coordinate embedding which
293
+ captures the vertical location, and the label embed-
294
+ ding which takes value 1 if the text region is part
295
+
296
+ CHART EVIDENCE
297
+ usain bolt
298
+ andy stanfield
299
+ carl lewis
300
+ shawn crawford
301
+ athlete
302
+ don quarrie
303
+ 5
304
+ pietro mennea
305
+ charlie paddock
306
+ CLAIM
307
+ frankie fredericks
308
+ nate cartmell
309
+ 9
310
+ BothThaneBaker
311
+ thane baker
312
+ 6
313
+ and Nate Cartmell
314
+ 0
315
+ 2
316
+ 8
317
+ were ranked last.
318
+ rank
319
+ (1) Reading
320
+ Component
321
+ (2) Seq-
322
+ Text: [entry
323
+ (3) BERT-
324
+ one: athlete
325
+ (4)
326
+ Generation
327
+ based
328
+ is usain
329
+ Classifier
330
+ Component
331
+ bolt...]
332
+ encoderFigure 3:
333
+ ChartBERT input representation with the text extracted from the chart and concatenated following
334
+ the approach in Section 3.3. We include additional structural embeddings (i.e. x and y coordinates and label
335
+ embeddings) to the BERT input embeddings (i.e. token, segment and position embeddings).
336
+ of the x-axis label (lx), 2 if the text region is part
337
+ of the for y-axis label (ly) and 0 otherwise.
338
+ Figure 3 shows an example of the encoder with
339
+ the structural embeddings. We concatenate claim
340
+ ci and sequence si, separate them with a [SEP] to-
341
+ ken, add [CLS] as the first input token, and feed the
342
+ resulting vector as input to ChartBERT which gen-
343
+ erates 768-dimensional representations hi ∈ R768.
344
+ Finally, we pass hi through a fully connected layer
345
+ and determine the predicted label using sigmoid.
346
+ ChartBERT uses binary cross entropy to minimize
347
+ loss on the training set.
348
+ inpi = (ci, si, {xj, yj, lxj, lyj}nj=1)
349
+ hi = fEncoder(inpi)
350
+ pi = σ(fFC(hi))
351
+ 4
352
+ Evaluation
353
+ For evaluation, we first create a new dataset,
354
+ ChartFC. We compare ChartBERT with several
355
+ VL baselines, each comprising three components:
356
+ a vision encoder, a language encoder, and a fusion
357
+ block to obtain joint representations. We evaluate
358
+ the dataset size and potential biases, discuss results
359
+ obtained with ChartBERT and the baselines, and
360
+ analyse reasoning types the models fail on.
361
+ 4.1
362
+ ChartFC Dataset
363
+ This section provides an overview of the ChartFC
364
+ dataset and its creation process. Each dataset entry
365
+ comprises a natural language claim, a chart image,
366
+ and a label ∈ {supports, refutes}.
367
+ 4.1.1
368
+ The TabFact Dataset
369
+ We use TabFact (Chen et al., 2020a) as a seed
370
+ dataset. TabFact is a table fact-checking dataset
371
+ of natural language claims and tables extracted
372
+ from Wikipedia as evidence, where the veracity
373
+ of the claim is decided based on the accompanying
374
+ table. Claims were written and evaluated by hu-
375
+ man crowdworkers with at least 95% approval rates
376
+ for prior tasks and more than 500 accepted HITs
377
+ on Amazon Mechanical Turk. The inter-annotator
378
+ agreement for the claim verification task is Fleiss
379
+ κ = 0.75.
380
+ 4.1.2
381
+ Creation Pipeline
382
+ Figure 4 shows the dataset creation process.4 Start-
383
+ ing with 117, 784 claims and 16, 000 Wikipedia
384
+ tables from TabFact, we first generate sub-tables.
385
+ To link the claim text to table columns, we (i) lem-
386
+ matize and tokenize the claim and the table con-
387
+ tent, (ii) link claim tokens to column headers and
388
+ cells using string matching and heuristic rules, and
389
+ (iii) decide if a claim token is linked to multiple
390
+ columns using the minimum Levenshtein distance
391
+ 4Figure 7 in the Appendix A illustrates the pipeline.
392
+
393
+ 0
394
+ Xc
395
+ 0
396
+ Xusain
397
+ Xbolt
398
+ 0
399
+ X1
400
+ 0
401
+ Xandy
402
+ Xstanf
403
+ 0
404
+ ...
405
+ Xathlet
406
+ Xrank
407
+ 0
408
+ X-coordinate emb.
409
+ 0
410
+ Ye
411
+ 0
412
+ Yusain
413
+ Ybolt
414
+ 0
415
+ Y1
416
+ 0
417
+ Yandy
418
+ Ystanf
419
+ 0
420
+ ...
421
+ Vathlete
422
+ Yrank
423
+ 0
424
+ y-coordinate emb.
425
+ 0
426
+ 0
427
+ 0
428
+ 0
429
+ 0
430
+ 0
431
+ 0
432
+ 0
433
+ 0
434
+ 2
435
+ label embedding
436
+ 0
437
+ 0
438
+ ...
439
+ 0
440
+ E(cs)
441
+ Eelaim
442
+ E[sEP)
443
+ Eusain
444
+ Ebolt
445
+ E;
446
+ E1
447
+ E,
448
+ Eandy
449
+ Estanf
450
+ E'
451
+ Eathlete
452
+ Erank
453
+ ...
454
+ E[SEP]
455
+ BERT input emb.
456
+ [CLS]
457
+ claim
458
+ [SEP]
459
+ usain
460
+ bolt
461
+ 1
462
+ ;
463
+ andy
464
+ stanf
465
+ athlete
466
+ rank
467
+ [SEP]
468
+ concatenated text
469
+ ;
470
+ ..
471
+ usain bolt
472
+ Both Thane
473
+ andy stanfield
474
+ 2
475
+ Baker and Nate
476
+ carl lewis
477
+ Cartmell were
478
+ shawn crawford
479
+ ranked last.
480
+ lete
481
+ don quarrie
482
+ pietro mennea
483
+ charlie paddock
484
+ frankie fredericks
485
+ nate cartmell
486
+ thane baker
487
+ 2
488
+ rankFigure 4: Dataset creation process.
489
+ Train
490
+ Valid
491
+ Test
492
+ Sum
493
+ Support
494
+ 7,048
495
+ 896
496
+ 885
497
+ 8,829
498
+ Refute
499
+ 5,654
500
+ 697
501
+ 706
502
+ 7,057
503
+ Sum
504
+ 12,702
505
+ 1,593
506
+ 1,591
507
+ 15,886
508
+ Table 1: Class distribution across dataset split.
509
+ (Levenshtein, 1966), and finally, (iv) filter sub-
510
+ tables with a maximum of twenty rows and two
511
+ linked columns. This results in a total of 15, 886
512
+ pairs of claims and sub-tables.
513
+ Finally, we generate charts using the Python li-
514
+ braries seaborn and matplotlib. The charts vary
515
+ across the dimensions (i) orientation (horizontal,
516
+ vertical); (ii) bar colors (green, blue, pink); and
517
+ (iii) background (no/white grid lines, white/gray
518
+ background color). We show an example in Fig-
519
+ ure 1. We partition the dataset into training, val-
520
+ idation, and test sets using 8:1:1 ratio and show
521
+ statistics in Table 1.
522
+ 4.1.3
523
+ Dataset Evaluation
524
+ To assess the data quality, we apply human and
525
+ automated evaluation. We evaluate the sub-table
526
+ generation step (step 2 in Figure 4) by checking
527
+ the verifiability of claims against the extracted sub-
528
+ tables with TableBERT (Chen et al., 2020a). We
529
+ obtain 69.3% accuracy on our test set, comparable
530
+ to 65.1% accuracy reported by Chen et al. (2020a)
531
+ on their test set.
532
+ For human validation, we extract 100 random
533
+ dataset entries and manually evaluate the claims
534
+ against sub-tables and charts. Of the 100 claims, 92
535
+ were successfully verifiable against their sub-tables
536
+ and chart images, six claims were not verifiable
537
+ because a relevant column was missing in the sub-
538
+ table, and two claims were already mislabelled in
539
+ the TabFact dataset.
540
+ 4.1.4
541
+ Chart Reasoning Types
542
+ We label 100 random test samples with chart rea-
543
+ soning types, using a taxonomy of common reason-
544
+ ing types humans apply while interacting with data
545
+ visualisations (Amar et al., 2005). We find seven
546
+ Figure 5:
547
+ Number of chart reasoning types found in
548
+ 100 dataset entries.
549
+ reasoning types present in our data: retrieve value,
550
+ filter, comparison, compute derived value, find ex-
551
+ tremum, determine range, and find anomalies.5 On
552
+ average, we find 1.4 different types per claim with
553
+ most claims including either one or two different
554
+ reasoning types (see Figure 5). The reasoning type
555
+ retrieve value, which requires extracting a value
556
+ from the chart image given certain criteria, occurs
557
+ most frequently (51%), followed by find extremum,
558
+ i.e. highest or lowest values in the chart, and fil-
559
+ ter, which occur in approximately a quarter of all
560
+ labelled claims. More complex types such as com-
561
+ pute derived value or extracting all values in a given
562
+ range are less frequent.
563
+ 4.2
564
+ Vision-Language Baselines
565
+ We evaluate our task with several VL baselines,
566
+ which jointly use claim text and visual information
567
+ from images for claim verification. We also assess
568
+ the top-3 VL baselines with OCR-extracted chart
569
+ text as additional input. Each baseline consists of
570
+ a language encoder, a vision encoder, and a fu-
571
+ sion component to obtain joint representations. We
572
+ systematically evaluate various state-of-the-art en-
573
+ coders and fusion techniques: we use shallow (e.g.
574
+ BERT Embedder (Chen et al., 2020b)) and deep
575
+ encoders (e.g. DenseNet (Huang et al., 2017)), as
576
+ well as model-agnostic (e.g. concatenation) and
577
+ model-based (e.g. transformer layers) fusion meth-
578
+ ods.
579
+ Language encoders: Given a claim ci, we use
580
+ a language encoder to obtain a feature vector:
581
+ htext
582
+ i
583
+ = fLangEncoder(ci)
584
+ We experiment with three language encoders:
585
+ BERT Embedder: Following Chen et al. (2020b),
586
+ we tokenize the claim text into sub-words. For each
587
+ token, we add the word and position embeddings to
588
+ 5We describe the chart reasoning types in detail and give
589
+ examples in Appendix B.
590
+
591
+ Starting point:
592
+ (1) Link claim to
593
+ (2) Generate
594
+ TabFact dataset
595
+ table columns
596
+ sub-tables
597
+ (4) Evaluate
598
+ (3) Create charts
599
+ 1
600
+ 山Three reasoning types
601
+ Two reasoning types
602
+ 33
603
+ 63
604
+ Onereasoningtypeobtain the text representation which we then pass
605
+ through a normalization (Ba et al., 2016) layer.
606
+ LSTM: We encode the text with 32-dimensional
607
+ word embeddings and pass them through two
608
+ LSTMs (Hochreiter and Schmidhuber, 1997) with
609
+ 768-dimensional hidden states in each layer. We
610
+ use the hidden states of the second layer as text
611
+ representations.
612
+ BERT: We use a twelve-layer BERT encoder, ini-
613
+ tialized with weights from a pretrained BERT-base
614
+ model.
615
+ Vision encoders: We use a vision encoder to
616
+ extract representations for the chart images:
617
+ himg
618
+ i
619
+ = fV isEncoder(imgi)
620
+ We evaluate five vision encoders:
621
+ Fully connected layer: We use a fully connected
622
+ layer to extract 768-dimensional representations
623
+ per image himg
624
+ i
625
+ ∈ R768.
626
+ AlexNet: Using AlexNet (Krizhevsky et al., 2012),
627
+ for each image, we obtain a representation vector
628
+ himg
629
+ i
630
+ ∈ R1024 by extracting the model output after
631
+ the third max pooling layer.
632
+ ResNet: We use ResNet-152 (He et al., 2016) to
633
+ obtain 2048-dimensional image representations by
634
+ extracting the model output before the two final
635
+ layers of ResNet-152, i.e. before the average pool-
636
+ ing layer.
637
+ DenseNet: We use a DenseNet (DN) (Huang et al.,
638
+ 2017) comprising three dense blocks, with 6, 12,
639
+ and 24 layers, respectively. We extract and concate-
640
+ nate the output of the first and third dense block
641
+ as low- and high-level feature vectors: himg
642
+ i
643
+ =
644
+ fconcat(fDN[block1](imgi); fDN[block3](imgi)).
645
+ Vision Transformer (ViT): We split images into
646
+ sequences of n 16x16 patches before using them as
647
+ input to a pretrained base-ViT model (Dosovitskiy
648
+ et al., 2021).6 We extract the hidden states from
649
+ the model’s final layer and use them as image rep-
650
+ resentations, resulting in 768-dimensional vectors
651
+ for each patch: himg
652
+ i
653
+ = [h ∈ R768]n.
654
+ Fusion methods: We then fuse the text and im-
655
+ age representations:
656
+ hjoint
657
+ i
658
+ = fFusion(himg
659
+ i
660
+ ; htext
661
+ i
662
+ )
663
+ We experiment with five fusion methods:
664
+ Concatenation and multiplication: Concatena-
665
+ tion and multiplication are common baseline ap-
666
+ proaches for multimodal fusion (Baltrušaitis et al.,
667
+ 6https://huggingface.co/google/
668
+ vit-base-patch16-224
669
+ 2018). We reshape the text and image representa-
670
+ tions and either (i) concatenate both vectors, or (ii)
671
+ perform element-wise multiplication.
672
+ Concatenation with GRUs: Inspired by Kafle
673
+ et al. (2020), we concatenate the text and image rep-
674
+ resentations and pass the resulting vector through
675
+ m 1x1 convolutional layers and two GRUs. The
676
+ first GRU takes the input in a forward direction,
677
+ while the second GRU processes the input vector
678
+ in a backwards direction to incorporate contextual
679
+ information:
680
+ hconcat
681
+ i
682
+ = fconv(fconcat{himg
683
+ i
684
+ ; htext
685
+ i
686
+ })
687
+ hjoint
688
+ i
689
+ = fconcat{f−−−→
690
+ GRU(hconcat
691
+ i
692
+ ); f←−−−
693
+ GRU(hconcat
694
+ i
695
+ )}
696
+ Multimodal Compact Bilinear Pooling (MCB):
697
+ MCB is an efficient and popular baseline for multi-
698
+ modal fusion (Fukui et al., 2016). The text and im-
699
+ age representations are each projected to a higher
700
+ dimensional space using the projection function
701
+ Count Sketch (Charikar et al., 2004). The outer
702
+ product of the projected vectors is then calculated
703
+ in Fast Fourier Transform space to obtain a joint
704
+ representation for both modalities and thus reduce
705
+ the amount of learnable parameters during model
706
+ training.
707
+ Transformer layers: Given the recent popularity
708
+ of transformer layers used for joining text and vi-
709
+ sual representations (Tan and Bansal, 2019; Chen
710
+ et al., 2020b; Yang et al., 2021), we use a three-
711
+ layer transformer to get cross-modal embeddings.
712
+ The representation hjoint
713
+ i
714
+ is passed through two
715
+ fully-connected layers and sigmoid to obtain the
716
+ classification. We use binary cross entropy loss
717
+ and stratified sampling in each training batch to
718
+ minimize the loss on the training set.
719
+ 4.3
720
+ Experimental Setup
721
+ We perform hyper-parameter search on the valida-
722
+ tion set and select the best-performing combination
723
+ from the following values: {8, 16, 32} for batch
724
+ size, {1e−3, 7e−4, 5e−5, 5e−6, 5e−7} for learning
725
+ rate, {1, ..., 50} for training epochs with early stop-
726
+ ping. We also experimented with different learning
727
+ rates for the language and vision encoders. Ulti-
728
+ mately, we used one learning rate for the entire VL
729
+ model as the modality-specific learning rates did
730
+ not provide any performance gains.7
731
+ 7The hyper-parameters for each VL baseline can be found
732
+ in our GitHub repo.
733
+
734
+ SeqGen
735
+ Val Acc
736
+ Val F1
737
+ Test Acc
738
+ Test F1
739
+ concat.
740
+ 59.2
741
+ 55.1
742
+ 60.6
743
+ 57.0
744
+ temp. tmp1
745
+ 62.4
746
+ 59.1
747
+ 63.3
748
+ 61.0
749
+ temp. tmp2
750
+ 62.0
751
+ 59.4
752
+ 61.9
753
+ 58.7
754
+ temp. tmp3
755
+ 62.1
756
+ 59.7
757
+ 63.8
758
+ 61.1
759
+ Table 2:
760
+ Results for ChartBERT with differ-
761
+ ent sequence generation (SeqGen) approaches: con-
762
+ catenation and template.
763
+ V-Encoder
764
+ Fusion
765
+ no OCR
766
+ text concat
767
+ ViT
768
+ concat GRU
769
+ 59.8
770
+ 60.5
771
+ ResNet
772
+ mult
773
+ 60.1
774
+ 61.3
775
+ ResNet
776
+ concat
777
+ 59.8
778
+ 62.7
779
+ Table 3: Test accuracy of top-3 VL baselines: without
780
+ (no OCR) chart text and chart text concatenated. All
781
+ models use BERT as language encoder.
782
+ We run all experiments on a single NVIDIA
783
+ Tesla V100 GPU with 32GB RAM. We measure
784
+ model performance with prediction accuracy and
785
+ (macro) F1 on the test dataset.
786
+ 4.4
787
+ Results & Discussion
788
+ How does ChartBERT perform on the task?
789
+ How do different approaches for sequence gen-
790
+ eration influence model performance?
791
+ Table 2 gives an overview of the results obtained
792
+ by ChartBERT. The best ChartBERT variant yields
793
+ 63.8% test accuracy and processes chart text into
794
+ text sequences using the template tmp3. Com-
795
+ pared to the concatenation approach, using tmp3
796
+ increases the accuracy by +3.2%.
797
+ Interestingly, the choice of template design im-
798
+ pacts the model performance only slightly. While
799
+ template tmp3 might seem more “natural” to hu-
800
+ mans, it does not yield much higher performance
801
+ compared to tmp2.
802
+ How do VL baselines perform on ChartFC?
803
+ How does the selection of encoder or fusion
804
+ method impact model performance?
805
+ In contrast to many state-of-the-art VL ap-
806
+ proaches that use simple vision encoders and
807
+ attention-based fusion (Chen et al., 2020b; Kim
808
+ et al., 2021; Xia et al., 2021), the three best-
809
+ performing VL models on ChartFC use BERT as
810
+ language encoder, ViT or ResNet to obtain image
811
+ representations, and either concatenation, multipli-
812
+ cation, or concatenation with GRUs as a fusion
813
+ method. Using only the claim and chart as input
814
+ (i.e. without the OCR-extracted chart text), the
815
+ highest test accuracy we obtain is 60.1% with the
816
+ model consisting of BERT, ResNet, and multiplica-
817
+ tion fusion (see Table 3).
818
+ Regarding the language encoder,8 models that
819
+ use BERT perform best, irrespectively of the vi-
820
+ sion encoder and fusion method: the best LSTM-
821
+ based model achieves 56.1% test accuracy and the
822
+ best model with BERT embedder yields 56.5% ac-
823
+ curacy, both lower than the best BERT-based VL
824
+ model with 60.1% accuracy. In contrast, we obtain
825
+ similar accuracy scores across different vision en-
826
+ coder: for example, replacing ResNet in Table 3
827
+ row two with a fully connected layer reduces the
828
+ accuracy slightly by 0.6% to 59.7%. The choice
829
+ of fusion method does not impact performance
830
+ strongly: while using multiplication mostly outper-
831
+ forms other methods by a small margin, no fusion
832
+ method stands out across all vision and language
833
+ encoders. We also evaluate the chartQA model
834
+ PReFIL (Kafle et al., 2020), which uses LSTM as
835
+ language encoder, DenseNet for image representa-
836
+ tions, and concatenation with GRUs for fusion, and
837
+ obtain on ChartFC a low test accuracy of 55.6%.
838
+ How does OCR-extracted chart text influence
839
+ performance of VL models?
840
+ In addition to claim text and chart images used
841
+ in VL baselines, we also include the text extracted
842
+ from the charts through OCR as input (see Sections
843
+ Sections 3.2 and 3.3 for details). Table 3 shows that
844
+ using the concatenated chart text as input improves
845
+ accuracy compared to the models that do no use
846
+ the chart text (e.g. from 59.8% to 62.7%). The
847
+ highest accuracy 62.7% is obtained with the BERT-
848
+ ResNet-concatenation baseline.
849
+ Do models fail on particular chart reasoning
850
+ types?
851
+ We evaluate the best VL baseline, consisting of
852
+ BERT, ViT, and concatenation with GRUs, on the
853
+ chart reasoning types present in ChartFC and de-
854
+ scribed in Section 4.1.4. We find that the model
855
+ performs best on the reasoning types retrieve value,
856
+ filter, and finding extremum, while struggling partic-
857
+ ularly with compute derived values. Figure 6 shows
858
+ that the model classifies correctly 65% (i.e. 33 out
859
+ of 51) of claims that require retrieval and 61% of
860
+ claims that require filtering. However, only 50%
861
+ of comparison claims and 38% of claims required
862
+ to compute derived values are correctly predicted.
863
+ These results are in line with previous works that
864
+ discuss limitations of state-of-the-art models in
865
+ tasks requiring numerical reasoning capabilities
866
+ (Thawani et al., 2021).
867
+ 8The complete set of results obtained with different en-
868
+ coders and fusion methods can be found in Tables 5, 6, and 7
869
+ in the Appendix.
870
+
871
+ Figure 6: Chart reasoning types: total count and cor-
872
+ rect predictions of manually annotated test samples.
873
+ Training Samples
874
+ Test Accuracy
875
+ 127 (1%)
876
+ 51.6
877
+ 3,175 (25%)
878
+ 57.0
879
+ 6,351 (50%)
880
+ 57.1
881
+ 9,526 (75%)
882
+ 58.0
883
+ 12,702 (100%)
884
+ 59.8
885
+ Table 4: Performance of VL baseline (BERT, ViT, and
886
+ concatenation with GRUs) with different training set
887
+ sizes.
888
+ Is the dataset size sufficient for our proposed
889
+ task? Do ChartFC claims contain biases?
890
+ We evaluate the size of the dataset by training
891
+ our VL baseline (i.e. using BERT, ViT, and con-
892
+ catenation with GRUs) on various subsets of the
893
+ training data as shown in Table 4 and report the
894
+ accuracy on the test set. The performance on the
895
+ test set improves as the number of training sam-
896
+ ples increases. While the performance gain is high
897
+ when increasing the training set from 1% to 25%
898
+ (51.6% accuracy compared to 57%), the difference
899
+ in accuracy between the baseline trained on half
900
+ of the training data and the entire training data is
901
+ only 2.6%, indicating that our training set has a
902
+ reasonable size.
903
+ We also train a claim-only BERT model to deter-
904
+ mine whether claims contain biases that allow the
905
+ model to correctly predict the label while ignoring
906
+ the evidence charts. Trained on the claim text only,
907
+ the model achieves 52% accuracy on the test set,
908
+ compared to ChartBERT’s accuracy of (63.8%).
909
+ We conclude that the claim text itself is not suffi-
910
+ cient for correct classification.
911
+ What are the dis-/advantages of an automated
912
+ dataset pipeline for chart fact-checking?
913
+ We automatically create ChartFC using a table
914
+ fact-checking dataset as seed by identifying sub-
915
+ tables relevant to the claims and then building the
916
+ charts. ChartFC includes common stylistic varia-
917
+ tions: bars of different colors, horizontal/vertical
918
+ orientations, different backgrounds (light/dark, grid
919
+ lines/no grid lines). While natural charts come with
920
+ large stylistic variation, using them results in re-
921
+ duced control over task complexity and dataset.
922
+ In future work, we plan to explore two alterna-
923
+ tive dataset creation pipelines: first, automated
924
+ pipelines for other charts types to extend the cur-
925
+ rent dataset, and second, a pipeline with natural
926
+ charts where we would create claims for charts.
927
+ Using natural charts would require a multi-step
928
+ annotation process: selecting and separating charts
929
+ from other images (Vougiouklis et al., 2020); writ-
930
+ ing claims which support/refute them; evaluating
931
+ the claims to check for correctness, typos, etc. We
932
+ would require annotators with proficiency in inter-
933
+ preting charts, and with basic mathematical and
934
+ language skills to create claims with different rea-
935
+ soning types (see Figure 5).
936
+ 5
937
+ Conclusion and Future work
938
+ We propose the chart fact-checking task and intro-
939
+ duce ChartBERT, a novel model for fact-checking
940
+ claims against chart images comprising three main
941
+ components: a reading component, a sequence
942
+ generation component, and an encoder that ex-
943
+ tends BERT’s encoder with structural embeddings.
944
+ We also introduce ChartFC as the first dataset for
945
+ fact-checking against chart images, consisting of
946
+ 15, 886 claims and chart images.
947
+ ChartBERT
948
+ achieves
949
+ 63.8%
950
+ accuracy
951
+ on
952
+ ChartFC. We systematically evaluate 75 different
953
+ VL baselines, using various language encoders, vi-
954
+ sion encoders, and fusion methods. The highest-
955
+ performing VL baseline uses BERT as language
956
+ encoder, ResNet to extract image representations,
957
+ and concatenation to obtain joint representations
958
+ for both modalities. The model achieves 62.7%
959
+ test accuracy. Our results indicate that chart fact-
960
+ checking, which requires extracting and reasoning
961
+ over text and structural information from charts, is
962
+ a challenging task for future research on AFC and
963
+ VL methods.
964
+
965
+ 51
966
+ 50
967
+ 40
968
+ 33
969
+ 30
970
+ total
971
+ correct
972
+ 23
973
+ 24
974
+ 20
975
+ 20
976
+ 16
977
+ 14
978
+ 14
979
+ 10
980
+ 10
981
+ 6
982
+ 4
983
+ Chart Reasoning TypeLimitations
984
+ The TabFact dataset (Chen et al., 2020a) has been
985
+ a valuable resource for creating ChartFC. However,
986
+ using it as (the sole) seed dataset has limitations.
987
+ ChartFC consists of bar charts only; indeed,
988
+ given the claims and tables found in TabFact, the
989
+ bar chart was deemed the most appropriate chart
990
+ type. Various types of charts exist (e.g. pie charts,
991
+ line charts) and their effectiveness in different data
992
+ contexts and tasks has been investigated in the lit-
993
+ erature. For example, Saket et al. (2019) evaluated
994
+ the effectiveness of chart types using crowdsourc-
995
+ ing experiments across the chart reasoning types
996
+ we discussed in Section 4.1.4. In the context of
997
+ small datasets, i.e. up to 34 rows and two columns
998
+ which is similar to our setting, Saket et al. (2019)
999
+ found bar charts to be the most accurate visualiza-
1000
+ tion type for the given chart reasoning types. In
1001
+ addition to bar charts, other types of charts used as
1002
+ evidence for fact-checking tasks ought to be inves-
1003
+ tigated. Behrisch et al. (2018) studied visualization
1004
+ methods for different data types (i.e. multi- and
1005
+ high-dimensional data, relational data, geo-spatial
1006
+ data, sequential and temporal data, and text data).
1007
+ For example, they found that scatter plots were ap-
1008
+ propriate visualization types for queries regarding
1009
+ data distribution (e.g. correlations and clusters),
1010
+ while line charts were more appropriate for queries
1011
+ about temporal aspects of data. To extend ChartFC
1012
+ with other chart types, we require more diverse
1013
+ data types (e.g. sequential and temporal data) and
1014
+ appropriate claims.
1015
+ Moreover, ChartFC claims are restricted to En-
1016
+ glish, whereas misinformation is commonly spread
1017
+ in different languages. Future work is necessary to
1018
+ address the limited availability of non-English fact-
1019
+ checking datasets and to contribute to the efforts
1020
+ done in this space (Gupta and Srikumar, 2021).
1021
+ References
1022
+ Sara Abdali. 2022.
1023
+ Multi-modal misinformation de-
1024
+ tection: Approaches, challenges and opportunities.
1025
+ CoRR, abs/2203.13883.
1026
+ Mubashara Akhtar, Oana Cocarascu, and Elena Sim-
1027
+ perl. 2022.
1028
+ PubHealthTab: A public health table-
1029
+ based dataset for evidence-based fact checking. In
1030
+ Findings of the Association for Computational Lin-
1031
+ guistics: NAACL 2022, pages 1–16, Seattle, United
1032
+ States. Association for Computational Linguistics.
1033
+ Firoj Alam, Stefano Cresci, Tanmoy Chakraborty, Fab-
1034
+ rizio Silvestri, Dimiter Dimitrov, Giovanni Da San
1035
+ Martino, Shaden Shaar, Hamed Firooz, and Preslav
1036
+ Nakov. 2021. A survey on multimodal disinforma-
1037
+ tion detection. CoRR, abs/2103.12541.
1038
+ Rami Aly, Zhijiang Guo, Michael Sejr Schlichtkrull,
1039
+ James
1040
+ Thorne,
1041
+ Andreas
1042
+ Vlachos,
1043
+ Christos
1044
+ Christodoulopoulos, Oana Cocarascu, and Arpit
1045
+ Mittal. 2021.
1046
+ FEVEROUS: fact extraction and
1047
+ verification
1048
+ over
1049
+ unstructured
1050
+ and
1051
+ structured
1052
+ information.
1053
+ In Proceedings of the Neural Infor-
1054
+ mation Processing Systems Track on Datasets and
1055
+ Benchmarks 1, NeurIPS.
1056
+ Robert A. Amar, James Eagan, and John T. Stasko.
1057
+ 2005. Low-level components of analytic activity in
1058
+ information visualization. In IEEE Symposium on
1059
+ Information Visualization (InfoVis), pages 111–117.
1060
+ IEEE Computer Society.
1061
+ Jimmy Lei Ba, Jamie Ryan Kiros, and Geoffrey E Hin-
1062
+ ton. 2016.
1063
+ Layer normalization.
1064
+ arXiv preprint
1065
+ arXiv:1607.06450.
1066
+ Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Ben-
1067
+ gio. 2015.
1068
+ Neural machine translation by jointly
1069
+ learning to align and translate. In 3rd International
1070
+ Conference on Learning Representations, ICLR.
1071
+ Tadas Baltrušaitis,
1072
+ Chaitanya Ahuja,
1073
+ and Louis-
1074
+ Philippe Morency. 2018. Multimodal machine learn-
1075
+ ing:
1076
+ A survey and taxonomy.
1077
+ IEEE Transac-
1078
+ tions on Pattern Analysis and Machine Intelligence,
1079
+ 41(2):423–443.
1080
+ Michael Behrisch, Michael Blumenschein, Nam Wook
1081
+ Kim, Lin Shao, Mennatallah El-Assady, Johannes
1082
+ Fuchs, Daniel Seebacher, Alexandra Diehl, Ulrik
1083
+ Brandes, Hanspeter Pfister, Tobias Schreck, Daniel
1084
+ Weiskopf, and Daniel A. Keim. 2018. Quality met-
1085
+ rics for information visualization. Comput. Graph.
1086
+ Forum, 37(3):625–662.
1087
+ Efrat Blaier, Itzik Malkiel, and Lior Wolf. 2021. Cap-
1088
+ tion enriched samples for improving hateful memes
1089
+ detection. In Proceedings of the 2021 Conference on
1090
+ Empirical Methods in Natural Language Processing,
1091
+ pages 9350–9358, Online and Punta Cana, Domini-
1092
+ can Republic. Association for Computational Lin-
1093
+ guistics.
1094
+ Juan Cao, Peng Qi, Qiang Sheng, Tianyun Yang, Junbo
1095
+ Guo, and Jintao Li. 2020.
1096
+ Exploring the role
1097
+ of visual content in fake news detection.
1098
+ CoRR,
1099
+ abs/2003.05096.
1100
+ Moses Charikar, Kevin C. Chen, and Martin Farach-
1101
+ Colton. 2004.
1102
+ Finding frequent items in data
1103
+ streams. Theor. Comput. Sci., 312(1):3–15.
1104
+ Ritwick Chaudhry, Sumit Shekhar, Utkarsh Gupta,
1105
+ Pranav Maneriker, Prann Bansal, and Ajay Joshi.
1106
+ 2020. LEAF-QA: locate, encode & attend for fig-
1107
+ ure question answering. In IEEE Winter Conference
1108
+ on Applications of Computer Vision, WACV, pages
1109
+ 3501–3510. IEEE.
1110
+
1111
+ Wenhu Chen, Hongmin Wang, Jianshu Chen, Yunkai
1112
+ Zhang, Hong Wang, Shiyang Li, Xiyou Zhou, and
1113
+ William Yang Wang. 2020a. TabFact: A large-scale
1114
+ dataset for table-based fact verification. In 8th Inter-
1115
+ national Conference on Learning Representations,
1116
+ ICLR. OpenReview.net.
1117
+ Yen-Chun Chen, Linjie Li, Licheng Yu, Ahmed El
1118
+ Kholy, Faisal Ahmed, Zhe Gan, Yu Cheng, and
1119
+ Jingjing Liu. 2020b.
1120
+ UNITER: universal image-
1121
+ text representation learning. In Computer Vision -
1122
+ ECCV - 16th European Conference, volume 12375
1123
+ of Lecture Notes in Computer Science, pages 104–
1124
+ 120. Springer.
1125
+ Jacob Devlin, Ming-Wei Chang, Kenton Lee, and
1126
+ Kristina Toutanova. 2019.
1127
+ BERT: Pre-training of
1128
+ deep bidirectional transformers for language under-
1129
+ standing.
1130
+ In Proceedings of the 2019 Conference
1131
+ of the North American Chapter of the Association
1132
+ for Computational Linguistics: Human Language
1133
+ Technologies, Volume 1 (Long and Short Papers),
1134
+ pages 4171–4186, Minneapolis, Minnesota. Associ-
1135
+ ation for Computational Linguistics.
1136
+ Thomas Diggelmann, Jordan L. Boyd-Graber, Jan-
1137
+ nis Bulian, Massimiliano Ciaramita, and Markus
1138
+ Leippold. 2020. CLIMATE-FEVER: A dataset for
1139
+ verification of real-world climate claims.
1140
+ CoRR,
1141
+ abs/2012.00614.
1142
+ Alexey
1143
+ Dosovitskiy,
1144
+ Lucas
1145
+ Beyer,
1146
+ Alexander
1147
+ Kolesnikov,
1148
+ Dirk
1149
+ Weissenborn,
1150
+ Xiaohua
1151
+ Zhai,
1152
+ Thomas Unterthiner, Mostafa Dehghani, Matthias
1153
+ Minderer, Georg Heigold, Sylvain Gelly, Jakob
1154
+ Uszkoreit, and Neil Houlsby. 2021.
1155
+ An image is
1156
+ worth 16x16 words: Transformers for image recog-
1157
+ nition at scale. In 9th International Conference on
1158
+ Learning Representations, ICLR. OpenReview.net.
1159
+ Akira Fukui, Dong Huk Park, Daylen Yang, Anna
1160
+ Rohrbach, Trevor Darrell, and Marcus Rohrbach.
1161
+ 2016. Multimodal compact bilinear pooling for vi-
1162
+ sual question answering and visual grounding. In
1163
+ Proceedings of the 2016 Conference on Empirical
1164
+ Methods in Natural Language Processing, pages
1165
+ 457–468, Austin, Texas. Association for Computa-
1166
+ tional Linguistics.
1167
+ Ashim Gupta and Vivek Srikumar. 2021.
1168
+ X-fact: A
1169
+ new benchmark dataset for multilingual fact check-
1170
+ ing. In Proceedings of the 59th Annual Meeting of
1171
+ the Association for Computational Linguistics and
1172
+ the 11th International Joint Conference on Natu-
1173
+ ral Language Processing (Volume 2: Short Papers),
1174
+ pages 675–682, Online. Association for Computa-
1175
+ tional Linguistics.
1176
+ Vivek Gupta, Maitrey Mehta, Pegah Nokhiz, and Vivek
1177
+ Srikumar. 2020. INFOTABS: Inference on tables as
1178
+ semi-structured data. In Proceedings of the 58th An-
1179
+ nual Meeting of the Association for Computational
1180
+ Linguistics, pages 2309–2324, Online. Association
1181
+ for Computational Linguistics.
1182
+ Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian
1183
+ Sun. 2016. Deep residual learning for image recog-
1184
+ nition. In 2016 IEEE Conference on Computer Vi-
1185
+ sion and Pattern Recognition, CVPR, pages 770–
1186
+ 778. IEEE Computer Society.
1187
+ Sepp Hochreiter and Jürgen Schmidhuber. 1997.
1188
+ Long short-term memory.
1189
+ Neural Computation,
1190
+ 9(8):1735–1780.
1191
+ Gao Huang, Zhuang Liu, Laurens van der Maaten, and
1192
+ Kilian Q. Weinberger. 2017. Densely connected con-
1193
+ volutional networks. In 2017 IEEE Conference on
1194
+ Computer Vision and Pattern Recognition, CVPR,
1195
+ pages 2261–2269. IEEE Computer Society.
1196
+ Kushal Kafle, Brian L. Price, Scott Cohen, and Christo-
1197
+ pher Kanan. 2018. DVQA: understanding data vi-
1198
+ sualizations via question answering. In 2018 IEEE
1199
+ Conference on Computer Vision and Pattern Recog-
1200
+ nition, CVPR, pages 5648–5656. Computer Vision
1201
+ Foundation / IEEE Computer Society.
1202
+ Kushal Kafle, Robik Shrestha, Brian L. Price, Scott
1203
+ Cohen, and Christopher Kanan. 2020. Answering
1204
+ questions about data visualizations using efficient bi-
1205
+ modal fusion. In IEEE Winter Conference on Ap-
1206
+ plications of Computer Vision, WACV, pages 1487–
1207
+ 1496. IEEE.
1208
+ Samira Ebrahimi Kahou, Vincent Michalski, Adam
1209
+ Atkinson, Ákos Kádár, Adam Trischler, and Yoshua
1210
+ Bengio. 2018.
1211
+ Figureqa:
1212
+ An annotated figure
1213
+ dataset for visual reasoning.
1214
+ In 6th International
1215
+ Conference on Learning Representations, ICLR.
1216
+ OpenReview.net.
1217
+ Shankar Kantharaj, Rixie Tiffany Leong, Xiang Lin,
1218
+ Ahmed Masry, Megh Thakkar, Enamul Hoque, and
1219
+ Shafiq Joty. 2022.
1220
+ Chart-to-text:
1221
+ A large-scale
1222
+ benchmark for chart summarization. In Proceedings
1223
+ of the 60th Annual Meeting of the Association for
1224
+ Computational Linguistics (Volume 1: Long Papers),
1225
+ pages 4005–4023, Dublin, Ireland. Association for
1226
+ Computational Linguistics.
1227
+ Anthony Kay. 2007.
1228
+ Tesseract: an open-source op-
1229
+ tical character recognition engine.
1230
+ Linux Journal,
1231
+ 2007(159):2.
1232
+ Douwe Kiela, Hamed Firooz, Aravind Mohan, Vedanuj
1233
+ Goswami, Amanpreet Singh, Pratik Ringshia, and
1234
+ Davide Testuggine. 2020. The hateful memes chal-
1235
+ lenge: Detecting hate speech in multimodal memes.
1236
+ In Advances in Neural Information Processing Sys-
1237
+ tems 33: Annual Conference on Neural Information
1238
+ Processing Systems 2020, NeurIPS.
1239
+ Dae Hyun Kim,
1240
+ Enamul Hoque,
1241
+ and Maneesh
1242
+ Agrawala. 2020. Answering questions about charts
1243
+ and generating visual explanations.
1244
+ In CHI ’20:
1245
+ CHI Conference on Human Factors in Computing
1246
+ Systems, pages 1–13. ACM.
1247
+
1248
+ Wonjae Kim, Bokyung Son, and Ildoo Kim. 2021. Vilt:
1249
+ Vision-and-language transformer without convolu-
1250
+ tion or region supervision.
1251
+ In Proceedings of the
1252
+ 38th International Conference on Machine Learning,
1253
+ ICML 2021, 18-24 July 2021, Virtual Event, volume
1254
+ 139 of Proceedings of Machine Learning Research,
1255
+ pages 5583–5594. PMLR.
1256
+ Neema Kotonya and Francesca Toni. 2020.
1257
+ Ex-
1258
+ plainable automated fact-checking for public health
1259
+ claims. In Proceedings of the 2020 Conference on
1260
+ Empirical Methods in Natural Language Process-
1261
+ ing (EMNLP), pages 7740–7754, Online. Associa-
1262
+ tion for Computational Linguistics.
1263
+ Alex Krizhevsky, Ilya Sutskever, and Geoffrey E. Hin-
1264
+ ton. 2012. Imagenet classification with deep convo-
1265
+ lutional neural networks. In Advances in Neural In-
1266
+ formation Processing Systems 25: 26th Annual Con-
1267
+ ference on Neural Information Processing Systems,
1268
+ pages 1106–1114.
1269
+ Crystal Lee, Tanya Yang, Gabrielle D. Inchoco, Gra-
1270
+ ham M. Jones, and Arvind Satyanarayan. 2021. Vi-
1271
+ ral visualizations: How coronavirus skeptics use or-
1272
+ thodox data practices to promote unorthodox science
1273
+ online.
1274
+ In CHI ’21: CHI Conference on Human
1275
+ Factors in Computing Systems, Virtual Event / Yoko-
1276
+ hama, Japan, May 8-13, 2021, pages 607:1–607:18.
1277
+ ACM.
1278
+ VI Levenshtein. 1966. Binary Codes Capable of Cor-
1279
+ recting Deletions, Insertions and Reversals. Soviet
1280
+ Physics Doklady, 10:707.
1281
+ Leo Yu-Ho Lo, Ayush Gupta, Kento Shigyo, Aoyu
1282
+ Wu, Enrico Bertini, and Huamin Qu. 2022.
1283
+ Mis-
1284
+ informed by visualization: What do we learn from
1285
+ misinformative visualizations? Comput. Graph. Fo-
1286
+ rum, 41(3):515–525.
1287
+ Preslav Nakov, David P. A. Corney, Maram Hasanain,
1288
+ Firoj Alam, Tamer Elsayed, Alberto Barrón-Cedeño,
1289
+ Paolo Papotti, Shaden Shaar, and Giovanni Da San
1290
+ Martino. 2021a. Automated fact-checking for assist-
1291
+ ing human fact-checkers. In Proceedings of the Thir-
1292
+ tieth International Joint Conference on Artificial In-
1293
+ telligence, IJCAI, pages 4551–4558. ijcai.org.
1294
+ Preslav Nakov, Giovanni Da San Martino, Tamer
1295
+ Elsayed, Alberto Barrón-Cedeño, Rubén Míguez,
1296
+ Shaden Shaar, Firoj Alam, Fatima Haouari, Maram
1297
+ Hasanain, Nikolay Babulkov, Alex Nikolov, Gau-
1298
+ tam Kishore Shahi, Julia Maria Struß, and Thomas
1299
+ Mandl. 2021b.
1300
+ The CLEF-2021 CheckThat!
1301
+ lab
1302
+ on detecting check-worthy claims, previously fact-
1303
+ checked claims, and fake news. In Advances in In-
1304
+ formation Retrieval - 43rd European Conference on
1305
+ IR Research, ECIR, volume 12657 of Lecture Notes
1306
+ in Computer Science, pages 639–649. Springer.
1307
+ Anshul Vikram Pandey, Anjali Manivannan, Oded Nov,
1308
+ Margaret Satterthwaite, and Enrico Bertini. 2014.
1309
+ The persuasive power of data visualization. IEEE
1310
+ Trans. Vis. Comput. Graph., 20(12):2211–2220.
1311
+ J Perkel. 2020. Behind the Johns Hopkins University
1312
+ coronavirus dashboard. Nature Index, 7.
1313
+ Jingnong Qu, Liunian Harold Li, Jieyu Zhao, Sunipa
1314
+ Dev, and Kai-Wei Chang. 2022.
1315
+ Disinfomeme:
1316
+ A multimodal dataset for detecting meme inten-
1317
+ tionally spreading out disinformation.
1318
+ CoRR,
1319
+ abs/2205.12617.
1320
+ Bahador Saket, Alex Endert, and Çagatay Demi-
1321
+ ralp. 2019.
1322
+ Task-based effectiveness of basic vi-
1323
+ sualizations.
1324
+ IEEE Trans. Vis. Comput. Graph.,
1325
+ 25(7):2505–2512.
1326
+ Tal Schuster, Adam Fisch, and Regina Barzilay. 2021.
1327
+ Get your vitamin C! robust fact verification with con-
1328
+ trastive evidence. In Proceedings of the 2021 Con-
1329
+ ference of the North American Chapter of the Asso-
1330
+ ciation for Computational Linguistics: Human Lan-
1331
+ guage Technologies, pages 624–643, Online. Asso-
1332
+ ciation for Computational Linguistics.
1333
+ Shivam Sharma, Firoj Alam, Md. Shad Akhtar, Dim-
1334
+ itar Dimitrov, Giovanni Da San Martino, Hamed
1335
+ Firooz, Alon Y. Halevy, Fabrizio Silvestri, Preslav
1336
+ Nakov, and Tanmoy Chakraborty. 2022. Detecting
1337
+ and understanding harmful memes: A survey.
1338
+ In
1339
+ Proceedings of the Thirty-First International Joint
1340
+ Conference on Artificial Intelligence, IJCAI 2022,
1341
+ Vienna, Austria, 23-29 July 2022, pages 5597–5606.
1342
+ ijcai.org.
1343
+ Hao Tan and Mohit Bansal. 2019. LXMERT: Learning
1344
+ cross-modality encoder representations from trans-
1345
+ formers. In Proceedings of the 2019 Conference on
1346
+ Empirical Methods in Natural Language Processing
1347
+ and the 9th International Joint Conference on Natu-
1348
+ ral Language Processing (EMNLP-IJCNLP), pages
1349
+ 5100–5111, Hong Kong, China. Association for
1350
+ Computational Linguistics.
1351
+ Hao Tan, Chen-Tse Tsai, Yujie He, and Mohit Bansal.
1352
+ 2022. Scientific chart summarization: Datasets and
1353
+ improved text modeling.
1354
+ Avijit Thawani, Jay Pujara, Filip Ilievski, and Pedro
1355
+ Szekely. 2021. Representing numbers in NLP: a sur-
1356
+ vey and a vision. In Proceedings of the 2021 Con-
1357
+ ference of the North American Chapter of the Asso-
1358
+ ciation for Computational Linguistics: Human Lan-
1359
+ guage Technologies, pages 644–656, Online. Asso-
1360
+ ciation for Computational Linguistics.
1361
+ James Thorne, Max Glockner, Gisela Vallejo, Andreas
1362
+ Vlachos, and Iryna Gurevych. 2021.
1363
+ Evidence-
1364
+ based verification for real world information needs.
1365
+ CoRR, abs/2104.00640.
1366
+ James
1367
+ Thorne,
1368
+ Andreas
1369
+ Vlachos,
1370
+ Christos
1371
+ Christodoulopoulos,
1372
+ and
1373
+ Arpit
1374
+ Mittal.
1375
+ 2018.
1376
+ FEVER: a large-scale dataset for fact extraction
1377
+ and VERification.
1378
+ In Proceedings of the 2018
1379
+ Conference of the North American Chapter of
1380
+ the
1381
+ Association
1382
+ for
1383
+ Computational
1384
+ Linguistics:
1385
+ Human Language Technologies, Volume 1 (Long
1386
+
1387
+ Papers), pages 809–819, New Orleans, Louisiana.
1388
+ Association for Computational Linguistics.
1389
+ Ashish Vaswani, Noam Shazeer, Niki Parmar, Jakob
1390
+ Uszkoreit, Llion Jones, Aidan N. Gomez, Lukasz
1391
+ Kaiser, and Illia Polosukhin. 2017. Attention is all
1392
+ you need. In Advances in Neural Information Pro-
1393
+ cessing Systems 30: Annual Conference on Neural
1394
+ Information Processing Systems, pages 5998–6008.
1395
+ Pavlos Vougiouklis, Leslie Carr, and Elena Simperl.
1396
+ 2020. Pie chart or pizza: Identifying chart types and
1397
+ their virality on twitter. In Proceedings of the Four-
1398
+ teenth International AAAI Conference on Web and
1399
+ Social Media, ICWSM 2020, Held Virtually, Origi-
1400
+ nal Venue: Atlanta, Georgia, USA, June 8-11, 2020,
1401
+ pages 694–704. AAAI Press.
1402
+ Nancy X. R. Wang,
1403
+ Diwakar Mahajan,
1404
+ Marina
1405
+ Danilevsky, and Sara Rosenthal. 2021a. SemEval-
1406
+ 2021 task 9: Fact verification and evidence finding
1407
+ for tabular data in scientific documents (SEM-TAB-
1408
+ FACTS). In Proceedings of the 15th International
1409
+ Workshop on Semantic Evaluation (SemEval-2021),
1410
+ pages 317–326, Online. Association for Computa-
1411
+ tional Linguistics.
1412
+ Nancy Xin Ru Wang, Diwakar Mahajan, Marina
1413
+ Danilevsky, and Sara Rosenthal. 2021b. Semeval-
1414
+ 2021 task 9: Fact verification and evidence find-
1415
+ ing for tabular data in scientific documents (SEM-
1416
+ TAB-FACTS).
1417
+ In Proceedings of the 15th In-
1418
+ ternational Workshop on Semantic Evaluation, Se-
1419
+ mEval@ACL/IJCNLP, pages 317–326. Association
1420
+ for Computational Linguistics.
1421
+ William Yang Wang. 2017. “liar, liar pants on fire”: A
1422
+ new benchmark dataset for fake news detection. In
1423
+ Proceedings of the 55th Annual Meeting of the As-
1424
+ sociation for Computational Linguistics (Volume 2:
1425
+ Short Papers), pages 422–426, Vancouver, Canada.
1426
+ Association for Computational Linguistics.
1427
+ Qiaolin Xia, Haoyang Huang, Nan Duan, Dongdong
1428
+ Zhang, Lei Ji, Zhifang Sui, Edward Cui, Taroon
1429
+ Bharti, and Ming Zhou. 2021. XGPT: cross-modal
1430
+ generative pre-training for image captioning. In Nat-
1431
+ ural Language Processing and Chinese Computing
1432
+ - 10th CCF International Conference, NLPCC 2021,
1433
+ Qingdao, China, October 13-17, 2021, Proceedings,
1434
+ Part I, volume 13028 of Lecture Notes in Computer
1435
+ Science, pages 786–797. Springer.
1436
+ Zhengyuan Yang, Yijuan Lu, Jianfeng Wang, Xi Yin,
1437
+ Dinei Florêncio, Lijuan Wang, Cha Zhang, Lei
1438
+ Zhang, and Jiebo Luo. 2021. TAP: text-aware pre-
1439
+ training for text-vqa and text-caption.
1440
+ In IEEE
1441
+ Conference on Computer Vision and Pattern Recog-
1442
+ nition, CVPR, pages 8751–8761. Computer Vision
1443
+ Foundation / IEEE.
1444
+ Barry Menglong Yao, Aditya Shah, Lichao Sun, Jin-
1445
+ Hee Cho, and Lifu Huang. 2022.
1446
+ End-to-end
1447
+ multimodal fact-checking and explanation genera-
1448
+ tion: A challenging dataset and models.
1449
+ CoRR,
1450
+ abs/2205.12487.
1451
+ Yixuan Zhang, Yifan Sun, Lace M. K. Padilla, Sumit
1452
+ Barua, Enrico Bertini, and Andrea G. Parker. 2021.
1453
+ Mapping the landscape of COVID-19 crisis visual-
1454
+ izations. In CHI ’21: CHI Conference on Human
1455
+ Factors in Computing Systems, Virtual Event / Yoko-
1456
+ hama, Japan, May 8-13, 2021, pages 608:1–608:23.
1457
+ ACM.
1458
+ Dimitrina Zlatkova, Preslav Nakov, and Ivan Koychev.
1459
+ 2019.
1460
+ Fact-checking meets fauxtography: Verify-
1461
+ ing claims about images.
1462
+ In Proceedings of the
1463
+ 2019 Conference on Empirical Methods in Natu-
1464
+ ral Language Processing and the 9th International
1465
+ Joint Conference on Natural Language Processing
1466
+ (EMNLP-IJCNLP), pages 2099–2108, Hong Kong,
1467
+ China. Association for Computational Linguistics.
1468
+ A
1469
+ Dataset Pipeline
1470
+ In Figure 7, we give an example of the dataset cre-
1471
+ ation pipeline. Starting with the claim and initial
1472
+ TabFact table, we first filter columns required to de-
1473
+ cide the claims veracity label: “age at appointment”
1474
+ and “prior occupation”. This sub-table is used to
1475
+ create the evidence chart (bottom right).
1476
+ B
1477
+ Chart Reasoning Types
1478
+ We label 100 random test set samples with chart
1479
+ reasoning types. Next, we briefly describe each
1480
+ type, for more details we refer to the taxonomy by
1481
+ Amar et al. (2005):
1482
+ • Retrieve Value: Given some conditions, re-
1483
+ trieve a single value from the chart image.
1484
+ • Filter: Find all data points in the chart that
1485
+ fulfill some specified conditions.
1486
+ • Compute Derived Value: Calculate an aggre-
1487
+ gated value (e.g. average or count) using data
1488
+ points extracted from the chart.
1489
+ • Find Extremum: Extract the top-n data points
1490
+ given some conditions.
1491
+ • Determine Range: Based on some conditions,
1492
+ find a span of values such that all extracted
1493
+ data points fulfil the conditions.
1494
+ • Find Anomalies: Find any anomalies in a spec-
1495
+ ified set of data points.
1496
+ • Compare: Compare the values of different
1497
+ data points to each other.
1498
+
1499
+ Figure 7: Example for dataset creation process.
1500
+ Figure 8:
1501
+ Encoders and fusion methods used in VL
1502
+ baselines.
1503
+ C
1504
+ VL Baselines
1505
+ Figure 8 provides an overview of all encoders and
1506
+ fusion methods we use in our evaluation.
1507
+ Table 5, 6, and 7 provide an overview of all VL
1508
+ baselines we evaluated on ChartFC.
1509
+
1510
+ Claim: There are four people who were appointed at secretary at the age of 50
1511
+ 1. Initial table
1512
+ romanised name
1513
+ chinese name
1514
+ ageatappointment
1515
+ portfolio
1516
+ prior occupation
1517
+ 0
1518
+ donald tsang yam - kuen
1519
+ 曾槿
1520
+ 58
1521
+ chief secretary for administration (cs)
1522
+ chief secretary foradministration (cs)
1523
+ 1
1524
+ anthony leung kam - chung
1525
+ 梁锦松
1526
+ 50
1527
+ financial secretary (fs)
1528
+ financial secretary (fs)
1529
+ 2
1530
+ elsie leung oi - see
1531
+ 梁愛詩
1532
+ 63
1533
+ secretary for justice (si)
1534
+ secretary for justice (si)
1535
+ 3
1536
+ joseph wong wing - ping
1537
+ 王永平
1538
+ 54
1539
+ secretary for civil service
1540
+ secretary for civil service
1541
+ henry tang ying - yen
1542
+ 唐英年
1543
+ 50
1544
+ secretary for commerce,industry and technology
1545
+ chairman , federation of hong kong industries
1546
+ chief secretary for administration (cs)
1547
+ 58
1548
+ financial secretary (fs)
1549
+ 50
1550
+ 2. Subtable
1551
+ 3. Chart
1552
+ secretary for justice (sj)
1553
+ 9
1554
+ ageat appointment
1555
+ prior occupation
1556
+ secretary for civil service
1557
+ 54
1558
+ 0
1559
+ 58
1560
+ chief secretary for administration (cs)
1561
+ prior occupation
1562
+ chairman, federation of hong kong industries
1563
+ 50
1564
+ 1
1565
+ 50
1566
+ financial secretary (fs)
1567
+ secretary for financial services
1568
+ 50
1569
+ s9
1570
+ secretary for justice (sj)
1571
+ chief financial officer . pccw
1572
+ 50
1573
+ 3
1574
+ 54
1575
+ secretary for civil service
1576
+ md of greater china , ch2 m hill
1577
+ 51
1578
+ 4
1579
+ 50
1580
+ chairman , federation of hong kong industries
1581
+ chairman , arts development council
1582
+ 52
1583
+ ..
1584
+ secretary for constitutional affairs
1585
+ 58
1586
+ vice - chancellor , chinese university
1587
+ 57
1588
+ secretary for health and welfare
1589
+ 56
1590
+ 20
1591
+ 40
1592
+ 60
1593
+ age at appointmentVision encoders
1594
+ Language encoders
1595
+ Fusion methods
1596
+ FC layer
1597
+ concatenation
1598
+ BERT
1599
+ concatenation
1600
+ AlexNet
1601
+ Embedder
1602
+ + GRUs
1603
+ ResNet
1604
+ LSTM
1605
+ multiplication
1606
+ DenseNet
1607
+ BERT
1608
+ MCB Pooling
1609
+ Transformer
1610
+ ViT
1611
+ layersLang Encoder
1612
+ Vis Encoder
1613
+ Fusion
1614
+ Val Acc
1615
+ Val F1
1616
+ Test Acc
1617
+ Test F1
1618
+ BERT Emb
1619
+ FC
1620
+ concatenation
1621
+ 56.7
1622
+ 37.8
1623
+ 55.6
1624
+ 36.6
1625
+ BERT Emb
1626
+ FC
1627
+ concatenation, biGRU
1628
+ 56.2
1629
+ 36.0
1630
+ 55.6
1631
+ 35.7
1632
+ BERT Emb
1633
+ FC
1634
+ multiplication
1635
+ 56.6
1636
+ 52.8
1637
+ 56.5
1638
+ 52.3
1639
+ BERT Emb
1640
+ FC
1641
+ MCB
1642
+ 56.2
1643
+ 36.1
1644
+ 55.6
1645
+ 35.7
1646
+ BERT Emb
1647
+ FC
1648
+ Transformer layers
1649
+ 56.2
1650
+ 36.0
1651
+ 55.6
1652
+ 35.7
1653
+ BERT Emb
1654
+ AlexNet
1655
+ concatenation
1656
+ 56.5
1657
+ 40.2
1658
+ 55.1
1659
+ 38.1
1660
+ BERT Emb
1661
+ AlexNet
1662
+ concatenation, biGRU
1663
+ 56.2
1664
+ 36.0
1665
+ 55.6
1666
+ 35.7
1667
+ BERT Emb
1668
+ AlexNet
1669
+ multiplication
1670
+ 57.0
1671
+ 41.4
1672
+ 55.9
1673
+ 39.9
1674
+ BERT Emb
1675
+ AlexNet
1676
+ MCB
1677
+ 56.2
1678
+ 36.0
1679
+ 55.6
1680
+ 35.7
1681
+ BERT Emb
1682
+ AlexNet
1683
+ Transformer layers
1684
+ 56.2
1685
+ 36.0
1686
+ 55.6
1687
+ 35.7
1688
+ BERT Emb
1689
+ ResNet 152
1690
+ concatenation
1691
+ 56.5
1692
+ 45.4
1693
+ 56.2
1694
+ 45.5
1695
+ BERT Emb
1696
+ ResNet 152
1697
+ concatenation, biGRU
1698
+ 56.2
1699
+ 36.0
1700
+ 55.6
1701
+ 35.7
1702
+ BERT Emb
1703
+ ResNet 152
1704
+ multiplication
1705
+ 56.6
1706
+ 38.3
1707
+ 56.3
1708
+ 38.8
1709
+ BERT Emb
1710
+ ResNet 152
1711
+ MCB
1712
+ 56.2
1713
+ 36.0
1714
+ 55.6
1715
+ 35.7
1716
+ BERT Emb
1717
+ ResNet 152
1718
+ Transformer layers
1719
+ 56.2
1720
+ 36.0
1721
+ 55.6
1722
+ 35.7
1723
+ BERT Emb
1724
+ DenseNet (6, 12, 24)
1725
+ concatenation
1726
+ 56.5
1727
+ 43.7
1728
+ 54.0
1729
+ 40.7
1730
+ BERT Emb
1731
+ DenseNet (6, 12, 24)
1732
+ concatenation, biGRU
1733
+ 56.6
1734
+ 45.3
1735
+ 54.1
1736
+ 42.2
1737
+ BERT Emb
1738
+ DenseNet (6, 12, 24)
1739
+ multiplication
1740
+ 56.5
1741
+ 37.1
1742
+ 55.6
1743
+ 36.4
1744
+ BERT Emb
1745
+ DenseNet (6, 12, 24)
1746
+ MCB
1747
+ 56.2
1748
+ 36.1
1749
+ 55.6
1750
+ 35.7
1751
+ BERT Emb
1752
+ DenseNet (6, 12, 24)
1753
+ Transformer layers
1754
+ 56.2
1755
+ 36.0
1756
+ 55.6
1757
+ 35.7
1758
+ BERT Emb
1759
+ ViT
1760
+ concatenation
1761
+ 56.2
1762
+ 36.0
1763
+ 55.6
1764
+ 35.7
1765
+ BERT Emb
1766
+ ViT
1767
+ concatenation, biGRU
1768
+ 56.2
1769
+ 36.0
1770
+ 55.6
1771
+ 35.7
1772
+ BERT Emb
1773
+ ViT
1774
+ multiplication
1775
+ 57.1
1776
+ 42.1
1777
+ 54.8
1778
+ 37.6
1779
+ BERT Emb
1780
+ ViT
1781
+ MCB
1782
+ 56.2
1783
+ 36.0
1784
+ 55.6
1785
+ 35.7
1786
+ BERT Emb
1787
+ ViT
1788
+ Transformer layers
1789
+ 56.2
1790
+ 36.0
1791
+ 55.6
1792
+ 35.7
1793
+ Table 5: VL baselines using BERT embedder for text encoding, different vision encoders, and fusion methods
1794
+ Lang Encoder
1795
+ Vis Encoder
1796
+ Fusion
1797
+ Val Acc
1798
+ Val F1
1799
+ Test Acc
1800
+ Test F1
1801
+ LSTM
1802
+ FC
1803
+ concatenation
1804
+ 56.6
1805
+ 36.9
1806
+ 55.5
1807
+ 35.8
1808
+ LSTM
1809
+ FC
1810
+ concatenation, biGRU
1811
+ 56.2
1812
+ 36.0
1813
+ 55.6
1814
+ 35.7
1815
+ LSTM
1816
+ FC
1817
+ multiplication
1818
+ 56.2
1819
+ 36.0
1820
+ 55.6
1821
+ 35.7
1822
+ LSTM
1823
+ FC
1824
+ MCB
1825
+ 56.2
1826
+ 36.0
1827
+ 55.6
1828
+ 35.7
1829
+ LSTM
1830
+ FC
1831
+ Transformer layers
1832
+ 56.2
1833
+ 36.0
1834
+ 55.6
1835
+ 35.7
1836
+ LSTM
1837
+ AlexNet
1838
+ concatenation
1839
+ 56.3
1840
+ 39.6
1841
+ 56.1
1842
+ 39.8
1843
+ LSTM
1844
+ AlexNet
1845
+ concatenation, biGRU
1846
+ 56.2
1847
+ 36.0
1848
+ 55.6
1849
+ 35.7
1850
+ LSTM
1851
+ AlexNet
1852
+ multiplication
1853
+ 56.2
1854
+ 36.0
1855
+ 55.6
1856
+ 35.7
1857
+ LSTM
1858
+ AlexNet
1859
+ MCB
1860
+ 56.2
1861
+ 36.0
1862
+ 55.6
1863
+ 35.7
1864
+ LSTM
1865
+ AlexNet
1866
+ Transformer layers
1867
+ 56.2
1868
+ 36.0
1869
+ 55.6
1870
+ 35.7
1871
+ LSTM
1872
+ ResNet 152
1873
+ concatenation
1874
+ 56.2
1875
+ 36.0
1876
+ 55.6
1877
+ 35.7
1878
+ LSTM
1879
+ ResNet 152
1880
+ concatenation, biGRU
1881
+ 56.2
1882
+ 36.0
1883
+ 55.6
1884
+ 35.7
1885
+ LSTM
1886
+ ResNet 152
1887
+ multiplication
1888
+ 56.2
1889
+ 36.0
1890
+ 55.6
1891
+ 35.7
1892
+ LSTM
1893
+ ResNet 152
1894
+ MCB
1895
+ 56.4
1896
+ 36.3
1897
+ 56.0
1898
+ 35.9
1899
+ LSTM
1900
+ ResNet 152
1901
+ Transformer layers
1902
+ 56.2
1903
+ 36.0
1904
+ 55.6
1905
+ 35.7
1906
+ LSTM
1907
+ DenseNet (6, 12, 24)
1908
+ concatenation
1909
+ 56.2
1910
+ 36.0
1911
+ 55.6
1912
+ 35.7
1913
+ LSTM
1914
+ DenseNet (6, 12, 24)
1915
+ concatenation, biGRU
1916
+ 56.2
1917
+ 36.0
1918
+ 55.6
1919
+ 35.7
1920
+ LSTM
1921
+ DenseNet (6, 12, 24)
1922
+ multiplication
1923
+ 56.2
1924
+ 36.0
1925
+ 55.6
1926
+ 35.7
1927
+ LSTM
1928
+ DenseNet (6, 12, 24)
1929
+ MCB
1930
+ 56.2
1931
+ 36.0
1932
+ 55.6
1933
+ 35.7
1934
+ LSTM
1935
+ DenseNet (6, 12, 24)
1936
+ Transformer layers
1937
+ 56.2
1938
+ 36.0
1939
+ 55.6
1940
+ 35.7
1941
+ LSTM
1942
+ ViT
1943
+ concatenation
1944
+ 56.2
1945
+ 36.0
1946
+ 55.6
1947
+ 35.7
1948
+ LSTM
1949
+ ViT
1950
+ concatenation, biGRU
1951
+ 56.2
1952
+ 36.0
1953
+ 55.6
1954
+ 35.7
1955
+ LSTM
1956
+ ViT
1957
+ multiplication
1958
+ 56.2
1959
+ 36.0
1960
+ 55.6
1961
+ 35.7
1962
+ LSTM
1963
+ ViT
1964
+ MCB
1965
+ 56.3
1966
+ 36.7
1967
+ 55.7
1968
+ 36.5
1969
+ LSTM
1970
+ ViT
1971
+ Transformer layers
1972
+ 56.2
1973
+ 36.0
1974
+ 55.6
1975
+ 35.7
1976
+ Table 6: VL baselines with LSTM as language encoder, different vision encoders, and fusion methods
1977
+
1978
+ Lang Encoder
1979
+ Vis Encoder
1980
+ Fusion
1981
+ Val Acc
1982
+ Val F1
1983
+ Test Acc
1984
+ Test F1
1985
+ BERT
1986
+ FC
1987
+ concatenation
1988
+ 59.3
1989
+ 50.7
1990
+ 59.6
1991
+ 51.0
1992
+ BERT
1993
+ FC
1994
+ concatenation, biGRU
1995
+ 58.8
1996
+ 51.1
1997
+ 58.5
1998
+ 50.2
1999
+ BERT
2000
+ FC
2001
+ multiplication
2002
+ 59.4
2003
+ 54.5
2004
+ 59.7
2005
+ 54.9
2006
+ BERT
2007
+ FC
2008
+ MCB
2009
+ 59.7
2010
+ 49.6
2011
+ 59.1
2012
+ 49.3
2013
+ BERT
2014
+ FC
2015
+ Transformer layers
2016
+ 56.2
2017
+ 36.0
2018
+ 55.6
2019
+ 35.7
2020
+ BERT
2021
+ AlexNet
2022
+ concatenation
2023
+ 59.5
2024
+ 47.9
2025
+ 59.1
2026
+ 47.6
2027
+ BERT
2028
+ AlexNet
2029
+ concatenation, biGRU
2030
+ 59.2
2031
+ 48.2
2032
+ 58.0
2033
+ 47.0
2034
+ BERT
2035
+ AlexNet
2036
+ multiplication
2037
+ 59.0
2038
+ 56.2
2039
+ 59.6
2040
+ 57.0
2041
+ BERT
2042
+ AlexNet
2043
+ MCB
2044
+ 58.8
2045
+ 45.2
2046
+ 57.4
2047
+ 43.9
2048
+ BERT
2049
+ AlexNet
2050
+ Transformer layers
2051
+ 57.6
2052
+ 50.8
2053
+ 59.5
2054
+ 52.6
2055
+ BERT
2056
+ ResNet 152
2057
+ concatenation
2058
+ 59.8
2059
+ 50.9
2060
+ 59.8
2061
+ 50.8
2062
+ BERT
2063
+ ResNet 152
2064
+ concatenation, biGRU
2065
+ 59.1
2066
+ 47.0
2067
+ 58.8
2068
+ 46.7
2069
+ BERT
2070
+ ResNet 152
2071
+ multiplication
2072
+ 59.3
2073
+ 52.2
2074
+ 60.1
2075
+ 53.6
2076
+ BERT
2077
+ ResNet 152
2078
+ MCB
2079
+ 58.2
2080
+ 47.0
2081
+ 58.7
2082
+ 48.9
2083
+ BERT
2084
+ ResNet 152
2085
+ Transformer layers
2086
+ 56.2
2087
+ 36.0
2088
+ 55.6
2089
+ 35.7
2090
+ BERT
2091
+ DenseNet (6, 12, 24)
2092
+ concatenation
2093
+ 59.1
2094
+ 51.4
2095
+ 59.1
2096
+ 52.4
2097
+ BERT
2098
+ DenseNet (6, 12, 24)
2099
+ concatenation, biGRU
2100
+ 60.2
2101
+ 53.0
2102
+ 59.0
2103
+ 51.0
2104
+ BERT
2105
+ DenseNet (6, 12, 24)
2106
+ multiplication
2107
+ 59.4
2108
+ 49.2
2109
+ 58.7
2110
+ 48.7
2111
+ BERT
2112
+ DenseNet (6, 12, 24)
2113
+ MCB
2114
+ 59.9
2115
+ 49.6
2116
+ 58.8
2117
+ 48.6
2118
+ BERT
2119
+ DenseNet (6, 12, 24)
2120
+ Transformer layers
2121
+ 58.7
2122
+ 48.0
2123
+ 58.1
2124
+ 46.8
2125
+ BERT
2126
+ ViT
2127
+ concatenation
2128
+ 56.2
2129
+ 36.0
2130
+ 55.6
2131
+ 35.7
2132
+ BERT
2133
+ ViT
2134
+ concatenation, biGRU
2135
+ 59.0
2136
+ 51.2
2137
+ 59.8
2138
+ 51.7
2139
+ BERT
2140
+ ViT
2141
+ multiplication
2142
+ 58.0
2143
+ 42.7
2144
+ 56.6
2145
+ 41.1
2146
+ BERT
2147
+ ViT
2148
+ MCB
2149
+ 59.2
2150
+ 49.5
2151
+ 59.2
2152
+ 49.6
2153
+ BERT
2154
+ ViT
2155
+ Transformer layers
2156
+ 57.1
2157
+ 40.8
2158
+ 55.9
2159
+ 39.1
2160
+ Table 7: VL baselines with BERT as language encoder, different vision encoders, and fusion methods
2161
+
RtFKT4oBgHgl3EQfiy45/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
TtAyT4oBgHgl3EQfVvcM/content/tmp_files/2301.00147v1.pdf.txt ADDED
@@ -0,0 +1,1578 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+ 1
3
+ Contrasting Analog and Digital Resistive Switching
4
+ Memory
5
+ Characteristics
6
+ in
7
+ Solution-Processed
8
+ Copper (I) Thiocyanate and Its Polymer Electrolyte
9
+ Based Memristive Devices
10
+ Rajesh Deb1, Saumya R. Mohapatra*1, Manjula G. Nair2, and Ujjal Das3
11
+ 1Solid State Ionics Laboratory, Department of Physics, National Institute of Technology Silchar,
12
+ Silchar-788010, Assam, India
13
+ 2Department of Physics, Indian Institute of Technology, Patna, Bihar, India, 801106
14
+ 3Quantum Materials and Device Unit, Institute of Nano Science and Technology, Mohali-
15
+ 140306, Punjab, India
16
17
+
18
+ KEYWORDS: Memristive devices, analog and digital memory, synaptic plasticity, Schottky
19
+ emission, charge trapping-detrapping, electrochemical metallization cell (ECM).
20
+
21
+
22
+
23
+
24
+ 2
25
+ ABSTRACT
26
+ Usually, resistive switching (RS) devices show digital RS memory (sharp SET and RESET
27
+ process), which is most suitable for digital data storage applications. Some RS devices also
28
+ manifest ideal memristive behavior or analog memory characteristics (gradual change in
29
+ resistance states). The analog RS properties of memristive devices widen their application
30
+ domain to a much broader field of neuromorphic computing. The tunability of memristive
31
+ devices to digital or analog memory applications greatly depends upon the switching medium. In
32
+ this work, we report a comparative study on RS properties of two kinds of memristive devices
33
+ based upon copper (I) thiocyanate (CuSCN) and a solid polymer electrolyte (SPE) made up of
34
+ CuSCN as ionic moieties in polyethylene oxide (PEO). The device (ITO/CuSCN/Cu), prepared
35
+ by spin-coating CuSCN layer between ITO and copper electrode, shows simultaneous analog
36
+ and digital RS characteristics. The RS property of the device is tunable by varying the thickness
37
+ of the CuSCN layer. The current-voltage characteristics reveal that devices prepared at 3000 rpm
38
+ (thicker) during the spin-coating show only digital bipolar RS memory. In comparison, the
39
+ devices deposited at 4000 rpm (thinner) show both analog and digital RS memory. The
40
+ conduction mechanism responsible for RS behavior in CuSCN-based devices is Schottky
41
+ emission mediated charge trapping and de-trapping at the interfacial states. Contrastingly, when
42
+ the same CuSCN is used as the electrolyte in SPE film, the device only shows bipolar digital
43
+ non-volatile memory characteristics. The RS behavior is due to the electrochemical metallization
44
+ (ECM) mechanism. The ON and OFF states are achieved by the formation and rupture of copper
45
+ filaments due to the redox reactions at the interface.
46
+ 1. INTRODUCTION
47
+
48
+
49
+ 3
50
+ With the advent and adaptation of new technologies such as the internet of things (IoT),
51
+ artificial intelligence (AI), and neuromorphic computing, etc., in many walks of our life, society
52
+ is increasingly becoming more data-driven. To cope with the surge of demand in storing vast
53
+ amounts of data and processing it faster, the storage media, i.e., digital memory technology, is
54
+ facing the challenge of improving memory density and switching speed. So far, memory density
55
+ has increased in tandem with Moore's law. Hence, the cell size has been continuously
56
+ downscaled and may already hit the physical limit (i.e., 4F2 design protocol where F is the
57
+ minimum feature size in lithography).1-3 Similarly, the slow switching speed of the memory cell
58
+ creates a bottleneck between the memory and the processor in the von-Neumann architecture
59
+ based platforms, where they are segregated as different units.3-5 Hence, the overhauling of digital
60
+ memory technology is eminent and rightly happening, as evident from the recent developments
61
+ of in-memory-computing or near-data-processing device architectures.5-8 In this context, the
62
+ 'resistive switching memory' (RSM) brings a new prospective with versatile memory
63
+ characteristics. The RSM devices, also known as memristive devices, show voltage modulated
64
+ resistance states, and their memory characteristics can be broadly classified as digital and analog
65
+ types. Digital RSM devices have features of sharp SET and RESET processes that can be
66
+ observed in the bipolar or unipolar mode of operations. The early studies on RSM are primarily
67
+ focused on observing digital non-volatile memory operations, which is useful in data storage. On
68
+ the other hand, the analog RSM shows a gradual change of resistance states as the voltage is
69
+ scanned. It represents ideal memristive behavior i.e., showing pinched hysteresis in the current-
70
+ voltage characteristics.
71
+ Recent reports of RS devices show digital RS memory characteristics can be repurposed to
72
+ observe analog RS memory, and vice-versa, simply by maneuvering the biasing conditions.9-11
73
+
74
+
75
+ 4
76
+ Such versatility in the memory characteristics of memristive devices widens their application
77
+ potential from conventional digital storage to the implementation of neuromorphic computing
78
+ hardware and mimicking biological synaptic memory. Further, memristive devices also see many
79
+ specialized niche applications with novel device architecture and by on-boarding them with other
80
+ micro/nanodevices. Lately, memristor-based sensors (memsensors), where along with the
81
+ electrical bias, other external stimuli also strongly influence the resistance state of the devices,
82
+ are explored for various sensing applications.12-13 Similarly, the self-powered memristive device
83
+ is a new trend where hybrid device architectures are designed with nanogenerators, thin film
84
+ solar cells, etc.14-17
85
+ Memristive devices endowed with such varied functionalities and multiple memory
86
+ characteristics owe much to the switching medium. This work focuses on copper thiocyanate
87
+ (CuSCN) as a promising switching medium. CuSCN is already reasonably known as an excellent
88
+ electronic and optoelectronic material having applications in a wide range of devices such as
89
+ perovskite photovoltaics, organic LED, deep-UV photodetectors, thin film transistors, and
90
+ radiofrequency Schottky diode, etc.18-22 Attributes such as chemical stability, optical
91
+ transparency (98% in the visible range), good hole mobility (0.01–0.1 cm2 V−1 s−1) and suitable
92
+ energy band alignments to support hole transport are some of the reasons make it very popular as
93
+ a hole transport layer (HTL) in these devices.23 CuSCN is a P-type semiconductor from the
94
+ family of pseudohalides and, due to the interbonding of layers, can form a coordination polymer.
95
+ Moreover, CuSCN is solution processable with solvents such as diethyl sulfide (DES) and
96
+ NH4OH, producing large-area thin films without cracks and pin-holes.24 Hence, it has a huge
97
+ scope for low-cost solution-processable flexible and transient electronic applications. But,
98
+ despite these advantages, CuSCN as the primary or sole switching material in memristive
99
+
100
+
101
+ 5
102
+ devices is less explored. Initial studies on CuSCN-based RS memristive devices used a
103
+ composite of CuSCN or copper-dopped CuSCN solid electrolytes showing digital RS
104
+ characteristics.25-26 In both cases, the deposition method of CuSCN was rigorous and
105
+ complicated, involving either thermal evaporation of KSCN on the copper surface or dipping in
106
+ the copper electrode in a solution of NaSCN. Another work involving CuSCN was reported by
107
+ B. Cheng et al. 27 They showed bipolar RS behavior in a multilayer RS medium made up of
108
+ CuSCN/PMMA/ZnO that worked as a p-i-n heterojunction diode. More recently, W. Chen et al.
109
+ reported negative differential resistance and bipolar resistive switching memory in symmetric
110
+ ITO/CuSCN/ITO devices where the CuSCN layer was electrodeposited.28 Here, in this study, we
111
+ fabricated two types of memristive devices with the switching medium as (i). CuSCN and (ii).
112
+ CuSCN-based solid polymer electrolyte (Cu-SPE). Both the switching materials are solution-
113
+ processed and spin-coated. The Cu-SPE is comprised of CuSCN dissolved in polyethylene oxide
114
+ (PEO). The CuSCN and Cu-SPE films are pretty different regarding their electrical properties.
115
+ The CuSCN layer, though often considered a solid electrolyte, its ionic moieties are not mobile.
116
+ It is purely an electronic conductor through holes.29 But in Cu-SPE, CuSCN remains dissolved
117
+ with separate and mobile ionic species (Cu+ and SCN–). Hence, it remains predominantly an
118
+ ionic conductor with a high ion-transport number.32 Our first device with ITO/CuSCN/Cu
119
+ stacking shows both digital and analog-type resistive switching properties with the ability of
120
+ synaptic plasticity. In contrast, the devices with ITO/Cu-SPE/Cu structure show only digital RS
121
+ memory based on the electrochemical metallization (ECM) mechanism.
122
+ 2. EXPERIMENTAL SECTION
123
+ 2.1 Fabrication of CuSCN based memristive cells
124
+
125
+
126
+ 6
127
+ Copper (I) thiocyanate (CuSCN) and Polyethylene Terephthalate (PET) substrates with
128
+ Indium-tin Oxide (ITO) layer pre-deposited were brought from Sigma Aldrich. The substrate
129
+ was cut into pieces of 18 ×18 mm2 areas. The solution of CuSCN was prepared using diethyl
130
+ sulfide as the solvent and spin-coated onto the ITO layer of the PET substrate. Devices were
131
+ prepared with three different thicknesses of CuSCN layer by spin-coating at the speed of 3000,
132
+ 4000, and 5000 rpm for 60 secs. The prepared films were then vacuum-dried at 60 0C for 5 hours
133
+ to remove the solvent. Finally, a 40 nm thick circular copper (Cu) top electrode of diameter (100
134
+ µm) was deposited using a stainless steel shadow mask with a thermal evaporation method. So, a
135
+ vertical two-terminal ITO/CuSCN/Cu device was formed, where ITO and Cu act as bottom and
136
+ top electrodes, respectively.
137
+ 2.2 Preparation of PEO-CuSCN Solid Polymer Electrolyte (SPE)
138
+ Poly(ethylene oxide) (PEO) is known to solubilize many alkali and alkaline earth metals salts
139
+ due to the large dipole moment on the ether oxygen.30 Copper (I) thiocyanate as a pseudohalide
140
+ is also expected to dissolve in PEO. Following the earlier reports, we prepared solid polymer
141
+ electrolytes (SPEs) using PEO and CuSCN.31 – 32 PEO of molecular weight 6×105 was purchased
142
+ from Sigma Aldrich. For the preparation of the electrolytic solution, 0.5g of PEO was initially
143
+ dissolved in 20 ml of acetonitrile under constant stirring for 3 hours. Then CuSCN was added to
144
+ the above solution as weight fraction (x wt.%) of PEO where x = 0.25, 0.5, 1, 2, 3, and 5. The
145
+ mixtures were stirred for another 21 hours to get a homogeneous solution.
146
+ 2.3 Fabrication of Cu-SPE based Memristive Cells
147
+ The polymer electrolyte solution containing both PEO and CuSCN was spin-coated onto the
148
+ ITO layer of the PET substrate. The spin-coating was carried out at 1000 rpm for 10 sec,
149
+
150
+
151
+ 7
152
+ followed by at 3000 rpm for 120 sec. The prepared films were then dried in a vacuum oven at 60
153
+ 0C for 5 hours to remove any left-out solvent. The thickness of the copper-ion conductive Cu-
154
+ SPE film is estimated to be ~ 250 nm from the cross-sectional scanning electron microscope
155
+ (SEM) image, as shown in supporting information (SI) Figure S5. Finally, a 40 nm thick circular
156
+ copper (Cu) top electrode of diameter (~100 µm) was deposited, as mentioned in section 2.1.
157
+ Hence, the desired device is a vertical stack of ITO/Cu-SPE/Cu.
158
+ 2.4 Characterization of Materials and Devices
159
+ The structural properties and absorption spectra of the CuSCN film were characterized using
160
+ X-ray diffraction (XRD) and UV-visible spectroscopy. The film's chemical structure and surface
161
+ topography were studied using Raman spectra and atomic force microscopy (AFM). The Cu-SPE
162
+ films were characterized by using XRD and FTIR. XRD study shows two broad peaks at 19.1°
163
+ and 23.3° due to the PEO, as presented in SI Figure S3a. No Bragg peaks corresponding to
164
+ CuSCN were observed in the electrolyte films. This confirms CuSCN is dissolved and ionic
165
+ species are separated in the polymer electrolyte. SI Figure S3b shows the FTIR spectra of the
166
+ Cu-SPE films with varying CuSCN concentrations. The characteristic vibrational modes of PEO
167
+ and CuSCN are identified in the figure.
168
+ The electrical characterization of the CuSCN and Cu-SPE film-based memristive device were
169
+ studied by using Keithley 4200-Semiconductor Characterization System (SCS). The PET
170
+ substrate containing the vertical cells was placed on a probe station, and contact was made with
171
+ the electrodes using the tungsten tips.
172
+ 3. RESULT AND DISCUSSION
173
+ 3.1 Material Characterization
174
+
175
+
176
+ 8
177
+ The XRD spectra of as-received CuSCN powder and thin films spin-coated at 4000 rpm are
178
+ shown in Figure 1a. As indexed, the powder CuSCN is observed to be in the β phase, which has
179
+ a hexagonal (rhombohedral) structure.33-34 After making films from the solution, the CuSCN
180
+ though still remains in the β phase, becomes semicrystalline with a considerable amorphous
181
+ fraction. The Bragg peaks observed at 16.27⁰ and 27.4⁰ are significantly broadened, as shown in
182
+ the inset of Figure 1a. For the thin film, the average crystallite size for (003) and (101) peaks
183
+ observed at 16.27⁰ and 27.4⁰ found to be ~ 9.33 nm and ~ 4.47 nm, respectively, as calculated
184
+ using the Debye-Scherer formula. The UV-visible absorption spectra of the CuSCN powder and
185
+ thin films deposited on ITO are presented in Figure 1b in the wavelength range of 200-800 nm.
