jackkuo commited on
Commit
9ece554
·
verified ·
1 Parent(s): 754d267

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -dE4T4oBgHgl3EQfDwsm/content/tmp_files/2301.04871v1.pdf.txt +1365 -0
  2. -dE4T4oBgHgl3EQfDwsm/content/tmp_files/load_file.txt +0 -0
  3. 2dAzT4oBgHgl3EQfDvol/content/tmp_files/2301.00980v1.pdf.txt +1220 -0
  4. 2dAzT4oBgHgl3EQfDvol/content/tmp_files/load_file.txt +0 -0
  5. 59FKT4oBgHgl3EQf-y48/content/tmp_files/2301.11959v1.pdf.txt +2940 -0
  6. 59FKT4oBgHgl3EQf-y48/content/tmp_files/load_file.txt +0 -0
  7. 7dE2T4oBgHgl3EQfPQbU/content/tmp_files/2301.03758v1.pdf.txt +3362 -0
  8. 7dE2T4oBgHgl3EQfPQbU/content/tmp_files/load_file.txt +0 -0
  9. A9E4T4oBgHgl3EQf5A6T/content/tmp_files/2301.05319v1.pdf.txt +3079 -0
  10. A9E4T4oBgHgl3EQf5A6T/content/tmp_files/load_file.txt +0 -0
  11. BdAzT4oBgHgl3EQf___2/content/tmp_files/2301.01958v1.pdf.txt +1192 -0
  12. BdAzT4oBgHgl3EQf___2/content/tmp_files/load_file.txt +0 -0
  13. CNE2T4oBgHgl3EQfRwe0/content/tmp_files/2301.03785v1.pdf.txt +2764 -0
  14. CNE2T4oBgHgl3EQfRwe0/content/tmp_files/load_file.txt +0 -0
  15. F9E0T4oBgHgl3EQfRAC9/content/tmp_files/2301.02202v1.pdf.txt +2249 -0
  16. F9E0T4oBgHgl3EQfRAC9/content/tmp_files/load_file.txt +0 -0
  17. HNAyT4oBgHgl3EQfS_eb/content/tmp_files/2301.00097v1.pdf.txt +1490 -0
  18. HNAyT4oBgHgl3EQfS_eb/content/tmp_files/load_file.txt +0 -0
  19. L9FLT4oBgHgl3EQfMi8T/content/tmp_files/2301.12016v1.pdf.txt +2197 -0
  20. L9FLT4oBgHgl3EQfMi8T/content/tmp_files/load_file.txt +0 -0
  21. OdE2T4oBgHgl3EQfrAj4/content/tmp_files/load_file.txt +0 -0
  22. S9FKT4oBgHgl3EQfkC7A/content/tmp_files/2301.11848v1.pdf.txt +822 -0
  23. S9FKT4oBgHgl3EQfkC7A/content/tmp_files/load_file.txt +0 -0
  24. T9E3T4oBgHgl3EQfaQqr/content/tmp_files/2301.04505v1.pdf.txt +2318 -0
  25. T9E3T4oBgHgl3EQfaQqr/content/tmp_files/load_file.txt +0 -0
  26. UtE1T4oBgHgl3EQfawTU/content/tmp_files/2301.03166v1.pdf.txt +2215 -0
  27. UtE1T4oBgHgl3EQfawTU/content/tmp_files/load_file.txt +0 -0
  28. VNE0T4oBgHgl3EQf2wJn/content/tmp_files/2301.02716v1.pdf.txt +1175 -0
  29. VNE0T4oBgHgl3EQf2wJn/content/tmp_files/load_file.txt +0 -0
  30. WtE2T4oBgHgl3EQfDga8/content/tmp_files/2301.03626v1.pdf.txt +1794 -0
  31. WtE2T4oBgHgl3EQfDga8/content/tmp_files/load_file.txt +0 -0
  32. X9AyT4oBgHgl3EQf9foH/content/tmp_files/2301.00873v1.pdf.txt +2080 -0
  33. X9AyT4oBgHgl3EQf9foH/content/tmp_files/load_file.txt +0 -0
  34. XNE2T4oBgHgl3EQfYgch/content/tmp_files/2301.03854v1.pdf.txt +871 -0
  35. XNE2T4oBgHgl3EQfYgch/content/tmp_files/load_file.txt +0 -0
  36. ZNE5T4oBgHgl3EQfdw-l/content/tmp_files/2301.05614v1.pdf.txt +1108 -0
  37. ZNE5T4oBgHgl3EQfdw-l/content/tmp_files/load_file.txt +0 -0
  38. aNA0T4oBgHgl3EQfF__0/content/tmp_files/2301.02042v1.pdf.txt +933 -0
  39. aNA0T4oBgHgl3EQfF__0/content/tmp_files/load_file.txt +0 -0
  40. btAyT4oBgHgl3EQf-PpJ/content/tmp_files/2301.00888v1.pdf.txt +1015 -0
  41. btAyT4oBgHgl3EQf-PpJ/content/tmp_files/load_file.txt +0 -0
  42. btFPT4oBgHgl3EQfBDTK/content/tmp_files/2301.12984v1.pdf.txt +1066 -0
  43. btFPT4oBgHgl3EQfBDTK/content/tmp_files/load_file.txt +0 -0
  44. c9FJT4oBgHgl3EQfRiy-/content/tmp_files/2301.11496v1.pdf.txt +2230 -0
  45. c9FJT4oBgHgl3EQfRiy-/content/tmp_files/load_file.txt +0 -0
  46. cNE0T4oBgHgl3EQfWQCi/content/tmp_files/2301.02276v1.pdf.txt +0 -0
  47. cNE0T4oBgHgl3EQfWQCi/content/tmp_files/load_file.txt +0 -0
  48. cdE5T4oBgHgl3EQffg9z/content/tmp_files/2301.05627v1.pdf.txt +822 -0
  49. cdE5T4oBgHgl3EQffg9z/content/tmp_files/load_file.txt +0 -0
  50. ddE1T4oBgHgl3EQfLQO1/content/tmp_files/2301.02975v1.pdf.txt +0 -0
-dE4T4oBgHgl3EQfDwsm/content/tmp_files/2301.04871v1.pdf.txt ADDED
@@ -0,0 +1,1365 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Learning to Memorize Entailment and Discourse Relations for Persona-Consistent
2
+ Dialogues
3
+ Ruijun Chen1, Jin Wang1*, Liang-Chih Yu2 and Xuejie Zhang1
4
+ 1School of Information Science and Engineering, Yunnan University, Yunnan, China
5
+ 2Department of Information Management, Yuan Ze University, Taiwan
6
7
+ Abstract
8
+ Maintaining engagement and consistency is particularly im-
9
+ portant in dialogue systems. Existing works have improved
10
+ the performance of dialogue systems by intentionally learn-
11
+ ing interlocutor personas with sophisticated network struc-
12
+ tures. One issue with this approach is that it requires more
13
+ personal corpora with annotations. Additionally, these mod-
14
+ els typically perform the next utterance prediction to gener-
15
+ ate a response but neglect the discourse coherence in the en-
16
+ tire conversation. To address these issues, this study proposes
17
+ a method of learning to memorize entailment and discourse
18
+ relations for persona-consistent dialogue tasks. Entailment
19
+ text pairs in natural language inference dataset were applied
20
+ to learn latent entailment relations as external memories by
21
+ premise-to-hypothesis generation task. Furthermore, an in-
22
+ ternal memory with a similar architecture was applied to the
23
+ discourse information in the dialogue. Placing orthogonality
24
+ restrictions on these two memory spaces ensures that the la-
25
+ tent entailment relations remain dialogue-independent. Both
26
+ memories collaborate to obtain entailment and discourse
27
+ representation for the generation, allowing a deeper under-
28
+ standing of both consistency and coherence. Experiments on
29
+ two large public datasets, PersonaChat and DSTC7-AVSD,
30
+ demonstrated the effectiveness of the proposed method. Both
31
+ automatic and human evaluations indicate that the proposed
32
+ model outperforms several strong baselines in terms of both
33
+ persona consistency and response coherence. Our source
34
+ code is available at https://github.com/Chenrj233/LMEDR.
35
+ Introduction
36
+ Traditional chit-chat models lack specificity and personal-
37
+ ity consistency. Only when they access a sufficiently large
38
+ dataset will they have the opportunity to generate piecemeal
39
+ and uninformative responses in a chit-chat setting. For two
40
+ consecutive questions with similar meanings in a two-round
41
+ dialogue, that is, what is your job and what do you do, the
42
+ model replied to the former: I am a lawyer, while the lat-
43
+ ter: I am a doctor (Welleck et al. 2020). This issue arises
44
+ because of the lack of a consistent personality as well as
45
+ an explicit memory towards plausibility as they are typically
46
+ trained to produce a response given only recent dialogue his-
47
+ tory (Shum, He, and Li 2018).
48
+ *Corresponding author
49
+ Copyright © 2023, Association for the Advancement of Artificial
50
+ Intelligence (www.aaai.org). All rights reserved.
51
+ * I attend church regularly.
52
+ * I love to watch scary things.
53
+ * My favorite hobby is reading novels.
54
+ * I work at a veterinarians office.
55
+ * I enjoy exercising.
56
+ * I enjoy teaching things to children.
57
+ * I work for no money.
58
+ * We have a boy and a girl.
59
+ Persona (Human)
60
+ Persona (Model)
61
+ Hi, what do you do for fun?
62
+ Hi, i usually go to yoga a few times a week. What about you?
63
+ Well, i like going to watch scary movies and i love reading.
64
+ I am actually an english teacher.
65
+ It is good to know there are good people out there!
66
+ Thank you. That's what i try to instill in my kids.
67
+ How many kids do you have?
68
+ I have 2 of my own , as well as 30 in my class.
69
+ * I attend church regularly.
70
+ * I love to watch scary things.
71
+ * My favorite hobby is reading novels.
72
+ * I work at a veterinarians office.
73
+ * I enjoy exercising.
74
+ * I enjoy teaching things to children.
75
+ * I work for no money.
76
+ * We have a boy and a girl.
77
+ Persona (Human)
78
+ Persona (Model)
79
+ Hi, what do you do for fun?
80
+ Hi, i usually go to yoga a few times a week. What about you?
81
+ Well, i like going to watch scary movies and i love reading.
82
+ I am actually an english teacher.
83
+ It is good to know there are good people out there!
84
+ Thank you. That's what i try to instill in my kids.
85
+ How many kids do you have?
86
+ I have 2 of my own , as well as 30 in my class.
87
+ Entailment
88
+ Entailment
89
+ Incoherent
90
+ Incoherent
91
+ Coherent
92
+ Coherent
93
+ Entailment
94
+ Incoherent
95
+ Coherent
96
+ Figure 1: The conceptual diagram of introducing natural lan-
97
+ guage inference in persona-based dialogue.
98
+ One solution that maintains consistency in a dialogue sys-
99
+ tem is to provide a set of persona profiles that describe the
100
+ character and then generate responses according to the per-
101
+ sona. Persona can be defined as the composition of identity
102
+ elements, such as profiles and background personal facts.
103
+ The expected outcome is that dialogue models gener-
104
+ ate a response consistent with the given persona. The Per-
105
+ sonaChat dataset (Zhang et al. 2018), widely adopted to sup-
106
+ port the training of persona-consistent dialogues, was man-
107
+ ually annotated by two annotators to act as part of a prede-
108
+ fined persona and chat naturally to know each other during
109
+ the conversation. However, given the time and effort needed
110
+ to annotate more persona corpora to cover all possibilities, it
111
+ is difficult to extend the application of such persona-related
112
+ information to the daily usage of dialogue.
113
+ As humans, our knowledge of the concepts and the se-
114
+ mantic relationship behind the language can allow us to re-
115
+ arrange unstructured data so that we can understand and an-
116
+ alyze it. Essentially, we can robustly learn novel concepts
117
+ with minimal supervision, benefitting from the well-known
118
+ ability of natural language inference (NLI). Figure 1 shows
119
+ an example of introducing NLI in a persona-based dialogue.
120
+ Given a persona as a premise, we can determine whether
121
+ the hypothesis of the response utterance is true (entailment),
122
+ false (contradiction), or undetermined (neutral).
123
+ Recent studies have sought to improve the consistency
124
+ arXiv:2301.04871v1 [cs.CL] 12 Jan 2023
125
+
126
+ [SOP]
127
+ [z]
128
+ P1
129
+ P|P|
130
+ [EOP]
131
+ P2
132
+ ...
133
+ BART Encoder
134
+ h[z]
135
+ h[SOP]
136
+ h[EOP]
137
+ Premise
138
+ Transformer 1
139
+ Transformer 11
140
+ Transformer 12
141
+ e[z]
142
+ e[SOP]
143
+ e[EOP]
144
+ ...
145
+
146
+ M
147
+ z
148
+ H1
149
+ [SOH]
150
+ H2
151
+ H|H|
152
+ H3
153
+ ...
154
+ BART Decoder
155
+ H1
156
+ H2
157
+ H3
158
+ H4
159
+ H|H|
160
+ [EOP]
161
+ Transformer 1
162
+ Transformer 11
163
+ Transformer 12
164
+ e[SOH]
165
+ ...
166
+ Entailment
167
+ Relation Memory
168
+ Hypothesis
169
+ 1Pe
170
+ 2
171
+ Pe
172
+ 2
173
+ P
174
+ h
175
+ 1P
176
+ h
177
+ | |
178
+ Pe
179
+ P
180
+ | |
181
+ P
182
+ h
183
+ P
184
+ |
185
+ | 1
186
+ H H
187
+ 1
188
+ H
189
+ e
190
+ 2
191
+ H
192
+ e
193
+ 3
194
+ H
195
+ e
196
+ | | 1
197
+ H
198
+ e
199
+ H
200
+ | |
201
+ H
202
+ e
203
+ H
204
+ ...
205
+ ...
206
+ ERM
207
+ Figure 2: Learning to memorize the entailment relations in latent variables.
208
+ of the dialogue system by modeling the understanding be-
209
+ tween interlocutors (Liu et al. 2020). Song et al. (2021)
210
+ disentangled persona-based dialogue generation into two
211
+ subtasks—response generation and consistency understand-
212
+ ing—and used unlikelihood training to make the decoder
213
+ generate contradictory dialogue responses as few as possi-
214
+ ble. However, multiple subtasks require multiple encoders,
215
+ leading to a complex generation model structure. Nie et al.
216
+ (2021) introduced a contradiction detection task to evaluate
217
+ the consistency in dialogues.
218
+ Despite continuing efforts to improve the engagement and
219
+ consistency of dialogue systems, understanding persona-
220
+ response consistency is still difficult. The key challenges
221
+ are twofold: 1) Existing methods apply sophisticated struc-
222
+ tures to learn persona consistency, which requires more an-
223
+ notated corpora for training. However, persona-based cor-
224
+ pora are still insufficient and difficult to collect. 2) Dialogue-
225
+ generating models typically neglect discourse information.
226
+ Discourse coherence is a crucial component of the effec-
227
+ tiveness of a conversation, encompassing how utterances are
228
+ connected and how the entire dialogue is organized to con-
229
+ vey information to the interlocutor. Existing models usually
230
+ perform the next utterance prediction for response genera-
231
+ tion but ignore the dialogue discourse coherence. As indi-
232
+ cated in Figure 1, I am actually an English teacher seems
233
+ to be an appropriate and persona-consistent response to the
234
+ query. However, this response is incoherent in the context of
235
+ an entire conversation.
236
+ To address these issues, this study proposes a method of
237
+ learning to memorize entailment and discourse relations for
238
+ persona-consistent dialogue tasks. We applied an encoder-
239
+ decoder architecture from BART (Lewis et al. 2020). To ex-
240
+ plicitly understand the consistency of personas, we designed
241
+ an external memory to store the latent entailment relations
242
+ between premises and the entailment hypothesis, indepen-
243
+ dent of dialogue itself. In addition, discourse relations were
244
+ learned and stored in internal latent memory. The latent en-
245
+ tailment relations are ensured to be dialogue-independent
246
+ by imposing orthogonality constraints on the two memory
247
+ spaces. Given personas and dialogue queries, both memories
248
+ work jointly to obtain the entailment and discourse repre-
249
+ sentation by the BART encoder. The generation was finally
250
+ accomplished by the BART decoder with two extra training
251
+ objectives, which further acquired the ability to understand
252
+ both consistency and coherence.
253
+ Comparative experiments were conducted using the Per-
254
+ sonaChat (Dinan et al. 2020) and DSTC7-AVSD (Alamri
255
+ et al. 2019). Both automatic and human evaluations show
256
+ that the proposed method generalizes well under different
257
+ settings and outperforms several strong baselines on most
258
+ metrics, especially persona consistency, indicating that the
259
+ proposed method can produce better persona-consistent dia-
260
+ logue responses.
261
+ The remainder of this paper is organized as follows. Sec-
262
+ tion 2 provides a brief review of the related work. Section
263
+ 3 describes the proposed model, which learns to memorize
264
+ entailment and discourse relations by using latent variables.
265
+ Section 4 summarizes the specific experimental setup for the
266
+ two public dialogue datasets and the corresponding analysis
267
+ of the results. Finally, conclusions are drawn in Section 5.
268
+ Related Work
269
+ Persona-based Dialogues
270
+ Generation-based
271
+ dialogue
272
+ systems
273
+ usually
274
+ use
275
+ the
276
+ sequence-to-sequence (seq2seq) model (Sutskever, Vinyals,
277
+ and Le 2014) as the backbone. After the persona is intro-
278
+ duced into the dialogue, it is necessary to adopt an effective
279
+ method to integrate role information into the dialogue, such
280
+ as persona embedding (Li et al. 2016b). Subsequently, with
281
+ the development of large-scale pre-trained language models,
282
+ an increasing number of methods (Wolf et al. 2019; Roller
283
+ et al. 2021; Lin et al. 2021; Zheng et al. 2020) have lever-
284
+ aged pre-training and fine-tuning to improve persona-based
285
+ dialogue, but the problem of dialogue consistency remains
286
+ unsolved. Therefore, Liu et al. (2020) have attempted to
287
+ model the understanding between interlocutors to improve
288
+ the consistency of dialogue systems. A new perspective
289
+ (Song et al. 2021) decomposes persona-based dialogue
290
+ tasks into consistent understanding and dialogue generation
291
+ significantly improves dialogue-consistent generation based
292
+ on natural language inference.
293
+
294
+ Latent Modeling
295
+ In a dialogue scene, the factors that associate dialogue con-
296
+ text with dialogue responses are often difficult to observe
297
+ and explain; therefore, modeling the latent space of dialogue
298
+ can help improve the performance of dialogue generation.
299
+ Optimus (Li et al. 2020) combines the advantages of BERT
300
+ (Devlin et al. 2019) and GPT-2 (Radford et al. 2020) for
301
+ large-scale pre-training in the form of VAE (Kingma and
302
+ Welling 2014) to model the latent variable space. PLATO
303
+ (Bao et al. 2020) introduces discrete latent variables to
304
+ solve the one-to-many relationship in response generation.
305
+ DialogVED (Chen et al. 2022) introduces continuous la-
306
+ tent variables into an enhanced encoder-decoder pre-training
307
+ framework to improve the relevance and diversity of dia-
308
+ logue responses. All these methods show great promise for
309
+ modeling dialogue-related features in latent space. This pa-
310
+ per extents the idea by additionally memorizing NLI rela-
311
+ tions as latent dialogue-independent features.
312
+ Learning to Memorize for Persona-consistent
313
+ Dialogue
314
+ The task of dialogue generation can be defined as the
315
+ next utterance prediction, where a target response utter-
316
+ ance R = [r1, r2, ..., r|R|] is predicted given a conversa-
317
+ tion query Q = [q1, q2, ..., q|Q|] according to given persona
318
+ constraints C = [c1, c2, ...c|C|]. For convenience, the sen-
319
+ tences (R, Q, C) are mapped to the vector representation
320
+ x = {R, Q, C}. Further, natural language inference data
321
+ (Welleck et al. 2020; Williams, Nangia, and Bowman 2018)
322
+ N = {P (n), H(n)}N
323
+ n=1, which consists of the entailed text
324
+ pairs of premise and hypothesis, was used to learn the entail-
325
+ ment relation to preserve consistency in dialogue generation.
326
+ Figure 2 shows the overall architecture of the proposed
327
+ learning to memorize the entailment and discourse rela-
328
+ tions model for a persona-consistent dialogue. The backbone
329
+ model is based on BART (Lewis et al. 2020), which per-
330
+ forms repeated two-stage training, i.e., learning to memorize
331
+ and persona-consistent dialogue generation. The key insight
332
+ of the proposed model is that it maps both the entailment
333
+ relation and discourse information to latent spaces. Based
334
+ on this information, an external memory module enforces
335
+ premise-to-hypothesis generation to map the textual entailed
336
+ pair to the Dialogue-Independent latent space, which can
337
+ be memorized and stored in a memory structure M. Simi-
338
+ larly, the discourse information was mapped using an inter-
339
+ nal memory module N to learn the Dialogue-Related fea-
340
+ tures. For generation, both entailment and discourse repre-
341
+ sentation can be obtained from memory and enhance per-
342
+ sona consistency in dialogue generation with additional en-
343
+ tailment and discourse information.
344
+ Learning to Memorize
345
+ Entailment Relation Memory (ERM).
346
+ ERM is an exter-
347
+ nal memory which is used to learn and store entailment re-
348
+ lations for persona consistency. If a given hypothesis H can
349
+ be inferred from the premise P, the relationship of the pair
350
+ is entailment. For persona-based dialogue, such an entail-
351
+ ment relationship can be introduced to generate consistent
352
+ responses.
353
+ Given
354
+ a
355
+ dataset
356
+ of
357
+ textual
358
+ entailed
359
+ pairs
360
+ N
361
+ =
362
+ {P (n), H(n)}N
363
+ n=1,
364
+ textual
365
+ entailment
366
+ generation
367
+ was
368
+ adopted to learn a latent variable z, which represents the
369
+ latent form of entailment relations in natural language
370
+ inference, defined as
371
+ p(H, z |P ) = p(z |P )p(H |z , P)
372
+ (1)
373
+ Based on the BART encoder, we introduce a special la-
374
+ tent token [z], a start-of-premise token [SOP], and an end-
375
+ of-premise token [EOP] to the premise for latent entailment
376
+ relation learning. By using the tokenizer and adding position
377
+ embeddings, the input of the premise is transformed as
378
+ EERM = [e[z], e[SOP], ep1, ep2, ..., ep|P |, e[EOP]]
379
+ (2)
380
+ We introduce a latent entailment relation memory struc-
381
+ ture M parameterized by θ, where each element represents
382
+ a certain latent factor, defined as
383
+ M = [M1, ..., Mk] ∈ Rk×d
384
+ (3)
385
+ where k is the number of latent factors in entailment rela-
386
+ tions, and d is the dimension of the memory element. The
387
+ hidden state of the last layer of the BART encoder, that is,
388
+ h[z] corresponding to e[z], was applied to learn the distribu-
389
+ tion of the latent entailment relations z ∼ p(z |P ) by
390
+ π = softmax(Wπh[z] + bπ)
391
+ (4)
392
+ where π represents the probability of each element in M.
393
+ Then, the latent entailment representation z can be easily
394
+ obtained from M:
395
+ z =
396
+ k
397
+
398
+ i=1
399
+ πiMi
400
+ (5)
401
+ To memorize the latent entailment relations, we use en-
402
+ tailment representation z from the memory M with the
403
+ weights π, along with the premise to generate the corre-
404
+ sponding hypothesis. The obtained entailment representa-
405
+ tion z was added to the special start-of-hypothesis token
406
+ [SOH] of the decoder, denote as
407
+ ˆe[SOH] = e[SOH] + z
408
+ (6)
409
+ Latent memory can keep track of the entailment relation
410
+ with the representation of the source premise by both read-
411
+ ing and writing during generation. Notably, it can be up-
412
+ dated by backpropagation of the premise-to-hypothesis gen-
413
+ eration.
414
+ The objective of the pre-training is to optimize memory
415
+ M and model parameters ϕ by minimizing the language
416
+ modeling loss:
417
+ LERM = − Ez∼pθ,ϕ(z|P ) log pθ,ϕ(H |z, P)
418
+ = − Ez∼pθ,ϕ(z|P )
419
+ |H|
420
+
421
+ t=1
422
+ log pθ,ϕ(Ht |z, P, H<t)
423
+ (7)
424
+
425
+ Bag of Words
426
+ Prediction
427
+ Orthogonal
428
+ Constraint
429
+ [SOP]
430
+ [z]
431
+ c1
432
+ c|C|
433
+ [EOP]
434
+ c2
435
+ ...
436
+ BART Encoder
437
+ h[z]
438
+ Persona
439
+ Transformer 1
440
+ Transformer 11
441
+ Transformer 12
442
+ e[z]
443
+ ...
444
+
445
+ M
446
+ z
447
+ r1
448
+ [SOR]
449
+ r2
450
+ r|R|-1
451
+ r|R|
452
+ r3
453
+ ...
454
+ BART Decoder
455
+ r1
456
+ r2
457
+ r3
458
+ r4
459
+ r|R|
460
+ [EOR]
461
+ Transformer 1
462
+ Transformer 11
463
+ Transformer 12
464
+ e[SOR]
465
+ ...
466
+ Entailment
467
+ Relation Memory
468
+ Response
469
+ ...
470
+ ...
471
+ Response
472
+ Generation
473
+ [PER]
474
+ [z]
475
+ c1
476
+ [RSP]
477
+ ... [QRY] ...
478
+ ...
479
+ Persona
480
+ Query
481
+ Response
482
+ N
483
+ zd
484
+ Dialogue Discourse
485
+ Memory
486
+
487
+ Multiple
488
+ Choice
489
+ [QRY]
490
+ Query
491
+ Q
492
+ Figure 3: Overall architecture of the proposed method for persona-consistent dialogue generation.
493
+ Algorithm 1: Latent memory learning
494
+ Input: A set of entailed text pair N = {P (n), H(n)}N
495
+ n=1 and
496
+ persona dialogue dataset x = {R, Q, C}.
497
+ Parameter: Memory M, N parameterized by θ, φ, a pre-
498
+ trained BART parameterized by ϕ.
499
+ 1: repeat
500
+ 2:
501
+ Stage 1:
502
+ 3:
503
+ Train the BART model and memory M with input N.
504
+ 4:
505
+ Minimizing Eq. (7) and optimize θ, ϕ.
506
+ 5:
507
+ Stage 2:
508
+ 6:
509
+ Fixed parameter θ.
510
+ 7:
511
+ Train the BART model and memory N with input x.
512
+ 8:
513
+ Minimizing Eq. (19) and optimize φ, ϕ.
514
+ 9: until convergence
515
+ Dialogue Discourse Memory (DDM).
516
+ Discourse coher-
517
+ ence is an important aspect of dialogue text quality. It en-
518
+ compasses how utterances are connected, as well as how the
519
+ entire dialogue is organized to convey information to the in-
520
+ terlocutor (Bao et al. 2020). Similarly, we memorized the
521
+ discourse information into an internal memory N parame-
522
+ terized by φ, as shown in Figure 3. Let C = [c1, c2, ...c|C|]
523
+ denote the persona of the agent, Q(1), ..., Q(m) represent m
524
+ dialogue queries, and R(1), ..., R(m) represent the target re-
525
+ sponses. Here, Q and R are consecutive context-response
526
+ pairs from the same dialogue session, which are used to cap-
527
+ ture the correct discourse relation in a dialogue. The input of
528
+ the BART encoder is the concatenation of the persona and
529
+ dialogue content, denoted as
530
+ EDSM = [e[z], e[PER], C, e[QRY], Q(1), e[RSP], R(1),
531
+ ..., e[QRY], Q(m)]
532
+ (8)
533
+ where [QRY] and [RSP] are two special tokens that indicate
534
+ the beginning of the query and the response, respectively.
535
+ Latent memory N ∈ Rl×d was introduced, where l rep-
536
+ resents the kind of latent dialogue discourse information. It
537
+ learns the distribution of the latent dialogue discourse using
538
+ ρ = softmax(Wρh[z] + bρ)
539
+ (9)
540
+ Then, the latent dialogue discourse representation was
541
+ calculated by
542
+ zd =
543
+ l
544
+
545
+ j=1
546
+ ρjNj
547
+ (10)
548
+ In addition, latent entailment relations should be indepen-
549
+ dent of the dialogue context. Therefore, we propose impos-
550
+ ing an orthogonal constraint on these two memory spaces
551
+ to reduce the correlation between the different latent spaces.
552
+ The orthogonal constraint can encourage the latent memory
553
+ to learn more features and reduce redundant features. To ac-
554
+ complish this goal, we used cosine similarity to represent the
555
+ relationship between them, described as
556
+ cos(M, N) =
557
+ MN⊤
558
+ ∥M∥2∥N∥2
559
+ (11)
560
+ where ∥·∥2 represents L2 normalization. Once the vectors of
561
+ different latent-memory spaces are orthogonal to each other,
562
+ the correlation between them is the lowest. Thus, the training
563
+ objective of the DDM can be defined to minimize the cosine
564
+ similarity between M and N:
565
+ LDDM =
566
+
567
+ i≤k,j≤l
568
+
569
+ MiN ⊤
570
+ j
571
+ ∥Mi∥2∥Nj∥2
572
+ �2
573
+ (12)
574
+
575
+ Model
576
+ Original
577
+ Revised
578
+ Hits@1
579
+ PPL
580
+ F1
581
+ Hits@1
582
+ PPL
583
+ F1
584
+ KV Profile Memory
585
+ 54.8
586
+ -
587
+ 14.25
588
+ 38.1
589
+ -
590
+ 13.65
591
+ Generative Profile Memory
592
+ 10.2
593
+ 35.01
594
+ 16.29
595
+ 9.9
596
+ 34.94
597
+ 15.71
598
+ LIC
599
+ 17.3
600
+ -
601
+ 17.79
602
+ 16.2
603
+ -
604
+ 16.83
605
+ Transfertransfo
606
+ 82.1
607
+ 17.51
608
+ 19.09
609
+ -
610
+ -
611
+ -
612
+ P2BOT
613
+ 81.9
614
+ 15.12
615
+ 19.77
616
+ 68.6
617
+ 18.89
618
+ 19.08
619
+ Our
620
+ 89.5
621
+ 10.99
622
+ 21.99
623
+ 85.0
624
+ 13.42
625
+ 19.54
626
+ Table 1: Automatic evaluation results of different methods for persona-based dialogue generation.