186
+ Above 350 nm (mainly in the visible region), no significant absorption is observed for the
187
+ powder CuSCN. While the thin film of CuSCN shows some absorption in the visible region may
188
+ be due to the defects or trap states created in the film.35 The absorption spectra of the CuSCN
189
+ powder and the thin film show a peak at ~ 297 nm, a characteristic of CuSCN.35 The optical band
190
+ gap energy was calculated from the Tauc plot, as shown in the inset of Figure 1b. The band gap
191
+ energy of the CuSCN powder and thin film spin-coated at 4000 rpm were found to be 3.6 eV and
192
+ 3.4 eV, respectively, which agrees well with the reported values.36
193
+
194
+
195
+ Figure 1. (a) XRD pattern of CuSCN powder and thin film (inset) deposited over ITO coated PET substrate, (b)
196
+ UV-visible absorption spectra of CuSCN powder and thin film deposited over
197
+ represents the determination of band gap energy
198
+ of CuSCN powder and thin film deposited
199
+ peak of ITO, (d) AFM topography image of CuSCN thin film deposited over ITO coat
200
+ The Raman spectra in the frequency region of 50
201
+ film are shown in Figure 1c. I
202
+ and 244 cm-1 belong to the stretching vibration of Cu
203
+ at 430 cm-1 and 876 cm-1 corresponds to
204
+ at 746 cm-1 is for C-S stretching. In the high
205
+ 2173 cm-1 corresponding to the C
206
+ (a) XRD pattern of CuSCN powder and thin film (inset) deposited over ITO coated PET substrate, (b)
207
+ visible absorption spectra of CuSCN powder and thin film deposited over a glass substrate. Inset of (b)
208
+ represents the determination of band gap energy of CuSCN powder and thin film from Tauc plot
209
+ of CuSCN powder and thin film deposited over ITO coated PET substrate. The symbol star (*) represents the Raman
210
+ peak of ITO, (d) AFM topography image of CuSCN thin film deposited over ITO coated PET substrate.
211
+ The Raman spectra in the frequency region of 50-3000 cm-1 of the CuSCN powder
212
+ In the powder sample, the low-frequency modes at around 205 cm
213
+ belong to the stretching vibration of Cu-S and Cu-N, respectively.
214
+ corresponds to the bending vibration of S-C≡N,
215
+ S stretching. In the high-frequency region, CuSCN shows a single peak at
216
+ corresponding to the C≡N stretching.24, 37 The thin film of CuSCN layer exhibit
217
+ 9
218
+
219
+ (a) XRD pattern of CuSCN powder and thin film (inset) deposited over ITO coated PET substrate, (b)
220
+ glass substrate. Inset of (b)
221
+ er and thin film from Tauc plot, (c) Raman spectra
222
+ ver ITO coated PET substrate. The symbol star (*) represents the Raman
223
+ ed PET substrate.
224
+ of the CuSCN powder and thin
225
+ frequency modes at around 205 cm-1
226
+ N, respectively. The Raman shift
227
+ while the Raman shift
228
+ frequency region, CuSCN shows a single peak at ~
229
+ The thin film of CuSCN layer exhibits the
230
+
231
+ (003)
232
+ (101)
233
+ Intensity (a.u.)
234
+ (003)
235
+ (101)
236
+ (a.u.)
237
+ Intensity (
238
+ (104)
239
+ 10
240
+ 20 30
241
+ 2
242
+ (900)
243
+ (110)
244
+ (600
245
+ (012)
246
+ (015)
247
+ (01
248
+
249
+ 10
250
+ 20
251
+ 30
252
+ 40
253
+ 50
254
+ 20 (Degrees)
255
+ - Thin film
256
+ *—ITO peak
257
+ a
258
+ Intensi
259
+ Cu-N
260
+ v(Cu-S)
261
+ S(SCN)
262
+
263
+ 500
264
+ 1000
265
+ 1500
266
+ Raman shift (c(110)
267
+ =2000
268
+ 100bPowder2
269
+ 260
270
+ 70
271
+ 80
272
+ 300
273
+ 400
274
+ 500WayelengthC297 nmPowder2500-1owder'hin tilm-Thin filmowderThin Film36e13
275
+ 4Energy(ew600
276
+ 700
277
+ 800(nm)「55504535302520102 um
278
+ 10
279
+ peaks of S-C≡N bending vibration, C-S stretching mode, and C≡N stretching mode located at
280
+ 430 cm-1, 746 cm-1, and 2173 cm-1, respectively. These Raman peaks are characteristics of the β-
281
+ phase of CuSCN. The Raman peaks indicated by the star mark (*) in the thin film correspond to
282
+ the ITO layer on the PET substrate.38 The surface topography image of CuSCN film deposited at
283
+ 4000 rpm on ITO-coated PET substrate is presented in Figure 1d. The root mean square surface
284
+ roughness measured over an area of 5µm × 5µm is ~ 10 nm with CuSCN grains on the surface.
285
+ 3.2 Memory Characteristics of CuSCN based memristive device
286
+ The schematic diagram of the ITO/CuSCN/Cu devices as prepared by spin-coating of the
287
+ CuSCN solution is presented in the inset of Figure 2a. Particularly for the device prepared at
288
+ 4000 rpm while spin-coating, the current-voltage characteristics is shown in Figure 2a. The
289
+ devices were biased over a small voltage range (0.8 V to – 0.8 V). As the voltage sweeps from
290
+ 0V to 0.8 V, the current gradually rises, and the device attends some low resistance state (LRS).
291
+ Again, by reverse basing (0 → – 0.8V → 0), the device steadily returns to the high resistance
292
+ state. This I-V characteristic represents the ideal memristive behavior, i.e., pinched hysteresis
293
+ loop with zero crossing.39 Such resistive switching memory characteristic is also known as the
294
+ analog RS memory. The device shows very stable analog RS behavior over repeated cycles.
295
+ Figure 2b shows the semilog plot of current vs. voltage for the first ten cycles of the voltage
296
+ scan, where the analog RS behavior is almost reproducible without any significant deviation. The
297
+ OFF-ON resistance ratio measured at a read voltage of 0.2V is 3.2 and 3.1 for the 1st and 10th
298
+ cycle, respectively.
299
+
300
+
301
+ Figure 2. (a) Linear current-voltage (
302
+ sweeping the voltage from 0 to +0.8V to
303
+ of (a) shows the schematic device structure, (b) r
304
+ complete cycles by sweeping the voltage from 0 to +0.8V to
305
+ As elucidated in the introduction, the gradual change in resistance or conductance state
306
+ observed in the analog RS has
307
+ neuromorphic computation. To
308
+ plotted I-V characteristics by sweeping the voltage for three different ranges
309
+ ±1.0V. In all these three sweeping cycles, the current gradually
310
+ forward biasing direction ( 0
311
+ when biasing is reversed ( 0
312
+ voltage of 0.2V have resistance
313
+ ±0.5V, ±0.8V, and ±1.0V, respectively. It is note
314
+ the sweeping cycle, the lower
315
+ the forward direction. Hence as a consequence, in
316
+ attained with less resistance as
317
+ ltage (I-V) characteristic of ITO/CuSCN/Cu memristive
318
+ the voltage from 0 to +0.8V to – 0.8V to 0. The bias sweeping direction is indicated by black arrows. Inset
319
+ chematic device structure, (b) represents the semi-logarithmic plot of the memrist
320
+ the voltage from 0 to +0.8V to – 0.8V to 0 for 10 continuous voltage sweep cycles.
321
+ As elucidated in the introduction, the gradual change in resistance or conductance state
322
+ erved in the analog RS has an advantage over the digital RS memory for
323
+ neuromorphic computation. To further reveal the analog RS properties in this direction, we
324
+ characteristics by sweeping the voltage for three different ranges
325
+ ±1.0V. In all these three sweeping cycles, the current gradually SETs to some LRS in the
326
+ forward biasing direction ( 0 → 0.5V, 0.8V or 1.0V → 0 ) and RESETs to HRS
327
+ when biasing is reversed ( 0 → – 0.5V, – 0.8V or – 1.0V → 0 ). The LRSs obtained at a read
328
+ voltage of 0.2V have resistance 110 kΩ, 43 kΩ, and 13 kΩ for voltage sweeping in the range of
329
+ respectively. It is noteworthy that with increasing the voltage range of
330
+ the sweeping cycle, the lower LRSs (or higher conductance states) are achieved while biasing in
331
+ the forward direction. Hence as a consequence, in the reverse biasing direction
332
+ with less resistance as the voltage sweep range widens from ±0.5V to ±1.0V.
333
+ 11
334
+
335
+ tive device of first cycle by
336
+ indicated by black arrows. Inset
337
+ plot of the memristive device in
338
+ 0.8V to 0 for 10 continuous voltage sweep cycles.
339
+ As elucidated in the introduction, the gradual change in resistance or conductance state
340
+ advantage over the digital RS memory for implementing
341
+ the analog RS properties in this direction, we
342
+ characteristics by sweeping the voltage for three different ranges ±0.5V, ±0.8V, and
343
+ s to some LRS in the
344
+ s to HRS progressively
345
+ . The LRSs obtained at a read
346
+ for voltage sweeping in the range of
347
+ worthy that with increasing the voltage range of
348
+ are achieved while biasing in
349
+ reverse biasing direction also, HRSs are
350
+ voltage sweep range widens from ±0.5V to ±1.0V.
351
+
352
+ Cu
353
+ 2.0x10-4
354
+ 1.5x10-4
355
+ oCu
356
+ CuSCN
357
+ OC
358
+ NO
359
+ 1.0x10
360
+ Current (A)
361
+ ITO
362
+ 5.0x10-5
363
+ PET
364
+ 0.0
365
+ -5.0x10-5
366
+ -1.0x10-4
367
+ -0.8
368
+ -0.4
369
+ 0.0
370
+ VoltagE-00
371
+ -0.4OA
372
+ 12
373
+ Another testimony of analog RS memory is depicted in Figure 3b. We successively bias the
374
+ device in forwarding biasing direction with a sequence of 0 → 0.8V → 0 up to five consecutive
375
+ cycles. After each cycle, the device achieved a new LRS state with lower resistance. Then in the
376
+ reverse direction also, the device was biased with a sweeping sequence of 0 → – 0.8V → 0
377
+ consecutively for five cycles. The RESET process is also gradual, with an incremental rise in the
378
+ resistance value of the HRS as the sweeping cycle varies from 6 to 10. This type of continuous
379
+ and gradual change in the LRS and HRS states with bias modulating is the signature feature of
380
+ analog RS memory.
381
+ To better represent the change in resistance states with voltage sweeps, Figure 3a and Figure
382
+ 3b are reproduced in Figure 3c and Figure 3d, respectively, as the time evolution of current, as
383
+ voltage sweeps. Figure 3c shows the steady rise in current as the range of sweeping voltage
384
+ increases. Hence, multiple LRS and HRS can be achieved with different biasing voltages. In
385
+ Figure 3d, repetitive forward biasing cycles produce incrementally higher conductance states,
386
+ whereas the reverse biasing cycles produce progressively lower conductance states. These I-V
387
+ characteristics relate to the synaptic functions, such as potentiation and depression of the
388
+ synaptic weight.9, 40-41 Hence, this is suggestive that the analog RS memory prepared with
389
+ CuSCN has the propensity to show synaptic behavior and can be employed to implement
390
+ neuromorphic computing. It is also observed in Figure 4a that the memory window (resistance
391
+ ratio) increases with increase in the sweeping range of biasing voltage. Similarly, the memory
392
+ window decreases with increase in cycle number in consecutive forward and reverse biasing
393
+ cycles as shown in Figure 4b. In the forward biasing cycles, the current is self-limiting and may
394
+ attain saturation after some cycles. In the reverse biasing cycles, the HRS state's resistance
395
+ approaches the resistance of pristine cells as the number of cycles increases.
396
+
397
+
398
+ Figure 3. (a) Current-voltage characteristics of the
399
+ ±0.5V (0V → 0.5V → 0V → – 0.5V
400
+ ITO/CuSCN/Cu memristive device, where 1, 2, 3, 4
401
+ voltage sweeps (0V → 0.8V → 0V) and 6, 7, 8, 9
402
+ voltage sweeps (0V → – 0.8V → 0V) , (c)
403
+ and (d) Temporal evolution of current
404
+ The memristive device ITO/CuSCN/Cu can also show digital RS memory after a forming stage
405
+ which occurs just above 1.0 V. But in successive cycles
406
+ voltages ~ 0.4V and ~ – 0.25
407
+ ON resistance ratio observed for 40 cycles as ~10
408
+ showed digital and analog RS memories together.
409
+ analog RS memory makes the CuSCN
410
+ voltage characteristics of the ITO/CuSCN/Cu memristive device in cycles b
411
+ 0.5V → 0V), 0V to ±0.8V and 0V to ±1V. (b) Current
412
+ , where 1, 2, 3, 4 and 5 represents the I-V curves under consecutive five positive
413
+ 0V) and 6, 7, 8, 9 and10 represents I-V curves under consecutive five negative
414
+ 0V) , (c) Temporal evolution of current when voltage sweeps with widening range
415
+ Temporal evolution of current for five consecutive positive and negative voltage sweeps
416
+ The memristive device ITO/CuSCN/Cu can also show digital RS memory after a forming stage
417
+ just above 1.0 V. But in successive cycles, SET and RESET occur at
418
+ 0.25V, respectively, as shown in Figure 5a. Figure
419
+ ON resistance ratio observed for 40 cycles as ~105. Very few reports on
420
+ nd analog RS memories together.9-11The simultaneous observation of digital and
421
+ analog RS memory makes the CuSCN-based devices more versatile. To gain more insight into
422
+ 13
423
+
424
+ device in cycles between 0V to
425
+ 0V), 0V to ±0.8V and 0V to ±1V. (b) Current-voltage characteristics of
426
+ curves under consecutive five positive
427
+ curves under consecutive five negative
428
+ evolution of current when voltage sweeps with widening range
429
+ positive and negative voltage sweeps.
430
+ The memristive device ITO/CuSCN/Cu can also show digital RS memory after a forming stage
431
+ SET and RESET occur at very low
432
+ Figure 5b shows the OFF-
433
+ on memristive systems
434
+ The simultaneous observation of digital and
435
+ based devices more versatile. To gain more insight into
436
+
437
+ 1E-4.
438
+ (a)
439
+ 1E-5
440
+ 1E-6
441
+ 1E-7-
442
+ 1E-8
443
+ -0.8
444
+ -0.4
445
+ 0.0
446
+ Voltage (V
447
+ 1.0
448
+ Voltage
449
+ Current
450
+ 0.5
451
+ 0.0
452
+ -0.5
453
+ (c)
454
+ -1.0-
455
+ 0
456
+ 100
457
+ 200
458
+ 300
459
+ Time (s)F1E-63... 0.5 V0.8 V-10
460
+ 1F7.-0.4
461
+ 0.8
462
+ -0.8
463
+ -0.4
464
+ 0.0Voltag1E-4A
465
+
466
+ ←100.0
467
+ 00F-50.0
468
+ -0.4-0.8--100.0400
469
+ 500
470
+ 600
471
+ 0
472
+ 100
473
+ 200
474
+ 300Time5210.4
475
+ 0.8e (V)F1000 CurrentF50.0CF-100.0400
476
+ 500
477
+ 600(s)e
478
+ 14
479
+ the RS behavior of CuSCN-based devices, we carried out the electrical characterization of
480
+ ITO/CuSCN/Cu devices with different CuSCN layer thicknesses prepared at 3000 and 5000 rpm
481
+ of spin-coating. The devices prepared at 5000 rpm were found to be mostly short-circuited and
482
+ hence discarded from further investigation. The devices prepared at 3000 rpm don't show any
483
+ analog RS behavior, as shown in supporting information Figure S1a. However, it shows stable
484
+ bipolar digital RS behavior when swept between 0 and ±2V (SI Figure S1b). Compared to the
485
+ devices prepared at 4000 rpm, the SET voltage is higher. The observation of both analog and
486
+ digital RS in devices prepared at 4000 rpm and the absence of analog RS switching in devices
487
+ prepared at 3000 rpm suggests that the thickness of the CuSCN layer is the crucial factor in
488
+ observing the ideal memristive behavior. To ascertain whether the resistive switching
489
+ phenomena is due to the electrochemical metallization (ECM) (by copper ion diffusion from the
490
+ top Cu electrode) or trapping of charge carriers at the interface, we prepared the devices with a
491
+ gold top electrode (ITO/CuSCN/Au). The thickness of the CuSCN layer is maintained the same
492
+ by spin-coating it at 4000 rpm. The device shows both the analog and digital RS memory (SI
493
+ Figure S2a,b), similar to the ITO/CuSCN/Cu device. This suggests that the RS phenomenon is
494
+ due to charge trapping and de-trapping at the interface. For such interfacial RS behavior, high
495
+ electronic conductivity (~ 0.01 S m-1) of the CuSCN layer owing to the hole transport plays a
496
+ pivotal role.42 For materials like MXene (Ti3C2) and 1T-MoS2 nanosheets, the role of electronic
497
+ conductivity (due to electron or hole) in observing RS is already established.10, 39
498
+
499
+
500
+ Figure 4. (a) Plot of resistance ratio
501
+ consecutive positive and negative voltage
502
+ Although we are ruling out the possibility of
503
+ the role of Copper ion (Cu+) diffusion
504
+ voltage range over which the RS is observed in these devices
505
+ electrode). Unlike the case of the copper top electrode
506
+ switching for lower voltage sweep (< 1.0V)
507
+ RESET voltages of digital RS memory in gold
508
+ based devices. So, we believe the RS memory behavior in ITO/CuSCN/Cu device
509
+ carrier trapping and de-trapping modulated by the copper ion diffusion from the top copper
510
+ electrode. Such role of ionic modulation and coupling of ionic and electronic currents in
511
+ governing the resistive switching behavior is already testified
512
+ (a) Plot of resistance ratio for different voltage sweeping cycles, (b) Plot of resistance ratio with
513
+ voltage sweeping.
514
+ Although we are ruling out the possibility of an ECM type of mechanism for RS in CuSCN
515
+ diffusion can't be completely played down if we are looking at the
516
+ voltage range over which the RS is observed in these devices (with Au and Cu as
517
+ case of the copper top electrode, we could not observe the analog
518
+ switching for lower voltage sweep (< 1.0V) with the gold top electrode. Similarly, the SET and
519
+ of digital RS memory in gold-based devices are much higher than in copper
520
+ based devices. So, we believe the RS memory behavior in ITO/CuSCN/Cu device
521
+ trapping modulated by the copper ion diffusion from the top copper
522
+ Such role of ionic modulation and coupling of ionic and electronic currents in
523
+ governing the resistive switching behavior is already testified in other memristive sys
524
+ 15
525
+ , (b) Plot of resistance ratio with
526
+ ECM type of mechanism for RS in CuSCN,
527
+ yed down if we are looking at the
528
+ (with Au and Cu as a top
529
+ , we could not observe the analog
530
+ . Similarly, the SET and
531
+ based devices are much higher than in copper-
532
+ based devices. So, we believe the RS memory behavior in ITO/CuSCN/Cu devices is charge
533
+ trapping modulated by the copper ion diffusion from the top copper
534
+ Such role of ionic modulation and coupling of ionic and electronic currents in
535
+ in other memristive systems.43-45
536
+
537
+
538
+ Figure 5. (a) Bipolar I-V characteristics of
539
+ resistances with switching cycle.
540
+ 3.3 Current conduction mechanism in CuSCN based memristive devices
541
+ To elucidate further the current conduction mechanism in the ITO/CuSCN/Cu devices, the
542
+ analog I-V characteristics for the first positive voltage scan
543
+ as shown in Figure 6a. It is observed that in the low biasing regi
544
+ of the linearly fitted line is nearly one
545
+ charge carriers in the CuSCN layer. The non
546
+ region 0.27 V < V < 0.5 V is plotted as ln(
547
+ is well fitted by the linear relationship
548
+ Schottky emission in the particular voltage region. The slope of the curve in th
549
+ 0.5V < V< 0.8 V is 2.96. It suggests that the current conduction in
550
+ the trap-assisted space-charge
551
+ in the HRS, the current conduction is
552
+ and trap assisted-SCLC. After the
553
+ slope is 1.02 for the entire biasin
554
+ characteristics of ITO/CuSCN/Cu memristive device, (b) Plot of ON and OFF state
555
+ 3.3 Current conduction mechanism in CuSCN based memristive devices
556
+ To elucidate further the current conduction mechanism in the ITO/CuSCN/Cu devices, the
557
+ characteristics for the first positive voltage scan (Figure 3b) is plotted in log
558
+ . It is observed that in the low biasing region, i.e., 0 < V < 0.27 V, the slope
559
+ is nearly one, indicating the Ohmic conduction due to the intrinsic
560
+ CuSCN layer. The non-linear part of the curve of Figure
561
+ 0.5 V is plotted as ln(I) vs √𝑉 as shown in the inset of
562
+ linear relationship, confirming that the current conduction is governed by
563
+ chottky emission in the particular voltage region. The slope of the curve in th
564
+ . It suggests that the current conduction in the higher voltage region is
565
+ charge-limited conduction (SCLC), i.e., I α Vm where m > 2.
566
+ in the HRS, the current conduction is Ohmic initially and then followed by S
567
+ SCLC. After the SET process, when sweeping back to zero from 0.8 V, the
568
+ slope is 1.02 for the entire biasing region, indicating the Ohmic type conduction agai
569
+ 16
570
+
571
+ , (b) Plot of ON and OFF state
572
+ 3.3 Current conduction mechanism in CuSCN based memristive devices
573
+ To elucidate further the current conduction mechanism in the ITO/CuSCN/Cu devices, the
574
+ ) is plotted in log-log scale
575
+ 0 < V < 0.27 V, the slope
576
+ hmic conduction due to the intrinsic
577
+ Figure 6a in the voltage
578
+ the inset of Figure 6a. The curve
579
+ current conduction is governed by
580
+ chottky emission in the particular voltage region. The slope of the curve in the biasing region
581
+ higher voltage region is
582
+ where m > 2.9, 46-48 Thus,
583
+ initially and then followed by Schottky emission
584
+ when sweeping back to zero from 0.8 V, the
585
+ the Ohmic type conduction again in the
586
+
587
+ 1E-5
588
+ (A)
589
+ RESET
590
+ Current
591
+ 1E-7
592
+ 1st
593
+ 1E-9
594
+ 10th
595
+ 20th
596
+ 30th
597
+ 40th
598
+ 1E-1
599
+ -0.50
600
+ -0.25
601
+ 0.00
602
+ Voltage1'ON·ROFFS0.25
603
+ 0.50
604
+ 0
605
+ 10Switc>10°20
606
+ 30
607
+ 40hing cycleSHT
608
+ LRS. In the negative sweeping direction, the current conduction
609
+ Ohmic, Schottky emission, and SCLC while
610
+ Figure 6. (a) log-log plot of the analog
611
+ device. The inset of (a) represents the ln(
612
+ Plot of Schottky barrier height (ɸB
613
+ digital I-V for the first SET process in the
614
+ linear fitting in the voltage region 0.20 V < V < 0.31 V.
615
+ CuSCN is a p-type semiconductor with work function (
616
+ = 4.4 eV) and ITO (ΦITO ~ 4.8 to 5.2 eV
617
+ respectively, at both the interfaces
618
+ the Schottky contacts get modified
619
+ negative sweeping direction, the current conduction follows the same sequence of
620
+ and SCLC while sweeping the bias from 0 V to
621
+ log plot of the analog I-V for the first positive voltage scan of the ITO/CuSCN/Cu memristive
622
+ nset of (a) represents the ln(I) vs √𝑉 plot with linear fitting in the voltage region 0.27 V< V < 0.5 V, (b)
623
+ B) with consecutive positive and negative voltage scan, (c) log
624
+ for the first SET process in the ITO/CuSCN/Cu memristive device, (d) ln (I) vs
625
+ linear fitting in the voltage region 0.20 V < V < 0.31 V.
626
+ type semiconductor with work function (ΦCuSCN ~ 5 eV).4
627
+ ~ 4.8 to 5.2 eV), CuSCN makes Schottky
628
+ at both the interfaces.50-52 So, during positive and negative voltage sweeping cycles,
629
+ the Schottky contacts get modified, influencing the charge flow to and from the device. At the
630
+ 17
631
+ ws the same sequence of
632
+ sweeping the bias from 0 V to – 0.8V.
633
+ ITO/CuSCN/Cu memristive
634
+ plot with linear fitting in the voltage region 0.27 V< V < 0.5 V, (b)
635
+ ) with consecutive positive and negative voltage scan, (c) log-log plot of the
636
+ ) vs √𝑉 plot of Fig. (c) with
637
+ 49 Hence, with Cu (ΦCu
638
+ ), CuSCN makes Schottky and Ohmic contacts,
639
+ positive and negative voltage sweeping cycles,
640
+ the charge flow to and from the device. At the
641
+
642
+ 1E-4
643
+ Positive voltage
644
+ 1E-5
645
+ 3
646
+ 1.01
647
+ 1E-7-
648
+ slope :
649
+ (a)
650
+ 1E-3
651
+ 0.01
652
+ Voltage
653
+ -O-Digital SET
654
+ 1E-51
655
+ slope = 1.0
656
+ Currel
657
+ C
658
+ HR
659
+ 1E-9.
660
+ slope
661
+ 1E-3
662
+ 0.01
663
+ Volta!Schottkvemision0.008e1.0-B0.50 -(h)0.55 0.60 0.65 0.700.58-
664
+ +Bca
665
+ --18.4-DSLNO Pos0.92
666
+ -18.8-0.1
667
+ 0.45Negitivevoltageative voltage11
668
+ T
669
+ 10
670
+ 10ion1T0.50
671
+ 0.55eT0.54 -
672
+ 18
673
+ Cu/CuSCN interface, the Schottky barrier height can be calculated by using the Richardson-
674
+ Schottky equation. The Richardson-Schottky equation of the I-V characteristics is given by
675
+
676
+
677
+
678
+ 𝐼 = 𝐴𝐴∗𝑇�𝑒���������� ����
679
+
680
+ � ��
681
+
682
+
683
+
684
+ (1)
685
+ where, 𝐴 = 𝜋(50 µ𝑚)� = cell contact area, 𝐴∗ =
686
+ �����∗ ��
687
+ ℎ�
688
+ = Richardson constant, T =
689
+ temperature, q = electric charge, 𝜑� = Schottky barrier height, E = electric field, 𝜀� = dielectric
690
+ constant of material and k = Boltzmann constant.9 Taking the natural logarithm of equation (1)
691
+ and replacing E by V/d, where d is the distance between the Cu top and ITO bottom electrode,
692
+ we get
693
+
694
+ 𝑙𝑛(𝐼) = �𝑙𝑛(𝐴𝐴∗𝑇�) −
695
+
696
+ �� 𝜑�� +
697
+
698
+ �� �𝑞 4𝜋𝜀�
699
+
700
+ √𝑉
701
+ (2)
702
+ By taking the value of A* = 119.56 A/K2cm2 (𝑚�∗ = 𝑚�), the Schottky barrier height (𝜑�) is
703
+ calculated from the intercept of 𝑙𝑛(𝐼) vs √𝑉. We find that the Schottky barrier decreases under
704
+ successive positive voltage scans and increases under subsequent repetitive negative voltage
705
+ scans, as shown in Figure 6b. Further, from the slope of 𝑙𝑛(𝐼) vs √𝑉 plot, the ideality factor is
706
+ calculated to be ≈ 10, much greater than the ideality factor of an ideal diode (n =1). The higher
707
+ ideality factor explains the inhomogeneity in the Schottky barrier that arises due to traps or
708
+ interfacial states at the Cu/CuSCN interface.53 Quite a similar conduction mechanism is observed
709
+ for digital RS memory, as shown in Figure 6c. The log-log plot of current-voltage characteristics
710
+ during the SET process shows linear fit in the low voltage region of HRS with slope ⁓ 0.92. In
711
+ the high voltage region, i.e., 0.21 V to 0.39 V, the current conduction mechanism follows
712
+ Schottky emission, as shown in Figure 6d, followed by trap-assisted SCLC. In the LRS, the slope
713
+ is well-fitted by Ohmic conduction.
714
+
715
+
716
+ 19
717
+ Based on the conduction mechanism discussed, the energy band diagram is schematically
718
+ presented in Figure 7a-d. In the ITO/CuSCN/Cu memristive device, the Cu/CuSCN and
719
+ ITO/CuSCN interfaces make Schottky and Ohmic contacts (Figure 7b). When a positive bias is
720
+ applied to the Cu top electrode, band bending occurs, and as a result, Schottky barrier height
721
+ reduces. Hence, the current flow gets easier, and the trap states get filled. This makes the device
722
+ ON. On the other hand, in the reverse polarity of the bias, the Schottky barrier height increases at
723
+ the Cu/CuSCN interface, and the current flow reduces. The filled trap states release the charge
724
+ carriers at the Ohmic contact made at the ITO/CuSCN interface. Hence, charge trapping and de-
725
+ trapping at the interfacial states is the main reason behind analog RS behavior in ITO/CuSCN/Cu
726
+ memristive devices. The electrochemical oxidation of the Cu electrode and influx of Cu+ ions
727
+ into the CuSCN medium during the forward biasing conditions can also strongly influence the
728
+ switching mechanism. Particularly in the digital RS memory, the ON state is due to the
729
+ conductive filament formed as a result of both filled trap states and the reduction of Cu+ ions to
730
+ metallic copper-dendrites grown at the ITO/CuSCN interface. The conductive filament may not
731
+ be entirely due to charge trapping or the copper dendrites connecting both interfaces. Instead, it
732
+ can be the result of both phenomena. A percolative conductive path may be formed between
733
+ filled interfacial trap states with patches of copper-dendrites in the CuSCN layer. Hence, the off
734
+ state may be attained by partial dissolution of the conductive filament due to the offloading of
735
+ charge carriers from the trap-states and oxidation of copper-dendrites.
736
+
737
+
738
+
739
+ Figure 7. (a) Energy band diagram of the
740
+ during the transition from OFF state to ON state (SET process), and (d) ON state to OFF state (RESET process).
741
+ 3.4 Current-voltage characteristics in ITO/Cu
742
+ Cu-SPE is the electrolyte medium containing CuSCN in the ionized form as Cu
743
+ embedded in the PEO matrix,
744
+ spectroscopic characterization of the Cu
745
+ information (Figure S3), confirming the dissolution of CuSCN in the PEO.
746
+ CuSCN concentration in Cu-
747
+ (a) Energy band diagram of the ITO/CuSCN/Cu memristive device before contact, (b) after contact, (c)
748
+ OFF state to ON state (SET process), and (d) ON state to OFF state (RESET process).
749
+ voltage characteristics in ITO/Cu-SPE/Cu memristive device
750
+ SPE is the electrolyte medium containing CuSCN in the ionized form as Cu
751
+ as shown in the schematic diagram in Figure 8
752
+ spectroscopic characterization of the Cu-SPE film is already presented in the supporting
753
+ confirming the dissolution of CuSCN in the PEO.
754
+ -SPE for better RS characteristics, the ITO/Cu
755
+ 20
756
+
757
+ before contact, (b) after contact, (c)
758
+ OFF state to ON state (SET process), and (d) ON state to OFF state (RESET process).
759
+ SPE/Cu memristive device
760
+ SPE is the electrolyte medium containing CuSCN in the ionized form as Cu+ and SCN– ions
761
+ Figure 8a. The structural and
762
+ SPE film is already presented in the supporting
763
+ confirming the dissolution of CuSCN in the PEO. To optimize the
764
+ ITO/Cu-SPE/Cu cells were
765
+
766
+ Before contac
767
+ (a)
768
+ Vacuum
769
+ CBM, -1.8 e
770
+ dcu
771
+ -4.4eV
772
+ Cu
773
+ ΦcuscN= -5 el
774
+ Er,CusCN
775
+ VBM.-5.4 6 -4.8e(c)
776
+ 0
777
+ 0
778
+ Cu
779
+ 0
780
+ +VElectronHole+
781
+ Aftar *tuCu(b]EuTO
782
+ prepared with Cu-SPE containing
783
+ characteristic of ITO/Cu-SPE/Cu cells
784
+ 5.0%) are shown in the SI Figure
785
+ one with 5 wt.% of CuSCN. However, the RS behavior is
786
+ for 0.25 and 0.5 wt.%. Whereas above
787
+ positive and negative biases with increasing concentration
788
+ ionic moieties (Cu+ and SCN
789
+ Hence, the depolarizing field created due to the space
790
+ dominating in Cu-SPE film containing higher
791
+ RESET voltages increase in ITO/Cu
792
+ 5wt.%, the device could not be SET even
793
+ commonly observed in polymer electrolyte
794
+ characterization of ITO/Cu-SPE/Cu devices, we fixed the CuSCN concentration in Cu
795
+ 1.0 wt.%, which shows very stable and repetitive bipolar digital RS behavior
796
+ Figure 8. (a) Schematic diagram of the
797
+ ITO/Cu-SPE/Cu memristive device
798
+ SPE containing x wt.% of CuSCN where x = 0.25, 0.5, 1, 2, 3
799
+ SPE/Cu cells containing varying CuSCN concentration
800
+ Figure S6. All the devices show bipolar digital RS behavior except the
801
+ one with 5 wt.% of CuSCN. However, the RS behavior is unstable and not
802
+ for 0.25 and 0.5 wt.%. Whereas above 1 wt.%, the SET, and RESET processes occur at higher
803
+ with increasing concentrations of CuSCN. The concentration of the
804
+ and SCN–) increase along with CuSCN concentration in the Cu
805
+ field created due to the space-charge polarization
806
+ SPE film containing higher concentrations of CuSCN. Due to this, SET and
807
+ ITO/Cu-SPE/Cu devices with higher CuSCN concentration
808
+ 5wt.%, the device could not be SET even if the applied bias is increased up to 10.0V. This is
809
+ commonly observed in polymer electrolyte-based ECM-type memristive devices.
810
+ SPE/Cu devices, we fixed the CuSCN concentration in Cu
811
+ which shows very stable and repetitive bipolar digital RS behavior
812
+ (a) Schematic diagram of the ITO/Cu-SPE/Cu memristive device, (b) Bipolar
813
+ SPE/Cu memristive device for 1 wt% CuSCN.
814
+ 21
815
+ = 0.25, 0.5, 1, 2, 3, and 5. The I-V
816
+ CuSCN concentrations (0.25% to
817
+ All the devices show bipolar digital RS behavior except the
818
+ not repeatedly observed
819
+ and RESET processes occur at higher
820
+ The concentration of the
821
+ uSCN concentration in the Cu-SPE film.
822
+ charge polarization becomes more
823
+ of CuSCN. Due to this, SET and
824
+ CuSCN concentration, and at
825
+ the applied bias is increased up to 10.0V. This is
826
+ type memristive devices.54 For further
827
+ SPE/Cu devices, we fixed the CuSCN concentration in Cu-SPE as
828
+ which shows very stable and repetitive bipolar digital RS behavior.
829
+
830
+ device, (b) Bipolar I-V characteristics of the
831
+
832
+ (a)
833
+ Cu
834
+ SPE
835
+ ITO
836
+ PET二-1E-7.-2
837
+ Wolt.fh1E-31st6041RESET
838
+ Figure 8b represents the I-V
839
+ film with 1 wt% of CuSCN for 60 consecutive voltage sweep cycles. In the first sweep cycle, the
840
+ device was SET at a higher voltage of 1.24V, called th
841
+ In the second sweep cycle, the device
842
+ shows digital RS memory with no significant
843
+ to cycle.
844
+ Figure 9. (a) Distribution of the SET and RESET voltage of
845
+ shows the ON and OFF state resistances with switching cycles
846
+ read voltage (c) Multi-level resistive switching observed in the ITO/Cu
847
+ concentration of 1 wt% (d) Current-
848
+ V characteristics of ITO/Cu-SPE/Cu devices containing
849
+ 1 wt% of CuSCN for 60 consecutive voltage sweep cycles. In the first sweep cycle, the
850
+ voltage of 1.24V, called the forming process, and RESET at
851
+ In the second sweep cycle, the device was SET at 0.96V and RESET at
852
+ with no significant variation of SET and RESET voltages from cycle
853
+ (a) Distribution of the SET and RESET voltage of ITO/Cu-SPE/Cu memristive device
854
+ resistances with switching cycles (b) Retention test of the ON and OFF states at 30 mV
855
+ level resistive switching observed in the ITO/Cu-SPE/Cu memristive device with CuSCN
856
+ -voltage characteristics of the device up to 15 days.
857
+ 22
858
+ SPE/Cu devices containing the Cu-SPE
859
+ 1 wt% of CuSCN for 60 consecutive voltage sweep cycles. In the first sweep cycle, the
860
+ and RESET at –1.16V.
861
+ was SET at 0.96V and RESET at – 0.86V. The I-V plot
862
+ variation of SET and RESET voltages from cycle
863
+
864
+ SPE/Cu memristive device. The inset of (a)
865
+ Retention test of the ON and OFF states at 30 mV
866
+ SPE/Cu memristive device with CuSCN
867
+
868
+ 60
869
+ 50
870
+ Cycles
871
+ 1010
872
+ 40
873
+ 108
874
+ 30
875
+ R
876
+ ON
877
+ >1
878
+ 20
879
+ OFF
880
+ 10°
881
+ 10
882
+ 0
883
+ 10 20 30
884
+ 0
885
+ (a)
886
+ Switchir
887
+ -1.0
888
+ -0.5
889
+ 0.0
890
+ Voltage
891
+ 1E-31
892
+ -CC=1mA
893
+ -CC=0.1mA
894
+ 1E-5
895
+ -CC= 0.01 mA
896
+ A
897
+ Current
898
+ 1E-7
899
+ 1E-9.
900
+ (c)
901
+ 1E-11
902
+ -2
903
+ -1
904
+ 0
905
+ VoltageE
906
+ Read @ 30 my5E+
907
+ Du05
908
+ 10Tir1E-4-CC=0.1mARESET1E-610.1mA-1mA2
909
+ -2
910
+ -11E-4FV oltHRSTDC100
911
+ 1000
912
+ 10000ne (s)0Day-0-Dav 150
913
+ 1
914
+ 201E-6F
915
+ 23
916
+ Further, Figure 9a represents the SET and RESET voltages distribution of ITO/Cu-SPE/Cu
917
+ cells during 60 consecutive voltage sweep cycles. The average SET and RESET voltages are
918
+ 0.80 V and –0.78 V. The ITO/Cu-SPE/Cu cells exhibit good cyclic behavior, as shown in the
919
+ inset of Figure 9a. The ON and OFF states are reproducibly achieved for the SET and RESET
920
+ cycles. The OFF-ON state resistance ratio is more than 105, maintained throughout all the
921
+ measuring cycles. Also, retention characteristic was measured in each particular state under
922
+ continuous 30 mV read voltage, as shown in Figure 9b. Both ON and OFF states are stable up to
923
+ the measured time duration, i.e., 104 sec. The Cu-SPE based cells also show multi-level bipolar
924
+ resistance switching, as presented in Figure 9c. Three resistance states were achieved by keeping the
925
+ compliance at 0.01 mA, 0.1 mA, and 1.0 mA. As the compliance current increases from 0.01 mA to 1
926
+ mA, the SET and RESET voltage increase. The ON state resistances are in the order of 10 kΩ, 2 kΩ, and
927
+ 500 Ω for 0.01 mA, 0.1 mA, and 1.0 mA compliance, respectively. This shows that with increasing
928
+ compliance current, the ON-state resistance decreases steadily. The I-V measurements of the device
929
+ for up to 15 days with an interval of 7 days are shown in Figure 9d. The device showed reliable
930
+ and reproducible resistive switching behavior over the period without any deterioration of the
931
+ switching characteristics as an effect of storing or aging.
932
+ 3.5 Current conduction mechanism in Cu-SPE based memristive devices
933
+ Further, to understand the role of the top Cu electrode and its electrochemical effect on the
934
+ switching mechanism, a memristive device was prepared with Au inert electrode by replacing the
935
+ copper. In the ITO/Cu-SPE/Au memristive device, no switching is observed up to the applied
936
+ bias of ±5 V, as shown in SI Figure S7. The current remains very low (~ 1.23 µA) even at 5V.
937
+ This suggests that the Cu top electrode has a definite role in the resistive switching behavior of
938
+ ITO/Cu-SPE/Cu memristive devices. To investigate the switching mechanism in Cu-SPE, the I-V
939
+
940
+
941
+ characteristic of one switching cycle was plotted in a log
942
+ the SET process. The current conduction mechanism in the bias region 0.1V < V < 0.78V is
943
+ observed to be linear with a slope of 1.46
944
+ for ion-hopping as given in equation (3).
945
+ 𝐼 = 2𝑧𝑒𝑐𝑎𝑣
946
+ where, c is the concentration of mobile cations,
947
+ frequency factor. For low electric fields
948
+ equation (4) with linear dependence of
949
+ 𝐼 =
950
+ This linear behavior infers that
951
+ medium to form copper filaments on applying a positive bias to Cu top electrode.
952
+ In the LRS, the slope is found to be 1, which means that the current conduction mechanism
953
+ was dominated by Ohmic conduction as
954
+ Figure 10. Linear fitting of the I-V
955
+ concentration of 1 wt% in ITO/Cu-SPE/Cu device
956
+ characteristic of one switching cycle was plotted in a log-log scale, as shown in
957
+ the SET process. The current conduction mechanism in the bias region 0.1V < V < 0.78V is
958
+ a slope of 1.46. This can be understood using Mott
959
+ hopping as given in equation (3). The Mott-Gurney equation is given by
960
+ 𝑧𝑒𝑐𝑎𝑣 𝑒𝑥𝑝 �
961
+ ���
962
+ ��� 𝑠𝑖𝑛ℎ �
963
+ ����
964
+ ��� �
965
+ is the concentration of mobile cations, a is the jump distance of ions
966
+ For low electric fields �𝐸 <
967
+ ��
968
+ ����, the equation (3) can be modified as shown in
969
+ with linear dependence of I on E similar to Ohmic conduction.
970
+ =
971
+ (��)���
972
+ ��
973
+ 𝑎�𝑣 𝑒𝑥𝑝 �
974
+ ���
975
+ ���
976
+ This linear behavior infers that the Cu+ ions drifted toward the ITO electrode in the electrolyte
977
+ filaments on applying a positive bias to Cu top electrode.
978
+ In the LRS, the slope is found to be 1, which means that the current conduction mechanism
979
+ was dominated by Ohmic conduction as copper filaments are formed in the
980
+ V curve for the (a) SET and (b) RESET process using log
981
+ SPE/Cu device.
982
+ 24
983
+ as shown in Figure 10a for
984
+ the SET process. The current conduction mechanism in the bias region 0.1V < V < 0.78V is
985
+ ng Mott-Gurney equation
986
+ s given by55
987
+ (3)
988
+ is the jump distance of ions, and v is the
989
+ can be modified as shown in
990
+ similar to Ohmic conduction.
991
+ (4)
992
+ ions drifted toward the ITO electrode in the electrolyte
993
+ filaments on applying a positive bias to Cu top electrode.
994
+ In the LRS, the slope is found to be 1, which means that the current conduction mechanism
995
+ in the Cu-SPE film
996
+
997
+ curve for the (a) SET and (b) RESET process using log-log plot for CuSCN
998
+
999
+
1000
+ 25
1001
+ between Cu and ITO electrodes. During the RESET process in the LRS, from 0 to RESET
1002
+ voltage (– 0.84V), the slope is 1 indicating the Ohmic type conduction. In the HRS from – 0.84V
1003
+ < V < – 0.16V, the current conduction mechanism follows space charge limited current (SCLC)
1004
+ with a slope of 2.54.45 This could be due to the emergence of space charge in the electrolyte
1005
+ medium immediately after the breakdown of the filament. As the voltage decreases further, the
1006
+ current follows linearly with the voltage due to the ion-hopping in the electrolyte medium, as
1007
+ explained by equation (4). These studies confirm the switching mechanism to be ECM or
1008
+ conductive-bridge random access memory (CBRAM) type, as observed in other polymer-
1009
+ electrolyte systems with electrochemically active electrodes.56,57 The formation and dissolution
1010
+ of copper filament are responsible for the ON and OFF states, and are controlled by the
1011
+ electrochemical redox reaction at the interfaces.
1012
+ Moreover, no analog RS is observed in these ECM-type memory devices based on Cu-SPE
1013
+ film. In fact, analog RS is less often observed in ECM-type memory devices and more rarely so
1014
+ in polymer-electrolyte based ECM devices.41,58 If the switching layer is electronically insulator,
1015
+ sharp SET and RESET process occurs, leading to digital RS. But when the switching layer is
1016
+ semiconducting (due to electron or hole conduction) along with allowing ion transport, the
1017
+ chances of analog RS arises.59
1018
+ 4. CONCLUSIONS
1019
+ In conclusion, we prepared and studied two types of memristive devices based on CuSCN. The
1020
+ switching media in these two devices are CuSCN and an SPE where CuSCN remains dissolved
1021
+ in the PEO matrix (Cu-SPE). While the CuSCN is known to be a p-type semiconductor, the Cu-
1022
+ SPE is an ionic conductor and electronically insulator. The first device consisted of a solution-
1023
+ processed CuSCN layer as the switching medium. The RS behavior is strongly dependent on the
1024
+
1025
+
1026
+ 26
1027
+ thickness of the CuSCN layer. Devices with thinner CuSCN layer (prepared at 4000 rpm during
1028
+ spin-coating) show both analog and digital RS memory. The switching mechanism is due to the
1029
+ trapping and de-trapping of charge carriers at the trap or interfacial states modulated by the
1030
+ Schottky emission. The copper-ion diffusion from the top Copper electrode also influences the
1031
+ RS characteristics. The second device, made up of the Cu-SPE layer, shows only digital RS
1032
+ memory. The devices offer good cyclability and retention of ON and OFF states. Multi-level RS
1033
+ switching is also possible, as demonstrated by achieving discrete low resistance states (LRSs) by
1034
+ enforcing different current compliances. However, analog RS is not observed in Cu-SPE-based
1035
+ devices. The switching mechanism in the Cu-SPE based devices is ECM type, where the
1036
+ formation and dissolution of copper filament are responsible for resistive switching behavior.
1037
+ Nevertheless, CuSCN and its electrolytic system show versatile and contrasting RS memory
1038
+ characteristics. Hence, they have immense potential for developing low-cost solution-
1039
+ processable nanoelectronics for digital non-volatile memory and neuromorphic computing
1040
+ applications.
1041
+
1042
+ ACKNOWLEDGMENTS
1043
+ The authors gratefully acknowledge the fund received from the Department of Science and Technology,
1044
+ Government of India, through the DST-FIST project (SR/FST/PSI-212/2016(C)). The authors also
1045
+ sincerely thank the help received from MRC, MNIT Jaipur in RAMAN and AFM measurements.
1046
+ REFERENCES
1047
+ (1) Seok, J. Y.; Song, S. J.; Yoon, J. H.; Yoon, K. J.; Park, T. H.; Kwon, D. E.; Lim, H.; Kim, G.
1048
+ H.; Jeong, D. S.; Hwang, C. S. A Review of Three Dimensional Resistive Switching Cross‐Bar Array
1049
+ Memories from the Integration and Materials Property Points of View. Adv. Funct. Mater. 2014, 24,
1050
+ 5316–5339.
1051
+ (2) Ielmini, D.; Resistive switching memories based on metal oxides: mechanisms, reliability and
1052
+ scaling. Semicond. Sci. Technol. 2016, 31, 063002.
1053
+
1054
+
1055
+ 27
1056
+ (3)Wright, C. D.; Hosseini, P.; Diosdado, J. A. V. Beyond von-Neumann Computing with Nanoscale
1057
+ Phase-Change Memory Devices. Adv. Funct. Mater. 2013, 23, 2248–2254.
1058
+ (4) Kang, K.; Hu, W.; Tang, X. Halide Perovskites for Resistive Switching Memory, J. Phys. Chem.
1059
+ Lett. 2021, 12, 48, 11673–11682.
1060
+ (5) Zhang, W.; Gao, B.; Tang, J.; Li, X.; Wu,W.; Qian, H.; Wu, H. Analog-Type Resistive Switching
1061
+ Devices for Neuromorphic Computing. Phys. Status Solidi RRL 2019, 13, 1900204.
1062
+ (6) Sebastian, A.; Gallo, M. L.; Aljameh, R. K.; Eleftheriou, E. Memory devices and applications for in-
1063
+ memory computing. Nat. Nanotechnol. 2020, 15, 529–544.
1064
+ (7) Zanotti, T.; Puglisi, F. M.; Pavan, P. Smart Logic-in-Memory Architecture for Low-Power Non-Von
1065
+ Neumann Computing, IEEE J. Electron Dev. Soc. 2020, 8, 757–764.
1066
+ (8) Li, B.; Wei, W.; Luo, L.; Gao, M.; Yu, Z. G.; Li, S.; Ang, K. W.; Zhu, C. Nonvolatile Logic-in-
1067
+ Memory Computing based on Solution-Processed CuI Memristor. Adv. Electron Mater.2022, 2200089.
1068
+ (9) Li, Y.; Chu, J.; Duan, W.; Cai, G.; Fan, X.; Wang, X.; Wang, G.; Pei, Y. Analog and Digital Bipolar
1069
+ Resistive Switching in Solution-Combustion-Processed NiO Memristor. ACS Appl. Mater. Interfaces
1070
+ 2018, 10, 24598−24606.
1071
+ (10) Zhang, X.; Chen, H.; Cheng, S.; Guo, F.; Jie, W.; Hao, J. Tunable Resistive Switching in 2D
1072
+ MXene Ti3C2 Nanosheets for Non-Volatile Memory and Neuromorphic Computing. ACS Appl. Mater.
1073
+ Interfaces 2022, 14, 39, 44614–44621.
1074
+ (11) Mao, S.; Sun, B.; Zhou, G.; Yang, Y.; Zhao, H.; Zhou, Y.; Chen, Y.; Zhao,Y. Analog-to-digital
1075
+ and self-rectifying resistive switching behavior based on flower-like δ-MnO2. Appl. Surf. Sci. 2022, 595,
1076
+ 153560.
1077
+ (12) Vahl, A.; Carstensen, J.; Kaps, S.; Lupan, O.; Strunskus, T.; Adelung, R.; Faupel, F. Concept and
1078
+ modelling of memsensors as two terminal devices with enhanced capabilities in neuromorphic
1079
+ engineering. Sci. Rep. 2019, 9, 4361.
1080
+ (13) Lee, D.; Yun, M. J.; Kim, K. H.; kim, S.; Kim, H. D. Advanced Recovery and High-Sensitive
1081
+ Properties of Memristor-Based Gas Sensor Devices Operated at Room Temperature. ACS Sens. 2021, 6,
1082
+ 11, 4217–4224.
1083
+ (14) Kim, B. Y.; Lee, W. H.; Hwang, H. G.; Kim, D. H.; Kim, J. H.; Lee, S. H.; Nahm, S. Resistive
1084
+ Switching Memory Integrated with Nanogenerator for Self-Powered Bioimplantable Devices. Adv. Funct.
1085
+ Mater. 2016, 26, 5211-5221.
1086
+ (15) Jo, S.; Cho, S.; Yang, U. J.; Hwang, G. S.; Baek, S.; Kim, S. H.; Heo, S. H.; Kim, J. Y.; Choi, M.
1087
+ K.; Son, J. S. Solution-Processed Stretchable Ag2S Semiconductor Thin Films for Wearable Self-Powered
1088
+ Nonvolatile Memory. Adv. Mater. 2021, 33, 2100066.
1089
+ (16) Lee, T. H.; Hwang, H. G.; Jang, S.; Wang, G.; Han, S.; Kim, D. H.; Kang, C. Y.; Nahm, S. Low-
1090
+ Temperature-Grown KNbO3 Thin Films and Their Application to Piezoelectric Nanogenerators and Self-
1091
+ Powered ReRAM Device. ACS Appl. Mater. Interfaces 2017, 9, 49, 43220–43229.
1092
+ (17) Chen, Y.; Wei, H.; Wu, Y.; Yang, T.; Cao, B. Photovoltaic memristors based on photoelectric synaptic
1093
+ plasticity of a bulk photovoltaic effect device. J. Mater. Chem. C 2022, 10, 17386-17397.
1094
+ (18) Arora, N.; Dar, M.I.; Hinderhofer, A.; Pellet, N.; Schreiber, F.; Zakeeruddin, S.M.; Grätzel, M.
1095
+ Perovskite solar cells with CuSCN hole extraction layers yield stabilized efficiencies greater than 20%.
1096
+ Science 2017, 358, 768-771.
1097
+ (19) Luo, W.; Zeng, C.; Du, X.; Leng, C.; Yao, W.; Shi, H.; Wei, X.; Dub, C.; Lu, S. Copper
1098
+ thiocyanate/copper iodide based hole transport composites with balanced properties for efficient polymer
1099
+ light-emitting diodes. J. Mater. Chem. C 2018, 6, 4895-4902.
1100
+
1101
+
1102
+ 28
1103
+ (20) Liang, J. W.; Firdaus, Y.; Kang, C. H.; Min, J. W.; Min, J. H.; Ibrahim, R. H. A.; Wehbe, N.;
1104
+ Hedhili, M. N.; Kaltsas, D.; Tsetseris, L.; Lopatin, S.; Zheng, S.; Ng, T. K.; Anthopoulos, T. D.; Ooi, B.
1105
+ S. Chlorine-Infused Wide-Band Gap p-CuSCN/n-GaN Heterojunction Ultraviolet-Light Photodetectors.
1106
+ ACS Appl. Mater. Interfaces 2022, 14, 15, 17889-17898.
1107
+ (21) Petti, L.; Pattanasattayavong, P.; Lin, Y. H.; Münzenrieder, N.; Cantarella, G.; Gross, N. Y.; Yan,
1108
+ F.; Tröster, G.; Anthopoulos, T. D. Solution-processed p-type copper(I) thiocyanate (CuSCN) for low-
1109
+ voltage flexible thin-film transistors and integrated inverter circuits. Appl. Phys. Lett. 2017, 110, 113504.
1110
+ (22) Georgiadou, D. G.; Wijeyasinghe, N.; Solomeshch, O.; Tessler, N.; Anthopoulos, T. D.
1111
+ Radiofrequency Schottky Diodes Based on p-Doped Copper(I) Thiocyanate (CuSCN), ACS Appl. Mater.
1112
+ Interfaces 2022, 14, 26, 29993-29999.
1113
+ (23) Singh, N.; Anjum, D.; Das, G.; Qattan, I.; Patole, S.; Sajjad, M. Phonon Dynamics and Transport
1114
+ Properties of Copper Thiocyanate and Copper Selenocyanate Pseudohalides, ACS Omega 2020, 5, 44,
1115
+ 28637-28642.
1116
+ (24) Wang, B.; Nam, S.; Limbu, S.; Kim, J. S.; Riede, M.; Bradley, D. D. C. Properties and Applications
1117
+ of Copper(I) Thiocyanate Hole-Transport Interlayers Processed from Different Solvents. Adv. Electron.
1118
+ Mater. 2022, 8, 2101253.
1119
+ (25) Dong, Y. W.; Ji, X.; Xu, W.; Tang, J. Q.; Guo, P. Resistive Switching and Memory Effect Based on
1120
+ CuSCN Complex Layer Created Through Interface Reactions. Electrochem. Solid-State Lett. 2009, 12,
1121
+ H54-H57.
1122
+ (26) Ji, X.; Dong, Y. W.; Huo, Z. Q.; Xu, W. Resistive Switching Memory Based on CuSCN Films
1123
+ Fabricated by Solution-Dipping Method. Electrochem. Solid-State Lett. 2009, 12, H344-H347.
1124
+ (27) Cheng, B.; Zhao, J.; Xiao, L.; Cai, Q.; Guo, R.; Xiao, Y.; Lei, S. PMMA interlayer-modulated
1125
+ memory effects by space charge polarization in resistive switching based on CuSCN-nanopyramids/ZnO-
1126
+ nanorods p-n heterojunction. Sci. Rep. 2015, 5, 17859.
1127
+ (28) Chen, W.; Zhao, J.; Liu, B.; Cheng, B.; Xiao, Y.; Lei, S. Back-to-back Interface diodes induced
1128
+ symmetrical negative differential resistance and reversible bipolar resistive switching in β-CuSCN
1129
+ trigonal pyramid micro/nanoarray. Appl. Surf. Sci. 2019, 480, 13–25.
1130
+ (29) Rietman, E. A. Conduction properties of silver and copper pseudohalides. J. Mater. Sci. Lett. 1985,
1131
+ 4, 542–544.
1132
+ (30) Ohno, H.; Ito, K. Relation between unusual solubility of salts in poly(ethylene oxide) oligomers and
1133
+ complex formation. Polymer 1993, 34, 4171 -4172.
1134
+ (31) Vignarooban, K.; Dissanayake, M. A. K. L. ; Albinsson, I.; Mellander, B. E. Ionic conductivity
1135
+ enhancement in PEO:CuSCN solid polymer electrolyte by the incorporation of nickel-chloride. Solid
1136
+ State Ion. 2015, 278, 177-180.
1137
+ (32) Sidhu, K. S.; Sekhon, S. S.; Hashmi, S. A.; Chandra, S. Studies on poly(ethylene oxide)-CuSCN
1138
+ polymer electrolytes. Eur. Polym. J. 1993, 29, 779-782.
1139
+ (33) Er, U.; Icli, K. C.; Ozenbas, M. Spin-coated copper(I) thiocyanate as a hole transport layer for
1140
+ perovskite solar cells. J. Solid State Electrochem. 2020, 24, 293–304.
1141
+ (34) Ji, Y.; Lee, S.; Lee, H. J.; Choi, K. S.; Jeon, C.; Lee, K. H.; Hong, K.; Solution processed vertical p-
1142
+ channel thin film transistors using copper (I) thiocyanate. J. Mater. Chem. C 2020, 8, 5587-5593.
1143
+ (35) Worakajit, P.; Kidkhunthod, P.; Waiprasoet, S.; Nakajima, H.; Sudyoadsuk, T.; Promarak,
1144
+ V.; Pattanasattayavong, P. Origin of Hole-Trapping States in Solution-Processed Copper(I) Thiocyanate
1145
+ (CuSCN) and Defect-Healing by I2 Doping. https://doi.org/10.48550/arXiv.2206.08040
1146
+
1147
+
1148
+ 29
1149
+ (36) Li, X.; Zhou, D., Hao, H.; Chen, H.; Weng, Y.; Bian, H. Vibrational Relaxation Dynamics of a
1150
+ Semiconductor Copper(I) Thiocyanate (CuSCN) Film as a Hole-Transporting Layer, J. Phys. Chem.
1151
+ Lett. 2020, 11, 2, 548–555.
1152
+ (37) Wang, J.; Gao, Q.; Gao, Y.; Luo, Y.; Guo, J.; Sun, Q.; Liang, E. Uniaxial negative thermal
1153
+ expansion behavior of β-CuSCN. Appl. Phys. Lett. 2021, 118, 222105.
1154
+ (38) Serkov, A. A.; Snelling, H. V.; Heusing, S.; Amaral, T. M. Laser sintering of gravure printed
1155
+ indium tin oxide films on polyethylene terephthalate for flexible electronics, Sci. Rep. 2019, 9, 1773.
1156
+ (39) Cheng, P.; Sun, K.; Hu, Y. H. Memristive Behavior and Ideal Memristor of 1T Phase MoS2
1157
+ Nanosheets. Nano Lett. 2016, 16, 572−576.
1158
+ (40) Parveen, S.; Manamel, L. T.; Mukherjee, A.; Sagar, S.; Das, B. C. Analog Memristor of Lead-Free
1159
+ Cs4CuSb2Cl12 Layered Double Perovskite Nanocrystals as Solid-State Electronic Synapse for
1160
+ Neuromorphic Computing. Adv. Mater. Interfaces 2022, 9, 2200562.
1161
+ (41) Chen, W.; Fang, R.; Balaban, M. B.; Yu, W.; Velo, Y. G.; Barnaby, H. J.; Kozicki, M. N. A
1162
+ CMOS-compatible electronic synapse device based on Cu/SiO2/W programmable metallization
1163
+ cells. Nanotechnology 2016, 27, 255202.
1164
+ (42) Premalal, E. V. A.; Dematage, N.; Kumara, G. R. R. A.; Rajapakse, R. M. G.; Shimomura, M.;
1165
+ Murakami, K.; Konno, A. Preparation of structurally modified, conductivity enhanced-p-CuSCN and its
1166
+ application in dye-sensitized solid-state solar cells. J. Power Sources 2012, 203, 288–296.
1167
+ (43) Cui, Y.; Peng, H.; Wu, S.; Wang, R.; Wu, T. Complementary Charge Trapping and Ionic
1168
+ Migration in Resistive Switching of Rare-Earth Manganite TbMnO3. ACS Appl. Mater. Interfaces 2013,
1169
+ 5, 1213−1217.
1170
+ (44) Zhu, X.; Li, D.; Liang , X.; Lu, W. D. Ionic modulation and ionic coupling effects in MoS2
1171
+ devices for neuromorphic computing. Nature Materials 2019, 18, 141–148.
1172
+ (45) Harikesh, P. C.; Surendran, A.; Ghosh, B.; John, R. A.; Moorthy, A.; Yantara, N.; Salim, T.;
1173
+ Thirumal, K.; Leong, W. L.; Mhaisalkar, S.; Mathews, N. Cubic NaSbS2 as an Ionic–Electronic Coupled
1174
+ Semiconductor for Switchable Photovoltaic and Neuromorphic Device Applications. Adv. Mater. 2020,
1175
+ 1906976.
1176
+ (46) Deb, R.; Pathak, P.; Mohapatra, S. R.; Das, U. Polarity independent resistive switching in MoS2
1177
+ nanosheets and PEO-based nanocomposite films. Japanese Journal of Applied Physics 2022, 61,
1178
+ SM1004.
1179
+ (47) Abbas , Y.; Jeon, Y. R. ; Sokolov, A. S.; Kim, S.; Ku, B.; Choi, C. Compliance-Free, Digital SET
1180
+ and Analog RESET Synaptic Characteristics of Sub-Tantalum Oxide Based Neuromorphic Device.
1181
+ Scientific REPORTS 2018, 8, 1228 (1-10).
1182
+ (48) Syu, Y. E.; Chang, T. C. ; Tsai, T. M.; Chang, G. W.; Chang, K. C.; Lou, J. H.; Tai, Y. H.; Tsai, M.
1183
+ J.; Wang, Y. L.; and Sze, S. M. Asymmetric Carrier Conduction Mechanism by Tip Electric Field in
1184
+ WSiOX Resistance Switching Device. IEEE ELECTRON DEVICE LETTERS 2012, 33, 3, 342-344.
1185
+ (49) Baviskar, P. K.; Rondiya, S. R.; Patil, G. P.; Sankapal, B. R.; Pathan, H. M.; Chavan, P. G. Dzade,
1186
+ N. Y. ZnO/CuSCN Nano-Heterostructure as a Highly Efficient Field Emitter: a Combined Experimental
1187
+ and Theoretical Investigation. ACS Omega 2020, 5, 6715−6724.
1188
+ (50) Giovannetti, G.; Khomyakov, P. A.; Brocks, G.; Karpan, V. M.; Brink, J. V. D.; Kelly, P. J.
1189
+ Doping Graphene with Metal Contacts. Phys. Rev. Lett. 2008, 101, 026803.
1190
+ (51) Tsai, C. T.; Gottam, S. R.; Kao, P. C.; Perng, D. C.; Chu, S. Y. Improvement of OLED
1191
+ performances by applying annealing and surface treatment on electrodeposited CuSCN hole injection
1192
+ layer. Synthetic Metals 2020, 269, 116537.
1193
+
1194
+
1195
+ 30
1196
+ (52) Rittich, J.; Jung, S.; Siekmann, J.; Wuttig, M. Indium-Tin-Oxide (ITO) Work Function Tailoring
1197
+ by Covalently Bound Carboxylic Acid Self-Assembled Monolayers. Phys. Status Solidi B 2018, 1800075.
1198
+ (53) Georgiadou, D. G.; Wijeyasinghe, N.; Solomeshch, O.; Tessler, N.; and Anthopoulos, T. D.
1199
+ Radiofrequency Schottky Diodes Based on p-Doped Copper (I) Thiocyanate (CuSCN) ACS Appl. Mater.
1200
+ Interfaces 2022, 14, 29993-29999.
1201
+ (54) Wu , S.; Tsuruoka, T.; Terabe, K.; Hasegawa, T.; Hill, J. P.; Ariga, K.; Aono, M. A
1202
+ Polymer-Electrolyte-Based Atomic Switch. Adv. Funct. Mater. 2011, 21, 93–99.
1203
+ (55) Waser, R.; Dittmann, R.; Staikov, G.; Szot, K. Redox-Based Resistive Switching Memories –
1204
+ Nanoionic Mechanisms, Prospects, and Challenges. Adv. Mater. 2009, 21, 2632–2663.
1205
+ (56) Mohapatra, S. R.; Tsuruoka, T.; Krishnan, K.; Hasegawa, T.; Aono, M. Effects of temperature and
1206
+ ambient pressure on the resistive switching behaviour of polymer-based atomic switches J. Mater. Chem.
1207
+ C 2015, 3, 5715-5720.
1208
+ (57) Wang, Z.; Xiao, W.; Yang, H.; Zhang, S.; Zhang, Y.; Sun, K.; Wang, T.; Fu, Y.; Wang, Q.;
1209
+ Zhang, J.; Hasegawa, T.; He, D. Resistive Switching Memristor: On the Direct Observation of Physical
1210
+ Nature of Parameter Variability. ACS Appl. Mater. Interfaces 2022, 14, 1557−1567.
1211
+ (58) Ilyas, N.; Wang, J.; Li, C.; Fu, H.; Li, D.; Jiang, X.; Gu, D.; Jiang, Y.; Li, W. Controllable
1212
+ resistive switching of STO:Ag/SiO2-based memristor synapse for neuromorphic computing. Journal of
1213
+ Materials Science & Technology 2022, 97, 254-263.
1214
+ (59) Maas, K.; Villepreux, E.; Cooper, D.; Jiménez, C.; Roussel, H.; Rapenne, L.; Mescot, X.; Rafhay,
1215
+ Q.; Boudard, M.; Burriel, M. Using a mixed ionic electronic conductor to build an analog memristive device
1216
+ with neuromorphic programming capabilities. J. Mater. Chem. C 2020, 8, 464-472.
1217
+
1218
+
1219
+
1220
+
1221
+
1222
+
1223
+
1224
+
1225
+
1226
+
1227
+
1228
+
1229
+ 31
1230
+ Supporting information
1231
+ Contrasting Analog and Digital Resistive Switching
1232
+ Memory
1233
+ Characteristics
1234
+ in
1235
+ Solution-Processed
1236
+ Copper (I) Thiocyanate and Its Polymer Electrolyte
1237
+ Based Memristive Devices
1238
+ Rajesh Deb1, Saumya R. Mohapatra*1, Manjula G. Nair2, and Ujjal Das3
1239
+ 1Solid State Ionics Laboratory, Department of Physics, National Institute of Technology Silchar,
1240
+ Silchar-788010, Assam, India
1241
+ 2Department of Physics, Indian Institute of Technology, Patna, Bihar, India, 801106
1242
+ 3Quantum Materials and Device Unit, Institute of Nano Science and Technology, Mohali-
1243
+ 140306, Punjab, India
1244
1245
+
1246
+
1247
+ Figure S1. (a) Current-voltage characteristics of the Cu/CuSCN/ITO memristive device spin
1248
+ Inset of (a) represents the semi-logarithimic plot.
1249
+ coated at 3000 rpm.
1250
+ Figure S2. (a) Current-voltage character
1251
+ curves under consecutive three positive voltage sweeps (0V
1252
+ consecutive three negative voltage sweeps (0V
1253
+ as observed from the I-V characteristics in the
1254
+ Structural and Optical characterization
1255
+ The X-ray diffraction pattern of the copper ion conductive
1256
+ CUSCN (Cu-SPE) concentration o
1257
+ voltage characteristics of the Cu/CuSCN/ITO memristive device spin
1258
+ logarithimic plot. (b) Bipolar I-V curves of Cu/CuSCN/ITO memristive cell spin
1259
+
1260
+ voltage characteristics of Au/CuSCN/ITO memristive device, where 1, 2, 3 represents the
1261
+ curves under consecutive three positive voltage sweeps (0V → 2V → 0V) and 4, 5, 6 represents
1262
+ ee negative voltage sweeps (0V → – 2V → 0V), respectively (b) Bipolar
1263
+ characteristics in the Au/CuSCN/ITO memristive device.
1264
+ Optical characterization of Cu-SPE
1265
+ ray diffraction pattern of the copper ion conductive solid polymer electrolyte films with
1266
+ concentration of 0.25% to 5% is shown in Figure S3(a)
1267
+ 32
1268
+
1269
+ voltage characteristics of the Cu/CuSCN/ITO memristive device spin-coated at 3000 rpm.
1270
+ curves of Cu/CuSCN/ITO memristive cell spin
1271
+
1272
+ , where 1, 2, 3 represents the I-V
1273
+ 0V) and 4, 5, 6 represents I-V curves under
1274
+ Bipolar digital resistive switching
1275
+ polymer electrolyte films with
1276
+ (a). The pattern shows
1277
+
1278
+ (a)
1279
+ 2x10°-
1280
+ 1x10-5.
1281
+ (v)
1282
+ Current
1283
+ 0
1284
+ C
1285
+ -1x10s
1286
+ -2x10~
1287
+ -0.8
1288
+ -0.4
1289
+ 0.0
1290
+ VoltagC1E-6RESET1E-6
1291
+ C1E-811E-8:-0.8-0.4
1292
+ 0.0
1293
+ 0.4
1294
+ 0.8Yoltage (V)1E-4
1295
+ A)
1296
+ 1E-5
1297
+ Current
1298
+ 4
1299
+ C 1E-6
1300
+ 5
1301
+ 6
1302
+ 1E-7 :
1303
+ Au/CuSCN/ITO
1304
+ -2
1305
+ -1
1306
+ 0
1307
+ Voltage0.4
1308
+ 0.8
1309
+ -2
1310
+ -1
1311
+ 0e
1312
+ Vol1E-3 RESET1E-4=n3aE1
1313
+ 2
1314
+ -2
1315
+ -1Vol(b)SET1E-41JiForming-1st4: 20th 30thot1
1316
+ 2
1317
+ 3tage (SET0
1318
+ 2tage (V)
1319
+ two dominant peaks of PEO at 19.1° and 23.3°, which corresponds to (120) and (112) planes
1320
+ respectively.1,2 It is observed that there is an increase in the intensity of (120) peaks with the rise
1321
+ in the salt concentration. This suggests that salt concentration has a strong influe
1322
+ crystallization process of the PEO.
1323
+ in the electrolyte film, even at 5 wt.% of the CuSCN concentration. This indicates that no
1324
+ uncomplexed CuSCN is present in the electrolyte film.
1325
+ plotted as transmittance vs. wave
1326
+ the characteristic vibrational modes of PEO in the wavenumber region 800
1327
+ at 841cm-1 and 946 cm-1 are due to CH
1328
+ C-O stretching. The sharp band at 1094 cm
1329
+ relatively small bands at 1279 cm
1330
+ wagging, and CH2 deformation, respectively. The absorption band located at 2880 cm
1331
+ assigned to the C-H asymmetric stretching mode
1332
+ was visible for higher concentrations of copper (I) thiocyanate salt.
1333
+ Figure S3. (a) X-ray diffraction pattern of Cu
1334
+ region 580-3500 cm-1.
1335
+ PEO at 19.1° and 23.3°, which corresponds to (120) and (112) planes
1336
+ observed that there is an increase in the intensity of (120) peaks with the rise
1337
+ in the salt concentration. This suggests that salt concentration has a strong influe
1338
+ crystallization process of the PEO. Further, no Bragg peak corresponding to CuSCN is observed
1339
+ in the electrolyte film, even at 5 wt.% of the CuSCN concentration. This indicates that no
1340
+ uncomplexed CuSCN is present in the electrolyte film. The FTIR spectra of the Cu
1341
+ plotted as transmittance vs. wavenumber (580-3500 cm-1) is shown in Figure
1342
+ vibrational modes of PEO in the wavenumber region 800
1343
+ are due to CH2 asymmetric rocking motion with some contribution of
1344
+ O stretching. The sharp band at 1094 cm-1 is assigned to the C-O-C stretching mode.
1345
+ relatively small bands at 1279 cm-1, 1343 cm-1, and 1463 cm-1 are because of CH
1346
+ deformation, respectively. The absorption band located at 2880 cm
1347
+ H asymmetric stretching mode.3,4 The C-N stretching band found at 2168 cm
1348
+ was visible for higher concentrations of copper (I) thiocyanate salt.
1349
+ ray diffraction pattern of Cu-SPE films, (b) FTIR spectra of Cu-SPE film
1350
+ 33
1351
+ PEO at 19.1° and 23.3°, which corresponds to (120) and (112) planes
1352
+ observed that there is an increase in the intensity of (120) peaks with the rise
1353
+ in the salt concentration. This suggests that salt concentration has a strong influence on the
1354
+ o Bragg peak corresponding to CuSCN is observed
1355
+ in the electrolyte film, even at 5 wt.% of the CuSCN concentration. This indicates that no
1356
+ IR spectra of the Cu-SPE film
1357
+ shown in Figure S3(b). It confirms
1358
+ vibrational modes of PEO in the wavenumber region 800-3000 cm-1. The bands
1359
+ asymmetric rocking motion with some contribution of
1360
+ C stretching mode. The
1361
+ are because of CH2 twisting, CH2
1362
+ deformation, respectively. The absorption band located at 2880 cm-1 is
1363
+ N stretching band found at 2168 cm-1
1364
+
1365
+ SPE film in the wavenumber
1366
+
1367
+ (120)
1368
+ (112)
1369
+ (n'r)
1370
+ 20
1371
+ 40
1372
+ 60
1373
+ 20 (Degrees3102%1%0.57080
1374
+ 100
1375
+ 1000
1376
+ 1500
1377
+ 2000WayenumlS50/23%SPE
1378
+ a27010%0.5%0.25%14CuSCN2500
1379
+ 3000
1380
+ 3500er (cm*)8
1381
+ 1223
1382
+ 4
1383
+ --50620/
1384
+ X-ray Photoelectron Spectroscopy (XPS) of
1385
+ The chemical and electronic state of atoms in the electrolyte film was investigated by X
1386
+ photoelectron spectroscopy (XPS). The XPS full scan spectrum as shown in Fig. 10 (a), indicates
1387
+ the presence of Cu, S, C, N, and O in the film. The high
1388
+ N 1s, O 1s, and Cu 2p are shown in Fig. S4 (b)
1389
+ peak observed at binding energy (BE) of 162.2 eV is due to either C
1390
+ peaks at 163.8 eV and 168.8 eV correspond to S
1391
+ level spectra is dominated by a peak
1392
+ peak at 284.4 eV is due to the C
1393
+ Figure S4. (a) XPS survey spectrum of the Cu
1394
+ S 2p, C 1s, N 1s, O 1s and Cu 2p regions of the
1395
+ CuSCN at 398.6 eV, and a small peak at 400.3 eV is due to the N
1396
+ spectrum of the electrolyte film consists of one peak at 532.3 eV, assigned as C
1397
+ ray Photoelectron Spectroscopy (XPS) of Cu-SPE
1398
+ The chemical and electronic state of atoms in the electrolyte film was investigated by X
1399
+ photoelectron spectroscopy (XPS). The XPS full scan spectrum as shown in Fig. 10 (a), indicates
1400
+ the presence of Cu, S, C, N, and O in the film. The high-resolution spectrums of the S 2p, C 1s,
1401
+ N 1s, O 1s, and Cu 2p are shown in Fig. S4 (b)-(f). In the S 2p core level spectra, the component
1402
+ peak observed at binding energy (BE) of 162.2 eV is due to either C-S or Cu
1403
+ peaks at 163.8 eV and 168.8 eV correspond to S-C≡N and S-O environments. The C 1s core
1404
+ level spectra is dominated by a peak at 285.9 eV, which corresponds to CuSCN (S
1405
+ peak at 284.4 eV is due to the C-H environments of PEO. N 1s spectra show a dominant peak of
1406
+ (a) XPS survey spectrum of the Cu-SPE film for 1 wt% of CuSCN. (b)-(f) High resolution spectra of the
1407
+ S 2p, C 1s, N 1s, O 1s and Cu 2p regions of the Cu-SPE film.
1408
+ CuSCN at 398.6 eV, and a small peak at 400.3 eV is due to the N-H environment. The O 1s
1409
+ rum of the electrolyte film consists of one peak at 532.3 eV, assigned as C
1410
+ 34
1411
+ The chemical and electronic state of atoms in the electrolyte film was investigated by X-ray
1412
+ photoelectron spectroscopy (XPS). The XPS full scan spectrum as shown in Fig. 10 (a), indicates
1413
+ resolution spectrums of the S 2p, C 1s,
1414
+ 2p core level spectra, the component
1415
+ S or Cu-S. The other two
1416
+ O environments. The C 1s core
1417
+ at 285.9 eV, which corresponds to CuSCN (S-C≡N), and the
1418
+ H environments of PEO. N 1s spectra show a dominant peak of
1419
+
1420
+ (f) High resolution spectra of the
1421
+ H environment. The O 1s
1422
+ rum of the electrolyte film consists of one peak at 532.3 eV, assigned as C-O-C. From the
1423
+
1424
+ (a)
1425
+ 0.1s
1426
+ Cu: 0.28
1427
+ S: 0.11%
1428
+ C 1s
1429
+ N: 0.48°
1430
+ C: 67.97
1431
+ Intensity (a.u.)
1432
+ 0: 31.17
1433
+ Cu 2p
1434
+ Z
1435
+ 0
1436
+ 200
1437
+ 400
1438
+ 600
1439
+ 008
1440
+ 1000
1441
+ 120
1442
+ Binding energy
1443
+ (ev)03.门12S(p)
1444
+ S-C=N
1445
+ N
1446
+ Intensity (a.u.)
1447
+ N-H
1448
+ 396
1449
+ 398
1450
+ 400
1451
+ Binding energy (eV)160
1452
+ 108
1453
+ 282T0D、54DA87
1454
+ 280
1455
+ 288
1456
+ high-resolution spectra of the Cu 2p core levels, the peaks at 932 eV and 951.8 eV correspond to
1457
+ the prominent peaks of Cu 2p
1458
+ due to the presence of Cu+ in the electrolyte film
1459
+ thiocyanate separated into Cu+
1460
+
1461
+ Figure S5. Cross-sectional SEM image of
1462
+ resolution spectra of the Cu 2p core levels, the peaks at 932 eV and 951.8 eV correspond to
1463
+ the prominent peaks of Cu 2p3/2 and Cu 2p1/2, respectively. The component peak at 933.1 eV is
1464
+ in the electrolyte film.5-10 These sources indicate that the copper (I)
1465
+ + and SCN− ions in the polymer electrolyte.
1466
+ sectional SEM image of Cu-SPE layer deposited over ITO-coated PET substrate
1467
+
1468
+ 35
1469
+ resolution spectra of the Cu 2p core levels, the peaks at 932 eV and 951.8 eV correspond to
1470
+ nent peak at 933.1 eV is
1471
+ These sources indicate that the copper (I)
1472
+
1473
+ coated PET substrate at 3000 rpm.
1474
+
1475
+ TTO350 nm个PET100nmISCN230 nm
1476
+ PEO+Cu
1477
+ Figure S6. I-V plots of the ITO/Cu-
1478
+ (c) 1 wt% (d) 2 wt% (e) 3 wt% and
1479
+ Figure S7. Current
1480
+
1481
+ -SPE/Cu memory device with CuSCN concentration of
1482
+ (f) 5 wt%.
1483
+
1484
+ Current-voltage (I-V) characteristics of Au/SPE/ITO memory device.
1485
+ 36
1486
+
1487
+ with CuSCN concentration of (a) 0.25 wt% (b) 0.5 wt%
1488
+
1489
+ characteristics of Au/SPE/ITO memory device.
1490
+
1491
+ 1E-31
1492
+ CC=0.1mA
1493
+ 1E-5
1494
+ SET
1495
+ urre
1496
+ RESET
1497
+ 1E-9
1498
+ (a)
1499
+ 0.25 wt
1500
+ 1E-11
1501
+ -2
1502
+ 1
1503
+ 0
1504
+ 1
1505
+ Voltage (V)
1506
+ CC-0.1 mA
1507
+ IE-3
1508
+ SE
1509
+ RESET
1510
+ 1E-7
1511
+ 1E-9
1512
+ (d)
1513
+ 2 wt°
1514
+ 1E-11
1515
+ -3
1516
+ -2
1517
+ -1
1518
+ 0
1519
+ 1
1520
+ 2
1521
+ Voltage ()1E-9-(b)
1522
+ 0.5 wt%
1523
+ C1E-11oltageW00.01
1524
+ CC=0.1 mA1E-5
1525
+ 1E-6
1526
+ 1E-7
1527
+ Current
1528
+ 1E-8
1529
+ C
1530
+ 1E-9
1531
+ 1E-10 -
1532
+ Au/s
1533
+ LERESET1E-6
1534
+ eO1E-911E-O7(e)
1535
+ 3 wt%IE-10
1536
+ IE-1I3
1537
+ 980
1538
+ 246810
1539
+ -10oitaget11E-31
1540
+ 1E-314
1541
+ -2
1542
+ 0
1543
+ 2Voltage )SET
1544
+ HETSET1 wt%1
1545
+ 1Yoltage5 wt%RES?1E-74
1546
+ 37
1547
+ REFERENCES
1548
+ (1) Sidhu, K. S.; Sekhon, S. S.; Hashmi, S. A.; Chandra, S. STUDIES ON POLY(ETHYLENE
1549
+ OXIDE)-CuSCN POLYMER ELECTROLYTES. Eur. Polym. J. 1993, 29, 779-782.
1550
+ (2) Xu, X.; Jiang, L.; Zhou, Z.; Wu, X.; Wang, Y. Preparation and Properties of Electrospun
1551
+ Soy Protein Isolate/Polyethylene Oxide Nanofiber Membranes. ACS Appl. Mater. Interfaces
1552
+ 2012, 4, 4331-4337.
1553
+ (3) Mohapatra, S. R.; Thakur, A. K.; Choudhary, R. N. P. Vibrational spectroscopy analysis of
1554
+ ion conduction mechanism in dispersed phase polymer nanocomposites. Journal of Polymer
1555
+ Science: Part B: Polymer Physics 2009, 47, 60–71.
1556
+ (4) Sundaramahalingam, K.; Vanitha, D.; Nallamuthu, N.; Manikandan, A.; Muthuvinayagam,
1557
+ M. Electrical properties of lithium bromide poly ethylene oxide / poly vinyl pyrrolidone polymer
1558
+ blend elctrolyte Physica B: Condensed Matter 2019, 553, 120-126.
1559
+ (5) Wijeyasinghe, N.; Regoutz, A.; Eisner, F.; Du, T.; Tsetseris, L.; Lin, Y. H.; Faber, H.;
1560
+ Pattanasattayavong, P.; Li, J.; Yan, F.; McLachlan, M. A.; Payne, D. J.; Heeney, M.;
1561
+ Anthopoulos, T. D. Copper(I) Thiocyanate (CuSCN) Hole-Transport Layers Processed from
1562
+ Aqueous Precursor Solutions and Their Application in Thin-Film Transistors and Highly
1563
+ Efficient Organic and Organometal Halide Perovskite Solar Cells. Adv. Funct. Mater. 2017,
1564
+ 1701818.
1565
+ (6) Jaffe, J. E.; Kaspar, T. C.; Droubay, T. C.; Varga, T.; Bowden, M. E.; Exarhos, G. J.
1566
+ Electronic and Defect Structures of CuSCN. J. Phys. Chem. C 2010, 114, 9111–9117.
1567
+ (7) Wang, B.; Nam, S.; Limbu, S.; Kim, J. S.; Riede, M.; Bradley, D. D. C. Properties and
1568
+ Applications of Copper(I) Thiocyanate Hole-Transport Interlayers Processed from Different
1569
+ Solvents. Adv. Electron. Mater. 2022, 2101253.
1570
+ (8) Zhang, Q.; Lu, Y.; Yu, H.; Yang, G.; Liu, Q.; Wang, Z.; Chen, L.; Hu, Y. S. PEO NaPF6
1571
+ Blended Polymer Electrolyte for Solid State Sodium Battery, Journal of The Electrochemical
1572
+ Society 2020, 167, 070523.
1573
+ (9) Vosshage, D. M.; Chowdari, B. V. R. XPS studies on (PEO)nLiClO4 and (PEO)nCu(ClO4)2
1574
+ polymer electrolytes. J. Electrochem. Soc. 1995, 142, 1442-1446.
1575
+ (10) Er, U.; Icli, K. C.; Ozenbas, M. Spin-coated copper(I) thiocyanate as a hole transport layer
1576
+ for perovskite solar cells. Journal of Solid State Electrochemistry 2020, 24, 293–304.
1577
+
1578
+
TtAyT4oBgHgl3EQfVvcM/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
UdFJT4oBgHgl3EQfNSxs/content/tmp_files/2301.11477v1.pdf.txt ADDED
@@ -0,0 +1,319 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Ananke: A Python Package For Causal Inference Using
2
+ Graphical Models
3
+ Jaron J. R. Lee†,1
4
5
+ Rohit Bhattacharya†,2
6
7
+ Razieh Nabi3
8
9
+ Ilya Shpitser1
10
11
+ † Equal contribution
12
+ 1Department of Computer Science, Johns Hopkins University
13
+ 2Department of Computer Science, Williams College
14
+ 3Department of Biostatistics and Bioinformatics, Emory University
15
+ Abstract
16
+ We implement Ananke: an object-oriented Python package for causal inference with
17
+ graphical models. At the top of our inheritance structure is an easily extensible Graph class
18
+ that provides an interface to several broadly useful graph-based algorithms and methods
19
+ for visualization.