627
+ Persona-consistent Responses Generation
628
+ For generation, the model leverages latent memories of both
629
+ entailment relations and dialogue discourse to preserve con-
630
+ sistency for generating a persona-based response, denoted
631
+ as
632
+ p (R |Q, C ) = p(R
633
+ ��z, zd, Q, C)p(z
634
+ ��C)p(zd |Q, C)
635
+ (13)
636
+ We applied the persona as a premise and fed it into the
637
+ model and obtained the latent entailment relations represen-
638
+ tation z under the condition of persona from latent entail-
639
+ ment memory M. The latent entailment relation represen-
640
+ tation z and the latent dialogue discourse representation zd
641
+ are then added to the special start-of-response token e[SOR]
642
+ of the decoder input, denoted as
643
+ ˆe[SOR] = e[SOR] + z + zd
644
+ (14)
645
+ Additionally, we use a bag-of-words loss (Zhao, Zhao,
646
+ and Eskenazi 2017) to facilitate the latent variable,
647
+ LBOW = − Ez∼pϕ(z|C),zd∼pφ,ϕ( zd|C,Q)
648
+ |R|
649
+
650
+ t=1
651
+ log pφ,ϕ(Rt
652
+ ��C, Q, z, zd)
653
+ = − Ez∼pϕ(z|C),zd∼pφ,ϕ( zd|C,Q)
654
+ |R|
655
+
656
+ t=1
657
+ log
658
+ ef(Rt)
659
+
660
+ v∈V
661
+ ef(v)
662
+ (15)
663
+ where V is the whole vocabulary and f (v) represents the
664
+ predicted probability of token v appearing in the target re-
665
+ sponse.
666
+ For response generation, we also trained the parameters
667
+ of the model using a language modeling loss function:
668
+ LLM = − Ez∼pϕ(z|C),zd∼pφ,ϕ( zd|C,Q) log pφ,ϕ(R
669
+ ��C, Q, z, zd )
670
+ = − Ez∼pϕ(z|C),zd∼pφ,ϕ( zd|C,Q)
671
+ |R|
672
+
673
+ t=1
674
+ log pφ,ϕ(Rt
675
+ ��R<t, C, Q, z, zd)
676
+ (16)
677
+ Similar to (Wolf et al. 2019), we randomly sampled t in-
678
+ terference responses to train the model to select the correct
679
+ response, i.e., as a multiple-choice task. Specifically, we use
680
+ the hidden state of the last token output by the decoder to
681
+ predict the scores ˆyi of each candidate response and calcu-
682
+ late the cross-entropy loss with the ground-truth label yi, de-
683
+ noted as
684
+ ˆy = softmax(Whheos + bh)
685
+ (17)
686
+ LCLS = −
687
+ t
688
+
689
+ i=1
690
+ ˆyi log(yi)
691
+ (18)
692
+ Model
693
+ Hits@1
694
+ PPL
695
+ F1
696
+ PE-Trans
697
+ 89.4
698
+ -
699
+ -
700
+ ImageS2S
701
+ -
702
+ 11.19
703
+ 21.30
704
+ BART
705
+ 86.9
706
+ 11.85
707
+ 20.72
708
+ Our
709
+ 89.5(90.1)
710
+ 10.99(11.00)
711
+ 21.99(21.96)
712
+ Table 2: Comparison with pre-trained language models fine-
713
+ tuned on PersonaChat original mode.
714
+ Model
715
+ Dist-1
716
+ Dist-2
717
+ C.Score
718
+ LIC
719
+ 2.31
720
+ 10.71
721
+ 19.13
722
+ P2BOT
723
+ 1.87
724
+ 10.08
725
+ 23.84
726
+ BOB
727
+ 2.59
728
+ 13.90
729
+ 22.45
730
+ Our
731
+ 2.47
732
+ 13.82
733
+ 25.31
734
+ Table 3: Automatic evaluation results of different methods
735
+ for persona consistency.
736
+ In summary, the objective of our model is to minimize the
737
+ loss:
738
+ L(φ, ϕ) = LDDM + LBOW + LLM + LCLS
739
+ (19)
740
+ While training persona-consistent responses generation,
741
+ we fixed the parameters of M; the specific process is de-
742
+ scribed in Algorithm 1.
743
+ Experiments
744
+ Dataset
745
+ Dialogue Dataset.
746
+ We conducted experiments on two
747
+ publicly available dialogue datasets to evaluate the perfor-
748
+ mance of the proposed method.
749
+ • ConvAI2 PersonaChat (Dinan et al. 2020) is a chi-
750
+ tosan–chat dataset based on PersonaChat (Zhang et al.
751
+ 2018). It provides the personas of the interlocutor and is
752
+ designed to facilitate dialogue models to generate more
753
+ consistent and engaging responses.
754
+ • DSTC7-AVSD (Alamri et al. 2019) provides a conver-
755
+ sational question-answering dataset, which is similar to
756
+ that of PersonaChat. We used this dataset to explore the
757
+ performance of our proposed method on a contextual
758
+ knowledge-based dialogue task. The system must gener-
759
+ ate answers based on the given context and background
760
+
761
+ Model
762
+ BLEU-1
763
+ BLEU-2
764
+ BLEU-3
765
+ BLEU-4
766
+ METEOR
767
+ ROUGE-L
768
+ CIDEr
769
+ CMU
770
+ 0.718
771
+ 0.584
772
+ 0.478
773
+ 0.394
774
+ 0.267
775
+ 0.563
776
+ 1.094
777
+ PLATO
778
+ 0.784
779
+ 0.637
780
+ 0.525
781
+ 0.435
782
+ 0.286
783
+ 0.596
784
+ 1.209
785
+ ProphetNet
786
+ 0.824
787
+ 0.691
788
+ 0.582
789
+ 0.487
790
+ 0.313
791
+ 0.635
792
+ 1.382
793
+ DialogVED
794
+ 0.822
795
+ 0.692
796
+ 0.582
797
+ 0.489
798
+ 0.312
799
+ 0.636
800
+ 1.391
801
+ Our
802
+ 0.801
803
+ 0.680
804
+ 0.576
805
+ 0.488
806
+ 0.316
807
+ 0.631
808
+ 1.403
809
+ Table 4: Automatic evaluation results of different methods for DSTC7-AVSD.
810
+ Model
811
+ Fluency
812
+ Consistency Avg
813
+ LIC
814
+ 3.27
815
+ 2.11
816
+ 2.69
817
+ P2BOT
818
+ 3.51
819
+ 2.20
820
+ 2.86
821
+ Our
822
+ 3.57
823
+ 2.31
824
+ 2.94
825
+ Table 5: Human evaluation results.
826
+ Hits@1
827
+ F1
828
+ BLEU-4
829
+ C.Score
830
+ BART
831
+ 86.9
832
+ 20.72
833
+ 0.01289
834
+ 21.32
835
+ w/o ERM
836
+ 89.3
837
+ 21.70
838
+ 0.01597
839
+ 22.09
840
+ w/o DDM
841
+ 88.4
842
+ 21.72
843
+ 0.01406
844
+ 24.66
845
+ w/o OC
846
+ 88.8
847
+ 21.84
848
+ 0.01485
849
+ 25.01
850
+ Our
851
+ 89.5
852
+ 21.99
853
+ 0.01561
854
+ 25.31
855
+ Table 6: Analysis of ablation experiments on the Per-
856
+ sonaChat original mode.
857
+ knowledge of the conversation. We used only text infor-
858
+ mation for the experiments.
859
+ NLI Dataset.
860
+ Additionally, two natural language infer-
861
+ ence datasets were used to learn the corresponding ERM.
862
+ • DNLI (Welleck et al. 2020) is a dialogue inference
863
+ dataset based on PersonaChat. The dataset consisted of
864
+ sentence pairs labeled as entailment, neutral, or contra-
865
+ dictory.
866
+ • MNLI (Williams, Nangia, and Bowman 2018) is a multi-
867
+ genre natural language inference corpus and one of the
868
+ largest corpora available for recognizing textual entail-
869
+ ments.
870
+ Compared Methods
871
+ Baseline.
872
+ Both KV profile memory and generative pro-
873
+ file memory (Zhang et al. 2018) are the official baselines
874
+ for PersonaChat, whereas LIC (Golovanov et al. 2020) was
875
+ the best performing model in ConvAI2 for human evalua-
876
+ tion, and Transfertransfo (Wolf et al. 2019) achieved the
877
+ best performance on automatic metrics in ConvAI2. For
878
+ DSTC7-AVSD, CMU (Sanabria, Palaskar, and Metze 2018)
879
+ achieved the best performance for all evaluation metrics in
880
+ the competition.
881
+ State of the art.
882
+ P2BOT (Liu et al. 2020) models the
883
+ understanding between the interlocutors and obtains a new
884
+ state-of-the-art on ConvAI2. Poly-Encoder Transformer
885
+ (PE-Trans) (Humeau et al. 2019) was pre-trained on Reddit
886
+ and fine-tuned on ConvAI2 to obtain the best performance
887
+ in the response selection task. Imageseq2Seq Dodecadi-
888
+ alogue (ImageS2S) (Shuster et al. 2020) was trained on 12
889
+ tasks and fine-tuned on the ConvAI2 generation task. BOB
890
+ (Song et al. 2021) disentangles persona-based dialogue gen-
891
+ eration into consistent understanding and dialogue genera-
892
+ tion tasks to ensure that the model has a better consistent un-
893
+ derstanding. For DSTC7-AVSD, PLATO (Bao et al. 2020)
894
+ was the first large-scale pre-trained dialogue language model
895
+ that introduced a discrete variable for one-to-many relation-
896
+ ship modeling. ProphetNets (Qi et al. 2020) proposed a
897
+ pre-training objective for predicting multiple future tokens
898
+ to enhance the performance of pre-trained language mod-
899
+ els on natural language generation tasks. DialogVED (Chen
900
+ et al. 2022) is a pre-trained model framework to enhance the
901
+ encoder-decoder by introducing continuous latent variables
902
+ and obtaining the state-of-the-art on the DSTC7-AVSD.
903
+ Implementation Details
904
+ The proposed model was initialized using BART-large.
905
+ AdamW (Loshchilov and Hutter 2019) was applied to op-
906
+ timize the model, with an initial learning rate of 8e-6. We
907
+ used DNLI on PersonaChat and MNLI on DSTC7-AVSD
908
+ for the ERM learning. The batch size was 64 for training
909
+ stage 1, and we used a batch size of two with a gradient ac-
910
+ cumulation of eight for training stage 2. The types of ERM
911
+ and DDM were both set to 10 for PersonaChat and set to
912
+ 20 and 5 for DSTC7-AVSD. The proposed model trained on
913
+ one NVIDIA RTX 3090 with PyTorch framework. For dia-
914
+ logue generation, we used a beam search, and the maximum
915
+ sequence length was set to 50.
916
+ Automatic Evaluation
917
+ Following the official automatic evaluation, we used
918
+ Hits@1, Perplexity (PPL), and F1 for automatic evaluation
919
+ on the PersonaChat dataset. Hits@1 is the probability that
920
+ the golden response ranks the highest among the 20 candi-
921
+ date responses. Perplexity was used to calculate the nega-
922
+ tive log-likelihood of the golden response from the model.
923
+ F1 is calculated from the precision and recall at the word
924
+ level between the predicted and golden responses. For per-
925
+ sona consistency, we apply Consistency Score (C.Score)
926
+ (Madotto et al. 2020), which leverages a referee model to
927
+ predict consistency between response and persona. Dist-1/2
928
+ (Li et al. 2016a) is used to measure response diversity.
929
+ The BLEU, METEOR, ROUGE-L, and CIDEr metrics
930
+ were reported for DSTC7-AVSD automatic evaluation, sim-
931
+ ilar to DSTC7 reviews (Alamri et al. 2019).
932
+
933
+ Model
934
+ BLEU-1
935
+ BLEU-2
936
+ BLEU-3
937
+ BLEU-4
938
+ METEOR
939
+ ROUGE-L
940
+ CIDEr
941
+ BART
942
+ 0.791
943
+ 0.668
944
+ 0.562
945
+ 0.473
946
+ 0.307
947
+ 0.619
948
+ 1.372
949
+ w/o ERM
950
+ 0.795
951
+ 0.671
952
+ 0.565
953
+ 0.477
954
+ 0.313
955
+ 0.625
956
+ 1.395
957
+ w/o DDM
958
+ 0.799
959
+ 0.676
960
+ 0.571
961
+ 0.482
962
+ 0.309
963
+ 0.625
964
+ 1.388
965
+ w/o OC
966
+ 0.782
967
+ 0.660
968
+ 0.557
969
+ 0.473
970
+ 0.309
971
+ 0.620
972
+ 1.388
973
+ Our
974
+ 0.801
975
+ 0.680
976
+ 0.576
977
+ 0.488
978
+ 0.316
979
+ 0.631
980
+ 1.403
981
+ Table 7: Analysis of ablation experiments on the DSTC7-AVSD.
982
+ Table 1 presents the automatic evaluation results of the
983
+ different methods for persona-based dialogue generation. As
984
+ indicated, the proposed model outperformed all the base-
985
+ lines on the PersonaChat dataset, especially on the revised
986
+ dataset. The proposed model achieved significant improve-
987
+ ments in response selection tasks because ERM can provide
988
+ more entailed information about the persona while DDM
989
+ can captures the appropriate discourse information in the di-
990
+ alogue, making it easier to distinguish the correct response
991
+ from the candidate responses. The improvement in PPL and
992
+ F1 also shows that ERM and DDM can further improve the
993
+ consistency of the persona and the quality of the response.
994
+ Table 2 compares the results of the proposed method
995
+ with some pre-trained language models fine-tuned on the
996
+ PersonaChat. The results of training with 14 interference
997
+ responses are in parentheses. The proposed model also
998
+ achieves better results compared to models trained on larger
999
+ corpora and more tasks. Additionally, adding more interfer-
1000
+ ence responses can improve the accuracy of the model to se-
1001
+ lect the correct response. Table 3 shows the result of persona
1002
+ consistency. The proposed model still obtained the highest
1003
+ C.Score, which indicates that the responses generated by the
1004
+ proposed model perform the best on persona consistency.
1005
+ Table 4 shows the experimental results of DSTC7-
1006
+ AVSD. The proposed model achieves the best results for
1007
+ METROR and CIDEr and is close to the best model for
1008
+ the other metrics. Better performance on CIDEr shows that
1009
+ in background-based dialogue question answering, the pro-
1010
+ posed model can use ERM to capture key information in the
1011
+ background and combine the dialogue history to generate
1012
+ high-quality responses.
1013
+ Human Evaluation
1014
+ We conducted a human evaluation of the state-of-the-art
1015
+ models (LIC, P2BOT) and the proposed method. We ran-
1016
+ domly sampled 100 responses generated by these models
1017
+ from the original PersonaChat dev set for the human eval-
1018
+ uation. Both fluency and consistency were applied as cri-
1019
+ teria. Four human annotators were asked to rate fluency
1020
+ on a scale of 1 to 5 and consistency on a scale of 1 to
1021
+ 3, where the Fleiss’s kappa of fluency and consistency are
1022
+ 0.578 and 0.671. Here, fluency indicates the smoothness of
1023
+ responses and conversation, coherence is included, where 1
1024
+ means terrible and 5 represents very satisfying. Consistency
1025
+ represents the consistency between persona and response,
1026
+ which reflects whether the model can maintain persona con-
1027
+ sistency, where 1 means it does not match persona, 2 means
1028
+ it is irrelevant, and 3 means it is consistent with persona.
1029
+ As shown in Table 5, the results of the human evaluation
1030
+ are consistent with the automatic evaluation, and our model
1031
+ outperforms the previous best-performing model on human
1032
+ evaluation in terms of both fluency and consistency. Several
1033
+ examples of the generated responses are provided in the Ap-
1034
+ pendix to help illustrate the effectiveness of our model.
1035
+ Ablation Study
1036
+ We conducted ablation experiments on the PersonaChat and
1037
+ DSTC7-AVSD to explore the impact of each module. The
1038
+ ablation results are presented in Tables 6 and 7, respectively.
1039
+ Effect of ERM.
1040
+ After removing the ERM, the C.Score be-
1041
+ comes lower on PersonaChat, which shows that the ERM
1042
+ can make the response generated by the model more consis-
1043
+ tent with its persona and improve the persona consistency in
1044
+ the dialogue response. In dialogue question answering, ERM
1045
+ can capture the key information in the background so that the
1046
+ generated answers can achieve better results for CIDEr.
1047
+ Effect of DDM.
1048
+ The large decline in BLEU-4 indicates
1049
+ that the quality of the responses generated by the model
1050
+ deteriorates without DDM. The metric of METEOR has a
1051
+ high correlation with the results of human judgment. With-
1052
+ out DDM, METEOR drops to a large extent, validating the
1053
+ important role that DDM plays in response generation and
1054
+ DDM can effectively capture the connections of the utter-
1055
+ ances in the dialogue, thereby making the responses more
1056
+ coherent and natural.
1057
+ Effect of the Orthogonal Constraint (OC).
1058
+ Imposing or-
1059
+ thogonality constraints on the two latent spaces effectively
1060
+ reduces redundant features and makes the features captured
1061
+ by the model easier to distinguish, thereby improving the
1062
+ quality of generation and performance in response selection.
1063
+ Conclusion
1064
+ In this paper, we propose a dialogue generation method
1065
+ for learning to memorize entailment and discourse rela-
1066
+ tions with latent variables. Combining latent entailment re-
1067
+ lations and dialogue discourse relations makes generated re-
1068
+ sponses more coherent and consistent. Experiments on the
1069
+ PersonaChat dataset demonstrate the effectiveness of the
1070
+ proposed method. The results on the DSTC7-AVSD dataset
1071
+ also show that learning entailment and discourse relations
1072
+ are beneficial for dialogue question-answering generation.
1073
+ Future works will attempt to explore different latent re-
1074
+ lations in text pairs on different datasets and combine the
1075
+ discourse relations in the dialogue to make the dialogue gen-
1076
+ eration in the desired direction.
1077
+
1078
+ Acknowledgments
1079
+ This work was supported by the National Natural Science
1080
+ Foundation of China (NSFC) under Grant Nos. 61966038
1081
+ and 62266051, the Ministry of Science and Technology, Tai-
1082
+ wan, ROC, under Grant No. MOST 111-2628-E-155-001-
1083
+ MY2 and the Postgraduate Research and Innovation Foun-
1084
+ dation of Yunnan University under Grant No.2021Z076. The
1085
+ authors would like to thank the anonymous reviewers for
1086
+ their constructive comments.
1087
+ References
1088
+ Alamri, H.; Cartillier, V.; Das, A.; Wang, J.; Cherian, A.;
1089
+ Essa, I.; Batra, D.; Marks, T. K.; Hori, C.; Anderson, P.; Lee,
1090
+ S.; and Parikh, D. 2019. Audio visual scene-aware dialog.
1091
+ In Proceedings of the IEEE Conference on Computer Vision
1092
+ and Pattern Recognition, (CVPR-2019), 7558–7567.
1093
+ Bao, S.; He, H.; Wang, F.; Wu, H.; and Wang, H. 2020.
1094
+ PLATO: Pre-trained Dialogue Generation Model with Dis-
1095
+ crete Latent Variable. In Proceedings of the 58th Annual
1096
+ Meeting of the Association for Computational Linguistics,
1097
+ (ACL-2020), 85–96.
1098
+ Chen, W.; Gong, Y.; Wang, S.; Yao, B.; Qi, W.; Wei, Z.; Hu,
1099
+ X.; Zhou, B.; Mao, Y.; Chen, W.; Cheng, B.; and Duan, N.
1100
+ 2022. DialogVED: A Pre-trained Latent Variable Encoder-
1101
+ Decoder Model for Dialog Response Generation. In Pro-
1102
+ ceedings of the 60th Annual Meeting of the Association for
1103
+ Computational Linguistics,(ACL-2022), 4852–4864.
1104
+ Devlin, J.; Chang, M. W.; Lee, K.; and Toutanova, K. 2019.
1105
+ BERT: Pre-training of deep bidirectional transformers for
1106
+ language understanding. In Proceedings of the 2019 Con-
1107
+ ference of the North American Chapter of the Association
1108
+ for Computational Linguistics: Human Language Technolo-
1109
+ gies, (NAACL-HLT 2019), 4171–4186.
1110
+ Dinan, E.; Logacheva, V.; Malykh, V.; Miller, A.; Shuster,
1111
+ K.; Urbanek, J.; Kiela, D.; Szlam, A.; Serban, I.; Lowe, R.;
1112
+ Prabhumoye, S.; Black, A. W.; Rudnicky, A.; Williams, J.;
1113
+ Pineau, J.; Burtsev, M.; and Weston, J. 2020. The Second
1114
+ Conversational Intelligence Challenge (ConvAI2).
1115
+ arXiv
1116
+ preprint arXiv:1902.00098.
1117
+ Golovanov, S.; Kurbanov, R.; Nikolenko, S.; Truskovskyi,
1118
+ K.; Tselousov, A.; and Wolf, T. 2020. Large-scale transfer
1119
+ learning for natural language generation. In Proceedings of
1120
+ the 57th Annual Meeting of the Association for Computa-
1121
+ tional Linguistics,(ACL-2019), 6053–6058.
1122
+ Humeau, S.; Shuster, K.; Lachaux, M.-A.; and Weston, J.
1123
+ 2019. Poly-encoders: Architectures and Pre training Strate-
1124
+ gies for Fast and Accurate Multi sentence Scoring. In Inter-
1125
+ national Conference on Learning Representations, (ICLR-
1126
+ 2020).
1127
+ Kingma, D. P.; and Welling, M. 2014. Auto-encoding vari-
1128
+ ational bayes. In Proceedings of 2nd International Confer-
1129
+ ence on Learning Representations, (ICLR-2014).
1130
+ Lewis, M.; Liu, Y.; Goyal, N.; Ghazvininejad, M.; Mo-
1131
+ hamed, A.; Levy, O.; Stoyanov, V.; and Zettlemoyer, L.
1132
+ 2020. BART: Denoising Sequence-to-Sequence Pre-training
1133
+ for Natural Language Generation, Translation, and Com-
1134
+ prehension. In Proceedings of the 58th Annual Meeting of
1135
+ the Association for Computational Linguistics,(ACL-2020),
1136
+ 7871–7880.
1137
+ Li, C.; Gao, X.; Li, Y.; Peng, B.; Li, X.; Zhang, Y.; and
1138
+ Gao, J. 2020.
1139
+ OPTIMUS: Organizing sentences via pre-
1140
+ trained modeling of a latent space. In Proceedings of the
1141
+ 2020 Conference on Empirical Methods in Natural Lan-
1142
+ guage Processing,(EMNLP-2020), 4678–4699.
1143
+ Li, J.; Galley, M.; Brockett, C.; Gao, J.; and Dolan, B. 2016a.
1144
+ A diversity-promoting objective function for neural conver-
1145
+ sation models. In Proceedings of the 2016 Conference of the
1146
+ North American Chapter of the Association for Computa-
1147
+ tional Linguistics: Human Language Technologies,(NAACL-
1148
+ 2016), 110–119.
1149
+ Li, J.; Galley, M.; Brockett, C.; Spithourakis, G. P.; Gao,
1150
+ J.; and Dolan, B. 2016b. A persona-based neural conversa-
1151
+ tion model. In Proceedings of the 54th Annual Meeting of
1152
+ the Association for Computational Linguistics, (ACL-2016),
1153
+ 994–1003.
1154
+ Lin, Z.; Madotto, A.; Bang, Y.; and Fung, P. 2021.
1155
+ The Adapter-Bot: All-In-One Controllable Conversational
1156
+ Model. In Proceedings of the 35th AAAI Conference on Ar-
1157
+ tificial Intelligence, (AAAI-2021), 16081–16083.
1158
+ Liu, Q.; Chen, Y.; Chen, B.; LOU, J.-G.; Chen, Z.; Zhou, B.;
1159
+ and Zhang, D. 2020. You Impress Me: Dialogue Genera-
1160
+ tion via Mutual Persona Perception. In Proceedings of the
1161
+ 58th Annual Meeting of the Association for Computational
1162
+ Linguistics, (ACL-2020), 1417–1427.
1163
+ Loshchilov, I.; and Hutter, F. 2019. Decoupled weight de-
1164
+ cay regularization. In Proceedings of the 7th International
1165
+ Conference on Learning Representations, (ICLR-2019).
1166
+ Madotto, A.; Lin, Z.; Wu, C. S.; and Fung, P. 2020. Person-
1167
+ alizing dialogue agents via meta-learning. In Proceedings
1168
+ of the 57th Annual Meeting of the Association for Computa-
1169
+ tional Linguistics, (ACL-2019), 5454–5459.
1170
+ Nie, Y.; Williamson, M.; Bansal, M.; Kiela, D.; and Weston,
1171
+ J. 2021. I like fish, especially dolphins: Addressing contra-
1172
+ dictions in dialogue modeling. In Proceedings of the 59th
1173
+ Annual Meeting of the Association for Computational Lin-
1174
+ guistics and the 11th International Joint Conference on Nat-
1175
+ ural Language Processing,(ACL-2021), 1699–1713.
1176
+ Qi, W.; Yan, Y.; Gong, Y.; Liu, D.; Duan, N.; Chen,
1177
+ J.;
1178
+ Zhang,
1179
+ R.;
1180
+ and
1181
+ Zhou,
1182
+ M.
1183
+ 2020.
1184
+ ProphetNet:
1185
+ Predicting future n-gram for sequence-to-sequence pre-
1186
+ training. In Findings of the Association for Computational
1187
+ Linguistics,(EMNLP-2020), 2401–2410.
1188
+ Radford, A.; Wu, J.; Child, R.; Luan, D.; Amodei, D.; and
1189
+ Sutskever, I. 2020.
1190
+ Language Models are Unsupervised
1191
+ Multitask Learners. OpenAI Blog, 1(May): 1–7.
1192
+ Roller, S.; Dinan, E.; Goyal, N.; Ju, D.; Williamson, M.; Liu,
1193
+ Y.; Xu, J.; Ott, M.; Shuster, K.; Smith, E. M.; Boureau, Y. L.;
1194
+ and Weston, J. 2021. Recipes for building an open-domain
1195
+ chatbot. In Proceedings of the 16th Conference of the Euro-
1196
+ pean Chapter of the Association for Computational Linguis-
1197
+ tics, (EACL-2021), 300–325.
1198
+ Sanabria, R.; Palaskar, S.; and Metze, F. 2018. CMU Sin-
1199
+ bad’s Submission for the DSTC7 AVSD Challenge. Dstc7.
1200
+
1201
+ Shum, H.; He, X.; and Li, D. 2018. From Eliza to XiaoIce:
1202
+ challenges and opportunities with social chatbots.
1203
+ Fron-
1204
+ tiers of Information Technology and Electronic Engineering,
1205
+ 19(1): 10–26.
1206
+ Shuster, K.; JU, D.; Roller, S.; Dinan, E.; Boureau, Y.-L.;
1207
+ and Weston, J. 2020.
1208
+ The Dialogue Dodecathlon: Open-
1209
+ Domain Knowledge and Image Grounded Conversational
1210
+ Agents.
1211
+ In Proceedings of the 58th Annual Meeting of
1212
+ the Association for Computational Linguistics, (ACL-2020),
1213
+ 2453–2470.
1214
+ Song, H.; Wang, Y.; Zhang, K.; Zhang, W. N.; and Liu, T.
1215
+ 2021. BoB: BERT over BERT for training persona-based
1216
+ dialogue models from limited personalized data.
1217
+ In Pro-
1218
+ ceedings of the 59th Annual Meeting of the Association for
1219
+ Computational Linguistics and the 11th International Joint
1220
+ Conference on Natural Language Processing,(ACL-2021),
1221
+ 167–177.
1222
+ Sutskever, I.; Vinyals, O.; and Le, Q. V. 2014. Sequence to
1223
+ sequence learning with neural networks. In Proceedings of
1224
+ Advances in Neural Information Processing Systems,(NIPS-
1225
+ 2014), 3104–3112.
1226
+ Welleck, S.; Weston, J.; Szlam, A.; and Cho, K. 2020. Di-
1227
+ alogue natural language inference.
1228
+ In Proceedings of the
1229
+ 57th Annual Meeting of the Association for Computational
1230
+ Linguistics, (ACL-2019), 3731–3741.
1231
+ Williams, A.; Nangia, N.; and Bowman, S. R. 2018.
1232
+ A
1233
+ broad-coverage challenge corpus for sentence understand-
1234
+ ing through inference.
1235
+ In Proceedings of the 2018 Con-
1236
+ ference of the North American Chapter of the Associ-
1237
+ ation for Computational Linguistics: Human Language
1238
+ Technologies,(NAACL-2018), 1112–1122.