20
+ We use best practices of object-oriented programming to implement
21
+ subclasses of the Graph superclass that correspond to types of causal graphs that are
22
+ popular in the current literature. This includes directed acyclic graphs for modeling causally
23
+ sufficient systems, acyclic directed mixed graphs for modeling unmeasured confounding, and
24
+ chain graphs for modeling data dependence and interference. Within these subclasses, we
25
+ implement specialized algorithms for common statistical and causal modeling tasks, such as
26
+ separation criteria for reading conditional independence, nonparametric identification, and
27
+ parametric and semiparametric estimation of model parameters. Here, we present a broad
28
+ overview of the package and example usage for a problem with unmeasured confounding.
29
+ Up to date documentation is available at https://ananke.readthedocs.io/en/latest/.
30
+ Keywords:
31
+ causal graphical models, causal identification, semiparametric estimation
32
+ 1. Introduction
33
+ Causal inference is a pipeline comprised of many steps – specification of a causal model,
34
+ identification of the desired causal parameter under assumptions of this model, estimation
35
+ of the parameter from data based on the identifying functional, and robustness checks via
36
+ sensitivity analysis and uncertainty quantification. Any of these steps may be complicated
37
+ by unmeasured confounding, data dependence, and missing data. In Ananke, we implement
38
+ methods that span all of these steps, including nonparametric identification and semipara-
39
+ metric estimation strategies, to provide analysts a unifying interface that allows them to
40
+ set up end-to-end pipelines that exhibit robustness to the aforementioned complications.
41
+ In particular, we adopt an object-oriented paradigm to implement graph-based causal
42
+ inference methods. We build an inheritance structure spanning causal graphical models
43
+ that use any combination of directed (→), bidirected (↔), and undirected (–) edges. We
44
+ hope that due to its object-oriented nature and easily accessible Python implementation
45
+ ©2022 Lee, Bhattacharya, Nabi, and Shpitser.
46
+ License: CC-BY 4.0, see https://creativecommons.org/licenses/by/4.0/.
47
+ arXiv:2301.11477v1 [stat.ME] 27 Jan 2023
48
+
49
+ Lee, Bhattacharya, Nabi, and Shpitser
50
+ Ananke will improve the accessibility of many graph-based causal inference methods, and
51
+ allow interested users to easily extend and build on its current infrastructure.
52
+ Related work: The doWhy package and DAGitty aim to provide a unifying interface
53
+ for distinct steps in the causal inference pipeline. However, their estimation capabilities are
54
+ largely limited to settings without unmeasured confounders or selection bias. In the case of
55
+ doWhy, the causal graph interface is still under active development with plans to interface
56
+ with Ananke rather than build one from scratch (personal communication with developers.)
57
+ Other existing packages emphasize a single step in the pipeline. TETRAD and its Python port
58
+ causal-learn (Scheines et al., 1998), pcalg (Kalisch et al., 2012), and cdt (Kalainathan
59
+ et al., 2020) focus on graph representation and model selection; causaleffect focuses
60
+ on nonparametric identification; npcausal (Kennedy, 2021), zEpid (Zevich, 2018), tmle3
61
+ (Coyle, 2021), and DoubleML (Bach et al., 2022) focus on semiparametric estimation. Other
62
+ standalone packages exist as appendices to papers, and in certain cases we reimplement these
63
+ algorithms in Ananke, e.g., the maximum likelihood algorithms in Evans (2013) and Drton
64
+ et al. (2009). The principle advantage of Ananke over peers is that it offers a unified and
65
+ easily extended interface for causal inference in a single package, with an active community.
66
+ 2. Overview of Ananke’s Graph Inheritance Structure
67
+ Graph
68
+ Segregated Graph
69
+ Intrinsic Graph
70
+ Acyclic Directed Mixed Graph
71
+ Chain Graph
72
+ Directed Acyclic Graph
73
+ Bidirected Graph
74
+ Undirected Graph
75
+ Figure 1: Ananke’s graph inheritance structure.
76
+ An overview of graphical models in Ananke
77
+ and their inheritance structure is shown in
78
+ Fig. 1.
79
+ The Graph class currently supports
80
+ the creation of graphs G
81
+ = (V, D, B, U),
82
+ where V denotes a set of vertices and D, B, U
83
+ denote sets of directed (→), bidirected (↔),
84
+ and undirected (–) respectively. Within this
85
+ class we implement methods and algorithms
86
+ that are broadly applicable to any subclass:
87
+ simple methods involving addition and dele-
88
+ tion of edges, finding a subgraph GS com-
89
+ prised of only vertices in S ⊆ V (and associ-
90
+ ated edges), and computing genealogical sets of a vertex, such as its ancestors, descendants,
91
+ and siblings. We also implement a lightweight draw method using a Python interface to
92
+ graphviz (Ellson et al., 2001; Hagberg et al., 2022) for visualizing any instance of the class
93
+ or subclasses of it – all figures in this paper are produced using this functionality. The
94
+ rest of the inheritance structure is based on the types of edges each graph class contains.
95
+ At the lowest levels are graphs only containing a single edge type: Directed acyclic graphs
96
+ (DAGs) (only → edges) are the most popular type of causal graph (Robins, 1986; Spirtes
97
+ et al., 2000; Pearl, 2009); Bidirected graphs (only ↔ edges) are used to represent marginal
98
+ correlations and are popular in genomics (Chaudhuri et al., 2007; Cox and Wermuth, 2014);
99
+ Undirected graphs (only – edges) can be used to encode feedback relationships (Lauritzen,
100
+ 1996). Next, we have graphs containing a mixture of edges types: Acyclic directed mixed
101
+ graphs (ADMGs) model systems with causal influence (via → edges) and correlation due
102
+ to unmeasured confounding (via ↔ edges) (Wright, 1921; Verma and Pearl, 1990); Chain
103
+ graphs model causal influence (via → edges) as well as non-iid phenomena such as conta-
104
+ 2
105
+
106
+ Ananke
107
+ gion, feedback, and symmetric relationships (via – edges) (Lauritzen and Richardson, 2002;
108
+ Ogburn et al., 2020; Bhattacharya et al., 2019a); Segregated graphs consisting of all three
109
+ kinds of edges are capable of modeling all three mechanisms discussed above (Shpitser,
110
+ 2015). We note that intrinsic graphs shown in the hierarchy of Fig. 1 are not causal graph-
111
+ ical models, but rather a graphical representation created by us to efficiently compute all
112
+ statistical kernels required to parameterize a hidden variable causal model – a necessary
113
+ step for estimation discussed in Section 3. This illustrates additional use cases of our graph
114
+ inheritance structure for intermediate tasks. As another example, we use our chain graph
115
+ implementation to encode equivalence classes of causal DAGs – different models that im-
116
+ ply the same restrictions on the observed data distribution – known as Complete Partially
117
+ Directed Acyclic Graphs (CPDAGs). This allows Ananke to easily interface with or ex-
118
+ tend causal discovery algorithms that output such objects, e.g., implementations of greedy
119
+ equivalence search or the PC algorithm in the causal-learn package (Zhang et al., 2022).
120
+ 3. Data Analysis in Ananke
121
+ To illustrate usage of Ananke we step through a hypothetical analysis for assessing the
122
+ effect of smoking on diabetes using a teaching dataset derived1 from the Framingham Heart
123
+ Study (Kannel and Gordon, 1968). We start by encoding substantive assumptions using an
124
+ ADMG shown in Fig. 2 along with the Ananke commands used to create and visualize it.
125
+ age
126
+ smoke
127
+ diabetes
128
+ bp
129
+ >>> vertices = ["age", "smoke", "bp", "diabetes"]
130
+ >>> di_edges = [("age", "smoke"), ("smoke", "bp"),
131
+ >>>
132
+ ("bp", "diabetes"), ("age", "diabetes")]
133
+ >>> bi_edges = [("smoke", "diabetes")]
134
+ >>> fdoor = graphs.ADMG(vertices, di_edges, bi_edges)
135
+ >>> fdoor.draw("LR")
136
+ Figure 2: Front-door model visualized using built-in capability.
137
+ An ADMG can imply certain testable independence statements (amongst other general
138
+ constraints) that can be read via m-separation (Richardson, 2003). For example, we can
139
+ verify that age is m-separated from bp given smoke implying age ⊥⊥ bp | smoke.
140
+ >>> fdoor.m_separated("age", "bp", ["smoke"])
141
+ True
142
+ An analyst may verify whether the data supports such assumptions using any standard
143
+ conditional independence test. Assuming Fig. 2 is correct, the next step is to apply identifi-
144
+ cation theory to determine whether the desired causal effect can be expressed as a function
145
+ of observed data. Applying Ananke’s implementation of a sound and complete algorithm
146
+ for identification in presence of unmeasured confounding (Richardson et al., 2017) gives:
147
+ >>> treatments = ["smoke"]; outcomes = ["diabetes"]
148
+ >>> id_fdoor = identification.OneLineID(graph=fdoor, treatments=treatments, outcomes=outcomes)
149
+ >>> print('Identifed =', id_fdoor.id(), '; Functional =', id_fdoor.functional())
150
+ Identifed = True
151
+ Functional = Σagebp φdiabetessmokebp(p(V);G) φsmokediabetesage(p(V);G) φsmokebpage(p(V);G)
152
+ 1. The teaching extract of the Framingham Heart Study can be requested from https://biolincc.nhlbi.
153
+ nih.gov/teaching/.
154
+ 3
155
+
156
+ Lee, Bhattacharya, Nabi, and Shpitser
157
+ That is, the counterfactual distribution p(diabetes(smoke)), and hence the effect, is indeed
158
+ identified. Interpreting the output based on Richardson et al. (2017) gives
159
+ p(diabetes(smoke)) =
160
+
161
+ age,bp
162
+ p(bp | smoke)p(age)
163
+ � �
164
+ smoke′
165
+ p(diabetes | smoke′, bp, age)p(smoke′ | age)
166
+
167
+ .
168
+ While the focus of this analysis is on identification under unmeasured confounding, Ananke
169
+ also implements identification algorithms for missing data (Bhattacharya et al., 2019b; Nabi
170
+ et al., 2020), selection bias, and data fusion (Lee et al., 2020; Lee and Shpitser, 2020). After
171
+ identification, we may choose from a variety of estimation strategies offered in Ananke.
172
+ 3.1 Linear Gaussian Structural Equation Models
173
+ One possible choice is to assume a linear structural equation model with correlated errors
174
+ (Wright, 1934). In Ananke, we implement the iterative algorithm described in Drton et al.
175
+ (2009) to obtain maximum likelihood estimates for all edge coefficients; causal effects are
176
+ then computed via path analysis. Applying this to standardized Framingham data gives:
177
+ Age
178
+ Smoke
179
+ -0.19
180
+ Diabetes
181
+ 0.11
182
+ BP
183
+ -0.05
184
+ -0.02
185
+ 0.08
186
+ >>> lsm = LinearGaussianSEM(front_door)
187
+ >>> lsm = lsm.fit(df_cont)
188
+ >>> lsm.draw(direction="LR")
189
+ >>> lsm.total_effect(["smoke"], ["diabetes"])
190
+ ACE: -0.004
191
+ 3.2 M¨obius Parameterization for Discrete Data
192
+ An alternative is to use the M¨obius parameterization of the observed data likelihood, which
193
+ assumes all observed variables are discrete (Evans and Richardson, 2012). We implement
194
+ a coordinate descent algorithm to compute maximum likelihood estimates for the M¨obius
195
+ parameters (which may be variationally dependent in general.) Using binary versions of
196
+ variables in the dataset, we obtain the following result for the average causal effect.
197
+ >>> bnm = binary_nested.BinaryNestedModel(front_door)
198
+ >>> bnm = bnm.fit(X=binary_nested.process_data(df_bin), tol=1e-12 )
199
+ >>> pY1_A0 = bnm.estimate(treatment_dict={"smoke": 0}, outcome_dict={"diabetes": 1})
200
+ >>> pY1_A1 = bnm.estimate(treatment_dict={"smoke": 1}, outcome_dict={"diabetes": 1})
201
+ >>> print("ACE: ", pY1_A1 - pY1_A0)
202
+ ACE: 0.004
203
+ 3.3 Semiparametric Estimation of Causal Effects
204
+ If the effect is identified, Ananke lists several semiparametric estimation strategies, proposed
205
+ by Bhattacharya et al. (2022), and suggests the best one according to semiparametric effi-
206
+ ciency theory. The implementation only requires specification of the ADMG, treatment, and
207
+ outcome. Using Ananke’s suggestion of efficient augmented primal IPW estimator gives:
208
+ >>> ace_obj = CausalEffect(graph=front_door, treatment='smoke', outcome='diabetes')
209
+ >>> ace = ace_obj.compute_effect(df_bin, "eff-apipw"); print("ACE: ", ace)
210
+ ACE: -0.002
211
+ Acknowledgments
212
+ 4
213
+
214
+ Ananke
215
+ We thank Preethi Prakash and Ranjani Srinivasan for contributions to Ananke, and Carson
216
+ Kurtz for assisting R.B. in testing code.
217
+ References
218
+ Philipp Bach, Victor Chernozhukov, Malte S. Kurz, and Martin Spindler. DoubleML –
219
+ An object-oriented implementation of double machine learning in Python. Journal of
220
+ Machine Learning Research, 23(53):1–6, 2022.
221
+ URL http://jmlr.org/papers/v23/
222
+ 21-0862.html.
223
+ Rohit Bhattacharya, Daniel Malinsky, and Ilya Shpitser. Causal inference under interfer-
224
+ ence and network uncertainty. In Proceedings of the 35th Conference on Uncertainty in
225
+ Artificial Intelligence. AUAI Press, 2019a.
226
+ Rohit Bhattacharya, Razieh Nabi, Ilya Shpitser, and James M. Robins. Identification in
227
+ missing data models represented by directed acyclic graphs. In Proceedings of the 35th
228
+ Conference on Uncertainty in Artificial Intelligence. AUAI Press, 2019b.
229
+ Rohit Bhattacharya, Razieh Nabi, and Ilya Shpitser. Semiparametric inference for causal
230
+ effects in graphical models with hidden variables. Journal of Machine Learning Research,
231
+ 23:1–76, 2022.
232
+ Sanjay Chaudhuri, Mathias Drton, and Thomas S Richardson. Estimation of a covariance
233
+ matrix with zeros. Biometrika, 94(1):199–216, 2007.
234
+ David Roxbee Cox and Nanny Wermuth. Multivariate dependencies: Models, analysis and
235
+ interpretation. Chapman and Hall/CRC, 2014.
236
+ Jeremy R Coyle. tmle3: The extensible TMLE framework. https://github.com/tlverse/
237
+ tmle3, 2021.
238
+ URL https://doi.org/10.5281/zenodo.4603358.
239
+ R package version
240
+ 0.2.0.
241
+ Mathias Drton, Michael Eichler, and Thomas S. Richardson. Computing maximum like-
242
+ lihood estimates in recursive linear models with correlated errors. Journal of Machine
243
+ Learning Research, 10(10), 2009.
244
+ John Ellson, Emden Gansner, Lefteris Koutsofios, Stephen C North, and Gordon Wood-
245
+ hull. Graphviz—open source graph drawing tools. In International Symposium on Graph
246
+ Drawing, pages 483–484. Springer, 2001.
247
+ Robin J Evans. ADMGs. https://www.stats.ox.ac.uk/~evans/software.htm, 2013.
248
+ Robin J. Evans and Thomas S. Richardson. Maximum likelihood fitting of acyclic directed
249
+ mixed graphs to binary data. 2012. URL http://arxiv.org/abs/1203.3479.
250
+ Aric Hagberg, Dan Schult, and Manos Renieris. Pygraphviz. 2022. URL https://github.
251
+ com/pygraphviz/pygraphviz.
252
+ 5
253
+
254
+ Lee, Bhattacharya, Nabi, and Shpitser
255
+ Diviyan Kalainathan, Olivier Goudet, and Ritik Dutta. Causal discovery toolbox: Uncov-
256
+ ering causal relationships in python. Journal of Machine Learning Research, 21(37):1–5,
257
+ 2020.
258
+ Markus Kalisch, Martin M¨achler, Diego Colombo, Marloes H. Maathuis, and Peter
259
+ B¨uhlmann. Causal inference using graphical models with the R package pcalg. Jour-
260
+ nal of Statistical Software, 47:1–26, 2012.
261
+ William B. Kannel and Tavia Gordon. The Framingham Study: an epidemiological inves-
262
+ tigation of cardiovascular disease. Number 9-13. Department of Health, Education, and
263
+ Welfare, 1968.
264
+ Ed Kennedy. npcausal: Nonparametric causal inference methods. https://github.com/
265
+ ehkennedy/npcausal, 2021.
266
+ Steffen L. Lauritzen. Graphical Models. Oxford, U.K.: Clarendon, 1996.
267
+ Steffen L. Lauritzen and Thomas S. Richardson. Chain graph models and their causal inter-
268
+ pretations. Journal of the Royal Statistical Society: Series B (Statistical Methodology),
269
+ 64(3):321–348, 2002.
270
+ Jaron J. R. Lee and Ilya Shpitser.
271
+ Identification methods with arbitrary interventional
272
+ distributions as inputs. arXiv preprint arXiv:2004.01157, 2020.
273
+ Sanghack Lee, Juan D Correa, and Elias Bareinboim. General identifiability with arbitrary
274
+ surrogate experiments. In Uncertainty in artificial intelligence, pages 389–398. PMLR,
275
+ 2020.
276
+ Razieh Nabi, Rohit Bhattacharya, and Ilya Shpitser. Full law identification in graphical
277
+ models of missing data: completeness results. In International Conference on Machine
278
+ Learning, pages 7153–7163. PMLR, 2020.
279
+ Elizabeth L. Ogburn, Ilya Shpitser, and Youjin Lee. Causal inference, social networks and
280
+ chain graphs. Journal of the Royal Statistical Society: Series A (Statistics in Society),
281
+ 183(4):1659–1676, 2020.
282
+ Judea Pearl. Causality. Cambridge University Press, 2009.
283
+ Thomas S. Richardson. Markov properties for acyclic directed mixed graphs. Scandinavian
284
+ Journal of Statistics, 30(1):145–157, 2003.
285
+ Thomas S. Richardson, Robin J. Evans, James M. Robins, and Ilya Shpitser. Nested Markov
286
+ properties for acyclic directed mixed graphs, 2017. Working paper.
287
+ James M. Robins. A new approach to causal inference in mortality studies with a sus-
288
+ tained exposure period – application to control of the healthy worker survivor effect.
289
+ Mathematical Modelling, 7(9-12):1393–1512, 1986.
290
+ Richard Scheines, Peter Spirtes, Clark Glymour, Christopher Meek, and Thomas Richard-
291
+ son. The tetrad project: Constraint based aids to causal model specification. Multivariate
292
+ Behavioral Research, 33(1):65–117, 1998.
293
+ 6
294
+
295
+ Ananke
296
+ Ilya Shpitser. Segregated graphs and marginals of chain graph models. In Advances in
297
+ Neural Information Processing Systems, pages 1720–1728, 2015.
298
+ Peter L. Spirtes, Clark N. Glymour, and Richard Scheines. Causation, Prediction, and
299
+ Search. MIT press, 2000.
300
+ Thomas Verma and Judea Pearl. Equivalence and synthesis of causal models. In Proceedings
301
+ of the 6th Annual Conference on Uncertainty in Artificial Intelligence, 1990.
302
+ Sewall Wright. Correlation and causation. Journal of Agricultural Research, 20:557–580,
303
+ 1921.
304
+ Sewall Wright. The method of path coefficients. Annals of Mathematical Statistics, 5(3):
305
+ 161–215, 1934.
306
+ Paul Zevich. zEpid: An epidemiology analysis toolkit. https://github.com/pzivich/
307
+ zepid/, 2018. Python package.
308
+ Kun Zhang,
309
+ Joseph Ramsey,
310
+ Mingming Gong,
311
+ Ruichu Cai,
312
+ Shohei Shimizu,
313
+ Pe-
314
+ ter Spirtes, Clark Glymour, et al.
315
+ causal-learn:
316
+ Causal Discovery for Python.
317
+ https://github.com/cmu-phil/causal-learn, 2022.
318
+ 7
319
+
UdFJT4oBgHgl3EQfNSxs/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,312 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf,len=311
2
+ page_content='Ananke: A Python Package For Causal Inference Using Graphical Models Jaron J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
3
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
4
+ page_content=' Lee†,1 jaron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
5
+ page_content='lee@jhu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
6
+ page_content='edu Rohit Bhattacharya†,2 rb17@williams.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
7
+ page_content='edu Razieh Nabi3 razieh.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
8
+ page_content='nabi@emory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
9
+ page_content='edu Ilya Shpitser1 ilyas@cs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
10
+ page_content='jhu.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
11
+ page_content='edu † Equal contribution 1Department of Computer Science, Johns Hopkins University 2Department of Computer Science, Williams College 3Department of Biostatistics and Bioinformatics, Emory University Abstract We implement Ananke: an object-oriented Python package for causal inference with graphical models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
12
+ page_content=' At the top of our inheritance structure is an easily extensible Graph class that provides an interface to several broadly useful graph-based algorithms and methods for visualization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
13
+ page_content=' We use best practices of object-oriented programming to implement subclasses of the Graph superclass that correspond to types of causal graphs that are popular in the current literature.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
14
+ page_content=' This includes directed acyclic graphs for modeling causally sufficient systems, acyclic directed mixed graphs for modeling unmeasured confounding, and chain graphs for modeling data dependence and interference.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
15
+ page_content=' Within these subclasses, we implement specialized algorithms for common statistical and causal modeling tasks, such as separation criteria for reading conditional independence, nonparametric identification, and parametric and semiparametric estimation of model parameters.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
16
+ page_content=' Here, we present a broad overview of the package and example usage for a problem with unmeasured confounding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
17
+ page_content=' Up to date documentation is available at https://ananke.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
18
+ page_content='readthedocs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
19
+ page_content='io/en/latest/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
20
+ page_content=' Keywords: causal graphical models, causal identification, semiparametric estimation 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
21
+ page_content=' Introduction Causal inference is a pipeline comprised of many steps – specification of a causal model, identification of the desired causal parameter under assumptions of this model, estimation of the parameter from data based on the identifying functional, and robustness checks via sensitivity analysis and uncertainty quantification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
22
+ page_content=' Any of these steps may be complicated by unmeasured confounding, data dependence, and missing data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
23
+ page_content=' In Ananke, we implement methods that span all of these steps, including nonparametric identification and semipara- metric estimation strategies, to provide analysts a unifying interface that allows them to set up end-to-end pipelines that exhibit robustness to the aforementioned complications.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
24
+ page_content=' In particular, we adopt an object-oriented paradigm to implement graph-based causal inference methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
25
+ page_content=' We build an inheritance structure spanning causal graphical models that use any combination of directed (→), bidirected (↔), and undirected (–) edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
26
+ page_content=' We hope that due to its object-oriented nature and easily accessible Python implementation ©2022 Lee, Bhattacharya, Nabi, and Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
27
+ page_content=' License: CC-BY 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
28
+ page_content='0, see https://creativecommons.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
29
+ page_content='org/licenses/by/4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
30
+ page_content='0/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
31
+ page_content=' arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
32
+ page_content='11477v1 [stat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
33
+ page_content='ME] 27 Jan 2023 Lee, Bhattacharya, Nabi, and Shpitser Ananke will improve the accessibility of many graph-based causal inference methods, and allow interested users to easily extend and build on its current infrastructure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
34
+ page_content=' Related work: The doWhy package and DAGitty aim to provide a unifying interface for distinct steps in the causal inference pipeline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
35
+ page_content=' However, their estimation capabilities are largely limited to settings without unmeasured confounders or selection bias.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
36
+ page_content=' In the case of doWhy, the causal graph interface is still under active development with plans to interface with Ananke rather than build one from scratch (personal communication with developers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
37
+ page_content=') Other existing packages emphasize a single step in the pipeline.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
38
+ page_content=' TETRAD and its Python port causal-learn (Scheines et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
39
+ page_content=', 1998), pcalg (Kalisch et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
40
+ page_content=', 2012), and cdt (Kalainathan et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
41
+ page_content=', 2020) focus on graph representation and model selection;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
42
+ page_content=' causaleffect focuses on nonparametric identification;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
43
+ page_content=' npcausal (Kennedy, 2021), zEpid (Zevich, 2018), tmle3 (Coyle, 2021), and DoubleML (Bach et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
44
+ page_content=', 2022) focus on semiparametric estimation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
45
+ page_content=' Other standalone packages exist as appendices to papers, and in certain cases we reimplement these algorithms in Ananke, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
46
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
47
+ page_content=', the maximum likelihood algorithms in Evans (2013) and Drton et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
48
+ page_content=' (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
49
+ page_content=' The principle advantage of Ananke over peers is that it offers a unified and easily extended interface for causal inference in a single package, with an active community.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
50
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
51
+ page_content=' Overview of Ananke’s Graph Inheritance Structure Graph Segregated Graph Intrinsic Graph Acyclic Directed Mixed Graph Chain Graph Directed Acyclic Graph Bidirected Graph Undirected Graph Figure 1: Ananke’s graph inheritance structure.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
52
+ page_content=' An overview of graphical models in Ananke and their inheritance structure is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
53
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
54
+ page_content=' The Graph class currently supports the creation of graphs G = (V, D, B, U), where V denotes a set of vertices and D, B, U denote sets of directed (→), bidirected (↔), and undirected (–) respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
55
+ page_content=' Within this class we implement methods and algorithms that are broadly applicable to any subclass: simple methods involving addition and dele- tion of edges, finding a subgraph GS com- prised of only vertices in S ⊆ V (and associ- ated edges), and computing genealogical sets of a vertex, such as its ancestors, descendants, and siblings.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
56
+ page_content=' We also implement a lightweight draw method using a Python interface to graphviz (Ellson et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
57
+ page_content=', 2001;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
58
+ page_content=' Hagberg et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
59
+ page_content=', 2022) for visualizing any instance of the class or subclasses of it – all figures in this paper are produced using this functionality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
60
+ page_content=' The rest of the inheritance structure is based on the types of edges each graph class contains.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
61
+ page_content=' At the lowest levels are graphs only containing a single edge type: Directed acyclic graphs (DAGs) (only → edges) are the most popular type of causal graph (Robins, 1986;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
62
+ page_content=' Spirtes et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
63
+ page_content=', 2000;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
64
+ page_content=' Pearl, 2009);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
65
+ page_content=' Bidirected graphs (only ↔ edges) are used to represent marginal correlations and are popular in genomics (Chaudhuri et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
66
+ page_content=', 2007;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
67
+ page_content=' Cox and Wermuth, 2014);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
68
+ page_content=' Undirected graphs (only – edges) can be used to encode feedback relationships (Lauritzen, 1996).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
69
+ page_content=' Next, we have graphs containing a mixture of edges types: Acyclic directed mixed graphs (ADMGs) model systems with causal influence (via → edges) and correlation due to unmeasured confounding (via ↔ edges) (Wright, 1921;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
70
+ page_content=' Verma and Pearl, 1990);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
71
+ page_content=' Chain graphs model causal influence (via → edges) as well as non-iid phenomena such as conta- 2 Ananke gion, feedback, and symmetric relationships (via – edges) (Lauritzen and Richardson, 2002;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
72
+ page_content=' Ogburn et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
73
+ page_content=', 2020;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
74
+ page_content=' Bhattacharya et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
75
+ page_content=', 2019a);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
76
+ page_content=' Segregated graphs consisting of all three kinds of edges are capable of modeling all three mechanisms discussed above (Shpitser, 2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
77
+ page_content=' We note that intrinsic graphs shown in the hierarchy of Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
78
+ page_content=' 1 are not causal graph- ical models, but rather a graphical representation created by us to efficiently compute all statistical kernels required to parameterize a hidden variable causal model – a necessary step for estimation discussed in Section 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
79
+ page_content=' This illustrates additional use cases of our graph inheritance structure for intermediate tasks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
80
+ page_content=' As another example, we use our chain graph implementation to encode equivalence classes of causal DAGs – different models that im- ply the same restrictions on the observed data distribution – known as Complete Partially Directed Acyclic Graphs (CPDAGs).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
81
+ page_content=' This allows Ananke to easily interface with or ex- tend causal discovery algorithms that output such objects, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
82
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
83
+ page_content=', implementations of greedy equivalence search or the PC algorithm in the causal-learn package (Zhang et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
84
+ page_content=', 2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
85
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
86
+ page_content=' Data Analysis in Ananke To illustrate usage of Ananke we step through a hypothetical analysis for assessing the effect of smoking on diabetes using a teaching dataset derived1 from the Framingham Heart Study (Kannel and Gordon, 1968).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
87
+ page_content=' We start by encoding substantive assumptions using an ADMG shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
88
+ page_content=' 2 along with the Ananke commands used to create and visualize it.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
89
+ page_content=' age smoke diabetes bp >>> vertices = ["age", "smoke", "bp", "diabetes"] >>> di_edges = [("age", "smoke"), ("smoke", "bp"), >>> ("bp", "diabetes"), ("age", "diabetes")] >>> bi_edges = [("smoke", "diabetes")] >>> fdoor = graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
90
+ page_content='ADMG(vertices, di_edges, bi_edges) >>> fdoor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
91
+ page_content='draw("LR") Figure 2: Front-door model visualized using built-in capability.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
92
+ page_content=' An ADMG can imply certain testable independence statements (amongst other general constraints) that can be read via m-separation (Richardson, 2003).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
93
+ page_content=' For example, we can verify that age is m-separated from bp given smoke implying age ⊥⊥ bp | smoke.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
94
+ page_content=' >>> fdoor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
95
+ page_content='m_separated("age", "bp", ["smoke"]) True An analyst may verify whether the data supports such assumptions using any standard conditional independence test.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
96
+ page_content=' Assuming Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
97
+ page_content=' 2 is correct, the next step is to apply identifi- cation theory to determine whether the desired causal effect can be expressed as a function of observed data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
98
+ page_content=' Applying Ananke’s implementation of a sound and complete algorithm for identification in presence of unmeasured confounding (Richardson et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
99
+ page_content=', 2017) gives: >>> treatments = ["smoke"];' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
100
+ page_content=' outcomes = ["diabetes"] >>> id_fdoor = identification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
101
+ page_content="OneLineID(graph=fdoor, treatments=treatments, outcomes=outcomes) >>> print('Identifed =', id_fdoor." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
102
+ page_content="id(), ';" metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
103
+ page_content=" Functional =', id_fdoor." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
104
+ page_content='functional()) Identifed = True Functional = Σagebp φdiabetessmokebp(p(V);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
105
+ page_content='G) φsmokediabetesage(p(V);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
106
+ page_content='G) φsmokebpage(p(V);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
107
+ page_content='G) 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
108
+ page_content=' The teaching extract of the Framingham Heart Study can be requested from https://biolincc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
109
+ page_content='nhlbi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
110
+ page_content=' nih.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
111
+ page_content='gov/teaching/.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
112
+ page_content=' 3 Lee, Bhattacharya, Nabi, and Shpitser That is, the counterfactual distribution p(diabetes(smoke)), and hence the effect, is indeed identified.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
113
+ page_content=' Interpreting the output based on Richardson et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
114
+ page_content=' (2017) gives p(diabetes(smoke)) = � age,bp p(bp | smoke)p(age) � � smoke′ p(diabetes | smoke′, bp, age)p(smoke′ | age) � .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
115
+ page_content=' While the focus of this analysis is on identification under unmeasured confounding, Ananke also implements identification algorithms for missing data (Bhattacharya et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
116
+ page_content=', 2019b;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
117
+ page_content=' Nabi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
118
+ page_content=', 2020), selection bias, and data fusion (Lee et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
119
+ page_content=', 2020;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
120
+ page_content=' Lee and Shpitser, 2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
121
+ page_content=' After identification, we may choose from a variety of estimation strategies offered in Ananke.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
122
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
123
+ page_content='1 Linear Gaussian Structural Equation Models One possible choice is to assume a linear structural equation model with correlated errors (Wright, 1934).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
124
+ page_content=' In Ananke, we implement the iterative algorithm described in Drton et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
125
+ page_content=' (2009) to obtain maximum likelihood estimates for all edge coefficients;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
126
+ page_content=' causal effects are then computed via path analysis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
127
+ page_content=' Applying this to standardized Framingham data gives: Age Smoke 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
128
+ page_content='19 Diabetes 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
129
+ page_content='11 BP 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
130
+ page_content='05 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
131
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
132
+ page_content='08 >>> lsm = LinearGaussianSEM(front_door) >>> lsm = lsm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
133
+ page_content='fit(df_cont) >>> lsm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
134
+ page_content='draw(direction="LR") >>> lsm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
135
+ page_content='total_effect(["smoke"], ["diabetes"]) ACE: -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
136
+ page_content='004 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
137
+ page_content='2 M¨obius Parameterization for Discrete Data An alternative is to use the M¨obius parameterization of the observed data likelihood, which assumes all observed variables are discrete (Evans and Richardson, 2012).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
138
+ page_content=' We implement a coordinate descent algorithm to compute maximum likelihood estimates for the M¨obius parameters (which may be variationally dependent in general.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
139
+ page_content=') Using binary versions of variables in the dataset, we obtain the following result for the average causal effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
140
+ page_content=' >>> bnm = binary_nested.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
141
+ page_content='BinaryNestedModel(front_door) >>> bnm = bnm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
142
+ page_content='fit(X=binary_nested.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
143
+ page_content='process_data(df_bin), tol=1e-12 ) >>> pY1_A0 = bnm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
144
+ page_content='estimate(treatment_dict={"smoke": 0}, outcome_dict={"diabetes": 1}) >>> pY1_A1 = bnm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
145
+ page_content='estimate(treatment_dict={"smoke": 1}, outcome_dict={"diabetes": 1}) >>> print("ACE: ", pY1_A1 - pY1_A0) ACE: 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
146
+ page_content='004 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
147
+ page_content='3 Semiparametric Estimation of Causal Effects If the effect is identified, Ananke lists several semiparametric estimation strategies, proposed by Bhattacharya et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
148
+ page_content=' (2022), and suggests the best one according to semiparametric effi- ciency theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
149
+ page_content=' The implementation only requires specification of the ADMG, treatment, and outcome.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
150
+ page_content=" Using Ananke’s suggestion of efficient augmented primal IPW estimator gives: >>> ace_obj = CausalEffect(graph=front_door, treatment='smoke', outcome='diabetes') >>> ace = ace_obj." metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
151
+ page_content='compute_effect(df_bin, "eff-apipw");' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
152
+ page_content=' print("ACE: ", ace) ACE: -0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
153
+ page_content='002 Acknowledgments 4 Ananke We thank Preethi Prakash and Ranjani Srinivasan for contributions to Ananke, and Carson Kurtz for assisting R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
154
+ page_content='B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
155
+ page_content=' in testing code.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
156
+ page_content=' References Philipp Bach, Victor Chernozhukov, Malte S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
157
+ page_content=' Kurz, and Martin Spindler.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
158
+ page_content=' DoubleML – An object-oriented implementation of double machine learning in Python.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
159
+ page_content=' Journal of Machine Learning Research, 23(53):1–6, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
160
+ page_content=' URL http://jmlr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
161
+ page_content='org/papers/v23/ 21-0862.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
162
+ page_content='html.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
163
+ page_content=' Rohit Bhattacharya, Daniel Malinsky, and Ilya Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
164
+ page_content=' Causal inference under interfer- ence and network uncertainty.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
165
+ page_content=' In Proceedings of the 35th Conference on Uncertainty in Artificial Intelligence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
166
+ page_content=' AUAI Press, 2019a.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
167
+ page_content=' Rohit Bhattacharya, Razieh Nabi, Ilya Shpitser, and James M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
168
+ page_content=' Robins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
169
+ page_content=' Identification in missing data models represented by directed acyclic graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
170
+ page_content=' In Proceedings of the 35th Conference on Uncertainty in Artificial Intelligence.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
171
+ page_content=' AUAI Press, 2019b.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
172
+ page_content=' Rohit Bhattacharya, Razieh Nabi, and Ilya Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
173
+ page_content=' Semiparametric inference for causal effects in graphical models with hidden variables.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
174
+ page_content=' Journal of Machine Learning Research, 23:1–76, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
175
+ page_content=' Sanjay Chaudhuri, Mathias Drton, and Thomas S Richardson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
176
+ page_content=' Estimation of a covariance matrix with zeros.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
177
+ page_content=' Biometrika, 94(1):199–216, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
178
+ page_content=' David Roxbee Cox and Nanny Wermuth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
179
+ page_content=' Multivariate dependencies: Models, analysis and interpretation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
180
+ page_content=' Chapman and Hall/CRC, 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
181
+ page_content=' Jeremy R Coyle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
182
+ page_content=' tmle3: The extensible TMLE framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
183
+ page_content=' https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
184
+ page_content='com/tlverse/ tmle3, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
185
+ page_content=' URL https://doi.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
186
+ page_content='org/10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
187
+ page_content='5281/zenodo.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
188
+ page_content='4603358.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
189
+ page_content=' R package version 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
190
+ page_content='2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
191
+ page_content='0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
192
+ page_content=' Mathias Drton, Michael Eichler, and Thomas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
193
+ page_content=' Richardson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
194
+ page_content=' Computing maximum like- lihood estimates in recursive linear models with correlated errors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
195
+ page_content=' Journal of Machine Learning Research, 10(10), 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
196
+ page_content=' John Ellson, Emden Gansner, Lefteris Koutsofios, Stephen C North, and Gordon Wood- hull.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
197
+ page_content=' Graphviz—open source graph drawing tools.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
198
+ page_content=' In International Symposium on Graph Drawing, pages 483–484.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
199
+ page_content=' Springer, 2001.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
200
+ page_content=' Robin J Evans.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
201
+ page_content=' ADMGs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
202
+ page_content=' https://www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
203
+ page_content='stats.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
204
+ page_content='ox.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
205
+ page_content='ac.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
206
+ page_content='uk/~evans/software.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
207
+ page_content='htm, 2013.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
208
+ page_content=' Robin J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
209
+ page_content=' Evans and Thomas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
210
+ page_content=' Richardson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
211
+ page_content=' Maximum likelihood fitting of acyclic directed mixed graphs to binary data.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
212
+ page_content=' 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
213
+ page_content=' URL http://arxiv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
214
+ page_content='org/abs/1203.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
215
+ page_content='3479.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
216
+ page_content=' Aric Hagberg, Dan Schult, and Manos Renieris.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
217
+ page_content=' Pygraphviz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
218
+ page_content=' 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
219
+ page_content=' URL https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
220
+ page_content=' com/pygraphviz/pygraphviz.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
221
+ page_content=' 5 Lee, Bhattacharya, Nabi, and Shpitser Diviyan Kalainathan, Olivier Goudet, and Ritik Dutta.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
222
+ page_content=' Causal discovery toolbox: Uncov- ering causal relationships in python.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
223
+ page_content=' Journal of Machine Learning Research, 21(37):1–5, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
224
+ page_content=' Markus Kalisch, Martin M¨achler, Diego Colombo, Marloes H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
225
+ page_content=' Maathuis, and Peter B¨uhlmann.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
226
+ page_content=' Causal inference using graphical models with the R package pcalg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
227
+ page_content=' Jour- nal of Statistical Software, 47:1–26, 2012.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
228
+ page_content=' William B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
229
+ page_content=' Kannel and Tavia Gordon.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
230
+ page_content=' The Framingham Study: an epidemiological inves- tigation of cardiovascular disease.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
231
+ page_content=' Number 9-13.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
232
+ page_content=' Department of Health, Education, and Welfare, 1968.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
233
+ page_content=' Ed Kennedy.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
234
+ page_content=' npcausal: Nonparametric causal inference methods.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
235
+ page_content=' https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
236
+ page_content='com/ ehkennedy/npcausal, 2021.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
237
+ page_content=' Steffen L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
238
+ page_content=' Lauritzen.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
239
+ page_content=' Graphical Models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
240
+ page_content=' Oxford, U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
241
+ page_content='K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
242
+ page_content=': Clarendon, 1996.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
243
+ page_content=' Steffen L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
244
+ page_content=' Lauritzen and Thomas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
245
+ page_content=' Richardson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
246
+ page_content=' Chain graph models and their causal inter- pretations.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
247
+ page_content=' Journal of the Royal Statistical Society: Series B (Statistical Methodology), 64(3):321–348, 2002.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
248
+ page_content=' Jaron J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
249
+ page_content=' R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
250
+ page_content=' Lee and Ilya Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
251
+ page_content=' Identification methods with arbitrary interventional distributions as inputs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
252
+ page_content=' arXiv preprint arXiv:2004.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
253
+ page_content='01157, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
254
+ page_content=' Sanghack Lee, Juan D Correa, and Elias Bareinboim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
255
+ page_content=' General identifiability with arbitrary surrogate experiments.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
256
+ page_content=' In Uncertainty in artificial intelligence, pages 389–398.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
257
+ page_content=' PMLR, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
258
+ page_content=' Razieh Nabi, Rohit Bhattacharya, and Ilya Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
259
+ page_content=' Full law identification in graphical models of missing data: completeness results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
260
+ page_content=' In International Conference on Machine Learning, pages 7153–7163.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
261
+ page_content=' PMLR, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
262
+ page_content=' Elizabeth L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
263
+ page_content=' Ogburn, Ilya Shpitser, and Youjin Lee.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
264
+ page_content=' Causal inference, social networks and chain graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
265
+ page_content=' Journal of the Royal Statistical Society: Series A (Statistics in Society), 183(4):1659–1676, 2020.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
266
+ page_content=' Judea Pearl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
267
+ page_content=' Causality.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
268
+ page_content=' Cambridge University Press, 2009.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
269
+ page_content=' Thomas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
270
+ page_content=' Richardson.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
271
+ page_content=' Markov properties for acyclic directed mixed graphs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
272
+ page_content=' Scandinavian Journal of Statistics, 30(1):145–157, 2003.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
273
+ page_content=' Thomas S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
274
+ page_content=' Richardson, Robin J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
275
+ page_content=' Evans, James M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
276
+ page_content=' Robins, and Ilya Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
277
+ page_content=' Nested Markov properties for acyclic directed mixed graphs, 2017.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
278
+ page_content=' Working paper.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
279
+ page_content=' James M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
280
+ page_content=' Robins.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
281
+ page_content=' A new approach to causal inference in mortality studies with a sus- tained exposure period – application to control of the healthy worker survivor effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
282
+ page_content=' Mathematical Modelling, 7(9-12):1393–1512, 1986.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
283
+ page_content=' Richard Scheines, Peter Spirtes, Clark Glymour, Christopher Meek, and Thomas Richard- son.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
284
+ page_content=' The tetrad project: Constraint based aids to causal model specification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
285
+ page_content=' Multivariate Behavioral Research, 33(1):65–117, 1998.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
286
+ page_content=' 6 Ananke Ilya Shpitser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
287
+ page_content=' Segregated graphs and marginals of chain graph models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
288
+ page_content=' In Advances in Neural Information Processing Systems, pages 1720–1728, 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
289
+ page_content=' Peter L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
290
+ page_content=' Spirtes, Clark N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
291
+ page_content=' Glymour, and Richard Scheines.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
292
+ page_content=' Causation, Prediction, and Search.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
293
+ page_content=' MIT press, 2000.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
294
+ page_content=' Thomas Verma and Judea Pearl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
295
+ page_content=' Equivalence and synthesis of causal models.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
296
+ page_content=' In Proceedings of the 6th Annual Conference on Uncertainty in Artificial Intelligence, 1990.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
297
+ page_content=' Sewall Wright.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
298
+ page_content=' Correlation and causation.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
299
+ page_content=' Journal of Agricultural Research, 20:557–580, 1921.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
300
+ page_content=' Sewall Wright.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
301
+ page_content=' The method of path coefficients.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
302
+ page_content=' Annals of Mathematical Statistics, 5(3): 161–215, 1934.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
303
+ page_content=' Paul Zevich.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
304
+ page_content=' zEpid: An epidemiology analysis toolkit.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
305
+ page_content=' https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
306
+ page_content='com/pzivich/ zepid/, 2018.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
307
+ page_content=' Python package.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
308
+ page_content=' Kun Zhang, Joseph Ramsey, Mingming Gong, Ruichu Cai, Shohei Shimizu, Pe- ter Spirtes, Clark Glymour, et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
309
+ page_content=' causal-learn: Causal Discovery for Python.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
310
+ page_content=' https://github.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
311
+ page_content='com/cmu-phil/causal-learn, 2022.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
312
+ page_content=' 7' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/UdFJT4oBgHgl3EQfNSxs/content/2301.11477v1.pdf'}
VNE4T4oBgHgl3EQfnQ0i/content/tmp_files/2301.05174v1.pdf.txt ADDED
@@ -0,0 +1,888 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Scene-centric vs. Object-centric Image-Text
2
+ Cross-modal Retrieval: A Reproducibility Study
3
+ Mariya Hendriksen1[0000−0003−0314−2955], Svitlana
4
+ Vakulenko2[0000−0002−5278−8886]⋆, Ernst Kuiper3[0000−0002−8075−4894], and Maarten
5
+ de Rijke4[0000−0002−1086−0202]
6
+ 1 AIRLab, University of Amsterdam, The Netherlands
7
8
+ 2 Amazon, Spain
9
10
+ 3 Bol.com, The Netherlands
11
12
+ 4 University of Amsterdam, The Netherlands
13
14
+ Abstract. Most approaches to cross-modal retrieval (CMR) focus either on ob-
15
+ ject-centric datasets, meaning that each document depicts or describes a single
16
+ object, or on scene-centric datasets, meaning that each image depicts or describes
17
+ a complex scene that involves multiple objects and relations between them. We
18
+ posit that a robust CMR model should generalize well across both dataset types.
19
+ Despite recent advances in CMR, the reproducibility of the results and their gen-
20
+ eralizability across different dataset types has not been studied before. We address
21
+ this gap and focus on the reproducibility of the state-of-the-art CMR results when
22
+ evaluated on object-centric and scene-centric datasets. We select two state-of-the-
23
+ art CMR models with different architectures: (i) CLIP; and (ii) X-VLM. Addi-
24
+ tionally, we select two scene-centric datasets, and three object-centric datasets,
25
+ and determine the relative performance of the selected models on these datasets.
26
+ We focus on reproducibility, replicability, and generalizability of the outcomes of
27
+ previously published CMR experiments. We discover that the experiments are not
28
+ fully reproducible and replicable. Besides, the relative performance results par-
29
+ tially generalize across object-centric and scene-centric datasets. On top of that,
30
+ the scores obtained on object-centric datasets are much lower than the scores ob-
31
+ tained on scene-centric datasets. For reproducibility and transparency we make
32
+ our source code and the trained models publicly available.
33
+ 1
34
+ Introduction
35
+ Cross-modal retrieval (CMR) is the task of finding relevant items across different modal-
36
+ ities. For example, given an image, find a text or vice versa. The main challenge in CMR
37
+ is known as the heterogeneity gap [5, 22]. Since items from different modalities have
38
+ different data types, the similarity between them cannot be measured directly. There-
39
+ fore, the majority of CMR methods published to date attempt to bridge this gap by
40
+ ⋆ Research conducted while the author was at the University of Amsterdam.
41
+ arXiv:2301.05174v1 [cs.IR] 12 Jan 2023
42
+
43
+ 2
44
+ M. Hendriksen et al.
45
+ learning a latent representation space, where the similarity between items from differ-
46
+ ent modalities can be measured [57].
47
+ In this work, we specifically focus on image-text CMR, which uses textual and
48
+ visual data. The retrieval task is performed on image-text pairs. In each image-text pair,
49
+ the text (often referred to as caption) describes the corresponding image it is aligned
50
+ with. For image-text CMR we use either an image or a text as a query [57]. Hence,
51
+ the CMR task that we address in this paper consists of two subtasks: (i) text-to-image
52
+ retrieval: given a text that describes an image, retrieve all the images that match this
53
+ description; and (ii) image-to-text retrieval: given an image, retrieve all texts that can
54
+ be used to describe this image.
55
+ Scene-centric vs. object-centric vs. datasets. Existing image datasets can be grouped
56
+ into scene-centric and object-centric datasets [48, 62]. The two types of dataset are
57
+ typically used for different tasks, viz. the tasks of scene and object understanding, re-
58
+ spectively. They differ in important ways that are of interest to us when evaluating
59
+ performance and generalization abilities of CMR models.
60
+ Scene-centric images depict complex scenes that typically feature multiple objects
61
+ and relations between them. These datasets contain image-text pairs, where, in each
62
+ pair, an image depicts a complex scene of objects and the corresponding text describes
63
+ the whole scene, often focusing on relations and activities.
64
+ Images in object-centric image datasets are usually focused on a single object of
65
+ interest that they primarily depict. This object is often positioned close to the center
66
+ of an image with other objects, optionally, in the background. Object-centric datasets
67
+ contain image-text pairs, where, in each pair, an image depicts an object of interest and
68
+ the corresponding text describes the depicted object and its (fine-grained) attributes.
69
+ To illustrate the differences between the two dataset types in CMR, we consider
70
+ the examples provided in Fig. 1 with an object-centric image-caption pair (left) and a
71
+ scene-centric image-caption pair (right). Note how the pairs differ considerably in terms
72
+ of the visual style and the content of the caption. The pair on the left focuses on a single
73
+ object (“pants”) and describes its fine-grained visual attributes (“multicolor,” “boho,”
74
+ “batic”). The pair on the right captures a scene describing multiple objects (“seagulls,”
75
+ “pier,” “people”) and relations between them (“sitting,” “watching”).
76
+ Research goals. We focus on (traditional) CMR methods that extract features from each
77
+ modality and learn a common representation space. Recent years have seen extensive
78
+ experimentation with such CMR methods, mostly organized into two groups: (i) con-
79
+ trastive experiments on object-centric datasets [17], and (ii) contrastive experiments
80
+ on scene-centric datasets [35]. In this paper, we consider representative state-of-the-art
81
+ CMR methods from both groups. We select two pre-trained models which demonstrate
82
+ state-of-the-art performance on CMR task and evaluate them in a zero-shot setting. In
83
+ line with designs used in prior reproducibility work on CMR [3] we select two models
84
+ for the study. Following the ACM terminology [1], we focus on reproducibility (differ-
85
+ ent team, same experimental setup) and replicability (different team, different exper-
86
+ imental setup) of previously reported results. And following Voorhees [55], we focus
87
+ on relative (a.k.a. comparative) performance results. In addition, for the reproducibility
88
+ experiment, we consider the absolute difference between the reported scores and the
89
+ reproduced scores.
90
+
91
+ Scene-centric vs. Object-centric Cross-modal Retrieval
92
+ 3
93
+ Multicolor boho batic pants
94
+ Seagulls sitting on the ledge of a pier
95
+ with people watching
96
+ Fig. 1: An object-centric (left) and a scene-centric (right) image-text pair. Sources:
97
+ Fashion200k (left); MS COCO (right).
98
+ We address the following research questions: (RQ1) Are published relative perfor-
99
+ mance results on CMR reproducible? This question matters because it allows us to
100
+ confirm the validity of reported results. We show that the relative performance results
101
+ are not fully reproducible. Specifically, the results are reproducible for one dataset, but
102
+ not for the other dataset).
103
+ We then shift to replicability and examine whether lessons learned on scene-centric
104
+ datasets transfer to object-centric datasets: (RQ2) To what extent are the published rel-
105
+ ative performance results replicable? That is, we investigate the validity of the reported
106
+ results when evaluated in a different setup. We find that relative performance results are
107
+ partially replicable, using other datasets.
108
+ After investigating the reproducibility and replicability of the results, we consider
109
+ the generalizability of the results. We contrastively evaluate the results on object-centric
110
+ and scene-centric datasets: (RQ3) Do relative performance results for state-of-the-art
111
+ CMR methods generalize from scene-centric datasets to object-centric datasets? We
112
+ discover that the relative performance results only partially generalize across the two
113
+ dataset types.
114
+ Main contributions. Our main contributions are: (i) We are one of the first to con-
115
+ sider reproducibility in the context of CMR and reproduce scene-centric CMR experi-
116
+ ments from two papers [44, 61] and find that the results are only partially reproducible.
117
+ (ii) We perform a replicability study and examine whether relative performance differ-
118
+ ences reported for CMR methods generalize from scene-centric datasets to object-cen-
119
+ tric datasets. (iii) We investigate the generalizability of obtained results and analyze the
120
+ effectiveness of pre-training on scene-centric datasets for improving the performance
121
+ of CMR on object-centric datasets, and vice versa. And, finally, (iv) to facilitate the
122
+ reproducibility of our work, we provide the code and the pre-trained models used in our
123
+ experiments.5
124
+ 5 https://github.com/mariyahendriksen/ecir23-object-centric-vs-s
125
+ cene-centric-CMR
126
+
127
+ 4
128
+ M. Hendriksen et al.
129
+ 2
130
+ Related Work
131
+ Cross-modal retrieval. CMR methods attempt to construct a multimodal representa-
132
+ tion space, where the similarity of concepts from different modalities can be measured.
133
+ Some of the earliest approaches in CMR utilised canonical correlation analysis [15, 26].
134
+ They were followed by a dual encoder architecture equiped with a recurrent and a con-
135
+ volutional component, a hinge loss [12, 58] and hard-negative mining [11]. Later on,
136
+ several attention-based architectures were introduced such as architectures with dual
137
+ attention [39], stacked cross-attention [31], bidirectional focal attention [36].
138
+ Another line of work proposed to use transformer encoders [54] for CMR task [38],
139
+ and adapted the BERT model [8] as a backbone [13, 67]. Some other researchers worked
140
+ on improving CMR via modality-specific graphs [56], or image and text generation
141
+ modules [16].
142
+ There is also more domain-specific work that focused on CMR in fashion [14, 28–
143
+ 30], e-commerce [19, 20], cultural heritage [49] and cooking [56].
144
+ In contrast to the majority of prior work on the topic, we focus on the reproducibil-
145
+ ity, replicability, and generalizability of CMR methods. In particular, we explore the
146
+ state-of-the-art models designed for the CMR task by examining their performance on
147
+ scene-centric and object-centric datasets.
148
+ Scene-centric and object-centric datasets. The majority of prior work related to object-
149
+ centric and scene-centric datasets focuses on computer vision tasks such as object
150
+ recognition, object classification, and scene recognition. Herranz et al. [21] investi-
151
+ gated biases in a CNN when trained on scene-centric versus object-centric datasets and
152
+ evaluated on the task of object classification.
153
+ In the context of object detection, prior work focused on combining feature repre-
154
+ sentations learned from object-centric and scene-centric datasets to improve the perfor-
155
+ mance when detecting small objects [48], and using object-centric images to improve
156
+ the detection of objects that do not appear frequently in complex scenes [62]. Finally,
157
+ for the task of scene recognition, Zhou et al. [66] explored the quality of feature rep-
158
+ resentations learned from both scene-centric and object-centric datasets and applied to
159
+ the task of scene recognition.
160
+ Unlike prior work on the topic, in this paper, we focus on both scene-centric and
161
+ object-centric datasets for evaluation on CMR task. In particular, we explore how state-
162
+ of-the-art (SOTA) CMR models perform on object-centric and scene-centric datasets.
163
+ Reproducibility in cross-modal retrieval. To the best of our knowledge, despite the
164
+ popularity of the CMR task, there are very few papers that focus on reproducibility
165
+ of research in CMR. Some rare (recent) examples include [3], where the authors sur-
166
+ vey metric learning losses used in computer vision and explore their applicability for
167
+ CMR. Rao et al. [45] analyze contributing factors that affect the performance of the
168
+ state-of-the-art CMR models. However, all prior work focuses on exploring model per-
169
+ formance only on two popular scene-centric datasets: Microsoft COCO (MS COCO)
170
+ and Flickr30k.
171
+ In contrast, in this work, we take advantage of the diversity of the CMR datasets and
172
+ specifically focus on examining how the state-of-the-art CMR models perform across
173
+ different dataset types: scene-centric and object-centric datasets.
174
+
175
+ Scene-centric vs. Object-centric Cross-modal Retrieval
176
+ 5
177
+ 3
178
+ Task Definition
179
+ We follow the same notation as in previous work [4, 53, 65]. An image-caption cross-
180
+ modal dataset consists of a set of images I and texts T where the images and texts are
181
+ aligned as image-text pairs: D = {(x1
182
+ I, x1
183
+ T ), ..., (xn
184
+ I, xn
185
+ T )}.
186
+ The cross-modal retrieval (CMR) task is defined analogous to the standard informa-
187
+ tion retrieval task: given a query q and a set of m candidates Ωq = {x1, . . . , xm} we
188
+ aim to rank all the candidates w.r.t. their relevance to the query q. In CMR, the query
189
+ can be either a text qT or an image qI: q ∈ {qT , qI}. Similarly, the set of candidate
190
+ items can be either visual Iq ⊂ I, or textual Tq ⊂ T data: Ω ∈ {Iq, Tq}.
191
+ The CMR task is performed across modalities, therefore, if the query is a text then
192
+ the set of candidates are images, and vice versa. Hence, the task comprises effectively
193
+ two subtasks: (i) text-to-image retrieval: given a textual query qT and a set of candidate
194
+ images Ω ⊂ I, we aim to rank all instances in the set of candidate items Ω w.r.t. their
195
+ relevance to the query qT ; (ii) image-to-text retrieval: given an image as a query qI
196
+ and a set of candidate texts Ω ⊂ T , we aim to rank all instances in the set of candidate
197
+ items Ω w.r.t. their relevance to the query qI.
198
+ 4
199
+ Methods
200
+ In this section, we give an overview of the models included in the study, of the models
201
+ which were excluded, and provide justification for it. All the approaches we focus on
202
+ belong to the traditional CMR framework and comprise two stages. First, we extract
203
+ textual and visual features. The features are typically extracted with a textual encoder
204
+ and a visual encoder. Next, we learn a latent representation space where the similarity
205
+ of items from different modalities can be measured directly.
206
+ 4.1
207
+ Methods included for comparison
208
+ We focus on CMR in zero-shot setting, hence, we only consider pre-trained models.
209
+ Therefore, we focus on the models that are released for public use. Besides, as explained
210
+ in Section 1, we follow prior reproducibility work to inform our experimental choices
211
+ regarding the number of models. Given the above-mentioned requirements, we selected
212
+ two methods that demonstrate state-of-the-art performance on the CMR task: CLIP and
213
+ X-VLM.
214
+ Contrastive Language-Image Pretraining (CLIP) [44]. This model is a dual encoder
215
+ that comprises an image encoder, and a text encoder. The model was pre-trained in a
216
+ contrastive manner using a symmetric loss function. It is trained on 400 million image-
217
+ caption pairs scraped from the internet. The text encoder is a transformer [54] with
218
+ modification from [43]. For the image encoder, the authors present two architectures.
219
+ The first one is based on ResNet [18] and it is represented in five variants in total.
220
+ The first two options are ResNet-50, ResNet-101; the last three options are variants of
221
+ ResNet scaled up in the style of EfficientNet [51] The second image encoder architec-
222
+ ture is a Vision Transofrmer (ViT) [9]. It is presented in three variants: ViT-B/32, a
223
+ ViT-B/16, and a ViT-L/14. The CMR results reported in the original paper are obtained
224
+
225
+ 6
226
+ M. Hendriksen et al.
227
+ with a model configuration where vision transformer ViT-L/14 is used as an image en-
228
+ coder, and the text transformer is a text encoder. Hence, we use this configuration in our
229
+ experiments.
230
+ X-VLM [61]. This model consists of three encoders: an image encoder, a text encoder,
231
+ and a cross-modal encoder. The image and text encoder take an image and text as inputs
232
+ and output their visual and textual representations. The cross-modal encoder fuses the
233
+ output of the image encoder and the output of the text encoder. The fusion is done via
234
+ a cross-attention mechanism. For CMR task, the model is fine-tuned via a contrastive
235
+ learning loss and a matching loss. All encoders are transformer-based. The image en-
236
+ coder is a ViT initialised with Swin Transformerbase [37]. Both the text encoder and the
237
+ cross-modal encoder are initialised using different layers of BERT [8]: the text encoder
238
+ is initialized using the first six layers, whereas the cross-modal encoder is initialised
239
+ using the last six layers.
240
+ 4.2
241
+ Methods excluded from comparison
242
+ While selecting the models for the experiments, we considered other architectures with
243
+ promising performance on the MS COCO and the Flickr30k datasets. Below, we outline
244
+ the architectures we considered and explain why they were not included.
245
+ Several models such as Visual N-Grams [32], Unicoder-VL [33], ViLT-B/32 [25],
246
+ UNITER [6] were excluded because they were consistently outperformed by CLIP
247
+ on the MS COCO and Flickr30k datasets by large margins. Besides, we excluded
248
+ ImageBERT [42] because it was outperformed by CLIP on the MS COCO dataset.
249
+ ALIGN [23], ALBEF [34], VinVL [64], METER [10] were not included because X-
250
+ VLM consistently outperformed them. UNITER [6] was beaten by both CLIP and X-
251
+ VLM. We did not include other well-performing models such as ALIGN [23], Flamin-
252
+ go [2], CoCa [60] because the pre-trained models were not publicly available.
253
+ 5
254
+ Experimental Setup
255
+ In this section, we discuss our experimental design including the choice of datasets,
256
+ subtasks, metrics, and implementation details.
257
+ 5.1
258
+ Datasets
259
+ We run experiments on two scene-centric and three object-centric datasets. Below, we
260
+ discuss each of the datasets in more detail.
261
+ Scene-centric datasets. We experiment with two scene-centric datasets: (i) Microsoft
262
+ COCO (MS COCO) [35] contains 123,287 images depicting regular scenes from ev-
263
+ eryday life with multiple objects placed in their natural contexts. There are 91 different
264
+ object types such as “person”, “bicycle”, “apple”. (ii) Flickr30k contains 31,783 im-
265
+ ages of regular scenes from everyday life, activities, and events. For both scene-centric
266
+ datasets, we use the splits provided in [24]. The MS COCO dataset is split into 113,287
267
+ images for training, 5,000 for testing and 5,000 for validation; the Flickr30k dataset has
268
+
269
+ Scene-centric vs. Object-centric Cross-modal Retrieval
270
+ 7
271
+ 29,783 images for training, 1,000 for testing and 1,000 for validation. In both datasets,
272
+ every image was annotated with five captions using Amazon Mechanical Turk. Besides,
273
+ we select one caption per image randomly, and use the test set for our experiments.
274
+ Object-centric datasets. We consider three object-centric datasets in our experiments:
275
+ (i) Caltech-UCSD Birds 200 (CUB-200) [59] contains 11,788 images of 200 birds
276
+ species. Each image is annotated with a fine-grained caption from [46]. We selected
277
+ one caption per image randomly. Each caption is at least 10 words long and does
278
+ not contain any information about the birds’ species or actions. (ii) Fashion200k con-
279
+ tains 209,544 images that depict various fashion items in five product categories (dress,
280
+ top, pant, skirt, jacket) and their corresponding descriptions. (iii) Amazon Berkley Ob-
281
+ jects (ABO) [7] contains 147,702 product listings associated with 398,212 images. This
282
+ dataset was derived from Amazon.com product listings. We selected one image per list-
283
+ ing and used the associated product description as its caption. The majority of images
284
+ depict a single product on a white background. The product is located in the center of
285
+ the image and takes at least 85% of the image area. For all object-centric datasets, we
286
+ use the splits provided by the dataset authors and use the test split for our experiments.
287
+ 5.2
288
+ Subtasks
289
+ Our goal is to assess and compare the performance of the CMR methods (described in
290
+ Section 5) across the object-centric and scene-centric datasets described in the previous
291
+ subsection. We design an experimental setup that takes into account two CMR subtasks
292
+ and two dataset types. It can be summarized using a tree with branches that correspond
293
+ to different configurations (see Fig. 2). We explain how we cover the branches of this
294
+ tree in the next subsection.
295
+ The tree starts with a root (“Image-text CMR” with label 0) that has sixteen de-
296
+ scendants, in total. The root node has two children corresponding to the two image-text
297
+ CMR subtasks: a text-to-image retrieval (node 1) and image-to-text retrieval (node 2).
298
+ Since we want to evaluate each of these subtasks on both object-centric and scene-
299
+ centric datasets, nodes 1 and 2 also have two children each, i.e., the nodes {3, 4, 5, 6}.
300
+ Finally, every object-centric node has three children: CUB-200, Fashion200k, and ABO
301
+ datasets {7, 8, 9, 12, 13, 14}; and every scene-centric node has two children: MS COCO
302
+ and Flickr30k datasets {10, 11, 15, 16}.
303
+ 5.3
304
+ Experiments
305
+ To answer the research questions introduced in Section 1, we conduct two experiments.
306
+ In all the experiments, we use CLIP and X-VLM models in a zero-shot setting. Fol-
307
+ lowing [55], we focus on relative performance results. In each experiment, we consider
308
+ different subtrees from Fig. 2. Following [25, 32, 33, 44, 61], we use Recall@K where
309
+ K = {1, 5, 10} to evaluate the model performance in all our experiments. In addition,
310
+ following [50, 52, 63], we calculate the sum of recalls (rsum) for text-to-image, and
311
+ image-to-text retrieval tasks as well as the total sum of recalls for both tasks.
312
+ For text-to-image retrieval, we first obtain representations for all the candidate im-
313
+ ages by passing them through the image encoder of the model. Then we pass each
314
+
315
+ 8
316
+ M. Hendriksen et al.
317
+ CUB-200
318
+ Fashion200k
319
+ ABO
320
+ MS COCO
321
+ Flickr30k
322
+ Image-text
323
+ CMR
324
+ Image-to-text
325
+ retrieval
326
+ Object-centric
327
+ Scene-centric
328
+ Text-to-image
329
+ retrieval
330
+ Object-centric
331
+ Scene-centric
332
+ CUB-200
333
+ Fashion200k
334
+ ABO
335
+ MS COCO
336
+ Flickr30k
337
+ 1
338
+ 3
339
+ 0
340
+ 2
341
+ 4
342
+ 5
343
+ 6
344
+ 7
345
+ 8
346
+ 9
347
+ 10
348
+ 11
349
+ 12
350
+ 13
351
+ 14
352
+ 15
353
+ 16
354
+ Fig. 2: Our experimental design for evaluating CMR methods across object-centric and
355
+ scene-centric datasets. The blue colour indicates parts of the tree used in Experiment 1,
356
+ the green color indicates parts of the tree used in Experiment 2, and the red color indi-
357
+ cates parts used in all experiments. (Best viewed in color.)
358
+ textual query through the text encoder of the model and retrieve the top-k candidates
359
+ ranked by cosine similarity w.r.t. the query.
360
+ For image-to-text retrieval, we do the reverse, using the texts as candidates and im-
361
+ ages as queries. More specifically, we start by obtaining representations of the candidate
362
+ captions by passing them through the text encoder. Afterwards, for each of the visual
363
+ queries, we pass the query through the image encoder and retrieve top-k candidates
364
+ ranked by cosine similarity w.r.t. the query.
365
+ In Experiment 1 we evaluate the reproducibility of the CMR results reported in the
366
+ original publications (RQ1). Both models we consider (CLIP and X-VLM) were origi-
367
+ nally evaluated on two scene-centric datasets, viz. MS COCO and Flickr30k. Therefore,
368
+ for our reproducibility study, we also evaluate these models on these two datasets. We
369
+ evaluate both text-to-image and image-to-text retrieval. That is, we focus on the two
370
+ sub-trees 0←1←4←{10, 11} and 0←2←6←{15, 16} (the red and blue parts of the
371
+ tree) from Fig. 2. In addition to relative performance results, we consider absolute dif-
372
+ ferences between the reported scores and the reproduced scores. Following Petrov and
373
+ Macdonald [41], we assume that the score is reproduced if we obtain a score value equal
374
+ to the reported score given a relative tolerance of ±5%.
375
+ In Experiment 2 we focus on the replicability of the reported results on object-
376
+ centric datasets (RQ2). Thus, we evaluate CLIP and X-VLM on the CUB-200, Fash-
377
+ ion200k, and ABO datasets. This experiment covers the subtrees 0←1←3←{7, 8, 9}
378
+ and 0←2 ←5←{12, 13, 14} (the red and green parts of the tree) in Fig. 2.
379
+ After obtaining the results from Experiment 1 and 2, we examine the generaliz-
380
+ ability of the obtained scores (RQ3). We do so by comparing the relative performance
381
+ results the models achieve on the object-centric versus scene-centric datasets. More
382
+ specifically, we compare the relative performance of CLIP and X-VLM on CUB-200,
383
+ Fashion200k, ABO with their relative performance on MS COCO and Flickr30k. Thus,
384
+ this experiment captures the complete tree in Fig. 2.
385
+
386
+ Scene-centric vs. Object-centric Cross-modal Retrieval
387
+ 9
388
+ Table 1: Results of Experiment 1 (reproducibility study), using the MS COCO and
389
+ Flickr30k datasets. “Orig.” indicates the scores from the original publications. “Repr.”
390
+ indicates the scores that we obtained.
391
+ Text-to-image
392
+ Image-to-text
393
+ Rsum
394
+ Model
395
+ R@1 R@5 R@10 R@1 R@5 R@10
396
+ t2i
397
+ i2t
398
+ total
399
+ MS COCO (5k)
400
+ Orig.
401
+ CLIP [44]
402
+ 37.80 62.40 72.20
403
+ 58.40 81.50 88.10
404
+ 172.40 228.00 400.40
405
+ X-VLM [61] 55.60 82.70 90.00
406
+ 70.80 92.10 96.50
407
+ 228.30 259.40 487.70
408
+ Repr.
409
+ CLIP
410
+ 21.59 40.22 49.80
411
+ 24.36 44.13 53.41
412
+ 111.61 121.90 233.51
413
+ X-VLM
414
+ 42.79 67.61 67.64
415
+ 64.60 84.48 84.50
416
+ 178.04 233.58 411.62
417
+ Flickr30k (1k)
418
+ Orig.
419
+ CLIP [44]
420
+ 68.70 90.60 95.20
421
+ 88.00 98.70 99.40
422
+ 254.50 286.10 540.60
423
+ X-VLM [61] 71.90 93.30 96.40
424
+ 85.30 97.80 99.60
425
+ 261.60 282.70 544.30
426
+ Repr.
427
+ CLIP
428
+ 74.95 93.09 96.15
429
+ 77.02 94.18 96.84
430
+ 264.19 268.04 532.23
431
+ X-VLM
432
+ 37.82 82.36 82.48
433
+ 63.30 91.10 91.10
434
+ 202.66 245.50 448.16
435
+ 6
436
+ Results
437
+ We focus on the reproducibility (different team, same setup) and replicability (different
438
+ team, different setup) of the CMR experiments reported in the original papers devoted
439
+ to CLIP [44] and X-VLM [61]. To organize our result presentation, we refer to the tree
440
+ in Fig. 2. We traverse the tree bottom up, from the leaves to the root.
441
+ 6.1
442
+ RQ1: Reproducibility
443
+ To address RQ1, we report on the outcomes of Experiment 1. We investigate to what
444
+ extent the CMR results reported in the original papers devoted to CLIP [44] and X-
445
+ VLM [61] are reproducible. Given that both methods were originally evaluated on two
446
+ scene-centric datasets, viz. MS COCO and Flickr30k, we evaluate the models on the
447
+ text-to-image and image-to-text tasks on these two datasets. Therefore, we focus on the
448
+ two blue sub-trees 0←1←4←{10, 11} and 0←2←6←{15, 16} from Fig. 2.
449
+ Results. The results of Experiment 1 are shown in Table 1. We recall the scores obtained
450
+ in the original papers [44, 61] (“Orig.”) and the scores that we obtained (“Repr.”), on
451
+ the MS COCO and Flickr30k datasets. Across the board, the scores that we obtained
452
+ (the “reproduced scores”) tend to be lower than the scores obtained in the original pub-
453
+ lications (the “original scores”).
454
+ On the MS COCO dataset, X-VLM consistently outperforms CLIP, both in the orig-
455
+ inal publications and in our setup, for both the text-to-image and the image-to-text tasks.
456
+ Moreover, this holds for all R@n metrics, and, hence, for the Rsum metrics. Interest-
457
+ ingly, the relative gains that we obtain tend to be larger than the ones obtained in the
458
+ original publications. For example, our biggest relative difference is for the image-to-
459
+ text task in terms of the R@1 metric: according to the scores reported in [44, 61],
460
+
461
+ 10
462
+ M. Hendriksen et al.
463
+ X-VLM outperforms CLIP by 21%, whereas in our experiments the relative gain is
464
+ 165%.
465
+ On average, the original CLIP scores are as much as ∼70% higher than the repro-
466
+ duced scores; the original scores for X-VLM are ∼20% higher than the reproduced
467
+ ones. When considering the absolute differences between the original scores and the
468
+ reproduced scores and assuming a relative tolerance of ±5%, we see that, on the MS
469
+ COCO dataset, the scores are not reproducible for both models.
470
+ On the Flickr30k dataset, we see a different pattern. For the text-to-image task, the
471
+ original results indicate that X-VLM consistently outperforms CLIP, on all R@n met-
472
+ rics, but according to our results, the relative order is consistently reversed. For the
473
+ image-to-text task, we obtained mixed outcomes: for R@1 and R@5, the original order
474
+ (CLIP outperforms X-VLM) is confirmed, but for R@10 the order is swapped. Accord-
475
+ ing to our experimental results, however, CLIP consistently outperforms X-VLM on all
476
+ tasks, and on all R@n metrics (and hence also on the Rsum metrics).
477
+ On the Flickr30k dataset, the CLIP scores are reproduced on the text-to-image and
478
+ image-to-text retrieval tasks when the model is evaluated on R@5 and R@10. On the
479
+ text-to-image task, the reproduced R@5 score is 2.7% higher than the original score;
480
+ the reproduced R@10 score is 1% higher than the original score. For the image-to-
481
+ text retrieval task, the reproduced R@5 score is 4% lower than the original score; the
482
+ reproduced R@10 score is 2% lower than the original score.
483
+ Answer to RQ1. In the case of the CLIP model, the obtained absolute scores were
484
+ reproducible only on the Flickr30k dataset for the text-to-image and the image-to-text
485
+ tasks when evaluated on R@5 and R@10. For X-VLM, we did not find the absolute
486
+ scores obtained when evaluating the model on the MS COCO and Flickr20k datasets to
487
+ be reproducible, neither for the text-to-image nor the image-to-text tasks.
488
+ The relative outcomes on the MS COCO dataset could be reproduced, for all tasks
489
+ and metrics, whereas on the Flickr30k dataset they could only partially be reproduced,
490
+ that is, only for the image-to-text task on the R@1 and R@5 metrics; for the text-
491
+ to-image task, X-VLM outperforms CLIP according to the original scores, but CLIP
492
+ outperforms X-VLM according to our reproduced scores.
493
+ Upshot. As explained in Section 4, in this paper we focus on CMR in a zero-shot set-
494
+ ting. This implies that the differences that we observed between the original scores and
495
+ the reproduced scores must be due to differences in text and image data (pre-)processing
496
+ and loading. We, therefore, recommend that the future work includes (as much as is
497
+ practically possible) tools and scripts used in these stages of the experiment with the
498
+ publication of its implementations.
499
+ 6.2
500
+ RQ2: Replicability
501
+ To answer RQ2, we replicate the originally reported text-to-image and image-to-text
502
+ retrieval experiments in a different setup, i.e., by evaluating CLIP and X-VLM using
503
+ object-centric datasets instead of scene-centric datasets. Thus, we evaluate CLIP and X-
504
+ VLM on the CUB-200, Fashion200k, and ABO datasets and focus on the green subtrees
505
+ 0←1←3←{7, 8, 9} and 0←2←5←{12, 13, 14} from Fig. 2.
506
+ Results. The results of Experiment 2 (aimed at answering RQ2) can be found in Ta-
507
+
508
+ Scene-centric vs. Object-centric Cross-modal Retrieval
509
+ 11
510
+ Table 2: Results of Experiment 2 (replicability study), using the CUB-200, Fash-
511
+ ion200k, and ABO datasets.
512
+ Text-to-image
513
+ Image-to-text
514
+ Rsum
515
+ Model
516
+ R@1 R@5 R@10 R@1 R@5 R@10
517
+ t2i
518
+ i2t
519
+ total
520
+ CUB-200
521
+ CLIP
522
+ 0.71
523
+ 2.38
524
+ 4.42
525
+ 1.23
526
+ 3.40
527
+ 5.48
528
+ 7.51 10.11 17.62
529
+ X-VLM
530
+ 0.70
531
+ 2.28
532
+ 2.45
533
+ 1.16
534
+ 2.35
535
+ 2.45
536
+ 5.43
537
+ 5.96 11.39
538
+ Fashion200k
539
+ CLIP
540
+ 3.05
541
+ 8.56 12.85
542
+ 3.43
543
+ 9.82 14.56
544
+ 24.46 27.81 52.27
545
+ X-VLM
546
+ 2.80
547
+ 6.62
548
+ 6.70
549
+ 1.84
550
+ 3.96
551
+ 4.04
552
+ 16.12 09.84 25.96
553
+ ABO
554
+ CLIP
555
+ 6.25 13.90 18.50
556
+ 7.99 18.96 25.57
557
+ 38.65 52.52 91.17
558
+ X-VLM
559
+ 3.10
560
+ 6.48
561
+ 6.56
562
+ 3.20
563
+ 7.42
564
+ 7.50
565
+ 16.14 18.12 34.26
566
+ ble 2. On the CUB-200 dataset, CLIP consistently outperforms X-VLM. The biggest
567
+ relative increase is 124% for image-to-text in terms of R@10, while the smallest rel-
568
+ ative increase is 1% for text-to-image in terms of R@1. Overall, on the text-to-image
569
+ retrieval task, CLIP outperforms X-VLM by 38%, and on the image-to-text retrieval
570
+ task, the relative gain is 70%.
571
+ On Fashion200k, CLIP outperforms X-VLM, too. The smallest relative increase
572
+ is 9% for text-to-image in terms of R@1, the biggest relative increase is 260% for
573
+ image-to-text in terms of R@10. In general, on the text-to-image retrieval task, CLIP
574
+ outperforms X-VLM by 52%; on the image-to-text retrieval task, the relative gain is
575
+ 83%.
576
+ Finally, on the ABO dataset, CLIP outperforms X-VLM again. The smallest rela-
577
+ tive increase is 101% for text-to-image in terms of R@1, the biggest relative increase
578
+ is 241% for image-to-text again in terms of R@10. In general, on the text-to-image re-
579
+ trieval task, CLIP outperforms X-VLM by 139%; on the image-to-text retrieval task, the
580
+ relative gain is 190%. All in all, CLIP outperforms X-VLM on all three scene-centric
581
+ datasets. The overall relative gain on CUB-200 dataset is 55%, on Fashion200k dataset
582
+ – 101%. The biggest relative gain of 166% is obtained on the ABO dataset.
583
+ Answer to RQ2. The outcome of Experiment 2 is clear. The original relative perfor-
584
+ mance results obtained on the MS COCO and Flickr30k (Table 1) are only partially
585
+ replicable to the CUB-200, Fashion200k, and ABO datasets. On the latter datasets
586
+ CLIP consistently outperforms X-VLM by a large margin, whereas the original scores
587
+ obtained on the former datasets indicate that X-VLM mostly outperforms CLIP.
588
+ Upshot. We hypothesize that the failure to replicate the relative results originally re-
589
+ ported for scene-centric datasets (viz. X-VLM outperforms CLIP) is due to CLIP being
590
+ pre-trained on more and more diverse image data. We, therefore, recommend that future
591
+ work aimed at developing large-scale CMR models quantifies and reports the diversity
592
+ of the training data used.
593
+
594
+ 12
595
+ M. Hendriksen et al.
596
+ 6.3
597
+ RQ3: Generalizability
598
+ To answer RQ3, we compare the relative performance of the selected models on object-
599
+ centric and scene-centric data. Thus, we compare the relative performance of CLIP and
600
+ X-VLM on CUB-200, Fashion200k, ABO with their relative performance on MS COCO
601
+ and Flickr30k. We focus on the complete tree from Fig. 2.
602
+ Results. The results of our experiments on the scene-centric datasets are in Table 1; the
603
+ results that we obtained on the object-centric datasets are in Table 2. On object-centric
604
+ datasets, CLIP consistently outperforms X-VLM. However, the situation with scene-
605
+ centric results is partially the opposite. There, X-VLM outperforms CLIP on the MS
606
+ COCO dataset.
607
+ Answer to RQ3. Hence, we answer RQ3 by stating that the relative performance results
608
+ for CLIP and X-VLM that we obtained in our experiments only partially generalize
609
+ from scene-centric to object-centric datasets. The MS COCO dataset is the odd one
610
+ out.6
611
+ Upshot. Given the observed differences in relative performance results for CLIP and X-
612
+ VLM on scene-centric vs. object-centric datasets, we recommend that CMR be trained
613
+ in both scene-centric and object-centric datasets to help improve the generalizability of
614
+ experimental outcomes.
615
+ 7
616
+ Discussion & Conclusions
617
+ We have examined two SOTA image-text CMR methods, CLIP and X-VLM, by con-
618
+ trasting their performance on two scene-centric datasets (MS COCO and Flicrk30k)
619
+ and three object-centric datasets (CUB-200, Fashion200k, ABO) in a zero-shot setting.
620
+ We focused on the reproducibility of the CMR results reported in the original pub-
621
+ lications when evaluated on the selected scene-centric datasets. The reported scores
622
+ were not reproducible for X-VLM when evaluated on the MS COCO and the Flickr30k
623
+ datasets. For CLIP, we were able to reproduce the scores on the Flickr30k dataset when
624
+ evaluated using R@5 and R@10. Conversely, the relative results were reproducible
625
+ on the MS COCO dataset, for all metrics and tasks, and partially reproducible on the
626
+ Flickr30k dataset only for image-to-text task when evaluated on R@1 and R@5. We
627
+ also examined the replicability of the CMR results using three object-centric datasets.
628
+ We discovered that the relative results are replicable when we compare the relative per-
629
+ formance on the object-centric datasets with the relative scores on the Flickr30k dataset.
630
+ However, for the MS COCO dataset, the relative outcomes were not replicable. And, fi-
631
+ nally, we explored the generalizability of the obtained results by comparing the models’
632
+ performance on scene-centric vs. object-centric datasets. We observed that the absolute
633
+ scores obtained when evaluating models on object-centric datasets are much lower than
634
+ the scores obtained on scene-centric datasets.
635
+ Our findings demonstrate that the reproducibility of CMR methods on scene-centric
636
+ 6 On the GitHub repository for CLIP, several issues have been posted related to the performance
637
+ of CLIP on the MS COCO dataset. See, e.g., https://github.com/openai/CLIP/i
638
+ ssues/115.
639
+
640
+ Scene-centric vs. Object-centric Cross-modal Retrieval
641
+ 13
642
+ datasets is an open problem. Besides, we show that while the majority of CMR methods
643
+ are evaluated on the MS COCO and the Flickr30k datasets, the object-centric datasets
644
+ represent a challenging and relatively unexplored set of benchmarks.
645
+ A limitation of our work is the relatively small number of scene-centric and object-
646
+ centric datasets used for the evaluation of the models. Another limitation is that we
647
+ only considered CMR in a zero-shot setting, ignoring, e.g., few-shot scenarios; this
648
+ limitation did, however, come with the important advantage of reducing the number of
649
+ experimental design decisions to be made for contrastive experiments.
650
+ A promising direction for future work is to include further datasets when contrasting
651
+ the performance of CMR models, both scene-centric and object-centric. In particular, it
652
+ would be interesting to investigate the models’ performance on datasets, e.g., Concep-
653
+ tual Captions [47], the Flower [40], and the Cars [27] datasets. A natural step after that
654
+ would be to consider few-shot scenarios.
655
+ Acknowledgements. We thank Paul Groth, Andrew Yates, Thong Nguyen, and Maurits
656
+ Bleeker for helpful discussions and feedback.
657
+ This research was supported by Ahold Delhaize, and the Hybrid Intelligence Center,
658
+ a 10-year program funded by the Dutch Ministry of Education, Culture and Science
659
+ through the Netherlands Organisation for Scientific Research, https://hybrid-i
660
+ ntelligence-centre.nl.
661
+ All content represents the opinion of the authors, which is not necessarily shared or
662
+ endorsed by their respective employers and/or sponsors.
663
+
664
+ Bibliography
665
+ [1] ACM (2020) Artifact Review and Badging - Current. https://www.acm.or
666
+ g/publications/policies/artifact-review-and-badging-
667
+ current, accessed August 7, 2022
668
+ [2] Alayrac JB, Donahue J, Luc P, Miech A, Barr I, Hasson Y, Lenc K, Mensch A,
669
+ Millican K, Reynolds M, et al. (2022) Flamingo: a visual language model for few-
670
+ shot learning. arXiv preprint arXiv:220414198
671
+ [3] Bleeker M, de Rijke M (2022) Do lessons from metric learning generalize to
672
+ image-caption retrieval? In: ECIR 2022: 44th European Conference on Informa-
673
+ tion Retrieval, Springer
674
+ [4] Brown A, Xie W, Kalogeiton V, Zisserman A (2020) Smooth-ap: Smoothing the
675
+ path towards large-scale image retrieval. In: European Conference on Computer
676
+ Vision, Springer, pp 677–694
677
+ [5] Carvalho M, Cadène R, Picard D, Soulier L, Thome N, Cord M (2018) Cross-
678
+ modal retrieval in the cooking context: Learning semantic text-image embeddings.
679
+ In: The 41st International ACM SIGIR Conference on Research & Development
680
+ in Information Retrieval, pp 35–44
681
+ [6] Chen YC, Li L, Yu L, El Kholy A, Ahmed F, Gan Z, Cheng Y, Liu J (2020)
682
+ Uniter: Learning universal image-text representations. In: Computer Vision –
683
+ ECCV 2020, Springer International Publishing, pp 104–120
684
+ [7] Collins J, Goel S, Deng K, Luthra A, Xu L, Gundogdu E, Zhang X, Yago Vi-
685
+ cente TF, Dideriksen T, Arora H, Guillaumin M, Malik J (2022) Abo: Dataset and
686
+ benchmarks for real-world 3d object understanding. CVPR
687
+ [8] Devlin J, Chang MW, Lee K, Toutanova K (2018) Bert: Pre-training of
688
+ deep bidirectional transformers for language understanding. arXiv preprint
689
+ arXiv:181004805
690
+ [9] Dosovitskiy A, Beyer L, Kolesnikov A, Weissenborn D, Zhai X, Unterthiner
691
+ T, Dehghani M, Minderer M, Heigold G, Gelly S, et al. (2020) An image is
692
+ worth 16x16 words: Transformers for image recognition at scale. arXiv preprint
693
+ arXiv:201011929
694
+ [10] Dou ZY, Xu Y, Gan Z, Wang J, Wang S, Wang L, Zhu C, Zhang P, Yuan L, Peng
695
+ N, et al. (2022) An empirical study of training end-to-end vision-and-language
696
+ transformers. In: Proceedings of the IEEE/CVF Conference on Computer Vision
697
+ and Pattern Recognition, pp 18166–18176
698
+ [11] Faghri F, Fleet DJ, Kiros JR, Fidler S (2017) Vse++: Improving visual-semantic
699
+ embeddings with hard negatives. arXiv preprint arXiv:170705612
700
+ [12] Frome A, Corrado GS, Shlens J, Bengio S, Dean J, Ranzato M, Mikolov T (2013)
701
+ Devise: A deep visual-semantic embedding model. In: Proceedings of the 26th
702
+ International Conference on Neural Information Processing Systems - Volume 2,
703
+ Curran Associates Inc., NIPS’13, pp 2121–2129
704
+ [13] Gao D, Jin L, Chen B, Qiu M, Li P, Wei Y, Hu Y, Wang H (2020) Fashionbert: Text
705
+ and image matching with adaptive loss for cross-modal retrieval. In: Proceedings
706
+
707
+ Scene-centric vs. Object-centric Cross-modal Retrieval
708
+ 15
709
+ of the 43rd International ACM SIGIR Conference on Research and Development
710
+ in Information Retrieval, pp 2251–2260
711
+ [14] Goei K, Hendriksen M, de Rijke M (2021) Tackling attribute fine-grainedness in
712
+ cross-modal fashion search with multi-level features. In: SIGIR 2021 Workshop
713
+ on eCommerce, ACM
714
+ [15] Gong Y, Wang L, Hodosh M, Hockenmaier J, Lazebnik S (2014) Improving
715
+ image-sentence embeddings using large weakly annotated photo collections. In:
716
+ European conference on computer vision, Springer, pp 529–545
717
+ [16] Gu J, Cai J, Joty SR, Niu L, Wang G (2018) Look, imagine and match: Improving
718
+ textual-visual cross-modal retrieval with generative models. In: Proceedings of the
719
+ IEEE conference on computer vision and pattern recognition, pp 7181–7189
720
+ [17] Han X, Wu Z, Huang PX, Zhang X, Zhu M, Li Y, Zhao Y, Davis LS (2017)
721
+ Automatic spatially-aware fashion concept discovery. In: Proceedings of the IEEE
722
+ international conference on computer vision, pp 1463–1471
723
+ [18] He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recog-
724
+ nition. In: Proceedings of the IEEE conference on computer vision and pattern
725
+ recognition, pp 770–778
726
+ [19] Hendriksen M (2022) Multimodal retrieval in e-commerce. In: European Confer-
727
+ ence on Information Retrieval, Springer, pp 505–512
728
+ [20] Hendriksen M, Bleeker M, Vakulenko S, Noord Nv, Kuiper E, de Rijke M (2022)
729
+ Extending clip for category-to-image retrieval in e-commerce. In: European Con-
730
+ ference on Information Retrieval, Springer, pp 289–303
731
+ [21] Herranz L, Jiang S, Li X (2016) Scene recognition with cnns: objects, scales and
732
+ dataset bias. In: Proceedings of the IEEE Conference on Computer Vision and
733
+ Pattern Recognition, pp 571–579
734
+ [22] Hu P, Zhen L, Peng D, Liu P (2019) Scalable deep multimodal learning for cross-
735
+ modal retrieval. In: Proceedings of the 42nd international ACM SIGIR conference
736
+ on research and development in information retrieval, pp 635–644
737
+ [23] Jia C, Yang Y, Xia Y, Chen YT, Parekh Z, Pham H, Le Q, Sung YH, Li Z, Duerig T
738
+ (2021) Scaling up visual and vision-language representation learning with noisy
739
+ text supervision. In: International Conference on Machine Learning, PMLR, pp
740
+ 4904–4916
741
+ [24] Karpathy A, Fei-Fei L (2015) Deep visual-semantic alignments for generating
742
+ image descriptions. In: Proceedings of the IEEE conference on computer vision
743
+ and pattern recognition, pp 3128–3137
744
+ [25] Kim W, Son B, Kim I (2021) Vilt: Vision-and-language transformer without con-
745
+ volution or region supervision. In: International Conference on Machine Learning,
746
+ PMLR, pp 5583–5594
747
+ [26] Klein B, Lev G, Sadeh G, Wolf L (2014) Fisher vectors derived from hy-
748
+ brid gaussian-laplacian mixture models for image annotation. arXiv preprint
749
+ arXiv:14117399
750
+ [27] Krause J, Stark M, Deng J, Fei-Fei L (2013) 3d object representations for fine-
751
+ grained categorization. In: 4th International IEEE Workshop on 3D Representa-
752
+ tion and Recognition (3dRR-13), Sydney, Australia
753
+ [28] Laenen K (2022) Cross-modal representation learning for fashion search and rec-
754
+ ommendation. PhD thesis, KU Leuven
755
+
756
+ 16
757
+ M. Hendriksen et al.
758
+ [29] Laenen K, Zoghbi S, Moens MF (2017) Cross-modal search for fashion attributes.
759
+ In: Proceedings of the KDD 2017 Workshop on Machine Learning Meets Fashion,
760
+ ACM, vol 2017, pp 1–10
761
+ [30] Laenen K, Zoghbi S, Moens MF (2018) Web search of fashion items with multi-
762
+ modal querying. In: Proceedings of the Eleventh ACM International Conference
763
+ on Web Search and Data Mining, pp 342–350
764
+ [31] Lee KH, Chen X, Hua G, Hu H, He X (2018) Stacked cross attention for image-
765
+ text matching. In: Proceedings of the European Conference on Computer Vision
766
+ (ECCV), pp 201–216
767
+ [32] Li A, Jabri A, Joulin A, Van Der Maaten L (2017) Learning visual n-grams from
768
+ web data. In: Proceedings of the IEEE International Conference on Computer Vi-
769
+ sion, pp 4183–4192
770
+ [33] Li G, Duan N, Fang Y, Gong M, Jiang D (2020) Unicoder-vl: A universal encoder
771
+ for vision and language by cross-modal pre-training. In: Proceedings of the AAAI
772
+ Conference on Artificial Intelligence, vol 34, pp 11336–11344
773
+ [34] Li J, Selvaraju R, Gotmare A, Joty S, Xiong C, Hoi SCH (2021) Align before
774
+ fuse: Vision and language representation learning with momentum distillation.
775
+ Advances in neural information processing systems 34:9694–9705
776
+ [35] Lin TY, Maire M, Belongie S, Hays J, Perona P, Ramanan D, Dollár P, Zitnick CL
777
+ (2014) Microsoft COCO: Common objects in context. In: European conference
778
+ on computer vision, Springer, pp 740–755
779
+ [36] Liu C, Mao Z, Liu AA, Zhang T, Wang B, Zhang Y (2019) Focus your attention:
780
+ A bidirectional focal attention network for image-text matching. In: Proceedings
781
+ of the 27th ACM International Conference on Multimedia, pp 3–11
782
+ [37] Liu Z, Lin Y, Cao Y, Hu H, Wei Y, Zhang Z, Lin S, Guo B (2021) Swin trans-
783
+ former: Hierarchical vision transformer using shifted windows. In: Proceedings
784
+ of the IEEE/CVF International Conference on Computer Vision, pp 10012–10022
785
+ [38] Messina N, Amato G, Esuli A, Falchi F, Gennaro C, Marchand-Maillet S (2021)
786
+ Fine-grained visual textual alignment for cross-modal retrieval using transformer
787
+ encoders. ACM Transactions on Multimedia Computing, Communications, and
788
+ Applications (TOMM) 17(4):1–23
789
+ [39] Nam H, Ha JW, Kim J (2017) Dual attention networks for multimodal reasoning
790
+ and matching. In: Proceedings of the IEEE conference on computer vision and
791
+ pattern recognition, pp 299–307
792
+ [40] Nilsback ME, Zisserman A (2008) Automated flower classification over a large
793
+ number of classes. In: Indian Conference on Computer Vision, Graphics and Im-
794
+ age Processing
795
+ [41] Petrov A, Macdonald C (2022) A systematic review and replicability study of
796
+ bert4rec for sequential recommendation. In: Proceedings of the 16th ACM Con-
797
+ ference on Recommender Systems, pp 436–447
798
+ [42] Qi D, Su L, Song J, Cui E, Bharti T, Sacheti A (2020) Imagebert: Cross-modal
799
+ pre-training with large-scale weak-supervised image-text data. arXiv preprint
800
+ arXiv:200107966
801
+ [43] Radford A, Wu J, Child R, Luan D, Amodei D, Sutskever I, et al. (2019) Language
802
+ models are unsupervised multitask learners. OpenAI blog 1(8):9
803
+ [44] Radford A, Kim JW, Hallacy C, Ramesh A, Goh G, Agarwal S, Sastry G, Askell
804
+
805
+ Scene-centric vs. Object-centric Cross-modal Retrieval
806
+ 17
807
+ A, Mishkin P, Clark J, et al. (2021) Learning transferable visual models from
808
+ natural language supervision. In: International Conference on Machine Learning,
809
+ PMLR, pp 8748–8763
810
+ [45] Rao J, Wang F, Ding L, Qi S, Zhan Y, Liu W, Tao D (2022) Where does the
811
+ performance improvement come from?: - A reproducibility concern about image-
812
+ text retrieval. In: SIGIR ’22: The 45th International ACM SIGIR Conference on
813
+ Research and Development in Information Retrieval, Madrid, Spain, July 11 - 15,
814
+ 2022, ACM, pp 2727–2737
815
+ [46] Reed S, Akata Z, Lee H, Schiele B (2016) Learning deep representations of fine-
816
+ grained visual descriptions. In: Proceedings of the IEEE conference on computer
817
+ vision and pattern recognition, pp 49–58
818
+ [47] Sharma P, Ding N, Goodman S, Soricut R (2018) Conceptual captions: A cleaned,
819
+ hypernymed, image alt-text dataset for automatic image captioning. In: Proceed-
820
+ ings of the 56th Annual Meeting of the Association for Computational Linguistics
821
+ (Volume 1: Long Papers), pp 2556–2565
822
+ [48] Shen ZY, Han SY, Fu LC, Hsiao PY, Lau YC, Chang SJ (2019) Deep convolu-
823
+ tion neural network with scene-centric and object-centric information for object
824
+ detection. Image and Vision Computing 85:14–25
825
+ [49] Sheng S, Laenen K, Van Gool L, Moens MF (2021) Fine-grained cross-modal
826
+ retrieval for cultural items with focal attention and hierarchical encodings. Com-
827
+ puters 10(9):105
828
+ [50] Song J, Choi S (2021) Image-text alignment using adaptive cross-attention with
829
+ transformer encoder for scene graphs
830
+ [51] Tan M, Le Q (2019) Efficientnet: Rethinking model scaling for convolutional neu-
831
+ ral networks. In: International conference on machine learning, PMLR, pp 6105–
832
+ 6114
833
+ [52] Ueki K (2021) Survey of visual-semantic embedding methods for zero-shot image
834
+ retrieval. In: 2021 20th IEEE International Conference on Machine Learning and
835
+ Applications (ICMLA), IEEE, pp 628–634
836
+ [53] Varamesh A, Diba A, Tuytelaars T, Van Gool L (2020) Self-supervised ranking
837
+ for representation learning. arXiv preprint arXiv:201007258
838
+ [54] Vaswani A, Shazeer N, Parmar N, Uszkoreit J, Jones L, Gomez AN, Kaiser Ł,
839
+ Polosukhin I (2017) Attention is all you need. Advances in neural information
840
+ processing systems 30
841
+ [55] Voorhees EM (2002) The philosophy of information retrieval evaluation. In: Eval-
842
+ uation of Cross-Language Information Retrieval Systems, Springer Berlin Heidel-
843
+ berg, pp 355–370
844
+ [56] Wang H, Sahoo D, Liu C, Shu K, Achananuparp P, Lim Ep, Hoi SC (2021) Cross-
845
+ modal food retrieval: learning a joint embedding of food images and recipes with
846
+ semantic consistency and attention mechanism. IEEE Transactions on Multimedia
847
+ 24:2515–2525
848
+ [57] Wang K, Yin Q, Wang W, Wu S, Wang L (2016) A comprehensive survey on
849
+ cross-modal retrieval. arXiv preprint arXiv:160706215
850
+ [58] Wang L, Li Y, Lazebnik S (2016) Learning deep structure-preserving image-text
851
+ embeddings. In: Proceedings of the IEEE conference on computer vision and pat-
852
+ tern recognition, pp 5005–5013
853
+
854
+ 18
855
+ M. Hendriksen et al.
856
+ [59] Welinder P, Branson S, Mita T, Wah C, Schroff F, Belongie S, Perona P (2010)
857
+ Caltech-UCSD Birds 200. Tech. Rep. CNS-TR-2010-001, California Institute of
858
+ Technology
859
+ [60] Yu J, Wang Z, Vasudevan V, Yeung L, Seyedhosseini M, Wu Y (2022)
860
+ Coca: Contrastive captioners are image-text foundation models. arXiv preprint
861
+ arXiv:220501917
862
+ [61] Zeng Y, Zhang X, Li H (2022) Multi-grained vision language pre-training: Align-
863
+ ing texts with visual concepts. In: Chaudhuri K, Jegelka S, Song L, Szepesvári
864
+ C, Niu G, Sabato S (eds) International Conference on Machine Learning, ICML
865
+ 2022, 17-23 July 2022, Baltimore, Maryland, USA, PMLR, Proceedings of Ma-
866
+ chine Learning Research, vol 162, pp 25994–26009
867
+ [62] Zhang C, Pan TY, Li Y, Hu H, Xuan D, Changpinyo S, Gong B, Chao WL (2021)
868
+ Mosaicos: a simple and effective use of object-centric images for long-tailed
869
+ object detection. In: Proceedings of the IEEE/CVF International Conference on
870
+ Computer Vision, pp 417–427
871
+ [63] Zhang K, Mao Z, Wang Q, Zhang Y (2022) Negative-aware attention framework
872
+ for image-text matching. In: Proceedings of the IEEE/CVF Conference on Com-
873
+ puter Vision and Pattern Recognition, pp 15661–15670
874
+ [64] Zhang P, Li X, Hu X, Yang J, Zhang L, Wang L, Choi Y, Gao J (2021) Vinvl: Re-
875
+ visiting visual representations in vision-language models. In: Proceedings of the
876
+ IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp 5579–
877
+ 5588
878
+ [65] Zhang Y, Jiang H, Miura Y, Manning CD, Langlotz CP (2020) Contrastive learn-
879
+ ing of medical visual representations from paired images and text. arXiv preprint
880
+ arXiv:201000747
881
+ [66] Zhou B, Lapedriza A, Xiao J, Torralba A, Oliva A (2014) Learning deep features
882
+ for scene recognition using places database. Advances in neural information pro-
883
+ cessing systems 27
884
+ [67] Zhuge M, Gao D, Fan DP, Jin L, Chen B, Zhou H, Qiu M, Shao L (2021)
885
+ Kaleido-bert: Vision-language pre-training on fashion domain. In: Proceedings
886
+ of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp
887
+ 12647–12657
888
+
VNE4T4oBgHgl3EQfnQ0i/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
VdE4T4oBgHgl3EQfnQ2t/content/tmp_files/2301.05175v1.pdf.txt ADDED
@@ -0,0 +1,1722 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Scene-Aware 3D Multi-Human Motion Capture from a Single Camera
2
+ D. C. Luvizon, M. Habermann, V. Golyanik, A. Kortylewski, C. Theobalt
3
+ MPI Informatics, Saarland Informatics Campus, Germany
4
+ Input: Single-view RGB Video
5
+ Output: Estimated Humans and Scene
6
+ Our
7
+ Method
8
+ Front
9
+ Top
10
+ Multi-person
11
+ Applications
12
+ CG Characters Retargeting
13
+ Front
14
+ Top
15
+ Depth-scale aware
16
+ Figure 1. Our approach estimates absolute 3D positions of multiple humans in a scene, body shape and articulation in a globally and
17
+ temporally coherent manner from a single monocular RGB video. It achieves higher 3D reconstruction accuracy than competing methods,
18
+ allows motion re-targeting in the 3D space, and works exceptionally well even for in-the-wild videos.
19
+ Abstract
20
+ In this work, we consider the problem of estimating
21
+ the 3D position of multiple humans in a scene as well as
22
+ their body shape and articulation from a single RGB video
23
+ recorded with a static camera.
24
+ In contrast to expensive
25
+ marker-based or multi-view systems, our lightweight setup
26
+ is ideal for private users as it enables an affordable 3D mo-
27
+ tion capture that is easy to install and does not require ex-
28
+ pert knowledge. To deal with this challenging setting, we
29
+ leverage recent advances in computer vision using large-
30
+ scale pre-trained models for a variety of modalities, in-
31
+ cluding 2D body joints, joint angles, normalized disparity
32
+ maps, and human segmentation masks. Thus, we introduce
33
+ the first non-linear optimization-based approach that jointly
34
+ solves for the absolute 3D position of each human, their ar-
35
+ ticulated pose, their individual shapes as well as the scale
36
+ of the scene.
37
+ In particular, we estimate the scene depth
38
+ and person unique scale from normalized disparity predic-
39
+ tions using the 2D body joints and joint angles. Given the
40
+ per-frame scene depth, we reconstruct a point-cloud of the
41
+ static scene in 3D space. Finally, given the per-frame 3D
42
+ estimates of the humans and scene point-cloud, we perform
43
+ a space-time coherent optimization over the video to ensure
44
+ temporal, spatial and physical plausibility. We evaluate our
45
+ method on established multi-person 3D human pose bench-
46
+ marks where we consistently outperform previous methods
47
+ and we qualitatively demonstrate that our method is ro-
48
+ bust to in-the-wild conditions including challenging scenes
49
+ with people of different sizes. Code: https://github.
50
+ com/dluvizon/scene-aware-3d-multi-human
51
+ 1. Introduction
52
+ Estimating the absolute 3D position, body shape, and ar-
53
+ ticulation of multiple people in a scene is a fundamental
54
+ research problem that has many applications in game devel-
55
+ opment, VR/AR, and HCI. Years of research went into de-
56
+ veloping sophisticated and expensive setups such as multi-
57
+ view systems, motion capture suits, and manually or semi-
58
+ automatically denoising of the tracked motions to then, for
59
+ example, animate CG characters with these captured mo-
60
+ tions. However, one ideally would like to obtain such an
61
+ absolute scene understanding from a capture setup that is
62
+ easy to install, affordable, and that does not require expert
63
+ knowledge, i.e. a single RGB camera. Such a lightweight
64
+ setup would enable 3D motion capture for private users, e.g.
65
+ avatar control via the smartphone, but it can also be applied
66
+ for post production in the movie industry where, for exam-
67
+ ple, one person should be replaced by another in a 3D con-
68
+ sistent manner. At the same time, it has to be stated that
69
+ 1
70
+ arXiv:2301.05175v1 [cs.CV] 12 Jan 2023
71
+
72
+ performing motion capture given such limited data is ex-
73
+ ceptionally more difficult compared to multi-view systems.
74
+ The major challenges for such a monocular setting, where
75
+ only a single static video of the entire scene with moving
76
+ persons is given, are the inherent depth ambiguity and oc-
77
+ clusions, among many others.
78
+ Therefore, recent monocular approaches focus on a sin-
79
+ gle human [33, 40] or even assume an actor template is
80
+ given [13,14,61]. Recently, some works started to research
81
+ the multi-person setting, but they either only learn a rela-
82
+ tive depth ordering of people in the scene [20] that is not
83
+ 3D consistent over time or they directly predict absolute
84
+ depth, which is prone to overfit to the settings shown in the
85
+ training data [37]. Most of those works leverage recent ad-
86
+ vances in Computer Vision and take as input several types
87
+ of regressed data modalities obtained from models trained
88
+ on large-scale data. This involves 1) 2D body joints [4,11],
89
+ 2) joint angles [51], 3) normalized disparity maps [27, 41],
90
+ and 4) human segmentation masks [8]. Interestingly, none
91
+ of those works jointly considers all of those modalities.
92
+ To this end, this work investigates how each of those
93
+ modalities can benefit the task of multi-person absolute 3D
94
+ pose and shape estimation. A particular challenge, however,
95
+ is that each individual modality has, of course, advantages,
96
+ but also disadvantages. While 2D and 3D keypoint detec-
97
+ tions can help to infer the local 3D pose of a single person,
98
+ they cannot ensure 3D consistency across humans and the
99
+ scene. Joint angle estimates can be directly used to drive
100
+ CG characters, but they are usually less accurate than the
101
+ 3D keypoint detectors due to error accumulation along the
102
+ kinematic chain. Normalized disparity maps provide global
103
+ reasoning of the entire scene as well as the humans in terms
104
+ of its scale-normalized depth, but they cannot provide abso-
105
+ lute depth and scale of the scene. Finally, human segmen-
106
+ tation masks can provide close to pixel-perfect and identity
107
+ preserving segmentations of humans in the scene, but they
108
+ lack a 3D understanding.
109
+ Now, to unite all the advantages of each of the modali-
110
+ ties while compensating for their potential limitations, we
111
+ propose the first optimization-based approach that jointly
112
+ recovers the absolute 3D position of all humans in the im-
113
+ ages, their articulated pose, their individual shapes, as well
114
+ as the scale of the scene from a single video recorded with a
115
+ static camera; see Fig. 1. In particular, we propose a novel
116
+ energy formulation, which infers the absolute scene depth
117
+ and the person unique scale from scale-normalized dispar-
118
+ ity predictions by using the 2D and joint angle estimates of
119
+ the humans in the scene as a prior. Once the per-frame ab-
120
+ solute depth is known, we reconstruct a dense point cloud of
121
+ the static scene in absolute 3D space by segmenting out the
122
+ humans using the predicted segmentations and aggregating
123
+ per-frame depth over time. Finally, we perform a coherent
124
+ space-time optimization over the entire sequence to ensure
125
+ temporal and spatial consistency as well as physical plausi-
126
+ bility leveraging the aggregated scene estimate and the joint
127
+ angle predictions. Note that in each of those steps, the com-
128
+ bination of different data modalities is leveraged through
129
+ our method and only this specific approach achieves the de-
130
+ sired result in the considered setting, as extensively shown
131
+ in our results. In summary, our primary technical contribu-
132
+ tions are as follows:
133
+ • The first monocular approach for multi-person abso-
134
+ lute pose and unique scale estimation that jointly esti-
135
+ mates multiple human poses and the 3D scene by com-
136
+ bining data modalities in a novel optimization frame-
137
+ work.
138
+ • A human body prior to disambiguate the scale of the
139
+ scene, which allows us to perform a coherent space-
140
+ time reasoning of the human motion in absolute space.
141
+ • We show that the estimated 3D human bodies can be
142
+ refined in 3D space and time by filtering body move-
143
+ ments in 3D coordinates and by penalizing implausible
144
+ poses w.r.t. the estimated scene, resulting in a more co-
145
+ herent final prediction.
146
+ Since our approach estimates joint angles, global positions
147
+ and scale, the recovered 3D human poses can be directly
148
+ applied to CG characters enabling exciting applications as
149
+ shown in Section 4. Moreover, we demonstrate that the joint
150
+ reasoning of the human body shape, pose, and the dense
151
+ scene over the entire video sequence improves state of the
152
+ art in terms of 3D localization, scene and person scale, as
153
+ well as body pose compared to prior work, both, quanti-
154
+ tatively and qualitatively.
155
+ Finally, we show that several
156
+ downstream applications can be directly derived from our
157
+ method, like monocular human motion capture and avatar
158
+ control.
159
+ 2. Related Work
160
+ 3D human motion capture is an active research area, and
161
+ many works have been proposed in the past [6, 23, 31, 32,
162
+ 36, 49, 50, 53, 55, 70]. Since we target a monocular setting,
163
+ we do not review multi-view- and depth-based methods. In-
164
+ stead, we review previous works that are most related to our
165
+ method.
166
+ 2.1. 3D Human Pose Estimation
167
+ 2.1.1
168
+ Single Person Pose Estimation
169
+ Estimating the human body pose in 3D from a single image
170
+ is a challenging problem that has been successfully handled
171
+ by learning a human body prior from MoCap data [19]. To
172
+ simplify the problem, previous methods usually predict 3D
173
+ coordinates relative to the root joint, assuming a normalized
174
+ human body size [33] and a fixed bounding box around the
175
+ 2
176
+
177
+ person in 3D space [36, 40]. However, when multiple peo-
178
+ ple are interacting with the environment, normalized and
179
+ root-relative predictions are not enough to disambiguate the
180
+ position and scale of individual persons in the scene. In
181
+ addition, directly estimating the 3D joint coordinates could
182
+ result in implausible poses, which is a problem that can be
183
+ mitigated by estimating joint angles instead [71].
184
+ Several works focus on estimating the full human mesh
185
+ deformation from videos [13,14,61], assuming that the ac-
186
+ tor mesh is provided in advance. Other works for single
187
+ human estimation [22,24,39] rely on SMPL [30] as a proxy
188
+ shape. Reconstructing shape proxies along with sparse 3D
189
+ skeletons is desirable in many scenarios (e.g., they can be
190
+ used for body parts segmentation). Moreover, SMPL serves
191
+ as a statistical prior on human body shapes and enables ad-
192
+ ditional supervisory terms such as human silhouette over-
193
+ lays in 2D, which can result in higher accuracy [39].
194
+ 2.1.2
195
+ Multiple Person Pose Estimation
196
+ Estimating positions of each person w.r.t. the others is cru-
197
+ cial in multi-human pose estimation. Nonetheless, most of
198
+ the existing multi-person methods are by design perform-
199
+ ing root-relative predictions [1, 45, 46, 51]. Several tech-
200
+ niques predict translations of each person in the camera
201
+ reference frame. They either optimize the translation by
202
+ projecting and fitting the estimated 3D poses into the im-
203
+ age plane [9, 34, 66] or by directly regressing the distance
204
+ of the root joint to the camera with a deep neural net-
205
+ work [28, 37, 56, 69]. The first case can be more robust
206
+ to different camera setups, but is limited by the unknown
207
+ height of each person in the scene. The second strategy is
208
+ highly dependent on the training data and may not gener-
209
+ alize to camera configurations not present in the training.
210
+ Others explore human priors [26] to estimate a global tra-
211
+ jectory [64], but still fail to recover the body size.
212
+ Recent methods performing human depth estimation are
213
+ focused on penalizing depth ordering of multiple humans.
214
+ For instance, Jiang et al. [20] uses instance segmentation
215
+ masks to penalize depth inversion and Sun et al. [52] pro-
216
+ poses to infer the depth of each person based on an imagi-
217
+ nary bird’s-eye-view representation and to estimate the per-
218
+ son age as a proxy for the scale. Other approaches pre-
219
+ dict the relative depth among multiple persons by inferring
220
+ some scene properties. A possible scene simplification is to
221
+ assume a parametric planar floor, in such a way that each
222
+ prediction can be positioned to respect a plausible human-
223
+ floor contact [54, 65]. The common limitation of such ap-
224
+ proaches is the dependency on a simplified floor represen-
225
+ tation, which is often not the case in real applications. Con-
226
+ trarily, we estimate a scene point cloud that can represent a
227
+ arbitrary ground floor.
228
+ The works from Jiang et al. [20] and Ugrinovic et al. [54]
229
+ are the most closely related to ours. Similarly to the for-
230
+ mer, we also render the estimated human models into the
231
+ image plane to provide additional supervision in the depth
232
+ dimension, and, related to the latter, we also disambiguate
233
+ body size and depth for each person by constraining pre-
234
+ dictions with an estimated scene geometry. But differently
235
+ from [20], that does not take the scene into account, and
236
+ from [54], that relies on a simplified scene representation
237
+ and operates in a single frame, our method represents the
238
+ scene as a frustum point cloud and performs optimization
239
+ over the entire video sequence. In our work, we also rely
240
+ on a human body proxy model [30] to estimate joint angles
241
+ and we propose a new formulation to optimize the position
242
+ of the humans and the scene in a joint optimization process.
243
+ Therefore, our model improves the prediction of human po-
244
+ sitions by relying on an estimated proxy scene geometry
245
+ that does not depend on a simplified parametric model.
246
+ 2.2. Scene-aware Motion Capture
247
+ Predicting and understanding how humans interact in
248
+ 3D has recently gained a lot of attention. Several current
249
+ methods focus on positioning humans in a pre-scanned 3D
250
+ scene [12, 15, 18] and on simultaneous estimation of hu-
251
+ man poses and objects humans interact with [7, 59, 62]. A
252
+ different setup assumes an RGB-D sensor [68] or a mov-
253
+ ing camera [16, 25, 29, 67] that facilitates estimating the
254
+ scene geometry. Recent methods integrate physics-based
255
+ constraints into monocular 3D human motion capture and
256
+ mitigate foot-floor penetration and other severe artefacts
257
+ [47,48]. Yu et al. [63] also support composite scenes in the
258
+ parcours and sports scenarios. Although there is a growing
259
+ interest in investigating the interactions of humans and ob-
260
+ jects [2, 10], 3D motion capture of multiple humans with
261
+ environmental awareness from a single monocular camera
262
+ remains underexplored.
263
+ Determining the absolute human scale in 3D is an ill-
264
+ posed and challenging task. Bieler et al. [3] estimate the
265
+ height of a single person from monocular videos by observ-
266
+ ing jumping people. Dabral et al. [10] require an interaction
267
+ with an object undergoing a free flight to resolve the abso-
268
+ lute scene scale. Both methods assume motion influenced
269
+ by the universal law of gravity near the surface of Earth,
270
+ which allows them to relate the time spent in the air or the
271
+ form of the observed trajectory with absolute distances in
272
+ the metric units.
273
+ The downside is that jumping humans
274
+ or flying objects are restrictive assumptions. In contrast,
275
+ we use a human body and 3D scene priors in 3D multi-
276
+ human motion estimation and do not make strong assump-
277
+ tions about the observed human motions.
278
+ 3. Method
279
+ The goal of our method is to estimate the absolute 3D
280
+ position of each human in the scene, i.e., up to a unique and
281
+ 3
282
+
283
+ Input: Video Sequence
284
+ Disparity
285
+ Map
286
+ 2D Pose
287
+ SMPL
288
+ Parameters
289
+ Instance
290
+ Segmentation
291
+ Image Modality Regression and Matching (Section 3.1)
292
+ Pre-processing and Matching
293
+ Scene Scale and Depth Disambiguation (Section 3.2)
294
+ Output: Humans and Scene
295
+ Aggregation
296
+ (median)
297
+ Optimization Framework
298
+ Space-time Coherent Pose Optimization (Section 3.3)
299
+ Eq. 3
300
+ SMPL
301
+ Estimates
302
+ Disparity
303
+ Maps
304
+ Depth
305
+ Maps
306
+ Segmentation
307
+ and 2D Pose
308
+ Renderer
309
+ Background Scene
310
+ Point Cloud
311
+ For each
312
+ person
313
+ Background
314
+ Masks
315
+ 3D Humans and
316
+ Scene Estimates
317
+ in a Unique Scale
318
+ Figure 2. Overview of our method. For each frame in a monocular RGB video, we first estimate a normalized disparity map, 2D human
319
+ poses, SMPL model parameters, and segmentation masks. These predictions are matched and tracked across frames to obtain per-person
320
+ associations (blue box). The multi-modal estimates are then fed into our optimization framework. The first part of our optimization
321
+ process estimates per-frame human models in global position and the scene geometry (yellow box). In the second part, the per-frame scene
322
+ predictions are aggregated into a single point cloud representation and the human predictions are refined in a space-time coherent manner
323
+ over the full video (red box). The yellow arrows indicate the energy terms minimized by our method. The output of our method is the
324
+ absolute 3D positions of each human in the scene, their shape and pose as well as the scene scale. ⊙ is the Hadamard product.
325
+ global scale, their proxy shape and pose, as well as the scene
326
+ scale solely from a monocular RGB video recorded with
327
+ a static camera for which we know the intrinsics. To this
328
+ end, we propose a unified approach that, for the first time,
329
+ leverages all available data modalities, including 2D joint
330
+ detections, regressed SMPL parameters, estimated dispar-
331
+ ity maps, and human segmentations. As illustrated in Fig-
332
+ ure 2, our method is divided into two stages. The first stage,
333
+ i.e. Image Modality Regression and Matching (Section 3.1),
334
+ extracts per-frame estimates and aggregates human-related
335
+ predictions to individuals throughout the video sequence.
336
+ The second stage, i.e. the proposed Optimization Frame-
337
+ work, estimates the person and per-frame scene scale, the
338
+ global 3D position of each person in the scene, as well as
339
+ the refined articulated body pose in the form of joint angles
340
+ per frame.
341
+ The optimization framework is further subdivided into
342
+ two parts. The Scene Scale and Depth Disambiguation part
343
+ (Section 3.2) recovers a consistent and absolute 3D scene
344
+ depth per frame, the human scales, and their absolute 3D
345
+ position and body pose by jointly reasoning about multi-
346
+ ple humans and the scene. The second part, referred to as
347
+ Space-time Coherent Pose Optimization (Section 3.3), re-
348
+ fines the pose and position of the estimated humans in a
349
+ space-time coherent formulation, i.e. we enforce over the
350
+ entire sequence the estimated poses to be temporally sta-
351
+ ble and physically plausible. For this, we leverage a rough
352
+ scene geometry estimation, which is obtained by aggregat-
353
+ ing the absolute depth maps also estimated by our method.
354
+ This final part significantly reduces artifacts, such as foot
355
+ sliding, human-scene intersections, and jitter. Before we
356
+ explain our method in more detail, we introduce relevant
357
+ notations.
358
+ Notations.
359
+ The input of our framework is a video se-
360
+ quence It, with t ∈ {1, . . . , T}, where T is the number of
361
+ frames. We leverage the skinned multi-person linear model
362
+ (SMPL) [30] to represent the humans in the scene. SMPL is
363
+ a differentiable parametric human model that takes as input
364
+ the pose parameters θ ∈ R72, corresponding to the axis-
365
+ angles of 24 body joints and the global body rotation, and
366
+ PCA shape parameters β ∈ R10, and produces a skinned
367
+ human mesh
368
+ fsmpl(θ, β) = V,
369
+ (1)
370
+ where V are the posed and shaped vertices of the human
371
+ body; for more details we refer to their paper [30]. The
372
+ mesh vertices regressed by SMPL can also be used to es-
373
+ timate a sparse 3D pose as J (V), where J (·) is a linear
374
+ regressor parameterized by a matrix W ∈ RJ×6890, and J
375
+ 4
376
+
377
+ Adenotes the total number of joints.
378
+ To account for translations in 3D space, we further add a
379
+ translation Γt,n ∈ R3 to the SMPL representation, where n
380
+ is the person index. Furthermore, the 3D human pose mod-
381
+ els are overwhelmingly biased towards adult body sizes.
382
+ Thus, we explicitly model the person scale by sn ∈ R+
383
+ and our final human mesh can be defined as
384
+ ˜Vt,n = snVt,n + Γt,n.
385
+ (2)
386
+ This human mesh for person n at time t is then fully deter-
387
+ mined by the parameters θt,n, Γt,n, βn, and sn, which we
388
+ aim to recover in the following. Important to note is that the
389
+ person scale sn and shape βn are unique for each person
390
+ and consistent across the entire video sequence.
391
+ 3.1. Input Modality Regression and Matching
392
+ To solve this underconstrained and challenging problem,
393
+ our idea is to unite the strength of all data modalities, which
394
+ recent state-of-the-art Computer Vision methods provide, in
395
+ a single algorithm. More precisely, we leverage data-driven
396
+ priors in the form of four off-the-shelf methods for each
397
+ frame of the input video sequence, as shown in Figure 2.
398
+ First, we obtain normalized disparity maps ˆdt from
399
+ the state-of-the-art DPT model [41], which are then post-
400
+ processed to enhance sharpness [58]. Note that these maps
401
+ only encode relative and normalized depth and they are not
402
+ consistent across frames, which becomes visible in the form
403
+ of depth jitter.
404
+ Second, 2D pose tracking is obtained by AlphaPose [11],
405
+ which coherently detects and tracks 2D joint positions
406
+ ˆP2d
407
+ t,n ∈ RJ×2 in image space and over time. Although this
408
+ method is very robust due to training on large scale data, it
409
+ falls short in predicting 3D.
410
+ Third, we predict the body shape βt,n and joint angles
411
+ ˆθt,n for each person in each frame using ROMP [51]. Since
412
+ ROMP predicts varying shapes for a single person across
413
+ time, we average the predictions over the entire sequence to
414
+ obtain a temporally consistent body shape. Thus, the ver-
415
+ tices (Equation 2) are now only a function of the pose θt,n,
416
+ translation Γt,n, and scale sn, which will be important in
417
+ the next section. Moreover, to match the 2D AlphaPose
418
+ and the SMPL detections, we leverage ROMPs projection
419
+ model, compute the average Euclidean distance in image
420
+ space, and pair detections with the lowest distance based on
421
+ the Hungarian matching. It is worth mentioning that ROMP
422
+ cannot account for out-of-distribution body sizes, e.g. small
423
+ kids, neither it can predict the absolute 3D position of the
424
+ humans with respect to the scene.
425
+ Fourth, we also leverage human segmentation masks,
426
+ referred to as Ωt,n ∈ RH×W , which are obtained from
427
+ Mask2Former [8]. Similarly, if we consider all the remain-
428
+ ing pixels for frame t that do not belong to a person mask,
429
+ we can also obtain a per-frame background segmentation
430
+ mask Bt ∈ RH×W . To ensure that the 2D AlphaPose de-
431
+ tections, the SMPL detections, and the foreground masks
432
+ have a consistent person ID, we read the pixel values of
433
+ the segmented masks at the 2D joint detections for each de-
434
+ tected skeleton and apply a max-voting to retrieve the ID of
435
+ the person.
436
+ In summary, the inputs to our algorithm now are:
437
+ • ˆdt: Normalized disparity maps
438
+ • ˆP2d
439
+ t,n: 2D joint predictions
440
+ • ˆθt,n, ˆβn: Pose angle and shape estimates
441
+ • Ωt,n, Bt: Human and background segmentations
442
+ Note that none of these predictions individually or by a triv-
443
+ ial combination is discriminative enough to fully describe
444
+ the entire scene, i.e. absolute 3D position, pose, and scale
445
+ of the humans in the scene. Next, we demonstrate how our
446
+ proposed method solves this problem.
447
+ 3.2. Scene Scale and Depth Disambiguation
448
+ In the first part or our optimization process we focus on
449
+ jointly obtaining the joint angles θt,n, shape parameters βn,
450
+ global translation Γt,n, and scale sn of each person. Impor-
451
+ tantly, this step is performed jointly for the entire sequence,
452
+ where the global reference is in the static camera. How-
453
+ ever, estimating the height of a person and the scale given
454
+ only a single RGB video is, by itself, an ill-posed problem
455
+ as variations in scale can be compensated by a translation
456
+ along the depth and vice versa. As a result, infinitely many
457
+ scale/translation combinations can lead to the same 2D im-
458
+ age projections.
459
+ So far, we only considered individual humans without
460
+ looking at the surrounding scene, although the scene itself
461
+ can provide an important prior that helps to solve the above
462
+ problem. Therefore, we leverage recent advances in monoc-
463
+ ular depth estimation [41], which regress per-pixel normal-
464
+ ized disparity maps ˆdt. It encodes the relative depth of each
465
+ person in the scene, but obtaining the absolute depth val-
466
+ ues solely from ˆdt is also an ill-posed problem, and fur-
467
+ ther these predictions are not consistent across frames. The
468
+ question remains, how the absolute scene depth or equiva-
469
+ lently the human scales and translations can be recovered.
470
+ Our idea is to set the two entities, i.e., the scene and the
471
+ humans, into a relation such that they constrain each other
472
+ in an absolute 3D space. While the humans can already
473
+ be represented in absolute space by means of their global
474
+ translation Γt,n and scale sn, we also require a per-frame
475
+ conversion of temporally inconsistent normalized disparity
476
+ maps to absolute depth maps, which can be defined as
477
+ ˜Dt =
478
+ zfar,tznear,t
479
+ ˆdt(zfar,t − znear,t) + znear,t
480
+ (3)
481
+ 5
482
+
483
+ where znear,t and zfar,t are the near and far depth values,
484
+ respectively. Intuitively, this operation shifts and scales the
485
+ normalized disparity maps to convert them to absolute depth
486
+ values. Importantly, these near and far values are optimized
487
+ per-frame to compensate for the temporal inconsistencies in
488
+ the disparity maps.
489
+ Once both humans and the scene can be represented in
490
+ absolute 3D space, we now relate them to each other by
491
+ jointly solving for κt,n ∈ {znear,t, zfar,t, θt,n, βn, Γt,n, sn}
492
+ by minimizing the energy
493
+ arg min
494
+ ∀t∈{1,...,T },∀n∈{1,...,N}:κt,n
495
+ EI,
496
+ with
497
+ (4)
498
+ EI = Edepth + E2d + Esmpl + Ereg,
499
+ (5)
500
+ which is jointly optimized over the entire sequence. In par-
501
+ ticular, our energy is composed of a depth term Edepth, a
502
+ 2D image evidence term E2d, a joint angle and shape term
503
+ Esmpl, and additional regularization terms Ereg. In the fol-
504
+ lowing, we explain each term in more detail.
505
+ 3.2.1
506
+ Depth Consistency Energy
507
+ Most importantly, to ensure a coherent depth between the
508
+ scene and all humans in the scene, we propose a depth con-
509
+ sistency energy
510
+ Edepth = λdepth
511
+
512
+ t,n
513
+
514
+ M(Ψd( ˜Vt,n)) − M( ˜Dt)
515
+ �2
516
+ ,
517
+ (6)
518
+ M(D) =
519
+ � Ωt,n
520
+ |Ωt,n| log(D),
521
+ (7)
522
+ where |Ω| denotes the number of foreground pixels, M(·)
523
+ computes the average of the log-depth in the foreground,
524
+ Ψd(·) is a differentiable rasterizer [43] that projects and
525
+ converts a 3D mesh into a depth map in the image plane,
526
+ and λdepth is a hyperparameter. The vertices ˜Vt,n refer to
527
+ the estimated SMPL models of each person in global space,
528
+ which are a function of the variables θt,n, βn, Γt,n, and sn
529
+ (Equation 2). The rasterized human depths are then com-
530
+ pared to the estimated absolute depth map ˜Dt of the scene
531
+ (Equation 3), which are a function of the variables znear,t
532
+ and zfar,t. Thus, this energy jointly optimizes the human
533
+ and the scene parameters. However, since both sides of the
534
+ penalty term contain free variables, this energy alone would
535
+ not disambiguate the problem.
536
+ 3.2.2
537
+ Image Projection Energy
538
+ We introduce an additional data term, which further con-
539
+ strains the human-related variables by enforcing the 3D
540
+ bodies to project accurately into the image plane. More pre-
541
+ cisely, the data term
542
+ E2d = Ejoints + Esilhouette
543
+ (8)
544
+ penalizes the error between the projected 3D body joints
545
+ J ( ˜Vt,n) of the optimized SMPL models and the respective
546
+ 2D body joints ˆP2d
547
+ t,n regressed by AlphaPose with
548
+ Ejoints =
549
+
550
+ t,n
551
+ ���Π(J ( ˜Vt,n)) − ˆP2d
552
+ t,n
553
+ ���
554
+ 2
555
+ 2,
556
+ (9)
557
+ where Π(·) is the perspective camera projection operator.
558
+ The right term of (8) penalizes the discrepancy between the
559
+ SMPL silhouette and the instance segmentation masks:
560
+ Esilhouette = λsilhouette
561
+ |Ω|
562
+
563
+ t,n
564
+ σt,n
565
+ ���Ψs( ˜Vt,n) − Ωt,n
566
+ ���
567
+ 2
568
+ 2,
569
+ (10)
570
+ where Ψs(·) is a differentiable renderer [43] that projects
571
+ and converts a 3D mesh into a silhouette image and σt,n is
572
+ a visibility mask, so vertices hidden by other humans are
573
+ not penalized.
574
+ 3.2.3
575
+ Joint Angle and Shape Energy
576
+ Since (8) only constrains the parameters in 2D image space,
577
+ we further add an additional data term that ensures that
578
+ the optimized SMPL parameters are close the prediction of
579
+ ROMP:
580
+ Esmpl = λsmpl
581
+
582
+ t,n
583
+ ���θt,n − ˆθt,n
584
+ ���
585
+ 1 +
586
+ ���βn − ˆβn
587
+ ���
588
+ 1 . (11)
589
+ Here, ∥·∥1 denotes the L1 norm.
590
+ 3.2.4
591
+ Temporal and Human Priors
592
+ To further constrain the scale and position of a person, we
593
+ leverage priors on the human body size and on the temporal
594
+ information. This is achieved by our regularization term
595
+ Ereg = Escale + Espeed.
596
+ (12)
597
+ For the scale term Escale, our assumptions are two-fold:
598
+ i) The scale of a person should not deviate too much from
599
+ the standard person size, i.e., the standard SMPL size when
600
+ sn = 1, and ii) the average scale of multiple people in the
601
+ scene should remain close to one. This dual assumption is
602
+ enforced by
603
+ Escale = λscale
604
+
605
+ n
606
+ (sn − 1)2 +
607
+ ��
608
+ n
609
+ (sn − 1)
610
+ �2
611
+ ,
612
+ (13)
613
+ where the first term accounts for the individual person scale
614
+ and the second term accounts for the average scale of mul-
615
+ tiple persons.
616
+ In addition to the person scale, we also introduce an un-
617
+ derlying assumption that locomotion is rather smooth over
618
+ 6
619
+
620
+ Figure 3. Per-frame estimations of our method considering the first
621
+ optimization part (Section 3.2) only. From left to right: Estimated
622
+ depth map, frontal view of the scene and estimated humans, and
623
+ top view. Note how the persons’ absolute 3D location, articulated
624
+ pose and shape as well as the scene scale can be recovered from
625
+ a single input image, even with people of different sizes (bottom
626
+ row).
627
+ time based on the physical limits of the human body, so we
628
+ penalize large movements of the root joint by our energy
629
+ Espeed = λspeed
630
+
631
+ t,n
632
+ ∥Γt,n − Γt−1,n∥2
633
+ 2 .
634
+ (14)
635
+ In the optimization process described above, the per
636
+ frame human parameters and the absolute scene depth
637
+ are obtained by means of the optimized human ∀t
638
+
639
+ {1, ..., T}, ∀n ∈ {1, ..., N} : θt,n, βn, Γt,n, sn, and scene
640
+ znear,t, zfar,t parameters.
641
+ Figure 3 shows our estimated
642
+ scene and humans for example frames. Note that the es-
643
+ timated depth looks plausible, humans and the scene are
644
+ coherent with each other, and the reprojection of humans
645
+ into the input view looks accurate.
646
+ 3.3. Space-time Coherent Pose Optimisation
647
+ Since we obtained absolute and per-frame human mod-
648
+ els and scene estimations, both information can be used to-
649
+ gether to further refine the human poses in a spatially and
650
+ temporally coherent manner.
651
+ Therefore, in the last part
652
+ of our optimization method, we refine the estimated poses
653
+ in 3D by enforcing physical plausibility between humans
654
+ and the estimated scene, as well as by applying a temporal
655
+ smoothness term. More precisely, we extend (4) by includ-
656
+ ing a new energy term EII:
657
+ arg min
658
+ ∀t∈{1,...,T },∀n∈{1,...,N}:κt,n
659
+ EI + EII,
660
+ with
661
+ (15)
662
+ EII = Econtact + Eslip + Etemporal.
663
+ (16)
664
+ For implementing Econtact and Eslip, we leverage the esti-
665
+ mated scene geometry as a reference for enforcing foot con-
666
+ tact and penalizing foot slipping. In the following, we first
667
+ explain how the per-frame depth maps are aggregated into
668
+ a static 3D scene representation, then we present the energy
669
+ terms of EII in more detail.
670
+ 3.3.1
671
+ Scene Point Cloud Estimation
672
+ Our method relies on humans as anchors in the scene, i.e.,
673
+ the estimated geometry around the humans tends to be co-
674
+ herent. However, mainly due to occlusions, the estimated
675
+ per-frame absolute depth values are not yet temporally con-
676
+ sistent for the whole scene. To obtain a static representa-
677
+ tion of the background, we rely on the segmentation masks
678
+ to aggregate the depth values in the background from each
679
+ frame into a single depth map.
680
+ This static depth map
681
+ representation is obtained by computing the per-pixel me-
682
+ dian for the entire video sequence, which is a metric ro-
683
+ bust to outlier depth values. We also experimented with
684
+ more sophisticated aggregation strategies, such as aggre-
685
+ gating values near the human anchors weighted by a Gaus-
686
+ sian distribution—since the human positions are stable—
687
+ but this strategy was significantly more expensive and re-
688
+ sulted in marginal improvements.
689
+ At the end of this ag-
690
+ gregation process, we obtain a single depth map ˆD of the
691
+ scene, which can be then converted to a point cloud repre-
692
+ sentation P ∈ RHW ×3 in absolute 3D space.
693
+ 3.3.2
694
+ Improving Physical Plausibility of Estimated
695
+ Motions
696
+ Recently, a series of works highlighted the importance of
697
+ physics awareness in monocular single person motion cap-
698
+ ture [25,44,47,48] with assumptions about the camera and
699
+ floor plane positions. Inspired by them and the fact that we
700
+ obtain a coherent and unique scale estimation of the scene,
701
+ we propose to model in our energy formulation the phys-
702
+ ical interaction between the humans and the environment.
703
+ Here, the first term penalizes ”floating” characters, i.e., hu-
704
+ mans that are not in contact with the ground, and the second
705
+ term penalizes foot sliding, i.e., a foot that is in contact with
706
+ the ground should not move.
707
+ More precisely, given the scene point cloud P and the
708
+ estimated human meshes ˜Vt,n, floating characters are pe-
709
+ nalized by
710
+ Econtact = λcontact
711
+
712
+ t,n
713
+ ζ
714
+ ����min( ˜Vy+
715
+ t,n − P)
716
+ ���
717
+ 1
718
+
719
+ (17)
720
+ where ˜Vy+
721
+ t,n ∈ R1×3 is the vertex of person n at time t with
722
+ lower Y coordinate, considering that the Y -axis is the grav-
723
+ itational axis for our coordinate frame. In other words, the
724
+ term Econtact minimizes the distance between the lower ver-
725
+ tex ˜Vy+ of each prediction and its respective closest point
726
+ in the scene point cloud. Here, ζ(·) is a robust thresholding
727
+ function, which only considers distances below 20cm.
728
+ The term
729
+ Eslip = λslip
730
+
731
+ t,n
732
+ ζ
733
+ ���∆( ˜V y+
734
+ t,n )
735
+ ���
736
+ 1
737
+ (18)
738
+ 7
739
+
740
+ penalizes the movement of this lowest vertex in the time
741
+ domain (∆) when it is in contact with the scene. By ap-
742
+ plying those energy terms, we can now enforce that the hu-
743
+ mans interact more physically accurate with respect to the
744
+ 3D scene.
745
+ 3.3.3
746
+ Temporally Stable Pose
747
+ Furthermore, since the joint and absolute position optimized
748
+ by EI can still contain smaller jitter, we propose a temporal
749
+ stability term
750
+ Etemporal = λtemporal
751
+
752
+ t,n
753
+ ���∆t( ˜Vt,n) − ∆t( ¯Vt,n)
754
+ ���
755
+ 2
756
+ ,
757
+ (19)
758
+ based on the 1C filter [5], where ∆t(Vt,n) = Vt,n −
759
+ Vt−1,n is the temporal variation of the human mesh ver-
760
+ tices and ¯Vt,n are the estimated SMPL vertices after tem-
761
+ poral filtering [5]. This term allows us to obtain temporally
762
+ more stable poses with significantly less jitter.
763
+ 4. Experiments
764
+ In this section, we present an empirical evaluation of our
765
+ method. We first briefly describe the datasets and metrics
766
+ used in our experiments in Sections 4.1 and 4.2, followed
767
+ by the implementation details in Section 4.3. Next, we com-
768
+ pare our approach with the most related works to ours in
769
+ Section 4.4. In Section 4.5, we perform a thorough abla-
770
+ tion study of the main components of our method and show
771
+ additional qualitative results in Section 4.6.
772
+ 4.1. Datasets
773
+ MuPoTs-3D [35] is a test dataset composed of 20 video
774
+ sequences with multiple people, including different types of
775
+ cameras in indoor and outdoor environments. We followed
776
+ the evaluation protocol from [35] in our experiments. This
777
+ dataset is especially challenging due to the large amount
778
+ of interactions between humans and the various types of
779
+ scenes. Ground-truth 3D pose annotations are provided in
780
+ absolute coordinates.
781
+ CMU Panoptic [21] is a dataset recorded in the Panoptic
782
+ Studio with multiple people. As in preliminary work [20,
783
+ 65], we use this dataset for evaluation considering the
784
+ sequences haggling1, ultimatum1, and pizza1,
785
+ which are performed by several adults.
786
+ In addition to the previous datasets, we also evaluated
787
+ our method quantitatively on Internet videos considering
788
+ challenging cases with multiple people of different sizes,
789
+ including adults and children.
790
+ 4.2. Metrics
791
+ MRPE and AP. We quantitatively evaluate the predic-
792
+ tion of the absolute 3D location of a human using the widely
793
+ adopted mean root position error (MRPE), in millimeters,
794
+ and the average precision of the human root joint (AProot
795
+ 25 )
796
+ [37], considering the standard threshold of 25 cm.
797
+ 3DPCK. The quality of the articulated 3D pose prediction
798
+ is measured using root-relative 3DPCK [33], with the stan-
799
+ dard threshold of 15 cm. The 3DPCK metric enables mea-
800
+ suring the correctness of the pose, independently of the pre-
801
+ diction of the absolute 3D location of the human.
802
+ MPJPE. For a fair comparison with previous methods,
803
+ we also report root-relative mean per-joint position error
804
+ (MPJPE) in the CMU Panoptic dataset.
805
+ Jitter.
806
+ Finally, since we are targeting high-quality tem-
807
+ poral predictions in 3D coordinates, we also evaluate the
808
+ amount of jitter of our estimations, which is a critical in-
809
+ dicator for many downstream applications. For this eval-
810
+ uation, we adapted the temporal smoothness error esmooth
811
+ from [47] to evaluate the jitter in 3D coordinates.
812
+ 4.3. Implementation Details
813
+ Our method is implemented in PyTorch [38] using Py-
814
+ Torch3D [43] for the rasterization (6) and silhouette render-
815
+ ing (10). The camera intrinsics are used in the 3D joint pro-
816
+ jection (9), rasterization (6), and rendering (10) parts, and
817
+ can be obtained from video metadata if not given. We ap-
818
+ ply the RMSprop [17] optimizer with the parameters α and
819
+ momentum set to 0.5 and 0.9, respectively, for all experi-
820
+ ments. In the optimization process, we initially minimize
821
+ the first part (4) only for 30 iterations, then perform the full
822
+ optimization (15) for more 200 iterations. We use a learn-
823
+ ing rate initially set to 0.01 and exponentially decaying with
824
+ factor 0.99.
825
+ The weights λ(.) were empirically defined to
826
+ balance the magnitude of the individual energy terms, and
827
+ fixed in the method in all experiments, except when men-
828
+ tioned otherwise (ablation in Section 4.5).
829
+ The values
830
+ were defined as λdepth = λspeed = 0.05, λsilhouette = 0.1,
831
+ λsmpl = λtemporal = 0.002, λscale = 0.0001, λcontact =
832
+ 0.001, and λslip = 0.01.
833
+ For numerical stability, we con-
834
+ strain the variables sn, znear,t, and zfar,t to be non-zero and
835
+ positive. Both human and background segmentation masks
836
+ were post-processed with morphological erosion and dila-
837
+ tion filters of size 3×3 and 5×5, respectively. For the sake
838
+ of GPU memory efficiency, we use mini batches of ten im-
839
+ ages in the depth and silhouette losses. Our experiments run
840
+ on a workstation with one Nvidia Titan V GPU with 12 GB
841
+ of memory.
842
+ 4.4. Comparison with Previous Methods
843
+ In Table 1, we compare our method to the most related
844
+ prior work. We compare our method for human localiza-
845
+ tion considering MRPE and AProot
846
+ 25
847
+ metrics with the meth-
848
+ ods that are capable of providing such predictions. We use
849
+ two protocols to evaluate the quality of the 3D pose. First,
850
+ we compare against the global 3D pose without any nor-
851
+ 8
852
+
853
+ Table 1. Comparison of our method with previous approaches on
854
+ MuPoTs-3D in the MRPE (lower is better), AProot
855
+ 25 , and 3DPCK
856
+ metrics (higher is better), considering the global 3D pose and the
857
+ normalized (univ) ground truths. Our approach is superior to all
858
+ compared methods on the absolute metrics (MRPE, AProot
859
+ 25
860
+ and
861
+ 3DPCK3d), i.e., the most expressive ones for 3D human motion
862
+ capture. “†” evaluated on samples with IK only; “∗” evaluated on
863
+ root-relative predictions without IK; “‡” results only possible with
864
+ an additional 2D fitting stage, implemented as our baseline.
865
+ Method
866
+ Char.
867
+ control
868
+ MRPE ↓
869
+ AProot
870
+ 25
871
+ 3DPCK3d
872
+ 3DPCKuniv
873
+ LCR-Net [45]
874
+ 
875
+
876
+
877
+
878
+ 53.8
879
+ LCR-Net++ [46]
880
+ 
881
+
882
+
883
+
884
+ 70.6
885
+ 3DMPPE [37]
886
+ 
887
+
888
+ 31.0
889
+
890
+ 81.8
891
+ SMAP [69]
892
+ 
893
+
894
+ 45.5
895
+
896
+ 80.3
897
+ XNect∗ [34]
898
+ 
899
+
900
+
901
+ 64.1
902
+ 71.9
903
+ XNect† [34]
904
+ 
905
+ 639
906
+ 31.6
907
+ 56.5
908
+ 60.1
909
+ CRMH [20]
910
+ 
911
+
912
+
913
+
914
+ 69.1
915
+ BEV [52]
916
+ 
917
+
918
+
919
+
920
+ 70.2
921
+ Baseline (ROMP+2D fitting)
922
+ 
923
+ 331‡
924
+ 45.4‡
925
+ 68.2‡
926
+ 71.8
927
+ Ours
928
+ 
929
+ 266
930
+ 62.3
931
+ 74.9
932
+ 78.9
933
+ malization, which is a fairer protocol for our method, since
934
+ we are capable of estimating the person scale (denoted by
935
+ 3DPCK3d). In the second case, we compare against the uni-
936
+ versal 3D pose, which has all bone lengths normalized to a
937
+ standard size, as described in [35] (denoted as 3DPCKuniv).
938
+ For this universal protocol, in our method, we assume per-
939
+ son scale sn equals to one for all predictions. Note how our
940
+ method outperforms all prior work by a wide margin at 3D
941
+ localization and also performs better at estimating the ar-
942
+ ticulated pose compared to all other methods that allow for
943
+ character control.
944
+ As a baseline, we evaluate ROMP [51]
945
+ predictions with an additional stage for fitting estimated
946
+ SMPL models to AlphaPose 2D body joint detections, since
947
+ this is the closest setup to our method without including our
948
+ new energy functions. For this, we assume a unitary person
949
+ scale (w.r.t. the SMPL neutral model) and optimize only
950
+ the global translation in 3D of each person.
951
+ In a similar
952
+ manner, XNect [34] estimates the global position by fitting
953
+ the predicted 3D poses into 2D body joints, assuming a uni-
954
+ versal and normalized human body size. The inverse kine-
955
+ matics (IK) stage from XNect allows this global estimation,
956
+ however, since the optimized 3D human pose differs from
957
+ the preliminary estimated pose, the accuracy after IK drops
958
+ significantly. In summary, we observe that our approach
959
+ outperforms previous methods for human position estima-
960
+ tion by a significant margin, improving the average preci-
961
+ sion of the root joint from 45.4% to 62.3%. Our method
962
+ also outperforms all other approaches for human pose esti-
963
+ mation that are capable of driving a virtual character.
964
+ In Table 2, we compare our method with other ap-
965
+ proaches on the CMU Panoptic dataset. This dataset is spe-
966
+ cially challenging because in many sequences the persons
967
+ are only partially visible, either due to occlusions, or be-
968
+ Table 2. Comparison of our method with previous approaches
969
+ on the CMU Panoptic dataset for 3D pose estimation. Results
970
+ reported in millimeters. Camera views capturing only the upper
971
+ body parts were not used in our evaluation. † evaluated in all the
972
+ sequences. Best results are bold on the standard sequences and
973
+ underlined on the full-body visible sequences.
974
+ Metric
975
+ Method
976
+ Haggling
977
+ Ultimatum
978
+ Pizza
979
+ Avg.
980
+ MPJPE
981
+ CRMH [20]†
982
+ 129.6
983
+ 153.0
984
+ 156.7
985
+ 146.4
986
+ BEV [52]†
987
+ 90.7
988
+ 113.1
989
+ 125.2
990
+ 109.6
991
+ Baseline
992
+ 93.6
993
+ 133.8
994
+ 145.9
995
+ 124.4
996
+ Ours
997
+ 84.5
998
+ 108.9
999
+ 133.2
1000
+ 108.9
1001
+ MRPE
1002
+ Baseline
1003
+ 235.2
1004
+ 269.6
1005
+ 356.4
1006
+ 287.0
1007
+ Ours
1008
+ 213.7
1009
+ 208.0
1010
+ 229.7
1011
+ 217.1
1012
+ cause the camera is capturing only the upper body part of
1013
+ the actors. Even in this challenging scenario, our method
1014
+ performs on par with the recent BEV [52] method, which
1015
+ was trained on the CMU Panoptic dataset and, therefore,
1016
+ performs better in the cases of partial body visibility then
1017
+ our optimization approach. In order to evaluate the perfor-
1018
+ mance of our method on the more practical scenario of cam-
1019
+ eras recording the full body of the persons, we removed the
1020
+ few sequences capturing only the upper body parts. In this
1021
+ setup, we largely improve over other methods and over our
1022
+ baseline, as can be seen by the underlined numbers in Ta-
1023
+ ble 2.
1024
+ For many downstream applications, such as gaming and
1025
+ character control, jitter is a severe artifact that hinders us-
1026
+ ability. Therefore, we also evaluated our method by report-
1027
+ ing the temporal smoothness error esmooth in 3D coordi-
1028
+ nates. The results from our method, as well as from previ-
1029
+ ous work in the literature related to ours, are shown in Ta-
1030
+ ble 3. In this experiment, we compared our approach with
1031
+ two methods from the literature, showing a significant im-
1032
+ provement in reducing the jitter artifact. Furthermore, we
1033
+ also evaluated the contribution of different components of
1034
+ our method. For instance, the temporal energy term in our
1035
+ approach has a critical effect in reducing jitter. In addition,
1036
+ the contact and slip terms also contribute in a small propor-
1037
+ tion but consistently to all metrics, regardless the presence
1038
+ or absence of the temporal energy. When all terms are in-
1039
+ cluded, our approach is very stable, with an average jitter
1040
+ error below 1cm.
1041
+ 4.5. Ablation Study
1042
+ In this section, we perform additional evaluations of
1043
+ the different components of our method. The results on
1044
+ MuPoTs-3D are shown in Tables 4 and 5. First, we evaluate
1045
+ the influence of the energy terms of the first part of our op-
1046
+ timization framework. The energy term Edepth provides es-
1047
+ sential information to disambiguate depth and scale, which
1048
+ contributes to improving the position estimation. The flex-
1049
+ 9
1050
+
1051
+ Ground-truth
1052
+ Ours
1053
+ Baseline (ROMP + 2D fitting)
1054
+ XNect
1055
+ Figure 4. Comparisons of predictions from our method with other approaches. Compared to XNect and our baseline, our method is the
1056
+ only one that is able to estimate the person scale. Therefore, it predicts human positions in a more coherent way even for people of smaller
1057
+ height. 3D human poses are shown in the image plane (left) and top view (right). The ground-truth pose is not available for all the subjects
1058
+ in the dataset. Digital zoom is recommended.
1059
+ Table 3. Comparison of our method on MuPoTs-3D with previous
1060
+ approaches on temporal smoothness error esmooth, that measures
1061
+ the amount of jitter in the predictions in millimeters. We also
1062
+ report the MRPE and 3DPCK3d metrics for completeness. Our
1063
+ method has a drastically lower jitter in the prediction compared to
1064
+ previous multi-person motion capture approaches.
1065
+ Method
1066
+ Jitter ↓
1067
+ MRPE ↓
1068
+ 3DPCK3d ↑
1069
+ XNect [34]
1070
+ 136.4
1071
+ 639
1072
+ 56.5
1073
+ ROMP [51]
1074
+ 59.6
1075
+ 331
1076
+ 68.2
1077
+ Ours (EI only)
1078
+ 17.5
1079
+ 281
1080
+ 73.5
1081
+ Ours (EI + Econtact)
1082
+ 17.6
1083
+ 276
1084
+ 73.7
1085
+ Ours (EI + Econtact + Eslip)
1086
+ 17.1
1087
+ 273
1088
+ 73.8
1089
+ Ours (EI + Etemporal)
1090
+ 7.8
1091
+ 272
1092
+ 74.8
1093
+ Ours (EI + Econtact + Eslip + Etemporal)
1094
+ 7.5
1095
+ 266
1096
+ 74.9
1097
+ ibility provided by the person scale factor can be detrimen-
1098
+ tal to the overall accuracy of the method if no constraints
1099
+ are imposed on it. This can be seen in the second row of
1100
+ Table 4, without Escale.
1101
+ By constraining our predictions
1102
+ to remain close to the original estimates from ROMP, our
1103
+ method enforces the final estimates to be valid and prevents
1104
+ them from collapsing, as shown in the results without Esmpl.
1105
+ Finally, Espeed is relevant for reducing jitter and the silhou-
1106
+ ette term provides beneficial contributions to all the metrics.
1107
+ With all the energy terms, our method is stable and precise
1108
+ in estimating 3D position and pose.
1109
+ Since our method
1110
+ relies on off-the-shelf predictors as input, we also provide
1111
+ a concise evaluation considering two different 2D pose and
1112
+ three different depth estimation models from the recent lit-
1113
+ erature. The results in Table 5 show that the influence of the
1114
+ depth estimation models is relatively small; however, the
1115
+ best performing model is the most recent transformer archi-
1116
+ tecture, which suggests that our approach directly benefits
1117
+ from improved monocular depth estimations. Regarding 2D
1118
+ pose estimation, HRNet [57] performed worse than Alpha-
1119
+ Pose, since HRNet relies on person detection as a first step,
1120
+ Table 4. Ablation study for different energy terms. Without the
1121
+ proposed depth and scale terms, the global position in 3D cannot
1122
+ be precisely recovered, i.e., AProot
1123
+ 25
1124
+ drops from 62.3 to 47.4% and
1125
+ to 22.2%, respectively. The SMPL term is critical for enforcing
1126
+ valid estimates, and the speed term contributes to reducing the jit-
1127
+ ter. The silhouette term provides consistent improvements in all
1128
+ the metrics.
1129
+ Experiment
1130
+ Jitter ↓
1131
+ MRPE ↓
1132
+ AProot
1133
+ 25
1134
+
1135
+ 3DPCK3d ↑
1136
+ w/o Edepth
1137
+ 7.8
1138
+ 284
1139
+ 47.4
1140
+ 75.5
1141
+ w/o Escale
1142
+ 7.7
1143
+ 541
1144
+ 22.2
1145
+ 68.9
1146
+ w/o Esmpl
1147
+ 8.0
1148
+ 674
1149
+ 11.5
1150
+ 56.3
1151
+ w/o Espeed
1152
+ 8.9
1153
+ 269
1154
+ 63.6
1155
+ 74.8
1156
+ w/o Esilhouette
1157
+ 7.6
1158
+ 270
1159
+ 62.0
1160
+ 74.7
1161
+ Ours (full)
1162
+ 7.5
1163
+ 266
1164
+ 62.3
1165
+ 74.9
1166
+ Table 5. Our results considering different models for 2D pose and
1167
+ monocular depth estimation. We observe that the human posi-
1168
+ tion estimation from our method benefits directly from advances in
1169
+ the monocular depth estimation when comparing MiDaS v2.1 [42]
1170
+ and DPT-Large [41].
1171
+ 2D Pose Model
1172
+ Depth Model
1173
+ MRPE ↓
1174
+ AProot
1175
+ 25
1176
+
1177
+ 3DPCK3d ↑
1178
+ AlphaPose
1179
+ MiDaS v2.1
1180
+ 278
1181
+ 55.8
1182
+ 75.7
1183
+ AlphaPose
1184
+ DPT-Hybrid
1185
+ 276
1186
+ 60.8
1187
+ 75.0
1188
+ AlphaPose
1189
+ DPT-Large
1190
+ 266
1191
+ 62.3
1192
+ 74.9
1193
+ HRNet
1194
+ DPT-Large
1195
+ 304
1196
+ 54.9
1197
+ 72.7
1198
+ which makes it susceptible to detection failures.
1199
+ 4.6. Qualitative Results
1200
+ Figure 4 provides additional qualitative results with pre-
1201
+ dictions from our method in 3D coordinates, alongside
1202
+ the ground truth pose.
1203
+ We compare our method with
1204
+ XNect [34] and ROMP [51]. We can see that predictions
1205
+ from ROMP do often not correspond to the correct posi-
1206
+ tion of the humans in the scene, since it is not able to esti-
1207
+ mate the correct person scale. For XNect, we can observe
1208
+ 10
1209
+
1210
+ Input image
1211
+ Ours
1212
+ Baseline (ROMP + 2D fitting)
1213
+ Figure 5. 3D Human poses estimated by our method from Internet videos. The baseline method can correctly localise the persons in the
1214
+ image plane, but fails drastically in positioning the characters in 3D. Note from our method the correct character order along the depth
1215
+ channel and the correctly estimated scale for each person. Digital zoom is recommended.
1216
+ BEV
1217
+ GLAMR
1218
+ Ours
1219
+ Input image
1220
+ Figure 6. Our results compared to BEV [52] and GLAMR [64] on
1221
+ a scene with people of different sizes.
1222
+ that it also fails to recover the correct scale of the person,
1223
+ which can be observed from the top view. On the other
1224
+ hand, our approach can predict a 3D pose that corresponds
1225
+ to the ground truth human annotation and is coherently po-
1226
+ sitioned in 3D coordinates. We also compare our method
1227
+ with GLAMR [64] and BEV [52] in Figure 6. GLAMR
1228
+ fails to track all the persons in the scene and BEV fails to
1229
+ predict coherent human positions. More qualitative com-
1230
+ parisons are in the supplementary video.
1231
+ Our method has the advantage of jointly estimating the
1232
+ humans and the scene point cloud, which can be further
1233
+ used to impose physical constrains in the estimated humans
1234
+ over time. The effect of these constraints can be visually
1235
+ seen in Figure 7, where we show a sequence of a person
1236
+ standing on the floor. In the top row, where no physical
1237
+ w/o physics term
1238
+ with physics term
1239
+ frame t
1240
+ frame t+1
1241
+ Figure 7. The effect of the physical constrains imposed by the es-
1242
+ timated geometry in our predictions. The results without Econtact
1243
+ and Eslip (top) contain more foot sliding artifacts than our results
1244
+ with physical constrains (bottom).
1245
+ constraints were applied, we can observe that the right foot
1246
+ oscillates drastically from one frame to another. When the
1247
+ physical constraints are applied (the bottom row), this arti-
1248
+ fact is drastically reduced, and the right foot stays still in
1249
+ contact with the ground.
1250
+ Since our method does not require any specific train-
1251
+ ing procedure and rely on multiple predictions from models
1252
+ trained on a large corpus of data, our approach automati-
1253
+ cally generalizes well for in-the-wild and Internet videos, as
1254
+ can be seen in Figure 5 and can be directly used to drive vir-
1255
+ tual characters from monocular RGB videos; see Figure 8.
1256
+ 11
1257
+
1258
+ XXInput image
1259
+ Retarged character
1260
+ Figure 8. Our method can be directly used to drive virtual charac-
1261
+ ters or animate avatars in augmented reality applications (bottom
1262
+ row) from monocular RGB videos. Note the correct character or-
1263
+ der along the depth channel. Thanks to our physical plausibility
1264
+ constraints, barely any foot-floor penetrations or foot sliding are
1265
+ observed in the animations; see the video.
1266
+ 5. Discussion
1267
+ Our method achieves low reconstruction errors, because
1268
+ it can successfully leverage multi-modal inputs to disam-
1269
+ biguate the relative depths between humans and human
1270
+ scales better than previous works. Moreover, our results
1271
+ evince significantly less jitter and foot-floor penetrations
1272
+ than the evaluated baselines for multi-human 3D pose esti-
1273
+ mation and the ablative study confirms that all components
1274
+ of the method contribute to the final accuracy. We have
1275
+ demonstrated that the recovered 3D human motions can be
1276
+ applied for virtual character animation, as one potential ap-
1277
+ plication among the many others.
1278
+ Limitations and Possible Extensions.
1279
+ Although our
1280
+ method outperforms competing methods and makes a step
1281
+ forward in monocular multi-human 3D motion capture, it
1282
+ has several limitations caused by the severe ill-posedness of
1283
+ our monocular setting. All these limitations open possibili-
1284
+ ties for future extensions and follow-up works as described
1285
+ in the following.
1286
+ First, our approach relies on multiple inputs from pre-
1287
+ trained models (depth maps and 2D body joints) and, there-
1288
+ fore, could also be negatively affected by the output of
1289
+ those methods; for example if the estimated depth maps
1290
+ contain significant artefacts (e.g., when obtained on our-of-
1291
+ distribution environments). On the other hand, this implies
1292
+ that the performance of our approach has the potential to
1293
+ keep increasing in the future with the progress in related
1294
+ fields (cf. Table 5).
1295
+ Our method also requires that people are entirely visi-
1296
+ ble in most of the frames and move in the scene. Other-
1297
+ wise, the setting becomes degenerate, and we do not get
1298
+ enough cues for accurate reconstruction. Even though we
1299
+ mitigate artefacts that appear as violations of physical laws
1300
+ by geometric terms, some minor ones of this type remain.
1301
+ Further improvements can be attained by methods explic-
1302
+ itly modelling physical laws as in single-human 3D motion
1303
+ capture [47,48,60].
1304
+ Moreover, while the static camera assumption is practi-
1305
+ cal, it is also very challenging, and a moving camera could
1306
+ provide additional 3D reconstruction cues. Finally, the pro-
1307
+ posed approach is an optimization method that can effi-
1308
+ ciently process an entire video sequence and extract rele-
1309
+ vant information about the scene from all frames globally.
1310
+ However, due to this characteristic, the method in its current
1311
+ version does not allow real-time applications.
1312
+ 6. Conclusion
1313
+ We present a new holistic approach for multi-human 3D
1314
+ motion capture from a single static monocular RGB cam-
1315
+ era. Our core statement—that the synergy between multi-
1316
+ modal inputs and priors can significantly boost the 3D re-
1317
+ construction accuracy in this challenging setting—is con-
1318
+ firmed by extensive experiments in which we set a new state
1319
+ of the art on commonly used benchmarks. Moreover, as
1320
+ expected, we confirm that the constraints from the scene
1321
+ point clouds steadily boost the accuracy of the final 3D
1322
+ poses.
1323
+ Qualitatively, our reconstructions evince substan-
1324
+ tially fewer artefacts (such as jitter and foot-floor penetra-
1325
+ tions), enabling exciting downstream applications such as
1326
+ motion re-targeting for virtual characters. We believe that
1327
+ the proposed holistic approach for multi-human 3D motion
1328
+ capture can be extended in many useful ways, and we will
1329
+ be excited to see follow-ups.
1330
+ References
1331
+ [1] Abdallah Benzine,
1332
+ Florian Chabot,
1333
+ Bertrand Luvison,
1334
+ Quoc Cuong Pham, and Catherine Achard.
1335
+ Pandanet:
1336
+ Anchor-based single-shot multi-person 3d pose estimation.
1337
+ In Proceedings of the IEEE/CVF Conference on Computer
1338
+ Vision and Pattern Recognition, pages 6856–6865, 2020. 3
1339
+ [2] Bharat Lal Bhatnagar, Xianghui Xie, Ilya A Petrov, Cristian
1340
+ Sminchisescu, Christian Theobalt, and Gerard Pons-Moll.
1341
+ Behave: Dataset and method for tracking human object in-
1342
+ teractions. arXiv preprint arXiv:2204.06950, 2022. 3
1343
+ [3] Didier Bieler, Semih Gunel, Pascal Fua, and Helge Rhodin.
1344
+ Gravity as a reference for estimating a person’s height from
1345
+ video.
1346
+ In International Conference on Computer Vision
1347
+ (ICCV), 2019. 3
1348
+ [4] Zhe Cao, Gines Hidalgo, Tomas Simon, Shih-En Wei, and
1349
+ Yaser Sheikh.
1350
+ Openpose: Realtime multi-person 2d pose
1351
+ estimation using part affinity fields. IEEE Transactions on
1352
+ Pattern Analysis and Machine Intelligence, 43(1):172–186,
1353
+ 2021. 2
1354
+ 12
1355
+
1356
+ [5] G´ery Casiez, Nicolas Roussel, and Daniel Vogel. 1C filter:
1357
+ a simple speed-based low-pass filter for noisy input in in-
1358
+ teractive systems. In Proceedings of the SIGCHI Conference
1359
+ on Human Factors in Computing Systems, pages 2527–2530,
1360
+ 2012. 8
1361
+ [6] Ching-Hang Chen and Deva Ramanan. 3D Human Pose Es-
1362
+ timation = 2D Pose Estimation + Matching. In The IEEE
1363
+ Conference on Computer Vision and Pattern Recognition
1364
+ (CVPR), 2017. 2
1365
+ [7] Yixin Chen, Siyuan Huang, Tao Yuan, Siyuan Qi, Yixin
1366
+ Zhu, and Song-Chun Zhu. Holistic++ scene understanding:
1367
+ Single-view 3d holistic scene parsing and human pose es-
1368
+ timation with human-object interaction and physical com-
1369
+ monsense. In Proceedings of the IEEE/CVF International
1370
+ Conference on Computer Vision, pages 8648–8657, 2019. 3
1371
+ [8] Bowen Cheng, Ishan Misra, Alexander G Schwing, Alexan-
1372
+ der Kirillov, and Rohit Girdhar.
1373
+ Masked-attention mask
1374
+ transformer for universal image segmentation. arXiv preprint
1375
+ arXiv:2112.01527, 2021. 2, 5
1376
+ [9] Rishabh Dabral, Nitesh B Gundavarapu, Rahul Mitra, Ab-
1377
+ hishek Sharma, Ganesh Ramakrishnan, and Arjun Jain.
1378
+ Multi-person 3d human pose estimation from monocular im-
1379
+ ages. In 2019 International Conference on 3D Vision (3DV),
1380
+ pages 405–414, 2019. 3
1381
+ [10] Rishabh Dabral, Soshi Shimada, Arjun Jain, Christian
1382
+ Theobalt, and Vladislav Golyanik. Gravity-aware monocular
1383
+ 3d human-object reconstruction. In The IEEE Conference on
1384
+ International Conference on Computer Vision (ICCV), pages
1385
+ 12365–12374, October 2021. 3
1386
+ [11] Hao-Shu Fang, Shuqin Xie, Yu-Wing Tai, and Cewu Lu.
1387
+ RMPE: Regional multi-person pose estimation. In The IEEE
1388
+ Conference on International Conference on Computer Vision
1389
+ (ICCV), 2017. 2, 5
1390
+ [12] Vladimir Guzov, Aymen Mir, Torsten Sattler, and Gerard
1391
+ Pons-Moll. Human poseitioning system (hps): 3d human
1392
+ pose estimation and self-localization in large scenes from
1393
+ body-mounted sensors. In IEEE Conference on Computer
1394
+ Vision and Pattern Recognition (CVPR). IEEE, jun 2021. 3
1395
+ [13] Marc Habermann, Weipeng Xu, Michael Zollhoefer, Gerard
1396
+ Pons-Moll, and Christian Theobalt. Deepcap: Monocular
1397
+ human performance capture using weak supervision. Pro-
1398
+ ceedings of the Conference on Computer Vision and Pattern
1399
+ Recognition (CVPR), 1:1, 2020. 2, 3
1400
+ [14] Marc Habermann, Weipeng Xu, Michael Zollh¨ofer, Gerard
1401
+ Pons-Moll, and Christian Theobalt.
1402
+ Livecap: Real-time
1403
+ human performance capture from monocular video. ACM
1404
+ Transactions on Graphics (TOG), 38(2):14:1–14:17, 2019.
1405
+ 2, 3
1406
+ [15] Mohamed Hassan, Vasileios Choutas, Dimitrios Tzionas,
1407
+ and Michael J. Black. Resolving 3D human pose ambigu-
1408
+ ities with 3D scene constraints. In International Conference
1409
+ on Computer Vision (ICCV), pages 2282–2292, Oct. 2019. 3
1410
+ [16] Dorian F Henning, Tristan Laidlow, and Stefan Leutenegger.
1411
+ Bodyslam: Joint camera localisation, mapping, and human
1412
+ motion tracking. In European Conference on Computer Vi-
1413
+ sion, pages 656–673. Springer, 2022. 3
1414
+ [17] Geoffrey Hinton, Nitish Srivastava, and Kevin Swersky.
1415
+ Neural networks for machine learning lecture 6a overview
1416
+ of mini-batch gradient descent. 2012. 8
1417
+ [18] Chun-Hao P Huang, Hongwei Yi, Markus H¨oschle, Matvey
1418
+ Safroshkin, Tsvetelina Alexiadis, Senya Polikovsky, Daniel
1419
+ Scharstein, and Michael J Black. Capturing and inferring
1420
+ dense full-body human-scene contact.
1421
+ In Proceedings of
1422
+ the IEEE/CVF Conference on Computer Vision and Pattern
1423
+ Recognition, pages 13274–13285, 2022. 3
1424
+ [19] Catalin Ionescu, Dragos Papava, Vlad Olaru, and Cristian
1425
+ Sminchisescu. Human3.6m: Large scale datasets and predic-
1426
+ tive methods for 3d human sensing in natural environments.
1427
+ IEEE transactions on pattern analysis and machine intelli-
1428
+ gence, 36(7):1325–1339, 2013. 2
1429
+ [20] Wen Jiang, Nikos Kolotouros, Georgios Pavlakos, Xiaowei
1430
+ Zhou, and Kostas Daniilidis.
1431
+ Coherent reconstruction of
1432
+ multiple humans from a single image.
1433
+ In Proceedings of
1434
+ the IEEE/CVF Conference on Computer Vision and Pattern
1435
+ Recognition, pages 5579–5588, 2020. 2, 3, 8, 9
1436
+ [21] Hanbyul Joo, Hao Liu, Lei Tan, Lin Gui, Bart Nabbe,
1437
+ Iain Matthews, Takeo Kanade, Shohei Nobuhara, and Yaser
1438
+ Sheikh. Panoptic studio: A massively multiview system for
1439
+ social motion capture. In 2015 IEEE International Confer-
1440
+ ence on Computer Vision (ICCV), pages 3334–3342, 2015.
1441
+ 8
1442
+ [22] Angjoo Kanazawa, Michael J. Black, David W. Jacobs, and
1443
+ Jitendra Malik. End-to-end recovery of human shape and
1444
+ pose. In Computer Vision and Pattern Recognition (CVPR),
1445
+ pages 7122–7131, 2018. 3
1446
+ [23] Muhammed Kocabas, Nikos Athanasiou, and Michael J.
1447
+ Black.
1448
+ VIBE: Video inference for human body pose and
1449
+ shape estimation. In Computer Vision and Pattern Recog-
1450
+ nition (CVPR), 2020. 2
1451
+ [24] Nikos Kolotouros, Georgios Pavlakos, Michael J. Black, and
1452
+ Kostas Daniilidis. Learning to reconstruct 3D human pose
1453
+ and shape via model-fitting in the loop.
1454
+ In International
1455
+ Conference on Computer Vision (ICCV), pages 2252–2261,
1456
+ 2019. 3
1457
+ [25] Jiefeng Li, Siyuan Bian, Chao Xu, Gang Liu, Gang Yu, and
1458
+ Cewu Lu. D &d: Learning human dynamics from dynamic
1459
+ camera. In European Conference on Computer Vision, pages
1460
+ 479–496. Springer, 2022. 3, 7
1461
+ [26] Jiaman Li, Ruben Villegas, Duygu Ceylan, Jimei Yang,
1462
+ Zhengfei Kuang, Hao Li, and Yajie Zhao. Task-generic hi-
1463
+ erarchical human motion prior using vaes. In 2021 Inter-
1464
+ national Conference on 3D Vision (3DV), pages 771–781.