1239
+ Wolf, T.; Sanh, V.; Chaumond, J.; and Delangue, C. 2019.
1240
+ TransferTransfo: A Transfer Learning Approach for Neu-
1241
+ ral Network Based Conversational Agents. arXiv preprint
1242
+ arXiv:1901.08149.
1243
+ Zhang, S.; Dinan, E.; Urbanek, J.; Szlam, A.; Kiela, D.; and
1244
+ Weston, J. 2018. Personalizing dialogue agents: I have a
1245
+ dog, do you have pets too? In Proceedings of the 56th An-
1246
+ nual Meeting of the Association for Computational Linguis-
1247
+ tics, (ACL-2018), 2204–2213.
1248
+ Zhao, T.; Zhao, R.; and Eskenazi, M. 2017.
1249
+ Learning
1250
+ discourse-level diversity for neural dialog models using con-
1251
+ ditional variational autoencoders. In Proceedings of the 55th
1252
+ Annual Meeting of the Association for Computational Lin-
1253
+ guistics, (ACL-2017), 654–664.
1254
+ Zheng, Y.; Zhang, R.; Mao, X.; and Huang, M. 2020. A
1255
+ Pre-Training based personalized dialogue generation model
1256
+ with persona-sparse data. In Proceedings of the 34th AAAI
1257
+ Conference on Artificial Intelligence, (AAAI-2020), 9693–
1258
+ 9700.
1259
+ Appendix
1260
+ Case Study
1261
+ Tables 8 and 9 present the responses generated by the dif-
1262
+ ferent methods on PersonaChat. As indicated, the responses
1263
+ generated by the proposed method were more consistent
1264
+ with their personas and coherence on PersonaChat. In Ta-
1265
+ ble 8, the responses generated by P2BOT and BoB are in-
1266
+ consistent with other hobbies in the query, even though the
1267
+ responses are consistent with the persona. Both LIC and our
1268
+ model generate more coherent responses based on other per-
1269
+ sona. As shown in Table 9, the responses generated by LIC
1270
+ are irrelevant to the personas. P2BOT and BoB tend to ig-
1271
+ nore content from dialogue, generating repetitive responses
1272
+ that make the entire conversation incoherent. Our model can
1273
+ effectively combine dialogue content and persona to gener-
1274
+ ate appropriate responses.
1275
+ Table 10 provides the responses generated on DSTC7-
1276
+ AVSD, where the models need to generate responses based
1277
+ on the given background knowledge and dialogue content. It
1278
+ can be found that our model is able to combine dialogue con-
1279
+ tent to generate answers with key information in the context
1280
+ that is closely related to the query.
1281
+
1282
+ Persona
1283
+ i listen to rap music.
1284
+ i produce music for artists.
1285
+ i drive a 2015 honda civic.
1286
+ my favourite food is pizza.
1287
+ Context
1288
+ Q: hi , how are you ? do you have any brothers or sisters ?
1289
+ R: no i don’t do you ?
1290
+ Q: yes , i’m 13 and i’ve an older brother .
1291
+ R: that’s nice what kind of music do you like
1292
+ Q: i do not have much time as i play soccer . you ?
1293
+ R: i am a music producer for rap artists
1294
+ Query
1295
+ cool i like rap . i hate maths though ! do you have other hobbies
1296
+ GOLD
1297
+ work takes up a lot of my time
1298
+ LIC
1299
+ i love to eat pizza .
1300
+ BoB
1301
+ i like music and i like to listen to music (Incoherent with query)
1302
+ P2BOT
1303
+ i like to listen to rap music (Incoherent with query)
1304
+ Our
1305
+ i like to drive my honda civic
1306
+ Table 8: Case analysis of response generation on the PersonaChat.
1307
+ Persona
1308
+ my dream car is a rolls royce ghost.
1309
+ i currently work for a watch dealer.
1310
+ my family does not support my career choices.
1311
+ i often shop for shoes and watches.
1312
+ i like shopping.
1313
+ Context
1314
+ Q: good evening . what are you up to ?
1315
+ R: hello , how are you ? i am well . i like to shop for shoes and watches .
1316
+ Q: i don’t shop much . prefer to relax at home with my cow .
1317
+ R: what do you do ? i’m work for a watch dealer .
1318
+ Query
1319
+ no wonder you like watches ! i’m a commercial electrician
1320
+ GOLD
1321
+ wonderful ! yeah , however , my family does not support my choice of career .
1322
+ LIC
1323
+ i love watching movies (Irrelevant to persona)
1324
+ BoB
1325
+ i work at a dealership, but i am not very good at it.
1326
+ P2BOT
1327
+ what do you do for a living ? i work for the watch . (Incoherent with context)
1328
+ Our
1329
+ my family does not support my career choices .
1330
+ Query
1331
+ why not ? family is important .
1332
+ GOLD
1333
+ i’m not sure why they do not . do you like cars ?
1334
+ LIC
1335
+ i like to watch movies (Irrelevant to persona)
1336
+ BoB
1337
+ i am not sure. i am a watch dealer. (Incoherent with context)
1338
+ P2BOT
1339
+ my family doesn ’ t support my lifestyle choices . (Incoherent with context)
1340
+ Our
1341
+ i do not know . i do have a dream car though . it is a rolls royce ghost .
1342
+ Table 9: Case analysis of response generation on the PersonaChat.
1343
+
1344
+ Caption
1345
+ a man closes his window , then he sneezes twice before taking a drink . then
1346
+ he opens up a bag and digs through it looking for something before walking
1347
+ out of the room .
1348
+ Summary
1349
+ a man closes the window , goes to the table and goes through the items in a
1350
+ bag , takes a drink from the green cup and leaves the room .
1351
+ Context
1352
+ Q: what is the guy doing at the window?
1353
+ R: the guy is closing the window
1354
+ Q: what does he do after that?
1355
+ Baseline
1356
+ he picks up a book from the table
1357
+ PLATO
1358
+ he goes to the table and takes a drink from a green cup
1359
+ DialogVED
1360
+ he goes to the table and goes through the items in a bag before taking a
1361
+ drink
1362
+ Our
1363
+ he sneezes twice and then takes a drink
1364
+ Table 10: Case analysis of response generation on the DSTC7-AVSD.
1365
+
-dE4T4oBgHgl3EQfDwsm/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2dAzT4oBgHgl3EQfDvol/content/tmp_files/2301.00980v1.pdf.txt ADDED
@@ -0,0 +1,1220 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00980v1 [gr-qc] 3 Jan 2023
2
+ The Thermal Substructure of General Relativity
3
+ Manfred Requardt
4
+ Institut fuer Theoretische Physik
5
+ Universitaet Goettingen
6
+ Friedrich-Hund-Platz 1
7
+ 37077 Goettingen
8
+ Germany
9
+ (E-mail: [email protected] or
10
11
+ Abstract
12
+ In a first step we will provide arguments for the understanding of
13
+ quantum space-time (QST), that means, the microscopic substructure
14
+ which is assumed to underly ordinary smooth classical space-time, as a
15
+ thermal system at each (macroscopic) point x of the classical space-time
16
+ manifold (ST). In this context we exploit among other things some recent
17
+ findings in the foundations of quantum statistical mechanics.
18
+ We argue that the classical metric tensor field gij(x) plays the role of an
19
+ order parameter field, signalling the existence of a primordial phase tran-
20
+ sition in which both space-time and (quantum) matter emerged, accom-
21
+ panied by the spontaneous symmetry breaking (SSB) of diffeomorphism
22
+ invariance which is induced by the existence of quantum excitations in
23
+ QST.
24
+ We then analyze the role the Einstein equations (EEQ) are playing
25
+ in this context and relate them to the local thermodynamical heat influx
26
+ into QST at point x, thus defining the Einstein tensor or Ricci tensor as
27
+ local heat tensor. We also define local gravitational temperature, entropy
28
+ and internal energy.
29
+ Finally, we give a thermodynamic interpretation of the conserved Noether
30
+ current which derives from diffeomorphism invariance, separating it into
31
+ heat contributions and work terms. In this connection we discuss the role
32
+ and nature of tensor and non-tensor quantities and relate our investigation
33
+ to the socalled energy vector of Hilbert‘s classical analysis.
34
+
35
+ 1
36
+ Introduction
37
+ Without question one of the most unexpected developements in general rela-
38
+ tivity was the realisation that there exists a close relationship between certain
39
+ laws of classical black hole (BH) physics and the laws of thermodynamics ([1]).
40
+ This fundamental connection was first described by Bekenstein ([2],[3]) and a
41
+ little bit later supported by the fundamental analysis of Hawking ([4]). A nice
42
+ overview is given for example in [5].
43
+ That there might perhaps exist a closer and even more fundamental connec-
44
+ tion between classical relativity and thermodynamics was, as far as we know,
45
+ emphasized by Jacobson ([6]) and further developed in e.g. [7] and many pa-
46
+ pers of Padmanabhan (see, for example,[8],[9] or [10]). It was shown that one
47
+ can infer from the physics near horizons, in particular the event horizon of a
48
+ black hole, that the Einstein equation (EEQ) must hold. One important tool
49
+ in this context was the use of approximate Rindler-Unruh horizons and the
50
+ corresponding results of Fulling-Unruh ([11],[12]).
51
+ One should remark that, as far as we can see, all the many papers which do
52
+ exist in this context emphasize the importance of horizons and the role which
53
+ is played by the entanglement entropy of systems behind these horizons. That
54
+ is, from this view point, entropy and more generally thermodynamics appear
55
+ to be essentially located near these horizons and not e.g. in the bulk. These
56
+ properties seem to be suggested, for example, by the famous entropy area law
57
+ of black holes (BH).
58
+ Whereas horizons apparently seem to play such a fundamental role for the
59
+ thermal behavior of gravitation, we want to go a step further and will argue
60
+ in this paper that in our view the situation is a different one and that both
61
+ the Einstein equation (EEQ) and gravitation in general are of a thermal nature
62
+ being independent of the existence of horizons and which can be inferred by
63
+ analyzing the ordinary bulk situation in general relativity (GR). The special
64
+ behavior near horizons is then rather a particular consequence of this more
65
+ general scenario.
66
+ In a first step we will provide arguments for the understanding of quantum
67
+ space-time (QST), that is, the microscopic structure which underlies our or-
68
+ dinary classical smooth space-time manifold ST, as a thermal system at each
69
+ macroscopic point x ∈ ST . This will be done in the next section (some remarks
70
+ in this direction have already been made in [13]. Early ideas can already be
71
+ found in the work of Sakharov but without a thermal connotation (see e.g. [14]
72
+ and [15]). We will exploit more recent findings in the foundations of modern
73
+ quantum statistical mechanics ([16],[17],[18]). Furthermore we will introduce
74
+ the notion of the classical space-time metric gij(x) as an order parameter field
75
+ and classical smooth space-time as an order parameter manifold.
76
+ By these notions we mean the following. As briefly described in [13], we as-
77
+ sume that (Q)ST emerged as the consequence of a primordial phase transition
78
+ PT. In this context a non-vanishing field of observables gij(x) came into exis-
79
+ tence which was zero or rather vanishing before the phase transition happened
80
+ in the primordial soup. That is, gij(x) and ST represent parameters which in-
81
+ 2
82
+
83
+ dicate that a certain phase transition took place. Such a quantity is typically
84
+ called an order parameter.
85
+ We start from the following assumption or observation: Classical space-time
86
+ ST remains to be smooth on all ordinary scales of the quantum matter regime.
87
+ So we conjecture that the typical scale where quantum gravity effects emerge is
88
+ the Planck scale, that is
89
+ lp = ℏG/c3
90
+ ,
91
+ tp = ℏG/c5 = lp/c
92
+ (1)
93
+ We hence assume that the typical quantum gravity degrees of freedom (DoF) live
94
+ on the same scale. This implies that, as e.g. in hydrodynamics, there exist many
95
+ quantum gravity DoF in the infinitesimal neighborhood of the macroscopic point
96
+ x ∈ ST in the classical space-time manifold ST. That is, we can assume that at
97
+ each macroscopic point x exists a microscopic subsystem in QST, consisting of
98
+ many DoF. That these subsystems behave thermally will be proved in the next
99
+ section.
100
+ In a second step we will interpret the EEQ (sign convention as in [19])
101
+ Gab := Rab − 1/2 · R · gab = κ · Tab
102
+ ,
103
+ κ = 8πG/c4
104
+ (2)
105
+ in this thermodynamic context. That is, even if we assume that the global state
106
+ of the microscopic QST is pure, the local state around some macroscopic point
107
+ x is a thermal ensemble (density matrix) due to its intricate entanglement with
108
+ its environment. From the findings in the papers, mentioned above, we may
109
+ then conclude that with overwhelming probability the local states are thermal.
110
+ As the local states around the points of the space-time manifold ST are
111
+ thermal it seems reasonable to give also the EEQ a thermal interpretation.
112
+ One should note that already Lorentz or Levy-Civita in 1916 or 1917 tried to
113
+ interpret the EEQ as saying that the total energy of the universe is vanishing
114
+ (cf. [20])
115
+ (Tab − κ−1Gab) ≡ 0
116
+ hence
117
+ ∂a(T a
118
+ b − κ−1Ga
119
+ b) ≡ 0
120
+ ∂a := ∂/∂xa
121
+ (3)
122
+ Einstein provided an argument against such an interpretation (see [20]) which
123
+ seems to be sound at first glance, but one should take into account that at that
124
+ time quantum theory was not yet fully developed (cf. e.g. our arguments, given
125
+ in [13]).
126
+ In this paper we will only comment on the vast field of gravitational en-
127
+ ergy and its localization in general relativity (GR) in so far as it concerns the
128
+ problems we want to analyze in the following.
129
+ An interesting point of view
130
+ is developed for example in [21], where it is claimed that gravitational energy
131
+ should be located at places where Tab ̸= 0. However, one generally assumes
132
+ that non-vanishing curvature has something to do with gravitational energy.
133
+ The latter one can of course be non-zero where Tab vanishes.
134
+ If the microscopic substructure , i.e. QST, of the classical smooth space-
135
+ time ST is locally a thermal system, it should possess what one calls internal
136
+ energy in thermodynamics. As in [13] we assume the existence of an interaction
137
+ 3
138
+
139
+ between matter and space-time on the quantum level, that is, between QST and
140
+ QM (quantum matter). The macroscopic ponderable matter and fields making
141
+ up the right side of the EEQ consist of many microscopic DoF on the quantum
142
+ scale. The same holds for the left side which describes a curvature property of
143
+ ST.
144
+ All this leads us to the following conjecture:
145
+ Conjecture 1.1 We assume that
146
+ Tab = κ−1Gab
147
+ (4)
148
+ is the heat influx at point x into the local thermal state of QST coming from the
149
+ external QM system.
150
+ Note that this concerns only the gravitational effect of matter. Thus κ−1Gab
151
+ represents a form of heat tensor which was discussed for material systems e.g.
152
+ in [22] or[23].
153
+ Remark 1.2 We will later discuss in this paper the work terms in this context,
154
+ To complete our analysis of the thermal substructure of Gravitation or QST,
155
+ we have firstly to deal with the non-tensorial character of gravitational energy.
156
+ Usually it holds
157
+ ∂a(√−g(T a
158
+ b + ta
159
+ b)) ≡ 0
160
+ (5)
161
+ with ta
162
+ b the pseudo tensor of gravitational energy-momentum (brief discussions
163
+ can be found in practically every book about GR, a particularly nice discussion
164
+ is e.g.
165
+ given in [24]).
166
+ In the canonical view this pseudo tensor property is
167
+ frequently considered to be a deficit of the theory. In section (3) we reconsider
168
+ the situation from a perhaps new vantage point.
169
+ It is a widespread belief that all concepts and notions which carry a physical
170
+ meaning should be of tensorial character. It is however reasonable to analyze
171
+ why tensorial behavior is considered to be of such a great relevance.
172
+ If we
173
+ have a manifold with tangent and cotangent spaces at each point, tensor fields
174
+ can be built over tensor products of these spaces. Their importance is hence
175
+ that they carry a geometric meaning, that is, tensors may be said to represent
176
+ the same invariant object independent of the choice of coordinate systems. In
177
+ this context they have the important property that they cannot be transformed
178
+ away (transformed to zero) by an appropriate choice of coordinate system. In
179
+ particular, their transformation properties are relatively transparent.
180
+ On the other hand this philosphy cannot be exactly true as the wellknown
181
+ connection coefficients or Christoffel symbols ΓI
182
+ jk are of great geometric signif-
183
+ icance and do not have a particularly simple transformation behavior. In our
184
+ view, Weinberg rightly remarks that there is nothing sacred about the tensor
185
+ transformation law ([25]). This holds the more so as physical quantities are not
186
+ automatically elements of the multilinear algebra over tangent and/or cotangent
187
+ space (which have essentially the meaning of velocity or momentum vectors).
188
+ In older text books physical tensorial quantities are hence introduced as
189
+ tuples having simply a certain transformation behavior. We therefore should
190
+ 4
191
+
192
+ be prepared that there may exist physical quantities which do not transform as
193
+ tensors. In the valuable and highly informative essay [26] there is an interesting
194
+ remark by Einstein, when asked by the Swiss student Humm, if gravitational
195
+ energy should be tensorial or not. He thinks not, referring for example to the
196
+ different behavior of kinetic energy T and potential energy U under the Galilei
197
+ group in
198
+ ∂t(T + U) = 0
199
+ (6)
200
+ Another argument, in our view, would be a pendulum clock with friction
201
+ which allows us to extract energy from the gravitational field in a non-inertial
202
+ reference system, which is not possible in a freely falling inertial system. This
203
+ latter example suggests the following conclusion:
204
+ Observation 1.3 The equivalence principle shows that gravitational energy can-
205
+ not be tensorial.
206
+ We will discuss the deeper reasons for the possibility of non-tensorial be-
207
+ havior of various physical quantities in section (3) in a more systematic way,
208
+ the main point being the effects of quantum theory on space-time and gravita-
209
+ tional behavior. These quantum effects will lead to a subtle distinction between
210
+ surface properties living over the smooth classical space-time manifold ST and
211
+ the behavior in the underlying microscopic substructure denoted by QST. The
212
+ former are expected to be tensorial, the latter typically not. The spontaneous
213
+ symmetry breaking of diffeomorphism invariance will play an important role in
214
+ this context.
215
+ In the last section we discuss in more detail the relevance of diffeomorphism
216
+ invariance and the corresponding conserved Noether current for our investiga-
217
+ tion of the thermal character of the EEQ and GR in general. Wald studied the
218
+ Noether current of diffeomorphism invariance in the framework of differential
219
+ forms lying the main emphasis on integral representations ([27],[28],[29]). We
220
+ will, on the other hand, rely more on the classical tensor analysis and variational
221
+ approach, using mainly the non-integrated local point of view as it is e.g. also
222
+ done in [8].
223
+ But before we will do this, we will add some remarks about the quite de-
224
+ tailed early work of Hilbert, Noether, Klein in this context (which, written in
225
+ German, is perhaps not so widely known and which is carefully discussed in [26],
226
+ for other aspects see also [30]). These papers dealt mainly with a proper un-
227
+ derstanding of Hilbert’s famous socalled energy vector, which was derived from
228
+ a quite intricate variational analysis of some invariant action functional and
229
+ which seemed to puzzle not only the scientific community of that time quite a
230
+ lot ([31],[32],[33],[34]. We find it remarkable that these long gone investigations
231
+ anticipate in some sense more recent ones.
232
+ In Hilbert’s analysis an arbitrary vector field ξi was introduced in order to
233
+ get a conserved current from diffeomorphism invariance. It was later understood
234
+ ([34]) to be a necessary consequence of E.Noether’s famous second theorem. We
235
+ will analyze the remarkable behavior of this conserved current, give a physical
236
+ interpretation of the vector field ξi, which is technically the generator of the Lie
237
+ 5
238
+
239
+ derivative and interpret the role of various terms occurring in the current as to
240
+ their thermodynamic meaning and implications. This winds up to our observa-
241
+ tion that what Hilbert used to call the energy vector is rather an expression of
242
+ the internal energy-momentum tensor of the microscopic quantum gravitational
243
+ substratum QST, underlying our smooth space-time manifold ST.
244
+ 2
245
+ Quantum Space Time, QST, as a Thermal Sys-
246
+ tem
247
+ As we have already remarked in the introduction, thermality usually enters
248
+ the field of (quantum) gravity or general relativity (GR) via the existence of
249
+ horizons, most notably in the paradigmatic case of black holes (BH). We want
250
+ to argue in this and the following sections that, in our view, classical space time
251
+ ST is the smooth, coarse grained hull, overlying QST, which is assumed to be a
252
+ system having quantum micro structure, that is, consists of a complex network
253
+ of a huge number of microscopic gravitational degrees of freedom (DoF).
254
+ Assumption 2.1 We make the simplifying assumption that we may restrict
255
+ ourselves to an intermediate energy scale where all DoF can be treated as quan-
256
+ tum. Furthermore, we assume the gravitational DoF to live on a scale which is
257
+ given by the Planck units.
258
+ From this we may infer the following. Compared to the Planck scale, the
259
+ ordinary quantum scale on which our quantum matter is living, is many orders
260
+ of magnitude larger. This is the reason why on the level of ordinary quantum
261
+ theory space time can be treated as smooth and relatively invariable. On the
262
+ other hand, we have briefly described in e.g. [13] how the microscopic gravita-
263
+ tional DoF, living in QST cooperate so that as a consequence of a primordial
264
+ phase transition PT the classical space time manifold ST with its points x and
265
+ the classical metric tensorfield gab(x) do emerge, with gab(x) playing a double
266
+ role as allowing, on the one hand, to measure distances and time intervalls and,
267
+ on the other hand, being the carrier of the gravitational field.
268
+ As in [13] we introduce a Hilbert space Hg, in which the global quantum
269
+ states, ψg, of QST are living. The microscopic elementary gravitational DoF
270
+ are represented by their corresponding local Hilbert spaces Hg
271
+ i , i ∈ N. The local
272
+ bases in Hg
273
+ i are denoted by dνi
274
+ i . Basis vectors in Hg are then given by tensor
275
+ product states
276
+ ψg
277
+ I =
278
+
279
+ i
280
+ dνi
281
+ i , I := {ν1, ν2, · · · }
282
+ (7)
283
+ and a general pure quantum state in Hg is
284
+ ψg =
285
+
286
+ I
287
+ cIψg
288
+ I
289
+ (8)
290
+ 6
291
+
292
+ Remark 2.2 We note that these assumptions are not really necessary prereq-
293
+ uisites to reach the following conclusions but will represent a convenient model
294
+ to make the derivations more concrete and precise.
295
+ We have now to discuss what consequences can be inferred from the exis-
296
+ tence of the nonvanishing classical metric tensor field gab(x) which lives over
297
+ the classical space-time manifold ST and by the same token over the underlying
298
+ microscopic substructure QST. Usually it is assumed that a quantum observable
299
+ ˆgab(x) exists on QST with
300
+ gab(x) =< ˆgab(x) >:= (ψg | ˆgab(x)ψg)
301
+ (9)
302
+ for some global state ψg which corresponds as a quantum correlate to the clas-
303
+ sical ST.
304
+ This, at first glance, natural assumption leads however to a number of highly
305
+ non-trivial consequences and has now to be discussed in more detail. We as-
306
+ sumed for example in [13] that the existence respectively non-vanishing of the
307
+ metric tensor field gab(x) is the result of a primordial phase transition PT. In
308
+ other words, the existence of a stable space-time distance concept is a non-trivial
309
+ consequence of a particular physical process. Hence, following the tradition of
310
+ e.g. quantum statistical mechanics as a paradigm, dealing with a great number
311
+ of quantum DoF, we define:
312
+ Definition 2.3 We call gab(x) an order parameter field and the space-time
313
+ manifold ST an orderparameter manifold, where its non-vanishing signals the
314
+ existence of a transition to a greater structural order in the underlying micro-
315
+ scopic substratum (see e.g. [13] or [35],[36] and earlier references given there).
316
+ In our context, where we have a double structure of an overlying classical
317
+ smooth space-time manifold ST and an underlying microscopic quantum struc-
318
+ ture QST, both being correlated in a subtle way, we have to introduce some
319
+ particular structural elements, that is, for example, the concept of macro ob-
320
+ servables. As far as we know, this notion was for the first time introduced by
321
+ v.Neumann in an ingenious but perhaps little kown paper (see [39], the second
322
+ part of [38] or [40]).
323
+ Due to the vastly different scales of, on the one hand, ordinary quantum
324
+ matter QM and, on the other hand, quantum space-time QST, we can assume
325
+ that to a macroscopic point x do belong a huge number of DoF in QST or local
326
+ Hilbert spaces Hi which live in the infinitesimal neighborhood of x. We denote
327
+ this situation by
328
+ Hx :=
329
+
330
+ x
331
+ Hi ∼ [x]
332
+ (10)
333
+ where [x] denote the gravitational DoF in the infinitesimal neighborhood of x.
334
+ Furthermore, to a macroscopic value, gab(x), we can choose a corresponding
335
+ subspace [gab(x)] in �
336
+ x Hi containing the local vectors ψg(x) with
337
+ < ψg | ˆgab(x)ψg >= gab(x)
338
+ (11)
339
+ 7
340
+
341
+ Definition 2.4 Following the tradition in quantum statistical mechanics, we
342
+ call [gab(x)] a phase cell and which is spanned by certain basis vectors ψg
343
+ i (x) so
344
+ that
345
+ ψg(x) =
346
+
347
+ ciψg
348
+ i (x)
349
+ (12)
350
+ Furthermore, in the class of global states ψg, we may select the subclass [gab]
351
+ so that
352
+ < ψg | ˆg(x)ψg >= gab(x)
353
+ for all x ∈ ST
354
+ (13)
355
+ Remark 2.5 One should note that the various sets, [x], or [gab(x)], are not
356
+ necessarily disjoint in QST. There may be a certain overlap.
357
+ We now come to a central point in our analysis. Given a global state ψg
358
+ in Hg, we can test it by sufficiently localized observables, that is, observables
359
+ localized in an infinitesimal neighborhood of some macroscopic point x. That
360
+ is, we may concentrate ourselves on state vectors from Hx or [gab(x)]. More
361
+ specifically, if we have a pure global state ψg and test it with observables taken
362
+ from B(Hx), the bounded operators operating on Hx, we can represent the
363
+ global state ψg by a density matrix ρψ, living over Hx or [gab(x)].
364
+ Observation 2.6 It exists a density matrix ρψ over Hx or [gab(x)] with
365
+ < ψg | A(x)ψg >= T r(A(x) · ρψ)
366
+ (14)
367
+ for observables A(x) ∈ B(Hx)
368
+ It is a relatively recent observation that much stronger results can in fact
369
+ be derived which lead to the thermalization results, which we mentioned in the
370
+ introduction.
371
+ To our knowledge, early results in this direction were already
372
+ derived by v.Neumann in [39]. More recently, these phenomena were analyzed
373
+ in e.g. [16],[17], or [18]. In the context of decoherence by environment see also
374
+ [40].
375
+ Important tools in this connection are, on the one hand, the socalled
376
+ concentration of measure phenomenon and the Levy estimates (see for example
377
+ [16], a more systematic discussion can be found in [41]) and, on the other hand,
378
+ the use of random (unit) vectors (that is, quantum mechanical states lying on
379
+ high-dimensional unit spheres) and socalled typical states. We will not go into
380
+ the complex technical details but restrict ourselves to an application of the
381
+ results to our particular situation.
382
+ That is, we are given the classical order parameter field gab(x), defining the
383
+ class of microscopic quantum states ψg ∈ [gab] with
384
+ < ψg | ˆg(x)ψg >= gab(x)
385
+ for allx ∈ ST
386
+ (15)
387
+ We observed above that locally ψg can be replaced by a trace operator or density
388
+ matrix ρψ(x).
389
+ The results derived in the above cited papers, in particular [16], now yields
390
+ the following in our scenario.
391
+ 8
392
+
393
+ Conclusion 2.7 For a global pure state ψg ∈ [gab] it hold with very high proba-
394
+ bility that for local observables it is equivalent to the micro canonical ensemble,
395
+ i.e.
396
+ Ω := d−1 · T r(1·)
397
+ (16)
398
+ with d the dimension of [gab] and 1 the identity operator. The local state ρψ(x)
399
+ at some arbitrary macroscopic point is equivalent to this Ω and is called the gen-
400
+ eralized canonical ensemble. In other words, this holds for a typical or randomly
401
+ selected state. One should however note that Ω is a global state, ρψ(x) a local
402
+ one.
403
+ Remark 2.8 In case the generalized canonical ensemble can be associated with
404
+ some form of energy, the local states have the form of the true canonical ensem-
405
+ ble known from thermodynamics. This is the reason why the corresponding local
406
+ state can rightly be called a generalized canonical ensemble. That is, the global
407
+ micro canonical ensemble behaves locally as a canonical ensemble.
408
+ 3
409
+ The Thermal Role of the Einstein Equation
410
+ In section 2 we have argued that in an infinitesimal neighborhood of a macro-
411
+ scopic point x ∈ ST quantum space-time (Q)ST has the characteristics of a local
412
+ thermal system. We now want to introduce and discuss the various physical pa-
413
+ rameters which define and characterize such a thermal system. We begin with
414
+ a new conceptual understanding of the EEQ. Originally the EEQ are viewed
415
+ or conceived as a dynamic or evolution equation of the space-time continuum
416
+ under the influence of (ponderable) matter and classical fields.