1465
+ IEEE, 2021. 3
1466
+ [27] Zhengqi Li, Tali Dekel, Forrester Cole, Richard Tucker,
1467
+ Noah Snavely, Ce Liu, and William T Freeman. Learning
1468
+ the depths of moving people by watching frozen people. In
1469
+ Proceedings of the IEEE/CVF conference on computer vi-
1470
+ sion and pattern recognition, pages 4521–4530, 2019. 2
1471
+ [28] Jiahao Lin and Gim Hee Lee. Hdnet: Human depth estima-
1472
+ tion for multi-person camera-space localization. In European
1473
+ Conference on Computer Vision, pages 633–648. Springer,
1474
+ 2020. 3
1475
+ [29] Miao Liu, Dexin Yang, Yan Zhang, Zhaopeng Cui, James M
1476
+ Rehg, and Siyu Tang. 4d human body capture from ego-
1477
+ 13
1478
+
1479
+ centric video via 3d scene grounding. In 2021 International
1480
+ Conference on 3D Vision (3DV), pages 930–939. IEEE,
1481
+ 2021. 3
1482
+ [30] Matthew Loper, Naureen Mahmood, Javier Romero, Gerard
1483
+ Pons-Moll, and Michael J Black. Smpl: A skinned multi-
1484
+ person linear model. ACM transactions on graphics (TOG),
1485
+ 34(6):1–16, 2015. 3, 4
1486
+ [31] Diogo
1487
+ C.
1488
+ Luvizon,
1489
+ David
1490
+ Picard,
1491
+ and
1492
+ Hedi
1493
+ Tabia.
1494
+ Consensus-based optimization for 3d human pose estimation
1495
+ in camera coordinates. International Journal of Computer
1496
+ Vision, 130:869–882, 2022. 2
1497
+ [32] Julieta Martinez, Rayat Hossain, Javier Romero, and James J
1498
+ Little. A simple yet effective baseline for 3d human pose esti-
1499
+ mation. In Proceedings of the IEEE international conference
1500
+ on computer vision, pages 2640–2649, 2017. 2
1501
+ [33] Dushyant Mehta,
1502
+ Helge Rhodin,
1503
+ Dan Casas,
1504
+ Pascal
1505
+ Fua, Oleksandr Sotnychenko, Weipeng Xu, and Christian
1506
+ Theobalt.
1507
+ Monocular 3D Human Pose Estimation In The
1508
+ Wild Using Improved CNN Supervision. In International
1509
+ Conference on 3D vision (3DV), 2017. 2, 8
1510
+ [34] Dushyant
1511
+ Mehta,
1512
+ Oleksandr
1513
+ Sotnychenko,
1514
+ Franziska
1515
+ Mueller, Weipeng Xu, Mohamed Elgharib, Pascal Fua,
1516
+ Hans-Peter Seidel, Helge Rhodin, Gerard Pons-Moll, and
1517
+ Christian Theobalt.
1518
+ XNect:
1519
+ Real-time multi-person 3D
1520
+ motion capture with a single RGB camera. volume 39, July
1521
+ 2020. 3, 9, 10
1522
+ [35] Dushyant
1523
+ Mehta,
1524
+ Oleksandr
1525
+ Sotnychenko,
1526
+ Franziska
1527
+ Mueller, Weipeng Xu, Srinath Sridhar, Gerard Pons-Moll,
1528
+ and Christian Theobalt. Single-shot multi-person 3d pose
1529
+ estimation from monocular rgb. In 3D Vision (3DV), 2018
1530
+ Sixth International Conference on. IEEE, sep 2018. 8, 9
1531
+ [36] Dushyant Mehta, Srinath Sridhar, Oleksandr Sotnychenko,
1532
+ Helge Rhodin, Mohammad Shafiei, Hans-Peter Seidel,
1533
+ Weipeng Xu, Dan Casas, and Christian Theobalt.
1534
+ Vnect:
1535
+ Real-time 3d human pose estimation with a single rgb cam-
1536
+ era. volume 36, 2017. 2, 3
1537
+ [37] Gyeongsik Moon, Juyong Chang, and Kyoung Mu Lee.
1538
+ Camera distance-aware top-down approach for 3d multi-
1539
+ person pose estimation from a single rgb image. In The IEEE
1540
+ Conference on International Conference on Computer Vision
1541
+ (ICCV), 2019. 2, 3, 8, 9
1542
+ [38] Adam Paszke, Sam Gross, Francisco Massa, Adam Lerer,
1543
+ James Bradbury, Gregory Chanan, Trevor Killeen, Zeming
1544
+ Lin, Natalia Gimelshein, Luca Antiga, Alban Desmaison,
1545
+ Andreas Kopf, Edward Yang, Zachary DeVito, Martin Rai-
1546
+ son, Alykhan Tejani, Sasank Chilamkurthy, Benoit Steiner,
1547
+ Lu Fang, Junjie Bai, and Soumith Chintala. Pytorch: An im-
1548
+ perative style, high-performance deep learning library. In H.
1549
+ Wallach, H. Larochelle, A. Beygelzimer, F. d'Alch´e-Buc, E.
1550
+ Fox, and R. Garnett, editors, Advances in Neural Informa-
1551
+ tion Processing Systems 32, pages 8024–8035. Curran Asso-
1552
+ ciates, Inc., 2019. 8
1553
+ [39] Georgios Pavlakos, Vasileios Choutas, Nima Ghorbani,
1554
+ Timo Bolkart, Ahmed A. A. Osman, Dimitrios Tzionas, and
1555
+ Michael J. Black. Expressive body capture: 3D hands, face,
1556
+ and body from a single image. In Computer Vision and Pat-
1557
+ tern Recognition (CVPR), pages 10975–10985, 2019. 3
1558
+ [40] Georgios Pavlakos, Xiaowei Zhou, Konstantinos G Derpa-
1559
+ nis, and Kostas Daniilidis. Coarse-to-Fine Volumetric Pre-
1560
+ diction for Single-Image 3D Human Pose.
1561
+ In The IEEE
1562
+ Conference on Computer Vision and Pattern Recognition
1563
+ (CVPR), 2017. 2, 3
1564
+ [41] Ren´e Ranftl, Alexey Bochkovskiy, and Vladlen Koltun. Vi-
1565
+ sion transformers for dense prediction. In Proceedings of
1566
+ the IEEE/CVF International Conference on Computer Vi-
1567
+ sion, pages 12179–12188, 2021. 2, 5, 10
1568
+ [42] Ren´e Ranftl,
1569
+ Katrin Lasinger,
1570
+ David Hafner,
1571
+ Konrad
1572
+ Schindler, and Vladlen Koltun. Towards robust monocular
1573
+ depth estimation: Mixing datasets for zero-shot cross-dataset
1574
+ transfer. IEEE Transactions on Pattern Analysis and Ma-
1575
+ chine Intelligence, 2020. 10
1576
+ [43] Nikhila Ravi, Jeremy Reizenstein, David Novotny, Tay-
1577
+ lor Gordon, Wan-Yen Lo, Justin Johnson, and Georgia
1578
+ Gkioxari.
1579
+ Accelerating 3d deep learning with pytorch3d.
1580
+ arXiv:2007.08501, 2020. 6, 8
1581
+ [44] Davis Rempe, Tolga Birdal, Aaron Hertzmann, Jimei Yang,
1582
+ Srinath Sridhar, and Leonidas J. Guibas. Humor: 3d human
1583
+ motion model for robust pose estimation. In International
1584
+ Conference on Computer Vision (ICCV), 2021. 7
1585
+ [45] Gregory Rogez, Philippe Weinzaepfel, and Cordelia Schmid.
1586
+ LCR-Net:
1587
+ Localization-Classification-Regression for Hu-
1588
+ man Pose. In CVPR, 2017. 3, 9
1589
+ [46] Gr´egory Rogez, Philippe Weinzaepfel, and Cordelia Schmid.
1590
+ LCR-Net++: Multi-person 2D and 3D Pose Detection in
1591
+ Natural Images. IEEE transactions on pattern analysis and
1592
+ machine intelligence, 2019. 3, 9
1593
+ [47] Soshi Shimada, Vladislav Golyanik, Weipeng Xu, Patrick
1594
+ P´erez, and Christian Theobalt. Neural monocular 3d human
1595
+ motion capture with physical awareness. ACM Transactions
1596
+ on Graphics, 40(4), 2021. 3, 7, 8, 12
1597
+ [48] Soshi Shimada, Vladislav Golyanik, Weipeng Xu, and Chris-
1598
+ tian Theobalt. Physcap: Physically plausible monocular 3d
1599
+ motion capture in real time. ACM Transactions on Graphics,
1600
+ 39(6), 2020. 3, 7, 12
1601
+ [49] Xiao Sun, Jiaxiang Shang, Shuang Liang, and Yichen Wei.
1602
+ Compositional Human Pose Regression. In The IEEE Inter-
1603
+ national Conference on Computer Vision (ICCV), Oct 2017.
1604
+ 2
1605
+ [50] Xiao Sun, Bin Xiao, Fangyin Wei, Shuang Liang, and Yichen
1606
+ Wei. Integral Human Pose Regression. In The European
1607
+ Conference on Computer Vision (ECCV), September 2018.
1608
+ 2
1609
+ [51] Yu Sun, Qian Bao, Wu Liu, Yili Fu, Black Michael J., and
1610
+ Tao Mei. Monocular, one-stage, regression of multiple 3d
1611
+ people. In The IEEE Conference on International Confer-
1612
+ ence on Computer Vision (ICCV), 2021. 2, 3, 5, 9, 10
1613
+ [52] Yu Sun, Wu Liu, Qian Bao, Yili Fu, Tao Mei, and Michael J
1614
+ Black. Putting people in their place: Monocular regression
1615
+ of 3d people in depth. In Proceedings of the IEEE/CVF Con-
1616
+ ference on Computer Vision and Pattern Recognition, pages
1617
+ 13243–13252, 2022. 3, 9, 11
1618
+ [53] Bugra Tekin, Isinsu Katircioglu, Mathieu Salzmann, Vincent
1619
+ Lepetit, and Pascal Fua. Structured Prediction of 3D Human
1620
+ Pose with Deep Neural Networks. In The British Machine
1621
+ Vision Conference (BMVC), 2016. 2
1622
+ 14
1623
+
1624
+ [54] Nicolas Ugrinovic, Adria Ruiz, Antonio Agudo, Alberto
1625
+ Sanfeliu, and Francesc Moreno-Noguer. Body size and depth
1626
+ disambiguation in multi-person reconstruction from single
1627
+ images.
1628
+ In 2021 International Conference on 3D Vision
1629
+ (3DV), pages 53–63. IEEE, 2021. 3
1630
+ [55] Bastian Wandt and Bodo Rosenhahn. Repnet: Weakly su-
1631
+ pervised training of an adversarial reprojection network for
1632
+ 3d human pose estimation. In Computer Vision and Pattern
1633
+ Recognition (CVPR), 2019. 2
1634
+ [56] Can Wang, Jiefeng Li, Wentao Liu, Chen Qian, and Cewu
1635
+ Lu. Hmor: Hierarchical multi-person ordinal relations for
1636
+ monocular multi-person 3d pose estimation.
1637
+ In European
1638
+ Conference on Computer Vision, pages 242–259. Springer,
1639
+ 2020. 3
1640
+ [57] Jingdong Wang, Ke Sun, Tianheng Cheng, Borui Jiang,
1641
+ Chaorui Deng, Yang Zhao, Dong Liu, Yadong Mu, Mingkui
1642
+ Tan, Xinggang Wang, et al.
1643
+ Deep high-resolution repre-
1644
+ sentation learning for visual recognition. IEEE transactions
1645
+ on pattern analysis and machine intelligence, 43(10):3349–
1646
+ 3364, 2020. 10
1647
+ [58] Jamie Watson, Oisin Mac Aodha, Daniyar Turmukhambetov,
1648
+ Gabriel J. Brostow, and Michael Firman. Learning stereo
1649
+ from single images. In European Conference on Computer
1650
+ Vision (ECCV), 2020. 5
1651
+ [59] Zhenzhen Weng and Serena Yeung. Holistic 3d human and
1652
+ scene mesh estimation from single view images. In Proceed-
1653
+ ings of the IEEE/CVF Conference on Computer Vision and
1654
+ Pattern Recognition, pages 334–343, 2021. 3
1655
+ [60] Kevin Xie, Tingwu Wang, Umar Iqbal, Yunrong Guo, Sanja
1656
+ Fidler, and Florian Shkurti.
1657
+ Physics-based human motion
1658
+ estimation and synthesis from videos. In International Con-
1659
+ ference on Computer Vision (ICCV), 2021. 12
1660
+ [61] Weipeng Xu, Avishek Chatterjee, Michael Zollh¨ofer, Helge
1661
+ Rhodin, Dushyant Mehta, Hans-Peter Seidel, and Christian
1662
+ Theobalt. Monoperfcap: Human performance capture from
1663
+ monocular video.
1664
+ ACM Trans. Graph., 37(2):27:1–27:15,
1665
+ May 2018. 2, 3
1666
+ [62] Hongwei Yi,
1667
+ Chun-Hao P Huang,
1668
+ Dimitrios Tzionas,
1669
+ Muhammed Kocabas, Mohamed Hassan, Siyu Tang, Justus
1670
+ Thies, and Michael J Black. Human-aware object placement
1671
+ for visual environment reconstruction.
1672
+ In Proceedings of
1673
+ the IEEE/CVF Conference on Computer Vision and Pattern
1674
+ Recognition, pages 3959–3970, 2022. 3
1675
+ [63] Ri Yu, Hwangpil Park, and Jehee Lee.
1676
+ Human dynamics
1677
+ from monocular video with dynamic camera movements.
1678
+ ACM Trans. Graph., 40(6), 2021. 3
1679
+ [64] Ye Yuan, Umar Iqbal, Pavlo Molchanov, Kris Kitani, and Jan
1680
+ Kautz. Glamr: Global occlusion-aware human mesh recov-
1681
+ ery with dynamic cameras. In Proceedings of the IEEE/CVF
1682
+ Conference on Computer Vision and Pattern Recognition,
1683
+ pages 11038–11049, 2022. 3, 11
1684
+ [65] Andrei Zanfir, Elisabeta Marinoiu, and Cristian Sminchis-
1685
+ escu.
1686
+ Monocular 3d pose and shape estimation of mul-
1687
+ tiple people in natural scenes-the importance of multiple
1688
+ scene constraints. In Proceedings of the IEEE Conference
1689
+ on Computer Vision and Pattern Recognition, pages 2148–
1690
+ 2157, 2018. 3, 8
1691
+ [66] Mihai Zanfir, Andrei Zanfir, Eduard Gabriel Bazavan,
1692
+ William T Freeman, Rahul Sukthankar, and Cristian Smin-
1693
+ chisescu. Thundr: Transformer-based 3d human reconstruc-
1694
+ tion with markers. In Proceedings of the IEEE/CVF Interna-
1695
+ tional Conference on Computer Vision, pages 12971–12980,
1696
+ 2021. 3
1697
+ [67] Siwei Zhang, Qianli Ma, Yan Zhang, Zhiyin Qian, Taein
1698
+ Kwon, Marc Pollefeys, Federica Bogo, and Siyu Tang. Ego-
1699
+ body: Human body shape and motion of interacting people
1700
+ from head-mounted devices.
1701
+ In European Conference on
1702
+ Computer Vision, pages 180–200. Springer, 2022. 3
1703
+ [68] Siwei Zhang, Yan Zhang, Federica Bogo, Marc Pollefeys,
1704
+ and Siyu Tang. Learning motion priors for 4d human body
1705
+ capture in 3d scenes. In Proceedings of the IEEE/CVF In-
1706
+ ternational Conference on Computer Vision, pages 11343–
1707
+ 11353, 2021. 3
1708
+ [69] Jianan Zhen, Qi Fang, Jiaming Sun, Wentao Liu, Wei Jiang,
1709
+ Hujun Bao, and Xiaowei Zhou. Smap: Single-shot multi-
1710
+ person absolute 3d pose estimation. In European Conference
1711
+ on Computer Vision, pages 550–566. Springer, 2020. 3, 9
1712
+ [70] Xingyi Zhou, Qixing Huang, Xiao Sun, Xiangyang Xue, and
1713
+ Yichen Wei. Towards 3d human pose estimation in the wild:
1714
+ a weakly-supervised approach. In Proceedings of the IEEE
1715
+ International Conference on Computer Vision, pages 398–
1716
+ 407, 2017. 2
1717
+ [71] Xingyi Zhou, Xiao Sun, Wei Zhang, Shuang Liang, and
1718
+ Yichen Wei. Deep kinematic pose regression. In European
1719
+ Conference on Computer Vision, pages 186–201. Springer,
1720
+ 2016. 3
1721
+ 15
1722
+
VdE4T4oBgHgl3EQfnQ2t/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
WtFJT4oBgHgl3EQfPSye/content/tmp_files/2301.11486v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
WtFJT4oBgHgl3EQfPSye/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
XdE4T4oBgHgl3EQfNgwX/content/tmp_files/2301.04956v1.pdf.txt ADDED
@@ -0,0 +1,886 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Graph Laplacian for Semi-Supervised Learning
2
+ Or Streicher and Guy Gilboa
3
+ Technion - Israel Institute of Technology, Haifa 3200003, Israel
4
5
+ Abstract. Semi-supervised learning is highly useful in common scenar-
6
+ ios where labeled data is scarce but unlabeled data is abundant. The
7
+ graph (or nonlocal) Laplacian is a fundamental smoothing operator for
8
+ solving various learning tasks. For unsupervised clustering, a spectral em-
9
+ bedding is often used, based on graph-Laplacian eigenvectors. For semi-
10
+ supervised problems, the common approach is to solve a constrained
11
+ optimization problem, regularized by a Dirichlet energy, based on the
12
+ graph-Laplacian. However, as supervision decreases, Dirichlet optimiza-
13
+ tion becomes suboptimal. We therefore would like to obtain a smooth
14
+ transition between unsupervised clustering and low-supervised graph-
15
+ based classification.
16
+ In this paper, we propose a new type of graph-Laplacian which is adapted
17
+ for Semi-Supervised Learning (SSL) problems. It is based on both density
18
+ and contrastive measures and allows the encoding of the labeled data di-
19
+ rectly in the operator. Thus, we can perform successfully semi-supervised
20
+ learning using spectral clustering. The benefits of our approach are illus-
21
+ trated for several SSL problems.
22
+ Keywords: Graph Representation · Semi-Supervise Learning · Nonlocal
23
+ Laplacian · Spectral Clustering
24
+ 1
25
+ Introduction
26
+ Labeling information is a major challenge in modern learning techniques, which
27
+ in many cases can be a long and expensive process. A possible solution to this
28
+ problem is Semi-Supervised Learning (SSL). SSL methods can be thought of as
29
+ the halfway between supervised and unsupervised learning. It uses large amounts
30
+ of unlabeled data and a limited amount of labeled data, to improve the learn-
31
+ ing model. SSL techniques are usually used when one cannot employ supervised
32
+ learning algorithms. The use of supervised learning when limited labels are avail-
33
+ able may result in a lack of generalization and overfitting. Those limited known
34
+ labels, however, can significantly improve performance compared to unsuper-
35
+ vised learning algorithms [11]. Intuitively, the purpose of SSL is to generalize
36
+ the known labels to the unlabeled samples by an appropriate smoothing opera-
37
+ tor. The graph-Laplacian has shown to be highly effective for this purpose.
38
+ In this paper, we focus on Graph-based methods which are well-studied clas-
39
+ sical techniques. We note that the insights presented here can be further used by
40
+ deep learning methods with spectral-graph modules, as in [18], [6], [21], [1]. In
41
+ arXiv:2301.04956v1 [cs.CV] 12 Jan 2023
42
+
43
+ 2
44
+ Or Streicher, Guy Gilboa
45
+ classical graph methods, a weighted graph is constructed based on the affinities
46
+ between data instances. These affinities are usually computed using a metric
47
+ of the features representing each instance. The vast majority of graph-based
48
+ learning methods use the graph-Laplacian as the smoothing operator for gener-
49
+ alization. More advanced nonlinear methods use p-Laplacian operators [8], [5].
50
+ In this study we limit the scope to the linear case (or quadratic energy), not-
51
+ ing that our proposed operators can be further generalized. Data processing
52
+ based on the Laplacian has shown to be effective for a wide range of problems
53
+ including clustering [4] [16], [22], classification [9], segmentation [19], dimension-
54
+ ality reduction [2], [7], [17] and more. For the SSL setting, most graph-based
55
+ learning techniques use the properties of the graph-Laplacian operator to define
56
+ an optimization problem. The labeled information can be inserted as problem
57
+ constraints, see e.g. [12], [3], [9], [14], [13], [20].
58
+ In this paper, we propose a different approach to consider the labeled in-
59
+ formation, by inserting it into the affinity measure that defines the connectivity
60
+ between the nodes of the graph. We first examine the work of [20] on the weighted
61
+ nonlocal Laplacian. In this work, the density of the labeled data is essentially
62
+ increased. This improves the solution of the constrained optimization problem.
63
+ We found that it has a marginal effect on the spectral embedding. Based on
64
+ contrastive arguments, we propose to increase connections between labeled and
65
+ unlabeled data and to increase (remove) connections between labeled data of
66
+ the same (different) clusters. This yields a considerably improved spectral em-
67
+ bedding.
68
+ Our proposed method retains the following main qualities: 1) Interpolation
69
+ between unsupervised and semi-supervised learning. The suggested ap-
70
+ proach enables learning for a changing range of labeled information. 2) Low-
71
+ label regime performance. The proposed method was found most advanta-
72
+ geous in the low-label regime, compared to competitive techniques. 3) Different
73
+ analysis tools. Wide variety of analysis tools can be used for solving SSL prob-
74
+ lems, including spectral and functional analysis. We illustrate the advantages of
75
+ using this new definition on toy examples and on real data sets.
76
+ 2
77
+ Setting and Notation
78
+ Let X = {xi}n
79
+ i=1 be a finite set of instances in Rd. These instances are represented
80
+ as nodes on an undirected weighted graph G = (V, E, W), where V is the vertices
81
+ set, E is the edges set and W is the adjacency matrix. The adjacency matrix is
82
+ symmetric and is usually defined by a distance measure between the nodes. For
83
+ example, a common choice is a Gaussian kernel with Euclidean distance,
84
+ Wij = exp
85
+
86
+ −||xi − xj||2
87
+ 2
88
+ 2σ2
89
+
90
+ ,
91
+ (1)
92
+ where σ is a soft-threshold parameter.
93
+
94
+ Graph Laplacian for Semi-Supervised Learning
95
+ 3
96
+ The degree matrix D is a diagonal matrix where Dii is the degree of the i-th
97
+ vertex, i.e.,
98
+ Dii =
99
+
100
+ j
101
+ Wij.
102
+ (2)
103
+ The graph-Laplacian operator is defined by,
104
+ L := D − W.
105
+ (3)
106
+ The graph-Laplacian is a symmetric, positive semi-definite matrix, i.e., ∀f ∈
107
+ Rn , f T Lf ≥ 0. For each vector f ∈ Rn it holds that
108
+ Lf ∈ Rn , Lf(j) =
109
+ n
110
+
111
+ i=1
112
+ Wij(fj − fi),
113
+ (4)
114
+ f T Lf =
115
+ n
116
+
117
+ i=1
118
+ n
119
+
120
+ j=1
121
+ Wij(fi − fj)2.
122
+ (5)
123
+ The eigenvalues of L are real and sorted in ascending order λ1 ≤ λ2 ≤ ... ≤ λn.
124
+ The corresponding eigenvectors form an orthogonal basis, denoted by u1, u2..., un.
125
+ The sample xi can be represented in the spectral embedding space as the ith
126
+ row of the matrix U =
127
+ �u1 · · · uK
128
+
129
+ ∈ Rn×K, denoted as ϕi. More formally, the
130
+ spectral embedding of an instance xi can be formulated as
131
+ xi �−→ ϕi = [u1(i), u2(i), ..., uK(i)] ∈ RK,
132
+ (6)
133
+ where in most cases K ≪ d.
134
+ For the SSL setting, let us define a discrete function f ∈ Rn over X and
135
+ S ⊂ X, such that |S| = m, m ≤ n, be a subset of X on which the values of f
136
+ are known, i.e., f(x) = g(x), ∀x ∈ S, for a given function g. The purpose of the
137
+ SSL model is to find the values of f of all data-points in X constrained by the
138
+ values of the set S.
139
+ The main SSL problem this work focuses on is clustering. To evaluate the
140
+ clustering performance we examined two common measures. The first one is
141
+ Normalized mutual information (NMI) which is defined as,
142
+ NMI(c, ˆc) =
143
+ I(c, ˆc)
144
+ max{H(c), H(ˆc)},
145
+ (7)
146
+ where I(c, ˆc) is the mutual information between the true labels c and the clus-
147
+ tering result ˆc and H(·) denotes entropy. The second measure is Unsupervised
148
+ Clustering Accuracy (ACC) which is defined as,
149
+ ACC(c, ˆc) = 1
150
+ n max
151
+ π∈Π
152
+ n
153
+
154
+ i=1
155
+ 1{ci = π(ˆci)},
156
+ (8)
157
+ where Π is the set of possible permutations of the clustering results. To choose
158
+ the optimal permutation π we used the Kuhn-Munkres algorithm [15]. Both indi-
159
+ cators are in the range [0, 1], where high values indicate a better correspondence
160
+ between the clustering result and the true labels.
161
+
162
+ 4
163
+ Or Streicher, Guy Gilboa
164
+ 3
165
+ Graph-Laplacian for SSL
166
+ 3.1
167
+ Motivation
168
+ A common approach to solve SSL problems, based on the graph-Laplacian (GL),
169
+ is to solve the Dirichlet problem
170
+ min
171
+ f
172
+ 1
173
+ 2
174
+
175
+ xi,xj∈X
176
+ Wij(f(xi) − f(xj))2,
177
+ (9)
178
+ s.t. f(x) = g(x), x ∈ S.
179
+ The solution admits
180
+
181
+ xj∈X
182
+ Wij(f(xi) − f(xj)) = 0, xi ∈ X \ S
183
+ (10)
184
+ f(x) = g(x), x ∈ S.
185
+ Note that Eq. (10) can be represented in matrix form. First, we define a con-
186
+ straints vector b ∈ Rn and a mask M ∈ Rn×n such that
187
+ bi =
188
+
189
+ g(xi)
190
+ if xi ∈ S
191
+ 0
192
+ if xi ∈ X \ S , Mij =
193
+
194
+
195
+
196
+
197
+
198
+ 1
199
+ Lii
200
+ if xi ∈ S and i = j
201
+ 0
202
+ if xi ∈ S and i ̸= j
203
+ 1
204
+ if xi ∈ X \ S, ∀j
205
+ ,
206
+ (11)
207
+ where Lii is the i-th element of the diagonal of L. Now, Eq. (10) can be intro-
208
+ duced in matrix from by
209
+ (M ◦ L)f = b,
210
+ (12)
211
+ where ◦ denotes element-wise multiplication.
212
+ A main problem with GL, as shown in [20], is that for a low sample rate
213
+ of the labeled set, |S|/|X|, the solution is not continuous at the sample points.
214
+ Thus the GL solution does not interpolate well the constraint values. In [20] the
215
+ authors suggested solving the discontinuity problem by using Weighted Nonlocal
216
+ Laplacian (WNLL), assigning a greater weight to the labeled set S compared to
217
+ the unlabeled set X \ S. Formally, the optimization problem of WNLL is given
218
+ by
219
+ min
220
+ f
221
+
222
+ xi∈X\S
223
+
224
+ xj∈X
225
+ Wij(f(xi) − f(xj))2 + µ
226
+
227
+ xi∈S
228
+
229
+ xj∈X
230
+ Wij(f(xi) − f(xj))2
231
+ (13)
232
+ s.t. f(x) = g(x), x ∈ S,
233
+ where µ is a regularization parameter. It was suggested to set
234
+ µ = |X|/|S|,
235
+ (14)
236
+
237
+ Graph Laplacian for Semi-Supervised Learning
238
+ 5
239
+ the inverse of the sample rate. This can be interpreted as increasing the density
240
+ (or measure) of the labeled instances. The solution of Eq. (13) is given by solving
241
+ the following linear system,
242
+
243
+ xj∈X
244
+ (Wij +Wji)(f(xi)−f(xj))+(µ−1)
245
+
246
+ xj∈S
247
+ Wji(f(xi)−f(xj)) = 0, xi ∈ X \S
248
+ (15)
249
+ f(x) = g(x), x ∈ S.
250
+ Similarly to Eq. (12), one can define Eq. (15) in matrix form. Let us introduce
251
+ the linear system as follows,
252
+
253
+ xj∈X
254
+ (Wij+Wji)(f(xi)−f(xj))+(µ−1)
255
+
256
+ xj∈X
257
+ W labeled
258
+ ij
259
+ (f(xi)−f(xj)) = 0, xi ∈ X\S
260
+ (16)
261
+ f(x) = g(x), x ∈ S,
262
+ such that,
263
+ W labeled
264
+ ij
265
+ =
266
+
267
+ Wij
268
+ xi ∈ X \ S, xj ∈ S or xi ∈ S, xj ∈ X \ S
269
+ 0
270
+ otherwise
271
+ (17)
272
+ or equivalently,
273
+
274
+ xj∈X
275
+
276
+ Wij + Wji + (µ − 1)W labeled
277
+ ij
278
+
279
+ (f(xi) − f(xj)) = 0, xi ∈ X \ S
280
+ (18)
281
+ f(x) = g(x), x ∈ S.
282
+ Now we can define,
283
+
284
+ xj∈X
285
+ [WW NLL]ji(f(xi) − f(xj)) = 0, xi ∈ X \ S
286
+ (19)
287
+ f(x) = g(x), x ∈ S,
288
+ where
289
+ WW NLL = 2W + (µ − 1)W labeled.
290
+ (20)
291
+ Based on WW NLL one can define LW NLL, Eq. (3), such that Eq. (15) is equiv-
292
+ alent to
293
+ (M ◦ LW NLL)f = b.
294
+ (21)
295
+ Inspired by Eq. (20), we would like to define an affinity matrix that takes
296
+ into account the known labels, such that it also distinguishes between labeled
297
+ samples from the same and from different clusters.
298
+
299
+ 6
300
+ Or Streicher, Guy Gilboa
301
+ 3.2
302
+ Semi-Supervised Laplacian Definition
303
+ The classical definition of the graph-Laplacian, Eq. (3), is based on the data fea-
304
+ tures in an unsupervised manner. In this section, we introduce a novel definition
305
+ of the graph affinity matrix for SSL problems. That means, the affinity measure
306
+ takes into account not only the feature vectors but also the known information
307
+ about the labels of a subset S of V . The proposed definition is intended to im-
308
+ prove performance for SSL clustering problems. For K clusters, we denote by Sk
309
+ the set of labeled nodes belonging to the k-th cluster, such that S = ∪K
310
+ k=1Sk.
311
+ We suggest the following affinity measure
312
+ WSSL = 2W + αW labeled,
313
+ (22)
314
+ where W is the known unsupervised affinity matrix, α is a scalar parameter, we
315
+ set
316
+ α = |X|/|S| − 1,
317
+ (23)
318
+ and W labeled is defined as follows,
319
+ W labeled
320
+ ij
321
+ =
322
+
323
+
324
+
325
+
326
+
327
+
328
+
329
+
330
+
331
+ max(W)
332
+ xi, xj ∈ Sk , ∀k ∈ {1, ..K}
333
+ − 2
334
+ αWij
335
+ xi ∈ Sk, xj ∈ Sl , ∀k, l ∈ {1, ..K|k ̸= l}
336
+ Wij
337
+ xi ∈ S, xj ∈ X \ S or xi ∈ X \ S, xj ∈ S
338
+ 0
339
+ xi, xj ∈ X \ S
340
+ .
341
+ (24)
342
+ It can be observed that according to this definition, the connection between
343
+ labeled nodes belonging to the same cluster is given the highest weight (max(W)
344
+ is the maximum value of the unsupervised affinity matrix). This strong affinity
345
+ ensures the nodes are well connected inducing high smoothness of the spectral
346
+ solution at these regions. Connections between labeled nodes of different clusters
347
+ are disconnected. This increases the separation of these nodes, avoiding unnec-
348
+ essary regularity between nodes belonging to separate clusters. In addition, as
349
+ in Eq. (17), we reinforce edges between labeled nodes and unlabeled nodes. Now
350
+ we can define the SSL graph-Laplacian as follows,
351
+ LSSL = DSSL − WSSL,
352
+ (25)
353
+ where WSSL is defined in Eq. (22) and DSSL is its associated degree matrix (see
354
+ Eq. (2)). In a similar manner to Eq. (12), one can solve the following problem
355
+ (M ◦ LSSL)f = b.
356
+ (26)
357
+ 4
358
+ Analysis of LSSL
359
+ In this section, we analyze the characteristics of LSSL for different scenarios.
360
+ First, we analyze the influence of each of the components in Eq. (24) on the
361
+ spectral embedding. Let us define the following affinity matrices,
362
+ W 1
363
+ ij =
364
+
365
+ max(W)
366
+ xi, xj ∈ Sk , ∀k ∈ {1, ..K}
367
+ 0
368
+ otherwise
369
+ (27)
370
+
371
+ Graph Laplacian for Semi-Supervised Learning
372
+ 7
373
+ W 2
374
+ ij =
375
+
376
+ − 2
377
+ αWij
378
+ xi ∈ Sk, xj ∈ Sl , ∀k, l ∈ {1, ..K|k ̸= l}
379
+ 0
380
+ otherwise
381
+ (28)
382
+ W 3
383
+ ij =
384
+
385
+ Wij
386
+ xi ∈ S, xj ∈ X \ S or xi ∈ X \ S, xj ∈ S
387
+ 0
388
+ otherwise
389
+ (29)
390
+ Note that W 1 and W 2 can be interpreted as Contrastive Affinities, following
391
+ insights of contrastive learning [10]. The contrastive paradigm aims at creating
392
+ an embedding where instances of the same cluster are very close (the role of
393
+ W 1), whereas instances of different clusters are distinctly separated (the role of
394
+ W 2). On the other hand, W 3 can be thought of as Density Affinity. Its purpose
395
+ is to increase the density of the graph in the vicinity of labeled nodes.
396
+ We would like to use those affinity matrices instead of W labeled in Eq. (22)
397
+ and examine the resulting spectral representation based on the graph-Laplacians
398
+ {Li
399
+ SSL}3
400
+ i=1 defined by {W i
401
+ SSL}3
402
+ i=1 such that
403
+ W i
404
+ SSL = 2W + αW i.
405
+ (30)
406
+ The spectral embedding is examined for the 3-Moons dataset containing 900
407
+ nodes, of which 30 are labeled, as can be seen in Fig. 1.
408
+ (a)
409
+ (b)
410
+ Fig. 1: SSL Laplacian Illustration dataset. The 3-Moons dataset containing
411
+ 900 nodes appears in Fig. 1a. The labeled nodes are shown in Fig. 1b.
412
+ We examine the spectral representation of the data, Eq. (6), spanned by
413
+ the first two non-trivial leading eigenvectors of the unsupervised Laplacian L,
414
+ {Li
415
+ SSL}3
416
+ i=1 and LSSL. The spectral embedding for each case is shown in Fig. 2.
417
+ We can observe that the spectral representation obtained by LSSL produces the
418
+ clearest division into clusters. Nodes of the same cluster (”moon”) are grouped
419
+ together, whereas nodes of different clusters are further apart. An interesting
420
+ finding in this experiment is that the main effect on the spectral embedding is
421
+ caused by the contrastive affinities, especially of W 1. We will see in the experi-
422
+ mental part this trend is valid also for more complex data. Indeed, the Laplacian
423
+ based on W3, which is equivalent to LW NLL, has virtually no contribution to
424
+ the spectral embedding.
425
+
426
+ 8
427
+ Or Streicher, Guy Gilboa
428
+ (a) L
429
+ (b) L1
430
+ SSL
431
+ (c) L2
432
+ SSL
433
+ (d) L3
434
+ SSL
435
+ (e) LSSL
436
+ Fig. 2: Spectral Embedding Illustration. The spectral embedding obtained
437
+ on the 3-Moons dataset for L, {Li
438
+ SSL}3
439
+ i=1 and LSSL.
440
+ Next, we would like to examine spectral processing compared to constrained
441
+ optimization, both based on LSSL. The performance of both approaches is tested
442
+ over the 2-Moons dataset, which includes 1000 instances. Each node of the graph
443
+ is defined by its Euclidean position. We analyze the spectral properties of the
444
+ graph and the solution to the Dirichlet interpolation problem. The results are
445
+ examined for different labeled sets S. In the spectral case, we find for each node of
446
+ the graph its corresponding value according to the first non-trivial eigenvector
447
+ of the graph-Laplacian, defined using WW NLL or WSSL. In order to find the
448
+ solution for the Dirichlet problem, we set the value 1 over the labeled nodes of
449
+ the first moon and −1 over the labeled nodes of the second moon. Then we find
450
+ the solution to the interpolation problem using L, LW NLL or LSSL. To make a
451
+ division into clusters, we perform K-Means over the resulting solution for each
452
+ case. The obtained results are shown in Fig. 3.
453
+ Analyzing the results, it can be observed that when the amount of labeled
454
+ samples is extremely small, the Dirichlet problem may not generalize that well
455
+ the labels to the unlabeled data. This is especially true when the labels are not
456
+ located near the cluster centers, as can be seen for the sets S2 and S3 (Fig. 3
457
+ bottom two rows). For the Dirichlet problem, the same performance is achieved
458
+ for LW NLL and for LSSL. This is also valid in larger data sets. In more complex
459
+ scenarios the advantages of using the above Laplacians are clear, compared to
460
+ standard L. In this toy example, the differences are minor.
461
+ Intermediate conclusions for these toy examples are that in some cases spec-
462
+ tral analysis of the data is preferred. In addition, the suggested definition of
463
+ LSSL allows us to get good performance for SSL problems both in the spectral
464
+ case and for solving the Dirichlet problem. The reason for this is that LSSL
465
+ includes the contrastive information, which is essential mainly for the spectral
466
+ case, and the density information which is more significant in the optimization
467
+ case. We will now test this in a more comprehensive manner.
468
+
469
+ 0.04
470
+ 0.02
471
+ 0.00
472
+ -0.02
473
+ -0.04
474
+ -0.06
475
+ -0.04
476
+ -0.02
477
+ 0.00
478
+ 0.02
479
+ 0.04
480
+ U10.02
481
+ 0.00
482
+ -0.02
483
+ -0.04
484
+ -0.06
485
+ -0.04
486
+ -0.02
487
+ 0.00
488
+ 0.02
489
+ 0.04
490
+ u10.04
491
+ 0.02
492
+ 0.00
493
+ -0.02
494
+ -0.04
495
+ -0.06
496
+ -0.04
497
+ -0.02
498
+ 0.00
499
+ 0.02
500
+ 0.04
501
+ U10.04
502
+ 0.02
503
+ 0.00
504
+ -0.02
505
+ -0.04
506
+ -0.06
507
+ -0.04
508
+ -0.02
509
+ 0.00
510
+ 0.02
511
+ 0.04
512
+ U10.03
513
+ 0.02
514
+ 0.01
515
+ 0.00
516
+ -0.02
517
+ -0.03
518
+ -0.04
519
+ -0.05
520
+ -0.04
521
+ -0.02
522
+ 0.00
523
+ 0.02
524
+ 0.04
525
+ uiGraph Laplacian for Semi-Supervised Learning
526
+ 9
527
+ S
528
+ Spectral
529
+ Spectral
530
+ Dirichlet
531
+ Dirichlet
532
+ Dirichlet
533
+ LW NLL
534
+ LSSL
535
+ L
536
+ LW NLL
537
+ LSSL
538
+ S0
539
+ (0.42,0.80)
540
+ (0.97,1.00)
541
+ (0.94,0.99)
542
+ (0.96,0.99)
543
+ (0.96,0.99)
544
+ S1
545
+ (0.43,0.81)
546
+ (0.96,1.00)
547
+ (0.96,1.00)
548
+ (0.96,1.00)
549
+ (0.96,1.00)
550
+ S2
551
+ (0.42,0.81)
552
+ (0.42,0.81)
553
+ (0.37,0.77)
554
+ (0.37,0.77)
555
+ (0.37,0.77)
556
+ S3
557
+ (0.43,0.81)
558
+ (0.43,0.81)
559
+ (0.24,0.76)
560
+ (0.24,0.76)
561
+ (0.24,0.76)
562
+ Fig. 3: SSL solutions of the 2 Moons dataset. The first column shows different
563
+ labeled sets S. The 2nd and 3rd columns show the spectral clustering result for LW NLL
564
+ and LSSL, respectively. The 4th, 5th and 6th columns show the Dirichlet problem
565
+ result for L, LW NLL and LSSL, respectively. The clustering measures (NMI, ACC) are
566
+ presented below each figure. Spectral LSSL performs well in all configurations.
567
+ 5
568
+ Experimental SSL Clustering Results
569
+ In this section, we examine the performance of the different definitions of the
570
+ graph-Laplacian for the clustering problem. To perform clustering in the semi-
571
+ supervised case, we examine two different methods. The first one is Spectral
572
+ Clustering which is based on the division of the data into clusters by performing
573
+ K-Means over the spectral embedding of the data, Eq. (6). The second method
574
+ is based on Dirichlet-form Clustering. To adapt the Dirichlet interpolation
575
+ problem to multiple clusters, we use the algorithm suggested in [20].
576
+ 5.1
577
+ 2-Moons Clustering
578
+ In this section, we present the statistical clustering performance for the 2-Moon
579
+ dataset when the graph includes 500 nodes. We perform two experiments. In
580
+ the first one, shown in Fig. 4, we examine the effect of changing the standard
581
+ deviation of the noise of the data (that is, the deviation of each point from the
582
+ position on the semicircle that defines the moon). In this case, 10 labeled nodes
583
+ from each class are randomly defined. In the second experiment, we examine
584
+ the effect of changing the size of the labeled set |S| (for fixed noise standard
585
+ deviation set to 0.1). The results of this experiment are summarized in Fig. 5. In
586
+ both experiments, white Gaussian noise is used. The experiments show statistics
587
+ of 100 trials, where a bold line represents the mean value (of NMI or ACC) and
588
+ the lighter regions around each line depict the standard deviation of the measure.
589
+
590
+ 10
591
+ Or Streicher, Guy Gilboa
592
+ The main conclusions from those experiments are that in the spectral case
593
+ the results obtained for LSSL are much better compared to the other Lapla-
594
+ cians, where LW NLL performance degenerates to the unsupervised case. For the
595
+ Dirichlet problem, the performance of LSSL and LW NLL is similar and better
596
+ than using the standard L, especially for the difficult cases, where the noise is
597
+ significant and the amount of labeled information is small. We can conclude that
598
+ the definition of LSSL allows to get the best clustering performance when using
599
+ the Dirichlet problem and especially for spectral analysis of the graph.
600
+ (a)
601
+ (b)
602
+ (c)
603
+ (d)
604
+ Fig. 4: 2 Moons clustering for different noise parameter. NMI and ACC
605
+ measures over 100 different labeled set samples for different noise standard de-
606
+ viation. Figs. 4a-4b are for Spectral Clustering. Figs. 4c-4d are for Dirichlet
607
+ Clustering.
608
+ (a)
609
+ (b)
610
+ (c)
611
+ (d)
612
+ Fig. 5: 2 Moons clustering for different labeled set size. NMI and ACC
613
+ measures over 100 different labeled set samples for different labeled set sizes.
614
+ Figs. 5a-5b are for Spectral Clustering. Figs. 5c-5d are for Dirichlet Clustering.
615
+ 5.2
616
+ MNIST and F-MNIST
617
+ Now we examine the clustering performance over the MNIST and Fashion-
618
+ MNIST datasets. Both of these well-known datasets include 28 × 28 gray-scale
619
+ images. For each dataset, we define a graph using the test set which includes
620
+ 10, 000 images. The obtained clustering performance, for different size of labeled
621
+ sets, is shown in Fig. 6.
622
+
623
+ 1.0
624
+ 0.9
625
+ 0.8
626
+ 0.7
627
+ NMI
628
+ 0.6
629
+ 0.5
630
+ L
631
+ 0.4
632
+ LWNLL
633
+ 0.3
634
+ LsSL
635
+ 0.06
636
+ 0.08
637
+ 0.10
638
+ 0.12
639
+ 0.14
640
+ Noise std.1.00
641
+ 0.95
642
+ ? 0.90
643
+ AC
644
+ 0.85
645
+ L
646
+ LWNLL
647
+ 0.80
648
+ LsSL
649
+ 0.06
650
+ 0.08
651
+ 0.10
652
+ 0.12
653
+ 0.14
654
+ Noise std.1.0
655
+ 0.9
656
+ NMI
657
+ 0.8
658
+ 0.7
659
+ L
660
+ LWNLL
661
+ 0.6
662
+ LsSL
663
+ 0.06
664
+ 0.08
665
+ 0.10
666
+ 0.12
667
+ 0.14
668
+ Noise std.1.00
669
+ 0.98
670
+ 0.96
671
+ ACC
672
+ 0.94
673
+ 0.92
674
+ L
675
+ LWNLL
676
+ 0.90
677
+ LsSL
678
+ 0.06
679
+ 0.08
680
+ 0.10
681
+ 0.12
682
+ 0.14
683
+ Noise std.1.0
684
+ 0.9
685
+ 0.8
686
+ 0.7
687
+ LWNLL
688
+ NMI
689
+ 0.6
690
+ LsSL
691
+ 0.5
692
+ 0.4
693
+ 0.3
694
+ 0
695
+ 20
696
+ 40
697
+ 60
698
+ 80
699
+ 100
700
+ ISI1.00
701
+ 0.95
702
+ 0.90
703
+ LWNLL
704
+ AC
705
+ LSSL
706
+ 0.85
707
+ 0.80
708
+ 0
709
+ 20
710
+ 40
711
+ 60
712
+ 80
713
+ 100
714
+ [S1.0
715
+ 0.9
716
+ 0.8
717
+ 0.6
718
+ LWNLL
719
+ 0.5
720
+ LsSL
721
+ 20
722
+ 40
723
+ 60
724
+ 80
725
+ 100
726
+ [S]1.000
727
+ 0.975
728
+ 0.950
729
+ 0.925
730
+ cC
731
+ 0.900
732
+ 0.875
733
+ 7
734
+ 0.850
735
+ LWNLL
736
+ 0.825
737
+ LsSL
738
+ 20
739
+ 40
740
+ 60
741
+ 80
742
+ 100
743
+ ISIGraph Laplacian for Semi-Supervised Learning
744
+ 11
745
+ Fig. 6: MNIST and F-MIST Clustering performance. The mean and stan-
746
+ dard deviation of NMI and ACC of 10 different experiments over the 10,000
747
+ samples of MNIST (Top row) and F-MNIST (bottom row) test sets, for different
748
+ size of a labeled subset |S|.
749
+ It can be observed that using LSSL yields better performance, both for solv-
750
+ ing the Dirichlet problem and for spectral analysis of the graph. In addition, for
751
+ small labeled set |S|, the performance obtained for spectral clustering is better.
752
+ 6
753
+ Conclusions
754
+ In this paper, we propose a new definition for the graph-Laplacian designed
755
+ to improve performance for SSL problems. The novel SSL Laplacian, which
756
+ incorporates both contrastive and density affinities, yields improved spectral
757
+ clustering and can be used also in constrained optimization problems. The pro-
758
+ posed operator allows smooth interpolating between the unsupervised and the
759
+ semi-supervised cases. The advantages are most prominent for an extremely low
760
+ amount of labels or noisy data. In this work we have considered only the linear
761
+ case, however, p-Laplacians may also be modified in a similar manner.
762
+ References
763
+ 1. Aviles-Rivero, A.I., Sellars, P., Schönlieb, C.B., Papadakis, N.: Graphxcovid: ex-
764
+ plainable deep graph diffusion pseudo-labelling for identifying covid-19 on chest
765
+ x-rays. Pattern Recognition 122, 108274 (2022) 1
766
+
767
+ 0.7
768
+ 0.6
769
+ 0.5
770
+ 0.4
771
+ 0.3
772
+ 0.2
773
+ Dirichlet(L)
774
+ 0.1
775
+ Dirichlet(LssL)
776
+ Spectral(L)
777
+ 0.0
778
+ Spectral(LssL)
779
+ 10
780
+ 20
781
+ OE
782
+ 40
783
+ 50
784
+ 60
785
+ [S]0.8
786
+ 0.7
787
+ 0.6
788
+ CC
789
+ 0.5
790
+ 0.4
791
+ 0.3
792
+ Dirichlet(L)
793
+ Dirichlet(LssL)
794
+ 0.2
795
+ Spectral(L)
796
+ 0.1
797
+ Spectral(LssL)
798
+ 10
799
+ 20
800
+ 30
801
+ 40
802
+ 50
803
+ 60
804
+ [S]0.6
805
+ 0.5
806
+ 0.4
807
+ NMI
808
+ 0.3
809
+ Dirichlet(L)
810
+ Dirichlet(LssL)
811
+ 0.2
812
+ Spectral(L)
813
+ Spectral(LssL)
814
+ 0.1
815
+ 10
816
+ 20
817
+ 30
818
+ 40
819
+ 50
820
+ 60
821
+ [S]0.6
822
+ 0.5
823
+ ACC
824
+ 0.4
825
+ 0.3
826
+ Dirichlet(L)
827
+ Dirichlet(LssL)
828
+ 0.2
829
+ Spectral(L)
830
+ Spectral(LssL)
831
+ 10
832
+ 20
833
+ OE
834
+ 40
835
+ 50
836
+ 60
837
+ [S]12
838
+ Or Streicher, Guy Gilboa
839
+ 2. Belkin, M., Niyogi, P.: Laplacian eigenmaps for dimensionality reduction and data
840
+ representation. Neural computation 15(6), 1373–1396 (2003) 2
841
+ 3. Belkin, M., Niyogi, P., Sindhwani, V.: Manifold regularization: A geometric frame-
842
+ work for learning from labeled and unlabeled examples. Journal of machine learning
843
+ research 7(11) (2006) 2
844
+ 4. Bresson, X., Laurent, T., Uminsky, D., Von Brecht, J.H.: Multiclass total variation
845
+ clustering. arXiv preprint arXiv:1306.1185 (2013) 2
846
+ 5. Calder, J.: The game theoretic p-laplacian and semi-supervised learning with few
847
+ labels. Nonlinearity 32(1), 301 (2018) 2
848
+ 6. Chen, Z., Li, Y., Cheng, X.: Specnet2: Orthogonalization-free spectral embedding
849
+ by neural networks. arXiv preprint arXiv:2206.06644 (2022) 1
850
+ 7. Coifman, R.R., Lafon, S.: Diffusion maps. Applied and computational harmonic
851
+ analysis 21(1), 5–30 (2006) 2
852
+ 8. Elmoataz, A., Desquesnes, X., Toutain, M.: On the game p-laplacian on weighted
853
+ graphs with applications in image processing and data clustering. European Jour-
854
+ nal of Applied Mathematics 28(6), 922–948 (2017) 2
855
+ 9. Garcia-Cardona, C., Merkurjev, E., Bertozzi, A.L., Flenner, A., Percus, A.G.: Mul-
856
+ ticlass data segmentation using diffuse interface methods on graphs. IEEE trans-
857
+ actions on pattern analysis and machine intelligence 36(8), 1600–1613 (2014) 2
858
+ 10. Hadsell, R., Chopra, S., LeCun, Y.: Dimensionality reduction by learning an invari-
859
+ ant mapping. In: 2006 IEEE Computer Society Conference on Computer Vision
860
+ and Pattern Recognition (CVPR’06). vol. 2, pp. 1735–1742. IEEE (2006) 7
861
+ 11. Hearty, J.: Advanced Machine Learning with Python. Packt Publishing (2016) 1
862
+ 12. Joachims, T.: Transductive learning via spectral graph partitioning. In: Proceed-
863
+ ings of the 20th International Conference on Machine Learning (ICML-03). pp.
864
+ 290–297 (2003) 2
865
+ 13. Liu, W., He, J., Chang, S.F.: Large graph construction for scalable semi-supervised
866
+ learning. In: ICML (2010) 2
867
+ 14. Mao, Q., Tsang, I.W.: Parameter-free spectral kernel learning. arXiv preprint
868
+ arXiv:1203.3495 (2012) 2
869
+ 15. Munkres, J.: Algorithms for the assignment and transportation problems. Journal
870
+ of the society for industrial and applied mathematics 5(1), 32–38 (1957) 3
871
+ 16. Ng, A., Jordan, M., Weiss, Y.: On spectral clustering: Analysis and an algorithm.
872
+ Advances in neural information processing systems 14 (2001) 2
873
+ 17. Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear em-
874
+ bedding. science 290(5500), 2323–2326 (2000) 2
875
+ 18. Shaham, U., Stanton, K., Li, H., Nadler, B., Basri, R., Kluger, Y.: Spectralnet:
876
+ Spectral clustering using deep neural networks. In: Proceedings of the 6th Inter-
877
+ national Conference on Learning Representations (2018) 1
878
+ 19. Shi, J., Malik, J.: Normalized cuts and image segmentation. IEEE Transactions on
879
+ pattern analysis and machine intelligence 22(8), 888–905 (2000) 2
880
+ 20. Shi, Z., Osher, S., Zhu, W.: Weighted nonlocal laplacian on interpolation from
881
+ sparse data. Journal of Scientific Computing 73(2), 1164–1177 (2017) 2, 4, 9
882
+ 21. Streicher, O., Cohen, I., Gilboa, G.: Basis: Batch aligned spectral embedding space.
883
+ arXiv preprint arXiv:2211.16960 (2022) 1
884
+ 22. Zelnik-Manor, L., Perona, P.: Self-tuning spectral clustering. Advances in neural
885
+ information processing systems 17 (2004) 2
886
+
XdE4T4oBgHgl3EQfNgwX/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
YNE4T4oBgHgl3EQfNwyH/content/tmp_files/2301.04959v1.pdf.txt ADDED
@@ -0,0 +1,1367 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Under consideration for publication in J. Fluid Mech.
2
+ 1
3
+ Banner appropriate to article type will appear here in typeset article
4
+ Spatial evolution of the turbulent/turbulent
5
+ interface geometry in a cylinder wake
6
+ Jiangang Chen1 and Oliver R. H. Buxton1†
7
+ 1Department of Aeronautics, Imperial College London, South Kensington Campus, London SW7 2AZ, UK
8
+ (Received xx; revised xx; accepted xx)
9
+ This study aims to examine the spatial evolution of the geometrical features of the turbu-
10
+ lent/turbulent interface (TTI) in a cylinder wake. The wake is exposed to various turbulent
11
+ backgrounds in which the turbulence intensity and the integral length scale are independently
12
+ varied and comparisons to a turbulent/non-turbulent interface (TNTI) are drawn. The
13
+ turbulent wake was marked with a high-Schmidt-number (𝑆𝑐) scalar and a planar laser
14
+ induced fluorescence (PLIF) experiment was carried out to capture the interface between the
15
+ wake and the ambient flow from 𝑥/𝑑 = 5 to 40 where 𝑥 is the streamwise coordinate from
16
+ the centre of the cylinder and 𝑑 is the cylinder’s diameter. It is found that the TTI generally
17
+ spreads faster toward the ambient flow than the TNTI. A transition region of the interfaces’
18
+ spreading is found at 𝑥/𝑑 ≈ 15, after which the interfaces propagate at a slower rate than
19
+ previously (upstream) and the mean interface positions of both TNTI and TTI scale with the
20
+ local wake half-width. The location of both the TNTI and TTI have non-Gaussian probability
21
+ density functions (PDFs) in the near wake because of the influence of the large-scale coherent
22
+ motions present within the flow. Further downstream, after the large-scale coherent motions
23
+ have dissipated, the TNTI position PDF does become Gaussian. For the first time we explore
24
+ the spatial variation of the “roughness” of the TTI, quantified via the fractal dimension,
25
+ from near field to far field. The length scale in the background flow has a profound effect
26
+ on the TTI fractal dimension in the near wake, whilst the turbulence intensity only becomes
27
+ important for the fractal dimension farther downstream.
28
+ 1. Introduction
29
+ All turbulent flows embedded within a non-turbulent background are observed to spread out
30
+ into their environment. The spreading of turbulence into previously irrotational fluid depends,
31
+ in the first instance, on viscous diffusion of vorticity across a well-defined thin layer which
32
+ bounds the turbulent region and separates it from the outer, non-turbulent regions (Townsend
33
+ 1976). This convoluted thin layer, usually referred to as a turbulent/non-turbulent interface
34
+ (TNTI), was first examined in detail by Corrsin & Kistler (1955), and extensive studies on
35
+ the dynamical and geometrical features of TNTIs in various turbulent shear flows have been
36
+ conducted ever since (see the review of da Silva et al. 2014). However, numerous situations for
37
+ turbulent industrial and environmental flows have a turbulent background; a typical example
38
+ of which is the wake of a wind turbine developing in the atmospheric turbulent boundary layer
39
+ or the turbulent wake of other upstream wind turbines (e.g. Porté-Agel et al. 2020). In contrast
40
+ † Email address for correspondence: [email protected]
41
+ Abstract must not spill onto p.2
42
+ arXiv:2301.04959v1 [physics.flu-dyn] 12 Jan 2023
43
+
44
+ 2
45
+ to the extensive studies of TNTIs, our knowledge of the interface between flow regions with
46
+ different levels of turbulence intensity, hereinafter referred to as a turbulent/turbulent interface
47
+ (TTI), remains limited, notwithstanding its prevalence in the physical world. In the a recent
48
+ study of Kankanwadi & Buxton (2020) the entrainment across a TTI between a turbulent
49
+ cylinder-wake and a grid-generated turbulent background was experimentally examined. The
50
+ cylinder’s wake was marked with a fluorescent dye of high Schmidt number (𝑆𝑐) such that
51
+ molecular diffusion occurred at a vanishingly small length scale. By examining the velocity
52
+ field in the vicinity of the scalar-marked interface it was revealed that a clear interface
53
+ existed between the wake and the turbulent ambient fluid, independently of the artificially-
54
+ introduced scalar. In particular, a jump in vorticity magnitude over a short distance was
55
+ reported, resembling the vorticity jump across a TNTI. Both the intensity and the integral
56
+ length scale of the background turbulence were independently varied and it was shown that
57
+ in this far-wake region the turbulence intensity was the important parameter in determining
58
+ the geometry of the TTI, characterised by its tortuosity and fractal dimension.
59
+ In their subsequent study of the flow physics governing the behaviour of the TTI, namely
60
+ consideration of the various terms of the enstrophy transport equation, Kankanwadi & Buxton
61
+ (2022b) found the magnitude of the viscous diffusion term is insignificant when compared
62
+ to that of the inertial vorticity stretching term acting at the outermost boundary of the TTI.
63
+ These results imply that viscous diffusion is of little importance to the entrainment process
64
+ across a TTI which contrasts to the scenario of the TNTI in which viscous diffusion is the
65
+ dominant process by which the irrotational fluid acquires vorticity in the so-called viscous
66
+ superlayer (e.g. Corrsin & Kistler 1955; da Silva et al. 2014). Kankanwadi & Buxton (2022b)
67
+ also demonstrated that the vorticity in the vicinity of the TTI is “organised” in such a way
68
+ on the wake side of the TTI that it exploits the enhanced strain rates in the interface-normal
69
+ direction, previously reported for TNTIs (e.g. Buxton et al. 2019; Cimarelli et al. 2015),
70
+ thereby enhancing vorticity stretching/enstrophy production and yielding the enstrophy jump
71
+ across the TTI.
72
+ In spite of these dynamical differences between the TTI and TNTI, their geometries
73
+ both display a common hierarchy of self-similar structures which can be described through
74
+ fractal analysis. The fractal nature of the interface geometry, which renders a much larger
75
+ surface area of the interface than otherwise, is essential to correctly modelling the turbulent
76
+ entrainment rate (e.g. Sreenivasan et al. 1989; Zhou & Vassilicos 2017). Kohan & Gaskin
77
+ (2022) investigated the effect of the background turbulence intensity on the geometry of the
78
+ TTI of an axisymmetric jet and compared it with a TNTI. They found that the turbulence in
79
+ the ambient flow can further stretch and corrugate the interface and thus result in a larger
80
+ fractal dimension of the TTI than the TNTI in results that corroborated those of Kankanwadi
81
+ & Buxton (2020). It is noted that their investigation was carried out in the far field of the jet
82
+ (25 diameters downstream of the orifice) where the coherent motions of the jet have dwindled
83
+ (Tennekes & Lumley 1972; Gordeyev & Thomas 2000). In such a situation, the turbulence
84
+ intensity in the background flow is the dominant parameter in modifying the behaviour of
85
+ the TTI, whilst the size of the energetic eddies in the background flow, characterized by the
86
+ integral length scale, is of less relevance (e.g. Kankanwadi & Buxton 2020).
87
+ However, when it comes to the flow region where the coherent motions prevail, the scenario
88
+ is quite different. It has been reported that the entrainment becomes dominated by large-scale
89
+ engulfment of background fluid under the influence of the coherent motions (e.g. Yule 1978;
90
+ Bisset et al. 2002; Cimarelli & Boga 2021; Long et al. 2022). For TTIs, Kankanwadi &
91
+ Buxton (2022a) observed that both the turbulence intensity and the integral length scale
92
+ in the ambient flow correlate to enhanced entrainment in the presence of the large-scale
93
+ coherent vortices in the near wake of a cylinder; a contrasting result to the far-field study
94
+ in which background turbulence was observed to suppress entrainment rate (Kankanwadi &
95
+
96
+ 3
97
+ Buxton 2020). By conducting a control experiment in which the large-scale coherent vortices
98
+ in the wake (the von Kármán vortex street) were suppressed via the addition of a splitter plate
99
+ they showed that the presence of freestream turbulence effectively enhances entrainment via
100
+ engulfment but suppresses the small-scale “nibbling”. Kankanwadi & Buxton (2022a) also
101
+ reported that the presence of freestream turbulence increases the locus of the wake’s large-
102
+ scale coherent vortices (i.e. wake “meandering” with a larger amplitude), with the integral
103
+ length scale of the background turbulence playing the most important role in determining
104
+ this. Combined, these results highlight the important role that the presence of the large-scale
105
+ coherent motions of the wake, and their interaction with any background turbulence present,
106
+ play in modulating the properties of the TTI.
107
+ Such observations raise several questions with regard to the spatial evolution of the
108
+ properties of the TTI, as the coherent vortices degrade downstream: how will the PDF
109
+ of the TTI (and also TNTI) position be affected by the coherent motions? Is there any
110
+ possible scaling applicable to the position of the TTI as it evolves downstream with the
111
+ coherent motions diminishing? If so, is the scaling of the TTI the same as that of the TNTI?
112
+ In terms of the fractality of the TTI, is the local fractal dimension of the TTI under the effect
113
+ of the coherent motions in the near field the same as that in the far field of the flow where the
114
+ coherent motions decay? If not, which parameter in the background turbulence dominates
115
+ the local fractal dimension of the TTI, the intensity level of the background turbulence or the
116
+ size of the energetic eddies? Or is the fractal dimension dominated by different freestream
117
+ turbulence parameters in different regions of the flow? We aim to answer all of these questions
118
+ in the present study.
119
+ In order to addresses these questions, we examined the wake of a circular cylinder in
120
+ various turbulent freestreams, in which the turbulence intensity and integral length scales of
121
+ the background turbulence were independently varied. A planar laser induced fluorescence
122
+ (PLIF) experiment was conducted to capture the position of the interface between the wake
123
+ and the freestream from 5 to 40 cylinder diameters downstream from the cylinder’s centre. In
124
+ such a region of the flow the coherent vortices in the wake emanating from the shear layers
125
+ shed from the cylinder experienced a significant decay (Matsumura & Antonia 1993; Chen
126
+ et al. 2016), which allows us to investigate the streamwise evolution of both the TTI and
127
+ TNTI position/geometry concerning the questions raised above. The paper is organized as
128
+ follows. Section 2 describes the experimental details, and the visualisation of the flow and
129
+ the methodology used to determine the interface position is presented in section 3. Major
130
+ results are discussed in section 4 and we summarise and conclude the work in section 5.
131
+ 2. Experimental setup
132
+ The experiments were conducted in the water flume of the hydrodynamics laboratory of the
133
+ Aeronautics Department at Imperial College London. A cylinder with a diameter of 𝑑 = 0.01
134
+ m is vertically mounted in the middle of the flume test section which has a dimension of
135
+ 9m in length and 0.6 m in cross section which was filled to a depth of 0.6 m. The incoming
136
+ velocity of the flow is 𝑈1 = 0.38 m/s. The Reynolds number based on 𝑈1 and 𝑑 is about
137
+ 3800. Upstream of the cylinder, four different grids, including two regular and two fractal
138
+ grids (see Kankanwadi & Buxton (2020) for details of the grids), are used to generate the
139
+ background turbulence with various turbulence intensities and length scales.
140
+ A planar laser induced fluorescence (PLIF) experiment was carried out to capture the
141
+ boundary of the cylinder’s wake in the various background flows. A fluorescent dye,
142
+ Rhodamine 6G, which can be treated as a passive scalar in the flow was utilized to demarcate
143
+ the wake region of the cylinder from the background flow. The very high Schmidt number
144
+ of the dye, approximately 2500 in water (Vanderwel & Tavoularis 2014), ensures that the
145
+
146
+ 4
147
+ Figure 1: (a) Conceptual sketch of the experimental setup and (b) parameter space
148
+ (𝑇𝐼, 𝐿12) of the background flow in the middle of the field of view at 𝑥/𝑑 = 20.
149
+ molecular diffusion of the dye occurs over a negligibly short length scale with respect to the
150
+ turbulent motions, so that dye acts as a near-perfect marker of the wake region, with a clear
151
+ boundary. The dye was released into the wake from a hole in the rear surface of the cylinder
152
+ with the aid of a micro-dosing pump (Bürkert 7615) working at a dosing frequency of 10
153
+ Hz. A long elastic tube of 2 m was used in the routing of the dye from the pump to the hole
154
+ on the cylinder so as to smooth out pulsations in the dye release.
155
+ A high-speed Nd:YLF laser (Litron LDY304) with a wavelength of 527 nm was used
156
+ to induce the fluorescence of the dye which emits light of wavelength around 560 nm.
157
+ The fluorescence was captured by two cameras (Phantom V641 with a sensor resolution of
158
+ 2560 × 1600 px) which were arranged consecutively in the streamwise direction to form
159
+ a field view of 14𝑑 × 43𝑑 with an overlap region of about 2.5𝑑. The spatial resolution of
160
+ the measurement is about 0.1 mm per pixel. The upstream edge of the field of view is 1𝑑
161
+ apart from the centre of the cylinder (figure 1a). A low-pass filter is placed in front of the
162
+ camera lens in order to ignore any laser light noise in the PLIF image. Instantaneous images
163
+ of the wake in a freestream without (a) and with (b) turbulence is displayed in figure 2. The
164
+ acquisition frequency of the experiment is 100 Hz and 2000 images were captured for each
165
+ measurement case.
166
+ Following Kankanwadi & Buxton (2020), we employed turbulence intensity (𝑇𝐼 ≡
167
+ √︁
168
+ (𝑢2 + 𝑣2)/2/𝑈1 where 𝑢 and 𝑣 are velocity fluctuations in the 𝑥 and 𝑦 directions respectively)
169
+ and integral length scale (𝐿12 ≡
170
+ ∫ 𝑟0
171
+ 0
172
+ 𝑅12(𝑟)𝑑𝑟 where 𝑅12(𝑟) is the correlation coefficient
173
+ between 𝑢(𝑥, 𝑦) and 𝑢(𝑥, 𝑦 + 𝑟)) to characterize the various turbulent background flows. The
174
+ distribution of the turbulence intensity and the length scale of the flow behind the grids
175
+ has been documented in detail in Kankanwadi (2022) in the same facility and operating
176
+ conditions. The cylinder is placed at various downstream distances from the various grids
177
+ such that the parameter space (𝑇𝐼, 𝐿12) was explored as widely as possible in order to truly
178
+ investigate the behaviour of the interface between the wake and the background flow with
179
+ various “flavours” of turbulence. We conducted experiments for seven cases of (𝑇𝐼, 𝐿12) and
180
+ the distribution of (𝑇𝐼, 𝐿12) at 𝑥/𝑑 = 20, i.e. the middle of the field of view, is shown in figure
181
+ 1b. We divided the seven cases into three groups (figure 1b) according to the magnitude of
182
+ the turbulence intensity. Case 1a is the closest experimental approximation to a TNTI-case
183
+ with no turbulence-generating grid mounted upstream of the cylinder. The remaining cases
184
+ are TTI cases with turbulent backgrounds generated by the four different grids and with
185
+ several different grid - cylinder spacings. In the following sections, each flow configuration
186
+ case with different (𝑇𝐼, 𝐿12) is referred to with its corresponding denotation in figure 1b.
187
+ Focus on Fluids articles must not exceed this page length
188
+
189
+ (a)
190
+ Grid
191
+ Field of view
192
+ (b)
193
+ 3.0
194
+ Group 1
195
+ 1
196
+ 2.5
197
+ Group 2
198
+ I
199
+ I
200
+ I
201
+ I
202
+ I
203
+ I
204
+ Group 3
205
+ I
206
+ I
207
+ I
208
+ I
209
+ I
210
+ 2.0
211
+ 2b
212
+ I
213
+ I
214
+ I
215
+ I
216
+ I
217
+ I
218
+ I
219
+ n
220
+ L12/d 1.5
221
+ I
222
+ I
223
+ I
224
+ d
225
+ 14d
226
+ I
227
+ 3a
228
+ I
229
+ I
230
+ 3b
231
+ I
232
+ I
233
+ -
234
+ 1.0
235
+ I
236
+ I
237
+ I
238
+ I
239
+ I
240
+ 1b
241
+ I
242
+ I
243
+ 0.5 -
244
+ I
245
+ 2a
246
+ 1
247
+ I
248
+ 1a
249
+ I
250
+ I
251
+ 1d
252
+ 43d
253
+ 0.0
254
+ 2
255
+ 4
256
+ 0
257
+ 6
258
+ 8
259
+ 10
260
+ 12
261
+ 14
262
+ 16
263
+ TI(%)5
264
+ Figure 2: Visualisation of the wake (a) without and (b) with turbulence present in the
265
+ background flow.
266
+ 3. Visualisation and determination of the interface
267
+ We start with a comparison of the visualisation of the wake of the cylinder in a background
268
+ flow without (figure 2a) and with (figure 2b) turbulence, thereby featuring the distinction
269
+ between a TTI and TNTI. First, in the near wake (say 𝑥/𝑑 ≲ 10), the large-scale vortices are
270
+ more distinct in the case of the non-turbulent background, whilst the locus of the vortices’
271
+ positions in the turbulent background extends to a further lateral distance from the wake
272
+ centre-line (𝑦 = 0). This confirms the observation of Kankanwadi & Buxton (2022a) that the
273
+ large-scale vortices of the near wake (identified via the velocity field, not the scalar field) in a
274
+ turbulent background generally drift to further positions in the lateral (𝑦) direction than those
275
+ in a non-turbulent background at the same 𝑥/𝑑 location. Second, the TTI is also characterized
276
+ by a “rougher” boundary with the ambient fluid, at both large and small scales. Large-scale
277
+ (intermittent) lumps of fluid from the wake are observed protruding into the ambient flow in
278
+ the turbulent background case (say at 𝑥/𝑑 ≈ 26 and 33 in figure 2b), which is barely seen
279
+ in the non-turbulent background case (figure 2a). It is also noted that there are more finer
280
+ scale structures embedded into the TTI, which is likely a reflection of the interaction between
281
+ the smaller scale eddies in the ambient turbulence and the interface. The resultant crinkled
282
+ interface (see also figure 4 for different TTI cases examined) is later demonstrated to have a
283
+ very different fractal dimension to the TNTI, quantifying our observation here that the TTI
284
+ is “rougher” than the TNTI.
285
+ Before proceeding to examine the properties of the interfaces, we need to detect their
286
+ positions reliably. To account for the variation of the light intensity along the streamwise
287
+ direction in the PLIF images due to mixing/out-of-plane transport (figure 2), the light intensity
288
+ of each image at each 𝑥 position is first normalised by its time-averaged mean value at the
289
+
290
+ (n)
291
+ 5
292
+ y/d
293
+ 0
294
+ -5
295
+ (q)
296
+ 5
297
+ y/d
298
+ -5
299
+ 5
300
+ 10
301
+ 15
302
+ 20
303
+ 25
304
+ 30
305
+ 35
306
+ 40
307
+ x/d6
308
+ Figure 3: (a) Distribution of conditionally-averaged normalised light intensity ⟨𝜙∗⟩ and
309
+ d⟨𝜙∗⟩/d𝜙∗
310
+ 𝑡ℎ with respect to the threshold 𝜙∗
311
+ 𝑡ℎ. (b) Detected contours using 𝜙∗
312
+ 𝑡ℎ = 0.3. (c)
313
+ Interface lines determined by selecting the longest continuous contours on both sides of
314
+ the wake.
315
+ same 𝑥 position along the wake centre-line, i.e. 𝜙∗(𝑥, 𝑦, 𝑡) = 𝜙(𝑥, 𝑦, 𝑡)/𝜙(𝑥, 𝑦 = 0) where the
316
+ overbar denotes the average over time (images). The resultant normalised images enable a
317
+ single threshold value to be set for the entire field of view for interface identification purposes
318
+ (see figures 3b & c). In order to determine this threshold we follow the method used in Prasad
319
+ & Sreenivasan (1989) who also used PLIF to distinguish the wake from the ambient flow in
320
+ a similar experimental configuration to our present study. Specifically, for each experimental
321
+ case (i.e. each data point in figure 1b), a conditional average was taken on the normalised
322
+ light intensity 𝜙∗(𝑥, 𝑦, 𝑡) exceeding the given threshold value 𝜙∗
323
+ 𝑡ℎ which reads
324
+ ⟨𝜙∗⟩ ≡
325
+ �(𝜙∗|𝜙∗ > 𝜙∗
326
+ 𝑡ℎ)
327
+ 𝑁(𝜙∗ > 𝜙∗
328
+ 𝑡ℎ)
329
+ .
330
+ (3.1)
331
+ The distribution of ⟨𝜙∗⟩ with respect to 𝜙∗
332
+ 𝑡ℎ for the wake with a non-turbulent background is
333
+ shown in figure 3a. As expected, ⟨𝜙∗⟩ increases rapidly for small values of 𝜙∗
334
+ 𝑡ℎ, but there is
335
+ a knee point of ⟨𝜙∗⟩ with respect to 𝜙∗
336
+ 𝑡ℎ. This corresponds to the value of the light intensity
337
+ that well demarcates the limit between the background level of ⟨𝜙∗⟩ and that in the wake.
338
+ The gradient d⟨𝜙∗⟩/d𝜙∗
339
+ 𝑡ℎ is also plotted in figure 3a and a threshold value of 𝜙∗
340
+ 𝑡ℎ = 0.3 was
341
+ determined with the aid of a linear curve fitting on either side of the knee point. We applied
342
+ this value to a number of sample images and it gives a good indication of the position of
343
+ the interface in the flow. A typical example of the detected interface is given in figure 3b.
344
+ One may note that small occasional patches inside and outside the wake, which result from
345
+ detrainment, three-dimensional “teacup handle” topology, or engulfment (Westerweel et al.
346
+ 2009) are also identified. Note that these over-captured patches are disconnected from the
347
+ continuous interface we are seeking, so we chose the two longest continuous isocontours
348
+ corresponding to the threshold criteria and finally we obtain the interfaces on both sides of
349
+ the wake (see figure 3c). Typical interface isocontours of all the TTI cases determined using
350
+ the same method with case-dependent threshold value are displayed in figure 4 which all
351
+ exhibit well-defined interfaces between the wake and the ambient fluids. Comparison of the
352
+ various figures also beautifully highlights the dependency of the TTI geometry on both 𝑇𝐼
353
+ and 𝐿12 of the background turbulence, with clear visual differences across the various cases
354
+ examined.
355
+
356
+ (a) 1.6
357
+ 4.0
358
+ 3.5
359
+ 1.4
360
+ y/d o
361
+ 8
362
+ 3.0
363
+ *= 0.3
364
+ -2
365
+ 1.2
366
+ -4
367
+ 2.5
368
+ -6
369
+ <*Φ)p
370
+ 2.0
371
+ (c)
372
+ 6
373
+ 1.5
374
+ 4
375
+ 0.8
376
+ 2
377
+ 1.0
378
+ y/d o
379
+ 0.6
380
+ -2
381
+ 0.5
382
+ -4
383
+ -6
384
+ 0.4
385
+ F0.0
386
+ 0.0
387
+ 0.2
388
+ 0.4
389
+ 0.6
390
+ 0.8
391
+ 1.0
392
+ 1.2
393
+ 5
394
+ 10
395
+ 15
396
+ 20
397
+ 25
398
+ 30
399
+ 35
400
+ 40
401
+ x/d7
402
+ Figure 4: Typical interface of all TTI cases: (a) case 1b, (b) case 1c, (c) case 2a, (d) case
403
+ 2b, (e) case 3a, (f) case 3b.
404
+ 4. Results and discussion
405
+ 4.1. PDFs of TTI and TNTI position
406
+ After the interface position was determined, the analysis proceeds first with the downstream
407
+ evolution of the PDFs of both TNTI and TTI position which are examined at five different
408
+ streamwise locations from very near to far away from the cylinder, i.e. 𝑥/𝑑 = 5, 10, 20, 30,
409
+ and 40 (figure 5). For presentational clarity, one typical case is displayed for each of the three
410
+ groups of figure 1b: figure 5 (a, b) are plots of case 1a (the TNTI case), and figure 5 (c, d)
411
+ and (e, f) are cases 2a and 3a respectively (TTI cases). Both of the upper (𝑦 > 0 in figure 3c)
412
+ and lower (𝑦 < 0) interface lines are used in the calculation of the PDF, so a negative value
413
+ of 𝑦/𝑑 in figure 5 means the occurrence of a 𝑦 > 0 (or 𝑦 < 0) interface on the 𝑦 < 0 (or
414
+ 𝑦 > 0) side at the examined 𝑥/𝑑 position. The PDF at a particular 𝑥/𝑑 position was calculated
415
+ within a streamwise strip of extent 3𝑑 centred on 𝑥𝑐 as denoted in the figure. The 3𝑑 extent
416
+ of these strips is comparable to the largest integral length scale within the background flow
417
+ (see figure 1b), and enabled better statistical convergence when computing the PDFs.
418
+ For the examined TTI cases (figure 5c, e), the modal peak of the PDF, i.e. the most probable
419
+ position of the interface which is very close to the mean position of the interface, is roughly
420
+ at the same position as that of the TNTI case (figure 5a) at 𝑥/𝑑 = 5 (marked by the left
421
+ dashed-line). However, at 𝑥/𝑑 = 40 (marked by the right dashed-line), the position 𝑦/𝑑 of
422
+ the modal location of the TTI is larger than that of the TNTI, especially when the background
423
+ turbulence intensity is high (figure 5e). Kankanwadi & Buxton (2022a) showed that in the
424
+ near-wake region 𝑥/𝑑 ⩽ 5) the wakes exposed to background turbulence were always wider
425
+ on average than the wake embedded in a non-turbulent background. Our results show that in
426
+ the near wake the modal position of the TTI is similar to the TNTI and the reason that the
427
+ mean wakes are wider for the TTI cases is because of the diminshed contribution from the
428
+ left tails of the PDFs (e.g. PDFs for 𝑥𝑐 = 5 in figure 5a, c, e), i.e. there are fewer instances
429
+ of the TTI crossing the centre-line than the TNTI. This observation is consistent with the
430
+ finding in Kankanwadi & Buxton (2022a) that the mean position of the centres of the von
431
+ Kármán vortices for the TTI cases were further away from the wake centre-line than those
432
+ of the TNTI case at the same streamwise position. Further, our results show that the increase
433
+
434
+ (a) 5
435
+ (d) 5
436
+ y/d
437
+ 5
438
+ (b) 5
439
+ (e) 5
440
+ y/d
441
+ -5
442
+ (c) 5
443
+ (f) 5
444
+ y/d
445
+ 5
446
+ 10
447
+ 15
448
+ 20
449
+ 25
450
+ 30
451
+ 35
452
+ 10
453
+ 15
454
+ 20
455
+ 25
456
+ 30
457
+ 35
458
+ 40
459
+ x/d8
460
+ Figure 5: Streamwise development of PDFs of both TNTI and TTI position. (a, b) TNTI
461
+ case 1a, (c, d) TTI case 2a, (e, f) TTI case 3a.
462
+ in wake width in the presence of background turbulence extends to the far wake, up to the
463
+ 40𝑑 position examined in the present study, with the intensity of the background turbulence
464
+ seemingly the most important parameter in determining this enhanced wake width. Later we
465
+ will see that this average enhancement of the wake width comes mainly from the contribution
466
+ of the region closer to the cylinder which then persists downstream.
467
+ It is noted that the TTI position PDFs for two cases with background turbulence (figure 5c,
468
+ e) are not Gaussian, with a negative skewness (not shown) over all the examined 𝑥/𝑑 range;
469
+ a similar observation was also made by Kohan & Gaskin (2022) for the TTI position of an
470
+ axisymmetric jet. The PDF of the TNTI position is practically Gaussian at 𝑥/𝑑 = 40 (shown
471
+ later in figure 8) which has been widely reported in previous literature in fully-developed
472
+ regions of turbulent flows (e.g. Corrsin & Kistler 1955; da Silva et al. 2014; Mistry et al.
473
+ 2016; Zhou & Vassilicos 2017). However, the TNTI PDF evidently deviates from a Gaussian
474
+ distribution at positions closer to the cylinder, especially at 𝑥/𝑑 = 5 and 10 (figure 5a) where
475
+ heavier negative tails than for a Gaussian PDF are displayed. These distinctly heavy negative
476
+ tails reflect the high probability of the interface appearing on the opposite side of the wake
477
+ centreline (𝑦/𝑑 = 0), which is a manifestation of the strong large-scale “meandering” of the
478
+
479
+ 0.5
480
+ 1.4
481
+ ....
482
+ (q)
483
+ ......
484
+ Xc = 5
485
+ Xc = 10
486
+ 1.2
487
+ 0.4
488
+ C
489
+ O—Xc=20
490
+ 1.0
491
+ Xc = 30
492
+ a
493
+ 0.3
494
+ L
495
+ O
496
+ 0— Xc= 40
497
+ .
498
+ 0.8
499
+ :
500
+ F
501
+ Gaussian
502
+ D
503
+ 0.6
504
+ 0.2
505
+ P
506
+ C
507
+ O
508
+ 0.4
509
+ 0.1
510
+ 8
511
+ 0.2
512
+ 8
513
+ 0.0
514
+ 16
515
+ 0.0
516
+ -4
517
+ -2
518
+ 0
519
+ 4
520
+ 8
521
+ 2
522
+ -1
523
+ 0
524
+ 2
525
+ m
526
+ 0.6
527
+ 1.4
528
+ (d)
529
+ 1.2
530
+ n
531
+ 0.5
532
+ 1.0
533
+ 0.4
534
+ a
535
+ L
536
+ .
537
+ 0.8
538
+ F
539
+ 0.3
540
+ :
541
+ D
542
+ 0.6
543
+ :
544
+ ................
545
+ 0.2
546
+ P
547
+ 0.4
548
+ 0.1
549
+ 0.2
550
+ :
551
+ 0.0
552
+ 0.0
553
+ ..................
554
+
555
+ 4
556
+ -2
557
+ 0
558
+ 4
559
+ 6
560
+ 8
561
+ -2
562
+ -1
563
+ 0
564
+ 2
565
+ m
566
+ 0.5
567
+ 1.4
568
+ 1.2
569
+ 0.4
570
+ 8
571
+ 1.0
572
+ d
573
+ 0.3
574
+ 0.8
575
+ F
576
+ : HAa
577
+ D
578
+ 0.6
579
+ 0.2
580
+ P
581
+ ..............
582
+ 0.4
583
+ ....
584
+ 0.1
585
+ 0.2
586
+ C
587
+ 0.0
588
+ 0.0
589
+ F2
590
+ 6
591
+ -4
592
+ -2
593
+ 0
594
+ 4
595
+ 8
596
+ -1
597
+ 0
598
+ 1
599
+ 2
600
+ 3
601
+ y/d9
602
+ Figure 6: Streamwise distribution of the mean interface position (a) 𝑦𝐼 /𝑑 and (b) 𝑦𝐼 /𝐿𝜙
603
+ of all cases.
604
+ near wake (see figure 2) because of the coherent vortices (e.g. Chen et al. 2016; Kankanwadi
605
+ & Buxton 2022a).
606
+ Zhou & Vassilicos (2017) found that the PDF of TNTI position in a turbulent, axisymmetric
607
+ wake scales with the wake width in the self-preserving region. Such an observation is not
608
+ made in the current study as shown in figure 5(b, e, f) where the PDFs of both TNTI figure
609
+ (5b) and TTI (figures 5e, f) position are normalised with the wake half-width 𝐿 𝜙(𝑥) estimated
610
+ from the mean profile of the light intensity 𝜙(𝑥, 𝑦) of the PLIF images at the corresponding
611
+ 𝑥 position (see Appendix A, where we also show that 𝐿 𝜙(𝑥) scales with the wake half-width
612
+ based on the mean velocity field). The normalised PDFs of both TNTI and TTI position
613
+ for all cases assessed do not collapse but exhibit an evident streamwise evolution. This is
614
+ not unexpected as the PDFs of either TTI or TNTI position in the current flow region are,
615
+ as discussed in the previous paragraph, heavily affected by the large-scale coherent vortices
616
+ and are not self-similar, as manifested by the heavy negative tails at 𝑥/𝑑 = 5 and 10. What
617
+ is interesting to see is that the most probable position of the PDFs of both TTI and TNTI
618
+ position do scale approximately with the local 𝐿 𝜙, which provides a straightforward way to
619
+ estimate the most probable position for both TNTI and TTI position, even though the PDFs
620
+ are not self-similar.