417
+ As mentioned in the introduction, much later Jacobson, Padmanabhan (and
418
+ perhaps some other workers in the field) argued that the EEQ must hold due
419
+ to the observed or conjectured thermal behavior near horizons, most notably,
420
+ near the event horizon of a BH (see e.g. [6],[7],[8],[9],[10]). In the following
421
+ we want to argue that the EEQ carry a direct thermal meaning in the bulk
422
+ of ST, i.e., not necessarily near horizons and independent of the existence of
423
+ horizons or singularities. This holds also for the concept of entropy, which is
424
+ primarily understood in this context as a form of entanglement entropy, typically
425
+ arising near horizons. In our context it will have the ordinary thermodynamical
426
+ meaning of number of configurational alternatives.
427
+ As we said in the introduction, already in the early days (1916,1917) e.g.
428
+ Lorentz or Levi-Civita tried to give the EEQ a slightly different interpretation,
429
+ which was however rejected by Einstein by an argument which was perhaps con-
430
+ vincing at that time with quantum (field) theory still in its infancies (cf. [20]).
431
+ Lorentz and Levi-Civita speculated that by bringing the energy-momentum ten-
432
+ sor, occurring on the rhs of the EEQ to the lhs, we get an expression which
433
+ vanishes identically (see equation 3 in the introduction). They then conjectured
434
+ that this expression can then be identified with the total (vanishing) energy of
435
+ the universe, consisting of gravitational and matter energy.
436
+ 9
437
+
438
+ Einstein argued that the vanishing of the total energy of the universe would
439
+ not prevent the material systems and the gravitational energy to annihilate
440
+ each other. However, meanwhile we know that exactly the opposite process
441
+ might have happened in various models of the inflationary scenario (creation
442
+ from nothing, huge quantum fluctuations etc.). We discussed this zero energy
443
+ universe idea in more detail in section 2 of [13].
444
+ In [13] we introduced and described a similar but slightly different scenario.
445
+ We argued that our universe, i.e. (quantum) matter, (Q)M, and (quantum)
446
+ space-time, (Q)ST, emerged both as a result of a primordial phase transition
447
+ PT from a more primordial phase, QX:
448
+ QX →
449
+ P T (Q)ST + (Q)M
450
+ (17)
451
+ While the internal energy of QST is lowered compared to the original phase
452
+ QX as the result of an order transition by an amount ∆E, this same amount is
453
+ transferred to QM. That is,
454
+ E(QX) = E(QST ) + E(QM)
455
+ (18)
456
+ In the language of Hilbert spaces we describe the structure of our universe
457
+ as a pure state in the tensor product
458
+ ψ ∈ H = Hg ⊗ HM
459
+ (19)
460
+ with
461
+ ψ = ψg ⊗ ψM
462
+ (20)
463
+ being a state where the gravitational and the matter state do exist independently
464
+ from each other. This may be an approximation of a situation where e.g. BH’s
465
+ are absent. The BH situation was discussed in [13].
466
+ A thermal system should have an internal energy. In the introduction we
467
+ formulated the following conjecture:
468
+ Conjecture 3.1 We assume that
469
+ Tab(x) = κ−1Gab(x)
470
+ (21)
471
+ is the heat influx at point x into the local thermal state of QST coming from
472
+ the external QM system. Note that this concerns only the gravitational effect of
473
+ matter. Thus κ−1Gab represents a form of heat tensor which was discussed for
474
+ material systems e.g. in [22] or[23].
475
+ That is, the EEQ is essentially a statement about the total heat influx at point
476
+ x ∈ ST into the infinitesimal neighborhood of x in QST. We now want to
477
+ provide arguments why we think this is indeed the case.
478
+ In [42] we studied thermodynamics in the regime of special relativity. While
479
+ in this field there do exist a variety of different approaches, in the approach
480
+ we favored, i.e. with temperature being the zero component of a contravariant
481
+ four-vector,
482
+ T = γ · T0
483
+ ,
484
+ γ = (1 − u2/c2)−1/2
485
+ (22)
486
+ 10
487
+
488
+ with γ the Lorentz factor, T0 the rest temperature in a comoving coordinate
489
+ system, u the 3-velocity, T the temperature in the laboratory frame, we get
490
+ the following interesting transformation property for the heat influx into the
491
+ system:
492
+ δQ = γ · δQ0
493
+ (23)
494
+ that is, in contrast to internal energy and work, the heat influx transforms as the
495
+ zero component of a contravariant 4-vector. That is, it transforms covariantly
496
+ (cf. in particular section 4.4 of [42]).
497
+ Another paradigm is BH physics and the first law of BH-thermodynamics.
498
+ In geometric units (c=G=1) it reads:
499
+ δM = (8π)−1 · κδA + ΩδJ
500
+ (24)
501
+ with κ the surface gravity, δA the change of area, Ω angular velocity of horizon,
502
+ δJ change of angular momentum, δM the change of mass in the center. The
503
+ identification reads:
504
+ δSBH = δA/4 , T = κ/2π , δM change of internal energy
505
+ (25)
506
+ It is perhaps surprising that heat and entropy occur at such a prominent
507
+ place in this field while the, at first glance, more natural work contributions seem
508
+ to be missing. We now try to explain this on a perhaps more fundamental level.
509
+ We already briefly mentioned in the introduction that, in our view, space-time
510
+ consists of at least two levels, a smooth surface structure, ST, with its tangential
511
+ and cotangential structure and an underlying microscopic quantum structure,
512
+ QST. This compound system is assumed to have emerged via a primordial phase
513
+ transition, PT, together with a (quantum) matter component, QM.
514
+ This phase transition was a transition to a greater order, that is, (Q)ST
515
+ carries an extra space-time structure compared to the more primitive phase, QX,
516
+ given, for example, by the existence (or non-vanishing) of the metric tensor field,
517
+ gab(x), having the character of an order parameter field, and in the underlying
518
+ QST the existence of certain phase cells, [gab(x)], containing the quantum states
519
+ of the universe, leading to the same macroscopic metric tensor field in ST, i.e.
520
+ gab(x). Therefore we can conclude:
521
+ Conclusion 3.2 The primordial phase transition, PT, is accompanied by a
522
+ spontaneous symmetry breaking, SSB, of diffeomorphism invariance (or covari-
523
+ ance). That is, the more symmetric but less ordered phase, QX, goes over into
524
+ the phase (Q)ST, which has lesser symmetry but higher order.
525
+ Remark 3.3 These points were already discussed in [35] and [36].
526
+ .
527
+ What are the consequences of these observations for our question of non-
528
+ covariance of e.g. gravitational energy and related questions? As we said above,
529
+ we have a two storey structure of space-time. We argue that the smooth sur-
530
+ face structure ST (i.e. the macroscopic part) supports observables which are
531
+ 11
532
+
533
+ diffeomorphism invariant. The SSB, on the other hand, is located in the micro
534
+ structure of the quantum regime QST. That is, we assume that the existence of
535
+ quantum excitations, vacuum fluctuations and the emergence of the space-time
536
+ structure [gab(x)] is responsible for the breaking of diffeomorphism invariance.
537
+ We conjecture the following:
538
+ Conjecture 3.4 We assume that quantities which live over the smooth macro-
539
+ scopic manifold ST are diffeomorphism covariant, i.e. behave tensorial. On the
540
+ other hand, quantities which rather express properties of the microscopic under-
541
+ lying quantum structure QST we assume to behave non-tensorial in general.
542
+ Corollary 3.5 As we already explained in the introduction, since the scale on
543
+ which QST is living is many orders of magnitude finer than even the regime of
544
+ ordinary quantum matter, the latter should also behave covariantly in general.
545
+ Conclusion 3.6 As the energy-momentum tensor, Tab(x), lives essentially over
546
+ the classical manifold ST, the heat influx, κ−1 · Gab(x), is by the same to-
547
+ ken also tensorial or covariant. On the other hand, the part of the relativistic
548
+ energy-momentum (pseudo) tensor, tab(x), describing the gravitational energy
549
+ contained in QST, is non-tensorial because it describes the contributions to grav-
550
+ itational energy which are contained in the underlying network of gravitational
551
+ DoF. making up the microscopic structure of QST.
552
+ 4
553
+ The Concept of Gravitational Temperature
554
+ On general grounds we know that our local systems must have a temperature.
555
+ From what we have said above, the local gravitational system around the point
556
+ x ∈ ST has an internal energy U(x) and an entropy S(x).
557
+ In section 2 we
558
+ showed that the system at x ∈ ST can be considered as a generalized canonical
559
+ ensemble. This entails that we can define its v.Neumann entropy
560
+ S(x) := −T r (ρx · ln ρx) = −
561
+
562
+ i
563
+ pi ln pi
564
+ (26)
565
+ with pi the probabilities of the individual states ψi(x). Therefore we can (in
566
+ principle) calculate
567
+ T (x) = ∂U(x)/∂S(x) with V (x) held fixed
568
+ (27)
569
+ (V (x) some infinitesimal volume element around x).
570
+ We will complete this somewhat abstract definition of gravitational temper-
571
+ ature by two different more concrete approaches in this context. Firstly, we
572
+ discuss the Tolman-Ehrenfest approach (cf. e.g. [43],[44]) which was originally
573
+ introduced for thermal material systems which live in ST. For convenience of
574
+ the reader we will briefly recapitulate our own approach which we gave in [45].
575
+ 12
576
+
577
+ Remark 4.1 In order that we can apply the Tolman-Ehrenfest results to purely
578
+ gravitational systems, that is, systems not consisting of ordinary material con-
579
+ stituents, we must at first motivate that these systems have a thermal character
580
+ and consist of microscopic constituents. This is what we have done in this paper
581
+ up to now.
582
+ The Tolman-Ehrenfest result is the following:
583
+ Observation 4.2 In thermal equilibrium in a static gravitational field we have
584
+ for an isolated system
585
+ T (x) ·
586
+
587
+ −g00(x) = const
588
+ (28)
589
+ I.e., in contrast to the non-relativistic regime (cf. sect.2), there exists in general
590
+ a temperature gradient in a system being in thermal equilibrium in the relativistic
591
+ regime.
592
+ To derive this result we use the entropy maximum principle. We shall use, for
593
+ reasons of simplicity, the weak field expansion of the gravitational field. With
594
+ φ(x) the Newtonian gravitational potential we have
595
+ √−g00 = (1 + 2φ/c2)1/2 ≈ 1 + φ/c2
596
+ (29)
597
+ Remark 4.3 Note that the gravitational potential is negative and is usually
598
+ assumed to vanish at infinity.
599
+ We assume an isolated macroscopic system to be in thermal equilibrium in
600
+ such a static weak gravitational field.
601
+ Its total entropy and internal energy
602
+ depend on the gravitational field φ(x). We now decompose the large system into
603
+ sufficiently small subsystems so that the respective thermodynamic variables can
604
+ be assumed to be essentially constant in the small subsystems. As the entropy
605
+ is an extensive quantity, we can write
606
+ S(φ) =
607
+
608
+ i
609
+ Si(E0
610
+ i , Vi, Ni)
611
+ (30)
612
+ where E0
613
+ i is the thermodynamical internal energy, not including the respective
614
+ potential energy.
615
+ Observation 4.4 It is important that in the subsystems the explicit dependence
616
+ on the gravitational potential has vanished. The entropy in the subsystems de-
617
+ pends only on the respective thermodynamical variables, the values of which are
618
+ of course functions of the position of the respective subsystem in the field φ(x).
619
+ At its maximum the total entropy is constant under infinitesimal redistri-
620
+ bution of the internal energies E0
621
+ i with the total energy and the remaining
622
+ thermodynamic variables kept constant. We now envisage two neighboring sub-
623
+ systems, denoted by (1) and (2). To be definite, we take φ(2) ≥ φ(1). We now
624
+ transfer an infinitesimal amount of internal energy dE0
625
+ 2 from (2) to (1) (note,
626
+ 13
627
+
628
+ it consists of pure heat as for example the particle numbers remain unchanged
629
+ by assumption!). As heat has weight relativistically it gains on its way an extra
630
+ amount of potential energy.
631
+ Observation 4.5 By transferring dE0
632
+ 2 from (2) to (1) we gain an additional
633
+ amount of gravitational energy
634
+ dE0
635
+ 2 · ∆φ/c2
636
+ ,
637
+ ∆φ = φ2 − φ1
638
+ (31)
639
+ It is important to realize that this gravitational energy has to be transformed from
640
+ mechanical energy into heat energy or, rather, internal energy and reinjected in
641
+ this form into system (1) (for example by a stirring mechanism acting on system
642
+ (1) and being propelled by the quasistatic fall of the energy dE0
643
+ 2).
644
+ The energy balance equation now reads
645
+ dE0
646
+ 1 = dE0
647
+ 2 + dE0
648
+ 2 · ∆φ/c2 = dE0
649
+ 2(1 + ∆φ/c2)
650
+ (32)
651
+ We then have (with dS1 = −dS2 in equilibrium)
652
+ T −1
653
+ 1
654
+ = dS1/dE0
655
+ 1 = −dS2/ − (dE0
656
+ 2(1 + ∆φ/c2)) = T −1
657
+ 2
658
+ · (1 + ∆φ/c2)−1
659
+ (33)
660
+ that is
661
+ Conclusion 4.6 It holds
662
+ T1 = T2(1 + ∆φ/c2)
663
+ ,
664
+ ∆φ := φ2 − φ1 ≥ 0
665
+ (34)
666
+ Observation 4.7 The subsystem (1), having a potential energy being lower
667
+ than (2), has a higher temperature.
668
+ We can give the above relation another more covariant form. In the approx-
669
+ imation we are using it holds:
670
+
671
+ 1 + 2φ2/c2
672
+
673
+ 1 + 2φ1/c2 = 1 + φ2/c2
674
+ 1 + φ1/c2 = 1 + (φ1 + ∆φ)/c2
675
+ 1 + φ1/c2
676
+ = 1 + ∆φ/c2
677
+ (35)
678
+ Conclusion 4.8 (Covariant form) It holds
679
+ T1 ·
680
+
681
+ −g00(1) = T2 ·
682
+
683
+ −g00(2) = const
684
+ (36)
685
+ The non-infinitesimal result follows by using a sequence of infinitesimal steps.
686
+ It is perhaps useful to derive the above result in yet another, slightly differ-
687
+ ent, way. In case φ(x) vanishes at infinity we can apply the entropy-maximum
688
+ principle as follows. We extract the energy (bringing it to infinity)
689
+ dE2 = dE0
690
+ 2 + dE0
691
+ 2 · φ2/c2
692
+ (37)
693
+ 14
694
+
695
+ from subsystem (2) and reinject the energy
696
+ dE2 = dE1 = dE0
697
+ 1 + dE0
698
+ 1 · φ1/c2
699
+ (38)
700
+ from infinity into (1). We get
701
+ dE0
702
+ 1 = dE0
703
+ 2 · 1 + φ2/c2
704
+ 1 + φ1/c2
705
+ (39)
706
+ and
707
+ T −1
708
+ 1
709
+ = dS1/dE0
710
+ 1 = T −1
711
+ 2
712
+ ·
713
+ �1 + φ2/c2
714
+ 1 + φ1/c2
715
+ �−1
716
+ (40)
717
+ hence
718
+ T1 · (1 + φ1/c2) = T2 · (1 + φ2/c2)
719
+ (41)
720
+ As an example one may mention the Rindler/Unruh space-time. We have
721
+ in Rindler coordinates
722
+ g00 = −ξ2 , a = ξ−1 , T = a/2π
723
+ (42)
724
+ i.e.
725
+ T √−g00 = 2π−1 = const
726
+ (43)
727
+ Remark 4.9 One should mention that this method to go to ∞ does make only
728
+ sense if the thermal system extends to ∞ as well.
729
+ In a second approach we will employ the Fulling-Unruh observation of ther-
730
+ malisation in accelerated frames of reference (local Rindler frames were intro-
731
+ duced by for example Padmanabhan in e.g. [9]). We will however use it in a
732
+ slightly different way compared to Jacobson or Padmanabhan. For reasons of
733
+ convenience we wil choose a static space-time ST and restrict ourselves to a
734
+ sufficiently small neighborhood of some arbitrary point x ∈ ST .
735
+ We choose a local inertial frame (LIF) at x with Lorentz-orthonormal coor-
736
+ dinates (X, T ) so that x has the coordinates (0, 0). We assume that the LIF
737
+ moves along a certain geodesic through x. We place a thermometer system at
738
+ the point x which is gauged so that it yields the result zero in a LIF. However, we
739
+ assume that the thermometer is in principle sensitive against the thermal exci-
740
+ tations of the underlying microscopical gravitational system. The thermometer
741
+ now experiences the gravitational field gab(x) at the macroscopic point x ∈ ST .
742
+ Now, relative to the LIF (moving on a geodesic through x) and employing
743
+ the inertial coordinates (X, T ) an observer at the point x (and the thermometer)
744
+ experiences an acceleration a(X, T ) (the detailed numerical calculations, which
745
+ are a little bit intricate, can be found in [22] exercise in section 9.6). One should
746
+ however note that everything we have said holds only locally. But locally, near
747
+ the origin, we can switch from inertial coordinates (X, T ) to socalled Rindler
748
+ coordinates (xR, tR).
749
+ T = xR · sinh (κtR) , X = xR · cosh(κtR)
750
+ (44)
751
+ 15
752
+
753
+ with κ the corresponding proper acceleration.
754
+ In full Rindler space, i.e.
755
+ the right wedge WR, we know from the work
756
+ of Fulling ([11]) and Unruh ([12]) that the thermometer will detect thermal
757
+ Rindler modes. In our case the situation is only locally, i.e. in a neighbor-
758
+ hood of x or (X, T ) = (0, 0), Rindler like. Therefore we cannot expect to have
759
+ such fully developed Rindler modes. However we know already that ST at x
760
+ or (X, T ) = (0, 0) behaves microscopically as a thermal system, that is, as a
761
+ socalled generalized canonical ensemble, hence carrying a distribution of local
762
+ thermal excitations. Therefore we make the conjecture:
763
+ Conjecture 4.10 The observer at x or (X, T ) = (0, 0) will detect a certain
764
+ thermal excitation spectrum, consisting of certain quasi particles (which may
765
+ be approximations of corresponding Rindler modes), leading to a corresponding
766
+ local temperature.
767
+ 5
768
+ Diffeomorphism Invariance and its Conserved
769
+ Noether Current
770
+ In section 3 we discussed the consequences of the possible SSB of diffeomorphism
771
+ invariance due to the emergence of quantum DoF in the underlying micro struc-
772
+ ture of ST, i.e.
773
+ QST as a result of the primordial phase transition PT. We
774
+ argued that we may have two classes of observables, the one class of covari-
775
+ ant observables which live above the macroscopic space-time manifold ST and
776
+ another class, which we assume to consist of quantities which rather describe
777
+ properties of the underlying micro structure within QST. We argued that the
778
+ elements of this latter class need not behave covariantly under geometric trans-
779
+ formations of the surface structure ST. A prominent example in this context is
780
+ the concept of gravitational energy. Another important role will be played by
781
+ the work terms which occur in the complete conserved Noether current we will
782
+ derive below. Their covariance comes about by exploiting the vector field ξi(x)
783
+ which enters via the Lie derivative, which is a covariant operation.
784
+ But befor we enter into the technical details, we want to recapitulate what
785
+ we said in the introduction concerning the work of Hilbert, Noether, Klein etc.
786
+ ([31],[32],[33],[34]). We were surprised to see that Hilbert essentially got after a
787
+ long and intricate calculation a conservation law for what he considered to be
788
+ the gravitational energy vector. This energy vector contained an arbitrary vec-
789
+ tor field ξi, the deeper role of which was not really understood and appreciated
790
+ at that time, while technically it is a consequence of E.Noether’s second theo-
791
+ rem. In our view Hilbert already performed calculations which were much later
792
+ repeated in a similar context, being apparently unaware of the earlier results.
793
+ Below we will explain the physical role of the arbitrary vector field ξi while
794
+ its mathematical role is clear, it is simply the vector field which generates the
795
+ diffeomorphism group and occurs in the Lie derivative. In traditional physicist’s
796
+ notation:
797
+ xi → xi = xi + ǫξi(x)
798
+ (45)
799
+ 16
800
+
801
+ with ǫ infinitesimal. These intensive investigations and discussions performed
802
+ in the Hilbert group were carefully studied in two beautiful essays by Rowe and
803
+ Sauer ([26],[30]).
804
+ We give now a brief description of the sequence of necessary steps which
805
+ lead to the form of conserved Noether current deriving from the assumption of
806
+ diffeomorphism invariance. We will perform most of these steps in an appendix.
807
+ Our main motivation for this is a consequence of the observation that in many
808
+ representations of this stuff for example important and nonvanishing boundary
809
+ terms are frequently dropped which then results in only partial results.
810
+ Remark 5.1 If for example certain boundary terms are dropped one gets only
811
+ the contracted Bianchi identity instead of the full conserved current. This is in
812
+ our view dangerous because in contrast to ordinary variations diffeomorphisms
813
+ typically need not vanish at infinity. Furthermore, we will show that variations,
814
+ having a local support, lead to results which differ in some important respects.
815
+ In the following we restrict ourselves to a variation of the Hilbert-Einstein
816
+ action
817
+ S[gab] =
818
+
819
+ R(gab) · √−g d4x
820
+ (46)
821
+ with R the scalar curvature
822
+ R := Ra
823
+ a with Rab the Ricci tensor Rac := Rb
824
+ abc
825
+ (47)
826
+ the rhs being the Riemann curvature tensor. g is the determinant of the metric
827
+ tensor. R is a scalar and √−g d4x, the canonical volume element, is an invariant
828
+ under coordinate transformations or diffeomorphisms.
829
+ Hence S is invariant
830
+ under diffeomorphisms
831
+ φλ : x → x(λ) or infinitesimal: x → ¯x = x + dλ ξ(x)
832
+ (48)
833
+ where the vector field ξ(x) induces the flow of the diffeomorphism group φλ.
834
+ If T (x) is some arbitrary tensor field, we construct an λ-dependent tensor
835
+ field in the following way. We shift back the tensor at x(λ) to the point x
836
+ Tλ(x) := φ∗
837
+ −λ(T (xλ))
838
+ (49)
839
+ with φ∗
840
+ −λ = (φ∗
841
+ λ)−1 the map, induced by φλ : x → x(λ). Now all these Tλ(x)
842
+ are defined at the same point x and we can take the derivative with respect to
843
+ λ at λ = 0. We get
844
+ 0 = d S[gab]/d λ =
845
+
846
+ d/dλ L(gab(x; λ) d4 x
847
+ (50)
848
+ where in the following the derivative is taken always at λ = 0 and L is the scalar
849
+ density R(gab) · √−g.
850
+ Remark 5.2 Technical details can be found, for example, in [46], Appendix C.
851
+ 17
852
+
853
+ Observation 5.3 The derivative with respect to λ at λ = 0 is nothing but the
854
+ Lie derivative, Lξ, of the tensor T or more general geometric objects. As with
855
+ ordinary derivatives, the Lie derivative obeys the Leibniz rule.
856
+ Definition 5.4 In the following we abreviate
857
+ Lξ(T )(x) := δT (x)
858
+ (51)
859
+ that is, in particular
860
+ d/dλ gab(x; λ) = Lξ gab(x) = δgab(x)
861
+ (52)
862
+ It is an important observation that, as the Lie derivative is defined for general
863
+ differentiable manifolds, it is independent of the concept of covariant derivative.
864
+ It can hence be expressed with the help of, on the one hand, partial derivatives,
865
+ on the other hand, expressed by means of an arbitrary covariant derivative
866
+ operator. For example with the help of the covariant derivative, induced by
867
+ gab(x):
868
+ Lξ gab = ∇aξb + ∇bξa = ξc∂cgab + gcb∂aξc + gacξc
869
+ (53)
870
+ While the Lie derivative for tensor fields is canonically given via φ∗
871
+ −λ(T (xλ))
872
+ as
873
+ Lξ(T )(x) := lim
874
+ λ→0 (φ∗
875
+ −λ(T (xλ)) − T (x))/λ
876
+ (54)
877
+ one has to say some words in the case of e.g. densities.
878
+ Remark 5.5 A scalar density like L(x) becomes an invariant if multiplied by
879
+ the volume element d4x. If we have a scalar density at point x(λ), its translate
880
+ back to x has to be again a scalar density so that e.g. L d4(xλ) remains invariant.
881
+ What we have said in the remark, allows us to fix the necessary transformation
882
+ properties and define the Lie derivative of a scalar density.
883
+ Lemma 5.6 We have
884
+ Lξ(√−g · R) = −√−g∇a(R · ξa) = −∂a(R · ξa · √−g)
885
+ (55)
886
+ We are now going to describe the strategy which will lead to the derivation
887
+ of a conserved current, following from diffeomorphism invariance.
888
+ We shall
889
+ however not follow the perhaps more obvious strategy to exploit the above
890
+ integral expression for S[gab] but will use a local approach as it is for example
891
+ done in [47] in the case of the ordinary energy-momentum tensor conservation
892
+ law following from 4-translation invariance in quantum field theory and also
893
+ used in [8]. Our approach will consist of essentially two steps.
894
+ i) We take the Lagrange density ([gab(x)] which is a lengthy expression in
895
+ gab(x) and its first and second partial derivatives and, using the Leibniz rule
896
+ and that partial derivatives and Lie derivative do commute, represent its Lie
897
+ derivative as a long expression consisting ultimately terms containing the Lie
898
+ 18
899
+
900
+ derivative of the basic building blocks gab(x) which we derived above. Note that
901
+ we use the abbreviation
902
+ d/dλ gab(x; λ) = Lξ(gab(x) =: δgab(x)
903
+ (56)
904
+ Diffeomorphism invariance enters in the way that L[gab] does not explicitly
905
+ depend on the coordinates but only via the field gab and its derivatives. That
906
+ is, this approach exploits the structural form of the Lagrange density.
907
+ ii) In a second step we simply directly calculate the Lie derivative of the
908
+ density R√−g as described in formula (55). We then equate the numerically
909
+ identical expressions and bring them on the same side, thus getting a vanishing
910
+ expression which can be written as a conserved current.
911
+ Now, using formula 74 in the appendix and the contracted Bianch identity,
912
+ we get for the variation of L[gab]:
913
+ δL[gab] = √−g · ∇a(va + 2Gabξb)
914
+ (57)
915
+ with
916
+ va = ∇b(∇aξb + ∇bξa) − gcd∇a(∇cξd + ∇dξc)
917
+ (58)
918
+ (some technical remarks:
919
+ ∇a := gab∇b
920
+ and
921
+ ∇bgac = 0 = ∇bgac
922
+ (59)
923
+ for the Levi-Civita connection).
924
+ Now using in the second step the direct Lie derivative of the Lagrange density
925
+ R · √−g, which we already wrote down above (see formula 55), we arrive at the
926
+ conserved Noether current.
927
+ Theorem 5.7 The Lie derivative of R·√−g, derived in the two ways, described
928
+ above, yields the conserved Noether current
929
+ 0 = ∇a(Rξa + 2Gabξb + va)
930
+ (60)
931
+ with
932
+ va = ∇b(∇aξb + ∇bξa) − gcd∇a(∇cξd + ∇dξc)
933
+ (61)
934
+ We can rewrite this formula to get a slightly different result. With
935
+ 2Gabξb = 2Rabξb − Rgabξb
936
+ ,
937
+ gabξb = ξa
938
+ (62)
939
+ we get
940
+ Corollary 5.8 A variant of the above result is
941
+ 0 = ∇aja
942
+ ,
943
+ ja = (2Rabξb + va)
944
+ (63)
945
+ 19
946
+
947
+ 6
948
+ The Thermal Meaning of the Conserved Noether
949
+ Current
950
+ We want now to come back to the interpretation of the conserved Noether cur-
951
+ rent we have derived above. We mentioned in the introduction that Hilbert and
952
+ his colleagues had great difficulties to understand the role the arbitrary vector
953
+ field ξi(x) is playing in this expression. As we have an energy-momentum ten-
954
+ sor Tab, playing a fundamental role in the theory, the occurrence of a conserved
955
+ energy vector (as Hilbert liked to call it) like our ji(x) was puzzling.
956
+ In this context we remind the reader what we said in section 3 concerning
957
+ the role of tensorial or covariant quantities compared to non-tensorial or non-
958
+ covariant quantities, the former referring to properties of the smooth classical
959
+ surface structure ST, the latter ones referring to the underlying quantum me-
960
+ chanical micro structure QST. If we assume the vector field ξi(x) is chosen to be
961
+ time like, we can associate it with the orbits of observers or measuring devices.
962
+ Then expressions like
963
+ Tab(x)ξb(x)
964
+ or
965
+ Gab(x)ξb(x)
966
+ (64)
967
+ represent (energy) flows as observed or measured by the respective moving ob-
968
+ servers. That is, they have an objective (geometric) quality. In this sense they
969
+ should have a covariant tensorial character and therefore can create a covariant
970
+ conserved current.
971
+ Observation 6.1 The (time like) vector fields ξi(x) can be assumed to be the
972
+ orbits of observers, floating through space-time.
973
+ In section 3 we argued that
974
+ Gab(x) = κ · Tab(x)
975
+ (65)
976
+ is a statement about gravitational heat energy influx at macroscopic space-
977
+ time point x. Correspondingly the first part of the conserved Noether current
978
+ describes the flow of heat energy contributing to the internal energy of the
979
+ gravitational system. We now analyze the physical meaning of the second part
980
+ vi(x).