621
+ The coincidence of the modal peaks in figures 5(b,d,f) coupled to the Gaussian-like nature
622
+ of the PDFs for the further downstream locations suggests that the mean position of the
623
+ interface 𝑦𝐼 (𝑥) at different 𝑥/𝑑 positions may scale with the local wake-half width. This is
624
+ confirmed in figure 6 for both the TNTI case and all the TTI cases. Figure 6a first compares
625
+ the streamwise evolution of 𝑦𝐼 (𝑥) for both TNTI (case 1a) and TTI cases scaled with the
626
+ cylinder diameter 𝑑. It is clear that all the TTI cases have a larger mean value of 𝑦𝐼 than
627
+ the TNTI case at almost all 𝑥/𝑑 positions, which is consistent with the observation in figure
628
+ 5(a, c, e). It seems the turbulence intensity is the dominant parameter in determining the
629
+ mean position of the TTI, as there is little evident distinction between the TTI cases within
630
+ groups 1 and group 2 in which integral length scale is the major differentiating factor. What
631
+ should be noted is that the mean interface position at a particular 𝑥/𝑑 location mainly reflects
632
+ the mass entrainment accumulated upstream of 𝑥/𝑑, whilst the slope of the curve d𝑦𝐼/d𝑥
633
+ demonstrates the local entrainment rate into the wake (Kankanwadi & Buxton 2022a). It is
634
+ found that in figure 6a there is an apparent turning point of the slope of 𝑦𝐼 (𝑥) located at
635
+ 𝑥/𝑑 ≈ 15 after which 𝑦𝐼 (𝑥) grows noticeably more slowly than farther upstream, for both
636
+ TNTI and TTI cases. It indicates that the entrainment rate upstream of 𝑥/𝑑 ≈ 15 is faster
637
+ than after this position. It is also noticed that in the flow region 𝑥/𝑑 ≲ 15 the mean interface
638
+
639
+ .0
640
+ 1.6
641
+ case la
642
+ case 1b
643
+ 1.4
644
+ 3.5.
645
+ case lc
646
+ case 2a
647
+ 1.2
648
+ 3.0
649
+ case 2b
650
+ case 3a
651
+ 1.0
652
+ Yi
653
+ 2.5
654
+
655
+ case 3b
656
+ Yi/d
657
+ 0.8
658
+ 2.0
659
+ 0.6
660
+ 1.5
661
+ 0.4
662
+ 1.0-
663
+ 0.2
664
+ 0.5
665
+ 0.0
666
+ 5
667
+ 10
668
+ 15
669
+ 2025
670
+ 30
671
+ 35
672
+ 40
673
+ 15
674
+ 20
675
+ 25
676
+ 30
677
+ 35
678
+ 40
679
+ x/d
680
+ x/d10
681
+ Figure 7: Streamwise distribution of the wake half-width 𝐿𝜙 with turbulent (cases 2b and
682
+ 3b) and non-turbulent (case 1a) background flow.
683
+ position 𝑦𝐼 (𝑥) of the TTI cases grows almost linearly and at a faster rate than the TNTI case;
684
+ a similar observation was made by Kankanwadi & Buxton (2022a) in the flow region very
685
+ close to the cylinder (𝑥/𝑑 ⩽ 5). It is thus concluded that the turbulence in the background
686
+ promotes spreading of the wake boundary mostly in the near wake region (say 𝑥/𝑑 < 15);
687
+ It is interesting to see that the turning point at 𝑥/𝑑 ≈ 15 is almost the same for all cases
688
+ tested, regardless of whether there is a TNTI or TTI. Although the physics underpinning
689
+ the changes of the slope of 𝑦𝐼 (𝑥) are still unclear, it is surmised that this transition position
690
+ may depends on the dynamics of the near-wake coherent vortices which has been reported to
691
+ be important for the near-wake large-scale engulfment (Kankanwadi & Buxton 2022a) and
692
+ decays significantly from 𝑥/𝑑 = 10 to 20 at a similar Reynolds number (e.g. Zhou et al. 2003;
693
+ Chen et al. 2016, and also the visualization in figure 2 ). After this turning point, the growth
694
+ of the wake would transition from large-scale engulfment-driven entrainment to small-scale
695
+ nibbling-driven entrainment
696
+ When the mean interface position is scaled by 𝐿 𝜙(figure 6b) all 𝑦𝐼/𝐿 𝜙 become approxi-
697
+ mately constant after an initial development region (𝑥/𝑑 ≲ 15). This is consistent with the
698
+ observation in figure 5 that the most probable position of 𝑦𝐼 scales with 𝐿 𝜙 which itself
699
+ follows a power-law scaling while developing downstream (figure 7). Eames et al. (2011)
700
+ developed a model that describes how a wake spreads in a highly turbulent flow. They pointed
701
+ out that for two-dimensional bodies, the wake grows linearly with distance during the initial
702
+ development region (Eames et al. (2011) called it ‘the ballistic regime’) until the wake width
703
+ is comparable to the integral scale of the background turbulence, beyond which the wake
704
+ width grows diffusively with a scaling of ∼ 𝑥1/2. Typical examples seeking a power-law
705
+ scaling for 𝐿 𝜙 ∼ 𝑥 𝛼 are displayed in figure 7. After 𝑥/𝑑 ≈ 10, the scaling 𝐿 𝜙 ∼ 𝑥1/2 is
706
+ indeed observed in almost all cases with a turbulent background with the scaling exponent
707
+ varying between 0.48 ⩽ 𝛼 ⩽ 0.54, except for two cases (case 1c and 2a in figure 2 with
708
+ a scaling exponent of 0.64 and 0.23 respectively). It is noted that for the non-turbulent
709
+ background case (group 1a), the scaling exponent (0.35) is close to 1/3, rather than the value
710
+ of (1/2) expected based on the self-similarity which is only achieved in the very far wake
711
+ (say 𝑥/𝑑 = 200 in Ch. 4 of Tennekes & Lumley (1972)).
712
+ We close the discussion of this section by a comparison between the centred PDF of 𝑦𝐼
713
+ for all the examined TNTI and TTI cases (i.e. the PDF of (𝑦𝐼 − 𝑦𝐼)/𝜎𝐼 where 𝜎𝐼 is the
714
+ standard deviation of 𝑦𝐼) and a standard Gaussian distribution (figure 8), so as to highlight
715
+ the different extent to which the TNTI and TTI position PDFs deviate from Gaussianity as
716
+ Rapids articles must not exceed this page length
717
+
718
+ 5.5
719
+ case la
720
+ 5.0
721
+ 0.48
722
+ case 2b
723
+ 4.5
724
+ case 3b
725
+ d
726
+ 0.48
727
+ 4.0
728
+ d
729
+ d
730
+ 3.5
731
+ L
732
+ 0.35
733
+ 3.0
734
+ d
735
+ d
736
+ a
737
+ 2.5
738
+ 2.0
739
+ 1.5
740
+ 1.0
741
+ 0
742
+ 10
743
+ 20
744
+ 30
745
+ 40
746
+ 50
747
+ x/d11
748
+ Figure 8: Comparison of centered PDFs of TNTI and all TTI cases at different 𝑥/𝑑
749
+ positions. (a) 𝑥/𝑑 = 5, (b)10, (c)20, (d)40.
750
+ 𝑥/𝑑 increases. It is clear that very close to the cylinder at 𝑥/𝑑 = 5 (figure 8a), the PDFs of
751
+ both TNTI (case 1a) and all TTI cases deviate from the Gaussian distribution significantly
752
+ with evident negative skewness, as is also seen in figure 5. What is interesting is that as
753
+ 𝑥/𝑑 increases, the negative skewness of the TNTI position gradually reduces and the PDF
754
+ becomes practically Gaussian at 𝑥/𝑑 = 40 (figure 8d), whilst the PDFs for all the TTI cases
755
+ still deviate from Gaussianity, although the skewness does reduce. It is clear that for both
756
+ TNTI and TTI cases, the dynamics in the near wake (figure 2) are very different from those
757
+ farther downstream where the large-scale coherent vortices have largely dissipated and the
758
+ turbulence is fully developed. The different dynamics in the near and relatively far wake is
759
+ believed to lead to distinct geometrical features of the interfaces, which encourages us to
760
+ investigate the fractal dimension of the interfaces, and their spatial evolution, in the next
761
+ section.
762
+ 4.2. Fractal dimension of the TNTI and TTI
763
+ As explained in the introduction, the multi-scale self-similar geometric features of the
764
+ interface, either TNTI or TTI, can be described with fractal analysis, which was first
765
+ demonstrated by Sreenivasan & Meneveau (1986). The length of a fractal “line” follows
766
+ a power law with increased resolution 𝑟, viz.,
767
+ 𝐿𝐼 (𝑟) ∼ 𝑟1−𝐷
768
+ (4.1)
769
+ where 𝐷 is the fractal dimension and has been reported to be between 1.3 to 1.4 for a TNTI
770
+ (e.g. Prasad & Sreenivasan 1989; de Silva et al. 2013; Abreu et al. 2022), while for the TTI
771
+ the dimension is somewhat higher and an increasing function of the turbulence intensity
772
+ in the ambient flow (Kankanwadi & Buxton 2020; Kohan & Gaskin 2022). However, these
773
+ previous studies focus on the TTI in the fully-developed region of a turbulent flow, where
774
+ Kankanwadi & Buxton (2020) demonstrated that the turbulent length scale in the ambient
775
+
776
+ 0.5
777
+ +
778
+ case 1b
779
+ X
780
+ case lc
781
+ 0.4
782
+ case 2a
783
+ 0.4
784
+ X
785
+ case 2b
786
+ case 3a
787
+ 0.3
788
+ +
789
+ case 3b
790
+ 0.3
791
+ case la
792
+ PDF
793
+ 0.2
794
+ 0.2
795
+ 0.1 -
796
+ 0.1
797
+ 0.0 +
798
+ 0.0t8
799
+ -4
800
+ 0
801
+ 2
802
+ 4
803
+ -4
804
+ 0
805
+ 2
806
+ 0.5
807
+ 0.5
808
+ (c)
809
+ (d)
810
+ 0.4
811
+ 0.4
812
+ 0.3
813
+ 0.3
814
+ PDF
815
+ 0.2
816
+ 0.2
817
+ 0.1
818
+ 0.1
819
+ 0.0+BR
820
+ 0.0+
821
+ -4
822
+ 0
823
+ Z
824
+ 4
825
+ -2
826
+ 0
827
+ 2
828
+ 4
829
+ (y- )/oi
830
+ (yl - y)/ol12
831
+ Figure 9: (a) Filtered interface with different filter scales, (b) scaling of the length of the
832
+ interface 𝐿𝐼 , and (c) fractal dimension of the interface obtained using different window
833
+ widths. The vertical dashed-line indicates the window width used for calculating the local
834
+ fractal dimension of the interface.
835
+ flow has little effect on the fractal dimension of the interface. In the previous section, we have
836
+ shown that the behavior of the interfaces are substantially influenced by the strong organized
837
+ motions in the near wake. As we have measured multiple cases of TTIs with various levels
838
+ of turbulent intensity and integral length scales in the background flow, it is of interest to
839
+ examine the fractal dimension of these TTIs in the context of the streamwise decay of the
840
+ coherent vortices.
841
+ To obtain the fractal dimension of the interfaces, we adopt a ‘filtering method’ as used
842
+ in previous studies (e.g. de Silva et al. 2013; Kankanwadi & Buxton 2020; Abreu et al.
843
+ 2022). Specifically, a box filter of scale Δ 𝑓 was first used to filter the interface lines obtained
844
+ in section 3. Figure 9a displays an example of the TNTI lines after being filtered with
845
+ different Δ 𝑓 . Note that there are two lines on both sides of the wake, whose length are
846
+ calculated separately and both are included in the ensemble to calculate the mean length
847
+ of the interface line corresponding to a particular Δ 𝑓 . Based on equation (4.1), log(𝐿𝐼)
848
+ has a linear relationship with log(𝑟) when such a scaling applies and the slope of the line
849
+ (i.e. 1 − 𝐷, referred to as the scaling exponent in the following text) is directly related to
850
+ the fractal dimension. Figure 9b displays a distribution of the mean turbulent/non-turbulent
851
+ interface length of all detected realisations with respect to different filter sizes. In the scale
852
+ range between 0.2𝑑 (close to the Taylor microscale on the wake centreline at 𝑥/𝑑 = 20 of the
853
+ TNTI case, estimated from Kankanwadi (2022)) and 1𝑑, a scale comparable to the integral
854
+ length there is a strong linear fit between log(𝐿𝐼/𝑑) and log(Δ 𝑓 /𝑑) with a slope of the fitted
855
+
856
+ (n)
857
+ Af = 0.18d
858
+ = 0.63d
859
+ : = 1.06d
860
+ Taylor scale α = 0.2d
861
+ Cylinder diameter: 1d
862
+ (q)
863
+ 0.1
864
+ -0.20
865
+ 2.2
866
+ case 3b
867
+ case la
868
+ -0.25
869
+ 2.1
870
+ 0.0
871
+ Slope = -0.34
872
+ :0
873
+ -0.30 -
874
+ -0.1
875
+ (p/T)
876
+ D
877
+ -0.36±0.02
878
+ -0.2
879
+ -0.35 .
880
+ log10(
881
+ .8
882
+ -0.40
883
+ 0.34
884
+ .+..
885
+ 1.7
886
+ -0.4
887
+ -0.45
888
+ -0.5
889
+ -0.50
890
+ 1.6
891
+ -1.0
892
+ -0.8
893
+ -0.6
894
+ -0.4
895
+ -0.2
896
+ 0.0
897
+ 0.2
898
+ 2
899
+ 4
900
+ 6
901
+ 8
902
+ 10
903
+ 12
904
+ 14
905
+ 16
906
+ 18
907
+ log1o(Ag/d)
908
+ window span (d)13
909
+ Figure 10: Scaling of the interface length of the TNTI case using window width of 8𝑑 at
910
+ different streamwise 𝑥/𝑑 positions.
911
+ line of -0.34. This yields a fractal dimension of 𝐷 = 1.34 for the TNTI which agrees well
912
+ with the expected value between 1.3 - 1.4.
913
+ To compute the local fractal dimension of the interfaces at different 𝑥/𝑑 we must choose
914
+ a “window” covering a finite length of the whole interface; the window span should be large
915
+ enough to produce a good representation of the local interface’s fractality but small enough
916
+ to ensure homogeneity over the streamwise extent of the window and yielding good spatial
917
+ resolution for the fractal dimension’s distribution (with respect to 𝑥/𝑑). Figure 9c shows the
918
+ distribution of the scaling exponent (1−𝐷), determined in the same way as exhibited in figure
919
+ 9b, with respect to different streamwise window extents. Two typical cases are examined with
920
+ the window centre set at 𝑥/𝑑 = 20: the TNTI case 1a and the TTI case 3b which has the
921
+ highest turbulence intensity in the ambient flow (figure 1b). The value 1 − 𝐷 for both cases
922
+ shows a weak increasing trend as the window span grows; there is a narrow plateau between
923
+ window spans of 7 − 11𝑑, displaying a reasonable value of -0.36 (e.g. Prasad & Sreenivasan
924
+ 1989). We therefore chose a window span of 8𝑑 corresponding to the beginning of the plateau
925
+ in the following study for the best spatial resolution of the results.
926
+ Figure 10 shows the scaling of the mean length of the filtered interface of the TNTI case
927
+ with respect to the scale of the filter at various streamwise positions. In the figure, 𝑥𝑐/𝑑
928
+ located between 4 to 40 is the centre position of the examination window with span of
929
+ 8𝑑. There is a well-defined scaling range between Δ 𝑓 /𝑑 = 0.2 and 1 for all the examined
930
+ positions, although the scaling range is wider in the larger scale end for positions closer to
931
+ the wake generator. It is interesting to see that the slope of the fitted line (= 1 − 𝐷) varies
932
+ from -0.28 in the very near wake to an oft-reported -0.37 at 𝑥𝑐 = 40, indicating that there is
933
+ indeed essential difference in the geometric features of the interface in the near wake and the
934
+ fully-developed downstream positions. To explore the effect of the background turbulence
935
+ on the fractal features of the interfaces, we summarized the streamwise distributions of the
936
+
937
+ Af/d = 0.2
938
+ =1
939
+ 1.8
940
+ Slope = -0.37
941
+ 1.6
942
+ log(L/d)
943
+ 1.4
944
+ 12
945
+ 10
946
+ 1.2
947
+ Slope = -0.28
948
+ 1.0
949
+ -1.0
950
+ -0.8
951
+ -0.6
952
+ -0.4
953
+ -0.2
954
+ 0.0
955
+ 0.2
956
+ log(△f/d)14
957
+ Figure 11: Streamwise distribution of fractal dimensions of TNTI and all TTI cases. (a)
958
+ Effect of turbulence intensity, and (b) effect of integral length scale.
959
+ scaling exponent of all the measured cases in figure 11, in which the effect of the background
960
+ turbulence intensity and length scale on the fractal dimension is respectively examined in
961
+ figures 11a and 11b.
962
+ In figure 11a, the streamwise distribution of the scaling exponent (1 − 𝐷) of cases 2a, 3a
963
+ and 3b, which are TTI cases with relatively small integral scale and large turbulence intensity
964
+ in the background flow (figure 1b), are compared with that of the TNTI case (case 1a). The
965
+ TNTI case exhibits an approximately constant value around -0.36 in the region 𝑥/𝑑 ≳ 10;
966
+ the three TTI cases have similar distributions of 1 − 𝐷 to the TNTI case before 𝑥/𝑑 ≃ 15
967
+ which interestingly corresponds to the position where the wake spreading rate decreases
968
+ evidently (figure 6a). After this 𝑥/𝑑 position, the scaling exponent of the TTI cases continues
969
+ to increase in magnitude and reaches approximately −0.45 at 𝑥/𝑑 = 40. The larger TTI
970
+ fractal dimension than that of the TNTI is also consistent with the observation of Kohan &
971
+ Gaskin (2022) in an axisymmetric jet with a turbulent background. The growing (1 − 𝐷) of
972
+ the TTIs relative to the TNTI in the far field of the wake indicates that the turbulence intensity
973
+ in the background flow becomes gradually essential in determining the fractal dimension of
974
+ the interface in the positions far from the wake generator. The increased fractal dimension
975
+ in the far field of the wake can also be observed in the visualisation in figure 2b, in which
976
+ the boundary of the wake becomes “rougher” (i.e. a larger fractal dimension) as the flow
977
+ proceeds downstream, with intermittent lumps and also finer structures. These structures
978
+ result from the interactions between the eddies in the background turbulence and those of
979
+ the wake. In the region closer to the cylinder before 𝑥/𝑑 ≃ 15, the ambient turbulence does
980
+ not differentiate the scaling exponent of the TTIs from the TNTI. It implies that in this flow
981
+ region, which features the evolution of the strong von Kármán vortices, the fractal nature of
982
+ the interface is mainly determined by the dynamics of the wake flow itself, at least when the
983
+ scale of the energetic eddies in the ambient flow is not overpowering (as is the situation of
984
+ cases cases 2a, 3a and 3b).
985
+ In figure 11b, the TTI cases 1b, 1c which possess low turbulence intensity and increasing
986
+ integral length scale in the background flow are compared with the TNTI case (case 1a); case
987
+ 2b which has a large integral length scale and also higher turbulence intensity is also added
988
+ for comparison. In contrast to the similar distribution of different cases upstream of 𝑥/𝑑 ≃ 15
989
+ in figure 11a, the scaling exponent distributions of the compared cases show evident scatter
990
+ in the upstream region but gradually converge to a value ≈ −0.36 in the downstream flow.
991
+ TTI cases 1b and 1c differ from the TNTI case 1a mainly in the integral length scale of the
992
+ background flow, their distinctive 1 − 𝐷 distribution in the upstream region indicates that the
993
+
994
+ (a)
995
+ -0.20
996
+ -0.20
997
+ case la
998
+ case la
999
+ case 2a
1000
+ case 1b
1001
+ -0.25
1002
+ -0.25
1003
+ case 3a
1004
+ case lc
1005
+ case 3b
1006
+ case 2b
1007
+ -0.30
1008
+ -0.30
1009
+ D
1010
+ -0.35
1011
+ -0.35
1012
+ -0.40
1013
+ -0.40
1014
+ -0.45
1015
+ -0.45
1016
+ -0.50
1017
+ -0.50
1018
+ 10
1019
+ 15
1020
+ 20
1021
+ 25
1022
+ 30
1023
+ 35
1024
+ 40
1025
+ 5
1026
+ 10
1027
+ 15
1028
+ 20
1029
+ 25
1030
+ 30
1031
+ 35
1032
+ 40
1033
+ x/d
1034
+ x/d15
1035
+ integral scale of the background turbulence is of great importance to the fractal dimension
1036
+ of the interfaces in this region. Compared to the TNTI case, the TTI case 2b has both a
1037
+ higher turbulence intensity and a larger integral length scale (figure 1b), and its distribution
1038
+ is not significantly different from that of the TNTI case in both the upstream and downstream
1039
+ field. It seems that there is a compound effect of the background turbulence intensity and the
1040
+ integral length scale on the interface geometry. As a matter of fact, such a combined effect
1041
+ was reported by Kankanwadi & Buxton (2020, 2022a) in the same flow: in the upstream field
1042
+ both the turbulence intensity and integral length scale in the background flow act to enhance
1043
+ the entrainment rate into the wake whilst only the turbulence intensity of the background
1044
+ turbulence is important in suppressing entrainment in the downstream field.
1045
+ To summarize the discussion of figure 11, generally, both turbulence intensity and integral
1046
+ length scale in the background flow have an effective influence on the fractal dimension
1047
+ of the interface, and in different regions of the flow a different parameter is in dominance.
1048
+ In the near wake, the integral length scale is the more important parameter; as the flow
1049
+ develops downstream with the coherent vortices degrading substantially, the effect of the
1050
+ integral length scale weakens and the influence of the turbulence intensity gradually prevails.
1051
+ This observation is consistent with the conclusion obtained in the TTI entrainment studies
1052
+ of Kankanwadi & Buxton (2020, 2022a) that integral length scale is the more important
1053
+ parameter in the near wake which promotes the large-scale engulfment of the wake, whilst
1054
+ the turbulence intensity suppress the small-scale “nibbling” in the far field where the integral
1055
+ scale is of less relevance.
1056
+ 5. Summary and Conclusions
1057
+ We examined the spatial evolution of the geometry of the interface of a turbulent cylinder
1058
+ wake from the near (𝑥/𝑑 = 5) to the relatively far field (𝑥/𝑑 = 40), in a turbulent background
1059
+ with various levels of turbulence intensity and integral length scale (figure 1b). A PLIF
1060
+ experiment was carried out to capture the interface between the wake and the turbulent
1061
+ background flow. Attention was paid to the streamwise evolution of the geometric properties
1062
+ of these TTIs and a TNTI reference case, including their PDFs, scaling and fractality, in the
1063
+ context of the large-scale vortices gradually diminishing in the wake.
1064
+ Compared to the conventional TNTI, the TTI spreads faster towards the ambient flow as
1065
+ the wake develops downstream, which is mainly due to the enhanced rate of entrainment in
1066
+ the near wake (Kankanwadi & Buxton 2022a). We find a transition region of the interface
1067
+ spreading outwards at 𝑥/𝑑 ≈ 15, after which the interfaces spread at an evidently reduced rate
1068
+ (figure 6a). It is conjectured that the different spreading rates before and after this transition
1069
+ region are associated with the dynamics of the large-scale coherent vortices which induce
1070
+ strong engulfment (Kankanwadi & Buxton 2022a, also visualization in figure 2) and decay
1071
+ rapidly from 𝑥/𝑑 = 10 to 20 at similar Reynolds numbers (e.g. Zhou et al. 2003; Chen et al.
1072
+ 2016). After this region, the mean position of the interfaces, including both TNTI and all TTI
1073
+ cases, display a reasonable scaling with the wake half-width 𝐿 𝜙(figure 6b). 𝐿 𝜙 is found to
1074
+ agree well with Eames et al. (2011)’s theoretical downstream evolution scaling of (𝑥/𝑑)1/2 in
1075
+ a turbulent background. It is interesting to see that this transition region is roughly the same
1076
+ for both TNTI and TTI cases examined, suggesting that this transition region is robust and
1077
+ not dependent on the turbulence in the background flow, at least for the turbulence intensity
1078
+ and length scale range examined in the present study.
1079
+ It is noted that the PDFs of both TTI and TNTI position are not Gaussian in the near wake
1080
+ (especially for 𝑥/𝑑 ≲ 10 ) with evident negative skewness which reflects the “deep-diving”
1081
+ interface towards the wake central region due to the strong engulfment by the coherent
1082
+ vortices at these locations (figure 2). This observation is distinctly different from the oft-
1083
+
1084
+ 16
1085
+ reported Gaussian distribution of TNTI position at locations of fully-developed turbulence
1086
+ in the absence of dominant coherent motions (e.g. da Silva et al. 2014; Mistry et al. 2016;
1087
+ Zhou & Vassilicos 2017, and also the Gaussian PDF of TNTI position at 𝑥/𝑑 = 40 in figure
1088
+ 8d). Note that the PDFs of TTI position still depart from Gaussianity with a slight negative
1089
+ skewness even at 𝑥/𝑑 = 40 (figure 8d), which confirms the observation of Kohan & Gaskin
1090
+ (2022) of the TTI in a fully-developed axisymmetric jet.
1091
+ Finally, we found that the fractal dimension of the TTIs in the near and relatively far wake
1092
+ are dictated by different parameters of the background turbulence. Turbulence intensity
1093
+ induces a higher fractal dimension of the interface in the far wake. It is highly likely
1094
+ to be resultant from the interaction between the ambient eddies and those of the wake
1095
+ near the interface, which can be partly observed from the evident intermittent small-scale
1096
+ structures on the interface of the wake in turbulence background in figure 2b. The effect
1097
+ of the integral length scale is more appreciable in the near wake region (figure 11b). As
1098
+ the strong large-scale vortices prevail in the near wake, it is reasonable to expect only the
1099
+ energetic eddies in the background flow with comparable length scale or turnover time would
1100
+ interact effectively with the coherent vortices in the wake, which would be the reason why
1101
+ background integral scale is important in the near wake. Such large-scale interactions in the
1102
+ near wake would not necessarily wrinkle the interface, as the small-scale interaction does
1103
+ in the far wake, explaining why cases with larger integral scale do not necessarily cause
1104
+ higher fractal dimension of the interface (figure 11b). Such large-scale interaction would be
1105
+ expected to cause large-scale oscillation or meandering of the wake, however which has been
1106
+ demonstrated by Kankanwadi & Buxton (2022a).
1107
+ Acknolegement The authors would like to acknowledge the Engineering and Physical
1108
+ Sciences Research Council for funding the work under grant no. EP/V006436/1
1109
+ Appendix A. Determination of 𝐿 𝜙
1110
+ This appendix is added to show how the wake half-width 𝐿 𝜙 of the scalar field is determined
1111
+ based on the PLIF measurements and its connection with the velocity wake half-width 𝐿𝑢.
1112
+ The profiles of the typical cases of the time-averaged light intensity of the PLIF images,
1113
+ 𝜙(𝑦) at 𝑥/𝑑 = 5 to 40 are show in figure 12. It is noted that the mean concentration of the
1114
+ fluorescent dye in the flow field is quite low and thus the fluorescent response is effectively
1115
+ a linear function of the dye concentration (Crimaldi 1997; Vanderwel & Tavoularis 2014;
1116
+ Baj et al. 2016); 𝜙(𝑦) thus can be treated virtually as the concentration of the dye which
1117
+ is confirmed later in figure 13. For all the cases considered (figure 12a, c, e, g), 𝜙(𝑦)
1118
+ reasonably decays in magnitude and spreads into a wider range as 𝑥/𝑑 increases. Similar to
1119
+ the definition of velocity wake half-width, the scalar wake half-width 𝐿 𝜙 is such defined that
1120
+ 𝜙(𝑦 = 𝐿 𝜙) = 1/2𝜙(𝑦 = 0). It is interesting to find that the streamwise evolution of 𝜙∗ scales
1121
+ well with 𝐿 𝜙 for all the TTI cases (figure 12d, f, h); for the TNTI case (figure 12b), 𝐿 𝜙 also
1122
+ works well for 𝑥/𝑑 ⩾ 20. It seems the scalar field of the wake in a turbulent background
1123
+ becomes self-preserving at a smaller 𝑥/𝑑 position than that in a non-turbulent flow. A similar
1124
+ observation for the velocity field was also made by Eames et al. (2011).
1125
+ The scalar is passively transported by the velocity field, so one may expect a relation
1126
+ between the wake half-width determined with the velocity field and that with the scalar field.
1127
+ This is indeed observed in the present measurement of the non-turbulent background case
1128
+ shown in figure 13, in which the ratio 𝐿 𝜙/𝐿𝑢 is observed to be approximately constant at
1129
+ 𝑥/𝑑 ⩾ 20. Here 𝐿𝑢 is the wake half-width determined from the mean velocity profile of
1130
+ our non-published PIV measurement of the cylinder wake without grids upstream. Note that
1131
+
1132
+ 17
1133
+ Figure 12: Profiles of mean light intensity of PLIF images of typical cases. (a, b) TNTI
1134
+ case 1a, (c, d) TTI case 1c, (e, f) TTI case 2a, (g, h) TTI case 3b.
1135
+ a similar result was obtained in the measurements of Chen et al. (2016) and Zhou et al.
1136
+ (2002) in the wake of a cylinder at the same 𝑥/𝑑 range, except that their passive scalar was
1137
+ represented by temperature in the flow. The slightly larger value of the present measurement
1138
+ could possibly be attributed to the different initial conditions to those of the two references:
1139
+ in our experiment the dye is released from a hole in the rear surface of the cylinder while the
1140
+ scalar (heat) in Chen et al. (2016) and Zhou et al. (2002) is injected from the shear layer of
1141
+ the wake by electrically heating the cylinder; in addition, the Sc number for the fluorescent
1142
+ dye (about 2500, see section 2) is much larger than the Pr number (about 0.7) of heat in
1143
+ air, which can also cause the scalar being diffused distinctly (e.g. Rehab et al. 2001). The
1144
+ resemblance in our measurement and those from Chen et al. (2016) and Zhou et al. (2002)
1145
+
1146
+ 160
1147
+ 1.2
1148
+ (n)
1149
+ x/d = 5
1150
+ (q)
1151
+ 140
1152
+ x/d = 10
1153
+ 1.0
1154
+ 120
1155
+ x/d = 20
1156
+ x/d = 30
1157
+ 0.8
1158
+ 100
1159
+ x/d = 40
1160
+ (y)
1161
+ 80
1162
+ Φ*(y) 0.6
1163
+ 60
1164
+ 0.4 -
1165
+ 40
1166
+ 0.2
1167
+ 20
1168
+ 0.0 -
1169
+ -6
1170
+ -4
1171
+ -2
1172
+ 0
1173
+ 2
1174
+ 6
1175
+ -4
1176
+ -3
1177
+ -2
1178
+ -1
1179
+ i
1180
+ 2
1181
+ 3
1182
+ 160
1183
+ 1.2
1184
+ (c)
1185
+ (d)
1186
+ 140
1187
+ 1.0
1188
+ 120
1189
+ 0.8
1190
+ 100
1191
+ b(y)
1192
+ 80
1193
+ (y) 0.6
1194
+ 60
1195
+ 0.4
1196
+ 40
1197
+ 0.2
1198
+ 20
1199
+ +0
1200
+ 0.0 -
1201
+ -6
1202
+ -4
1203
+ -2
1204
+ 0
1205
+ 2
1206
+ 4
1207
+ 6
1208
+ -4
1209
+ 3
1210
+ -2
1211
+ -1
1212
+ 160
1213
+ 1.2
1214
+ (e)
1215
+ (J)
1216
+ 140
1217
+ 1.0
1218
+ 120
1219
+ 0.8
1220
+ 100
1221
+ ()Φ
1222
+ 80
1223
+ y)0.6
1224
+ 60
1225
+ 0.4
1226
+ 40
1227
+ 0.2
1228
+ 20
1229
+ 0.0 -
1230
+ -6
1231
+ -4
1232
+ -2
1233
+ 0
1234
+ 2
1235
+ 4
1236
+ _4
1237
+ 6
1238
+ -3
1239
+ -2
1240
+ -1
1241
+ 0
1242
+ 1
1243
+ 2
1244
+ 3
1245
+ 160
1246
+ 1.2
1247
+ (g)
1248
+ (h)
1249
+ 140
1250
+ 1.0
1251
+ 120
1252
+ 0.8
1253
+ 100
1254
+ (y)
1255
+ 80
1256
+ *(y)0.6
1257
+ 60
1258
+ 0.4 -
1259
+ 40
1260
+ 0.2
1261
+ 20
1262
+ 0
1263
+ 0.0 -
1264
+ 4
1265
+ -2
1266
+ 0
1267
+ 2
1268
+ 4
1269
+ 6
1270
+ 4
1271
+ -3
1272
+ -2
1273
+ 0
1274
+ y/d18
1275
+ Figure 13: Ratio of scalar wake half-width 𝐿𝜙(𝑥) to velocity wake half-width 𝐿𝑢(𝑥) at
1276
+ different 𝑥/𝑑 positions of a cylinder wake.
1277
+ confirms our expectation that the distribution of the mean value of the fluorescent intensity
1278
+ is a reasonable representation of the distribution of the mean scalar concentration.
1279
+ REFERENCES
1280
+ Abreu, Hugo, Pinho, Fernando T & da Silva, Carlos B 2022 Turbulent entrainment in viscoelastic
1281
+ fluids. Journal of Fluid Mechanics 934, A36.
1282
+ Baj, P, Bruce, P. J. K. & Buxton, O. R. H. 2016 On a plif quantification methodology in a nonlinear dye
1283
+ response regime. Experiments in Fluids 57 (6), 1–19.
1284
+ Bisset, D. K., Hunt, J. C. R. & Rogers, M. M. 2002 The turbulent/non-turbulent interface bounding a far
1285
+ wake. Journal of Fluid Mechanics 451, 383–410.
1286
+ Buxton, O. R. H., Breda, M. & Dhall, K. 2019 Importance of small-scale anisotropy in the
1287
+ turbulent/nonturbulent interface region of turbulent free shear flows. Physical Review Fluids 4 (3),
1288
+ 034603.
1289
+ Chen, J. G., Zhou, Y., Zhou, T. M. & Antonia, R. A. 2016 Three-dimensional vorticity, momentum and
1290
+ heat transport in a turbulent cylinder wake. Journal of Fluid Mechanics 809, 135–167.
1291
+ Cimarelli, A. & Boga, G. 2021 Numerical experiments on turbulent entrainment and mixing of scalars.
1292
+ Journal of Fluid Mechanics 927, A34.
1293
+ Cimarelli, A., Cocconi, G., Frohnapfel, B. & De Angelis, E. 2015 Spectral enstrophy budget in a
1294
+ shear-less flow with turbulent/non-turbulent interface. Physics of Fluids 27 (12), 125106.
1295
+ Corrsin, S. & Kistler, A. L. 1955 Free-stream boundaries of turbulent flows. NACA Tech. Rep. 1244.
1296
+ Crimaldi, J. P. 1997 The effect of photobleaching and velocity fluctuations on single-point lif measurements.
1297
+ Experiments in Fluids 23 (4), 325–330.
1298
+ Eames, I., Jonsson, C. & Johnson, P. B. 2011 The growth of a cylinder wake in turbulent flow. Journal of
1299
+ Turbulence (12), N39.
1300
+ Gordeyev, S. V. & Thomas, F. O. 2000 Coherent structure in the turbulent planar jet. part 1. extraction of
1301
+ proper orthogonal decomposition eigenmodes and their self-similarity. Journal of Fluid Mechanics
1302
+ 414, 145–194.
1303
+ Kankanwadi, K. S 2022 Turbulent/turbulent entrainment: a detailed examination of entrainment, and the
1304
+ behaviour of the outer interface as affected by background turbulence. PhD thesis, Imperial College
1305
+ London.
1306
+ Kankanwadi, K. S. & Buxton, O. R. H. 2020 Turbulent entrainment into a cylinder wake from a turbulent
1307
+ background. Journal of Fluid Mechanics 905, A35.
1308
+ Kankanwadi, K. S. & Buxton, O. R. H. 2022a The influence of freestream turbulence on the near-field
1309
+ growth of a turbulent cylinder wake: turbulent entrainment and wake meandering. submitted to
1310
+ Physical Review Fluids .
1311
+ Kankanwadi, K. S. & Buxton, O. R. H. 2022b On the physical nature of the turbulent/turbulent interface.
1312
+ Journal of Fluid Mechanics 942, A31.
1313
+
1314
+ 4
1315
+ -O- Present measurement
1316
+ -- Zhou et al. (2002)
1317
+ 3
1318
+ △- Chen et al. (2016)
1319
+ Lg/ Lu
1320
+ 1
1321
+ 0
1322
+ 0
1323
+ 10
1324
+ 20
1325
+ 30
1326
+ 40
1327
+ x/d19
1328
+ Kohan, K. F. & Gaskin, S. J. 2022 On the scalar turbulent/turbulent interface of axisymmetric jets. Journal
1329
+ of Fluid Mechanics 950, A32.
1330
+ Long, Y., Wang, J. & Pan, C. 2022 Universal modulations of large-scale motions on entrainment of turbulent
1331
+ boundary layers. Journal of Fluid Mechanics 941, A68.
1332
+ Matsumura, M. & Antonia, R. A. 1993 Momentum and heat transport in the turbulent intermediate wake
1333
+ of a circular cylinder. Journal of Fluid Mechanics 250, 651–668.
1334
+ Mistry, D., Philip, J., Dawson, J. R. & Marusic, I. 2016 Entrainment at multi-scales across the
1335
+ turbulent/non-turbulent interface in an axisymmetric jet. Journal of Fluid Mechanics 802, 690–
1336
+ 725.
1337
+ Porté-Agel, F., Bastankhah, M. & Shamsoddin, S. 2020 Wind-turbine and wind-farm flows: a review.
1338
+ Boundary-Layer Meteorology 174 (1), 1–59.
1339
+ Prasad, R. R. & Sreenivasan, K. R. 1989 Scalar interfaces in digital images of turbulent flows. Experiments
1340
+ in fluids 7 (4), 259–264.
1341
+ Rehab, H., Antonia, R. A. & Djenidi, L. 2001 Streamwise evolution of a high-schmidt-number passive
1342
+ scalar in a turbulent plane wake. Experiments in fluids 31 (2), 186–192.
1343
+ da Silva, C. B., Hunt, J. C. R., Eames, I. & Westerweel, J. 2014 Interfacial layers between regions of
1344
+ different turbulence intensity. Annu. Rev. Fluid Mech 46 (1), 567–590.
1345
+ de Silva, C. M., Philip, J., Chauhan, K., Meneveau, C. & Marusic, I. 2013 Multiscale geometry and
1346
+ scaling of the turbulent-nonturbulent interface in high reynolds number boundary layers. Physical
1347
+ review letters 111 (4), 044501.
1348
+ Sreenivasan, K. R. & Meneveau, C. 1986 The fractal facets of turbulence. Journal of Fluid Mechanics
1349
+ 173, 357–386.
1350
+ Sreenivasan, K. R., Ramshankar, R. & Meneveau, C. H. 1989 Mixing, entrainment and fractal
1351
+ dimensions of surfaces in turbulent flows. Proceedings of the Royal Society of London. A.
1352
+ Mathematical and Physical Sciences 421 (1860), 79–108.
1353
+ Tennekes, H. & Lumley, J. L. 1972 A first course in turbulence. MIT press.
1354
+ Townsend, A. A. 1976 The structure of turbulent shear flow. Cambridge university press.
1355
+ Vanderwel, C. & Tavoularis, S. 2014 On the accuracy of plif measurements in slender plumes.
1356
+ Experiments in fluids 55 (8), 1–16.
1357
+ Westerweel, J., Fukushima, C., Pedersen, J. M. & Hunt, J. C. R. 2009 Momentum and scalar transport
1358
+ at the turbulent/non-turbulent interface of a jet. Journal of Fluid Mechanics 631, 199–230.
1359
+ Yule, A. J. 1978 Large-scale structure in the mixing layer of a round jet. Journal of Fluid Mechanics 89 (3),
1360
+ 413–432.
1361
+ Zhou, T. M., Zhou, Y., Yiu, M. W. & Chua, L. P. 2003 Three-dimensional vorticity in a turbulent cylinder
1362
+ wake. Experiments in Fluids 35 (5), 459–471.
1363
+ Zhou, Y. & Vassilicos, J. C. 2017 Related self-similar statistics of the turbulent/non-turbulent interface
1364
+ and the turbulence dissipation. Journal of Fluid Mechanics 821, 440–457.
1365
+ Zhou, Y, Zhang, H. J. & Yiu, M. W. 2002 The turbulent wake of two side-by-side circular cylinders. Journal
1366
+ of Fluid Mechanics 458, 303–332.
1367
+
YNE4T4oBgHgl3EQfNwyH/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
YtE5T4oBgHgl3EQfCw7_/content/tmp_files/2301.05400v1.pdf.txt ADDED
@@ -0,0 +1,694 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+
3
+ Mass production of ultra-pure NaI powder for COSINE-200
4
+
5
+ KeonAh Shin1*, JunSeok Choe1, Olga Gileva1, Alain Iltis2 ,Yena Kim1 , Yeongduk Kim1,3,
6
+ Cheolho Lee1, Eunkyung Lee1 , and HyunSu Lee1,3*, Moo Hyun Lee1,3
7
+ 1Center for Underground Physics, Institute for Basic Science (IBS), Daejeon 34126, Korea
8
+ 2Damavan Imaging, Troyes, 10430, France
9
+ 3IBS school, University of Science and Technology (UST), Daejeon 34113, Korea
10
+ Correspondence:
11
+ KeonAh Shin and HyunSu Lee
12
13
+ Keywords: NaI powder, low-background, mass purification, recrystallization, COSINE-200.
14
+ Abstract
15
+ COSINE-200 is the next phase experiment of the ongoing COSINE-100 that aims to unambiguously
16
+ verify the annual modulation signals observed by the DAMA experiment and to reach the world
17
+ competitive sensitivity on the low-mass dark matter search. To achieve the physics goal of the
18
+ COSINE-200, the successful production of the low-background NaI(Tl) detectors is crucial and it must
19
+ begin from the mass production of the ultra-low background NaI powder. A clean facility for mass-
20
+ producing the pure-NaI powder has been constructed at the Center for Underground Physics (CUP) in
21
+ Korea. Two years of operation determined efficient parameters of the mass purification and provided
22
+ a total of 480 kg of the ultra-pure NaI powder in hand. The potassium concentration in the produced
23
+ powders varied from 5.4 to 11 ppb, and the maximum production capacity of 35 kg per two weeks was
24
+ achieved. Here, we report our operational practice with the mass purification of the NaI powder, which
25
+ includes raw powder purification, recycling of the mother solution, and recovery of NaI from the
26
+ residual melt that remained after crystal growth.
27
+ 1
28
+ Introduction
29
+ Considerable evidence points to the existence of dark matter that could represent 27% of the universe’s
30
+ total mass or energy [1-5]. One of the most stringent candidates for dark matter is the Weakly
31
+ Interacting Massive Particles (WIMPs), which many experimental groups have extensively searched
32
+ in the last few decades [6-13]. Despite attempting to find dark matter particles in numerous experiments,
33
+ only the DAMA collaboration has claimed the observation of a dark matter signal through an annual
34
+ modulation signal observed in the low-energy signal region [8,14-16]. However, there have been long-
35
+ standing questions about this claim because no other experimental searches have observed similar
36
+ signals [17]. Besides, no convincing explanation of the signal’s origin has been proposed, regardless
37
+ of the exact nature of the signal’s dark matter.
38
+ The COSINE-100 experiment has been operating at Yangyang underground laboratory in Korea
39
+ with a total of 106 kg of low-background NaI(Tl) detectors during the last six years [6,7,18-22].
40
+ Although many exciting results were published, reaching an unambiguous assumption on the annual
41
+ modulation signal of the DAMA experiment is far from the conclusion [23,24]. It is mainly due to the
42
+
43
+
44
+ 2
45
+ observed background rate in the COSINE-100 detectors, which is 2.5 times higher than the background
46
+ of the DAMA detectors [19,25]. To take the challenge in world competitive searches for low-mass
47
+ dark matter and reach a definite conclusion for the DAMA/LIBRA, we are preparing the COSINE-200
48
+ experiment as the next phase of the COSINE-100 [17,26]. The main goal of the COSINE-200 is to
49
+ develop 200 kg of ultra-low background NaI(Tl) crystals with a background level lower than those of
50
+ the DAMA/LIBRA. To reach the physics goal of COSINE-200, we have been developing technology
51
+ for the low-background NaI(Tl) detector that includes the mass production of ultra-low background
52
+ NaI powder, crystal growing technique, and detector assembly [17,26,27]. The first step is preparing
53
+ the ultra-low background NaI powder, in which the potassium concentration must be below 20 ppb and
54
+ the lead concentration less than a few ppb. Radioactivity-wise, commercially available Astro-grade
55
+ NaI powders from Sigma-Aldrich are suitable for ultra-low background NaI(Tl) crystal synthesis
56
+ [17,28]. Still, their extremely high-cost demands independent development of mass purification
57
+ technology. We have investigated a recrystallization technique to purify the NaI powder at a reasonable
58
+ price [29]. The lab-scale procedure provided a satisfactory performance of the potassium and lead
59
+ reduction. Based on successful lab-scale experiments, the mass purification facility was established at
60
+ the Institute for Basic Science (IBS) in Daejeon, Korea [27]. For the last two years, we optimized
61
+ operational parameters for the mass production of ultra-low background NaI powder. The yield
62
+ efficiencies for the chemical process were balanced versus the products’ purity. The processing
63
+ conditions were adapted to recycle the mother solution and recover NaI from the melt residual after
64
+ the crystal growth. Using developed technology, we have produced about 480 kg of the low-
65
+ background powder with a production capability of 35 kg per two weeks. Using the purified NaI
66
+ powder, radioactive background was reduced at least twice in a small size of NaI(Tl) crystal relative
67
+ to the COSINE-100 crystals [30]. In this report, we summarize our experience, describe the mass
68
+ purification facility, optimized raw powder purification, and the recovery of NaI from the mother
69
+ solution and residual melt.
70
+ 2
71
+ Materials and Methods
72
+ We use NaI powder from Merck (99.99(5)% purity, Optipure) as an initial material. The potassium
73
+ contamination in the specially ordered powder is below one ppm. High resistance, 18.2 MΩ·cm de-
74
+ ionized (DI) water is a solvent to dissolve the NaI powder. We use absolute ethanol (~200 proof, HPLC
75
+ grade, ACS) from the Scharlau to wash the recrystallized NaI crystals. Hydrophilic PTFE membrane
76
+ filters with 1.0 𝜇m pore size from the Advantec are used to separate the recrystallized NaI crystals
77
+ from the mother liquor.
78
+ The mass production facility of the ultra-low background NaI powder is shown in Fig. 1 A. It consists
79
+ of two main reactors (Fig. 1 B and C), a Nutsche filter unit (Fig. 1 D), two receivers (Fig. 1 E), and a
80
+ conical dryer (Fig. 1 F). Operation of the whole system, including temperature control through the oil
81
+ circulation system, is performed by the main controller in Fig. 1 G. The feed tank (Fig. 1 B) is used for
82
+ the powder dissolution and pre-processing to prevent oxidation of iodide ions. Two main reactors in
83
+ Fig. 1 B and C are connected, utilizing the polypropylene (PP) pipes that transfer the NaI solution from
84
+ the feed tank to the mixing tank (Fig. 1 C), as shown in Fig. 1 A. A cartridge filter is installed in the
85
+ middle of the PP pipelines to remove the insoluble impurities from the solution. The mixing tank
86
+ performs the recrystallization using the temperature dependence of the NaI solubility in the water [31].
87
+ We evaporate water from the NaI solution until it becomes oversaturated at 110℃ (Fig. 2 A), then cool
88
+ the mixing tank down to 30℃ while stirring the solution (Fig. 2 B). In this process, pure NaI crystals
89
+ grow without agglomeration, while soluble impurities remain in the mother solution. The crystals are
90
+ separated from the mother solution by the PTFE membrane filter (Fig. 2 C). The crystals are washed
91
+ with chilled ethanol to rinse off the remaining mother liquor and impurities from the crystal surface.
92
+
93
+
94
+ 3
95
+ The washed crystals are dried in the conical dryer (Fig. 2 D). The produced powders are packed in
96
+ HDPE bottles and stored in the desiccators to avoid moisture absorption. The details of the facility and
97
+ recrystallization procedure are described elsewhere in [27].
98
+ Radiopurity in the raw and purified powders and the mother solution from the purification process
99
+ is measured by an inductively coupled plasma mass spectrometry (ICP-MS) and high-purity
100
+ Germanium (HPGe) detector [32]. The water content in the produced powders is measured by the Karl-
101
+ Fisher titrator.
102
+ 3
103
+ Results
104
+ 3.1
105
+ Raw powder purification
106
+ The main goal of our purification is to reduce internal potassium (K) contamination to less than 20 ppb.
107
+ Tables 1 and 2 show the representative measurements from the raw powder purification process by
108
+ ICS-MS and HPGe, respectively. As shown in Table 1, most of the potassium contamination coming
109
+ from the raw powder was filtrated and concentrated in the mother solution. Potassium and lead
110
+ concentrations in the purified powders were reduced by 20 and 80 times, resulting in final amounts of
111
+ 11 ppb and 0.5 ppb, respectively. Significant reduction of Sr and Ba below the ppb level may indicate
112
+ a reduction of radium, which belongs to the same family group of the periodic table. With a single
113
+ crystallization procedure with about 40% yield efficiency, the purity of produced powder became
114
+ similar to the Astro-grade powder. The impurities concentration in the mother solution were increased
115
+ approximately twice as in the raw powder. Twenty days of HPGe counting using 1.2 kg of purified
116
+ powder sampled in the Marinelli beaker reported only upper limits for 226Ra, 228Ac, 228Th, and 40K, as
117
+ seen in Table 2.
118
+ To improve production capacity keeping the high quality of the product, we continually performed
119
+ the raw powder purification with slightly different initial charges and recovery yields, as summarized
120
+ in Table 3. Although the powder charge was increased from 40 kg to 64 kg, the purified product had
121
+ similar purities from batch to batch. However, a high recovery yield of 58% provided considerable
122
+ contamination of K, about 38 ppb. In case of the recovery yields were less than 50%, the purified
123
+ powder contained consistently low contamination, especially K, about 10 ppb. To keep the consistent
124
+ and high quality of the product, we ascertained a 50% yield efficiency at maximum for our purification
125
+ process. Routine purification works have made our experience proficient for the last two years.
126
+ Compared to the initial investigation shown in Ref. [27], we obtained consistently stable products with
127
+ the required background level using the same purification facility. With the above-optimized
128
+ purification parameters, the process took two weeks. Recrystallizing the raw powder took about three
129
+ working days with 70 kg of the initial charge, and another seven working days were required to dry the
130
+ wet crystals. With 40~50% recovery efficiency, 30~35 kg of purified powder could be produced in a
131
+ cycle.
132
+ 3.2
133
+ Mother solution recovery
134
+ After the purification process, the mother solution is the remaining product that is concentrated
135
+ impurities from the initial material. In the optimized purification process, 50% of the initial charge was
136
+ collected as the purified dry product. Another 35% of NaI remained in the mother solution, and 15%
137
+ was washed out with ethanol, as shown in Fig. 3. In three cycles of the raw powder purification, the
138
+ amount of NaI collected as the mother solution was enough for further recycling. We recovered this
139
+ mother solution in the same manner but reduced the recovery efficiency from 50% to 35% due to the
140
+ relatively high impurity level in the mother solution. As summarized in Table 4, the recovered crystals
141
+
142
+
143
+ 4
144
+ from the mother solution contained higher impurities than those obtained from the raw powder
145
+ purification. The K contaminations varied from 18 to 50 ppb, proportional to the initial impurities in
146
+ the mother solution. When the K content in the initial mother solution was higher than 1000 ppb,
147
+ reaching the required 20 ppb of K was challenging with a single treatment. In this case, an additional
148
+ recrystallization cycle of the powder was necessary to reach our goal of purity. However, following
149
+ recrystallization of the crystals recovered from first mother solution (MS-1) was inefficient in
150
+ production rate, so the rational K level in the initial solution must be lower than one ppm.
151
+ As shown in Fig. 3, after the separation of crystals from the MS-1, the second mother solution (MS-
152
+ 2) contained about 50% of NaI and accumulated most of the impurities. The MS-2 mostly had K
153
+ content over one ppm. Double recrystallization would be unavoidable to recover this NaI remained.
154
+ We did not consider recycling the MS-2 due to low recovery efficiency compared to the workforce
155
+ required.
156
+ 3.3
157
+ Residual melt recovery
158
+ We designed a large-size Kyropoulos grower to synthesize 120 kg NaI(Tl) crystal ingot [17]. In this
159
+ grower, about 200 kg of NaI powder was loaded and melted in the quartz crucible. Crystal-growing
160
+ trials using Merck raw powders were performed a couple of times with partial success. After pulling
161
+ out the crystal ingot, many residues remained in the quartz crucible. Typical impurities in this melt
162
+ were approximately twice higher as in the loaded powder due to the segregation effect. Nevertheless,
163
+ the recovery of the residual melts was successfully made by achieving satisfied purity levels, as
164
+ summarized in Table 5. The K concentration in the produced powders varied from 8 to 11 ppb. The
165
+ purity of recovered NaI from the melt is expected to be much pure if we use the purified powder for
166
+ mass crystal growth.
167
+ The process of recovering NaI from the collected residual melt differed from the original purification
168
+ method because the melt contained a significant amount of insoluble quartz particles and dust. Before
169
+ the usual operation, the NaI melt dissolved in water was filtered with the PTFE membrane filter.
170
+ Considering the evaporation of iodine during the crystal-growing process, a three times higher dose of
171
+ hydrogen iodide (HI) was introduced to reach pH 3.5.
172
+ 3.4
173
+ Water content measurement
174
+ Sodium iodide is highly hygroscopic, and its chemical interaction with moisture produces NaOH when
175
+ heated and causes corrosion of the quartz crucible used in the growing crystal [33]. Keeping the water
176
+ content below 1000 ppm in the produced powder was crucial. All recrystallized powders were dried
177
+ in two-step processes. In the first step, the wet powder was dried at 65℃ to avoid agglomerating the
178
+ NaI powders with water inside the dryer. Then the temperature was increased to 130℃ to dry powder
179
+ completely. The vapor released from the drying process was extracted with a vacuum pump. Initially,
180
+ we used a chemical resistance air pump with relatively low pressure to protect the pump from corrosive
181
+ vapor. As seen in Fig. 4, reaching moisture content below 1000 ppm in the dried powders with the
182
+ previous set-up was impossible. We improved our drying system by introducing a high-pressure rotary
183
+ pump with traps for corrosive vapor during the high-temperature drying process. We achieved the
184
+ water content to less than 1000 ppm with modified set-up.
185
+ 4
186
+ Discussion
187
+ A facility for mass production of the ultra-pure NaI powder for the COSINE-200 is well-operating with
188
+ extensive parameter optimization. The purification of raw NaI powder, the recycling of the mother
189
+
190
+
191
+ 5
192
+ solution, and the recovery of NaI from the residual melt were performed in parallel. We have produced
193
+ about 480 kg of low-background powder with a successful reduction of the internal contamination that
194
+ is pure enough for the COSINE-200 detectors. The optimized parameters with a stable operation
195
+ process have provided a maximum 35 kg powder production capacity in two weeks, but there is still
196
+ room for improvement. If we increase the volume of the dryer 1.5 times, then two purification cycles
197
+ can be performed in two weeks, increasing production capacity up to 70 kg. With improved capacity,
198
+ successive double crystallization can help to reach a potassium level much lower than 5 ppb using the
199
+ above-described facility. We can smoothly provide the ultra-low background NaI powder for the mass
200
+ production of the NaI(Tl) crystals for the COSINE-200 experiment.
201
+ 5
202
+ Acknowledgments
203
+ This work is supported by the Institute for Basic Science (IBS) under project code IBS-R016-A1.
204
+
205
+
206
+
207
+
208
+
209
+
210
+
211
+ 6
212
+
213
+ REFERENCES
214
+ [1] D. Clowe et al., Astrophys. J 648, L109 (2006).
215
+ [2] L. Baudis, J. Phys. G: Nucl. Part. Phys. 43, 044001 (2016).
216
+ [3] G. Bertone and D. Hooper, Rev. Mod. Phys. 90, 045002 (2018).
217
+ [4] G. Arcadi et al., Eur. Phys. J. C 78, 203 (2018).
218
+ [5] N. Aghanim et al. (Planck Collaboration), Astron. Astrophys. 641, A6 (2020).
219
+ [6] G. Adhikari et al. (COSINE-100 Collaboration), Nature(London) 564, 83 (2018).
220
+ [7] G. Adhikari et al. (COSINE-100 Collaboration), Phys. Rev. D 105, 042006 (2022).
221
+ [8] R. Bernabei et al., Universe 4, 116 (2018).
222
+ [9] A. Zani et al., Int. J. Mod. Phys. A 37, 2240016 (2022).
223
+ [10] J. Amaré et al., Phys. Rev. D 103, 102005 (2021).
224
+ [11] E. Aprile et al. (XENON Collaboration), Phys. Rev. Lett. 121, 111302 (2018).
225
+ [12] C. Amole et al. (PICO Collaboration), Phys. Rev. D 100, 022001 (2019).
226
+ [13] K. Fushimi et al., Prog. Theor. Exp. Phys. 2021, 043F01 (2021).
227
+ [14] R. Bernabei et al., Eur. Phys. J. C 73, 2648 (2013).
228
+ [15] R. Bernabei et al., Prog. Part. Nuc. Phys. 114, 103810 (2020).
229
+ [16] C. Savage et al., J. Cosmol. Astropart. Phys. 2009, 010 (2009).
230
+ [17] B. J. Park et al., Eur. Phys. J. C 80, 814 (2020).
231
+
232
+
233
+ 7
234
+ [18] G. Adhikari et al. (COSINE-100 Collaboration), Sci. Adv. 7, eabk2699 (2021).
235
+ [19] G. Adhikari et al. (COSINE-100 Collaboration), Eur. Phys. J. C 81, 837 (2021).
236
+ [20] H. Prihtiadi et al. (COSINE-100 Collaboration), J. Cosmol. Astropart. Phys. 2021, 013 (2021).
237
+ [21] H. Kim et al. (COSINE-100 Collaboration), J. Instrum. 17, T01001 (2022).
238
+ [22] Y. J. Ko et al., J. Cosmol. Astropart. Phys. 2019, 008 (2019).
239
+ [23] G. Adhikari et al. (COSINE-100 Collaboration), Phys. Rev. Lett. 123, 031302 (2019)
240
+ [24] G. Adhikari et al. (COSINE-100 Collaboration), Phys. Rev. D 106, 052005 (2022).
241
+ [25] P. Adhikari et al. (COSINE-100 Collaboration), Eur. Phys. J. C 78, 490 (2018).
242
+ [26] J. Choi et al., Nucl. Instrum. Methods Phys. Res. A 981, 164556 (2020).
243
+ [27] K. Shin et al., J. Instrum. 15, C07031 (2020).
244
+ [28] E. Shields, J. Xu, and F. Calaprice, Phys. Proce. 61, 169-178 (2015).
245
+ [29] K. Shin et al., J. Rad. Nuc. Chem. 317, 1329-1332 (2018).
246
+
247
+ [30] H. Lee et al., Paper in preperation (2023).
248
+
249
+ [31] A. Seidell et al., Solubilities of inorganic and metal organic compounds, Van Nostrand, (1940).
250
+ [32] M. H. Lee, J. Phys.: Conf. Series 1468, 012249 (2020).
251
+ [33] B. Suerfu, Ph.D. thesis, Princeton University 10977855 (2018).
252
+
253
+
254
+
255
+
256
+
257
+ 8
258
+
259
+
260
+
261
+
262
+
263
+
264
+
265
+
266
+ A
267
+ B
268
+ C
269
+ D
270
+ E
271
+ F
272
+ G
273
+ Figure 1. (A) Mass purification facility, (B) Feed tank for dissolving the NaI, (C) Mixing tank for
274
+ boiling solution and recrystallization process, (D) Filter unit for separation of NaI crystal and mother
275
+ liquor, (E) Receiver tanks for collecting vapor from mixing tank and dryer, (F) Conical dryer for the
276
+ NaI powder drying, (G) Main controller to control all the equipment.
277
+ A
278
+ B
279
+ C
280
+ D
281
+ Figure 2. (A) Boiling of solution with stirring, (B) Recrystallized NaI crystal with mother liquor, (C)
282
+ Filtrated and washed NaI crystal on the filter unit, (D) Dried NaI powder in the conical dryer.
283
+
284
+
285
+ 9
286
+
287
+
288
+
289
+
290
+
291
+
292
+ Raw powder
293
+ Purified powder
294
+ 1st Mother solution
295
+ Ethanol washed solution
296
+ 50 %
297
+ 35 %
298
+ 15 %
299
+ Purified powder
300
+ 2nd Mother solution
301
+ Ethanol washed solution
302
+ 35 %
303
+ Figure 3. Material balances in the NaI recovery cycle.
304
+ Figure 4. The water content measurement results by Karl-Fisher titrator for different batches of
305
+ produced powders
306
+
307
+ 1400
308
+ 1200
309
+ Watercontent(ppm)
310
+ 1200
311
+ 1150
312
+ 1000
313
+ Under1000ppmisrequired
314
+ 800
315
+ 800
316
+ 610
317
+ 009
318
+ 550
319
+ 400
320
+ 400
321
+ 310
322
+ 200
323
+ 200
324
+ 200
325
+ 200
326
+ 140
327
+ 06
328
+ 90
329
+ 80
330
+ 110
331
+ 130
332
+ 150
333
+ OL
334
+ 70
335
+ 50
336
+ 80
337
+ 0
338
+
339
+ 21-6
340
+ 1-21-8
341
+ f-21-9
342
+ 1-20-8
343
+ -21-3
344
+ 1-21-5
345
+ PurNat
346
+ 1-22-1
347
+ -22-2
348
+ Pu
349
+ rNa
350
+ arNal
351
+ PurNal
352
+ Purtal
353
+ Pur
354
+ rNal-21-
355
+ PurNal-21
356
+ PurNal
357
+ Pu
358
+ arNal
359
+ Pu
360
+ Airpump
361
+ Airpump+Rotarypump
362
+ 10
363
+
364
+ Table 2. Representative HPGe result of purified powder from raw powder purification. The upper
365
+ limits are given at 90% C.L.
366
+ 226Ra (238U)
367
+ 40K
368
+ 228Ac
369
+ 228Th
370
+ < 0.56 mBq/kg
371
+ < 5.64 mBq/kg
372
+ < 1.10 mBq/kg
373
+ < 0.71 mBq/kg
374
+
375
+
376
+
377
+ Table 1. Representative ICP-MS results of raw and purified powders vs. Astro-grade powder’s purity.
378
+ Values are given at 90% C.L, and upper limits are given at 95% C.L.
379
+ Description
380
+ K
381
+ Fe
382
+ Sr
383
+ Ba
384
+ Pb
385
+ Th
386
+ U
387
+ ppb
388
+ ppb
389
+ ppb
390
+ ppb
391
+ ppb
392
+ ppt
393
+ ppt
394
+ Astro grade
395
+ 5±3
396
+ 110±20 0.3±0.1 0.6±0.1 0.8±0.1
397
+ < 6
398
+ < 6
399
+ Merck-raw powder
400
+ 250±90
401
+ 33±6
402
+ 19±1
403
+ 3.0±0.4
404
+ 40±2
405
+ < 6
406
+ < 6
407
+ Purified powder (20-5)
408
+ 11±1
409
+ < 10
410
+ 0.3±0.1 0.9±0.1 0.5±0.1
411
+ < 6
412
+ < 6
413
+ Mother solution (20-5)
414
+ 550±120
415
+ < 200
416
+ 38±2
417
+ 9±1
418
+ 60±4
419
+ < 6
420
+ < 6
421
+
422
+
423
+ 11
424
+ Table 3. The ICP-MS results of purified powders in different batches of raw powder purification.
425
+ Values are given at 90% C.L, and upper limits are given at 95% C.L.
426
+ Sample
427
+ No.
428
+ Initial
429
+ charge
430
+ Recovery
431
+ yield
432
+ K
433
+ Fe
434
+ Sr
435
+ Ba
436
+ Pb
437
+ Th
438
+ U
439
+ ppb
440
+ ppb
441
+ ppb
442
+ ppb
443
+ ppb
444
+ ppt
445
+ ppt
446
+ 20-5
447
+ 40 kg
448
+ 44%
449
+ 11±1
450
+ < 10
451
+ 0.3±0.1 0.9±0.1 0.5±0.1
452
+ < 6
453
+ < 5
454
+ 20-7
455
+ 50 kg
456
+ 41%
457
+ 10±1
458
+ < 10
459
+ 0.1±0.1 0.3±0.1
460
+ < 0.3
461
+ < 3
462
+ < 5
463
+ 20-8
464
+ 50 kg
465
+ 39%
466
+ 6.4±0.1
467
+ < 10
468
+ 0.1±0.1 0.7±0.1
469
+ < 0.3
470
+ < 3
471
+ < 5
472
+ 21-5
473
+ 53 kg
474
+ 42%
475
+ 5.4±0.3
476
+ < 10
477
+ 0.2±0.1 0.4±0.1 0.5±0.1
478
+ < 5
479
+ < 3
480
+ 21-8
481
+ 60 kg
482
+ 58%
483
+ 38±2
484
+ < 10
485
+ 0.4±0.1 0.3±0.1 0.5±0.1
486
+ < 7
487
+ < 7
488
+ 22-5
489
+ 64 kg
490
+ 35%
491
+ 11±1
492
+ < 7
493
+ 0.4±0.1 1.6±0.2 0.9±0.5
494
+ < 100
495
+ < 20
496
+
497
+
498
+
499
+
500
+
501
+
502
+
503
+ 12
504
+ Sample No.
505
+ Material
506
+ K
507
+ Fe
508
+ Sr
509
+ Ba
510
+ Pb
511
+ Th
512
+ U
513
+ ppb
514
+ ppb
515
+ ppb
516
+ ppb
517
+ ppb
518
+ ppt
519
+ ppt
520
+ 21-4(M)
521
+ Initial sol.
522
+ 330±40
523
+ N/A
524
+ 20±1
525
+ 6.3±0.2
526
+ 41±4
527
+ < 5
528
+ < 3
529
+ Wet cryst.
530
+ < 40
531
+ N/A
532
+ 0.4±0.1 0.1±0.1 1.2±0.1
533
+ < 5
534
+ < 3
535
+ 21-7(M)
536
+ Initial sol.
537
+ 470±10
538
+ N/A
539
+ 34±1
540
+ 7.3±0.2
541
+ 56±1
542
+ < 7
543
+ < 7
544
+ Wet cryst.
545
+ < 50
546
+ N/A
547
+ 1.2±0.1 0.2±0.1 2.0±0.1
548
+ < 7
549
+ < 7
550
+ 21-11(M)
551
+ Initial sol.
552
+ 610±30
553
+ 16±1
554
+ 40±2
555
+ 10±1
556
+ 88±12
557
+ < 7
558
+ < 7
559
+ Wet cryst.
560
+ 18±1
561
+ < 7
562
+ 1.0±0.1 0.2±0.1 4.5±0.3
563
+ < 7
564
+ < 7
565
+ 22-2(M)
566
+ Initial sol.
567
+ 1010±150
568
+ 8±1
569
+ 16±1
570
+ 15±1
571
+ 86±4
572
+ < 4
573
+ < 4
574
+ Dry powder
575
+ 21±2
576
+ < 7
577
+ 0.2±0.1 0.7±0.1 1.0±0.1
578
+ < 4
579
+ < 4
580
+ 20-3(M)
581
+ Initial sol.
582
+ 1170±120
583
+ 39±2
584
+ 33±2
585
+ 12±1
586
+ 60±2
587
+ < 6
588
+ < 5
589
+ Dry powder
590
+ 44±5
591
+ 14±1
592
+ 1.0±0.1 0.4±0.1 2.0±0.1
593
+ < 6
594
+ < 5
595
+
596
+
597
+
598
+ Table 4. The ICP-MS result of the mother solution recovery experiment in different batches of mass
599
+ production. It is marked as (M) for the naming. In this experiment, the Initial solution means the initial
600
+ mother solution, and the Wet crystal means recrystallized and washed crystal. If the purity is not
601
+ accepted, then additional recrystallization is required, so the purity was confirmed first by ICP-MS
602
+ before drying and then dried thoroughly. The wet crystal consists of ~73% NaI and extra water and
603
+ ethanol, so the impurity concentration is calculated as 73% NaI. Values are given at 90% C.L, and
604
+ upper limits are given at 95% C.L.
605
+
606
+
607
+ 13
608
+ Sample No.
609
+ Material
610
+ K
611
+ Fe
612
+ Sr
613
+ Ba
614
+ Pb
615
+ Th
616
+ U
617
+ ppb
618
+ ppb
619
+ ppb
620
+ ppb
621
+ ppb
622
+ ppt
623
+ ppt
624
+ 21-12(RM)
625
+ Initial sol.
626
+ 730±10
627
+ 20±2
628
+ 10±1
629
+ 8.0±0.6 143±12
630
+ < 7
631
+ < 7
632
+ Wet cryst.
633
+ 8±1
634
+ < 10
635
+ 0.4±0.1 0.3±0.1
636
+ 5±1
637
+ < 7
638
+ < 7
639
+ 21-13(RM)
640
+ Initial sol.
641
+ 540±20
642
+ N/A
643
+ 10±1
644
+ 5.1±0.2
645
+ 95±10
646
+ < 7
647
+ < 7
648
+ Wet cryst.
649
+ < 50
650
+ N/A
651
+ 0.1±0.1
652
+ < 0.1
653
+ < 0.3
654
+ < 7
655
+ < 7
656
+ 22-1(RM)
657
+ Initial sol.
658
+ 390±10
659
+ N/A
660
+ 8±1
661
+ 6.4±0.2
662
+ 40±4
663
+ < 4
664
+ < 4
665
+ Dry powder
666
+ 8±1
667
+ < 7
668
+ 0.1±0.1 0.3±0.1 0.7±0.1
669
+ < 4
670
+ < 4
671
+ 22-4(RM)
672
+ Initial sol.
673
+ 570±10
674
+ N/A
675
+ 15±2
676
+ 6.7±0.5
677
+ 5±1
678
+ < 4
679
+ < 4
680
+ Dry powder
681
+ 11±4
682
+ < 7
683
+ 0.1±0.1 0.3±0.1
684
+ < 0.3
685
+ < 4
686
+ < 4
687
+
688
+
689
+ Table 5. The ICP-MS result of residual melt recovery experiment in different batches of mass
690
+ production. It is marked as (RM) for the naming, and the Initial solution is the residual melt solution
691
+ after dissolving melt and filtration of the quartz particles. The Wet crystal samples were taken after
692
+ recrystallization and washing with ethanol. Values are given at 90% C.L, and upper limits are given at
693
+ 95% C.L.