981
+ va = ∇b(∇aξb + ∇bξa) − gcd∇a(∇cξd + ∇dξc)
982
+ (66)
983
+ If ξi(x) is a Killing vector field, that is, if it induces a symmetry of the metric
984
+ tensor,
985
+ Lξgab(x) = 0
986
+ or
987
+ ∇aξb + ∇bξa = 0
988
+ (67)
989
+ and using
990
+ ∇bξa = ∇b(gacξc) , ∇aξb = gac∇cξb , ∇bgac = 0
991
+ (68)
992
+ we get:
993
+ Theorem 6.2 If ξi(x) is a Killing vector field we have vi(x) = 0.
994
+ 20
995
+
996
+ Since in the preceding sections we argued that QST is a thermal system,
997
+ possessing at each macroscopic space-time point x the local state functions
998
+ internal energy and entropy as well as a notion of local heat influx given by
999
+ Tab(x) or Gab(x), it suggests itself to regard the vector field vi(x), which contains
1000
+ mainly contributions built from the metric, gab(x), and the vector field ξi(x) as
1001
+ work terms.
1002
+ Conjecture 6.3 We assume that the vector field vi(x) contains the work terms
1003
+ of our gravitational system QST. It contains essentially the effects of 4-volume
1004
+ changes (compressions and decompressions).
1005
+ Observation 6.4 This interpretation is supported by the above result that vi(x) =
1006
+ 0 for Killing vector fields inducing geometric symmetries, Lξgab = 0, i.e., es-
1007
+ sentially no 4-volume changes.
1008
+ In the introduction we mentioned the work of Sakharov. Induced Gravity is
1009
+ assumed to result from the deformation of the structure of vacuum fluctuations
1010
+ by curvature. Our above working philosophy is a related one. Locally com-
1011
+ pressing or decompressing QST affects the local level structure of the thermal
1012
+ system at point x and thus is a kind of work, done at the system.
1013
+ We would like to make some remarks concerning a point which irritates or
1014
+ irritated many researchers. It is frequently argued that mere coordinate trans-
1015
+ formations can completely alter the numerical values of quantities like energy or
1016
+ work, even make them vanish in case we are dealing with non-tensor quantities.
1017
+ We dealt already with such problems in [40] in the context of special relativity
1018
+ (SR), in particular if volume changes due to Lorentz contraction have to be
1019
+ included in thermodynamic work terms.
1020
+ Some researchers have the attitude to consider Lorentz contraction as not
1021
+ being real, whatever that actually means. We think Pauli in [20] sect.5 made
1022
+ this point particularly clear.
1023
+ He argues that the atomic physics, underlying
1024
+ the contraction of a measuring rod is complicated but has to obey Lorentz
1025
+ covariance. Therefore Lorentz contraction, in his view, is, on the one hand, an
1026
+ objective process, but, as it is at the same time a result of Lorentz symmetry, it
1027
+ can as well be explained with the help of the general Lorentz invariance of SR.
1028
+ The same is true, in our view, in the case of curvature effects on the micro
1029
+ structure of QST. Furthermore, we can choose at each space-time point x a local
1030
+ geodesic coordinate system in which SR does hold, thus establishing the close
1031
+ relatedness of SR and GR. What concerns pure coordinate transformations,
1032
+ there exist basically two possibilities. On the one hand, they may be related to
1033
+ concrete changes of reference systems to which our above remarks do apply. On
1034
+ the other hand, they may not be implementable by concrete reference systems.
1035
+ In that case we may assume that transformation behavior should be regarded
1036
+ as a consequence following from consistency reasons.
1037
+ 21
1038
+
1039
+ 7
1040
+ Appendix: The Conserved Noether Current
1041
+ We begin with the calculation of the variation of R[gab] · √−g, that is, reducing
1042
+ δ(R[gab] · √−g) to an expression which contains only terms like δgab, remem-
1043
+ bering that δ denotes the Lie derivative or d/dλ at λ = 0. Furthermore we use
1044
+ the above expression for the Lie derivative
1045
+ Lξ gab = ∇aξb + ∇bξa = ξc∂cgab + gcb∂aξc + gacξc
1046
+ (69)
1047
+ As R is a relative complex expression in the variables gab and its first and second
1048
+ partial derivatives, the calculations are, as is often the case in this context,
1049
+ lengthy and a little bit intricate.
1050
+ We have (see [46] p.453)
1051
+ δ(R · √−g) = √−g(δRab)gab + √−gRabδgab + Rδ(√−g)
1052
+ (70)
1053
+ with Rab the Ricci tensor. Furthermore ([46] p.185)
1054
+ gabδRab = ∇ava
1055
+ va = ∇b(δgab) − gcd∇a(δgcd)
1056
+ (71)
1057
+ and (see [46] p.453, [20] section 23)
1058
+ δ(√−g) = −1/2 · √−ggabδgab = +1/2 · √−ggabδgab
1059
+ (72)
1060
+ (0 = δ(gabgab) = gabδgab + δgabgab)
1061
+ (73)
1062
+ Conclusion 7.1 The above formulas yield
1063
+ δL(gab) = (Rab − 1/2Rgab)δgab√−g + ∇ava
1064
+ √−g
1065
+ (74)
1066
+ Observation 7.2 Gab = (Rab − 1/2Rgab) is called Einstein tensor with Gab =
1067
+ 8π · Tab. It fulfills the contracted Bianchi identity ∇aGab = 0 which can also
1068
+ be derived from diffeomorphism invariance if one neglects boundary terms (see
1069
+ [48] p.138).
1070
+ References
1071
+ [1] J.M.Bardeen,B.Carter,S.W.Hawking:The four laws of black hole mechanics, Com-
1072
+ mun.Math.Phys. 31 (1973) 161
1073
+ [2] J.D.Bekenstein:Black holes and entropy, PR D7 (1973) 2333
1074
+ [3] J.D.Bekenstein:Generalized second law of thermodynamics in black hole physics,
1075
+ PR D9 (1974) 3292
1076
+ [4] S.W.Hawking:Particle Creation by Black Holes, Commun.Math.Phys. 43 (1975)
1077
+ 199
1078
+ 22
1079
+
1080
+ [5] R.M.Wald:Gravitation, Thermodynamics and Quantum Theory, CQG 16:A177
1081
+ (1999), arxiv:gr-qc/9901033
1082
+ [6] T.Jacobson:Thermodynamics of space-time: The Einstein equation of state, PRL
1083
+ 75 (1995) 1260, arxiv:gr-qc/9710089
1084
+ [7] T.Jacobson:Horizon Entropy, Found.Phys. 33 (2003) 323, arxiv:gr-qc/0302099
1085
+ [8] T.Padmanabhan:Entropy density of space-time and thermodynamic interpreta-
1086
+ tion of field equations of gravity, arXiv:0903.1254
1087
+ [9] T.Padmanabhan:A Dialogue on the Nature of Gravity, arXiv:0910.0839
1088
+ [10] T.Padmanabhan:Thermodynamical
1089
+ Aspects
1090
+ of
1091
+ Gravity:
1092
+ New
1093
+ Insights,
1094
+ Rep.Progr.Phys. 73 (2010) 6901, arXiv:0911.5004
1095
+ [11] S.A.Fulling:Nonuniqueness of Canonical Field Quantization in Rimannian Space-
1096
+ Time, PR D7 (1973) 2850
1097
+ [12] W.G.Unruh:Notes on Black Hole Evaporation, PR D14 (1976) 870
1098
+ [13] M.Requardt:About the Incompleteness of the Semiclassical Picture in the Black
1099
+ Hole Information Paradox and the Quantum Hair emerging from the Cou-
1100
+ pling of Quantum Matter and Quantum Space-Time Degrees of Freedom,
1101
+ arXiv:1503.07312v2
1102
+ [14] A.D.Sakharov:Vacuum Quantum Fluctuations in Curved Space and the Theory
1103
+ of Gravitation, Sov.Phys.Dokl. 12 (1968) 1040
1104
+ [15] M.Visser:Sakharov´sInduced Gravity: A Modern Perspective, Mod.Phys.Lett. A
1105
+ 17 (2002) 977, arxiv:gr-qc/0204062
1106
+ [16] S.Popescu,A.J.Short,A.Winter:The foundations of statistical mechanics from en-
1107
+ tanglement:Individual states versus averages, Nature Physics 2(11):754 (2006),
1108
+ arxiv:quant-ph/0511225
1109
+ [17] S.Goldstein,J.L.Lebowitz,C.Mastrodonato,R.Tumulka,N.Zanghi:Normal
1110
+ Typ-
1111
+ icality and v.Neumann‘s Quantum Ergodic Theorem,Proc.Roy.Soc. A 466
1112
+ (2123:3203 (2010), arXiv:0907.0108
1113
+ [18] S.Goldstein,J.L.Lebowitz,R.Tumulka,N.Zanghi:Canonical
1114
+ Typicality,
1115
+ PRL
1116
+ 6
1117
+ (2006) 050403, arxiv:cond-mat/0511091
1118
+ [19] C.W.Misner,K.S.Thorne,J.A.Wheeler:Gravitation, 1973Freeman and Company,
1119
+ San Francisco 1973
1120
+ [20] W.Pauli: Relativitaetstheorie, Teubner, Berlin 1921, or Theory of Relativity,
1121
+ Dover, N.Y. 1981, sect. 61
1122
+ [21] F.I.Cooperstock:The Role of Energy and a New Approach to Gravitational Waves
1123
+ in General Relativity, Ann.Phys. 282 (2000) 115, arxiv:gr-qc/9904046
1124
+ [22] C.Moeller:The Theory of Relativity, sec.ed. Oxford Univ. Pr., Oxford 1972
1125
+ 23
1126
+
1127
+ [23] C.Eckart:The Thermodynamics of Irreversible Processes III, Relativistic Theory
1128
+ of the Simple Fluid, PR 58 (1940) 919
1129
+ [24] S.S.Xulu:The
1130
+ Energy-Momentum
1131
+ Problem
1132
+ in
1133
+ General
1134
+ Relativity,
1135
+ arxiv:hep-th/0308070
1136
+ [25] S.Weinberg:Gravitation and Cosmology, Wiley, N.Y. 1972
1137
+ [26] D.E.Rowe:Emmy
1138
+ Noether
1139
+ on
1140
+ Energy
1141
+ Conservation
1142
+ in
1143
+ General
1144
+ Relativity,
1145
+ arXiv:1912.03269, p.10
1146
+ [27] R.M.Wald:Black Hole Entropy is Noether Charge,
1147
+ PR D48 (1993) 3427,
1148
+ arxiv:gr-qc/9307038
1149
+ [28] J.Lee,R.M.Wald:Local Symmetries and Constraints, JMP 31 (1990) 725
1150
+ [29] R.M.Wald,A.Zoupas:A General Definition of ”Conserved Quantities” In Gen-
1151
+ erla
1152
+ Relativity
1153
+ and
1154
+ other
1155
+ Theories
1156
+ of
1157
+ Gravity,
1158
+ PR
1159
+ D61
1160
+ (2000)
1161
+ 084027,
1162
+ arxiv:gr-qc/9911095
1163
+ [30] T.Sauer:The Relativity of Discovery: Hilbert’s First Note on the Foundations of
1164
+ Physics, Arch.Hist.Exact Sci. 53 (1999) 549
1165
+ [31] D.Hilbert:Die Grundlagen der Physik,Nachr.Gesell.Wiss. zu Goettingen,Math.-
1166
+ Phys.Klasse 1915,p.395
1167
+ [32] F.Klein:Zu
1168
+ Hilbert’s
1169
+ erster
1170
+ Note
1171
+ ueber
1172
+ die
1173
+ Grundlagen
1174
+ der
1175
+ Physik,Nachr.Gesell.Wiss. zu Goettingen,Math.-Phys.Klasse 1917,p.469
1176
+ [33] F.Klein:Ueber
1177
+ die Differentialgesetze
1178
+ fuer die Erhaltung von Impuls und
1179
+ Energie
1180
+ in
1181
+ der
1182
+ Einsteinschen
1183
+ Gravitationstheorie,Nachr.Gesell.Wiss.
1184
+ zu
1185
+ Goettingen,Math.-Phys.Klasse 1918,p.172
1186
+ [34] E.Noether:Invariante
1187
+ Variationsprobleme,Nachr.Gesell.Wiss.
1188
+ zu
1189
+ Goettingen,Math.-Phys.Klasse 1918,p.235
1190
+ [35] M.Requardt:Observables need not be diffeomorphism invariant in Classical and
1191
+ Quantum Gravity, arXiv:1206.0832
1192
+ [36] M.Requardt:Gravitons as Goldstone Modes and the Spontaneous breaking of Dif-
1193
+ feomorphism Invariance, arXiv:1203.1702
1194
+ [37] J.v.Neumann:Beweis des Ergodensatzes und des H-Theorems in der neuen
1195
+ Mechanik, Z.Phys. 57 (1929)30
1196
+ [38] J.v.Neumann:Mathematische
1197
+ Grundlagen
1198
+ der
1199
+ Quantenmechanik,
1200
+ Springer,
1201
+ Berlin 1968
1202
+ [39] J.v.Neumann:Beweis des Ergodensatzes und des H-Theorems in der Neuen
1203
+ Mechanik, Z.Phys. 57 (1929) 30
1204
+ [40] M.Requardt:An Alternative to Decoherence by Environment and the Appearance
1205
+ of a Classical World: arXiv:1009.1220
1206
+ [41] M.Ledoux:The Concentration of Measure Phenomenon, AMS 2001
1207
+ 24
1208
+
1209
+ [42] M.Requardt:Thermodynamics meets Special Relativity or what is real in
1210
+ Physics?, arXiv:0801.2639
1211
+ [43] R.C.Tolman:On the Use of the Energy-Momentum Principle in General Relativ-
1212
+ ity, PR 35 (8) (1930) 875
1213
+ [44] R.C.Tolman,P.Ehrenfest:Temperature Equilibrium in a Static Gravitational
1214
+ Field, PR 36 (1930) 1791
1215
+ [45] M.Requardt:On the Reality of Unruh Temperature, arXiv:1311.1608
1216
+ [46] R.M.Wald:General Relativity,Univ.Chicago Pr., Chicago 1984
1217
+ [47] J.D.Bjorken, S.D.Drell:Relativistic Quantum Fields,McGraw-Hill,N.Y.1965
1218
+ [48] R.P.Feynman:Lectures on Gravitation, Cal.Inst.Techn. 1985
1219
+ 25
1220
+
2dAzT4oBgHgl3EQfDvol/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
59FKT4oBgHgl3EQf-y48/content/tmp_files/2301.11959v1.pdf.txt ADDED
@@ -0,0 +1,2940 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11959v1 [math.OC] 27 Jan 2023
2
+ Approximation of Optimal Feedback Controls for Stochastic
3
+ Reaction-Diffusion Equations
4
+ Wilhelm Stannat and Alexander Vogler
5
+ Technische Universit¨at Berlin, Berlin, Germany
6
+ January 31, 2023
7
+ Abstract
8
+ We approximate optimal feedback controls for stochastic reaction-diffusion equations
9
+ by using a general type of approximation that allows us to reduce the control problem to
10
+ an optimization over deterministic controls. Similar to [SW20] we derive necessary opti-
11
+ mality conditions and prove the existence of an optimal control for the reduced problem.
12
+ Furthermore we derive explicit convergence rates and numerically investigate a gradient
13
+ descent algorithm for the approximation of the optimal feedback control using a radial
14
+ basis approximation as a particular example.
15
+ 1
16
+ Introduction
17
+ The main objective of this paper is to provide approximation results for optimal control prob-
18
+ lems of stochastic partial differential equations. For fixed time horizon T > 0 and bounded
19
+ domain Λ ⊂ R we consider the controlled stochastic partial differential equation (SPDE)
20
+
21
+ dug
22
+ t = [Aug
23
+ t + F(ug
24
+ t) + gt]dt + BdWt,
25
+ t ∈ [0, T]
26
+ ug
27
+ 0 = u0,
28
+ (1)
29
+ where W : [0, T] × Ω → L2(Λ) denotes a L2(Λ) valued cylindrical Q-Wiener process and
30
+ A : D(A) ⊂ L2(Λ) → L2(Λ) is a densely defined self adjoint, positive definite linear operator
31
+ with compact inverse (for example the negative Dirichlet-Laplace). For a ONS of eigenvectors
32
+ (en)n in L2(Λ) with corresponding eigenvalues (λn)n≥1 the domain of A is characterized as
33
+ x ∈ D(A) := {x =
34
+
35
+
36
+ n=1
37
+ xnen ∈ L2(Λ) : ∥x∥2
38
+ 2 :=
39
+
40
+
41
+ n=1
42
+ λnx2
43
+ n < ∞}.
44
+ The objective of the control problem is to minimize the cost functional
45
+ J(g) = (J1(ug) + J2(g)) ,
46
+ over the set of admissible controls
47
+ A = L2([0, T] × Ω, (Ft)t∈[0,T]; U),
48
+ Keywords and phrases — stochastic optimal control, reaction-diffusion equations, adjoint calculus, varia-
49
+ tional methods, artificial neural networks
50
51
+ 1
52
+
53
+ where U is a closed and convex subset of L2(Λ) and
54
+ J1(u) := E
55
+ �� T
56
+ 0
57
+
58
+ Λ
59
+ l(t, x, ut(x))dxdt +
60
+
61
+ Λ
62
+ m(x, uT (x))dx
63
+
64
+ ,
65
+ J2(g) := E
66
+ �� T
67
+ 0
68
+ ∥gt∥2
69
+ L2(Λ)dt
70
+
71
+ .
72
+ The mathematical theory of these problems is by now well understood (see e.g. [CDP18],
73
+ [DM13], [FGS17b], [FZ20], [FHT13], [FO16], [FHT18], [LZ15], [LZ18], [SW21b], [SW22],
74
+ [Wes22]), however the efficient numerical approximation of these control problems still faces
75
+ serious difficulties due to the computational complexity of classical approaches that require ei-
76
+ ther to approximate an infinite dimensional Hamilton-Jacobi-Bellman equation or a backward
77
+ SPDE.
78
+ In the last couple of years there is a rising interest in more efficient methods for the
79
+ numerical approximation of optimal control problems ([BEJ19], [CL22] [DKK21], [DP16],
80
+ [DMPV19],[EHJ17], [GKM18], [KK18], [NR21], [OSS22], [SW21a]).
81
+ In particular applica-
82
+ tions of machine learning algorithms to the approximation of backward stochastic differential
83
+ equations and optimal control problems have drawn a lot of attention recently([EHJ17],[CL21],
84
+ [CL22]). However the literature in this topic for SPDE’s is still very sparse. One main diffi-
85
+ culty in the case of optimal control of SPDE’s is that the solution to the state equation (1)
86
+ takes values in an infinite dimensional space. Assuming the optimal control ˆg is of markovian
87
+ feedback type, i.e. ˆgt = ˆG(t, u ˆG
88
+ t ), the function ˆG still depends through the solution on some
89
+ infinite dimensional object, which makes it much more difficult to approximate using neural
90
+ networks.
91
+ In our approach we consider finitely based approximations for the optimal feedback func-
92
+ tion ˆG instead and show that it is indeed sufficient if one restricts the optimization to some
93
+ ansatz space of admissible controls that can approximate those finitely based approximations,
94
+ in order to reach the optimal cost. Based on this observation we can construct explicit exam-
95
+ ples of ansatz spaces that allow an efficient numerical approximation of the control problem.
96
+ Furthermore we derive explicit convergence rates under additional assumptions on the regu-
97
+ larity of ˆG and provide some numerical illustrations of our findings.
98
+ The rest of this paper is organized as follows: In section 2 we provide standing assumptions
99
+ and state our main results. In Section 2.2 we will discuss sufficient assumptions under which
100
+ the control problem can be reduced to a feedback control problem. In section 3 we will give a
101
+ prove for our first main theorem, which is reminiscent of a universal approximation result. In
102
+ section 4 we will prove our second main result, which provides convergence rates. Section 5 we
103
+ will provide explicit examples of ansatz spaces where the assumptions of our main theorems
104
+ are satisfied.
105
+ Numerical illustrations are provided in the companion manuscript [SVW23].
106
+ 2
107
+ Standing Assumptions and Main Results
108
+ 2.1
109
+ Standing Assumptions
110
+ Let Λ ⊂ Rd be a bounded domain and H = L2(Λ). Furthermore let A : D(A) ⊂ H → H be
111
+ a self-adjoint, negative definite linear operator such that A has a compact inverse. It follows
112
+ that A has a discrete spectrum and there exists orthonormal basis (en)n≥1 of H consisting
113
+ of eigenfunctions of A with corresponding eigenvalues (−λn)n≥1 arranged in increasing order
114
+ 0 ≤ λ1 ≤ λ2 ≤ . . ..
115
+ 2
116
+
117
+ For r ∈ R we can then define the fractional operator (−A)
118
+ r
119
+ 2 : D((−A)
120
+ r
121
+ 2 ) → L2(Λ) by
122
+ (−A)
123
+ r
124
+ 2u :=
125
+
126
+
127
+ n=1
128
+ λ
129
+ r
130
+ 2nunen,
131
+ for all
132
+ u ∈ D((−A)
133
+ r
134
+ 2) := {u =
135
+
136
+
137
+ n=1
138
+ unen ∈ H : ∥u∥2
139
+ r :=
140
+
141
+
142
+ n=1
143
+ λr
144
+ nu2
145
+ n < ∞}.
146
+ To simplify notations let Hr := D((−A)
147
+ r
148
+ 2 ) and note that ∥u∥r = ∥(−A)
149
+ r
150
+ 2u∥H defines a
151
+ seminorm on Hr. By L0
152
+ 2 we denote the space of Hilbert-Schmidt operators Φ : H → H with
153
+ norm
154
+ ∥Φ∥2
155
+ L0
156
+ 2 :=
157
+
158
+
159
+ n=1
160
+ ∥Φen∥2
161
+ H
162
+ and for Φ taking values in Hr we define ∥Φ∥L0
163
+ 2,r := ∥A
164
+ r
165
+ 2 Φ∥L0
166
+ 2.
167
+ Remark 1. If A = ∆, where ∆ denotes the Laplace operator with Dirichlet boundary condi-
168
+ tions, it is well known that H1 = H1
169
+ 0(Λ) and H2 = H2(Λ) ∩ H1
170
+ 0(Λ). In the case of Neumann
171
+ boundary conditions one can consider the operator (A − αI) for some α > 0 and f(u) + αu
172
+ in the non-linearity instead.
173
+ We impose the following assumptions on the coefficients of the controlled spde (1):
174
+ Assumption 2.
175
+ H1. We assume that F is of Nemytskii type, i.e. F(u)(x) = f(u(x)) for
176
+ some f : R → R continuously differentiable and Lipschitz continuous
177
+ |f(u1) − f(u2)| ≤ C|u1 − u2|
178
+ ∀u1, u2 ∈ R,
179
+ for some constant C > 0.
180
+ H2. The dispersion operator B√Q is Hilbert-Schmidt.
181
+ H3. For any t ∈ [0, T] and x ∈ R the functions l(t, x, u) : [0, T] × R × R → R+ and m(x, u) :
182
+ R × R → R+ are differentiable with respect to the variable u.
183
+ H4. For any t ∈ [0, T] and x ∈ R the functions l(t, x, u) and m(x, u) are locally Lipschitz
184
+ continuous w.r.t. u such that
185
+ |l(t, x, u1) − m(t, x, u2)| ≤ C(1 + |u1| + |u2|)|u1 − u2|,
186
+ |m(x, u1) − m(x, u2)| ≤ C(1 + |u1| + |u2|)|u1 − u2|
187
+ ∀u1, u2 ∈ R,
188
+ for some constant C > 0.
189
+ H5. The initial condition u0 : Ω → H is F0- measurable with
190
+ E
191
+
192
+ ∥u0∥p
193
+ H
194
+
195
+ < ∞,
196
+ for all p ≥ 2.
197
+ 3
198
+
199
+ 2.2
200
+ Reduction to Feedback Controls
201
+ As already mentioned in the introduction, we will work in a setting where there exists an
202
+ optimal control ˆg ∈ A of feedback type, i.e.
203
+ inf
204
+ g∈A J(g) = J(ˆg)
205
+ and
206
+ ˆgt = ˆG(t, u
207
+ ˆG
208
+ t ),
209
+ for some feedback map ˆG : [0, T] × H → H, such that the equation
210
+
211
+ du ˆG
212
+ t = [∆u ˆG
213
+ t + f(u ˆG
214
+ t ) + ˆG(t, u ˆG
215
+ t )]dt + BdWt,
216
+ t ∈ [0, T]
217
+ u ˆG
218
+ 0 = u0,
219
+ (2)
220
+ has a unique probabilistic strong solution. Furthermore we will assume that the feedback map
221
+ ˆG is jointly continuous and satisfies a linear growth condition
222
+ ∥ ˆG(t, u)∥H ≤ C(1 + ∥u∥H).
223
+ The simplest example where these assumptions are matched is the case of a linear quadratic
224
+ control problem, where F is linear and ˜l(t, x, u) = ∥u∥2
225
+ H, m(t, u) = ∥u∥2
226
+ H. In this case, the
227
+ optimal control g∗ is indeed of feedback form, given by
228
+ g∗
229
+ t = P(t)ug∗
230
+ t
231
+ (3)
232
+ where P : [0, T] → L(H) is the solution of the Riccati equation [Tud90]
233
+
234
+ ∂tP(t) + P(t)∆ + ∆P(t) − Id + P 2(t) = 0, t ∈ [0, T]
235
+ P(T) = −Id.
236
+ (4)
237
+ We will give a short explanation how one can construct such an optimal feedback function
238
+ ˆG in a more general situation. To this end we consider the Hamilton-Jacobi-Bellman equation
239
+
240
+
241
+
242
+
243
+
244
+ ∂tV + 1
245
+ 2tr(BQB∗D2V ) + ⟨DV, Au + F(u)⟩H +
246
+
247
+ Λ l(t, x, u(x)) dx
248
+ + infG∈U{⟨Dv, G⟩ + ∥G∥2
249
+ H} = 0,
250
+ u ∈ H, t ∈ [0, T]
251
+ VT (u) =
252
+
253
+ Λ m(x, u(x)) dx, u ∈ H.
254
+ (5)
255
+ We assume that the HJB equation (5) has a unique mild solution V : [0, T] × H → R in the
256
+ sense of ([FGS17b], Def. 4.70), such that
257
+ V ∈ C0,1([0, T] × H, R).
258
+ If in addition the function γ(p) := arginfg∈U{⟨p, g⟩ + ∥g∥2
259
+ H} is continuous and equation (2)
260
+ has a unique strong solution for ˆG(t, u) = γ(DV (t, u)), then an optimal control of (SCP) is
261
+ given by
262
+ ˆgt = ˆG(t, u
263
+ ˆG
264
+ t ).
265
+ For the existence, regularity of a solution to the HJB equation (5) and examples we refer to
266
+ [FGS17b], in particular section 4.8.1 and section 6.11. A sufficient condition for (2) to have
267
+ a unique strong solution is that ˆG is Lipschitz continuous in u, see e.g. [LR15]. This is in
268
+ particular the case if the solution V of the HJB equation (5) has a bounded second derivative
269
+ in u, see Theorem 4.155 and Remark 4.202 in [FG´S17a]. Note that ˆG(t, u) is in particular
270
+ bounded if U is a bounded subset of H.
271
+ In the following we will consider the feedback control problem
272
+ 4
273
+
274
+ Problem 3 (FCP). Minimize
275
+ J(G) := J1(uG) + J2(G(·, uG
276
+ · )),
277
+ subject to the spde
278
+
279
+ duG
280
+ t
281
+ = [AuG
282
+ t + F(uG
283
+ t ) + G(t, uG
284
+ t )]dt + BdWt,
285
+ t ∈ [0, T]
286
+ uG
287
+ 0
288
+ = u0,
289
+ (6)
290
+ over the set of admissible feedback controls
291
+ Uad := {G ∈ C([0, T] × H, U)| equation (6) has a unique strong solution and G(t, uG
292
+ t ) ∈ A}.
293
+ Remark 4. It is obvious that under the above assumptions we have
294
+ inf
295
+ g∈A J(g) =
296
+ inf
297
+ G∈Uad J(G).
298
+ 2.3
299
+ Approximation Results
300
+ For the approximation of the feedback function ˆG, let (Sh)h∈(0,1] be a family of finite dimen-
301
+ sional subspaces of H1 satisfying
302
+ ∥Phu − u∥H → 0, h → 0,
303
+ where Ph : H → Sh denotes the L2-orthogonal projection onto Sh. We will also need the
304
+ orthogonal projection Rh : H1 → Sh onto Sh w.r.t. the inner product
305
+ a(u, v) := ⟨(−A)
306
+ 1
307
+ 2u, (−A)
308
+ 1
309
+ 2 v⟩H.
310
+ We then define for any map G : [0, T]×H → H the corresponding finitely based approximation
311
+ of order h ∈ (0, 1] by
312
+ Gh : [0, T] × H → Sh, Gh(t, u) := PhG(t, Phu).
313
+ (7)
314
+ Here finitely-based means that Gh(t, u) depends on finitely many coordinates of u only. In a
315
+ first step we can then approximate our feedback function ˆG by the finitely based vector fields
316
+ ( ˆGh)h∈(0,1].
317
+ 2.3.1
318
+ Uniform Approximation Result
319
+ Definition 5. Let G : [0, T] × H → H. We say that a subset U ⊂ Uad satisfies the uniform
320
+ approximation property with respect to G, if there exists a family (Gh,m)h∈(0,1],m∈N ⊂ U that
321
+ satisfies the following linear growth condition uniformly in m
322
+ ∥Gh,m(t, u)∥H ≤ Ch(1 + ∥u∥H),
323
+ (8)
324
+ for some constant Ch > 0, such that for any R > 0
325
+ lim
326
+ m→∞
327
+ sup
328
+ (t,u)∈[0,T]×BH(0,R)
329
+ ∥Gh(t, u) − Gh,m(t, u)∥2
330
+ H = 0,
331
+ (9)
332
+ where
333
+ BH(0, R) := {u ∈ H|∥u∥H ≤ R}
334
+ (10)
335
+ and Gh is given as in (7).
336
+ 5
337
+
338
+ Theorem 6. Assume that Assumption 2 is in force. Let U ⊆ Uad satisfy the uniform approx-
339
+ imation property with respect to ˆG, then
340
+ inf
341
+ g∈A J(g) = inf
342
+ G∈U J(G).
343
+ Remark 7. Theorem 6 tells us, if any finitely based approximation of ˆG can be approximated
344
+ on bounded sets by elements of U, then we reach the optimal cost by minimizing over U.
345
+ 2.3.2
346
+ Convergence Rates
347
+ In order to formulate our second result we need to impose stronger assumptions on our control
348
+ problem.
349
+ Assumption 8.
350
+ S1. The dispersion operator B√Q takes values in H1 and is Hilbert-Schmidt,
351
+ i.e.
352
+ ∥B
353
+
354
+ Q∥L0
355
+ 2,1 < ∞
356
+ S2. The initial condition u0 : Ω → H1 is F0- measurable with
357
+ E
358
+
359
+ ∥u0∥p
360
+ H1
361
+
362
+ < ∞,
363
+ for all p ≥ 2.
364
+ S3. The admissible controls take values in H1, in particular we assume that
365
+ U ⊆ H1.
366
+ Furthermore, the optimal feedback ˆG(t, u) : [0, T] × H → U is Lipschitz continuous in u
367
+ with Lipschitz constant L independent of t, i.e.
368
+ ∥ ˆG(t, u1) − ˆG(t, u2)∥H ≤ L∥u1 − u2∥H
369
+ ∀t ∈ [0, T], u1, u2 ∈ H
370
+ Unfortunately the existence of a solution to the HJB equation (5) with Lipschitz regularity
371
+ is difficult to check. However Assumption 8 is satisfied in the linear quadratic case (see Section
372
+ 2.2), i.e. if f is linear and l is a quadratic function, for example
373
+ l(t, x, u) = |u|2.
374
+ Since also the numerical approximation of the state equation will contribute to the con-
375
+ vergence rates, we will also specify additional assumptions on our given finite element approx-
376
+ imation:
377
+ Assumption 9.
378
+ R1. For all u ∈ Hs, s ∈ {1, 2}, h ∈ (0, 1] it holds
379
+ ∥Rhu − u∥H ≤ Chs∥u∥Hs
380
+ and
381
+ ∥Phu∥1 ≤ C∥u∥H1 for all u ∈ H1, h ∈ (0, 1].
382
+ R2. The Ritz-projection coincides with the L2-orthogonal projection on H1, i.e.
383
+ Ph|H1 = Rh
384
+ 6
385
+
386
+ Remark 10. By the best approximation property of the orthogonal L2-projection we get for
387
+ any u ∈ Hs, with s ∈ {1, 2}
388
+ ∥Phu − u∥H ≤ ∥Rhu − u∥H ≤ Chs∥u∥Hs.
389
+ Assumption R2 is satisfied for example when A = ∆, where ∆ denotes the Laplace operator
390
+ with Dirichlet boundary conditions on the unit interval (0, 1) ⊂ R, and the finite dimensional
391
+ subspaces Sh are given by
392
+ Sh = span{ek, k = 1, ..., N},
393
+ for h = λ
394
+ − 1
395
+ 2
396
+ N+1, N ∈ N, where ek(·) =
397
+
398
+ 2 sin(kπ·) are the orthonormal eigenfunctions of A
399
+ with corresponding eigenvalues λk = k2π2 (see [Kru1403]).
400
+ We now introduce the following approximating control problem.
401
+ Problem 11 (FESCP). Let h ∈ (0, 1]. Minimize
402
+ Jh(G) =
403
+
404
+ J1(uG,h) + J2(G(·, uG,h))
405
+
406
+ ,
407
+ over the set
408
+ UL
409
+ ad := {G ∈ C([0, T] × H, U)|G(t, u) is Lipschitz continuous in u, uniformly in t},
410
+ subject to the discretized SPDE
411
+
412
+ duG,h
413
+ t
414
+ = [AhuG,h
415
+ t
416
+ + PhF(uG,h
417
+ t
418
+ ) + PhG(t, uG,h
419
+ t
420
+ )]dt + PhBdWt,
421
+ t ∈ [0, T]
422
+ uG,h
423
+ 0
424
+ = Phu ∈ Sh,
425
+ (11)
426
+ where Ahuh for uh ∈ Sh is defined as the unique element in Sh with
427
+ a(uh, vh) = ⟨Ahuh, vh⟩H, for all vh ∈ Sh.
428
+ The following lemma is easily shown by standard arguments.
429
+ Lemma 12. For any G ∈ U L
430
+ ad there exists a unique strong solution uG,h : [0, T] × Ω → Sh to
431
+ (11) and for any p ≥ 2 it holds
432
+ sup
433
+ h∈(0,1]
434
+
435
+ sup
436
+ t∈[0,T]
437
+ E
438
+
439
+ ∥uG,h
440
+ t
441
+ ∥p
442
+ H +
443
+ �� T
444
+ 0
445
+ ∥uG,h
446
+ t
447
+ ∥2
448
+ H1dt
449
+ �p/2��
450
+ < ∞.
451
+ Definition 13. Let G : [0, T] × H → H and h ∈ (0, 1]. We say that a sequence of subsets
452
+ (Uh,m)m∈N ⊂ Uad satisfies the uniform Lipschitz approximation property of order h with
453
+ respect to G, if there exists a sequence of Lipschitz continuous controls (Gh,m)m∈N with
454
+ Lipschitz constants independent of m, such that Gh,m ∈ Uh,m, and for all R > 0
455
+ ǫh,R
456
+ m
457
+ :=
458
+ sup
459
+ (t,u)∈[0,T]×BH(0,R)
460
+ ∥Ph(Gh(t, u) − Gh,m(t, u))∥2
461
+ H
462
+ (12)
463
+ → 0,
464
+ (13)
465
+ as m → ∞.
466
+ Our two main theorems of this section can then be formulated as follows:
467
+ 7
468
+
469
+ Theorem 14. Let h ∈ (0, 1]. We assume that the assumptions 2, Assumption 8 and Assump-
470
+ tion 9 R1 are in force.
471
+ Let (Uh,m)m∈N ⊂ Uad satisfies the uniform Lipschitz approximation property of order h
472
+ with respect to ˆG, then it holds
473
+ inf
474
+ G∈Uh,m Jh(G) − inf
475
+ g∈A J(g) ≤ C
476
+
477
+ 1 + E
478
+ �� T
479
+ 0
480
+ ∥ ˆG(t, u
481
+ ˆG
482
+ t )∥2
483
+ H1 dt
484
+ �1/2�
485
+ h + Ch
486
+
487
+ ǫh,R
488
+ m
489
+ + 1
490
+ R
491
+ �1/2
492
+ ,
493
+ for all R > 0, some uniform constant C > 0 and some constant Ch > 0 that is independent
494
+ of m.
495
+ Under additional convexity assumptions on the coefficients we can prove a lower bound
496
+ on the approximating costs. To this end consider the following modified assumptions
497
+ Assumption 15. H1’. The function f : R → R is linear.
498
+ H2’. For any t ∈ [0, T], x ∈ Λ and all u1, u2 ∈ R it holds
499
+ l(t, x, u2) − l(t, x, u1) − ∂ul(t, x, u1)(u2 − u1) ≥ 0
500
+ m(x, u2) − m(x, u1) − ∂um(x, u1)(u2 − u1) ≥ 0.
501
+ Theorem 16. In addition to the assumptions of Theorem 14 we assume that Assumption 9
502
+ and Assumption 15 are in force. Then for any U ⊆ Uad it holds
503
+ inf
504
+ g∈A J(g) − inf
505
+ G∈U Jh(G) ≤ Ch,
506
+ for some constant C > 0, which is independent of h.
507
+ 3
508
+ Proof of Theorem 6
509
+ To simplify notations we denote V = H1, Pn := P 1
510
+ n , Gn := ˆG
511
+ 1
512
+ n and Gn,m(t, u) := G
513
+ 1
514
+ n ,m(t, u).
515
+ Furthermore let
516
+ un := uGn
517
+ be the unique strong solution to equation (6) w.r.t. Gn and
518
+ un,m := uGn,m
519
+ be the unique strong solution to equation (6) w.r.t. Gn,m. Due to the linear growth assump-
520
+ tions on ˆG and Gh,m, one can obtain the following a priori estimates by standard arguments.
521
+ Lemma 17. For any p ≥ 2 it holds
522
+ sup
523
+ n∈N
524
+ E
525
+
526
+ sup
527
+ t∈[0,T]
528
+ ∥un
529
+ t ∥p
530
+ H +
531
+ �� T
532
+ 0
533
+ ∥un
534
+ t ∥2
535
+ V dt
536
+ �p/2�
537
+ ≤ C(1 + ∥u0∥p
538
+ H).
539
+ Furthermore for any p ≥ 2 and fixed n ∈ N we have
540
+ sup
541
+ m∈N
542
+ E
543
+
544
+ sup
545
+ t∈[0,T]
546
+ ∥un,m
547
+ t
548
+ ∥p
549
+ H +
550
+ �� T
551
+ 0
552
+ ∥un,m
553
+ t
554
+ ∥2
555
+ V dt
556
+ �p/2�
557
+ ≤ Cn(1 + ∥u0∥p
558
+ H).
559
+ The following tightness result is a standard consequence of the a-priori bound given in
560
+ Lemma 17, for further detail see [FG95].
561
+ Lemma 18. The sequence (un)n∈N is tight in C([0, T], V ′) ∩ L2([0, T], H) and w.r.t.
562
+ the
563
+ weak topology in L2([0, T], V ) and for any fixed n ∈ N the sequence (un,m)m∈N is tight in
564
+ C([0, T], V ′) ∩ L2([0, T], H) and w.r.t. the weak topology in L2([0, T], V ).
565
+ 8
566
+
567
+ 3.1
568
+ Finitely Based Approximation of the Optimal Cost
569
+ In the first part we will prove that the optimal cost can be approximated by the cost of the
570
+ finitely based vector-fields gn
571
+ t := Gn(t, un
572
+ t ). In particular we will show that for
573
+ J(gn) → J(ˆg) = inf
574
+ g∈A J(g)
575
+ (14)
576
+ along a subsequence. In the following we set
577
+ Γ := (L2([0, T], H) ∩ C([0, T], V ′)) × C([0, T], U1),
578
+ where U1 is a Hilbert space such that the embedding U ⊂ U1 is Hilbert-Schmidt. Now by
579
+ Prohorov’s theorem and the Skorohod representation theorem, there exist a probability space
580
+ (˜Ω, ˜F, ˜P) and a sequence of Γ-valued random variables (˜un, ˜W n)n and (˜u, ˜W), such that
581
+ 1. ˜W n = ˜W for any n ∈ N, ˜P-a.s.
582
+ 2. L(˜un, ˜W n) = L(un, W)
583
+ 3. ˜P-a.s.,
584
+ ∥˜un − ˜u∥L2([0,T],H) + ∥˜un − ˜u∥C([0,T],V ′) → 0.
585
+ It is not difficult to see that (˜un)n∈N satisfies for any p ≥ 2
586
+ sup
587
+ n∈N
588
+ ˜E
589
+
590
+ sup
591
+ t∈[0,T]
592
+ ∥˜un
593
+ t ∥p
594
+ H
595
+
596
+ + sup
597
+ n∈N
598
+ ˜E
599
+ ��� T
600
+ 0
601
+ ∥˜un
602
+ t ∥2
603
+ V dt
604
+ ��p/2
605
+ < ∞.
606
+ Furthermore, since ∥˜un − ˜u∥L2([0,T],H) → 0, we have by using Fatou’s lemma
607
+ ˜E
608
+
609
+ sup
610
+ t∈[0,T]
611
+ ∥˜ut∥p
612
+ H +
613
+ �� T
614
+ 0
615
+ ∥˜ut∥2
616
+ V dt
617
+ �p/2�
618
+ ≤ lim inf
619
+ n→∞
620
+ ˜E
621
+
622
+ sup
623
+ t∈[0,T]
624
+ ∥˜un
625
+ t ∥p
626
+ H +
627
+ �� T
628
+ 0
629
+ ∥˜un
630
+ t ∥2
631
+ V dt
632
+ �p/2�
633
+ < ∞.
634
+ This implies in particular, that ˜u ∈ L2 �
635
+ ˜Ω, ˜P, L2([0, T], V )
636
+
637
+ and ˜un → ˜u weakly.
638
+ We will now prove that ˜u is a weak solution to (6). Recall that
639
+ ⟨Au, v⟩ = −⟨(−A)
640
+ 1
641
+ 2 u, (−A)
642
+ 1
643
+ 2v⟩,
644
+ so that ∥Au∥V ′ ≤ ∥u∥V , which implies that
645
+ ˜E
646
+ �� T
647
+ 0
648
+ ∥A˜un
649
+ t ∥2
650
+ V ′dt
651
+
652
+ < ∞.
653
+ For any v ∈ L2 �
654
+ ˜Ω, ˜P, L2([0, T], V )
655
+
656
+ it follows that
657
+ ˜E
658
+ �� T
659
+ 0
660
+ ⟨A˜un
661
+ t , vt⟩ dt
662
+
663
+ = ˜E
664
+ �� T
665
+ 0
666
+ ⟨˜un
667
+ t , Avt⟩ dt
668
+
669
+ → ˜E
670
+ �� T
671
+ 0
672
+ ⟨˜ut, vt⟩ dt
673
+
674
+ = ˜E
675
+ �� T
676
+ 0
677
+ ⟨A˜ut, vt⟩ dt
678
+
679
+ which implies that A˜un → A˜u weakly in L2 �
680
+ ˜Ω, ˜P, L2([0, T], V ′)
681
+
682
+ .
683
+ It remains to investigate the nonlinear drift coefficients.
684
+ 9
685
+
686
+ Lemma 19. There exists a subsequence (˜unk)k∈N such that
687
+ � T
688
+ 0
689
+ ∥Gnk(t, ˜unk
690
+ t ) − ˆG(t, ˜ut)∥2
691
+ Hdt → 0
692
+ ˜P-a.s. and in Lp(˜Ω, ˜P)
693
+ for all p ≥ 2 and
694
+ � T
695
+ 0
696
+ ∥F(˜unk
697
+ t ) − F(˜ut)∥2
698
+ Hdt → 0
699
+ ˜P-a.s. and in Lp(˜Ω, ˜P)
700
+ for all p ≥ 2. Furthermore, the process ˜u is a H-valued continuous process that satisfies
701
+ ⟨˜ut, v⟩ = ⟨u0 +
702
+ � t
703
+ 0
704
+ A˜utdt +
705
+ � t
706
+ 0
707
+ F(˜ut)dt +
708
+ � t
709
+ 0
710
+ ˆG(t, ˜ut)dt + B ˜Wt, v⟩,
711
+ t ∈ [0, T],
712
+ for all v ∈ V , ˜P-a.s. as a V ′-valued process.
713
+ Proof. We just need to show the first statement of the lemma, the second part follows by
714
+ standard arguments. We have that
715
+ ∥Gn(t, ˜un
716
+ t ) − ˆG(t, ˜ut)∥H = ∥Pn ˆG(t, Pn˜un
717
+ t ) − ˆG(t, ˜ut)∥H
718
+ ≤ ∥Pn ˆG(t, Pn˜un
719
+ t ) − Pn ˆG(t, Pn˜ut)∥H + ∥Pn ˆG(t, Pn˜ut) − Pn ˆG(t, ˜ut)∥H
720
+ + ∥Pn ˆG(t, ˜ut) − ˆG(t, ˜ut)∥H
721
+ ≤ ∥ ˆG(t, Pn˜un
722
+ t ) − ˆG(t, Pn˜ut)∥H + ∥ ˆG(t, Pn˜ut) − ˆG(t, ˜ut)∥H
723
+ + ∥Pn ˆG(t, ˜ut) − ˆG(t, ˜ut)∥H.
724
+ (15)
725
+ Since ˜un
726
+ t → ˜ut in L2([0, T], H) it follows, passing to some subsequence again denoted with
727
+ (˜un), that ˜un
728
+ t → ˜ut in H ˜P ⊗ dt-a.e. . Now (15), ∥Pnv − v∥H → 0 for all v ∈ H and continuity
729
+ of ˆG imply that
730
+ ∥Gn(t, ˜un
731
+ t ) − ˆG(t, ˜ut)∥H → 0
732
+ ˜P ⊗ dt − a.e.
733
+ For convergence of
734
+ � T
735
+ 0 ∥ ˆGn(t, ˜un
736
+ t ) − ˆG(t, ˜ut)∥2
737
+ Hdt in Lp(˜Ω, ˜P) for all p ≥ 2, it now suffices to
738
+ show
739
+ sup
740
+ n
741
+ ˜E
742
+ �� T
743
+ 0
744
+ ∥Gn(t, ˜un
745
+ t ) − ˆG(t, ˜ut)∥p
746
+ Hdt
747
+
748
+ < ∞
749
+ (16)
750
+ for all p ≥ 2, since the latter implies uniform integrability of ∥Gn(t, ˜un
751
+ t )− ˆG(t, ˜ut)∥p
752
+ H, and thus
753
+ � T
754
+ 0
755
+ ∥Gnk(t, ˜unk
756
+ t ) − ˆG(t, ˜ut)∥2
757
+ Hdt → 0
758
+ ˜P-a.s. and in Lp(˜Ω, ˜P)
759
+ for all p ≥ 2.
760
+ 17 implies that
761
+ ˜E
762
+ �� T
763
+ 0
764
+ ∥Gn(t, ˜un
765
+ t ) − ˆG(t, ˜ut)∥p
766
+ Hdt
767
+
768
+ ≤ 2p ˜E
769
+ �� T
770
+ 0
771
+ ∥Pn ˆG(t, ˜un
772
+ t )∥p
773
+ H + ∥ ˆG(t, ˜ut)∥p
774
+ Hdt
775
+
776
+ ≤ 2pC ˜E
777
+ �� T
778
+ 0
779
+ 2 + ∥Pn˜un
780
+ t ∥p
781
+ H + ∥˜ut∥p
782
+ Hdt
783
+
784
+ ≤ 2p+1C T
785
+
786
+ 1 + ˜E
787
+
788
+ sup
789
+ t∈[0,T]
790
+ ∥˜un
791
+ t ∥p
792
+ H
793
+ ��
794
+ < ∞
795
+ 10
796
+
797
+ for all p ≥ 2.
798
+ The convergence
799
+ � T
800
+ 0
801
+ ∥F(˜unk
802
+ t ) − F(˜ut)∥2
803
+ H dt → 0
804
+ ˜P-a.s. and in Lp(˜Ω, ˜P) for all p ≥ 2 follows by similar (even simpler) calculations, due to the
805
+ Lipschitz continuity of f.
806
+ Lemma 20. There exists a subsequence (˜unk)k∈N such that for any t ∈ [0, T]
807
+ ∥˜unk
808
+ t
809
+ − ˜ut∥H → 0,
810
+ ˜P-a.s. and in Lp(˜Ω, ˜P).
811
+ Proof. We have for any t ∈ [0, T]
812
+ ∥˜un
813
+ t − ˜ut∥2
814
+ H = 2
815
+ � t
816
+ 0
817
+ ⟨˜un
818
+ s − ˜us, A(˜un
819
+ s − ˜us)⟩ds +
820
+ � t
821
+ 0
822
+ ⟨˜un
823
+ s − ˜us, F(˜un
824
+ s ) − F(˜us)⟩Hds
825
+ +
826
+ � t
827
+ 0
828
+ ⟨˜un
829
+ s − ˜us, Gn(s, ˜un
830
+ s ) − ˆG(s, ˜us)⟩Hds
831
+ ≤ −2
832
+ � t
833
+ 0
834
+ ∥˜un
835
+ s − ˜us∥2
836
+ V ds + 4
837
+ � t
838
+ 0
839
+ ∥˜un
840
+ s − ˜us∥2
841
+ Hds
842
+ +
843
+ � t
844
+ 0
845
+ ∥F(˜un
846
+ s ) − F(˜us)∥2
847
+ Hds +
848
+ � t
849
+ 0
850
+ ∥Gn(s, ˜un
851
+ s ) − ˆG(s, ˜us)∥2
852
+ Hds.
853
+ Using the Lipschitz continuity of f and Gronwall inequality, we end up with
854
+ ∥˜un
855
+ t − ˜ut∥2
856
+ H ≤ CT
857
+ � T
858
+ 0
859
+ ∥Gn(s, ˜un
860
+ s ) − ˆG(s, ˜us)∥2
861
+ Hds.
862
+ Now by Lemma 19 there exists a subsequence, again denoted by (˜un
863
+ t )n, such that
864
+ � T
865
+ 0
866
+ ∥Gn(s, ˜un
867
+ s ) − ˆG(s, ˜us)∥2
868
+ Hds → 0,
869
+ ˜P-a.s. and in Lp(˜Ω, ˜P). This finishes the proof.
870
+ Now for a generalized probability space µ := (Ωµ, Fµ, (Fµ
871
+ t )t, Pµ, W µ) we define for any
872
+ g ∈ L2(Ωµ × [0, T], H)
873
+ Jµ(g) := Jµ
874
+ 1 (ug) + Jµ
875
+ 2 (g),
876
+ where
877
+
878
+ 1 (u) := Eµ
879
+ �� T
880
+ 0
881
+
882
+ Λ
883
+ l(t, x, ut(x))dxdt +
884
+
885
+ Λ
886
+ m(x, uT (x))dx
887
+
888
+ ,
889
+
890
+ 2 (g) := Eµ
891
+ �� T
892
+ 0
893
+ ∥gt∥2
894
+ Hdt
895
+
896
+ ,
897
+ and ug is the solution to the spde
898
+
899
+ dug
900
+ t
901
+ = [Aug
902
+ t + F(ug
903
+ t) + gt]dt + BdW µ
904
+ t ,
905
+ t ∈ [0, T]
906
+ ug
907
+ 0
908
+ = u0.
909
+ (17)
910
+ To show (14) we need the following lemma.
911
+ 11
912
+
913
+ Lemma 21. Let µ be a generalized probability space and u1, u2 ∈ L2(Ωµ × [0, T], H) and
914
+ g1, g2 ∈ A, such that
915
+ ∥g1∥L2(Ωµ×[0,T],H) + ∥g2∥L2(Ωµ×[0,T],H) ≤ κ,
916
+ and
917
+ ∥u1∥L2(Ωµ×[0,T],H) + ∥u2∥L2(Ωµ×[0,T],H) ≤ κ,
918
+ then it holds
919
+ |J1(u1) − J1(u2)| ≤ C(κ)
920
+
921
+ ∥u1 − u2∥L2(Ωµ×[0,T],H) + ∥u1(T, ·) − u2(T, ·)∥L2(Ωµ,H)
922
+
923
+ and
924
+ |J2(g1) − J2(g2)| ≤ C(κ)∥g1 − g2∥L2(Ωµ×[0,T],H),
925
+ for some constant C(κ) > 0.
926
+ Proof. Using the assumptions on l and m we get
927
+ |J1(u1) − J1(u2)|
928
+ ≤ Eµ
929
+ �� T
930
+ 0
931
+
932
+ Λ
933
+ |l(t, x, u1(t, x)) − l(t, x, u2(t, x))|dxdt
934
+
935
+ + Eµ
936
+ ��
937
+ Λ
938
+ |m(x, u1(T, x)) − m(x, u2(T, x))|dx
939
+
940
+ ≤ L Eµ
941
+ �� T
942
+ 0
943
+
944
+ Λ
945
+ (1 + |u1(t, x)| + |u2(t, x)|) |u1(t, x) − u2(t, x)|dxdt
946
+
947
+ + L Eµ
948
+ ��
949
+ Λ
950
+ (1 + |u1(T, x)| + |u2(T, x)|) |u1(T, x) − u2(T, x)|dx
951
+
952
+ .
953
+ On the other hand we have
954
+ |J2(g1) − J2(g2)|
955
+ ≤ Eµ
956
+ �� T
957
+ 0
958
+ ��∥g1(t)∥2
959
+ H − ∥g2(t)∥2
960
+ H
961
+ �� dt
962
+
963
+ ≤ Eµ
964
+ �� T
965
+ 0
966
+
967
+ Λ
968
+ (1 + |g1(t, x)| + |g2(t, x)|)|g1(t, x) − g2(t, x)|dxdt
969
+
970
+ .
971
+ An application of the Cauchy-Schwarz inequality now yields the result.
972
+ Lemma 22. There exists a subsequence (˜unk)k∈N, such that
973
+ Jµ(Gnk(·, unk
974
+ · )) → inf
975
+ g∈A J(g)
976
+ Proof. By Lemma 19 and Lemma 20, there exists a subsequence (˜unk)k∈N, such that ∥˜unk −
977
+ ˜u∥L2([0,T],H) + ∥˜unk
978
+ T
979
+ − ˜uT ∥H → 0, ˜P-almost surely and in Lp(˜Ω, ˜P), and L(˜u|˜P) = L(u|P),
980
+ L(˜un|˜P) = L(un|P). Therefore by the a-priori estimates on ˜un, ˜u and the previous lemma, we
981
+ have that for ˜µ := (˜Ω, ˜F, ( ˜Ft)t, ˜P), µ := (Ω, F, (Ft)t, P) it holds
982
+ Jµ(Gnk(·, unk
983
+ · )) = J ˜µ(Gnk(·, ˜unk
984
+ · )) → J ˜µ( ˆG(·, ˜u·)) = Jµ( ˆG(·, u
985
+ ˆG
986
+ · )) = inf
987
+ g∈A J(g)
988
+ 12
989
+
990
+ 3.2
991
+ Approximation of the Finitely Based Minimizing Sequence
992
+ We turn to the the second part of the proof for Theorem 6. We will show that for any n ∈ N
993
+ we have
994
+ J(gn,m) → J(gn),
995
+ along a subsequence, where gn,m
996
+ t
997
+ := Gn,m(t, un,m
998
+ t
999
+ ). The proof is quite similar to the previous
1000
+ proof. The only difference is the argument for the convergence result for (˜un,m), due to the
1001
+ different assumption on the approximating sequence Gn,m, m ≥ 1.
1002
+ First note that due to the tightness of the sequence (un,m)m∈N stated in Lemma 18 there
1003
+ exist a probability space (˜Ω, ˜F, ˜P) and a sequence of Γ-valued random variables (˜un,m, ˜W m)m
1004
+ and (˜un, ˜W), such that
1005
+ 1. ˜W m = ˜W for any m ∈ N, ˜P-a.s.
1006
+ 2. L(˜un,m, ˜W m) = L(un,m, W)
1007
+ 3. ˜P-a.s.,
1008
+ ∥˜un,m − ˜un∥L2([0,T],H) + ∥˜un,m − ˜un∥C([0,T],V ′) → 0.
1009
+ Again, for any p ≥ 2, it holds that
1010
+ sup
1011
+ m∈N
1012
+ ˜E
1013
+
1014
+ sup
1015
+ t∈[0,T]
1016
+ ∥˜un,m
1017
+ t
1018
+ ∥p
1019
+ H +
1020
+ �� T
1021
+ 0
1022
+ ∥˜un,m
1023
+ t
1024
+ ∥2
1025
+ V dt
1026
+ �p/2�
1027
+ < ∞,
1028
+ (18)
1029
+ and therefore also
1030
+ ˜E
1031
+
1032
+ sup
1033
+ t∈[0,T]
1034
+ ∥˜un
1035
+ t ∥p
1036
+ H +
1037
+ �� T
1038
+ 0
1039
+ ∥˜un
1040
+ t ∥2
1041
+ V dt
1042
+ �p/2�
1043
+ < ∞.
1044
+ Again, we can conclude from this that ˜un ∈ L2 �
1045
+ ˜Ω, ˜P, L2([0, T], V )
1046
+
1047
+ and ˜un,m → ˜un weakly.
1048
+ To identify ˜un as a weak solution to (6) we again have that A˜un,m → A˜un weakly in
1049
+ L2 �
1050
+ ˜Ω, ˜P, L2([0, T], V ′)
1051
+
1052
+ , so that it remains to investigate the nonlinear drift coefficients.
1053
+ Lemma 23. Fix n. Then there exists a subsequence (˜un,mk
1054
+ ·
1055
+ )k sucht that
1056
+ lim
1057
+ m→∞
1058
+ ˜E
1059
+ �� T
1060
+ 0
1061
+ ∥Gn,mk(t, ˜un,mk
1062
+ t
1063
+ ) − Gn(t, ˜un
1064
+ t )∥2
1065
+ Hdt
1066
+
1067
+ = 0
1068
+ ˜P-a.s. and in Lp(˜Ω, ˜P)
1069
+ for all p ≥ 2 and
1070
+ lim
1071
+ m→∞
1072
+ ˜E
1073
+ �� T
1074
+ 0
1075
+ ∥F(˜un,mK
1076
+ t
1077
+ ) − F(˜un
1078
+ t )∥2
1079
+ Hdt
1080
+
1081
+ = 0
1082
+ ˜P-a.s. and in Lp(˜Ω, ˜P)
1083
+ for all p ≥ 2. Furthermore the process ˜un is a H-valued continuous process that satisfies
1084
+ ⟨˜un
1085
+ t , v⟩ = ⟨un
1086
+ 0 +
1087
+ � t
1088
+ 0
1089
+ A˜un
1090
+ t dt +
1091
+ � t
1092
+ 0
1093
+ F(˜un
1094
+ t )dt +
1095
+ � t
1096
+ 0
1097
+ Gn(t, ˜un
1098
+ t )dt + B ˜Wt, v⟩,
1099
+ t ∈ [0, T],
1100
+ for all v ∈ V , ˜P-a.s. as a V ′-valued process.