694
+
YtE5T4oBgHgl3EQfCw7_/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,504 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf,len=503
2
+ page_content='Mass production of ultra-pure NaI powder for COSINE-200 KeonAh Shin1*, JunSeok Choe1, Olga Gileva1, Alain Iltis2 ,Yena Kim1 , Yeongduk Kim1,3, Cheolho Lee1, Eunkyung Lee1 , and HyunSu Lee1,3*, Moo Hyun Lee1,3 1Center for Underground Physics, Institute for Basic Science (IBS), Daejeon 34126, Korea 2Damavan Imaging, Troyes, 10430, France 3IBS school, University of Science and Technology (UST), Daejeon 34113, Korea Correspondence: KeonAh Shin and HyunSu Lee kashin@ibs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
3
+ page_content='re.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
4
+ page_content='kr, hyunsulee@ibs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
5
+ page_content='re.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
6
+ page_content='kr Keywords: NaI powder, low-background, mass purification, recrystallization, COSINE-200.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
7
+ page_content=' Abstract COSINE-200 is the next phase experiment of the ongoing COSINE-100 that aims to unambiguously verify the annual modulation signals observed by the DAMA experiment and to reach the world competitive sensitivity on the low-mass dark matter search.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
8
+ page_content=' To achieve the physics goal of the COSINE-200, the successful production of the low-background NaI(Tl) detectors is crucial and it must begin from the mass production of the ultra-low background NaI powder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
9
+ page_content=' A clean facility for mass- producing the pure-NaI powder has been constructed at the Center for Underground Physics (CUP) in Korea.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
10
+ page_content=' Two years of operation determined efficient parameters of the mass purification and provided a total of 480 kg of the ultra-pure NaI powder in hand.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
11
+ page_content=' The potassium concentration in the produced powders varied from 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
12
+ page_content='4 to 11 ppb, and the maximum production capacity of 35 kg per two weeks was achieved.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
13
+ page_content=' Here, we report our operational practice with the mass purification of the NaI powder, which includes raw powder purification, recycling of the mother solution, and recovery of NaI from the residual melt that remained after crystal growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
14
+ page_content=' 1 Introduction Considerable evidence points to the existence of dark matter that could represent 27% of the universe’s total mass or energy [1-5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
15
+ page_content=' One of the most stringent candidates for dark matter is the Weakly Interacting Massive Particles (WIMPs), which many experimental groups have extensively searched in the last few decades [6-13].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
16
+ page_content=' Despite attempting to find dark matter particles in numerous experiments, only the DAMA collaboration has claimed the observation of a dark matter signal through an annual modulation signal observed in the low-energy signal region [8,14-16].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
17
+ page_content=' However, there have been long- standing questions about this claim because no other experimental searches have observed similar signals [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
18
+ page_content=' Besides, no convincing explanation of the signal’s origin has been proposed, regardless of the exact nature of the signal’s dark matter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
19
+ page_content=' The COSINE-100 experiment has been operating at Yangyang underground laboratory in Korea with a total of 106 kg of low-background NaI(Tl) detectors during the last six years [6,7,18-22].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
20
+ page_content=' Although many exciting results were published, reaching an unambiguous assumption on the annual modulation signal of the DAMA experiment is far from the conclusion [23,24].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
21
+ page_content=' It is mainly due to the 2 observed background rate in the COSINE-100 detectors, which is 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
22
+ page_content='5 times higher than the background of the DAMA detectors [19,25].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
23
+ page_content=' To take the challenge in world competitive searches for low-mass dark matter and reach a definite conclusion for the DAMA/LIBRA, we are preparing the COSINE-200 experiment as the next phase of the COSINE-100 [17,26].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
24
+ page_content=' The main goal of the COSINE-200 is to develop 200 kg of ultra-low background NaI(Tl) crystals with a background level lower than those of the DAMA/LIBRA.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
25
+ page_content=' To reach the physics goal of COSINE-200, we have been developing technology for the low-background NaI(Tl) detector that includes the mass production of ultra-low background NaI powder, crystal growing technique, and detector assembly [17,26,27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
26
+ page_content=' The first step is preparing the ultra-low background NaI powder, in which the potassium concentration must be below 20 ppb and the lead concentration less than a few ppb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
27
+ page_content=' Radioactivity-wise, commercially available Astro-grade NaI powders from Sigma-Aldrich are suitable for ultra-low background NaI(Tl) crystal synthesis [17,28].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
28
+ page_content=' Still, their extremely high-cost demands independent development of mass purification technology.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
29
+ page_content=' We have investigated a recrystallization technique to purify the NaI powder at a reasonable price [29].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
30
+ page_content=' The lab-scale procedure provided a satisfactory performance of the potassium and lead reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
31
+ page_content=' Based on successful lab-scale experiments, the mass purification facility was established at the Institute for Basic Science (IBS) in Daejeon, Korea [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
32
+ page_content=' For the last two years, we optimized operational parameters for the mass production of ultra-low background NaI powder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
33
+ page_content=' The yield efficiencies for the chemical process were balanced versus the products’ purity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
34
+ page_content=' The processing conditions were adapted to recycle the mother solution and recover NaI from the melt residual after the crystal growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
35
+ page_content=' Using developed technology, we have produced about 480 kg of the low- background powder with a production capability of 35 kg per two weeks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
36
+ page_content=' Using the purified NaI powder, radioactive background was reduced at least twice in a small size of NaI(Tl) crystal relative to the COSINE-100 crystals [30].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
37
+ page_content=' In this report, we summarize our experience, describe the mass purification facility, optimized raw powder purification, and the recovery of NaI from the mother solution and residual melt.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
38
+ page_content=' 2 Materials and Methods We use NaI powder from Merck (99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
39
+ page_content='99(5)% purity, Optipure\uf0e2) as an initial material.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
40
+ page_content=' The potassium contamination in the specially ordered powder is below one ppm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
41
+ page_content=' High resistance, 18.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
42
+ page_content='2 MΩ·cm de- ionized (DI) water is a solvent to dissolve the NaI powder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
43
+ page_content=' We use absolute ethanol (~200 proof, HPLC grade, ACS) from the Scharlau to wash the recrystallized NaI crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
44
+ page_content=' Hydrophilic PTFE membrane filters with 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
45
+ page_content='0 𝜇m pore size from the Advantec are used to separate the recrystallized NaI crystals from the mother liquor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
46
+ page_content=' The mass production facility of the ultra-low background NaI powder is shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
47
+ page_content=' 1 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
48
+ page_content=' It consists of two main reactors (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
49
+ page_content=' 1 B and C), a Nutsche filter unit (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
50
+ page_content=' 1 D), two receivers (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
51
+ page_content=' 1 E), and a conical dryer (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
52
+ page_content=' 1 F).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
53
+ page_content=' Operation of the whole system, including temperature control through the oil circulation system, is performed by the main controller in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
54
+ page_content=' 1 G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
55
+ page_content=' The feed tank (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
56
+ page_content=' 1 B) is used for the powder dissolution and pre-processing to prevent oxidation of iodide ions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
57
+ page_content=' Two main reactors in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
58
+ page_content=' 1 B and C are connected, utilizing the polypropylene (PP) pipes that transfer the NaI solution from the feed tank to the mixing tank (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
59
+ page_content=' 1 C), as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
60
+ page_content=' 1 A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
61
+ page_content=' A cartridge filter is installed in the middle of the PP pipelines to remove the insoluble impurities from the solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
62
+ page_content=' The mixing tank performs the recrystallization using the temperature dependence of the NaI solubility in the water [31].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
63
+ page_content=' We evaporate water from the NaI solution until it becomes oversaturated at 110℃ (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
64
+ page_content=' 2 A), then cool the mixing tank down to 30℃ while stirring the solution (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
65
+ page_content=' 2 B).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
66
+ page_content=' In this process, pure NaI crystals grow without agglomeration, while soluble impurities remain in the mother solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
67
+ page_content=' The crystals are separated from the mother solution by the PTFE membrane filter (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
68
+ page_content=' 2 C).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
69
+ page_content=' The crystals are washed with chilled ethanol to rinse off the remaining mother liquor and impurities from the crystal surface.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
70
+ page_content=' 3 The washed crystals are dried in the conical dryer (Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
71
+ page_content=' 2 D).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
72
+ page_content=' The produced powders are packed in HDPE bottles and stored in the desiccators to avoid moisture absorption.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
73
+ page_content=' The details of the facility and recrystallization procedure are described elsewhere in [27].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
74
+ page_content=' Radiopurity in the raw and purified powders and the mother solution from the purification process is measured by an inductively coupled plasma mass spectrometry (ICP-MS) and high-purity Germanium (HPGe) detector [32].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
75
+ page_content=' The water content in the produced powders is measured by the Karl- Fisher titrator.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
76
+ page_content=' 3 Results 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
77
+ page_content='1 Raw powder purification The main goal of our purification is to reduce internal potassium (K) contamination to less than 20 ppb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
78
+ page_content=' Tables 1 and 2 show the representative measurements from the raw powder purification process by ICS-MS and HPGe, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
79
+ page_content=' As shown in Table 1, most of the potassium contamination coming from the raw powder was filtrated and concentrated in the mother solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
80
+ page_content=' Potassium and lead concentrations in the purified powders were reduced by 20 and 80 times, resulting in final amounts of 11 ppb and 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
81
+ page_content='5 ppb, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
82
+ page_content=' Significant reduction of Sr and Ba below the ppb level may indicate a reduction of radium, which belongs to the same family group of the periodic table.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
83
+ page_content=' With a single crystallization procedure with about 40% yield efficiency, the purity of produced powder became similar to the Astro-grade powder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
84
+ page_content=' The impurities concentration in the mother solution were increased approximately twice as in the raw powder.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
85
+ page_content=' Twenty days of HPGe counting using 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
86
+ page_content='2 kg of purified powder sampled in the Marinelli beaker reported only upper limits for 226Ra, 228Ac, 228Th, and 40K, as seen in Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
87
+ page_content=' To improve production capacity keeping the high quality of the product, we continually performed the raw powder purification with slightly different initial charges and recovery yields, as summarized in Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
88
+ page_content=' Although the powder charge was increased from 40 kg to 64 kg, the purified product had similar purities from batch to batch.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
89
+ page_content=' However, a high recovery yield of 58% provided considerable contamination of K, about 38 ppb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
90
+ page_content=' In case of the recovery yields were less than 50%, the purified powder contained consistently low contamination, especially K, about 10 ppb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
91
+ page_content=' To keep the consistent and high quality of the product, we ascertained a 50% yield efficiency at maximum for our purification process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
92
+ page_content=' Routine purification works have made our experience proficient for the last two years.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
93
+ page_content=' Compared to the initial investigation shown in Ref.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
94
+ page_content=' [27], we obtained consistently stable products with the required background level using the same purification facility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
95
+ page_content=' With the above-optimized purification parameters, the process took two weeks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
96
+ page_content=' Recrystallizing the raw powder took about three working days with 70 kg of the initial charge, and another seven working days were required to dry the wet crystals.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
97
+ page_content=' With 40~50% recovery efficiency, 30~35 kg of purified powder could be produced in a cycle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
98
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
99
+ page_content='2 Mother solution recovery After the purification process, the mother solution is the remaining product that is concentrated impurities from the initial material.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
100
+ page_content=' In the optimized purification process, 50% of the initial charge was collected as the purified dry product.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
101
+ page_content=' Another 35% of NaI remained in the mother solution, and 15% was washed out with ethanol, as shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
102
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
103
+ page_content=' In three cycles of the raw powder purification, the amount of NaI collected as the mother solution was enough for further recycling.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
104
+ page_content=' We recovered this mother solution in the same manner but reduced the recovery efficiency from 50% to 35% due to the relatively high impurity level in the mother solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
105
+ page_content=' As summarized in Table 4, the recovered crystals 4 from the mother solution contained higher impurities than those obtained from the raw powder purification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
106
+ page_content=' The K contaminations varied from 18 to 50 ppb, proportional to the initial impurities in the mother solution.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
107
+ page_content=' When the K content in the initial mother solution was higher than 1000 ppb, reaching the required 20 ppb of K was challenging with a single treatment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
108
+ page_content=' In this case, an additional recrystallization cycle of the powder was necessary to reach our goal of purity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
109
+ page_content=' However, following recrystallization of the crystals recovered from first mother solution (MS-1) was inefficient in production rate, so the rational K level in the initial solution must be lower than one ppm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
110
+ page_content=' As shown in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
111
+ page_content=' 3, after the separation of crystals from the MS-1, the second mother solution (MS- 2) contained about 50% of NaI and accumulated most of the impurities.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
112
+ page_content=' The MS-2 mostly had K content over one ppm.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
113
+ page_content=' Double recrystallization would be unavoidable to recover this NaI remained.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
114
+ page_content=' We did not consider recycling the MS-2 due to low recovery efficiency compared to the workforce required.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
115
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
116
+ page_content='3 Residual melt recovery We designed a large-size Kyropoulos grower to synthesize 120 kg NaI(Tl) crystal ingot [17].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
117
+ page_content=' In this grower, about 200 kg of NaI powder was loaded and melted in the quartz crucible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
118
+ page_content=' Crystal-growing trials using Merck raw powders were performed a couple of times with partial success.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
119
+ page_content=' After pulling out the crystal ingot, many residues remained in the quartz crucible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
120
+ page_content=' Typical impurities in this melt were approximately twice higher as in the loaded powder due to the segregation effect.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
121
+ page_content=' Nevertheless, the recovery of the residual melts was successfully made by achieving satisfied purity levels, as summarized in Table 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
122
+ page_content=' The K concentration in the produced powders varied from 8 to 11 ppb.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
123
+ page_content=' The purity of recovered NaI from the melt is expected to be much pure if we use the purified powder for mass crystal growth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
124
+ page_content=' The process of recovering NaI from the collected residual melt differed from the original purification method because the melt contained a significant amount of insoluble quartz particles and dust.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
125
+ page_content=' Before the usual operation, the NaI melt dissolved in water was filtered with the PTFE membrane filter.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
126
+ page_content=' Considering the evaporation of iodine during the crystal-growing process, a three times higher dose of hydrogen iodide (HI) was introduced to reach pH 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
127
+ page_content='5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
128
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
129
+ page_content='4 Water content measurement Sodium iodide is highly hygroscopic, and its chemical interaction with moisture produces NaOH when heated and causes corrosion of the quartz crucible used in the growing crystal [33].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
130
+ page_content=' Keeping the water content below 1000 ppm in the produced powder was crucial.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
131
+ page_content=' All recrystallized powders were dried in two-step processes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
132
+ page_content=' In the first step, the wet powder was dried at 65℃ to avoid agglomerating the NaI powders with water inside the dryer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
133
+ page_content=' Then the temperature was increased to 130℃ to dry powder completely.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
134
+ page_content=' The vapor released from the drying process was extracted with a vacuum pump.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
135
+ page_content=' Initially, we used a chemical resistance air pump with relatively low pressure to protect the pump from corrosive vapor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
136
+ page_content=' As seen in Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
137
+ page_content=' 4, reaching moisture content below 1000 ppm in the dried powders with the previous set-up was impossible.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
138
+ page_content=' We improved our drying system by introducing a high-pressure rotary pump with traps for corrosive vapor during the high-temperature drying process.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
139
+ page_content=' We achieved the water content to less than 1000 ppm with modified set-up.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
140
+ page_content=' 4 Discussion A facility for mass production of the ultra-pure NaI powder for the COSINE-200 is well-operating with extensive parameter optimization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
141
+ page_content=' The purification of raw NaI powder, the recycling of the mother 5 solution, and the recovery of NaI from the residual melt were performed in parallel.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
142
+ page_content=' We have produced about 480 kg of low-background powder with a successful reduction of the internal contamination that is pure enough for the COSINE-200 detectors.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
143
+ page_content=' The optimized parameters with a stable operation process have provided a maximum 35 kg powder production capacity in two weeks, but there is still room for improvement.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
144
+ page_content=' If we increase the volume of the dryer 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
145
+ page_content='5 times, then two purification cycles can be performed in two weeks, increasing production capacity up to 70 kg.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
146
+ page_content=' With improved capacity, successive double crystallization can help to reach a potassium level much lower than 5 ppb using the above-described facility.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
147
+ page_content=' We can smoothly provide the ultra-low background NaI powder for the mass production of the NaI(Tl) crystals for the COSINE-200 experiment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
148
+ page_content=' 5 Acknowledgments This work is supported by the Institute for Basic Science (IBS) under project code IBS-R016-A1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
149
+ page_content=' 6 REFERENCES [1] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
150
+ page_content=' Clowe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
151
+ page_content=', Astrophys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
152
+ page_content=' J 648, L109 (2006).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
153
+ page_content=' [2] L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
154
+ page_content=' Baudis, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
155
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
156
+ page_content=' G: Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
157
+ page_content=' Part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
158
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
159
+ page_content=' 43, 044001 (2016).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
160
+ page_content=' [3] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
161
+ page_content=' Bertone and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
162
+ page_content=' Hooper, Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
163
+ page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
164
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
165
+ page_content=' 90, 045002 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
166
+ page_content=' [4] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
167
+ page_content=' Arcadi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
168
+ page_content=', Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
169
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
170
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
171
+ page_content=' C 78, 203 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
172
+ page_content=' [5] N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
173
+ page_content=' Aghanim et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
174
+ page_content=' (Planck Collaboration), Astron.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
175
+ page_content=' Astrophys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
176
+ page_content=' 641, A6 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
177
+ page_content=' [6] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
178
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
179
+ page_content=' (COSINE-100 Collaboration), Nature(London) 564, 83 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
180
+ page_content=' [7] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
181
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
182
+ page_content=' (COSINE-100 Collaboration), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
183
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
184
+ page_content=' D 105, 042006 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
185
+ page_content=' [8] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
186
+ page_content=' Bernabei et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
187
+ page_content=', Universe 4, 116 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
188
+ page_content=' [9] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
189
+ page_content=' Zani et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
190
+ page_content=', Int.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
191
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
192
+ page_content=' Mod.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
193
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
194
+ page_content=' A 37, 2240016 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
195
+ page_content=' [10] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
196
+ page_content=' Amaré et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
197
+ page_content=', Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
198
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
199
+ page_content=' D 103, 102005 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
200
+ page_content=' [11] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
201
+ page_content=' Aprile et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
202
+ page_content=' (XENON Collaboration), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
203
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
204
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
205
+ page_content=' 121, 111302 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
206
+ page_content=' [12] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
207
+ page_content=' Amole et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
208
+ page_content=' (PICO Collaboration), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
209
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
210
+ page_content=' D 100, 022001 (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
211
+ page_content=' [13] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
212
+ page_content=' Fushimi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
213
+ page_content=', Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
214
+ page_content=' Theor.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
215
+ page_content=' Exp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
216
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
217
+ page_content=' 2021, 043F01 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
218
+ page_content=' [14] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
219
+ page_content=' Bernabei et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
220
+ page_content=', Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
221
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
222
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
223
+ page_content=' C 73, 2648 (2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
224
+ page_content=' [15] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
225
+ page_content=' Bernabei et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
226
+ page_content=', Prog.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
227
+ page_content=' Part.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
228
+ page_content=' Nuc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
229
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
230
+ page_content=' 114, 103810 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
231
+ page_content=' [16] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
232
+ page_content=' Savage et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
233
+ page_content=', J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
234
+ page_content=' Cosmol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
235
+ page_content=' Astropart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
236
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
237
+ page_content=' 2009, 010 (2009).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
238
+ page_content=' [17] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
239
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
240
+ page_content=' Park et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
241
+ page_content=', Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
242
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
243
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
244
+ page_content=' C 80, 814 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
245
+ page_content=' 7 [18] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
246
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
247
+ page_content=' (COSINE-100 Collaboration), Sci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
248
+ page_content=' Adv.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
249
+ page_content=' 7, eabk2699 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
250
+ page_content=' [19] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
251
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
252
+ page_content=' (COSINE-100 Collaboration), Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
253
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
254
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
255
+ page_content=' C 81, 837 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
256
+ page_content=' [20] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
257
+ page_content=' Prihtiadi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
258
+ page_content=' (COSINE-100 Collaboration), J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
259
+ page_content=' Cosmol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
260
+ page_content=' Astropart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
261
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
262
+ page_content=' 2021, 013 (2021).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
263
+ page_content=' [21] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
264
+ page_content=' Kim et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
265
+ page_content=' (COSINE-100 Collaboration), J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
266
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
267
+ page_content=' 17, T01001 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
268
+ page_content=' [22] Y.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
269
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
270
+ page_content=' Ko et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
271
+ page_content=', J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
272
+ page_content=' Cosmol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
273
+ page_content=' Astropart.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
274
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
275
+ page_content=' 2019, 008 (2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
276
+ page_content=' [23] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
277
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
278
+ page_content=' (COSINE-100 Collaboration), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
279
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
280
+ page_content=' Lett.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
281
+ page_content=' 123, 031302 (2019) [24] G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
282
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
283
+ page_content=' (COSINE-100 Collaboration), Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
284
+ page_content=' Rev.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
285
+ page_content=' D 106, 052005 (2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
286
+ page_content=' [25] P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
287
+ page_content=' Adhikari et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
288
+ page_content=' (COSINE-100 Collaboration), Eur.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
289
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
290
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
291
+ page_content=' C 78, 490 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
292
+ page_content=' [26] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
293
+ page_content=' Choi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
294
+ page_content=', Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
295
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
296
+ page_content=' Methods Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
297
+ page_content=' Res.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
298
+ page_content=' A 981, 164556 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
299
+ page_content=' [27] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
300
+ page_content=' Shin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
301
+ page_content=', J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
302
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
303
+ page_content=' 15, C07031 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
304
+ page_content=' [28] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
305
+ page_content=' Shields, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
306
+ page_content=' Xu, and F.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
307
+ page_content=' Calaprice, Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
308
+ page_content=' Proce.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
309
+ page_content=' 61, 169-178 (2015).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
310
+ page_content=' [29] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
311
+ page_content=' Shin et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
312
+ page_content=', J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
313
+ page_content=' Rad.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
314
+ page_content=' Nuc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
315
+ page_content=' Chem.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
316
+ page_content=' 317, 1329-1332 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
317
+ page_content=' [30] H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
318
+ page_content=' Lee et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
319
+ page_content=', Paper in preperation (2023).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
320
+ page_content=' [31] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
321
+ page_content=' Seidell et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
322
+ page_content=', Solubilities of inorganic and metal organic compounds, Van Nostrand, (1940).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
323
+ page_content=' [32] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
324
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
325
+ page_content=' Lee, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
326
+ page_content=' Phys.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
327
+ page_content=' : Conf.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
328
+ page_content=' Series 1468, 012249 (2020).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
329
+ page_content=' [33] B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
330
+ page_content=' Suerfu, Ph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
331
+ page_content='D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
332
+ page_content=' thesis, Princeton University 10977855 (2018).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
333
+ page_content=' 8 A B C D E F G Figure 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
334
+ page_content=' (A) Mass purification facility, (B) Feed tank for dissolving the NaI, (C) Mixing tank for boiling solution and recrystallization process, (D) Filter unit for separation of NaI crystal and mother liquor, (E) Receiver tanks for collecting vapor from mixing tank and dryer, (F) Conical dryer for the NaI powder drying, (G) Main controller to control all the equipment.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
335
+ page_content=' A B C D Figure 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
336
+ page_content=' (A) Boiling of solution with stirring, (B) Recrystallized NaI crystal with mother liquor, (C) Filtrated and washed NaI crystal on the filter unit, (D) Dried NaI powder in the conical dryer.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
337
+ page_content=' 9 Raw powder Purified powder 1st Mother solution Ethanol washed solution 50 % 35 % 15 % Purified powder 2nd Mother solution Ethanol washed solution 35 % Figure 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
338
+ page_content=' Material balances in the NaI recovery cycle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
339
+ page_content=' Figure 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
340
+ page_content=' The water content measurement results by Karl-Fisher titrator for different batches of produced powders 1400 1200 Watercontent(ppm) 1200 1150 1000 Under1000ppmisrequired 800 800 610 009 550 400 400 310 200 200 200 200 140 06 90 80 110 130 150 OL 70 50 80 0 一 21-6 1-21-8 f-21-9 1-20-8 21-3 1-21-5 PurNat 1-22-1 22-2 Pu rNa arNal PurNal Purtal Pur rNal-21- PurNal-21 PurNal Pu arNal Pu Airpump Airpump+Rotarypump 10 Table 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
341
+ page_content=' Representative HPGe result of purified powder from raw powder purification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
342
+ page_content=' The upper limits are given at 90% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
343
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
344
+ page_content=' 226Ra (238U) 40K 228Ac 228Th < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
345
+ page_content='56 mBq/kg < 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
346
+ page_content='64 mBq/kg < 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
347
+ page_content='10 mBq/kg < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
348
+ page_content='71 mBq/kg Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
349
+ page_content=' Representative ICP-MS results of raw and purified powders vs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
350
+ page_content=' Astro-grade powder’s purity.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
351
+ page_content=' Values are given at 90% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
352
+ page_content='L, and upper limits are given at 95% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
353
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
354
+ page_content=' Description K Fe Sr Ba Pb Th U ppb ppb ppb ppb ppb ppt ppt Astro grade 5±3 110±20 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
355
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
356
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
357
+ page_content='6±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
358
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
359
+ page_content='8±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
360
+ page_content='1 < 6 < 6 Merck-raw powder 250±90 33±6 19±1 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
361
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
362
+ page_content='4 40±2 < 6 < 6 Purified powder (20-5) 11±1 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
363
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
364
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
365
+ page_content='9±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
366
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
367
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
368
+ page_content='1 < 6 < 6 Mother solution (20-5) 550±120 < 200 38±2 9±1 60±4 < 6 < 6 11 Table 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
369
+ page_content=' The ICP-MS results of purified powders in different batches of raw powder purification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
370
+ page_content=' Values are given at 90% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
371
+ page_content='L, and upper limits are given at 95% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
372
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
373
+ page_content=' Sample No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
374
+ page_content=' Initial charge Recovery yield K Fe Sr Ba Pb Th U ppb ppb ppb ppb ppb ppt ppt 20-5 40 kg 44% 11±1 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
375
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
376
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
377
+ page_content='9±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
378
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
379
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
380
+ page_content='1 < 6 < 5 20-7 50 kg 41% 10±1 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
381
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
382
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
383
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
384
+ page_content='1 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
385
+ page_content='3 < 3 < 5 20-8 50 kg 39% 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
386
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
387
+ page_content='1 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
388
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
389
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
390
+ page_content='7±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
391
+ page_content='1 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
392
+ page_content='3 < 3 < 5 21-5 53 kg 42% 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
393
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
394
+ page_content='3 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
395
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
396
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
397
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
398
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
399
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
400
+ page_content='1 < 5 < 3 21-8 60 kg 58% 38±2 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
401
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
402
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
403
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
404
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
405
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
406
+ page_content='1 < 7 < 7 22-5 64 kg 35% 11±1 < 7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
407
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
408
+ page_content='1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
409
+ page_content='6±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
410
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
411
+ page_content='9±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
412
+ page_content='5 < 100 < 20 12 Sample No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
413
+ page_content=' Material K Fe Sr Ba Pb Th U ppb ppb ppb ppb ppb ppt ppt 21-4(M) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
414
+ page_content=' 330±40 N/A 20±1 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
415
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
416
+ page_content='2 41±4 < 5 < 3 Wet cryst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
417
+ page_content=' < 40 N/A 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
418
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
419
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
420
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
421
+ page_content='1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
422
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
423
+ page_content='1 < 5 < 3 21-7(M) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
424
+ page_content=' 470±10 N/A 34±1 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
425
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
426
+ page_content='2 56±1 < 7 < 7 Wet cryst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
427
+ page_content=' < 50 N/A 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
428
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
429
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
430
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
431
+ page_content='1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
432
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
433
+ page_content='1 < 7 < 7 21-11(M) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
434
+ page_content=' 610±30 16±1 40±2 10±1 88±12 < 7 < 7 Wet cryst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
435
+ page_content=' 18±1 < 7 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
436
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
437
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
438
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
439
+ page_content='1 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
440
+ page_content='5±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
441
+ page_content='3 < 7 < 7 22-2(M) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
442
+ page_content=' 1010±150 8±1 16±1 15±1 86±4 < 4 < 4 Dry powder 21±2 < 7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
443
+ page_content='2±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
444
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
445
+ page_content='7±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
446
+ page_content='1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
447
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
448
+ page_content='1 < 4 < 4 20-3(M) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
449
+ page_content=' 1170±120 39±2 33±2 12±1 60±2 < 6 < 5 Dry powder 44±5 14±1 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
450
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
451
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
452
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
453
+ page_content='1 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
454
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
455
+ page_content='1 < 6 < 5 Table 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
456
+ page_content=' The ICP-MS result of the mother solution recovery experiment in different batches of mass production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
457
+ page_content=' It is marked as (M) for the naming.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
458
+ page_content=' In this experiment, the Initial solution means the initial mother solution, and the Wet crystal means recrystallized and washed crystal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
459
+ page_content=' If the purity is not accepted, then additional recrystallization is required, so the purity was confirmed first by ICP-MS before drying and then dried thoroughly.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
460
+ page_content=' The wet crystal consists of ~73% NaI and extra water and ethanol, so the impurity concentration is calculated as 73% NaI.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
461
+ page_content=' Values are given at 90% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
462
+ page_content='L, and upper limits are given at 95% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
463
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
464
+ page_content=' 13 Sample No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
465
+ page_content=' Material K Fe Sr Ba Pb Th U ppb ppb ppb ppb ppb ppt ppt 21-12(RM) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
466
+ page_content=' 730±10 20±2 10±1 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
467
+ page_content='0±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
468
+ page_content='6 143±12 < 7 < 7 Wet cryst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
469
+ page_content=' 8±1 < 10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
470
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
471
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
472
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
473
+ page_content='1 5±1 < 7 < 7 21-13(RM) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
474
+ page_content=' 540±20 N/A 10±1 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
475
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
476
+ page_content='2 95±10 < 7 < 7 Wet cryst.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
477
+ page_content=' < 50 N/A 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
478
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
479
+ page_content='1 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
480
+ page_content='1 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
481
+ page_content='3 < 7 < 7 22-1(RM) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
482
+ page_content=' 390±10 N/A 8±1 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
483
+ page_content='4±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
484
+ page_content='2 40±4 < 4 < 4 Dry powder 8±1 < 7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
485
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
486
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
487
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
488
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
489
+ page_content='7±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
490
+ page_content='1 < 4 < 4 22-4(RM) Initial sol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
491
+ page_content=' 570±10 N/A 15±2 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
492
+ page_content='7±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
493
+ page_content='5 5±1 < 4 < 4 Dry powder 11±4 < 7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
494
+ page_content='1±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
495
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
496
+ page_content='3±0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
497
+ page_content='1 < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
498
+ page_content='3 < 4 < 4 Table 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
499
+ page_content=' The ICP-MS result of residual melt recovery experiment in different batches of mass production.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
500
+ page_content=' It is marked as (RM) for the naming, and the Initial solution is the residual melt solution after dissolving melt and filtration of the quartz particles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
501
+ page_content=' The Wet crystal samples were taken after recrystallization and washing with ethanol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
502
+ page_content=' Values are given at 90% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
503
+ page_content='L, and upper limits are given at 95% C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
504
+ page_content='L.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/YtE5T4oBgHgl3EQfCw7_/content/2301.05400v1.pdf'}
ZdFLT4oBgHgl3EQfWC9a/content/tmp_files/2301.12055v1.pdf.txt ADDED
@@ -0,0 +1,1432 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ TIDo: Source-free Task Incremental Learning in Non-stationary
2
+ Environments
3
+ Abhinit Kumar Ambastha
4
+ National University of Singapore
5
+ Singapore, Singapore
6
7
+ Leong Tze Yun
8
+ National University of Singapore
9
+ Singapore, Singapore
10
11
+ ABSTRACT
12
+ This work presents an incremental learning approach for autonomous
13
+ agents to learn new tasks in a non-stationary environment. Updat-
14
+ ing a DNN model-based agent to learn new target tasks requires
15
+ us to store past training data and needs a large labeled target task
16
+ dataset. Few-shot task incremental learning methods overcome the
17
+ limitation of labeled target datasets by adapting trained models
18
+ to learn private target classes using a few labeled representatives
19
+ and a large unlabeled target dataset. However, the methods as-
20
+ sume that the source and target tasks are stationary. We propose
21
+ a one-shot task incremental learning approach that can adapt to
22
+ non-stationary source and target tasks. Our approach minimizes
23
+ adversarial discrepancy between the model’s feature space and in-
24
+ coming incremental data to learn an updated hypothesis. We also
25
+ use distillation loss to reduce catastrophic forgetting of previously
26
+ learned tasks. Finally, we use Gaussian prototypes to generate ex-
27
+ emplar instances eliminating the need to store past training data.
28
+ Unlike current work in task incremental learning, our model can
29
+ learn both source and target task updates incrementally. We evalu-
30
+ ate our method on various problem settings for incremental object
31
+ detection and disease prediction model update. We evaluate our
32
+ approach by measuring the performance of shared class and tar-
33
+ get private class prediction. Our results show that our approach
34
+ achieved improved performance compared to existing state-of-the-
35
+ art task incremental learning methods.
36
+ 1
37
+ INTRODUCTION
38
+ Task incremental learning problem applies to non-stationary prob-
39
+ lem settings where an agent needs to update an existing task model
40
+ but does not have access to large amounts of labeled data. An exam-
41
+ ple of such a setting is an autonomous agent learning an incremen-
42
+ tal object detection model. Object detection and computer vision
43
+ models are helpful in various domains, such as robotics, health-
44
+ care, e-commerce, and security. A fixed label set and a stationary
45
+ input data distribution limits a classification model’s generaliza-
46
+ tion ability in non-stationary or open-set problem settings. We can
47
+ overcome these bottlenecks using unsupervised task incremental
48
+ learning and update the model without access to a large replay
49
+ memory.
50
+ In a task incremental learning problem, the agent aims to learn
51
+ an optimal hypothesis for both source and target domains [10, 13,
52
+ 14, 17, 18]. The source and target are assumed to have undergone a
53
+ dataset shift [3]. Hence, their shared class instances have a covariate
54
+ discrepancy. We assume access to a few labeled target private class
55
+ instances. The current works address task incremental settings
56
+ at a single time point. We extend this approach to work in non-
57
+ stationary settings, where the source and target data are assumed
58
+ to be available as a dynamic stream. To this effect we propose a new
59
+ method for task incremental learning – Task Incremental Domain
60
+ Adaptation (TIDo).
61
+ 1.1
62
+ BACKGROUND
63
+ In this section, we explore the background topics for this work and
64
+ theoretical guarantees to learn a task incremental hypothesis using
65
+ unlabelled data. We first provide a formal definition for task and
66
+ task incremental learning.
67
+ Definition 1. Task A task is defined as a two-tuple T =< D, 𝑓
68
+ ′ >,
69
+ where D is a domain and 𝑓
70
+ ′ is an approximation of a labeling
71
+ function for the domain. Learning a task is referred to as learning
72
+ a close approximation of the aforementioned labeling function.
73
+ Definition 2. One-shot task incremental learning Given un-
74
+ labelled target data 𝑥 (𝑡)
75
+ 𝑡
76
+ ∈ U𝑡 and labelled source domain data
77
+ 𝑥 (𝑡)
78
+ 𝑠
79
+ ∈ D𝑠 The target domain label set is given by 𝐶𝑡, the shared
80
+ source and target label set is given by 𝐶𝑠, and target-private label
81
+ set is given by 𝐶
82
+
83
+ 𝑡 𝐶𝑠 = 𝐶𝑡\𝐶
84
+
85
+ 𝑡 We have been given a single labelled
86
+ sample from 𝐶
87
+
88
+ 𝑡, ˜𝑥 (𝑡)
89
+ 𝑡
90
+ . We define task incremental learning as the
91
+ problem of a target task hypothesis that can predict all labels 𝐶𝑡.
92
+ Definition 3. Hypothesis A hypothesis ℎ ∈ H refers to an es-
93
+ timate of the labelling function 𝑓 : 𝑥 → 𝐶, where, 𝐶 is the label
94
+ set. The error of a given hypothesis w.r.t. a labelling function for a
95
+ domain < D, 𝑓 > is given by:
96
+ 𝜖(ℎ, 𝑓 ) := E𝑥∼D [I(ℎ(𝑥) ≠ 𝑓 (𝑥))],
97
+ (1)
98
+ where I is an indicator function.
99
+ For a given source domain, the true risk of a hypothesis ℎ ∈ H
100
+ is 𝜖𝑆 (ℎ, 𝑓 ). Since 𝜖𝑠 (ℎ, 𝑓 ) is intractable for most tasks, we use an
101
+ empirical estimate of the risk, ˆ𝜖𝑆 (ℎ, 𝑓 ). We assume similar notation
102
+ for target domain as 𝜖𝑇 (ℎ, 𝑓 ) and ˆ𝜖𝑇 (ℎ, 𝑓 ). The goal is to learn an
103
+ incremental hypothesis ℎ(𝑡) ∈ H at a time point (𝑡), where H is a
104
+ hypothesis class.
105
+ ℎ(𝑡) = argmin
106
+ ℎ∈H
107
+ 
108
+ 𝜖 (𝑡)
109
+ 𝑇 (ℎ, 𝑓 ) +
110
+ 𝑡∑︁
111
+ 𝑖=0
112
+ 𝜖 (𝑖)
113
+ 𝑠
114
+ (ℎ, 𝑓 )
115
+ 
116
+ (2)
117
+ We handle the limitation of non-stationary source and target
118
+ tasks using unsupervised domain adaptation. [2] show that for
119
+ a classification task, empirical error and a measure of disagree-
120
+ ment between the optimal hypothesis and the proposed hypothesis
121
+ bounds the true error of a hypothesis. The authors defined the risk
122
+ 𝜖𝑠 (ℎ, 𝑓 ) of a hypothesis ℎ ∈ H for a given domain 𝑆, can be defined
123
+ as the probability that a hypothesis disagrees with the true labeling
124
+ function 𝑓 of a distribution D𝑠 [2, 3]:
125
+ arXiv:2301.12055v1 [cs.LG] 28 Jan 2023
126
+
127
+ 𝜖𝑠 (ℎ, 𝑓 ) = E𝑥∼D𝑠 [|ℎ(𝑥) − 𝑓 (𝑥)|].
128
+ (3)
129
+ While referring to risk, we use the shorthand 𝜖𝑠 (ℎ) = 𝜖𝑠 (ℎ, 𝑓 ).
130
+ We use the notation ˆ𝜖𝑠 (ℎ) to denote the empirical risk of a hypoth-
131
+ esis ℎ for domain 𝑆.
132
+ Blitzer et al. [2] defined 𝑑HΔH as the measure of maximum
133
+ disagreement between any hypothesis in a hypothesis class. For
134
+ a hypothesis space H, HΔH is defined as a symmetric difference
135
+ hypothesis space:
136
+ HΔH = ℎ(𝑥) ⊕ ℎ
137
+ ′(𝑥) : ℎ,ℎ
138
+ ′ ∈ H,
139
+ (4)
140
+ where ⊕ is the XOR operator.
141
+ 𝑑HΔH was shown to satisfy the following inequality for any
142
+ hypotheses, ℎ,ℎ
143
+ ′ ∈ H and domains 𝑆 and 𝑇:
144
+ |𝜖𝑠 (ℎ,ℎ∗) − 𝜖𝑡 (ℎ,ℎ∗)| ≤ 1
145
+ 2𝑑HΔH
146
+ (5)
147
+ Definition 4. Vapnik-Chervonenkis dimension (VC dimen-
148
+ sion)[20] The Vapnik-Chervonenkis dimension,𝑉𝐶(H), of hypoth-
149
+ esis space H defined over instance space 𝑋 is the size of the largest
150
+ finite subset of 𝑋 shattered by H. If arbitrarily large finite sets of
151
+ 𝑋 can be shattered by H , then 𝑉𝐶(H) ≡ ∞
152
+ Lemma 1.1 shows that we can bind target task risk with source
153
+ task risk.
154
+ Lemma 1.1. [2] For a given source (𝑆) and target (𝑇) domain, Let
155
+ H be a hypothesis class and ℎ∗ ∈ H be the optimal hypothesis.
156
+ Let 𝑑HΔH be a symmetric hypothesis space distance. Then for every
157
+ ℎ ∈ H we have,
158
+ 𝜖𝑇 (ℎ) ≤ 𝜖𝑇 (ℎ∗) + 𝜖𝑇 (ℎ,ℎ∗) ≤ 𝜖𝑆 (ℎ) + 𝜆 + 1
159
+ 2𝑑HΔH(D𝑆, D𝑇 ) (6)
160
+ where,
161
+ 𝜆 = 𝜖𝑇 (ℎ∗) + 𝜖𝑠 (ℎ∗)
162
+ (7)
163
+ In Theorem 1.2, we show that the risk of an incremental model
164
+ update using target data will be theoretically bounded by the aver-
165
+ age risk of the source data provided in the iteration. This ensures
166
+ a theoretical upper bound of model error when a target dataset is
167
+ used to update an existing model.
168
+ Theorem 1.2. Let ˆD𝑇 be the empirically estimated target task
169
+ distribution and ˆD (𝑡)
170
+ 𝑠
171
+ be the empirical source distribution. Let 𝑑HΔH
172
+ be a symmetric hypothesis space distance, then for every ℎ ∈ H, we
173
+ can show that the true target risk is bound by the average true source
174
+ risk and the domain discrepancy between ˆD𝑇 and ˆD (𝑡)
175
+ 𝑠
176
+ .
177
+ 𝜖𝑇 (ℎ) ≤ 1
178
+ 𝑡
179
+ 𝑡∑︁
180
+ 𝑖=1
181
+
182
+ 𝜖𝑆 (ℎ(𝑖)) + 1
183
+ 2𝑑HΔH( ˆD (𝑖)
184
+ 𝑆 , ˆD𝑇 )
185
+
186
+ + 𝜆∗(𝑡−1)
187
+ (8)
188
+ Where,
189
+ 𝜆∗(𝑡−1) = 1
190
+ 𝑡
191
+ 𝑡∑︁
192
+ 𝑖=1
193
+ [𝜖𝑇 (ℎ(𝑖−1)) + 𝜖𝑆 (ℎ(𝑖−1))]
194
+ (9)
195
+ In Theorem 1.3, We show that the risk of an incremental model
196
+ update is theoretically bounded by the average risk of the previously
197
+ introduced target data and domain discrepancy between the source
198
+ and target domains. This shows that the model should be able to
199
+ learn incrementally using new domain data as long as it has low
200
+ domain discrepancy compared to the original model source data.
201
+ Theorem 1.3. Let D𝑇 be the true target task distribution and
202
+ D (𝑡)
203
+ 𝑠
204
+ be the true source distribution. Let 𝑑HΔH be a symmetric hy-
205
+ pothesis space distance. For every ℎ ∈ H, we can show that the true
206
+ target risk is bounded by the average true target risk of the previous
207
+ increments, the domain discrepancy between ˆD𝑇 and ˆD (𝑡)
208
+ 𝑠
209
+ and the
210
+ optimal hypothesis risk 𝜆∗(𝑡−1) of the existing model.
211
+ 𝜖𝑇 (ℎ(𝑡)) ≤ 1
212
+ 𝑡
213
+ ��
214
+
215
+ 𝑡∑︁
216
+ 𝑖=1
217
+ 𝜖𝑇 (ℎ(𝑖−1)) + 1
218
+ 2𝑡
219
+ 𝑡∑︁
220
+ 𝑖=1
221
+ 𝑑HΔH(D𝑆, D𝑇 )��
222
+
223
+ + 𝜆∗(𝑖−1)
224
+ (10)
225
+ Where,
226
+ 𝜆∗(𝑡−1) = 1
227
+ 𝑡
228
+ 𝑡∑︁
229
+ 𝑖=1
230
+ [𝜖𝑇 (ℎ(𝑖−1)) + 𝜖𝑆 (ℎ(𝑖−1))]
231
+ (11)
232
+ In Theorem 1.4, we can learn an incremental model by reduc-
233
+ ing the empirical 𝐻−distance (a measure of domain divergence)
234
+ between unlabelled source and target domain data. The theorem is
235
+ an incremental extension of the work by Blitzer et al. [2, 3].
236
+ Theorem 1.4. Let ˆ
237
+ U (𝑡)
238
+ 𝑇
239
+ be the empirically estimated unlabelled
240
+ target distribution and ˆ
241
+ U (𝑡)
242
+ 𝑠 (𝑡) be the empirical unlabelled source empir-
243
+ ical distribution. Let 𝑑HΔH be a symmetric hypothesis space distance.
244
+ 𝑚′
245
+ 𝑖 is the size of the unlabelled target and source samples, and �� is the
246
+ Vapnik–Chervonenkis dimension of the current hypothesis. Then for
247
+ every ℎ ∈ H for a probability at least 1 − 𝛿,
248
+ 𝜖𝑇 (ℎ(𝑡)) ≤ 1
249
+ 𝑡
250
+ 𝑡∑︁
251
+ 𝑖=1
252
+
253
+ ˆ𝜖𝑆 (𝑖) (ℎ(𝑖)) + 1
254
+ 2𝑑HΔH( ˆ
255
+ U (𝑡)
256
+ 𝑆 (𝑖), ˆ
257
+ U (𝑡)
258
+ 𝑇 )
259
+
260
+ + 1
261
+ 𝑡
262
+ 𝑡∑︁
263
+ 𝑖=1
264
+ ���
265
+
266
+ 4
267
+
268
+
269
+ 2𝑑 log(2𝑚′
270
+ 𝑖) + log( 4
271
+ 𝛿 )
272
+ 𝑚′
273
+ 𝑖
274
+ ���
275
+
276
+ + 𝜆∗(𝑡−1)
277
+ (12)
278
+ Where,
279
+ 𝜆∗(𝑡−1) = 1
280
+ 𝑡
281
+ 𝑡∑︁
282
+ 𝑖=1
283
+ [𝜖𝑇 (ℎ(𝑡)) + 𝜖𝑆 (ℎ(𝑡))]
284
+ (13)
285
+ 2
286
+ RELATED WORKS
287
+ This section explores current works used to learn an autonomous
288
+ task incremental learning agent.
289
+ Li et al. [11] propose a neural network-based approach (Learn-
290
+ ing without forgetting) to carry out task incremental learning with
291
+ minimal increase in parametric space size while satisfying low data
292
+ resource conditions. The proposed method learns new target pri-
293
+ vate class mappings by adding new neurons to the output layer of
294
+ a classification network. The goal of the approach is to retain the
295
+
296
+ classification performance for the previous tasks while incremen-
297
+ tally learning new tasks or classes. The authors use distillation loss
298
+ [7] to minimize catastrophic forgetting.
299
+ Rebuffi et al. [15] propose a supervised incremental learning
300
+ approach (Incremental Classifier and Representation Learning) that
301
+ uses nearest mean matching and class-wise representatives from
302
+ the input data. The authors update the representative instance sets
303
+ (referred to as exemplars) using samples from the incremental input
304
+ data batches. In our work, we address an unsupervised source-
305
+ free approach to overcome the limitation of storing representative
306
+ examples and the need to label incoming incremental data.
307
+ Hoffman et al. [8] provide a supervised approach (continual man-
308
+ ifold adaptation) to learn a low dimensional embedding subspace
309
+ for incoming target data. The work update parametric kernels to
310
+ model an evolving target task distribution. Using a kernel-based
311
+ approach is computationally intensive if the target dataset size is
312
+ large, which limits the scalability of the approach.
313
+ Kundu et al. [10] propose a source-free class incremental learn-
314
+ ing approach that updates a model in a non-stationary environment.
315
+ The authors provide a way to learn a target model with private and
316
+ shared classes but assume known target classes at the time of incre-
317
+ mental domain adaptation. Our work is an incremental extension
318
+ of this work. Also, the work addresses domain shift compensation
319
+ using L2 regularization, which fails to account for unknown classes.
320
+ We address these challenges using distillation loss to accommodate
321
+ future target private classes and an adversarial domain confusion
322
+ loss to minimize domain shift for a non-stationary target domain.
323
+ We compared our approach to unsupervised domain adapta-
324
+ tion methods. Ganin et al. propose the domain adversarial neural
325
+ network (DANN) [6, 21]. Domain adaptation methods cannot com-
326
+ pensate for non-stationary source distribution and do not provide
327
+ the ability to add target private classes (open-set problem setting).
328
+ We compare our work with DANN combined with a target private
329
+ classifier. Due to the few labeled samples available for target pri-
330
+ vate classes, it cannot learn an optimal hypothesis and has low
331
+ predictive accuracy.
332
+ 3
333
+ OUR APPROACH
334
+ Our approach is divided into two stages – foresighted learning and
335
+ task incremental update. In the foresighted learning stage, an agent
336
+ learns a generative model of the source data feature space. Fore-
337
+ sighted learning helps the agent to generate representative samples
338
+ of past data for future incremental model updates. In the task in-
339
+ cremental learning stage, the agent updates its internal model state
340
+ using unlabeled target data and a single labeled sample for target
341
+ private classes.
342
+ 3.1
343
+ Foresighted learning
344
+ This section describes the foresighted learning stage. This stage
345
+ aims to identify tight class-wise clusters in feature posterior distri-
346
+ bution using Gaussian estimation.
347
+ We denote the feature extractor function as 𝑓𝑠 and the classifier
348
+ function as 𝑔𝑠, which maps the feature extractor output to a |𝐶𝑠 +1|-
349
+ class label space (where 𝐶𝑠 is the source task label set size). The
350
+ latent space is denoted by U. We minimize cross-entropy loss (𝑙𝑐𝑒)
351
+ Figure 1: TIDo architecture: Proposed method architecture
352
+ for task incremental learning architecture.
353
+ to learn 𝑔𝑠.
354
+ 𝑙𝑐𝑒 =
355
+ E
356
+ (𝑥𝑠,𝑦𝑠)∼D (𝑡)
357
+ 𝑠
358
+ 𝑙𝑐𝑒 (𝑔𝑠 · 𝑓𝑠 (𝑥𝑠),𝑦𝑠)
359
+ (14)
360
+ Cross-entropy loss ensures discriminative decision boundaries in
361
+ the latent feature space but leads to over-confident predictions. To
362
+ generate representative samples for source distribution for future
363
+ iterations, we minimize category bias by penalizing over-confident
364
+ prediction. We achieve this by identifying out-of-distribution (OOD)
365
+ samples. Re-using the trained base model to classify unknown
366
+ classes leads to negative learning, i.e., and misclassification of in-
367
+ stances belonging to unknown classes as one of the known classes.
368
+ This is due to the inherent generalization bias of the source model.
369
+ Kundu et al. [10] suggest detecting OOD instances to identify in-
370
+ stances belonging to unknown classes. This is based on the under-
371
+ standing that instances from unknown classes lie in low-density
372
+ regions of the instances of the shared classes. Kundu et al. [10]
373
+ achieve this by mapping the source instances to a latent space with
374
+ an underlying global prior distribution given by N (𝜇, 𝜎). Next, the
375
+ instances from the target domain which lie beyond the 3𝜎 range
376
+ were considered to belong to unknown classes.
377
+ We use a class separability objective L𝑠1 to enforce the class-wise
378
+ features to attain higher affinity to the class-wise prototypes.
379
+ L𝑠 = L𝑠1 + L𝑠2
380
+ (15)
381
+ L𝑠1 :
382
+ E
383
+ (𝑥𝑠,𝑦𝑠)∼D𝑠
384
+ − log
385
+
386
+ exp(P𝑦𝑠
387
+ 𝑠 (𝑢𝑠))
388
+
389
+ 𝑐 ∈𝐶𝑠 exp(P𝑐𝑠 (𝑢𝑠))
390
+
391
+ (16)
392
+ L𝑠2 :
393
+ E
394
+ (𝑥𝑠,𝑦𝑠)∼D𝑠
395
+ 𝑙𝑐𝑒 (𝜎(𝑔(𝑡)
396
+ 𝑠
397
+ �𝑓 (𝑡)
398
+ 𝑠
399
+ (𝑥𝑠),𝜏),𝑦𝑠)
400
+ +
401
+ E
402
+ (𝑢𝑛,𝑦𝑛)∼D𝑛
403
+ 𝑙𝑐𝑒 (𝜎(𝑔(𝑡)
404
+ 𝑠
405
+ (𝑢𝑛),𝜏),𝑦𝑛)
406
+ (17)
407
+
408
+ Foresighted source training
409
+ (t = 0)
410
+ U(t)
411
+ Source
412
+ (Predicted
413
+ Gaussian
414
+ feature f(t)
415
+ Base source
416
+ class labels)
417
+ prototype
418
+ extractor
419
+ classifier
420
+ (Source data)
421
+ space
422
+ Task incremental learning
423
+ (t > 0)
424
+ :
425
+ u(t)~ U(t)
426
+ Incremental
427
+ (Proxy source
428
+ source classifier
429
+ (IC,l +1)th
430
+ samples)
431
+ f(t)
432
+ f(t)
433
+ Feature
434
+ Feature
435
+ encoder
436
+ decoder
437
+ (Predicted
438
+ class labels)
439
+ Target
440
+ 8/0)
441
+ feature f(t)
442
+ Ct
443
+ Incremental
444
+ extractor
445
+ (Target data)
446
+ target classifier
447
+ U(t+1)
448
+ Updated prototype
449
+ d(t)
450
+ Yd
451
+ space
452
+ Doman
453
+ (Predicted
454
+ classifier
455
+ domain labels)Where 𝜎 denotes distillation soft loss [7],
456
+ 𝜎(z,𝜏) =
457
+ 𝑒
458
+ 𝑧
459
+ 𝜏
460
+ �𝑒
461
+ 𝑧
462
+ 𝜏
463
+ (18)
464
+ D𝑛 is the distribution of the negative samples, and (𝑢𝑛,𝑦𝑛) rep-
465
+ resents the negative samples with 𝑦𝑛 being the (|𝐶𝑠 | + 1)𝑡ℎ class.
466
+ Since we don’t need distillation loss for this stage, we set 𝜏 = 1.
467
+ 3.2
468
+ Task incremental update
469
+ In this section, we describe the domain incremental update stage
470
+ of the proposed method. We use the learned prototypes and the
471
+ unlabeled target domain data to incrementally update the base clas-
472
+ sifier for the target task. In this stage, we use the U−space guides
473
+ as shared class cluster centroids and single target private samples
474
+ as the target private class cluster centroids. We use an encoder-
475
+ decoder approach to fine-tune the U−space to accommodate target
476
+ private guides. This way, we learn a U𝑡ℎ−space which is used to
477
+ represent previous iteration samples.
478
+ Several discrepancy metrics have been proposed to match the
479
+ moments of the shared class instances from source and target dis-
480
+ tributions. Adversarially trained domain discriminators are used to
481
+ reducing the empirical hypothesis distance (𝑑H∇H) between the
482
+ source and target distributions, which has been shown to reduce
483
+ the distance between the source and target distributions.
484
+ We learn the guides for the target domain, U (𝑡+1) using the
485
+ source prototype space U. Using fixed source guides for target
486
+ space reduces flexibility in accommodating target private classes.
487
+ We initialize the U (𝑡+1) guides: 𝑣𝑐𝑔 = 𝑓𝑒 (𝜇𝑐𝑠 )∀𝑐 ∈ 𝐶𝑠 and 𝑣𝑐𝑔 =
488
+ ˆ𝑥 (𝑡)
489
+ 𝑡
490
+ ∀𝑐 ∈ 𝐶
491
+
492
+ 𝑡 and calculate confident samples B𝑐
493
+ 𝑡 which are pseudo-
494
+ labelled using the guides (𝑘). We use a domain projection auto-
495
+ encoder to enable mobility of guides explicitly. The target domain
496
+ contains private class instances which position themselves in the
497
+ low-density regions of the U𝑡+1−space. We use a reconstruction
498
+ loss and L2-norm to maintain the previously learned source guide
499
+ space (U−space) semantics. By training the auto-encoder layers
500
+ using the gradient from the classifier and domain discriminator, we
501
+ adversarially train U (𝑡+1)−space.
502
+ The U (𝑡+1) guides are aligned using the adversarial domain
503
+ confusion loss:
504
+ L𝑑 : −𝑑H∇H(𝑣𝑡, 𝑣𝑐
505
+ 𝑔)
506
+ (19)
507
+ In order to learn an efficient domain projection 𝑓𝑒 : U → U (𝑡+1)
508
+ and 𝑓𝑑 : U (𝑡+1) → U we use reconstruction error similar to an
509
+ auto-encoder. We also use distillation loss with 𝜏 = 2 to ensure low
510
+ catastrophic forgetting for the previously learned shared classes.
511
+ L𝑟 = L𝑟1 + L𝑟2
512
+ (20)
513
+ L𝑟1 :
514
+ E
515
+ (𝑢𝑐𝑠 )∼P𝑐𝑠
516
+ 𝑙𝑐𝑒 (𝜎( ˆ𝑦(𝑢𝑐
517
+ 𝑠 ),𝜏),𝑐)
518
+ (21)
519
+ L𝑟2 :
520
+ E
521
+ (𝑢𝑐𝑠 )∼P𝑐𝑠
522
+ 𝑙2(𝑓𝑑 · 𝑓𝑒 (𝑢𝑐
523
+ 𝑠 ),𝑢𝑐
524
+ 𝑠 )2
525
+ (22)
526
+ To learn new target private classes, we apply cross-entropy loss to
527
+ target confident samples:
528
+ L𝑐 :
529
+ E
530
+ (𝑥𝑡 )∼B𝑐
531
+ 𝑡
532
+ 𝑙𝑐𝑒 ( ˆ𝑦(𝑣𝑡),𝑐), ∀𝑐 ∈ 𝐶𝑡
533
+ (23)
534
+ 4
535
+ ALGORITHM
536
+ Algorithm 1 outlines the task incremental update implementation.
537
+ We initialize the source generative distribution using the prototypes
538
+ from the previous stage (line 2). To enable the mobility of guides,
539
+ we train an auto-encoder network 𝑓𝑑 (𝑓𝑒 (·)) (line 3-7). We use an
540
+ 𝐿2-norm loss as a reconstruction error to train the auto-encoder.
541
+ Since we want the incremental learning agent to learn new
542
+ classes from the target task, we need to update the guides to include
543
+ new target class cluster guides. To this effect, we use a single labeled
544
+ instance (assumed to be available) from each target task class as
545
+ target class guides (line 13).
546
+ Algorithm 1 Task Incremental Learning algorithm
547
+ 1: Require: Target samples D𝑡, Gaussian Prototypes P𝑐𝑠 ,
548
+ model parameters
549
+ 𝜃𝑓 (𝑡)
550
+ 𝑠
551
+ ,𝜃𝑔(𝑡)
552
+ 𝑠 ,𝜃𝑓 (𝑡)
553
+ 𝑡
554
+ ,𝜃𝑔(𝑡)
555
+ 𝑡 ,𝜃𝑓 (𝑡)
556
+ 𝑒
557
+ ,𝜃𝑓 (𝑡)
558
+ 𝑑
559
+ ,𝜃𝑑 (𝑡) , training
560
+ sample size 𝑁, percentage of confident samples 𝑛
561
+ 2: Initialize: 𝜃𝑓 (𝑡)
562
+ 𝑡
563
+ ← 𝜃𝑓 (𝑡)
564
+ 𝑠
565
+ 3: repeat
566
+ 4:
567
+ Obtain a mini-batch of proxy-source samples 𝑆 = {u𝑐𝑠 ∼
568
+ P𝑐𝑠 : 𝑐 ∈ C𝑠}
569
+ 5:
570
+ 𝜃𝑓 (𝑡)
571
+ 𝑒
572
+ ← 𝜃𝑓 (𝑡)
573
+ 𝑒
574
+ + Adam{𝑓 (𝑡)
575
+ 𝑒
576
+ }(−∇ 1
577
+ |𝑆 |
578
+
579
+ u𝑐𝑠 ∈𝑆 𝑙2(𝑢𝑐𝑠, 𝑓𝑒 (𝑢𝑐𝑠 ))2)
580
+ 6:
581
+ 𝜃𝑓 (𝑡)
582
+ 𝑑
583
+ ← 𝜃𝑓 (𝑡)
584
+ 𝑑
585
+ + Adam{𝑓 (𝑡)
586
+ 𝑑
587
+ }(−∇ 1
588
+ |𝑆 |
589
+
590
+ u𝑐𝑠 ∈𝑆 𝑙2(𝑢𝑐𝑠, 𝑓𝑑 (𝑢𝑐𝑠 ))2)
591
+ 7: until Convergence
592
+ 8: Loss ← [L𝑟1, L𝑟2, L𝑐, L𝑑]
593
+ 9: Opt ← [Adam{𝑓 (𝑡)
594
+ 𝑒
595
+ ,𝑓 (𝑡)
596
+ 𝑑
597
+ ,𝑔(𝑡)
598
+ 𝑡
599
+ }, Adam{𝑓 (𝑡)
600
+ 𝑒
601
+ ,𝑓 (𝑡)
602
+ 𝑑
603
+ }, Adam{𝑓 (𝑡)
604
+ 𝑡
605
+ ,𝑔(𝑡)
606
+ 𝑡
607
+ },
608
+ 10:
609
+ Adam{𝑓 (𝑡)
610
+ 𝑡
611
+ }, Adam{𝑓 (𝑡)
612
+ 𝑒
613
+ ,𝑓 (𝑡)
614
+ 𝑡
615
+ }]
616
+ 11: repeat
617
+ 12:
618
+ iter ← iter+1, cur ← iter mod 5
619
+ 13:
620
+ v𝑐𝑔 ← 𝑓𝑒 (𝜇𝑐𝑠 )∀𝑐 ∈ C𝑠, v𝑐𝑔 ← 𝑓𝑡 ( ˜𝑥𝑐
621
+ 𝑡 )∀𝑐 ∈ C
622
+
623
+ 𝑡
624
+ 14:
625
+ for 𝑢𝑐𝑠 ∼ P𝑐𝑠 : 𝑐 ∈ C𝑠 do
626
+ 15:
627
+ 𝑣𝑐𝑠 ← 𝑓𝑒 (u𝑐𝑠); ˆ𝑢𝑐𝑠 ← 𝑓𝑑 (𝑣𝑐𝑠 );
628
+ 16:
629
+ ˆ𝑦 ← 𝑔𝑠 ( ˆ𝑢𝑐𝑠 )|𝑐 ∈C𝑠 ∥𝑔𝑡 (𝑣𝑐𝑠 )
630
+ 17:
631
+ L𝑟1 + 𝑙𝑚𝑠𝑒 ( ˆ𝑢𝑐𝑠,𝑢𝑐𝑠 )
632
+ 18:
633
+ L𝑐 ← L𝑐 + 𝑙𝑐𝑒 (𝜎( ˆ𝑦𝑠),𝑐)
634
+ 19:
635
+ end for
636
+ 20:
637
+ for x𝑡 ∈ {x𝑡 ∼ D𝑡 } do
638
+ 21:
639
+ 𝑣𝑡 ← 𝑓𝑡 (x𝑡); u𝑡 ← 𝑓𝑑 (𝑣𝑡); ˆ𝑦𝑡 ← 𝑔𝑠 ( ˆ𝑢𝑡)|𝑐 ∈C𝑠 ∥𝑔𝑡 (𝑣𝑡)
640
+ 22:
641
+ 𝑑 ← min𝑐 ∈C𝑡𝑙2(𝑣𝑡, 𝑣𝑐𝑔);𝑘 ← arg min(𝑑)
642
+ 23:
643
+ L𝑟2 ← L𝑟2 + 𝑙𝑚𝑠𝑒 (u𝑡, ˆ𝑣𝑡)
644
+ 24:
645
+ end for
646
+ 25:
647
+ for 𝑢𝑐𝑠 ∼ P𝑐𝑠 , x𝑡 ∈ {x𝑡 ∼ D𝑡 } do
648
+ 26:
649
+ 𝑣 ← 𝑓𝑡 (x𝑡); ˆ𝑦𝑑 ← 𝑑([𝑢𝑐𝑠, 𝑣]);
650
+ 27:
651
+ L𝑑 ← L𝑑 + 𝑙𝑐𝑒 ( ˆ𝑦𝑑, [0, 1])
652
+ 28:
653
+ end for
654
+ 29:
655
+ if reached the end of an epoch then
656
+ 30:
657
+ UpdateTaskIncrementalGradients(Loss,Opt)
658
+ 31:
659
+ Label samples in D𝑡 using guides {𝑣𝑐𝑔 : 𝑐 ∈ C𝑡 }
660
+ 32:
661
+ P𝑐
662
+ 𝑡 ← Gaussian Prototypes obtained using pseudo-label
663
+ target samples
664
+ 33:
665
+ end if
666
+ 34: until Convergence
667
+
668
+ In line 14-19, we fine-tune the feature extractor network using
669
+ samples from the class-wise prototype distributions. We assume an
670
+ open-set problem setting, and the target domain data is assumed
671
+ to contain instances from the source domain. To learn a single
672
+ classifier for source and target tasks, we pass the unlabeled target
673
+ instances and source domain samples to both the source domain
674
+ classifier and target domain classifier. In line 20-24, we obtain the
675
+ pseudo-labels for the target domain data along with the predictions
676
+ from the updated joint classifier.
677
+ To align the source and target domain distributions, we use a
678
+ domain discriminator network, which trains the feature extractor
679
+ adversarially along with the joint classifier loss (line 25-28). Fi-
680
+ nally, we update the parameters of all the components of the task
681
+ incremental network and update the prototypes (line 29-33). The
682
+ updated prototypes will serve as the source prototypes in the next
683
+ iteration, along with the new source domain (if any) to generate
684
+ the samples. The gradient update algorithm (algorithm 2) provides
685
+ the gradient update step for the task incremental learning network
686
+ components.
687
+ Algorithm 2 Gradient update algorithm
688
+ 1: Require: Model parameters, Loss, Opt
689
+ 2: 𝜃𝑓 (𝑡)
690
+ 𝑡
691
+ ← 𝜃𝑓 (𝑡)
692
+ 𝑡
693
+ + Adam{𝑓 (𝑡)
694
+ 𝑡
695
+ }(−∇ 1
696
+ 𝑁
697
+ � L𝑐)
698
+ 3: 𝜃𝑑 (𝑡) ← 𝜃𝑑 (𝑡) − Adam{𝑑 (𝑡),𝑓 (𝑡)
699
+ 𝑡
700
+ }(−∇ 1
701
+ 𝑁
702
+ � L𝑑)
703
+ 4: 𝜃𝑓 (𝑡)
704
+ 𝑡
705
+ ← 𝜃𝑓 (𝑡)
706
+ 𝑡
707
+ − Adam{𝑑 (𝑡),𝑓 (𝑡)
708
+ 𝑡
709
+ }(−∇ 1
710
+ 𝑁
711
+ � L𝑑)
712
+ 5: 𝜃𝑓 (𝑡)
713
+ 𝑡
714
+ ← 𝜃𝑓 (𝑡)
715
+ 𝑡
716
+ − Adam{𝑓 (𝑡)
717
+ 𝑡
718
+ }(−∇ 1
719
+ 𝑁
720
+ � L𝑟1)
721
+ 6: 𝜃𝑓 (𝑡)
722
+ 𝑒
723
+ ← 𝜃𝑓 (𝑡)
724
+ 𝑒
725
+ + Adam{𝑓 (𝑡)
726
+ 𝑒
727
+ ,𝑓 (𝑡)
728
+ 𝑑
729
+ }(−∇ 1
730
+ 𝑁
731
+ � L𝑟1)
732
+ 7: 𝜃𝑓 (𝑡)
733
+ 𝑑
734
+ ← 𝜃𝑓 (𝑡)
735
+ 𝑑
736
+ + Adam{𝑓 (𝑡)
737
+ 𝑒
738
+ ,𝑓 (𝑡)
739
+ 𝑑
740
+ }(−∇ 1
741
+ 𝑁
742
+ � L𝑟1)
743
+ 8: 𝜃𝑓 (𝑡)
744
+ ���
745
+ ← 𝜃𝑓 (𝑡)
746
+ 𝑡
747
+ + Adam{𝑓 (𝑡)
748
+ 𝑡
749
+ }(−∇ 1
750
+ 𝑁
751
+ � L𝑟2)
752
+ 9: 𝜃𝑓 (𝑡)
753
+ 𝑑
754
+ ← 𝜃𝑓 (𝑡)
755
+ 𝑑
756
+ + Adam{𝑓 (𝑡)
757
+ 𝑑
758
+ }(−∇ 1
759
+ 𝑁
760
+ � L𝑟2)
761
+ 5
762
+ EXPERIMENTS AND RESULTS
763
+ 5.1
764
+ Incremental object detection
765
+ We evaluated our proposed method to develop an agent to learn an
766
+ incremental object detection task. Object detection in real-world
767
+ images has been used as a benchmark task for several computer
768
+ vision problems. In order to evaluate our approach, we created an
769
+ incremental learning task that requires learning a target domain
770
+ classification model given an initial source domain dataset.
771
+ We use an imaging dataset with multiple object classes and mul-
772
+ tiple domains. We select one of the domains as the initial labeled
773
+ source domain while the rest are considered unlabelled target do-
774
+ mains. Our goal is to learn a common model for all the domains
775
+ observed by the model.
776
+ 5.1.1
777
+ Dataset. We used the office-31 object recognition dataset
778
+ [16] which contains 4652 images from 3 domains and 31 classes.
779
+ The domains of the dataset are web (Amazon), DSLR, and webcam.
780
+ The domain details are as follows:
781
+ • Amazon (A): These are images taken from Amazon [1]. They
782
+ are mostly taken in a studio setting with a clear background
783
+ and standardized lighting. We have an average of 90 images
784
+ per class.
785
+ • Digital single-lens reflex camera (D): This domain contains
786
+ high-resolution images with a pixel resolution of (4288 ×
787
+ 2848). Each class contains images of 5 objects taken from 3
788
+ different angles each. In total, the domain dataset has 423
789
+ images.
790
+ • Webcam (W): This domain contains low-resolution poor-
791
+ lighting images with a pixel resolution of (640 × 480). The
792
+ dataset contains 5 objects per class with 3 angle images each.
793
+ In total, we have 795 images. These images show consider-
794
+ able noise and color as well as white balance artifacts.
795
+ The 31 categories are desk lamp, computer, tile cabinet, backpack,
796
+ bike, bike helmet, mouse, mug, notebook, pen, phone, printer, book-
797
+ case, bottle, calculator, desk chair, headphones, keyboard, laptop,
798
+ letter tray, mobile phone, monitor, projector, puncher, ring binder,
799
+ ruler, scissors, speaker, stapler, tape, and trash can.
800
+ Table 1: Incremental object detection learning task for eval-
801
+ uating task incremental learning methods.
802
+ Index
803
+ Inputs
804
+ 𝑡 + 0
805
+ Source: desk lamp, computer, cabinet, backpack, bike
806
+ Target: desk lamp, computer, cabinet, backpack, bike,
807
+ bike helmet, mouse, mug, notebook, pen
808
+ 𝑡 + 1
809
+ Source: phone, printer, bookcase
810
+ Target: phone, printer, bookcase, bottle, calculator
811
+ 𝑡 + 2
812
+ Source: desk chair, headphones, keyboard, laptop, tray
813
+ Target: desk chair, headphones, keyboard, laptop, tray,
814
+ mobile phone, monitor, projector
815
+ 𝑡 + 3
816
+ Source: ruler, scissors, speaker, stapler
817
+ Target: ruler, scissors, speaker, stapler, tape, trash can
818
+ 𝑡 + 4
819
+ Source: ∅, Target: puncher, ring binder
820
+ To evaluate the response of our approach to both open-set differ-
821
+ ences between the source and target domains and non-stationary
822
+ source and target domains, we structure the experiment as follows
823
+ • The domains are introduced incrementally to the model, and
824
+ the data from the domains (belonging to the same class) is
825
+ assumed to be sampled from a single non-stationary distri-
826
+ bution
827
+ • In every iteration we introduce a set of shared classes 𝐶𝑡𝑠 and
828
+ target private classes 𝐶
829
+ ′(𝑡)
830
+ 𝑡
831
+ • The foresighted learning network learns the source guides
832
+ every time a new labeled source domain is introduced. For
833
+ the 𝑙𝑡ℎ iteration, 𝑓 (𝑡+𝑙)
834
+ 𝑠
835
+ is trained using data sampled from
836
+ combined data from 𝑢 (𝑡)
837
+ 𝑠
838
+ and 𝑥 (𝑡+𝑙)
839
+ 𝑠
840
+ • The target data in every iteration assumed to contain at least
841
+ one target private class (i.e. 𝐶
842
+ ′(𝑡+1) ≠ ∅)
843
+ Like our method, iCARL and CIDA use prototype learning to
844
+ enable source-free incremental learning. Although this is one of
845
+ the desiderata of incremental learning, iCARL requires labeled
846
+ target data. This makes it unsuitable for direct application to the
847
+ unsupervised task incremental learning problem setting. Our work
848
+ is motivated by CIDA, and we aim to improve upon the existing
849
+
850
+ method by using an adversarial domain discrepancy estimation
851
+ instead of the previously proposed alignment loss [10]. We also
852
+ extend it to an incremental learning context. DANN and CMA
853
+ provide a way to carry out unsupervised learning. We compare our
854
+ approach to the aforementioned methods to evaluate the efficiency
855
+ of end-to-end trainable adversarial methods for task incremental
856
+ learning.
857
+ We evaluate our approach using the incremental learning task
858
+ outlined in table 2. We evaluate the performance of a given approach
859
+ at every time point using total accuracy and target private class
860
+ accuracy. We compare our proposed approach (TIDo) to unsuper-
861
+ vised domain adaptation methods (DANN [19]), class incremental
862
+ domain adaptation methods (iCARL [15], CIDA [10]) and continual
863
+ learning methods (LwF-MC [11], CMA [8]). For methods without
864
+ a provision to incrementally add new classes, we trained a tar-
865
+ get private classifier (TPC). CIDA-C refers to storing and using
866
+ combined target task data from past increments; this makes this a
867
+ pseudo-incremental learning approach.
868
+ For (𝑡 +4)𝑡ℎ iteration of the experiment (refer to table.2), we have
869
+ no source dataset. We do not update the source classifier for the
870
+ DANN approach for this iteration as the approach requires source
871
+ data to update. Also, iCARL and LwF-MC methods are supervised
872
+ methods and require labeled target data. We use 5% labeled samples
873
+ (available to the rest of the methods for few-shot learning) to serve
874
+ as the labeled target data.
875
+ Table 2: Incremental disease prediction learning task for
876
+ evaluating task incremental learning.
877
+ Index
878
+ Inputs
879
+ 𝑡 + 0
880
+ Source: CN, AD, Target: CN, MCI, AD
881
+ 𝑡 + 1
882
+ Source: CN, MCI, AD, Target: CN, MCI, AD
883
+ 𝑡 + 2
884
+ Source: ∅, Target: EMCI
885
+ 𝑡 + 3
886
+ Source: ∅, Target: AD, CN, MCI
887
+ 5.2
888
+ Incremental disease staging
889
+ We apply our proposed approach to create an incremental disease
890
+ staging agent. We design an incremental learning task for learning
891
+ an Alzheimer’s disease prediction model.
892
+ Alzheimer’s disease staging is a non-trivial process with overlap-
893
+ ping subjective categories. Due to the absence of a standard staging
894
+ model for neurological diseases like AD, stage-wise labeled data
895
+ may not be available at a single time point. We propose using task
896
+ incremental learning to carry out source-free few-shot incremental
897
+ updates to a base clinical model. to test our class incremental hy-
898
+ pothesis, we aim to update a binary classification AD/HC model
899
+ to predict intermediate stages of early mild cognitive impairment
900
+ (EMCI) and late mild cognitive impairment (LMCI). To test our
901
+ domain incremental hypothesis, we update the model using target
902
+ data from a different domain (containing both shared and target
903
+ private classes).
904
+ We evaluate the method using Alzheimer’s disease data from
905
+ multiple domains, different populations, and different label sets.
906
+ We use Alzheimer’s disease-specific datasets in this experiment
907
+ – Alzheimer’s Disease Neuroimaging Initiative (Data used in the
908
+ preparation of this article were obtained from the Alzheimer’s Dis-
909
+ ease Neuroimaging Initiative (ADNI) database (adni.loni.usc.edu))
910
+ [4] and Alzheimer’s Disease Neuroimaging Initiative – AIBL (Data
911
+ was collected by the AIBL study group. AIBL study methodology
912
+ has been reported previously [5]).
913
+ We create a region of interest (ROI) image dataset using MRI
914
+ images from ADNI and AIBL domains. The MRI images were pre-
915
+ processed using a processing pipeline. Due to the relatively low
916
+ number of samples in the MRI imaging dataset, we augment the
917
+ dataset using the extracted ROIs from the input images [9, 12].
918
+ For example, for the ADNI-1 dataset, we had 841 samples (200
919
+ healthy control data, 230 AD data, and 411 MCI data); after ROI
920
+ augmentation, we had 3364 data instances.
921
+ We used ROI data from left and right Hippocampus regions and
922
+ left and right temporal lobes. The extracted ROI patches had the
923
+ dimension (64×64×64). Individual ROI patches were labeled using
924
+ the sample label from which they were extracted.
925
+ 5.3
926
+ Discussion
927
+ We proposed a source-free task incremental learning method for
928
+ an agent to learn a task incrementally. We observed that our ap-
929
+ proach enabled an autonomous agent to learn a near-optimal target
930
+ hypothesis with very low catastrophic forgetting for both class
931
+ incremental and domain incremental applications. Since our ap-
932
+ proach is source-free, we have a very low memory complexity and
933
+ can update a model incrementally using few-shot learning.
934
+ Our results show comparable or improved performance of our
935
+ approach compared to class incremental learning (CIDA-C [10]).
936
+ We show that our approach can achieve similar performance with-
937
+ out storing past target training data. This reduces the memory
938
+ complexity of our approach drastically.
939
+ We performed a comparative analysis of the task incremental
940
+ problem using unsupervised domain adaptation, continual learning,
941
+ and class incremental methods. [15] propose a supervised incremen-
942
+ tal learning approach that uses representation learning and learned
943
+ class-wise exemplars from the input data. The authors updated the
944
+ exemplars incrementally to learn using new classes and instances.
945
+ Storage of class-wise exemplar instances and the need for labeled
946
+ samples from both source and target domains for model upgrades
947
+ make the approach unsuitable for scalable incremental learning.
948
+ We eliminate the need to store exemplar instances by generating
949
+ a distribution estimation and storing class-wise guides, thereby
950
+ rendering our approach source-free.
951
+ We compared our approach to continual manifold adaptation
952
+ (CMA). CMA does not apply to open-set transfer learning settings.
953
+ Hence, we learn a target private classifier (TPC) to achieve the
954
+ task incremental task. Due to the few-shot configuration for target
955
+ private instances, TPC risk is large. Table 3 and 4 show a high loss
956
+ for target private classes, except (𝑡 + 2)𝑡ℎ iteration for Alzheimer’s
957
+ disease prediction (57.82±4.60%) which is because the target private
958
+ class (EMCI) is a sub-category of MCI, which has been observed
959
+ by the classifier in the previous iterations (𝑡 + 0, 𝑡 + 1) for related
960
+ domains (ADNI 3 and ADNI 2).
961
+
962
+ Table 3: Office-31 incremental object recognition task: comparison of our proposed method (TIDo) with existing incremental
963
+ learning, continual learning, and unsupervised domain adaptation methods for a few-shot labeled target (5%), unlabelled
964
+ target domain data, and labeled source domain data.
965
+ A→W→D
966
+ DANN-TPC
967
+ iCARL
968
+ CMA-TPC
969
+ CIDA-C
970
+ LwF-MC
971
+ TIDo
972
+ Index
973
+ All (%)
974
+ Priv (%)
975
+ All (%)
976
+ Priv (%)
977
+ All (%)
978
+ Priv (%)
979
+ All (%)
980
+ Priv (%)
981
+ All (%)
982
+ Priv (%)
983
+ All (%)
984
+ Priv (%)
985
+ 𝑡 + 0
986
+ 57.17
987
+ 15.91
988
+ 72.91
989
+ 48.21
990
+ 61.22
991
+ 28.01
992
+ 77.12
993
+ 72.92
994
+ 62.12
995
+ 39.11
996
+ 75.82
997
+ 75.12
998
+ 𝑡 + 1
999
+ 54.12
1000
+ 12.67
1001
+ 75.01
1002
+ 51.23
1003
+ 65.18
1004
+ 27.43
1005
+ 72.23
1006
+ 70.27
1007
+ 62.25
1008
+ 35.24
1009
+ 72.81
1010
+ 73.63
1011
+ 𝑡 + 2
1012
+ 45.12
1013
+ 19.01
1014
+ 64.21
1015
+ 43.91
1016
+ 56.92
1017
+ 34.22
1018
+ 70.14
1019
+ 69.22
1020
+ 54.50
1021
+ 31.12
1022
+ 71.12
1023
+ 72.22
1024
+ 𝑡 + 3
1025
+ 40.13
1026
+ 20.87
1027
+ 63.34
1028
+ 43.31
1029
+ 50.85
1030
+ 26.75
1031
+ 69.92
1032
+ 69.91
1033
+ 54.23
1034
+ 30.03
1035
+ 70.75
1036
+ 71.29
1037
+ 𝑡 + 4
1038
+ 38.23
1039
+ 31.01
1040
+ 60.23
1041
+ 43.33
1042
+ 44.23
1043
+ 29.65
1044
+ 73.29
1045
+ 78.01
1046
+ 52.15
1047
+ 35.01
1048
+ 72.23
1049
+ 72.16
1050
+ D→A→W
1051
+ DANN-TPC
1052
+ iCARL
1053
+ CMA-TPC
1054
+ CIDA-C
1055
+ LwF-MC
1056
+ TIDo
1057
+ Index
1058
+ All (%)
1059
+ Priv (%)
1060
+ All (%)
1061
+ Priv (%)
1062
+ All (%)
1063
+ Priv (%)
1064
+ All (%)
1065
+ Priv (%)
1066
+ All (%)
1067
+ Priv (%)
1068
+ All (%)
1069
+ Priv (%)
1070
+ 𝑡 + 0
1071
+ 51.66
1072
+ 20.02
1073
+ 73.22
1074
+ 53.40
1075
+ 68.56
1076
+ 37.12
1077
+ 85.63
1078
+ 82.91
1079
+ 75.34
1080
+ 55.27
1081
+ 88.26
1082
+ 84.92
1083
+ 𝑡 + 1
1084
+ 50.23
1085
+ 19.10
1086
+ 72.81
1087
+ 51.23
1088
+ 66.30
1089
+ 34.16
1090
+ 81.64
1091
+ 79.22
1092
+ 76.26
1093
+ 56.72
1094
+ 84.54
1095
+ 82.76
1096
+ 𝑡 + 2
1097
+ 44.66
1098
+ 21.91
1099
+ 71.81
1100
+ 52.42
1101
+ 52.86
1102
+ 21.96
1103
+ 76.72
1104
+ 72.01
1105
+ 64.48
1106
+ 53.29
1107
+ 74.86
1108
+ 73.66
1109
+ 𝑡 + 3
1110
+ 43.36
1111
+ 17.64
1112
+ 71.74
1113
+ 56.81
1114
+ 51.47
1115
+ 18.58
1116
+ 72.12
1117
+ 70.26
1118
+ 64.43
1119
+ 44.02
1120
+ 70.49
1121
+ 69.06
1122
+ 𝑡 + 4
1123
+ 41.26
1124
+ 24.63
1125
+ 75.41
1126
+ 65.19
1127
+ 54.63
1128
+ 28.43
1129
+ 76.72
1130
+ 73.03
1131
+ 65.6
1132
+ 47.7
1133
+ 71.53
1134
+ 70.44
1135
+ W→D→A
1136
+ DANN-TPC
1137
+ iCARL
1138
+ CMA-TPC
1139
+ CIDA-C
1140
+ LwF-MC
1141
+ TIDo
1142
+ Index
1143
+ All (%)
1144
+ Priv (%)
1145
+ All (%)
1146
+ Priv (%)
1147
+ All (%)
1148
+ Priv (%)
1149
+ All (%)
1150
+ Priv (%)
1151
+ All (%)
1152
+ Priv (%)
1153
+ All (%)
1154
+ Priv (%)
1155
+ 𝑡 + 0
1156
+ 57.29
1157
+ 20.31
1158
+ 75.4
1159
+ 65.2
1160
+ 67.22
1161
+ 18.20
1162
+ 84.82
1163
+ 82.22
1164
+ 74.99
1165
+ 67.48
1166
+ 83.92
1167
+ 83.20
1168
+ 𝑡 + 1
1169
+ 58.25
1170
+ 18.17
1171
+ 74.59
1172
+ 64.29
1173
+ 67.18
1174
+ 19.02
1175
+ 79.17
1176
+ 82.61
1177
+ 73.62
1178
+ 68.01
1179
+ 81.18
1180
+ 83.19
1181
+ 𝑡 + 2
1182
+ 56.72
1183
+ 37.45
1184
+ 76.25
1185
+ 77.50
1186
+ 69.93
1187
+ 28.21
1188
+ 85.14
1189
+ 82.22
1190
+ 67.91
1191
+ 56.02
1192
+ 78.03
1193
+ 80.21
1194
+ 𝑡 + 3
1195
+ 54.29
1196
+ 26.22
1197
+ 76.43
1198
+ 77.02
1199
+ 65.18
1200
+ 24.59
1201
+ 82.91
1202
+ 79.81
1203
+ 65.23
1204
+ 51.43
1205
+ 77.78
1206
+ 77.50
1207
+ 𝑡 + 4
1208
+ 47.49
1209
+ 18.25
1210
+ 75.71
1211
+ 77.32
1212
+ 62.03
1213
+ 26.49
1214
+ 78.02
1215
+ 79.91
1216
+ 70.15
1217
+ 57.41
1218
+ 77.03
1219
+ 76.47
1220
+ 5.4
1221
+ Ablation studies
1222
+ We will now explore the effect of different components of our
1223
+ proposed approach.
1224
+ Effectiveness of Gaussian estimation and OOD sample pre-
1225
+ diction: Similar to previous approaches, we analyze the sensitivity
1226
+ of the hyper-parameter 𝑘 to observe the effects of modifying the
1227
+ labeling criteria for negative samples in the foresighted learning
1228
+ stage. To verify that our Gaussian estimates are accurate, we em-
1229
+ pirically tested the efficiency of the assumed confidence interval
1230
+ (3-𝜎). Figure 2a shows that 3-𝜎 provided the maximum predictive
1231
+ accuracy and best captured the source distribution characteristics.
1232
+ Effect of balancing source and target unlabelled data: We
1233
+ used a balanced source (𝑁𝑠𝑟𝑐) and target (𝑁𝑛𝑒𝑔) domain dataset
1234
+ to train our baseline model. We test the robustness of our model
1235
+ to imbalanced data by varying the 𝑁𝑠𝑟𝑐/𝑁𝑛𝑒𝑔 ratio by ±0.5. We
1236
+ measure the sensitivity of the source and target domain ratio in
1237
+ figure 2b and observe that the proposed approach is robust against
1238
+ data imbalance.
1239
+ Challenging one-shot learning: We observe the efficiency of
1240
+ our incremental learning approach by varying the ratio of samples
1241
+ in the target private classes to the number of shared class samples
1242
+ (|𝐶
1243
+
1244
+ 𝑡 |/|𝐶𝑡). Figure 2d shows the sensitivity of this ratio. Even though
1245
+ a larger number of target private samples improves the accuracy
1246
+ of private guides and private class prediction, prediction accuracy
1247
+ reduces due to the inability of the target classifier to converge under
1248
+ less target shared class data.
1249
+ Effect of class separation loss: We carry out the ablation study
1250
+ by removing the class separation loss. We learn the post-increment
1251
+ accuracy of the target domain classifier without applying the class
1252
+ separation loss (L𝑠1). We observe that the average prediction accu-
1253
+ racy without the loss minimization was 83.45% compared to 92.12%
1254
+ using the class separation loss.
1255
+ 6
1256
+ CONCLUSION
1257
+ In this work, we proposed an approach for an autonomous agent to
1258
+ learn a task incremental learning model in a non-stationary envi-
1259
+ ronment. We explored a one-shot learning approach to reduce the
1260
+ need for collecting labeled data to incrementally update a model.
1261
+ Using a source-free approach, we were able to learn aligned target
1262
+ private prototype guides and learn with very few target-labeled
1263
+ samples. One of the limitations of our approach is the possibility
1264
+ of overfitting after a given number of incremental iterations. We
1265
+ aim to address this limitation in our future work by exploring selec-
1266
+ tive forgetting using recurrent network-based approaches. Another
1267
+
1268
+ Table 4: Incremental disease prediction task: comparison of our proposed method (TIDo) applied to Alzheimer’s disease pre-
1269
+ diction with existing incremental learning, continual learning, and unsupervised domain adaptation methods for a few-shot
1270
+ labeled target (5%), unlabelled target domain data and labeled source domain data. All(%) is the average accuracy for all the
1271
+ classes, Priv(%) is the average accuracy for private classes
1272
+ ADNI 1 (CN/AD) → ADNI 2 → AIBL → ADNI GO → ADNI 3
1273
+ iCARL
1274
+ DANN-TPC
1275
+ CMA-TPC
1276
+ Index
1277
+ All (%)
1278
+ Priv (%)
1279
+ All (%)
1280
+ Priv (%)
1281
+ All (%)
1282
+ Priv (%)
1283
+ 𝑡 + 0
1284
+ 90.01±3.08
1285
+ 88.01±1.29
1286
+ 93.44±2.25
1287
+ 54.91±1.04
1288
+ 80.52±1.70
1289
+ 52.28±1.27
1290
+ 𝑡 + 1
1291
+ 84.91±2.58
1292
+ -
1293
+ 91.81±2.02
1294
+ -
1295
+ 83.78±2.01
1296
+ -
1297
+ 𝑡 + 2
1298
+ 80.92±3.66
1299
+ 71.22±3.02
1300
+ 71.25±4.89
1301
+ 57.05±2.28
1302
+ 82.67±1.18
1303
+ 67.82±4.60
1304
+ 𝑡 + 3
1305
+ 78.32±4.81
1306
+ 70.10±4.12
1307
+ 73.72±4.21
1308
+ 56.81±2.56
1309
+ 84.19±1.29
1310
+ 63.91±5.67
1311
+ CIDA-C
1312
+ LwF-MC
1313
+ TIDo
1314
+ Index
1315
+ All (%)
1316
+ Priv (%)
1317
+ All (%)
1318
+ Priv (%)
1319
+ All (%)
1320
+ Priv (%)
1321
+ 𝑡 + 0
1322
+ 89.32±1.17
1323
+ 82.90±3.16
1324
+ 72.91±0.98
1325
+ 56.68±1.10
1326
+ 91.42±0.79
1327
+ 86.91±1.22
1328
+ 𝑡 + 1
1329
+ 90.76±2.01
1330
+ -
1331
+ 79.91±2.17
1332
+ -
1333
+ 90.08±2.48
1334
+ -
1335
+ 𝑡 + 2
1336
+ 89.62±1.57
1337
+ 90.22±2.78
1338
+ 77.67±2.11
1339
+ 57.52±4.17
1340
+ 90.69±2.20
1341
+ 92.82±1.71
1342
+ 𝑡 + 3
1343
+ 90.32±2.89
1344
+ 88.10±2.11
1345
+ 78.10±1.07
1346
+ 59.24±1.70
1347
+ 92.12±0.91
1348
+ 91.14±0.88
1349
+ (a)
1350
+ (b)
1351
+ (c)
1352
+ (d)
1353
+ Figure 2: Sensitivity study results for task incremental learning on incremental disease staging task (for AD): (a) Effectiveness of
1354
+ Gaussian estimation and OOD sample prediction (Avg. accuracy% for private and all target classes) (b) Data imbalance robust-
1355
+ ness for target task prediction (Avg. accuracy%) (c) Effect of removal of discriminator in the foresighted model (d) Sensitivity
1356
+ on the ratio of private class sample size vs. all class sample size
1357
+ possible limitation of this work would be the use of Gaussian esti-
1358
+ mates to generate replay memory representative samples. We aim
1359
+ to explore adversarial methods to generate representative samples
1360
+ in our future work.
1361
+ REFERENCES
1362
+ [1] 2022. https://www.amazon.com
1363
+ [2] John Blitzer, Koby Crammer, Alex Kulesza, Fernando Pereira, and Jennifer Wort-
1364
+ man. 2008. Learning bounds for domain adaptation. In Advances in neural infor-
1365
+ mation processing systems. 129–136.
1366
+ [3] John Blitzer, Ryan McDonald, and Fernando Pereira. 2006. Domain adaptation
1367
+ with structural correspondence learning. In Proceedings of the 2006 conference on
1368
+
1369
+ empirical methods in natural language processing. Association for Computational
1370
+ Linguistics, 120–128.
1371
+ [4] Youngsang Cho, Joon-Kyung Seong, Yong Jeong, Sung Yong Shin, and Alzheimer’s
1372
+ Disease Neuroimaging Initiative. 2012.
1373
+ Individual subject classification for
1374
+ Alzheimer’s disease based on incremental learning using a spatial frequency
1375
+ representation of cortical thickness data. NeuroImage 59, 3 (01 Feb 2012), 2217–
1376
+ 2230. https://doi.org/10.1016/j.neuroimage.2011.09.085 22008371[pmid].
1377
+ [5] Kathryn A Ellis, Ashley I Bush, David Darby, Daniela De Fazio, Jonathan Foster,
1378
+ Peter Hudson, Nicola T Lautenschlager, Nat Lenzo, Ralph N Martins, Paul Maruff,
1379
+ et al. 2009. The Australian Imaging, Biomarkers and Lifestyle (AIBL) study of
1380
+ aging: methodology and baseline characteristics of 1112 individuals recruited for
1381
+ a longitudinal study of Alzheimer’s disease. International psychogeriatrics 21, 4
1382
+ (2009), 672–687.
1383
+ [6] Yaroslav Ganin, Evgeniya Ustinova, Hana Ajakan, Pascal Germain, Hugo
1384
+ Larochelle, François Laviolette, Mario Marchand, and Victor Lempitsky. 2016.
1385
+ Domain-adversarial training of neural networks. The Journal of Machine Learning
1386
+ Research 17, 1 (2016), 2096–2030.
1387
+ [7] Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in
1388
+ a neural network. arXiv preprint arXiv:1503.02531 (2015).
1389
+ [8] Judy Hoffman, Trevor Darrell, and Kate Saenko. 2014. Continuous manifold based
1390
+ adaptation for evolving visual domains. In Proceedings of the IEEE Conference on
1391
+ Computer Vision and Pattern Recognition. 867–874.
1392
+ [9] Ehsan Hosseini-Asl, Robert Keynton, and Ayman El-Baz. 2016. Alzheimer’s
1393
+ disease diagnostics by adaptation of 3D convolutional network. In 2016 IEEE
1394
+ international conference on image processing (ICIP). IEEE, 126–130.
1395
+ [10] Jogendra Nath Kundu, Rahul Mysore Venkatesh, Naveen Venkat, Ambareesh
1396
+ Revanur, and R Venkatesh Babu. 2020. Class-incremental domain adaptation.
1397
+ In Computer Vision–ECCV 2020: 16th European Conference, Glasgow, UK, August
1398
+ 23–28, 2020, Proceedings, Part XIII 16. Springer, 53–69.
1399
+ [11] Zhizhong Li and Derek Hoiem. 2017. Learning without forgetting. IEEE transac-
1400
+ tions on pattern analysis and machine intelligence 40, 12 (2017), 2935–2947.
1401
+ [12] Siqi Liu, Sidong Liu, Weidong Cai, Hangyu Che, Sonia Pujol, Ron Kikinis, Dagan
1402
+ Feng, Michael J Fulham, et al. 2014. Multimodal neuroimaging feature learning
1403
+ for multiclass diagnosis of Alzheimer’s disease. IEEE transactions on biomedical
1404
+ engineering 62, 4 (2014), 1132–1140.
1405
+ [13] Marc Masana, Xialei Liu, Bartlomiej Twardowski, Mikel Menta, Andrew D Bag-
1406
+ danov, and Joost van de Weijer. 2020. Class-incremental learning: survey and
1407
+ performance evaluation. arXiv preprint arXiv:2010.15277 (2020).
1408
+ [14] Fei Mi, Lingjing Kong, Tao Lin, Kaicheng Yu, and Boi Faltings. 2020. General-
1409
+ ized Class Incremental Learning. In Proceedings of the IEEE/CVF Conference on
1410
+ Computer Vision and Pattern Recognition Workshops. 240–241.
1411
+ [15] Sylvestre-Alvise Rebuffi, Alexander Kolesnikov, Georg Sperl, and Christoph H
1412
+ Lampert. 2017. icarl: Incremental classifier and representation learning. In Pro-
1413
+ ceedings of the IEEE conference on Computer Vision and Pattern Recognition. 2001–
1414
+ 2010.
1415
+ [16] Kate Saenko, Brian Kulis, Mario Fritz, and Trevor Darrell. 2010. Adapting visual
1416
+ category models to new domains. In European conference on computer vision.
1417
+ Springer, 213–226.
1418
+ [17] Kuniaki Saito, Kohei Watanabe, Yoshitaka Ushiku, and Tatsuya Harada. 2018.
1419
+ Maximum classifier discrepancy for unsupervised domain adaptation. In Proceed-
1420
+ ings of the IEEE conference on computer vision and pattern recognition. 3723–3732.
1421
+ [18] Tasfia Shermin, Guojun Lu, Shyh Wei Teng, Manzur Murshed, and Ferdous
1422
+ Sohel. 2020. Adversarial network with multiple classifiers for open set domain
1423
+ adaptation. IEEE Transactions on Multimedia (2020).
1424
+ [19] Eric Tzeng, Judy Hoffman, Kate Saenko, and Trevor Darrell. 2017. Adversar-
1425
+ ial discriminative domain adaptation. In Proceedings of the IEEE Conference on
1426
+ Computer Vision and Pattern Recognition. 7167–7176.
1427
+ [20] Vladimir Vapnik, Esther Levin, and Yann Le Cun. 1994. Measuring the VC-
1428
+ dimension of a learning machine. Neural computation 6, 5 (1994), 851–876.
1429
+ [21] Han Zhao, Shanghang Zhang, Guanhang Wu, José MF Moura, Joao P Costeira,
1430
+ and Geoffrey J Gordon. 2018. Adversarial multiple source domain adaptation. In
1431
+ Advances in neural information processing systems. 8559–8570.
1432
+
ZdFLT4oBgHgl3EQfWC9a/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ZtE2T4oBgHgl3EQfZgcV/content/tmp_files/2301.03864v1.pdf.txt ADDED
@@ -0,0 +1,1171 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–?? (2015)
2
+ Preprint 11 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ MeerKAT discovery of 13 new pulsars in Omega Centauri
5
+ W. Chen,1★ P. C. C. Freire,1 A. Ridolfi,3,1 E. D. Barr,1 B. Stappers,2 M. Kramer,1,2 A. Possenti,3
6
+ S. M. Ransom,4 L. Levin,2 R. P. Breton,2 M. Burgay,3 F. Camilo,5 S. Buchner,5 D. J. Champion,1
7
+ F. Abbate,1 V. Venkatraman Krishnan,1 P. V. Padmanabh,1,8,9 T. Gautam,1 L. Vleeschower,2
8
+ M. Geyer,5 J-M. Grießmeier,6,7 Y. P. Men,1 V. Balakrishnan,1 M. C. Bezuidenhout2
9
+ 1Max-Planck-Institut für Radioastronomie, Auf dem Hügel 69, D-53121 Bonn, Germany
10
+ 2Jodrell Bank Centre for Astrophysics, Department of Physics and Astronomy, The University of Manchester, Manchester M13 9PL, UK
11
+ 3INAF – Osservatorio Astronomico di Cagliari, Via della Scienza 5, I-09047 Selargius (CA), Italy
12
+ 4National Radio Astronomy Observatory (NRAO), 520 Edgemont Rd., Charlottesville, VA 22903 USA
13
+ 5South African Radio Astronomy Observatory (SARAO), 2 Fir Street, Black River Park, Observatory, Cape Town 7925, South Africa
14
+ 6LPC2E - Université d’Orléans / CNRS, 45071 Orléans cedex 2, France
15
+ 7Observatoire Radioastronomique de Nançay (ORN), Observatoire de Paris, Université PSL, Univ Orléans, CNRS, 18330 Nancay, France
16
+ 8 Max Planck Institute for Gravitational Physics (Albert Einstein Institute), D-30167 Hannover, Germany
17
+ 9 Leibniz Universität Hannover, D-30167 Hannover, Germany
18
+ Accepted XXX. Received YYY; in original form ZZZ
19
+ ABSTRACT
20
+ The most massive globular cluster in our Galaxy, Omega Centauri, is an interesting target for pulsar searches, because of its
21
+ multiple stellar populations and the intriguing possibility that it was once the nucleus of a galaxy that was absorbed into the
22
+ Milky Way. The recent discoveries of pulsars in this globular cluster and their association with known X-ray sources was a hint
23
+ that, given the large number of known X-ray sources, there is a much larger undiscovered pulsar population. We used the superior
24
+ sensitivity of the MeerKAT radio telescope to search for pulsars in Omega Centauri. In this paper, we present some of the first
25
+ results of this survey, including the discovery of 13 new pulsars; the total number of known pulsars in this cluster currently stands
26
+ at 18. At least half of them are in binary systems and preliminary orbital constraints suggest that most of the binaries have light
27
+ companions. We also discuss the ratio between isolated and binaries pulsars and how they were formed in this cluster.
28
+ Key words: Pulsar – Globular cluster – Binary
29
+ 1 INTRODUCTION
30
+ Pulsar surveys conducted in Globular clusters (GCs) have yielded
31
+ fruitful rewards in recent decades, with the discovery of a total of
32
+ 261 pulsars1. Per unit of stellar mass, GC have three orders of magni-
33
+ tude more pulsars than the Galactic disk. The reason for this is their
34
+ large stellar densities: these prompt stellar interactions (Verbunt &
35
+ Hut 1987) where old, dead Neutron stars (NSs) acquire new main
36
+ sequence (MS) companions. These then evolve, forming X-ray bi-
37
+ naries (also exceptionally numerous in GCs, Clark 1975), where the
38
+ NS is being spun up by accretion of matter from the MS star. When
39
+ the accretion stops, these systems become millisecond pulsar (MSP)
40
+ binaries, which have nearly circular orbits and low-mass companions
41
+ (Bhattacharya & van den Heuvel 1991). Indeed, the pulsar population
42
+ in GCs is dominated by such binaries.
43
+ However, in some cases, additional exchange encounters can orig-
44
+ inate different end products. If they happen during the X-ray binary
45
+ phase, they can disrupt the binary and produce many single and/or
46
+ ★ E-mail: [email protected]
47
+ 1 https://www3.mpifr-bonn.mpg.de/staff/pfreire/GCpsr.html
48
+ partially recycled pulsars, which are not only slower, but appear to be
49
+ much younger than the GC population (Verbunt & Freire 2014). Such
50
+ encounters can also replace a pulsar’s companion by a much more
51
+ massive degenerate object, resulting in massive, eccentric binary
52
+ MSPs unlike any seen in the Galactic disk (e.g., Freire et al. 2004;
53
+ Lynch et al. 2012; DeCesar et al. 2015; Ridolfi et al. 2021, 2022). If
54
+ the massive companions happen to be stellar-mass black holes, these
55
+ systems could be superb test-beds for fundamental physics (Liu et al.
56
+ 2014).
57
+ Such exotic pulsar binaries are generally observed in GCs with
58
+ very dense cores, especially core-collapsed clusters; these are the
59
+ types of environments where each particular binary is likely to go
60
+ through more than one disruptive stellar encounter (Verbunt & Freire
61
+ 2014). Thus, the pulsar population in a GC, and the types of binaries
62
+ the pulsars find themselves in, reflects not only its current dynami-
63
+ cal status, but also the cluster’s previous evolution (Benacquista &
64
+ Downing 2013).
65
+ © 2015 The Authors
66
+ arXiv:2301.03864v1 [astro-ph.HE] 10 Jan 2023
67
+
68
+ 2
69
+ W. Chen et al.
70
+ 1.1 The Omega Centauri globular cluster
71
+ Omega Centauri (𝜔-Cen, also known as NGC 5139), the largest GC
72
+ in our Galaxy, is a natural target to search for pulsars. It is located
73
+ in the constellation of Centaurus and is 5.2 kpc away from the Sun,
74
+ with an age of 11.52 Gyr (Forbes & Bridges 2010). Besides its size
75
+ and large number of stars, it differs from other GCs because of its
76
+ intricate composition of different populations of stars (Bedin et al.
77
+ 2004). This could indicate that 𝜔-Cen is the merger of several clus-
78
+ ters, like the Sagittarius dwarf galaxy (Ibata et al. 1994). Moreover,
79
+ it was found to be rich in calcium and heavy metals (Lee et al. 2009),
80
+ which is a tracer of supernovae explosions. However these materials
81
+ ejected by the explosion could not be sustained by the current grav-
82
+ itational potential of the cluster. This along with the multiple stellar
83
+ populations supports the long established idea that 𝜔-Cen is the relic
84
+ of a former disrupted dwarf galaxy (Hilker & Richtler 2000; Ibata
85
+ et al. 2019).
86
+ Unassociated high-energy emission in GCs is thought to originate
87
+ from MSPs (Venter et al. 2009) as supported by observations, (e.g.
88
+ Abdo et al. 2009). 𝛾-ray emission has been detected in several GCs
89
+ by the Fermi Large Area Telescope (Abdo et al. 2010), including
90
+ those that, at the time, had no previously known pulsars, such as
91
+ 𝜔-Cen.
92
+ Additionally, ∼30 unassociated X-ray sources have been found
93
+ within the core of 𝜔-Cen to have luminosities similar to the emission
94
+ of pulsars in other GCs (Henleywillis et al. 2018). However, previous
95
+ searches for pulsars in this cluster turned out to be unsuccessful
96
+ (Edwards et al. 2001; Possenti et al. 2005; Camilo et al. 2015).
97
+ Notwithstanding, in 2019, Dai et al. (2020) carried out a search for
98
+ pulsars using the new Ultra-wide Bandwidth receiver (UWL, Hobbs
99
+ et al. 2020) of the 64-m "Murriyang" radio telescope at Parkes, NSW,
100
+ Australia. This finally allowed the discovery of the first 5 MSPs in
101
+ 𝜔-Cen. Among these, PSR J1326−4728B is in an eclipsing binary
102
+ system with a light companion, and it is associated with an X-ray
103
+ source (Henleywillis et al. 2018). The authors suggested that the
104
+ non-detection of pulsars from the previous searches on this cluster
105
+ was caused by the lack of sensitivity of previous surveys. Given the
106
+ large distance of 𝜔-Cen (and other GCs in general) it is clear that
107
+ we are only detecting the very brightest pulsars in them. This means
108
+ that more sensitive telescopes would in principle detect many more
109
+ pulsars in this and other globular clusters.
110
+ 1.2 The MeerKAT survey
111
+ The MeerKAT 64-antenna array, located in the Karoo desert in South
112
+ Africa, (Jonas & MeerKAT Team 2016; Camilo 2018) started sci-
113
+ entific observations in late 2019, becoming, by far, the most radio
114
+ sensitive radio telescope in the Southern Hemisphere. Numerous tar-
115
+ geted observations and surveys of pulsars have been carried out since
116
+ and are producing significant results. For example, the TRAnsients
117
+ and PUlsars with MeerKAT (TRAPUM, Stappers & Kramer 2016)
118
+ Large Survey Project aims to increase the total known population
119
+ of pulsars, and discover peculiar binary pulsars that might be suit-
120
+ able for studies of fundamental physics and stellar evolution. This
121
+ project has so far discovered 156 pulsars2. About one-third of these
122
+ (e.g. Ridolfi et al. 2021; Douglas et al. 2022; Ridolfi et al. 2022;
123
+ Vleeschower et al. 2022; Abbate et al. 2022), are found in various
124
+ GCs, including 47 Tucanae (Chen et al., in prep.), a cluster that has
125
+ been searched for over 20 years.
126
+ 2 http://www.trapum.org/discoveries/
127
+ Given the small beams produced by the phased interferometer,
128
+ pulsars surveys need a beamformer in order to cover as much sky
129
+ simultaneously as possible. The beam former developed by Barr
130
+ (2018) and Chen et al. (2021) can generate up to 1000 coherent
131
+ beams that cover a significant part of the primary field of view of an
132
+ individual antenna, with high time and frequency resolution. Such
133
+ a large number of beams is essential for blind surveys (which cover
134
+ mostly the Galactic plane), but they are also important for GCs.
135
+ Indeed, even though GCs have a relatively small angular size on
136
+ the sky, we still often need hundreds of beams to cover their half-
137
+ mass radii, which are the regions where most pulsars are likely to
138
+ be located. This is especially true in the case of 𝜔-Cen, which is the
139
+ most massive and has the largest projected size among all known
140
+ GCs.
141
+ In this paper, we report the result of the searches for the new pul-
142
+ sars in two observations of 𝜔-Cen made with MeerKAT. Section 2
143
+ describes the observational parameters and analysis of the recorded
144
+ data. Section 3 presents the new discoveries, while Section 4 dis-
145
+ cusses the uncovered pulsar population and its implications in our
146
+ understanding of the cluster.
147
+ 2 OBSERVATIONS AND DATA ANALYSIS
148
+ 2.1 Observations
149
+ We carried out two multibeam observations of 𝜔-Cen with MeerKAT
150
+ on 2021 March 21 and 26, as part of the TRAPUM GC survey. The
151
+ cluster was observed for 4 hours in each observation using the L-
152
+ band receivers, which cover the 856–1712 MHz frequency range.
153
+ The coherent beams were synthesised using the Filterbanking Beam-
154
+ Former User-Supplied Equipment (FBFUSE, Barr 2018). A tiling of
155
+ 704 coherent beams was generated by mosaic3 to cover the cluster,
156
+ as shown in Figure 1. This was centred at the nominal centre of
157
+ 𝜔-Cen, at equatorial coordinates (J2000) 13:26:47.24, −47:28:46.5
158
+ and Galactic coordinates 309.10, 14.97 (Harris 2010), covering a
159
+ circular region of 7.53 arcmin in radius, i.e. roughly twice the size
160
+ of the half-light radius of the cluster. During both observations, 60
161
+ antennas were used. To create a hexagonal tiling, the corresponding
162
+ synthesised beam shape was approximated by an ellipse whose ma-
163
+ jor and minor axis were 20.46 arcseconds and 9.32 arcseconds at the
164
+ middle of the observation on March 21. The method and performance
165
+ of such approximation is discussed in Chen et al. (2021). The March
166
+ 26 observation started at almost the same hour angle, so the beam
167
+ shape is very similar.
168
+ For each beam, the observing band was split into 2048 chan-
169
+ nels and recorded every 153.12 𝜇s as filterbank search-mode files
170
+ by Accelerated Pulsar Search User Supplied Equipment (APSUSE)
171
+ computing cluster. Once the observation was over, the frequency
172
+ channels were summed in groups of 16 after being incoherently de-
173
+ dispersed at the dispersion measure (DM) of 97 pc cm−3, about the
174
+ average of the previously known 5 pulsars in 𝜔-Cen. The resulting
175
+ sub-banded data preserved 128 channels, significantly reducing the
176
+ total data volume. With this resolution, the intra-channel smearing
177
+ time is 1.57 ms, at the lowest channel and the upper bound of the
178
+ search DM.
179
+ 3 https://github.com/wchenastro/Mosaic
180
+ MNRAS 000, 1–?? (2015)
181
+
182
+ Discovery of 13 new pulsars in 𝜔-Centauri
183
+ 3
184
+ 2.2 Sensitivity
185
+ We calculate a minimum detectable flux density of Smin = 10 𝜇Jy for
186
+ our search on a 4-hour observation, following the modified radiome-
187
+ ter equation given by Dewey et al. (1985):
188
+ 𝑆min =
189
+ S/N 𝛽 𝑇sys
190
+ EFFT 𝐺√︁𝑛pol 𝐵 Δ 𝑡obs
191
+ √︄
192
+ 𝜁
193
+ 1 − 𝜁
194
+ (1)
195
+ where S/N is the minimal signal-to-noise of 10 for a valid de-
196
+ tection; 𝛽 is the correction factor of 1.01 to compensate the loss of
197
+ sensitivity during the digitization process; 𝑇sys is the system temper-
198
+ ature of about 26 K4, including the contribution from the receiver
199
+ temperature of 18 K, the sky temperature of about 3.5 K at L-band
200
+ and the combination of the spillover noise and the atmosphere of
201
+ about 4.5 K; EFFT is the FFT search efficiency which is 0.7 accord-
202
+ ing to Morello et al. (2020); G is the combined gain of the array,
203
+ which is 2.65 K Jy−1 when 60 antennas are used; 𝑛pol is the number
204
+ of polarizations, which is 2 while using the total power beamformer
205
+ in TRAPUM observations; 𝐵 is the effective receiver bandwidth of
206
+ about 640 MHz, after removing the channels affected by RFI; Δ𝑡obs
207
+ is the integration time which was 4 hours for both observations; 𝜁 is
208
+ the pulse’s apparent duty cycle, which we consider to be 8% with the
209
+ broadening effects from interstellar medium and the instrument.
210
+ 2.3 Data reduction and search pipeline
211
+ The data were transferred to Germany from South Africa in hard
212
+ drives. Searches for periodic signals were carried out using the Her-
213
+ cules computing cluster5. For this work, we restricted our search to
214
+ the beams located within the half-light radius of 𝜔-Cen. The search
215
+ of an individual beam started with an RFI mitigation procedure using
216
+ filtool6. It applies two major operations on the filterbank data ac-
217
+ cording to the statistical analysis. Assuming that the noise follows a
218
+ Gaussian distribution, it calculates the kurtosis of samples in certain
219
+ time unit across the full band, to obtain the deviation of each channel
220
+ then replace the outlying ones with the mean. Similarly, it calculates
221
+ the skewness of the samples to identify RFIs because they are often
222
+ non-Gaussian. After this, it normalizes the data across channels so
223
+ that each channel has an average of 0 and a variance of 1.
224
+ The resulting filterbank data were fed to a pulsar search pipeline
225
+ supervised by pulsar_miner7. The pipeline is based on various pro-
226
+ grams and utilities from presto8 (Ransom 2011), a pulsar search and
227
+ analysis toolkit. It first uses rfifind to examine the data and flag the
228
+ narrow and wide band interference. The operation outputs a report
229
+ and a mask for later use. Free electrons in the interstellar medium
230
+ engaging with passing electromagnetic waves leads to arrival delays
231
+ across channels, which are quantified as Dispersion Measure (DM).
232
+ Thus, signals with 0 DM are terrestrial which were identified by
233
+ prepdata and zapped. After that, the data were split into segments
234
+ of different lengths, to be sensitive to binary pulsars with different
235
+ orbital periods (Ransom et al. 2003). The chosen lengths of the seg-
236
+ ments were 10, 20, 30, 60, 120 minutes, in addition to the full length
237
+ (4 h) of each observation. Each of these segments were de-dispersed
238
+ 4 https://skaafrica.atlassian.net/rest/servicedesk/
239
+ knowledgebase/latest/articles/view/277315585
240
+ 5 https://docs.mpcdf.mpg.de/doc/computing/clusters/
241
+ systems/Radioastronomy.html
242
+ 6 https://github.com/ypmen/PulsarX
243
+ 7 https://github.com/alex88ridolfi/PULSAR_MINER
244
+ 8 https://github.com/scottransom/presto
245
+ into time series using a number of trial DMs. The step between
246
+ these DMs were set to 0.1 pc cm−3 which were determined using
247
+ DDplan.py, a program that generates suitable de-dispersion schemes
248
+ considering the DM range, central frequency, sampling time, number
249
+ of channels and other parameters. The final range of DMs searched
250
+ was 85–115 pc cm−3, which is slightly wider than the range of 90–
251
+ 110 used in Dai et al. (2020). Each time series was then searched for
252
+ periodic signals in the Fourier domain using accelsearch (Ransom
253
+ et al. 2002). In order to account for the drifting of the frequency of a
254
+ signal due to orbital motion, accelsearch searches for signals that
255
+ drift linearly over multiple Fourier bins. The maximum number of
256
+ bins drifted is set by the zmax parameter, which was chosen to be 200
257
+ in our search. The candidates from the search went through a sifting
258
+ process, where only the ones with S/Ns higher than 4 and within the
259
+ interested DM and period ranges were delivered to the next stage.
260
+ In the final step, the sifted candidates were folded using prepfold
261
+ with an extra optimization on the period and DM. The plots of these
262
+ candidates were inspected by eye.
263
+ 3 DISCOVERIES
264
+ Our search resulted in the discovery of 13 new pulsars in the beams
265
+ that were analyzed in this work (shown with blue edges in Figure
266
+ 1). Seven of them are in binary systems and we are able to place
267
+ orbital constraints based on two observations. The results show that
268
+ their orbital periods fall into two groups: below 4 hours and around
269
+ 1 day. Notably, all except one have light companions. Other than the
270
+ new discoveries, we also re-detected all the previously known pulsars
271
+ (Dai et al. 2020) in the cluster. The properties of all the new pulsars
272
+ and which segment they were discovered, are listed in Table 1, while
273
+ their integrated profiles are shown in Figure 2. The distribution of
274
+ their spin periods are presented in Figure 4. In the remainder of the
275
+ section, we discuss their characteristics in more detail.
276
+ 3.1 Isolated pulsars
277
+ From our two observations, PSRs J1326−4728F, J, M, O, P and R
278
+ appear to be isolated, because they do not show changes to their
279
+ barycentric period to within the limits of the uncertainty. Most of
280
+ them are within the core radius of the cluster (located at 2.37 arcmin
281
+ from the nominal center of 𝜔-Cen), while pulsar M is near the edge
282
+ of the core and pulsar R is between the core and half light radius (at
283
+ 5.00 arcmin). Among them, J1326−4728J has a period of 1.84 ms,
284
+ making it the fastest spinning pulsar so far discovered in this cluster.
285
+ It also has a large duty-cycle of 43.7%. For J1326−4728O and P,
286
+ there were harmonic detections with similar S/N, it is ambiguous as
287
+ to the number of peaks in the profile and thus the spin period is also
288
+ ambiguous, further observations with polarimetric capability should
289
+ resolve these ambiguities. The isolated pulsars discovered in these
290
+ two observations are relatively weak compared to the re-detections
291
+ of the known pulsars discovered in Dai et al. (2020), suggesting that
292
+ the sensitivity could be one of the reasons why the new pulsars were
293
+ not detected in the previous observations with Parkes.
294
+ 3.2 Binary pulsars
295
+ More than half of the discoveries in this work reside in binaries.
296
+ To obtain their orbital parameters, the data were first split into seg-
297
+ ments, from which time-dependent barycentric period and period
298
+ derivative estimates could be made. An example of such practice for
299
+ MNRAS 000, 1–?? (2015)
300
+
301
+ 4
302
+ W. Chen et al.
303
+ 13h27m15s
304
+ 00s
305
+ 26m45s
306
+ 30s
307
+ -47°24'
308
+ 27'
309
+ 30'
310
+ 33'
311
+ RA
312
+ DEC
313
+ F
314
+ M
315
+ O
316
+ P
317
+ Q
318
+ R
319
+ G
320
+ H
321
+ I
322
+ J
323
+ K
324
+ L
325
+ N
326
+ Dai et al. 2020
327
+ TRAPUM
328
+ Core
329
+ Half light
330
+ Figure 1. Tiling and detections. Shown is the beam tiling pattern at the start of the observation generated by mosaic on sky, centred at the optical centre (denote
331
+ with a cross) of 𝜔-Cen. The radii of the core and the half light (Harris 2010) are denoted using dashed line and dash-dotted lines. The beams with blue edges
332
+ were searched for pulsars in this work, roughly cover the region within the half light radius. Lower right is a zoom-out view of the tiling. The position indicated
333
+ by green with black edges are known sources published in (Dai et al. 2020). The positions indicated by black are the new discoveries in this paper. Bold face
334
+ indicates that they have timing positions (A and B) or their positions have been constrained using multibeam detections. Others were placed at the centers of the
335
+ beams where they have the brightest detections.
336
+ J1326−4728G is shown in Figure 3. With these segmental sets of val-
337
+ ues, the orbital parameters were fit assuming a circular orbit, using
338
+ the fit_circular_orbit.py Python script from presto. These
339
+ solutions were then used as the initial guess for the orbital param-
340
+ eter when constructing an initial ephemeris for each binary pulsar.
341
+ Subsequently, these ephemerides were iteratively improved by pulsar
342
+ timing using the tempo9 software package. According to the current
343
+ ephemerides, pulsar J1326−4728I, N and Q have orbits longer than
344
+ the observation, wherefore, the solution of these orbits are not unique
345
+ and subject to change where more data are available.
346
+ J1326−4728G and H have periods of 3.30 and 2.52 ms, respec-
347
+ tively. The former was found near the edge of the core and was
348
+ detected brightly in both epochs and in neighbouring beams, the
349
+ latter was found near the centre of the cluster. Preliminary orbital
350
+ solutions suggest that they have orbits of approx. 2.61 hours and 2.36
351
+ hours, respectively. According to the mass function and assuming
352
+ 9 https://sourceforge.net/projects/tempo
353
+ the mass of the pulsar is 1.4 M⊙ (also for the following paragraphs),
354
+ the mass range of the companion of J1326−4728G is [0.018, 0.042]
355
+ M⊙ when the inclination angle between the orbital plane and the
356
+ light of sight is 0◦ and 64◦. The upper bound was chosen such that
357
+ the range covers 90% of the cases (Lorimer & Kramer 2004), as-
358
+ suming the orbital planes are isotropically distributed. Similarly, the
359
+ mass range of the companion of J1326−4728H is [0.011, 0.024] M⊙.
360
+ The orbital periods and minimum companion masses fall within the
361
+ typical range of expected values for “black widow” systems (Roberts
362
+ 2013). Though, no eclipses, which are often seen in such systems, are
363
+ observed in these two observations. But considering the tight orbits,
364
+ low mass companions and rapid spin periods, it is very likely they
365
+ are black widows.
366
+ J1326−4728K and L have periods of 4.71 and 3.53 ms, respec-
367
+ tively. The former was discovered close to the edge of the core and
368
+ was brightly detected in both epochs and in neighbouring beams, the
369
+ latter was discovered between the radii of the core and the half light.
370
+ An interpulse can be clearly observed in the profile of J1326−4728K.
371
+ Fits to the detected spin period and spin period derivatives suggest
372
+ MNRAS 000, 1–?? (2015)
373
+
374
+ Discovery of 13 new pulsars in 𝜔-Centauri
375
+ 5
376
+ Table 1. List of discoveries from this work and their properties. The DMs were give by prefold, the orbital parameters were derived using tempo, the positions
377
+ were localized using SeeKAT and the numbers in parentheses of the positions represent 2-𝜎 uncertainty of the last digit. The search lengths are the length of
378
+ segments which the pulsars were discovered (see section 2.3).
379
+ Pulsar
380
+ Type
381
+ 𝑃
382
+ DM
383
+ 𝑃𝑏
384
+ 𝑥𝑝
385
+ 𝑀min
386
+ 𝑐
387
+ 𝛼
388
+ 𝛿
389
+ Search length
390
+ (ms)
391
+ (pc cm−3)
392
+ (d)
393
+ (lt-s)
394
+ M⊙
395
+ J2000
396
+ J2000
397
+ (h)
398
+ F
399
+ Isolated
400
+ 2.27
401
+ 98.29
402
+ -
403
+ -
404
+ -
405
+ 13h26m53s(1)
406
+ −47◦28′28′′(6)‡
407
+ 4
408
+ G
409
+ Binary
410
+ 3.30
411
+ 99.69
412
+ 0.1087597(1)
413
+ 0.032203(7)
414
+ 0.018
415
+ 13h26m37s.1(2)
416
+ −47◦29′41′′(1)
417
+ 0.5
418
+ H
419
+ Binary
420
+ 2.52
421
+ 98.09
422
+ 0.1356948(5)
423
+ 0.021844(9)
424
+ 0.011
425
+ 13h26m44s(1)
426
+ −47◦28′55′′(4)
427
+ 0.5
428
+ I
429
+ Binary
430
+ 18.95
431
+ 102.2
432
+ 1.113(1)♭
433
+ 0.165(1)
434
+ 0.020
435
+ 13h26m29s.0(1)
436
+ −47◦30′24′′(1)
437
+ 4
438
+ J
439
+ Isolated
440
+ 1.84
441
+ 97.28
442
+ -
443
+ -
444
+ -
445
+ 13h26m51s.7(1)
446
+ −47◦27′09′′(1)
447
+ 4
448
+ K
449
+ Binary
450
+ 4.72
451
+ 94.73
452
+ 0.09387146(2)
453
+ 0.067945(5)
454
+ 0.043
455
+ 13h26m38s.1(1)
456
+ −47◦27′39′′(2)
457
+ 0.5
458
+ L
459
+ Binary
460
+ 3.54
461
+ 101.5
462
+ 0.1589282(4)
463
+ 0.061809(9)
464
+ 0.027
465
+ 13h27m02s.8(1)
466
+ −47◦26′49′′(2)
467
+ 0.5
468
+ M
469
+ Isolated
470
+ 4.60
471
+ 101.4
472
+ -
473
+ -
474
+ -
475
+ 13h26m59s(1)
476
+ −47◦30′09′′(6)‡
477
+ 4
478
+ N
479
+ Binary
480
+ 6.88
481
+ 101.2
482
+ 1.0816(3)♭
483
+ 0.1250(3)
484
+ 0.015
485
+ 13h26m49s.8(1)
486
+ −47◦31′25′′(1)
487
+ 4
488
+ O
489
+ Isolated
490
+ 6.16
491
+ 94.27
492
+ -
493
+ -
494
+ -
495
+ 13h26m48s(1)
496
+ −47◦27′19′′(6)‡
497
+ 4
498
+ P
499
+ Isolated
500
+ 2.79
501
+ 102.1
502
+ -
503
+ -
504
+ -
505
+ 13h26m45s(1)
506
+ −47◦29′42′′(6)‡
507
+ 4
508
+ Q
509
+ Binary
510
+ 4.13
511
+ 95.92
512
+ 1.18(8)♭
513
+ 1.1(1)
514
+ 0.138
515
+ 13h26m35s(1)
516
+ −47◦27′54′′(6)‡
517
+ 2
518
+ R
519
+ Isolated
520
+ 10.29
521
+ 102.1
522
+ -
523
+ -
524
+ -
525
+ 13h27m10s(1)
526
+ −47◦29′02′′(6)‡
527
+ 4
528
+ Note:
529
+ ♭The orbits of these pulsars are longer than the observation, the values shown here are derived from two observations, hence they are subject to change when
530
+ more data are available.
531
+ ‡ The position of these pulsars was denoted by the centers of the beams where they are detected with highest S/N. Because of the lack of or faint detection in
532
+ their neighbouring beams, further localization is not practical with SeeKAT.
533
+ Intensity
534
+ Frequency
535
+ 0
536
+ 1
537
+ Phase
538
+ Time
539
+ J1326-4728F
540
+ Intensity
541
+ Frequency
542
+ 0
543
+ 1
544
+ Phase
545
+ Time
546
+ J1326-4728G
547
+ Intensity
548
+ Frequency
549
+ 0
550
+ 1
551
+ Phase
552
+ Time
553
+ J1326-4728H
554
+ Intensity
555
+ Frequency
556
+ 0
557
+ 1
558
+ Phase
559
+ Time
560
+ J1326-4728I
561
+ Intensity
562
+ Frequency
563
+ 0
564
+ 1
565
+ Phase
566
+ Time
567
+ J1326-4728J
568
+ Intensity
569
+ Frequency
570
+ 0
571
+ 1
572
+ Phase
573
+ Time
574
+ J1326-4728K
575
+ Intensity
576
+ Frequency
577
+ 0
578
+ 1
579
+ Phase
580
+ Time
581
+ J1326-4728L
582
+ Intensity
583
+ Frequency
584
+ 0
585
+ 1
586
+ Phase
587
+ Time
588
+ J1326-4728M
589
+ Intensity
590
+ Frequency
591
+ 0
592
+ 1
593
+ Phase
594
+ Time
595
+ J1326-4728N
596
+ Intensity
597
+ Frequency
598
+ 0
599
+ 1
600
+ Phase
601
+ Time
602
+ J1326-4728O
603
+ Intensity
604
+ Frequency
605
+ 0
606
+ 1
607
+ Phase
608
+ Time
609
+ J1326-4728P
610
+ Intensity
611
+ Frequency
612
+ 0
613
+ 1
614
+ Phase
615
+ Time
616
+ J1326-4728Q
617
+ Intensity
618
+ Frequency
619
+ 0
620
+ 1
621
+ Phase
622
+ Time
623
+ J1326-4728R
624
+ Figure 2. Profiles of the new pulsars folded with 4 hours of data taken on 26 March 2021. The Y-axis is intensity, frequency and time from top to bottom panels,
625
+ and X-axis is the phase window from 0 to 1.
626
+ MNRAS 000, 1–?? (2015)
627
+
628
+ 6
629
+ W. Chen et al.
630
+ 0
631
+ 1
632
+ 2
633
+ 3
634
+ 4
635
+ 5
636
+ 6
637
+ 7
638
+ Time (30 min) + MJD 59294.7544
639
+ 3.30432
640
+ 3.30434
641
+ 3.30436
642
+ 3.30438
643
+ 3.30440
644
+ 3.30442
645
+ 3.30444
646
+ Period (ms)
647
+ Figure 3. Changes of periods of J1326−4728G during the first four-hour
648
+ observation. The data points are 30- minute segments and the curve is an
649
+ orbital fit of the period changes given by fit_circular_orbit.py.
650
+ 0
651
+ 2
652
+ 4
653
+ 6
654
+ 8
655
+ 10
656
+ 12
657
+ 14
658
+ 16
659
+ 18
660
+ Period (ms)
661
+ 0
662
+ 1
663
+ 2
664
+ 3
665
+ 4
666
+ 5
667
+ 6
668
+ 7
669
+ Count
670
+ Dai et al. 2020
671
+ TRAPUM
672
+ Figure 4. Distribution of spin period of pulsars in 𝜔-Cen.
673
+ orbits of about 2.25 and 3.81 hours, with the ranges of companion
674
+ masses of [0.043, 0.101] M⊙ and [0.027, 0.063] M⊙, respectively.
675
+ Again, these are values typical of black widow systems. For pulsars
676
+ K and L, however, eclipses are clearly seen in both observations.
677
+ J1326−4728I has a spin period of 18.95 ms with a relatively large
678
+ duty cycle of 29.7%. It is found between the radius of the core and
679
+ of the half light of the cluster. The profile can be phase-aligned well,
680
+ assuming a constant line-of-sight acceleration in each observation.
681
+ However, the sign of the acceleration changed between two observa-
682
+ tions. This suggests that the pulsar is moving in a binary system with
683
+ an orbit that is significant longer than the length of our observations.
684
+ The orbital solution suggests that it has an orbit of 26.71 hours and
685
+ its companion has a mass range of [0.020, 0.046] M⊙. Additionally,
686
+ the period of the pulsar indicates it might be a mildly recycled pul-
687
+ sar. But without an accurate period derivative, other binary evolution
688
+ scenario cannot be ruled out. Further observations could shed light
689
+ on the nature of this pulsar.
690
+ J1326−4728N and Q have periods of 6.88 and 4.13 ms. They were
691
+ both discovered at the edge of the core. Their orbital parameters
692
+ suggest orbits of about 25.96 and 28.41 hours, with mass ranges
693
+ of their companions of [0.015, 0.035] M⊙ and [0.138, 0.342] M⊙,
694
+ respectively. It is difficult to constrain the orbital parameters for
695
+ J1326−4728N, which could be partially due to the low and uneven
696
+ orbital phase coverage during two observations. Pulsar Q was brightly
697
+ detected in one observation, but could not be re-detected in the
698
+ expected beam in the other observation. There are, however, very
699
+ 201.6552
700
+ 201.6548
701
+ 201.6544
702
+ 201.654
703
+ RA ( )
704
+ -47.495
705
+ -47.4948
706
+ Dec ( )
707
+ 1 arcsec
708
+ 201.66
709
+ 201.6596
710
+ 201.6592
711
+ 201.6588
712
+ 201.6583
713
+ 201.6579
714
+ RA ( )
715
+ -47.4614
716
+ -47.4611
717
+ -47.4608
718
+ -47.4606
719
+ Dec ( )
720
+ 1 arcsec
721
+ Figure 5. Localization and nearby X-ray sources. Top: localization result of
722
+ J1326−4728G, red cross is the best position given by SeeKAT, black cross is
723
+ the position of the nearest X-ray source 24f from Henleywillis et al. (2018).
724
+ Blue shades are the likelihood map of the position. The solid line and dashed
725
+ line are 1-𝜎 and 2-𝜎 confident levels of the result. Bottom: localization result
726
+ of J1326−4728K and the position of the nearest X-ray source 21d.
727
+ faint detections in two of the neighbouring beams of that nearest
728
+ beam. The companion mass of Q indicates that it could be a helium
729
+ white dwarf. Follow-up observations are crucial for improving the
730
+ orbital solutions of these two pulsars.
731
+ 3.3 Localization and correlation with X-ray emission
732
+ About half of the new pulsars were detected in multiple neighbouring
733
+ beams, allowing their positions to be constrained to a precision bet-
734
+ ter than the size of the coherent beam. The localization was carried
735
+ out using the SeeKAT10 multibeam localization software (Bezuiden-
736
+ hout et al., submitted). It performs maximum-likelihood estimation
737
+ to obtain the best position. The likelihood is calculated by testing
738
+ the theoretical gain of the position given by a constant point spread
739
+ function (PSF), against the S/N’s of the neighbouring detections. The
740
+ PSFs were generated using mosaic with the observational parame-
741
+ ters.
742
+ 10 https://github.com/BezuidenhoutMC/SeeKAT
743
+ MNRAS 000, 1–?? (2015)
744
+
745
+ Discovery of 13 new pulsars in 𝜔-Centauri
746
+ 7
747
+ Table 2. Positions of the known pulsars localized with SeeKAT. The numbers
748
+ in parentheses represent 2-𝜎 uncertainty of the last digit.
749
+ Pulsar
750
+ 𝛼
751
+ 𝛿
752
+ J2000
753
+ J2000
754
+ A
755
+ 13h26m39s.7(1)
756
+ −47◦30′11′′(2)‡
757
+ B
758
+ 13h26m49s.7(1)
759
+ −47◦29′26′′(2)‡
760
+ C
761
+ 13h26m55s.5(1)
762
+ −47◦30′13′′(2)
763
+ D
764
+ 13h26m32s.5(1)
765
+ −47◦28′39′′(4)
766
+ E
767
+ 13h26m42s.6(1)
768
+ −47◦27′22′′(1)
769
+ Note:
770
+ ‡ J1326−4728A and B have timing positions from Dai et al. (2020), which
771
+ are 13h26m39s.670, −47◦30′11′′.64 and 13h26m49s.563, −47◦29′24′′.62.
772
+ Our two observations lasted four hours each, and the PSF changed
773
+ with time. Significant changes of the PSF would lead to deterioration
774
+ of localization quality, therefore we tried to mitigate this effects by
775
+ using the S/N’s and PSFs in different segments of the observations.
776
+ For faint pulsars, it is not practical to obtain detections in short
777
+ segments, in those cases, the PSFs corresponding to the middle of
778
+ the observation were used. The result of the localization were shown
779
+ in Table 1. Apart from the new pulsars, we also perform localization
780
+ with the known pulsars, because three of them have no timing position
781
+ at the moment. The results for the known pulsars are listed in Table
782
+ 2. Here, we present the localization of J1326−4728G and K plotted
783
+ with X-ray sources (24f and 21d) within the 2-𝜎 confident levels
784
+ shown in Figure 5. It is worth noting that multibeam localization
785
+ relies strongly on the accuracy of the PSF and the quality of the data,
786
+ such as errors on the S/N, severity of the RFI, coherence of the signal
787
+ etc., all of which were not considered in this estimation.
788
+ Previous observations made with the Parkes telescope (Dai et al.
789
+ 2020) associated one X-ray source from Henleywillis et al. (2018) to
790
+ PSR J1326−4728B. However, there are many X-ray sources in this
791
+ cluster that are still unassociated. Hence, we compared them with
792
+ the new radio pulsar discoveries and noticed some of the new pulsars
793
+ have nearby X-ray sources within a few arcseconds, such as the
794
+ binaries pulsars J1326-4728G, H, K and L. However, it is difficult to
795
+ deduce a firm association until we obtain more accurate radio timing
796
+ position from follow-up observations. Since we now know that this
797
+ cluster hosts a considerable amount of pulsars, it is likely that some
798
+ of the X-ray emission from this cluster comes from pulsars.
799
+ 4 DISCUSSION
800
+ 4.1 The pulsar population in 𝜔-Cen
801
+ The number of pulsars known in 𝜔-Cen, which was 5 before this
802
+ work, is now 18. Taking the characteristics of the previously known
803
+ pulsars, plus those of Table 1 at face value, we see that the pulsar
804
+ population of 𝜔-Cen appears to be dominated by isolated pulsars.
805
+ Indeed, the previously known isolated pulsars A, C, D, E plus the
806
+ newly discovered isolated pulsars, F, J, M, O, P and R represent 10
807
+ out of a total of 18 pulsars. Furthermore, we can also see that, with the
808
+ exception of Q, all binary pulsars have very low-mass companions,
809
+ typical of what one finds in “black widow” systems. It has been noted
810
+ that black-widow pulsars are more easily formed in GCs (King et al.
811
+ 2003), but their very high faction in 𝜔-Cen is still surprising. Of
812
+ these, three systems (I, N and Q) seem to have orbital periods of just
813
+ over 1 day, the other four have orbital periods smaller than the length
814
+ of one observation, 4 hours.
815
+ However, before we advance with a detailed analysis of the char-
816
+ acteristics of this population, it is important to keep in mind several
817
+ caveats.
818
+ First, about the percentage of isolated pulsars, the low stellar den-
819
+ sity of 𝜔-Cen means that wide binary systems with orbital periods of
820
+ tens or even hundreds of days might be stable in this cluster (as, for
821
+ example, PSR B1310+18A, a 255-day, low-eccentricity binary in the
822
+ globular cluster M53, see Kulkarni et al. 1991). This suggests that
823
+ some of the pulsars that are apparently isolated might, with additional
824
+ observations, be found to be part of wide binary systems, where the
825
+ apparent changes of spin period caused by the orbital motion are less
826
+ pronounced.
827
+ Second, as mentioned above, we have analyzed in our search sev-
828
+ eral stretches of data going up to 4 hours. Finding binaries in such
829
+ long integrations is more difficult than finding isolated pulsars, be-
830
+ cause of the loss of sensitivity caused by the orbital motion; this is
831
+ especially true for cases where the total integration time is of the
832
+ same order as the orbital period. This is the reason why we find, from
833
+ the last column in Table 1, that while all isolated pulsars and longer
834
+ period binaries were discovered in 4-h segments (with the exception
835
+ of Q, which was found in a 2-h segment), no short-period binaries
836
+ were found in such long segments: they were instead found, invari-
837
+ ably, in 30-minute segments. This means that, in this survey, we are
838
+ √︁
839
+ 4/0.5 = 2.83 times more sensitive to very faint isolated MSPs (or
840
+ MSPs with very wide obits) than to short binaries. This means that
841
+ the isolated pulsars and binary pulsars with low accelerations are
842
+ over-represented in our sample relative to the short-period binaries.
843
+ Third, for normal MSP - WD binaries with orbital periods of a few
844
+ days, no orbits can be firmly determined with only two observations;
845
+ to determine their orbits additional observations will be necessary.
846
+ We note in this regard that the 1-day orbits for I, N and Q are
847
+ preliminary, thus these binary MSPs could in principle have more
848
+ massive companions and longer orbital periods.
849
+ Summarizing, and taking these caveats into account, it does appear
850
+ that a) the number isolated MSPs (10 out of 18) is large, but represents
851
+ an over-estimation of the pulsar population of the cluster, because
852
+ they are easier to find and also because some of them could potentially
853
+ be wide binaries; b) the confirmed short-orbit systems (those with
854
+ short orbital periods: B, G, H, K and L) are more numerous than the
855
+ other confirmed longer-period binaries (I, N and Q); their numbers
856
+ are likely to be under-estimated, since we are less sensitive to these
857
+ short-orbit binaries; c) The longer-period binaries might not be fully
858
+ characterized yet, they could have larger orbital periods and more
859
+ massive companions; two of them (I and N) could still have very
860
+ light companions.
861
+ From this, we can conclude firmly that the fraction of black widow
862
+ systems in 𝜔-Cen is unusual. The only comparable GC is M28, where
863
+ they represent half of the total binary population (Douglas et al.
864
+ 2022). However, M28 has vastly different properties, in particular a
865
+ much denser core. In that GC, almost all long-period binaries have
866
+ been either disrupted, or show significant eccentricities or even possi-
867
+ ble signs of having undergone secondary exchange encounters. Only
868
+ the BWs survive because their very short orbital periods make them
869
+ much more difficult to perturb: they are smaller targets and require a
870
+ more energetic encounter for the orbit to change significantly.
871
+ 4.2 Why this pulsar population is surprising
872
+ The total stellar encounter rate (Γ) and the stellar encounter rate per
873
+ binary (𝛾) are functions of the core radius (𝑟𝑐) and central density
874
+ (𝜌𝑐) of the GCs, with Γ ∝ 𝜌1.5
875
+ 𝑐 𝑟2𝑐 and 𝛾 ∝ 𝜌0.5
876
+ 𝑐 𝑟−1
877
+ 𝑐
878
+ (Verbunt & Hut
879
+ 1987; Verbunt & Freire 2014). The first parameter, Γ, gives an ap-
880
+ MNRAS 000, 1–?? (2015)
881
+
882
+ 8
883
+ W. Chen et al.
884
+ proximate prediction of the size of the pulsar population, the second
885
+ gives an approximate prediction of how disturbed the binaries are: in
886
+ GCs with low 𝛾, the population resembles the MSP population in the
887
+ Galactic disk. As 𝛾 increases, more frequent encounters have a higher
888
+ chance of perturbing the orbits of the binaries and on disrupting sys-
889
+ tems, producing more eccentric binaries and more isolated pulsars
890
+ overall. Finally, for core-collapsed clusters with 5 or more pulsars
891
+ known, such as Terzan 1, NGC 6517, NGC 6522, NGC 6624, NGC
892
+ 6752 and M15, the population is completely dominated by isolated
893
+ pulsars, while a large percentage of binaries results from secondary
894
+ exchange encounters (for recent discussions, see Ridolfi et al. 2021,
895
+ 2022).
896
+ 𝜔-Cen has a low stellar density compared to most other GCs
897
+ (103.15L⊙pc−3), which results in rather low values for Γ and 𝛾 of
898
+ respectively 4.3 and 0.11 (these are normalized to the values of the
899
+ GC M4, as in Verbunt & Freire 2014, as in that work we have used
900
+ the values of 𝑟𝑐 and 𝜌𝑐 from Harris 2010). As a comparison, 47 Tuc
901
+ has Γ = 29.2 and 𝛾 = 6.6.
902
+ These Γ values mean that LMXBs and MSP binaries should form
903
+ in 𝜔-Cen at a rate ∼ 7 times smaller than that of 47 Tuc. However,
904
+ the 18 pulsars in 𝜔-Cen are two thirds of the 27 pulsars detected in
905
+ 47 Tuc with the same telescope (MeerKAT) and receivers (L-band,
906
+ see Ridolfi et al. 2021). This is partly a result of the fact that the
907
+ latter searches were done only with a single beam using 44 antennas
908
+ within the 1-km core, not all 64 antennas and many hundreds of
909
+ beams as the search described here; however this difference is in part
910
+ compensated by the larger distance of 𝜔-Cen (5.2 kpc) compared
911
+ to 47 Tuc (4.5 kpc). In any case, 𝜔-Cen is surprisingly effective in
912
+ producing MSPs.
913
+ The low 𝛾 means that, once formed, there is not much chance of a
914
+ significant disruption of these systems: indeed, the interval between
915
+ successive interactions with other stars should be ∼ 60 times larger in
916
+ 𝜔-Cen than in 47 Tuc. In the latter cluster, we see a MSP population
917
+ that resembles the pulsar population of the Galactic disk (except for
918
+ the absence of long-period binaries, see Ridolfi et al. 2016; Freire
919
+ et al. 2017). Therefore, the pulsar population of 𝜔-Cen should also
920
+ be similar to the MSP population in the Galactic disk, which is
921
+ dominated by binaries, in an approximate rate of 4 to 1. As discussed
922
+ above, the fraction of isolated pulsars in 𝜔-Cen appears to be large,
923
+ but this might be mostly due to selection effects, so it is still possible
924
+ that the pulsar population of 𝜔-Cen is dominated by binaries.
925
+ More difficult to explain is the small population of MSP-WD sys-
926
+ tems and long-period binaries. As discussed above, the predominance
927
+ of very tight systems is likely real, and it is not something that can
928
+ be expected from the dynamical characteristics of this GC.
929
+ It is therefore clear that the properties of the pulsar populations
930
+ of 𝜔-Cen cannot be fully explained by two simple parameters like
931
+ Γ and 𝛾: despite selection effects, we can already conclude that this
932
+ cluster has a larger pulsar population than expected from its Γ, too
933
+ many black widow systems and possibly too many isolated pulsars.
934
+ That Γ and 𝛾 do not provide a full description of pulsar populations
935
+ in GCs was already highlighted by Verbunt & Freire (2014) when
936
+ they compared the pulsar populations of NGC 6440/1 with that of
937
+ Terzan 5, which has a similar Γ and 𝛾: the spin period distribution of
938
+ the pulsars in both populations is completely inconsistent. Therefore,
939
+ the characteristics of the pulsar populations in GCs must depend on
940
+ additional factors, like the past evolutionary history of the GCs and
941
+ potentially their metallicity.
942
+ In the specific case of 𝜔-Cen, the past history of the system might
943
+ be of paramount importance. For instance, 𝜔-Cen could have been
944
+ the nucleus of a dwarf galaxy (Hilker & Richtler 2000; Bekki &
945
+ Freeman 2003), alternatively, it might have formed from the merger
946
+ of several different GCs (Calamida et al. 2020). Such explanations
947
+ are motivated by the fact that this GC has multiple stellar populations,
948
+ with different metallicities and ages. Given the typical ages of MSPs
949
+ (many Gyr), the dramatic events in the history of these GCs should
950
+ be of paramount importance for an explanation of the characteristics
951
+ of its pulsar population today.
952
+ We note in this regard that there are other GCs in the Galaxy that
953
+ are known to have multiple stellar populations, and are likely asso-
954
+ ciated with dwarf galaxy systems or are the results of GC mergers.
955
+ Two of the most prominent are Terzan 5, where three distinct stellar
956
+ populations have been found (Ferraro et al. 2009; Origlia et al. 2013),
957
+ and NGC 1851 (Carretta et al. 2011). All have very abundant pulsar
958
+ populations with about 50% and 40% of isolated pulsars respectively
959
+ (e.g., Ransom et al. 2005; Ridolfi et al. 2022). However, their cores
960
+ are so dense that the orbital characteristics of these pulsar popula-
961
+ tions have likely been significantly altered by exchange encounters.
962
+ This is not the case for 𝜔-Cen, where the low Γ and 𝛾 mean that the
963
+ orbital characteristics of the pulsar population have been preserved
964
+ for a long time; they should therefore reflect the earlier evolutionary
965
+ history of the cluster.
966
+ A detailed evaluation of these possibilities is beyond the scope
967
+ of this work, but it will be a profitable exercise, especially after the
968
+ pulsar population in 𝜔-Cen is better characterized.
969
+ 5 SUMMARY AND FUTURE PROSPECTS
970
+ In this paper, we presented the discovery of 13 new pulsars in 𝜔-
971
+ Cen, which more than tripled the population of known pulsars in this
972
+ cluster. They are found within the core and also between the core and
973
+ half light radius of the cluster. Among them, six are isolated pulsars
974
+ and the other seven are binaries. More than half of the binaries have
975
+ orbits less than 4 hours, which is the length of the observations; three
976
+ other binaries have orbital periods of about 1 day, but confirming this
977
+ will require additional observations. All but one of the binaries have
978
+ very light companions and two of them have apparent eclipses.
979
+ Follow-up observations are crucial to improve the orbital param-
980
+ eters of the wide binaries (I, N and Q) and help estimate their com-
981
+ panion masses, which is a first step to an accurate characterization
982
+ of those systems. Additional observations will also be important
983
+ for deriving phase-connected timing solutions. Thanks to the many
984
+ beams systhesised in each observation, we were able to constrain the
985
+ positions of several of the new pulsars and compare them with the
986
+ position of X-ray unassociated sources; for some binaries, there is
987
+ an X-ray source nearby, within a few arcseconds. With timing solu-
988
+ tions, these positions will become orders of magnitude more precise,
989
+ this will either confirm or rule out some of our preliminary associa-
990
+ tions. Multi-wavelength observations should be carried out to check
991
+ if these sources are still emitting X-rays, in order to establish whether
992
+ the emission comes from the pulsars themselves or from ongoing ac-
993
+ cretion. This kind of observations can also be used to investigate
994
+ other X-ray sources that have no radio signals detected because it
995
+ is possible that there is a LMXB system there and the pulsar is still
996
+ accreting. The timing solutions, with precise estimates of accelera-
997
+ tion and proper motions, will also be important for characterizing the
998
+ gravitational field of 𝜔-Cen (Prager et al. 2017; Freire et al. 2017;
999
+ Abbate et al. 2018).
1000
+ The large pulsar population, the large number of isolated pulsars
1001
+ and the fraction of black widow systems are surprising, considering
1002
+ the small encounter rate and the low encounter rate per binary of this
1003
+ GC. These parameters, although useful for an approximate charac-
1004
+ terization of the pulsar population of GCs, clearly do not tell the full
1005
+ MNRAS 000, 1–?? (2015)
1006
+
1007
+ Discovery of 13 new pulsars in 𝜔-Centauri
1008
+ 9
1009
+ story; it is very likely, for instance, that the past dynamical history
1010
+ of the GCs and the stellar evolution in binaries play important roles.
1011
+ This implies that the accurate characterization of the pulsar popula-
1012
+ tions in GCs in general, and 𝜔-Cen in particular, provides valuable
1013
+ material for the study of stellar and cluster evolution. A particularly
1014
+ interesting possibility is that the pulsar population in 𝜔-Cen came
1015
+ from different smaller clusters that might have merged to form it
1016
+ (Calamida et al. 2020).
1017
+ There are still more than half of the total beams outside the half
1018
+ light radius (5′) that have not been searched. Searching them will
1019
+ be important for finding out how centrally condensed the pulsar
1020
+ population of 𝜔-Cen is compared to other clusters. The Parkes survey
1021
+ by Dai et al. (2020), which at L-band has a beam radius of 7.5′, has
1022
+ only found pulsars within, or very near the core, as discovered by our
1023
+ recent MeerKAT localisations and their subsequent pulsar timing.
1024
+ Our discoveries are also mostly within the core, with only five pulsars
1025
+ between 1 and 2 core radii from the centre of the cluster. The number
1026
+ of X-ray sources in 𝜔-Cen decreases significantly beyond 2 core radii,
1027
+ but still presents a detectable excess compared to the background
1028
+ beyond 3 core radii (Henleywillis et al. 2018). This suggests that
1029
+ additional pulsars might be detectable outside the half-light radius,
1030
+ but likely in significantly smaller numbers.
1031
+ The ‘dynamical relaxation time” in the core of 𝜔-Cen is 4 Gyr,
1032
+ while the median relaxation time for the cluster as a whole is 12 Gyr.
1033
+ For 47 Tuc, these numbers are 0.07 and 3.5 Gyr respectively, for
1034
+ Terzan 5, they are 0.037 and 0.34 Gyr respectively (Harris 2010).
1035
+ What this means is that, in 47 Tuc and Terzan 5, enough time has
1036
+ elapsed for mass segregation to occur, all pulsars in these two clusters
1037
+ (with the exception of 47 Tuc X, Ridolfi et al. 2016) have moved to
1038
+ within 2′from their centres, and are likely in dynamical equilibrium
1039
+ with the remaining stars of the cluster (i.e., they are a “relaxed"
1040
+ population, see e.g., Heinke et al. 2005). In 𝜔-Cen, this process
1041
+ takes much longer. This means that the current pulsar distribution,
1042
+ especially outside the core, likely reflects the “original" dynamics of
1043
+ the pulsars within the cluster (either where they formed, or where
1044
+ they were placed by previous interactions of the cluster). A detailed
1045
+ dynamical study of this distribution could thus provide additional
1046
+ clues on the origin of this unusual pulsar population.
1047
+ We also note that future TRAPUM observations with UHF-band
1048
+ (550-1100 MHz) and S-band (1750-3500 MHz) receivers will very
1049
+ likely further increase the population of known pulsars in 𝜔-Cen in
1050
+ all regions by probing different spectral windows.
1051
+ ACKNOWLEDGEMENTS
1052
+ TRAPUM observations used the FBFUSE and APSUSE comput-
1053
+ ing clusters for data acquisition, storage and analysis. These clus-
1054
+ ters were funded and installed by the Max-Planck-Institut für Ra-
1055
+ dioastronomie and the Max-Planck-Gesellschaft. WC, AR and FA
1056
+ acknowledge continuing valuable support from the Max-Planck So-
1057
+ ciety. LV acknowledges financial support from the Dean’s Doctoral
1058
+ Scholar Award from the University of Manchester. APo, AR and
1059
+ MBu gratefully acknowledge financial support by the research grant
1060
+ “iPeska” (P.I. Andrea Possenti) funded under the INAF national call
1061
+ Prin-SKA/CTA approved with the Presidential Decree 70/2016. APo,
1062
+ AR, MBu also acknowledge support from the Ministero degli Af-
1063
+ fari Esteri e della Cooperazione Internazionale - Direzione Generale
1064
+ per la Promozione del Sistema Paese - Progetto di Grande Rile-
1065
+ vanza ZA18GR02. The MeerKAT telescope is operated by the South
1066
+ African Radio Astronomy Observatory, which is a facility of the
1067
+ National Research Foundation, an agency of the Department of Sci-
1068
+ ence and Innovation. SARAO acknowledges the ongoing advice and
1069
+ calibration of GPS systems by the National Metrology Institute of
1070
+ South Africa (NMISA) and the time space reference systems de-
1071
+ partment of the Paris Observatory. The National Radio Astronomy
1072
+ Observatory is a facility of the National Science Foundation operated
1073
+ under cooperative agreement by Associated Universities, Inc. SMR
1074
+ is a CIFAR Fellow and is supported by the NSF Physics Frontiers
1075
+ Center awards 1430284 and 2020265. RPB acknowledges support
1076
+ ERC Starter Grant ‘Spiders’ under the European Union’s Horizon
1077
+ 2020 research and innovation programme (grant agreement number
1078
+ 715051).
1079
+ DATA AVAILABILITY
1080
+ The data underlying this article will be shared on reasonable request
1081
+ to the TRAPUM collaboration.
1082
+ REFERENCES
1083
+ Abbate F., Possenti A., Ridolfi A., Freire P. C. C., Camilo F., Manchester
1084
+ R. N., D’Amico N., 2018, MNRAS, 481, 627
1085
+ Abbate F., et al., 2022, MNRAS, 513, 2292
1086
+ Abdo A. A., et al., 2009, Science, 325, 845
1087
+ Abdo A. A., et al., 2010, ApJS, 187, 460
1088
+ Barr E. D., 2018, in Weltevrede P., Perera B. B. P., Preston L. L.,
1089
+ Sanidas S., eds, IAU symposium and colloquium proceedings se-
1090
+ ries Vol. 337, Pulsar Astrophysics the Next Fifty Years. pp 175–178,
1091
+ doi:10.1017/S1743921317009036
1092
+ Bedin L. R., Piotto G., Anderson J., Cassisi S., King I. R., Momany Y.,
1093
+ Carraro G., 2004, ApJ, 605, L125
1094
+ Bekki K., Freeman K. C., 2003, MNRAS, 346, L11
1095
+ Benacquista M. J., Downing J. M. B., 2013, Living Reviews in Relativity, 16,
1096
+ 4
1097
+ Bhattacharya D., van den Heuvel E. P. J., 1991, Phys. Rep., 203, 1
1098
+ Calamida A., et al., 2020, ApJ, 891, 167
1099
+ Camilo F., 2018, Nature Astronomy, 2, 594
1100
+ Camilo F., et al., 2015, ApJ, 810, 85
1101
+ Carretta E., Lucatello S., Gratton R. G., Bragaglia A., D’Orazi V., 2011,
1102
+ A&A, 533, A69
1103
+ Chen W., Barr E., Karuppusamy R., Kramer M., Stappers B., 2021, Journal
1104
+ of Astronomical Instrumentation, 10, 2150013
1105
+ Clark G. W., 1975, ApJ, 199, L143
1106
+ Dai S., Johnston S., Kerr M., Camilo F., Cameron A., Toomey L., Kumamoto
1107
+ H., 2020, ApJ, 888, L18
1108
+ DeCesar M. E., Ransom S. M., Kaplan D. L., Ray P. S., Geller A. M., 2015,
1109
+ ApJ, 807, L23
1110
+ Dewey R. J., Taylor J. H., Weisberg J. M., Stokes G. H., 1985, ApJ, 294, L25
1111
+ Douglas A., et al., 2022, ApJ, 927, 126
1112
+ Edwards R. T., van Straten W., Bailes M., 2001, ApJ, 560, 365
1113
+ Ferraro F. R., et al., 2009, Nature, 462, 483
1114
+ Forbes D. A., Bridges T., 2010, MNRAS, 404, 1203
1115
+ Freire P. C., Gupta Y., Ransom S. M., Ishwara-Chandra C. H., 2004, ApJ,
1116
+ 606, L53
1117
+ Freire P. C. C., et al., 2017, MNRAS, 471, 857
1118
+ Harris W. E., 2010, arXiv e-prints, p. arXiv:1012.3224
1119
+ Heinke C. O., Grindlay J. E., Edmonds P. D., Cohn H. N., Lugger P. M.,
1120
+ Camilo F., Bogdanov S., Freire P. C., 2005, ApJ, 625, 796
1121
+ Henleywillis S., Cool A. M., Haggard D., Heinke C., Callanan P., Zhao Y.,
1122
+ 2018, MNRAS, 479, 2834
1123
+ Hilker M., Richtler T., 2000, A&A, 362, 895
1124
+ Hobbs G., et al., 2020, Publ. Astron. Soc. Australia, 37, e012
1125
+ Ibata R. A., Gilmore G., Irwin M. J., 1994, Nature, 370, 194
1126
+ Ibata R. A., Bellazzini M., Malhan K., Martin N., Bianchini P., 2019, Nature
1127
+ Astronomy, 3, 667
1128
+ MNRAS 000, 1–?? (2015)
1129
+
1130
+ 10
1131
+ W. Chen et al.
1132
+ Jonas J., MeerKAT Team 2016, in MeerKAT Science: On the Pathway to the
1133
+ SKA. p. 1
1134
+ King A. R., Davies M. B., Beer M. E., 2003, MNRAS, 345, 678
1135
+ Kulkarni S. R., Anderson S. B., Prince T. A., Wolszczan A., 1991, Nature,
1136
+ 349, 47
1137
+ Lee J.-W., Kang Y.-W., Lee J., Lee Y.-W., 2009, Nature, 462, 480
1138
+ Liu K., Eatough R. P., Wex N., Kramer M., 2014, MNRAS, 445, 3115
1139
+ Lorimer D. R., Kramer M., 2004, Handbook of Pulsar Astronomy. Vol. 4
1140
+ Lynch R. S., Freire P. C. C., Ransom S. M., Jacoby B. A., 2012, ApJ, 745,
1141
+ 109
1142
+ Morello V., Barr E. D., Stappers B. W., Keane E. F., Lyne A. G., 2020,
1143
+ MNRAS, 497, 4654
1144
+ Origlia L., Massari D., Rich R. M., Mucciarelli A., Ferraro F. R., Dalessandro
1145
+ E., Lanzoni B., 2013, ApJ, 779, L5
1146
+ Possenti A., D’Amico N., Corongiu A., Manchester D., Sarkissian J., Camilo
1147
+ F., Lyne A., 2005, in Rasio F. A., Stairs I. H., eds, Astronomical Society
1148
+ of the Pacific Conference Series Vol. 328, Binary Radio Pulsars. p. 189
1149
+ Prager B. J., Ransom S. M., Freire P. C. C., Hessels J. W. T., Stairs I. H.,
1150
+ Arras P., Cadelano M., 2017, ApJ, 845, 148
1151
+ Ransom S., 2011, PRESTO: PulsaR Exploration and Search TOolkit, Astro-
1152
+ physics Source Code Library, record ascl:1107.017 (ascl:1107.017)
1153
+ Ransom S. M., Eikenberry S. S., Middleditch J., 2002, AJ, 124, 1788
1154
+ Ransom S. M., Cordes J. M., Eikenberry S. S., 2003, ApJ, 589, 911
1155
+ Ransom S. M., Hessels J. W. T., Stairs I. H., Freire P. C. C., Camilo F., Kaspi
1156
+ V. M., Kaplan D. L., 2005, Science, 307, 892
1157
+ Ridolfi A., et al., 2016, MNRAS, 462, 2918
1158
+ Ridolfi A., et al., 2021, MNRAS,
1159
+ Ridolfi A., et al., 2022, A&A, 664, A27
1160
+ Roberts M. S. E., 2013, in van Leeuwen J., ed., IAU Symposium Vol. 291,
1161
+ Neutron Stars and Pulsars: Challenges and Opportunities after 80 years.
1162
+ pp 127–132 (arXiv:1210.6903), doi:10.1017/S174392131202337X
1163
+ Stappers B. W., Kramer M., 2016, in MeerKAT Science: On the Pathway to
1164
+ the SKA. p. 9
1165
+ Venter C., De Jager O. C., Clapson A. C., 2009, ApJ, 696, L52
1166
+ Verbunt F., Freire P. C. C., 2014, A&A, 561, A11
1167
+ Verbunt F., Hut P., 1987, in Helfand D. J., Huang J. H., eds, Vol. 125, The
1168
+ Origin and Evolution of Neutron Stars. p. 187
1169
+ Vleeschower L., et al., 2022, MNRAS, 513, 1386
1170
+ MNRAS 000, 1–?? (2015)
1171
+
ZtE2T4oBgHgl3EQfZgcV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf ADDED
Binary file (72.6 kB). View file
 
d9E0T4oBgHgl3EQf5gJF/content/tmp_files/2301.02751v1.pdf.txt ADDED
@@ -0,0 +1,145 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02751v1 [math.CO] 7 Jan 2023
2
+ SKEW-HADAMARD MATRICES OF ORDER 276
3
+ DRAGOMIR ˇZ. ¯DOKOVI´C
4
+ Abstract. The smallest integer v > 0 for which no skew-Hadamard matrix of
5
+ order 4v is known is v = 69. We show how to construct several such matrices.
6
+ In memory of my son Dejan Djokovic (1962-2022).
7
+ 1. Introduction
8
+ According to Table 7.1 of the survey paper of Seberry and Yamada [9], published
9
+ in 1992, there were only six odd integers v < 100 for which no skew-Hadamard
10
+ matrix of order 4v was known at that time, namely the integers
11
+ 47, 59, 69, 81, 89, 97.
12
+ Subsequently, the skew-Hadamard matrices of order 4v were constructed in 1994
13
+ for v = 81 [4], in 2004 for v = 59 [8], and in 2008 for v = 47, 97 [5]. In this note we
14
+ construct 19 skew-Hadamard matrices of order 276 (= 4 · 69).
15
+ Let us make two remarks. First, the case v = 63 is listed as unknown in the
16
+ handbook [2, Table 1.51, p. 277] published in 2007. However the existence of a
17
+ skew-Hadamard matrix of order 4 · 63 was known since 1969, as it belongs to an
18
+ infinite series of such matrices constructed by Szekeres [11].
19
+ As this handbook
20
+ does not list v = 69 as unknown, it is probable that this was just a misprint: 63
21
+ should be replaced by 69? Second, in the more recent book [10, Table 9.2, pp. 198-
22
+ 200], the cases v = 39, 49, 65 are listed as unknown. However the corresponding
23
+ skew-Hadamard matrices have been constructed long ago in [3].
24
+ 2. The first skew-Hadamard matrices of order 276
25
+ As far as we know, the smallest integer v > 0 for which no skew-Hadamard
26
+ matrix of order 4v is known is v = 69 [1, p. 1436)]. In this section we construct
27
+ several such matrices.
28
+ Our construction uses the Goethals-Seidel array (GS-array) shown below
29
+
30
+ ���
31
+ A0
32
+ A1R
33
+ A2R
34
+ A3R
35
+ −A1R
36
+ A0
37
+ −RA3
38
+ RA2
39
+ −A2R
40
+ RA3
41
+ A0
42
+ −RA1
43
+ −A3R
44
+ −RA2
45
+ RA1
46
+ A0
47
+
48
+ ��� .
49
+ We shall assume that the Ai are circulants and R is the back-diagonal identity
50
+ natrix (i.e. the matrix obtained from the identity matrix by reversing the order of
51
+ rows). The circulants are obtained from a cyclic difference family {X0, X1, X2, X3}
52
+ with parameters
53
+ (v = 69; k0 = 34, k1 = 34, k2 = 31, k3 = 27; λ = 57).
54
+ 1
55
+
56
+ 2
57
+ DRAGOMIR ˇZ. ¯DOKOVI´C
58
+ For instance, for the first row (a0, a1, . . . , av−1) of A0 we have ai = −1 if i ∈ X0
59
+ and ai = 1 otherwise. Moreover it is required that the block X0 is skew, i.e. a0 = 1
60
+ and ai + av−i = 0 for i = 1, 2, . . . , 34.
61
+ A special feature of our difference families is that they break up into two pieces
62
+ {X0, X1} and {X2, X3} which are also difference families.
63
+ First, we need a difference family {X0, X1} with parameters (69; 34, 34; 33) with
64
+ X0 skew. This is provided by the well known family of Szekeres difference sets
65
+ [11, 10]:
66
+ X0
67
+ =
68
+ {1, 2, 6, 7, 9, 13, 14.16, 17, 18, 21, 27, 31, 34, 36, 37, 39, 40,
69
+ 41, 43, 44, 45, 46, 47, 49, 50, 54, 57, 58, 59, 61, 64, 65, 66};
70
+ X1
71
+ =
72
+ {1, 4, 5, 7, 9, 10, 11, 12, 15, 17, 18, 19, 24, 26, 27, 28, 30, 39,
73
+ 41, 42, 43, 45, 50, 51, 52, 54, 57, 58, 59, 60, 62, 64, 65, 68}.
74
+ Note that X0 is skew and X1 is symmetric. Further, all 19 difference families share
75
+ the same first two blocks, X0 and X1.
76
+ Second, we need a difference family {X2, X3} with parameters (69; 31, 27; 24).
77
+ This is exactly the parameter set for a D-optimal design of order 2 · 69 = 138. In a
78
+ joint paper with I. Kotsireas [7, Section 4.2], we have constructed 19 nonequivalent
79
+ such difference families. Anyone of them can be used in our construction. As an
80
+ example, let us choose the first one:
81
+ X2
82
+ =
83
+ {0, 1, 3, 4, 6, 9, 10, 11, 13, 14, 17, 18, 20, 22, 26, 28, 29,
84
+ 32, 33, 34, 39, 41, 43, 45, 46, 48, 51, 59, 60, 62, 63},
85
+ X3
86
+ =
87
+ {0, 2, 3, 4, 8, 9, 10, 11, 12, 15, 16, 17, 21, 25, 26,
88
+ 32, 33, 35, 36, 37, 39, 41, 46, 51, 54, 57, 59}.
89
+ By constructing the circulants Ai from the blocks Xi and by plugging the Ai into
90
+ the GS-array we obtain a skew-Hadamard matrix of order 276.
91
+ Consequently, the smallest positive integer v for which the existence of a skew-
92
+ Hadamard matrix of order 4v is still undecided is now 89.
93
+ For the readers convenience, we provide (for the difference family chosen above)
94
+ the first rows of the blocks Ai:
95
+ + − − + + + − − + − + + + − − + − − − + + − + + + + + − + + + − + + −
96
+ + − − + − − − + − − − − − + − − + + + − + + − − − + − + + − − − ++;
97
+ + − + + − − + − + − − − − + + − + − − − + + + + − + − − − + − + + + +
98
+ + + + + − + − − − + − + + + + − − − + − + + − − − − + − + − − + +−;
99
+ − − + − − + − + + − − − + − − + + − − + − + − + + + − + − − + + − − −
100
+ + + + + − + − + − + − − + − + + − + + + + + + + − − + − − + + + ++;
101
+ − + − − − + + + − − − − − + + − − − + + + − + + + − − + + + + + − − +
102
+ − − − + − + − + + + + − + + + + − + + − + + − + − + + + + + + + + + .
103
+ (The + and − signs stand for +1 and −1, respectively.)
104
+
105
+ SKEW-HADAMARD MATRICES OF ORDER 276
106
+ 3
107
+ As far as we know, the odd integers v > 0 less than 200 for which the existence
108
+ of skew-Hadamard matrices of order 4v is still undecided are the following:
109
+ 89, 101, 107, 119, 149, 153, 167, 177, 179, 191, 193.
110
+ After taking into account the papers [5, 6] (and correcting the hypothetical misprint
111
+ mentioned earlier), this list agrees with [2, Table 1.51, p. 277].
112
+ 3. Acknowledgements
113
+ This research was enabled in part by support provided by SHARCNET (http://
114
+ www.sharcnet.ca) and the Digital Research Alliance of Canada (alliancecan.ca).
115
+ References
116
+ [1] C. Bright, D. ˇZ. ¯Dokovi´c, I. Kotsireas, V. Ganesh, A SAT+CAS Approach to Finding Good
117
+ Matrices: New Examples and Counterexamples, The Thirty-Third AAAI Conference on Ar-
118
+ tificial Intelligence (AAAI-19)
119
+ [2] R. Craigen and H. Kharaghani, Hadamard matrices and Hadamard designs, in Handbook
120
+ of Combinatorial Designs, 2nd ed. C. J. Colbourn, J. H. Dinitz (eds) pp. 273–280. Discrete
121
+ Mathematics and its Applications (Boca Raton). Chapman & Hall/CRC, Boca Raton, FL,
122
+ 2007.
123
+ [3] D. ˇZ. ¯Dokovi´c, Ten new orders for Hadamard matrices of skew type, Univ. Beograd, Publ.
124
+ Elektrotehn. Fak. Ser. Mat. 3 (1992), 47-59.
125
+ [4] D. ˇZ. ¯Dokovi´c, Five new orders for Hadamard matrices of skew type. Australasian J. Combin.
126
+ 10 (1994), 259-264.
127
+ [5] D. ˇZ. ¯Dokovi´c, Skew-Hadamard matrices of orders 188 and 388 exist. International Mathe-
128
+ matical Forum, 3, 22 (2008), 1063-1068.
129
+ [6] D. ˇZ.¯Dokovi´c, Skew-Hadamard matrices of orders 436, 580, and 988 exist, J. Combin. Designs,
130
+ 16 (2008), 493–498.
131
+ [7] D. ˇZ. ¯Dokovi´c and I. S. Kotsireas, D-optimal matrices of orders 118, 138, 150, 154 and 174. In:
132
+ C. J. Colbourn (ed.) Algebraic Design Theory and Hadamard Matrices, pp. 71–82, ADTHM,
133
+ Lethbridge, Alberta, Canada, July 2014. Springer Proceedings in Mathematics & Statistics,
134
+ vol. 133. Springer 2015.
135
+ [8] R. J. Fletcher, C. Koukouvinos and J. Seberry, New skew-Hadamard matrices of order 4 · 59
136
+ and new D-optimal designs of order 2 · 59, Discrete Math. 286 (2004), 251–253.
137
+ [9] J. Seberry, M. Yamada, Hadamard matrices, sequences, and block designs. In Contemporary
138
+ design theory, 431-560, Wiley-Intersci. Ser. Discrete Math. Optim., Wiley, New York, 1992.
139
+ [10] J. Seberry, M. Yamada, Hadamard Matrices, Constructions using Number Theory and Alge-
140
+ bra, 2022 John Wiley & Sons, Inc.
141
+ [11] . G. Szekeres, Tournaments and Hadamard matrices, Enseignement Math. 15 (1969), 269-278.
142
+ University of Waterloo, Department of Pure Mathematics, Waterloo, Ontario, N2L
143
+ 3G1, Canada
144
+ Email address: [email protected]
145
+
d9E0T4oBgHgl3EQf5gJF/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,155 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf,len=154
2
+ page_content='arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
3
+ page_content='02751v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
4
+ page_content='CO] 7 Jan 2023 SKEW-HADAMARD MATRICES OF ORDER 276 DRAGOMIR ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
5
+ page_content=' ¯DOKOVI´C Abstract.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
6
+ page_content=' The smallest integer v > 0 for which no skew-Hadamard matrix of order 4v is known is v = 69.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
7
+ page_content=' We show how to construct several such matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
8
+ page_content=' In memory of my son Dejan Djokovic (1962-2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
9
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
10
+ page_content=' Introduction According to Table 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
11
+ page_content='1 of the survey paper of Seberry and Yamada [9], published in 1992, there were only six odd integers v < 100 for which no skew-Hadamard matrix of order 4v was known at that time, namely the integers 47, 59, 69, 81, 89, 97.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
12
+ page_content=' Subsequently, the skew-Hadamard matrices of order 4v were constructed in 1994 for v = 81 [4], in 2004 for v = 59 [8], and in 2008 for v = 47, 97 [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
13
+ page_content=' In this note we construct 19 skew-Hadamard matrices of order 276 (= 4 · 69).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
14
+ page_content=' Let us make two remarks.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
15
+ page_content=' First, the case v = 63 is listed as unknown in the handbook [2, Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
16
+ page_content='51, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
17
+ page_content=' 277] published in 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
18
+ page_content=' However the existence of a skew-Hadamard matrix of order 4 · 63 was known since 1969, as it belongs to an infinite series of such matrices constructed by Szekeres [11].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
19
+ page_content=' As this handbook does not list v = 69 as unknown, it is probable that this was just a misprint: 63 should be replaced by 69?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
20
+ page_content=' Second, in the more recent book [10, Table 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
21
+ page_content='2, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
22
+ page_content=' 198- 200], the cases v = 39, 49, 65 are listed as unknown.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
23
+ page_content=' However the corresponding skew-Hadamard matrices have been constructed long ago in [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
24
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
25
+ page_content=' The first skew-Hadamard matrices of order 276 As far as we know, the smallest integer v > 0 for which no skew-Hadamard matrix of order 4v is known is v = 69 [1, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
26
+ page_content=' 1436)].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
27
+ page_content=' In this section we construct several such matrices.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
28
+ page_content=' Our construction uses the Goethals-Seidel array (GS-array) shown below � ��� A0 A1R A2R A3R −A1R A0 −RA3 RA2 −A2R RA3 A0 −RA1 −A3R −RA2 RA1 A0 � ��� .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
29
+ page_content=' We shall assume that the Ai are circulants and R is the back-diagonal identity natrix (i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
30
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
31
+ page_content=' the matrix obtained from the identity matrix by reversing the order of rows).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
32
+ page_content=' The circulants are obtained from a cyclic difference family {X0, X1, X2, X3} with parameters (v = 69;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
33
+ page_content=' k0 = 34, k1 = 34, k2 = 31, k3 = 27;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
34
+ page_content=' λ = 57).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
35
+ page_content=' 1 2 DRAGOMIR ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
36
+ page_content=' ¯DOKOVI´C For instance, for the first row (a0, a1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
37
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
38
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
39
+ page_content=' , av−1) of A0 we have ai = −1 if i ∈ X0 and ai = 1 otherwise.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
40
+ page_content=' Moreover it is required that the block X0 is skew, i.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
41
+ page_content='e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
42
+ page_content=' a0 = 1 and ai + av−i = 0 for i = 1, 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
43
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
44
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
45
+ page_content=' , 34.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
46
+ page_content=' A special feature of our difference families is that they break up into two pieces {X0, X1} and {X2, X3} which are also difference families.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
47
+ page_content=' First, we need a difference family {X0, X1} with parameters (69;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
48
+ page_content=' 34, 34;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
49
+ page_content=' 33) with X0 skew.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
50
+ page_content=' This is provided by the well known family of Szekeres difference sets [11, 10]: X0 = {1, 2, 6, 7, 9, 13, 14.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
51
+ page_content='16, 17, 18, 21, 27, 31, 34, 36, 37, 39, 40, 41, 43, 44, 45, 46, 47, 49, 50, 54, 57, 58, 59, 61, 64, 65, 66};' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
52
+ page_content=' X1 = {1, 4, 5, 7, 9, 10, 11, 12, 15, 17, 18, 19, 24, 26, 27, 28, 30, 39, 41, 42, 43, 45, 50, 51, 52, 54, 57, 58, 59, 60, 62, 64, 65, 68}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
53
+ page_content=' Note that X0 is skew and X1 is symmetric.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
54
+ page_content=' Further, all 19 difference families share the same first two blocks, X0 and X1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
55
+ page_content=' Second, we need a difference family {X2, X3} with parameters (69;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
56
+ page_content=' 31, 27;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
57
+ page_content=' 24).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
58
+ page_content=' This is exactly the parameter set for a D-optimal design of order 2 · 69 = 138.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
59
+ page_content=' In a joint paper with I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
60
+ page_content=' Kotsireas [7, Section 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
61
+ page_content='2], we have constructed 19 nonequivalent such difference families.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
62
+ page_content=' Anyone of them can be used in our construction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
63
+ page_content=' As an example, let us choose the first one: X2 = {0, 1, 3, 4, 6, 9, 10, 11, 13, 14, 17, 18, 20, 22, 26, 28, 29, 32, 33, 34, 39, 41, 43, 45, 46, 48, 51, 59, 60, 62, 63}, X3 = {0, 2, 3, 4, 8, 9, 10, 11, 12, 15, 16, 17, 21, 25, 26, 32, 33, 35, 36, 37, 39, 41, 46, 51, 54, 57, 59}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
64
+ page_content=' By constructing the circulants Ai from the blocks Xi and by plugging the Ai into the GS-array we obtain a skew-Hadamard matrix of order 276.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
65
+ page_content=' Consequently, the smallest positive integer v for which the existence of a skew- Hadamard matrix of order 4v is still undecided is now 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
66
+ page_content=' For the readers convenience, we provide (for the difference family chosen above) the first rows of the blocks Ai: + − − + + + − − + − + + + − − + − − − + + − + + + + + − + + + − + + − + − − + − − − + − − − − − + − − + + + − + + − − − + − + + − − − ++;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
67
+ page_content=' + − + + − − + − + − − − − + + − + − − − + + + + − + − − − + − + + + + + + + + − + − − − + − + + + + − − − + − + + − − − − + − + − − + +−;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
68
+ page_content=' − − + − − + − + + − − − + − − + + − − + − + − + + + − + − − + + − − − + + + + − + − + − + − − + − + + − + + + + + + + − − + − − + + + ++;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
69
+ page_content=' − + − − − + + + − − − − − + + − − − + + + − + + + − − + + + + + − − + − − − + − + − + + + + − + + + + − + + − + + − + − + + + + + + + + + .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
70
+ page_content=' (The + and − signs stand for +1 and −1, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
71
+ page_content=') SKEW-HADAMARD MATRICES OF ORDER 276 3 As far as we know, the odd integers v > 0 less than 200 for which the existence of skew-Hadamard matrices of order 4v is still undecided are the following: 89, 101, 107, 119, 149, 153, 167, 177, 179, 191, 193.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
72
+ page_content=' After taking into account the papers [5, 6] (and correcting the hypothetical misprint mentioned earlier), this list agrees with [2, Table 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
73
+ page_content='51, p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
74
+ page_content=' 277].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
75
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
76
+ page_content=' Acknowledgements This research was enabled in part by support provided by SHARCNET (http:// www.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
77
+ page_content='sharcnet.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
78
+ page_content='ca) and the Digital Research Alliance of Canada (alliancecan.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
79
+ page_content='ca).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
80
+ page_content=' References [1] C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
81
+ page_content=' Bright, D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
82
+ page_content=' ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
83
+ page_content=' ¯Dokovi´c, I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
84
+ page_content=' Kotsireas, V.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
85
+ page_content=' Ganesh, A SAT+CAS Approach to Finding Good Matrices: New Examples and Counterexamples, The Thirty-Third AAAI Conference on Ar- tificial Intelligence (AAAI-19) [2] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
86
+ page_content=' Craigen and H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
87
+ page_content=' Kharaghani, Hadamard matrices and Hadamard designs, in Handbook of Combinatorial Designs, 2nd ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
88
+ page_content=' C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
89
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
90
+ page_content=' Colbourn, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
91
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
92
+ page_content=' Dinitz (eds) pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
93
+ page_content=' 273–280.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
94
+ page_content=' Discrete Mathematics and its Applications (Boca Raton).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
95
+ page_content=' Chapman & Hall/CRC, Boca Raton, FL, 2007.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
96
+ page_content=' [3] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
97
+ page_content=' ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
98
+ page_content=' ¯Dokovi´c, Ten new orders for Hadamard matrices of skew type, Univ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
99
+ page_content=' Beograd, Publ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
100
+ page_content=' Elektrotehn.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
101
+ page_content=' Fak.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
102
+ page_content=' Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
103
+ page_content=' Mat.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
104
+ page_content=' 3 (1992), 47-59.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
105
+ page_content=' [4] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
106
+ page_content=' ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
107
+ page_content=' ¯Dokovi´c, Five new orders for Hadamard matrices of skew type.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
108
+ page_content=' Australasian J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
109
+ page_content=' Combin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
110
+ page_content=' 10 (1994), 259-264.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
111
+ page_content=' [5] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
112
+ page_content=' ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
113
+ page_content=' ¯Dokovi´c, Skew-Hadamard matrices of orders 188 and 388 exist.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
114
+ page_content=' International Mathe- matical Forum, 3, 22 (2008), 1063-1068.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
115
+ page_content=' [6] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
116
+ page_content=' ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
117
+ page_content='¯Dokovi´c, Skew-Hadamard matrices of orders 436, 580, and 988 exist, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
118
+ page_content=' Combin.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
119
+ page_content=' Designs, 16 (2008), 493–498.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
120
+ page_content=' [7] D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
121
+ page_content=' ˇZ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
122
+ page_content=' ¯Dokovi´c and I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
123
+ page_content=' S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
124
+ page_content=' Kotsireas, D-optimal matrices of orders 118, 138, 150, 154 and 174.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
125
+ page_content=' In: C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
126
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
127
+ page_content=' Colbourn (ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
128
+ page_content=') Algebraic Design Theory and Hadamard Matrices, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
129
+ page_content=' 71–82, ADTHM, Lethbridge, Alberta, Canada, July 2014.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
130
+ page_content=' Springer Proceedings in Mathematics & Statistics, vol.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
131
+ page_content=' 133.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
132
+ page_content=' Springer 2015.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
133
+ page_content=' [8] R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
134
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
135
+ page_content=' Fletcher, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
136
+ page_content=' Koukouvinos and J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
137
+ page_content=' Seberry, New skew-Hadamard matrices of order 4 · 59 and new D-optimal designs of order 2 · 59, Discrete Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
138
+ page_content=' 286 (2004), 251–253.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
139
+ page_content=' [9] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
140
+ page_content=' Seberry, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
141
+ page_content=' Yamada, Hadamard matrices, sequences, and block designs.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
142
+ page_content=' In Contemporary design theory, 431-560, Wiley-Intersci.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
143
+ page_content=' Ser.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
144
+ page_content=' Discrete Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
145
+ page_content=' Optim.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
146
+ page_content=', Wiley, New York, 1992.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
147
+ page_content=' [10] J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
148
+ page_content=' Seberry, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
149
+ page_content=' Yamada, Hadamard Matrices, Constructions using Number Theory and Alge- bra, 2022 John Wiley & Sons, Inc.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
150
+ page_content=' [11] .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
151
+ page_content=' G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
152
+ page_content=' Szekeres, Tournaments and Hadamard matrices, Enseignement Math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
153
+ page_content=' 15 (1969), 269-278.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
154
+ page_content=' University of Waterloo, Department of Pure Mathematics, Waterloo, Ontario, N2L 3G1, Canada Email address: dragomir@rogers.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
155
+ page_content='com' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/d9E0T4oBgHgl3EQf5gJF/content/2301.02751v1.pdf'}
dNE0T4oBgHgl3EQfWgC_/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c3663d6e1e8abe4440462c075c74a813eac07bb5b2b31aef43b0715f4df28e67
3
+ size 235021