1101
+ 13
1102
+
1103
+ Proof. Again, we only need to show the first statement of the theorem, the second part follows
1104
+ again by standard arguments. This time we can estimate
1105
+ ∥Gn,m(t, ˜un,m
1106
+ t
1107
+ ) − Gn(t, ˜un
1108
+ t )∥H ≤ ∥Gn,m(t, ˜un,m
1109
+ t
1110
+ ) − Gn(t, ˜un,m
1111
+ t
1112
+ )∥H + ∥Gn(t, ˜un,m
1113
+ t
1114
+ ) − Gn(t, ˜un
1115
+ t )∥H
1116
+ = Im
1117
+ 1 + Im
1118
+ 2 .
1119
+ (19)
1120
+ Passing to some subsequence (still denoted by (˜un,m)), we have that
1121
+ ∥Pn˜un,m
1122
+ t
1123
+ − Pn˜un
1124
+ t ∥H ≤ ∥˜un,m
1125
+ t
1126
+ − ˜un
1127
+ t ∥H → 0
1128
+ ˜P ⊗ dt-.a.e.
1129
+ and continuity of ˆG then implies that
1130
+ Im
1131
+ 2 ≤ ∥ ˆG(·, Pn˜un,m) − ˆG(·, Pn˜un)∥L2([0,T],H) → 0
1132
+ ˜P ⊗ dt-.a.e.
1133
+ For the proof of convergence of Im
1134
+ 1
1135
+ to 0 let R := supt∈[0,T] ∥˜un
1136
+ t ∥H < ∞ ˜P-a.s. Then for
1137
+ ˜ω ∈ ˜Ω and t ∈ [0, T] with R(˜ω) < ∞ and ∥˜un,m
1138
+ t
1139
+ (˜ω) − ˜un
1140
+ t (˜ω)∥H → 0, the assumptions on Gn,m
1141
+ now imply that
1142
+ ∥Gn,m(t, ˜un,m
1143
+ t
1144
+ (˜ω)) − Gn(t, ˜un,m
1145
+ t
1146
+ (˜ω))∥H → 0.
1147
+ Since this is true for ˜P ⊗ dt-a.e. (˜ω, t) ∈ ˜Ω × [0, T] we conclude that
1148
+ I1
1149
+ m → 0
1150
+ ˜P ⊗ dt-a.s.
1151
+ The convergence of
1152
+ � T
1153
+ 0 ∥Gn,m(t, ˜un,m
1154
+ t
1155
+ ) − Gn(t, ˜un
1156
+ t )∥2
1157
+ Hdt in Lp(˜Ω, ˜P) for all p ≥ 2, now follows
1158
+ similar to the correpsonding argument in Lemma 19 from the uniform intergrability, implied
1159
+ by the bound
1160
+ sup
1161
+ m
1162
+ ˜E
1163
+ �� T
1164
+ 0
1165
+ ∥Gn,m(t, ˜un,m
1166
+ t
1167
+ ) − Gn(t, ˜un
1168
+ t )∥p
1169
+ Hdt
1170
+
1171
+ < ∞
1172
+ (20)
1173
+ for all p ≥ 2. (20) can be proven exactly in the same way as the proof of (16), using the
1174
+ uniform linear growth condition on Gn,m w.r.t. m.
1175
+ Finally, the convergence
1176
+ � T
1177
+ 0
1178
+ ∥F(˜un,m
1179
+ t
1180
+ ) − F(˜un
1181
+ t )∥2
1182
+ H dt → 0
1183
+ ˜P-a.s. and in Lp(˜Ω, ˜P) for all p ≥ 2 follows by similar (even simpler) calculations, due to the
1184
+ Lipschitz continuity of f.
1185
+ Proof. (of Theorem 6) Since ∥˜un,m − ˜un∥L2([0,T],H) → 0, ˜P-almost sure and L(˜un|˜P) =
1186
+ L(un|˜P) and L(˜un,m|˜P) = L(un,m|˜P) we have by Lemma 21 for ˜µ := (˜Ω, ˜F, ( ˜Ft)t, ˜P), µ :=
1187
+ (Ω, F, (Ft)t, P)
1188
+ Jµ(Gn,m(·, un,m
1189
+ ·
1190
+ )) = J ˜µ(Gn,m(·, ˜un,m
1191
+ ·
1192
+ )) → J ˜µ(Gn(·, ˜un
1193
+ · )) = Jµ(Gn(·, un
1194
+ · ))
1195
+ along a subsequence. Now together with the result from Section 3.1 we can find a sequence
1196
+ (G
1197
+ n)n∈N ⊆ U, such that
1198
+ Jµ(G
1199
+ n(·, uG
1200
+ n
1201
+ ·
1202
+ )) → Jµ( ˆG(·, u
1203
+ ˆG
1204
+ · )) = inf
1205
+ g∈A J(g).
1206
+ 14
1207
+
1208
+ Therefore we obtain
1209
+ inf
1210
+ G∈U J(G) ≤ J(G
1211
+ n)
1212
+ = Jµ(G
1213
+ n(·, uG
1214
+ n
1215
+ ·
1216
+ )) → inf
1217
+ g∈A J(g),
1218
+ hence
1219
+ inf
1220
+ G∈U J(G) ≤ inf
1221
+ g∈A J(g).
1222
+ Since G
1223
+ n(·, uG
1224
+ n
1225
+ ·
1226
+ ) ∈ A for all n ∈ N we get
1227
+ inf
1228
+ G∈U J(G) = inf
1229
+ g∈A J(g).
1230
+ 4
1231
+ Proof of Theorem 14, 16
1232
+ 4.1
1233
+ Finite Element Approximation
1234
+ We start with upper and lower bound estimates for the optimal cost of the finite element
1235
+ discretiation (FESCP) of the control problem (SCP).
1236
+ 4.1.1
1237
+ Upper Bound
1238
+ The main theorem concerning the upper bound of the approximating cost functional Jh is
1239
+ the following:
1240
+ Theorem 24. Let h ∈ (0, 1]. Assume that Assumption 2 is in force, then it holds
1241
+ inf
1242
+ g∈A J(g) ≥ Jh( ˆG) − ǫ1(h),
1243
+ where
1244
+ ǫ1(h) = C(T)
1245
+
1246
+ 1 + E
1247
+ �� T
1248
+ 0
1249
+ ∥ ˆG(t, u
1250
+ ˆG
1251
+ t )∥2
1252
+ H1 dt
1253
+ �1/2�
1254
+ h,
1255
+ for some C(T) > 0, independent of h. This shows in particular that
1256
+ inf
1257
+ g∈A J(g) ≥
1258
+ inf
1259
+ G∈UL
1260
+ ad
1261
+ Jh(G) − ǫ1(h),
1262
+ since ˆG is an admissible feedback control.
1263
+ We will now use the rest of this subsubsection to prove Theorem 24. First we quantify
1264
+ the difference between the cost of a control and its finite element approximation in terms of
1265
+ the parameter h.
1266
+ Lemma 25. Let G ∈ U L
1267
+ ad and uG be the unique solution to (6) and uG,h be the unique solution
1268
+ to (11), for h ∈ (0, 1]. Then it holds
1269
+ |J1(uG) − J1(uG,h)| ≤ C(T)h
1270
+ 15
1271
+
1272
+ and
1273
+ |J2(G(·, uG
1274
+ · )) − J2(PhG(·, uG,h
1275
+ ·
1276
+ ))| ≤ C(T)hE
1277
+ �� T
1278
+ 0
1279
+ ∥G(t, uG
1280
+ t )∥2
1281
+ H1 dt
1282
+ �1/2
1283
+ ,
1284
+ for some constant C(T) > 0 which only depends on the Lipschitz constant of G, but is inde-
1285
+ pendent of h.
1286
+ Proof. By Lemma 12 it holds
1287
+ ∥uG,h∥L2(Ω×[0,T],H) ≤ C,
1288
+ for some constant C > 0 which may depend on the Lipschitz constant of G, but is independent
1289
+ of h. Using ∥PhG(t, uG,h
1290
+ t
1291
+ )∥H ≤ ∥G(t, uG,h
1292
+ t
1293
+ )∥H and the fact that G(t, u) is at most of linear
1294
+ growth w.r.t. u, due to the Lipschitz property, we get
1295
+ E
1296
+ �� T
1297
+ 0
1298
+ ∥PhG(t, uG,h
1299
+ t
1300
+ )∥2
1301
+ H dt
1302
+
1303
+ ≤ CE
1304
+ �� T
1305
+ 0
1306
+ 1 + ∥uG,h
1307
+ t
1308
+ ∥2
1309
+ Hdt
1310
+
1311
+ ≤ C
1312
+ for some constant C > 0 that depends only on the Lipschitz constant of G. Now we can apply
1313
+ Lemma 21 to obtain
1314
+ |J1(uG) − J1(uG,h)|2 ≤ CE
1315
+ �� T
1316
+ 0
1317
+ ∥uG
1318
+ t − uG,h
1319
+ t
1320
+ ∥2
1321
+ H
1322
+
1323
+ + CE
1324
+
1325
+ ∥uG
1326
+ T − uG,h
1327
+ T
1328
+ ∥2
1329
+ H
1330
+
1331
+ .
1332
+ Using Lemma 21 and the Lipschitz continuity of G again,
1333
+ |J2(G(·, uG
1334
+ · )) − J2(PhG(·, uG,h
1335
+ ·
1336
+ ))|2 ≤ C E
1337
+ �� T
1338
+ 0
1339
+ ∥G(t, uG
1340
+ t ) − PhG(t, uG,h
1341
+ t
1342
+ )∥2
1343
+ Hdt
1344
+
1345
+ ≤ C E
1346
+ �� T
1347
+ 0
1348
+ ∥Ph(G(t, uG
1349
+ t ) − G(t, uG,h
1350
+ t
1351
+ ))∥2
1352
+ Hdt
1353
+
1354
+ + C E
1355
+ �� T
1356
+ 0
1357
+ ∥G(t, uG
1358
+ t ) − PhG(t, uG
1359
+ t )∥2
1360
+ Hdt
1361
+
1362
+ ≤ C E
1363
+ �� T
1364
+ 0
1365
+ ∥uG
1366
+ t − uG,h
1367
+ t
1368
+ ∥2
1369
+ Hdt
1370
+
1371
+ + C E
1372
+ �� T
1373
+ 0
1374
+ ∥G(t, uG
1375
+ t ) − PhG(t, uG
1376
+ t )∥2
1377
+ Hdt
1378
+
1379
+ (21)
1380
+ where the constant C may differ from line to line, but will be independent of h.
1381
+ Since
1382
+ G(t, uG
1383
+ t ) ∈ H1, we get from Remark 10
1384
+ ∥G(t, uG
1385
+ t ) − PhG(t, uG
1386
+ t )∥2
1387
+ H ≤ h2∥G(t, uG
1388
+ t )∥2
1389
+ H1
1390
+ and from [Kru1403] we get
1391
+ E
1392
+ �� T
1393
+ 0
1394
+ ∥uG
1395
+ t − uG,h
1396
+ t
1397
+ ∥2
1398
+ H
1399
+
1400
+ ≤ C(T)h2
1401
+ for some constant C(T) independent of h. Inserting both estimates into (21) yields the desired
1402
+ result.
1403
+ 16
1404
+
1405
+ Proof of Theorem 24.
1406
+ Lemma 25 implies that
1407
+ inf
1408
+ g∈A J(g) = J1(u
1409
+ ˆG) + J2( ˆG(·, u
1410
+ ˆG
1411
+ · ))
1412
+ ≥ J1(u
1413
+ ˆG,h) + J2(Ph ˆG(·, u
1414
+ ˆG,h
1415
+ ·
1416
+ )) − C(T)
1417
+
1418
+ 1 + E
1419
+ �� T
1420
+ 0
1421
+ ∥ ˆG(t, u
1422
+ ˆG
1423
+ t )∥2
1424
+ H1 dt
1425
+ ��
1426
+ h
1427
+ = Jh( ˆG) − C(T)
1428
+
1429
+ 1 + E
1430
+ �� T
1431
+ 0
1432
+ ∥ ˆG(t, u
1433
+ ˆG
1434
+ t )∥2
1435
+ H1dt
1436
+ ��
1437
+ h.
1438
+ 4.1.2
1439
+ Lower Bound
1440
+ Under the additional convexity assumptions specified in Assumption 15 we can also prove
1441
+ the lower bound. The main result concerning the lower bound of the approximating cost
1442
+ functional Jh is the following:
1443
+ Theorem 26. Let h ∈ (0, 1]. In addition to the assumptions of Theorem 24 we assume that
1444
+ the Assumption 15 and Assumption 9 are in force. Then for any G ∈ Uad
1445
+ Jh(G) + Ch ≥ J( ˆG),
1446
+ for some constant C > 0 independent of h and G. This shows in particular that
1447
+ inf
1448
+ g∈A J(g) ≤
1449
+ inf
1450
+ G∈Uad Jh(G) + Ch.
1451
+ The proof of the lower bound uses the necessary optimality condition for the control
1452
+ problem (SCP). To this end let H(t, ·) : H × U × H → R
1453
+ H(t, u, g, p) =
1454
+
1455
+ Λ
1456
+ l(t, x, u(x)) dx + ∥g∥2
1457
+ H + ⟨p, F(u) + g⟩H
1458
+ denote the reduced Hamiltonian associated with (SCP) and let L(t, u)(x) = l(t, x, u(x)),
1459
+ (t, x) ∈ [0, T] × Λ, u ∈ H, be the Nemytskii operator induced by l(t, x, u) and respectively
1460
+ M(u)(x) = m(x, u(x)) the Nemytskii operator induced by m(x, u). By Assumption H1’ and
1461
+ H2’ the Hamiltonian is convex in the variables u, g, i.e.
1462
+ H(t, u2, g2, p) − H(t, u1, g1, p) − ∂uH(t, u1, g1, p)(u2 − u1) − ∂gH(t, u1, g1, p)(g2 − g1) ≥ 0,
1463
+ for any t ∈ [0, T], u1, u2 ∈ H1, g1, g2 ∈ A and p ∈ H.
1464
+ Theorem 7.2 in [SW21b] now proves a stochastic maximum principle for the case where
1465
+ the running cost l(t, x, u) does not depend on t. A straightforward generalization to the time
1466
+ dependent case now yields
1467
+ Theorem 27. There exist adapted processes (q, p) with
1468
+ p ∈ L2([0, T] × Ω, H1) ∩ L2(Ω, C([0, T], H))
1469
+ and
1470
+ q ∈ L2([0, T] × Ω, L0
1471
+ 2)
1472
+ satisfying
1473
+
1474
+ dpt
1475
+ = −
1476
+
1477
+ Apt + DF(uˆg
1478
+ t)pt + DL(t, uˆg
1479
+ t)
1480
+
1481
+ dt + qtdWt,
1482
+ t ∈ [0, T]
1483
+ pT
1484
+ = DM(uˆg
1485
+ T ),
1486
+ (22)
1487
+ 17
1488
+
1489
+ such that
1490
+ H(t, uˆg, v, pt) ≥ H(t, uˆg, ˆgt, pt)
1491
+ for all v ∈ U and almost every (t, ω) ∈ [0, T] × Ω. In particular it holds
1492
+ ⟨∂gH(t, uˆg, ˆg, pt), v − ˆgt⟩H ≥ 0,
1493
+ for all v ∈ U and almost every (t, ω) ∈ [0, T] × Ω.
1494
+ Proof. (of Theorem 26) We first rewrite
1495
+ Jh(G) − J( ˆG) = J1(uG,h) − J1(u
1496
+ ˆG) + J2(PhG(·, uG,h
1497
+ ·
1498
+ )) − J2( ˆG(·, u
1499
+ ˆG
1500
+ · ))
1501
+ = E
1502
+ �� T
1503
+ 0
1504
+
1505
+ Λ
1506
+ l(t, x, uG,h
1507
+ t
1508
+ (x)) − l(t, x, u
1509
+ ˆG
1510
+ t (x))dx dt
1511
+
1512
+ + E
1513
+ ��
1514
+ Λ
1515
+ m(x, uG,h
1516
+ T
1517
+ (x)) − m(x, u
1518
+ ˆG
1519
+ T (x))dx
1520
+
1521
+ + E
1522
+ �� T
1523
+ 0
1524
+ ∥PhG(t, uG,h
1525
+ t
1526
+ )∥2
1527
+ H − ∥ ˆG(t, u
1528
+ ˆG
1529
+ t )∥2
1530
+ Hdt
1531
+
1532
+ .
1533
+ Let (p, q) be the solution to the adjoint equation w.r.t. ˆgt = ˆG(t, u ˆG
1534
+ t ) (22), then we can write
1535
+ Jh(G) − J( ˆG) = T1 + T2,
1536
+ where
1537
+ T1 = E
1538
+
1539
+ ⟨uG,h
1540
+ T
1541
+ − u
1542
+ ˆG
1543
+ T , pT ⟩H
1544
+
1545
+ + E
1546
+ �� T
1547
+ 0
1548
+
1549
+ Λ
1550
+ l(t, x, uG,h
1551
+ t
1552
+ (x)) − l(t, x, u
1553
+ ˆG
1554
+ t (x))dx dt
1555
+
1556
+ + E
1557
+ �� T
1558
+ 0
1559
+ ∥PhG(t, uG,h
1560
+ t
1561
+ )∥2
1562
+ H − ∥ ˆG(t, u
1563
+ ˆG
1564
+ t )∥2
1565
+ Hdt
1566
+
1567
+ T2 = E
1568
+ ��
1569
+ Λ
1570
+ m(x, uG,h
1571
+ T
1572
+ (x)) − m(x, u
1573
+ ˆG
1574
+ T (x))dx
1575
+
1576
+ − E
1577
+
1578
+ ⟨uG,h
1579
+ T
1580
+ − u
1581
+ ˆG
1582
+ t , DM(u
1583
+ ˆG
1584
+ T )⟩H
1585
+
1586
+ .
1587
+ We start by estimating the term T2. By the convexity of m in u, we get
1588
+ m(x, u′) − m(x, u) − ∂um(x, u)(u′ − u) ≥ 0
1589
+ for every x ∈ Λ, u′, u ∈ R, hence
1590
+ T2 ≥ 0.
1591
+ For the other term T1 we consider the equation for uG,h
1592
+ t
1593
+ − u ˆG
1594
+ t :
1595
+
1596
+
1597
+
1598
+
1599
+
1600
+ d(uG,h
1601
+ t
1602
+ − u ˆG
1603
+ t ) = [Au ˆG
1604
+ t − AhuG,h
1605
+ t
1606
+ + (PhF(uG,h
1607
+ t
1608
+ ) − F(u ˆG
1609
+ t )) + (PhG(t, uG,h
1610
+ t
1611
+ ) − ˆG(t, u ˆG
1612
+ t ))]dt
1613
+ +(Ph − I)BdWt,
1614
+ t ∈ [0, T]
1615
+ (uG,h
1616
+ 0
1617
+ − u ˆG
1618
+ 0 ) = (Ph − I)u0.
1619
+ (23)
1620
+ By Itˆo’s formula we get
1621
+ d⟨uG,h
1622
+ t
1623
+ − u
1624
+ ˆG
1625
+ t , pt⟩H = ⟨uG,h
1626
+ t
1627
+ − u
1628
+ ˆG
1629
+ t , dpt⟩H + ⟨pt, d(uG,h
1630
+ t
1631
+ − u
1632
+ ˆG
1633
+ t )⟩H + d⟨uG,h − u
1634
+ ˆG, p⟩t.
1635
+ 18
1636
+
1637
+ Recall that Ph|H1 = Rh by R2 (Assumption 9). This now implies that
1638
+ ⟨AhuG,h
1639
+ t
1640
+ , pt⟩H = ⟨AhuG,h
1641
+ t
1642
+ , Phpt⟩H = ⟨AhuG,h
1643
+ t
1644
+ , Rhpt⟩H
1645
+ = ⟨A
1646
+ 1
1647
+ 2 uG,h
1648
+ t
1649
+ , A
1650
+ 1
1651
+ 2Rhpt⟩H = ⟨A
1652
+ 1
1653
+ 2uG,h
1654
+ t
1655
+ , A
1656
+ 1
1657
+ 2 pt⟩H
1658
+ = ⟨uG,h
1659
+ t
1660
+ , Apt⟩H,
1661
+ so that
1662
+ ⟨Au
1663
+ ˆG
1664
+ t − AhuG,h
1665
+ t
1666
+ , pt⟩H + ⟨uG,h
1667
+ t
1668
+ − u
1669
+ ˆG
1670
+ t , Apt⟩H = ⟨Au
1671
+ ˆG
1672
+ t , pt⟩H − ⟨u
1673
+ ˆG
1674
+ t , Apt⟩H = 0.
1675
+ Now
1676
+ d⟨uG,h
1677
+ t
1678
+ − u
1679
+ ˆG
1680
+ t , pt⟩H = −⟨uG,h
1681
+ t
1682
+ − u
1683
+ ˆG
1684
+ t , DF(u
1685
+ ˆG
1686
+ t )pt + DL(t, u
1687
+ ˆG
1688
+ t )⟩Hdt
1689
+ + ⟨pt, (PhF(uG,h
1690
+ t
1691
+ ) − F(u
1692
+ ˆG
1693
+ t )) + (PhG(t, uG,h
1694
+ t
1695
+ ) − ˆG(t, u
1696
+ ˆG
1697
+ t ))⟩Hdt
1698
+ + ⟨q∗
1699
+ t (uG,h
1700
+ t
1701
+ − u
1702
+ ˆG
1703
+ t ), dWt⟩H
1704
+ + ⟨(Ph − I)∗pt, BdWt⟩H
1705
+ + ⟨qt
1706
+
1707
+ Q, (Ph − I)B
1708
+
1709
+ Q⟩L0
1710
+ 2dt.
1711
+ Taking expectation and invoking the definition of the Hamiltonian, we arrive at
1712
+ T1 = E
1713
+ �� T
1714
+ 0
1715
+ H(t, u
1716
+ ˆG
1717
+ t , PhG(t, uG,h
1718
+ t
1719
+ ), pt) − H(t, u
1720
+ ˆG
1721
+ t , ˆG(t, u
1722
+ ˆG
1723
+ t ), pt)dt
1724
+
1725
+ + E
1726
+ �� T
1727
+ 0
1728
+ ⟨pt, PhF(uG,h
1729
+ t
1730
+ ) − F(u
1731
+ ˆG
1732
+ t ) − DF(u
1733
+ ˆG
1734
+ t )(uG,h
1735
+ t
1736
+ − u
1737
+ ˆG
1738
+ t )⟩Hdt
1739
+
1740
+ + E
1741
+ �� T
1742
+ 0
1743
+
1744
+ Λ
1745
+ l(t, x, uG,h
1746
+ t
1747
+ (x)) − l(t, x, u
1748
+ ˆG
1749
+ t (x)) − ∂ul(t, x, u
1750
+ ˆG
1751
+ t (x))(uG,h
1752
+ t
1753
+ − u
1754
+ ˆG
1755
+ t )(x)dx dt
1756
+
1757
+ +
1758
+ � T
1759
+ 0
1760
+ ⟨qt
1761
+
1762
+ Q, (Ph − I)B
1763
+
1764
+ Q⟩L0
1765
+ 2dt.
1766
+ The maximum principle and convexity of l in u now imply that
1767
+ T1 ≥ E
1768
+ �� T
1769
+ 0
1770
+ ⟨pt, PhF(uG,h
1771
+ t
1772
+ ) − F(u
1773
+ ˆG
1774
+ t ) − DF(u
1775
+ ˆG
1776
+ t )(uG,h
1777
+ t
1778
+ − u
1779
+ ˆG
1780
+ t )⟩Hdt
1781
+
1782
+ +
1783
+ � T
1784
+ 0
1785
+ ⟨qt
1786
+
1787
+ Q, (Ph − I)B
1788
+
1789
+ Q⟩L0
1790
+ 2dt.
1791
+ Since f is linear, hence PhF(uG,h
1792
+ t
1793
+ ) = F(PhuG,h
1794
+ t
1795
+ ) = F(uG,h
1796
+ t
1797
+ ), the first term on the right hand
1798
+ side vanishes
1799
+ E
1800
+ �� T
1801
+ 0
1802
+ ⟨pt, PhF(uG,h
1803
+ t
1804
+ ) − F(u
1805
+ ˆG
1806
+ t ) − DF(u
1807
+ ˆG
1808
+ t )(uG,h
1809
+ t
1810
+ − u
1811
+ ˆG
1812
+ t )⟩Hdt
1813
+
1814
+ = 0
1815
+ and Assumption 9 implies that the second term on the right hand side is of order h, since
1816
+ ⟨qt
1817
+
1818
+ Q, (Ph − I)B
1819
+
1820
+ Q⟩L0
1821
+ 2 ≤ ∥qt
1822
+
1823
+ Q∥L0
1824
+ 2∥(Ph − I)B
1825
+
1826
+ Q∥L0
1827
+ 2
1828
+ ≤ Ch∥qt
1829
+
1830
+ Q∥L0
1831
+ 2∥B
1832
+
1833
+ Q∥L0
1834
+ 2,1.
1835
+ We thus obtain that T1 ≥ −Ch, which together with T2 ≥ 0, implies the assertion.
1836
+ 19
1837
+
1838
+ 4.2
1839
+ Approximation of the Optimal Feedback Control
1840
+ In the whole section we fix h ∈ (0, 1]. However, every result of this section remains true in
1841
+ the limit h ↓ 0, i.e. if we consider the optimal control problem (FCP) instead of the finite
1842
+ element approximation (FESCP). The proofs can be easily adapted to this situation.
1843
+ Lemma 28. Under the Assumption 2, for any G1, G2 ∈ U L
1844
+ ad there exists a constant C > 0
1845
+ depending only on T and the Lipschitz constant of G2, such that
1846
+ E
1847
+
1848
+ sup
1849
+ r∈[0,T]
1850
+ ∥uG1,h
1851
+ r
1852
+ − uG2,h
1853
+ r
1854
+ ∥2
1855
+ H +
1856
+ � T
1857
+ 0
1858
+ ∥uG1,h
1859
+ r
1860
+ − uG2,h
1861
+ r
1862
+ ∥2
1863
+ H1dr
1864
+
1865
+ ≤ CE
1866
+ �� T
1867
+ 0
1868
+ ∥Ph(G1(r, uG1,h
1869
+ r
1870
+ ) − G2(r, uG1,h
1871
+ r
1872
+ ))∥2
1873
+ Hdr
1874
+
1875
+ ,
1876
+ and
1877
+ E
1878
+
1879
+ sup
1880
+ r∈[0,T]
1881
+ ∥Ph(G1(r, uG1,h
1882
+ r
1883
+ ) − G2(r, uG2,h
1884
+ r
1885
+ ))∥2
1886
+ H
1887
+
1888
+ ≤ CE
1889
+
1890
+ sup
1891
+ r∈[0,T]
1892
+ ∥Ph(G1(r, uG1,h
1893
+ r
1894
+ ) − G2(r, uG1,h
1895
+ r
1896
+ ))∥2
1897
+ H
1898
+
1899
+ .
1900
+ Proof. For any r ∈ [0, T], the Lipschitz continuity of G2 implies that
1901
+ ∥Ph(G1(r, uG1,h
1902
+ r
1903
+ ) − G2(r, uG2,h
1904
+ r
1905
+ ))∥H
1906
+ ≤ ∥Ph(G1(r, uG1,h
1907
+ r
1908
+ ) − G2(r, uG1,h
1909
+ r
1910
+ ))∥H + ∥Ph(G2(r, uG1,h
1911
+ r
1912
+ ) − G2(r, uG2,h
1913
+ r
1914
+ ))∥H
1915
+ ≤ ∥Ph(G1(r, uG1,h
1916
+ r
1917
+ ) − G2(r, uG1,h
1918
+ r
1919
+ ))∥H + C∥uG1,h
1920
+ r
1921
+ − uG2,h
1922
+ r
1923
+ ∥H,
1924
+ (24)
1925
+ where C is the Lipschitz constant of G2. Now by Itˆo’s formula we get for any r ∈ [0, T]
1926
+ ∥uG1,h
1927
+ r
1928
+ − uG2,h
1929
+ r
1930
+ ∥2
1931
+ H
1932
+ = −2
1933
+ � r
1934
+ 0
1935
+ ∥uG1,h
1936
+ s
1937
+ − uG2,h
1938
+ s
1939
+ ∥2
1940
+ 1ds + 2
1941
+ � r
1942
+ 0
1943
+ ⟨Ph(F(uG1,h
1944
+ s
1945
+ ) − F(uG2,h
1946
+ s
1947
+ )), uG1,h
1948
+ s
1949
+ − uG2,h
1950
+ s
1951
+ ⟩Hds
1952
+ + 2
1953
+ � t
1954
+ 0
1955
+ ⟨Ph(G1(s, uG1,h
1956
+ s
1957
+ ) − G2(s, uG2,h
1958
+ 2
1959
+ )), uG1,h
1960
+ s
1961
+ − uG2,h
1962
+ s
1963
+ ⟩Hds
1964
+ ≤ −2
1965
+ � r
1966
+ 0
1967
+ ∥uG1,h
1968
+ s
1969
+ − uG2,h
1970
+ s
1971
+ ∥2
1972
+ 1ds + 2
1973
+ � r
1974
+ 0
1975
+ ∥F(uG1,h
1976
+ s
1977
+ ) − F(uG2,h
1978
+ s
1979
+ ))∥H∥uG1,h
1980
+ s
1981
+ − uG2,h
1982
+ s
1983
+ ∥Hds
1984
+ + 2
1985
+ � r
1986
+ 0
1987
+ ∥Ph(G1(s, uG1,h
1988
+ s
1989
+ ) − G2(s, uG2,h
1990
+ 2
1991
+ ))∥H∥uG1,h
1992
+ s
1993
+ − uG2,h
1994
+ s
1995
+ ∥Hds.
1996
+ Using Young’s inequality and the Lipschitz continuity of f we obtain by the previous consid-
1997
+ erations
1998
+ sup
1999
+ r∈[0,t]
2000
+ ∥uG1,h
2001
+ r
2002
+ − uG2,h
2003
+ r
2004
+ ∥2
2005
+ H +
2006
+ � t
2007
+ 0
2008
+ ∥uG1,h
2009
+ r
2010
+ − uG2,h
2011
+ r
2012
+ ∥2
2013
+ 1dr
2014
+ ≤ C
2015
+ � t
2016
+ 0
2017
+ sup
2018
+ r∈[0,s]
2019
+ ∥uG1,h
2020
+ r
2021
+ − uG2,h
2022
+ r
2023
+ ∥2
2024
+ Hds + ∥Ph(G1(r, uG1,h
2025
+ r
2026
+ ) − G2(r, uG1,h
2027
+ r
2028
+ ))∥2
2029
+ Hdr,
2030
+ where the constant C depends on the Lipschitz constants of G2 and of f. Gronwalls inequality
2031
+ now implies that
2032
+ sup
2033
+ r∈[0,T]
2034
+ ∥uG1,h
2035
+ r
2036
+ − uG2,h
2037
+ r
2038
+ ∥2
2039
+ H +
2040
+ � T
2041
+ 0
2042
+ ∥uG1,h
2043
+ r
2044
+ − uG2,h
2045
+ r
2046
+ ∥2
2047
+ 1dr
2048
+ ≤ C
2049
+ � T
2050
+ 0
2051
+ ∥Ph(G1(r, uG1,h
2052
+ r
2053
+ ) − G2(r, uG1,h
2054
+ r
2055
+ ))∥2
2056
+ Hdr.
2057
+ (25)
2058
+ 20
2059
+
2060
+ which yields the first inequality taking expectations.
2061
+ For the proof of the second inequality we first take the supremum in (24)
2062
+ sup
2063
+ r∈[0,T]
2064
+ ∥Ph(G1(r, uG1,h
2065
+ r
2066
+ ) − G2(r, uG2,h
2067
+ r
2068
+ ))∥H
2069
+ ≤ sup
2070
+ r∈[0,T]
2071
+ ∥Ph(G1(r, uG1,h
2072
+ r
2073
+ ) − G2(r, uG1,h
2074
+ r
2075
+ ))∥H + C sup
2076
+ r∈[0,T]
2077
+ ∥uG1,h
2078
+ r
2079
+ − uG2,h
2080
+ r
2081
+ ∥H,
2082
+ and inserting (25) yields that
2083
+ sup
2084
+ r∈[0,T]
2085
+ ∥Ph(G1(r, uG1,h
2086
+ r
2087
+ ) − G2(r, uG2,h
2088
+ r
2089
+ ))∥H
2090
+ ≤ sup
2091
+ r∈[0,T]
2092
+ ∥Ph(G1(r, uG1,h
2093
+ r
2094
+ ) − G2(r, uG1,h
2095
+ r
2096
+ ))∥H + C
2097
+ � T
2098
+ 0
2099
+ ∥Ph(G1(r, uG1,h
2100
+ r
2101
+ ) − G2(r, uG1,h
2102
+ r
2103
+ ))∥2
2104
+ Hdr
2105
+ ≤ C sup
2106
+ r∈[0,T]
2107
+ ∥Ph(G1(r, uG1,h
2108
+ r
2109
+ ) − G2(r, uG1,h
2110
+ r
2111
+ ))∥H.
2112
+ Taking squares and expectations gives the second inequality.
2113
+ Lemma 29. Under the Assumptions 2, for any G1, G2 ∈ U L
2114
+ ad there exists a constant C > 0
2115
+ depending only on T and the Lipschitz constants of G1 and G2, such that for all R > 0 it
2116
+ holds
2117
+ |Jh(G1) − Jh(G2)|
2118
+ ≤ CE
2119
+
2120
+ sup
2121
+ r∈[0,T]
2122
+ ∥Ph(G1(r, uG1,h
2123
+ r
2124
+ ) − G2(r, uG1,h
2125
+ r
2126
+ ))∥2
2127
+ H
2128
+ �1/2
2129
+ .
2130
+ Proof. Lemma 12 implies that
2131
+ E
2132
+
2133
+ sup
2134
+ t∈[0,T]
2135
+ ∥PhGi(t, uGi,h
2136
+ t
2137
+ )∥2
2138
+ H + sup
2139
+ t∈[0,T]
2140
+ ∥uGi,h
2141
+ t
2142
+ ∥2
2143
+ H
2144
+
2145
+ ≤ C,
2146
+ for i = 1, 2, for some C > 0 that depends only on the Lipschitz constants of G1 and G2 and
2147
+ T, but is independent of h. Therefore a simple application of Lemma 21 yields
2148
+ |Jh(G1) − Jh(G2)|2
2149
+ ≤ C
2150
+
2151
+ E
2152
+
2153
+ sup
2154
+ t∈[0,T]
2155
+ ∥uG1,h
2156
+ t
2157
+ − uG2,h
2158
+ t
2159
+ ∥2
2160
+ H
2161
+
2162
+ + E
2163
+
2164
+ sup
2165
+ t∈[0,T]
2166
+ ∥Ph(G1(t, uG1,h
2167
+ t
2168
+ ) − G2(t, uG2,h
2169
+ t
2170
+ ))∥2
2171
+ H
2172
+ ��
2173
+ ,
2174
+ for some constant C > 0 depending only on T and the Lipschitz constants of G1 and G2. Now
2175
+ Lemma 28 yields the desired result.
2176
+ We are now in the position to prove our main results.
2177
+ Proof of Theorem 14.
2178
+ Let R > 0 and
2179
+ BR :=
2180
+
2181
+ sup
2182
+ t∈[0,T]
2183
+ ∥u
2184
+ ˆG,h
2185
+ t
2186
+ ∥H < R
2187
+
2188
+ .
2189
+ Then
2190
+ P (Bc
2191
+ R) ≤ 1
2192
+ R2 E
2193
+
2194
+ sup
2195
+ t∈[0,T]
2196
+ ∥u
2197
+ ˆG,h
2198
+ t
2199
+ ∥2
2200
+ H
2201
+
2202
+ ≤ C 1
2203
+ R2
2204
+ 21
2205
+
2206
+ for some constant C that is independent of h by Lemma 12. This implies, again using Lemma
2207
+ 12, that for any m ∈ N
2208
+ E
2209
+
2210
+ sup
2211
+ t∈[0,T]
2212
+ ∥Ph(Gh,m(t, u
2213
+ ˆG,h
2214
+ t
2215
+ ) − ˆG(t, u
2216
+ ˆG,h
2217
+ t
2218
+ ))∥2
2219
+ H
2220
+
2221
+ = E
2222
+
2223
+
2224
+ 1BR + 1Bc
2225
+ R
2226
+
2227
+ sup
2228
+ t∈[0,T]
2229
+ ∥Ph(Gh,m(t, u
2230
+ ˆG,h
2231
+ t
2232
+ ) − ˆG(t, u
2233
+ ˆG,h
2234
+ t
2235
+ ))∥2
2236
+ H
2237
+
2238
+ ≤ E
2239
+
2240
+ 1BR sup
2241
+ t∈[0,T]
2242
+ ∥Ph(Gh,m(t, u
2243
+ ˆG,h
2244
+ t
2245
+ ) − ˆG(t, u
2246
+ ˆG,h
2247
+ t
2248
+ ))∥2
2249
+ H
2250
+
2251
+ + P (Bc
2252
+ R)1/2 E
2253
+
2254
+ sup
2255
+ t∈[0,T]
2256
+ ∥Ph(Gh,m(t, u
2257
+ ˆG,h
2258
+ t
2259
+ ) − ˆG(t, u
2260
+ ˆG,h
2261
+ t
2262
+ ))∥4
2263
+ H
2264
+ �1/2
2265
+ ≤ ǫh,R
2266
+ m
2267
+ + Ch
2268
+ 1
2269
+ R
2270
+ for some constant Ch independent of m. Lemma 29 now yields
2271
+ |Jh(Gh,m) − Jh( ˆG)| ≤
2272
+
2273
+ ǫh,R
2274
+ m
2275
+ + Ch
2276
+ 1
2277
+ R.
2278
+ Using Theorem 24 we get
2279
+ inf
2280
+ g∈A J(g) ≥ Jh( ˆG) − Cǫ1(h)
2281
+ ≥ Jh(Gh,m) − Cǫ1(h) −
2282
+
2283
+ ǫh,R
2284
+ m
2285
+ + Ch
2286
+ 1
2287
+ R
2288
+
2289
+ inf
2290
+ G∈Uh,m Jh(G) − Cǫ1(h) −
2291
+
2292
+ ǫh,R
2293
+ m
2294
+ + Ch
2295
+ 1
2296
+ R,
2297
+ where
2298
+ ǫ1(h) = C
2299
+
2300
+ 1 + E
2301
+ �� T
2302
+ 0
2303
+ ∥ ˆG(t, u
2304
+ ˆG
2305
+ t )∥2
2306
+ H1 dt
2307
+ �1/2�
2308
+ h
2309
+ and constants C, Ch > 0, where the constant C does not depend on h.
2310
+ The second main result is just a simple consequence of Theorem 26.
2311
+ Proof of Theorem 16.
2312
+ By Theorem 26 we get
2313
+ inf
2314
+ g∈A J(g) ≤
2315
+ inf
2316
+ G∈Uad
2317
+ Jh(G) + Ch
2318
+ for some constant C independent of h, and since U ⊆ Uad we obtain
2319
+ inf
2320
+ g∈A J(g) ≤ inf
2321
+ G∈U Jh(G) + Ch.
2322
+ Remark 30. We can also derive an approximation error estimate with respect to the non-
2323
+ discretized cost functional J. As mentioned in the beginning of this section, it is not difficult
2324
+ to show that for G1, G2 ∈ U L
2325
+ ad
2326
+ |J(G1) − J(G2)| ≤ CE
2327
+
2328
+ sup
2329
+ r∈[0,T]
2330
+ ∥G1(r, uG1
2331
+ r ) − G2(r, uG1
2332
+ r )∥2
2333
+ H
2334
+ �1/2
2335
+ .
2336
+ (26)
2337
+ 22
2338
+
2339
+ In particular we have for any G ∈ U L
2340
+ ad and ˆGh(t, u) := Ph ˆG(t, Phu),h ∈ (0, 1]
2341
+ |J(G) − J( ˆG)|
2342
+ ≤ |J(G) − J( ˆGh)| + |J( ˆGh) − J( ˆG)|
2343
+ ≤ CE
2344
+
2345
+ sup
2346
+ t∈[0,T]
2347
+ ∥G(t, u) − Ph ˆG(t, Phu
2348
+ ˆGh)∥2
2349
+ H
2350
+ �1/2
2351
+ + |J( ˆGh) − J( ˆG)|.
2352
+ Due to the Lipschitz continuity of ˆG and our assumptions on the orthogonal projections Ph
2353
+ we have
2354
+ ∥ ˆG(t, u
2355
+ ˆG
2356
+ t ) − ˆGh(t, u
2357
+ ˆG
2358
+ t )∥H ≤ ∥ ˆG(t, u
2359
+ ˆG
2360
+ t ) − Ph ˆG(t, u
2361
+ ˆG
2362
+ t )∥H
2363
+ + ∥Ph ˆG(t, u
2364
+ ˆG
2365
+ t ) − Ph ˆG(t, Phu
2366
+ ˆG
2367
+ t )∥H
2368
+ ≤ h∥ ˆG(t, u
2369
+ ˆG
2370
+ t )∥H1 + C∥u
2371
+ ˆG
2372
+ t − Phu
2373
+ ˆG
2374
+ t ∥H
2375
+ ≤ h∥ ˆG(t, u
2376
+ ˆG
2377
+ t )∥H1 + Ch∥u
2378
+ ˆG
2379
+ t ∥H1.
2380
+ Using the result from Lemma 28 for h ↓ 0, we get
2381
+ E
2382
+
2383
+ sup
2384
+ t∈[0,T]
2385
+ ∥u
2386
+ ˆG
2387
+ t − u
2388
+ ˆGh
2389
+ t
2390
+ ∥H
2391
+
2392
+ ≤ Ch(E
2393
+ �� T
2394
+ 0
2395
+ ∥ ˆG(t, u
2396
+ ˆG
2397
+ t )∥H1dt
2398
+
2399
+ + E
2400
+ �� T
2401
+ 0
2402
+ ∥u
2403
+ ˆG
2404
+ t ∥H1dt
2405
+
2406
+ )
2407
+ and one can show in a similar fashion that
2408
+ E
2409
+ �� T
2410
+ 0
2411
+ ∥ ˆG(t, u
2412
+ ˆG
2413
+ t ) − ˆGh(t, u
2414
+ ˆGh
2415
+ t
2416
+ )∥Hdt
2417
+
2418
+ ≤ Ch(E
2419
+ �� T
2420
+ 0
2421
+ ∥ ˆG(t, u
2422
+ ˆG
2423
+ t )∥H1dt
2424
+
2425
+ + E
2426
+ �� T
2427
+ 0
2428
+ ∥u
2429
+ ˆG
2430
+ t ∥H1dt
2431
+
2432
+ ).
2433
+ Lemma 21 now implies
2434
+ |J( ˆGh) − J( ˆG)| ≤ Ch,
2435
+ for some constant C > 0 which depends only on the Lipschitz constant of ˆG. Therefore we
2436
+ obtain
2437
+ |J(G) − J( ˆG)| ≤ CE
2438
+
2439
+ sup
2440
+ t∈[0,T]
2441
+ ∥G(t, u) − Ph ˆG(t, Phu
2442
+ ˆGh)∥2
2443
+ H
2444
+ �1/2
2445
+ + Ch,
2446
+ for some constant C that only depends on the Lipschitz constant of ˆG. Now one can easily
2447
+ show an analog result of Theorem 14 for the non-discretized cost functional J.
2448
+ 5
2449
+ Examples
2450
+ In this section we will provide some examples to demonstrate the scope of our two main
2451
+ theorems. In the following we consider U = BH(0, R), for some R > 0. Furthermore we assume
2452
+ that the solution to the HJB equation (5) has bounded second derivatives on [0, T − ǫ] × H,
2453
+ for all ǫ ∈ ]0, T[. Sufficient conditions for this assumption to be true are given by ([FGS17b],
2454
+ Theorem 4.1.55). Then by ([FGS17b], Theorem 4.201) there exists a unique optimal control
2455
+ given in feedback form by
2456
+ ˆgt = ˆG(t, u
2457
+ ˆG
2458
+ t ),
2459
+ 23
2460
+
2461
+ for some bounded feedback ˆG : [0, T] × H → H which is Lipschitz continuous in u, and where
2462
+ u ˆG is the unique strong solution to equation (2).
2463
+ In the first example regarding Theorem 6 we will construct an ansatz space of approx-
2464
+ imating controls U that satisfies the uniform approximation property with respect to the
2465
+ optimal feedback ˆG by using artificial neural networks with one layer. In the second example
2466
+ regarding Theorem 14 we will construct a sequence of ansatz spaces (Uh,m)m∈N that satisfies
2467
+ the Lipschitz approximation property with respect to the optimal feedback ˆG using Gaussian
2468
+ radial basis neural networks and specify explicit approximation rates.
2469
+ 5.1
2470
+ Universal Approximation by Neural Networks
2471
+ Regarding Theorem 6, we show that the set
2472
+ U :=
2473
+
2474
+ G
2475
+
2476
+ t,
2477
+
2478
+
2479
+ i=1
2480
+ uiei
2481
+
2482
+ (x) =
2483
+ n
2484
+
2485
+ i=1
2486
+ ψi(t, ηl(u1, . . . , un))ei(x)
2487
+ ����∥G(t, u)∥H ≤ R, where ψ ∈ N n, n, l ∈ N
2488
+
2489
+ satisfies every assumption of Theorem 6, where
2490
+ N n :=
2491
+
2492
+
2493
+ k=1
2494
+ N n
2495
+ k
2496
+ (27)
2497
+ and
2498
+ N n
2499
+ k :=
2500
+
2501
+ ψ(x) = Cθ(Ax + b)
2502
+ �� A ∈ Rk×n, b ∈ Rk, C ∈ Rn×k�
2503
+ denotes the set of all 1-layer artificial neural networks from Rn to Rn with k neurons, for a
2504
+ given non-polynomial, Lipschitz continuous activator function θ.
2505
+ To this end we recall the following classical universal approximation result by [Pin99]:
2506
+ Theorem 31. Let θ ∈ C(R), then we define for u = (u1, . . . , ud) ∈ Rd
2507
+ θ(u)i := θ(ui).
2508
+ (28)
2509
+ If θ is not polynomial, then for any n, m ∈ N, compact set K ⊂ Rn, h ∈ C(K, Rm) and ǫ > 0,
2510
+ there exists k ∈ N, A ∈ Rk×n, b ∈ Rk, C ∈ Rm×k, such that
2511
+ sup
2512
+ u∈K
2513
+ |h(u) − ψ(u)| < ǫ,
2514
+ (29)
2515
+ where ψ is the 1-layer artificial neural network
2516
+ ψ(u) := Cθ(Au + b).
2517
+ (30)
2518
+ Recall the finitely based approximation (7)
2519
+ ˆGh : [0, T] × H → Sh
2520
+ ˆGh(t, u) := Ph ˆG(t, Phu).
2521
+ Let Nn be the dimension of S 1
2522
+ n , e1, . . . , eNn be an orthonormal basis of S 1
2523
+ n and define
2524
+ gn : [0, T] × RNn → RNn
2525
+ gn
2526
+ i (t, u) := ⟨ ˆG(t,
2527
+ Nn
2528
+
2529
+ j=1
2530
+ ujej), ei⟩,
2531
+ i = 1, . . . , Nn.
2532
+ (31)
2533
+ 24
2534
+
2535
+ Since gn is continuous, there exist for any m ∈ N a 1-layer artificial neural network ψn,m :
2536
+ [0, T] × RNn → RNn, such that
2537
+ sup
2538
+ (t,u)∈[0,T]×BRNn (0,m)
2539
+ |gn(t, u) − ψn,m(t, u)| < R
2540
+ m.
2541
+ (32)
2542
+ If we consider for any m ∈ N the continuous function ηm : RNn → RNn
2543
+ ηm(x) =
2544
+
2545
+ x
2546
+ |x| ≤ m
2547
+ m x
2548
+ |x|
2549
+ |x| > m
2550
+ and define
2551
+ ˜ψn,m(t, u) := ψn,m(t, η(u)),
2552
+ then clearly ˜ψn,m = ψn,m on [0, T] × BRNn(0, m) and for any (t, u) ∈ [0, T] × BRNn(0, m)
2553
+ |ψn,m(t, u)| ≤ |gn(t, u)| + |ψn,m(t, u) − gn(t, u)|
2554
+ ≤ R + R
2555
+ m ≤
2556
+
2557
+ 1 + 1
2558
+ m
2559
+
2560
+ R,
2561
+ since
2562
+ |gn(t, u)| = ∥P 1
2563
+ n
2564
+ ˆG(t,
2565
+ Nn
2566
+
2567
+ j=1
2568
+ ujej)∥H ≤ ∥ ˆG(t,
2569
+ Nn
2570
+
2571
+ j=1
2572
+ ujej)∥H ≤ R.
2573
+ Furthermore, on [0, T] × BRNn(0, m)c we have
2574
+ | ˜ψn,m(t, u)| = |ψn,m(t, m u
2575
+ |u|)|
2576
+ ≤ |gn(t, m u
2577
+ |u|)| + |ψn,m(t, m u
2578
+ |u|) − gn(t, m u
2579
+ |u|)|
2580
+
2581
+
2582
+ 1 + 1
2583
+ m
2584
+
2585
+ R.
2586
+ Now let
2587
+ Gn,m(t, u) :=
2588
+
2589
+ 1 − 1
2590
+ m
2591
+ � Nn
2592
+
2593
+ i=1
2594
+ ˜ψn,m
2595
+ i
2596
+ (t, ⟨u, e1⟩H, . . . , ⟨u, en⟩H))ei.
2597
+ (33)
2598
+ Then
2599
+ ∥Gn,m(t, u)∥ =
2600
+
2601
+ 1 − 1
2602
+ m
2603
+
2604
+ | ˜ψn,m (t, ⟨u, e1⟩H, . . . , ⟨u, eNn⟩H) |
2605
+
2606
+
2607
+ 1 − 1
2608
+ m
2609
+ � �
2610
+ 1 + 1
2611
+ m
2612
+
2613
+ R ≤ R.
2614
+ Since the elements of N n
2615
+ k are Lipschitz continuous, so is Gn,m, in particular Gn,m ∈ U is an
2616
+ admissible control. Furthermore, (Gn,m)m∈N approximates Gn. Indeed, for any R > 0 and
2617
+ any ǫ > 0 there exists an M ∈ N, such that BH(0, R) ⊂ BH(0, m) and 2R
2618
+ m < ǫ for every
2619
+ 25
2620
+
2621
+ m ≥ M. Therefore, we have for any m ≥ M
2622
+ sup
2623
+ (t,u)∈[0,T]×BH(0,R)
2624
+ ∥Gn,m(t, u) − Gn(t, u)∥
2625
+
2626
+ sup
2627
+ (t,u)∈[0,T]×BH(0,m)
2628
+ ∥Gn,m(t, u) − Gn(t, u)∥
2629
+
2630
+ sup
2631
+ (t,u)∈[0,T]×BRNn (0,m)
2632
+ |
2633
+
2634
+ 1 − 1
2635
+ m
2636
+
2637
+ ψn,m(t, u) − gn(t, u)|
2638
+
2639
+ sup
2640
+ (t,u)∈[0,T]×BRNn (0,m)
2641
+
2642
+ 1 − 1
2643
+ m
2644
+
2645
+ |ψn,m(t, u) − gn(t, u)| + 1
2646
+ m|gn(t, u)|
2647
+ < 2R
2648
+ m < ǫ.
2649
+ 5.2
2650
+ Interpolation by radial basis functions
2651
+ In our second example we will interpolate the finitely based approximations by Gaussian
2652
+ radial basis function neural networks and define a suitable ansatz space of controls for the
2653
+ approximation that satisfies a uniform Lipschitz approximation property with respect to the
2654
+ optimal feedback ˆG. The main idea is to determine the optimal feedback at some mayor states
2655
+ (t1, x1), ..., (tN , xN) and interpolate afterwards. For some κ > 0 let
2656
+ Φ(x, y) := exp(−κ|x − y|2)
2657
+ denote the Gaussian kernel. Furthermore we define for O ⊆ Rd
2658
+ FΦ(O) = span{Φ(·, y) | y ∈ O}
2659
+ ∥·∥Φ,
2660
+ where ∥ · ∥Φ denotes the norm associated with the scalar product
2661
+
2662
+ N
2663
+
2664
+ i=1
2665
+ αiΦ(·, xj),
2666
+ M
2667
+
2668
+ j=1
2669
+ βjΦ(·, yj)⟩Φ :=
2670
+ N
2671
+
2672
+ i=1
2673
+ M
2674
+
2675
+ j=1
2676
+ αiβjΦ(xi, yj).
2677
+ Now we define the ’point evaluation’ map
2678
+ R : FΦ(O) → C(O), R(f)(x) := ⟨f, Φ(·, x)⟩Φ
2679
+ to identify abstract elements of FΦ(O) with functions and introduce the corresponding native
2680
+ Hilbert space of Φ by
2681
+ NΦ(O) := R(FΦ(O)),
2682
+ with the inner product
2683
+ ⟨f1, f2⟩NΦ(O) := ⟨R−1f1, R−1f2⟩Φ.
2684
+ If O = Rd, the native space is given by
2685
+ NΦ(Rd) = {f ∈ L2(Rd) ∩ C(Rd) | ˆf/ˆΦ1/2 ∈ L2(Rd)},
2686
+ with the inner product
2687
+ ⟨f1, f2⟩NΦ(Rd) = (2π)−d/2⟨ ˆf1/ˆΦ1/2, ˆf2/ˆΦ1/2⟩L2(Rd),
2688
+ 26
2689
+
2690
+ where ˆf denotes the analytic Fourier transform of f.
2691
+ For a given function g ∈ NΦ(O) we will consider approximations of the type
2692
+ sg,X(x) :=
2693
+ K
2694
+
2695
+ k=1
2696
+ αkΦ(x, xk),
2697
+ (34)
2698
+ for a discrete set X = {x1, ..., xK} ⊆ O and some α1, ..., αK ∈ R, such that
2699
+ sg,X(xk) = g(xk),
2700
+ (35)
2701
+ for k = 1, ..., K.
2702
+ Lemma 32. Let g ∈ NΦ(Rd), X = {x1, ..., xK} ⊆ O ⊆ Rd and sg,X be of the form (34),
2703
+ satisfying (35) for g|O ∈ NΦ(O).
2704
+ Then the natural extension of sg,X to Rd is Lipschitz
2705
+ continuous with Lipschitz constant given by 2κ∥g∥2
2706
+ NΦ(Rd).
2707
+ Proof. We first observe that for any x ∈ Rd, using R(sg,X) = sg,X and R(Φ(·, x)) = Φ(·x),
2708
+ sg,X(x) = ⟨sg,X, Φ(·, x)⟩Φ = ⟨sg,X, Φ(·, x)⟩NΦ(Rd)
2709
+ and therefore for any i = 1, ..., d
2710
+ ∂isg,X(x) = ⟨sg,X, ∂iΦ(·, x)⟩NΦ(Rd).
2711
+ Using the Cauchy-Schwarz inequality we get
2712
+ |∂isg,X(x)|2 ≤ ∥sg,X∥2
2713
+ Φ∥∂iΦ(·, x)∥2
2714
+ NΦ(Rd).
2715
+ Now
2716
+ ∥∂iΦ(·, x)∥2
2717
+ NΦ(Rd) = ∂1
2718
+ i ∂2
2719
+ i Φ(y, y) = 2κ.
2720
+ Furthermore we have
2721
+ ∥sg,X∥2
2722
+ Φ ≤ ∥g∥2
2723
+ NΦ(O) ≤ ∥g∥2
2724
+ NΦ(Rd).
2725
+ This concludes the proof of this lemma.
2726
+ In the following we define for X = {x1, . . . , xK} ⊆ O
2727
+ hX,O := sup
2728
+ x∈O
2729
+ min
2730
+ 1≤j≤K |x − xj|2.
2731
+ Then we consider the following two results from [Wen04]:
2732
+ Lemma 33. Let O ⊆ BR(x0), for some R > 0 and X = {x1, ..., xK} ⊆ O be quasi uniform
2733
+ (q.u.) with respect to cqu > 0, i.e.
2734
+ qX ≤ hX,O ≤ cquqX,
2735
+ where qX := 1
2736
+ 2 mini̸=j |xi − xj|2. Then it holds
2737
+ hX,O ≤ 2RcquK−1/d.
2738
+ 27
2739
+
2740
+ Theorem 34. Let f ∈ NΦ(O) and sf,X denote its interpolant based on the quasi uniform set
2741
+ X = {x1, ..., xK} ⊆ O. Then there exists a constant C > 0, such that
2742
+ sup
2743
+ x∈O
2744
+ |f(x) − sf,X(x)| ≤ Clhl
2745
+ X,O∥f∥NΦ(O),
2746
+ for any l ∈ N.
2747
+ We now apply the above result to the approximation of the optimal feedback ˆG with
2748
+ Gaussian radial basis networks. Therefore we again recall the finitely based approximation
2749
+ (7)
2750
+ ˆGh : [0, T] × H → Sh
2751
+ ˆGh(t, u) := Ph ˆG(t, Phu).
2752
+ Let Nn be the dimension of S 1
2753
+ n , e1, . . . , eNn be an orthonormal basis of S 1
2754
+ n and define
2755
+ gn : [0, T] × RNn → RNn
2756
+ gn
2757
+ i (t, u) := ⟨ ˆG(t,
2758
+ Nn
2759
+
2760
+ j=1
2761
+ ujej), ei⟩,
2762
+ i = 1, . . . , Nn.
2763
+ (36)
2764
+ In the following we assume that the functions gn
2765
+ i , i = 1, . . . Nn are elements of NΦ([0, T]×RNn).
2766
+ Then
2767
+ Un,m := {G(t,
2768
+
2769
+
2770
+ i=1
2771
+ uiei)(x) =
2772
+ Nh
2773
+
2774
+ i=1
2775
+ si(t, (u1, ..., uNn))ei(x)|si ∈ N m,n}
2776
+ where
2777
+ N m,n := {s(t, x) =
2778
+ m
2779
+
2780
+ k=1
2781
+ αkΦ((t, x), (tk, xk))|((t1, x1), ..., (tm, xm)) ∈ BRNn(0, m1/2Nn) × [0, T] q.u.},
2782
+ satisfies the uniform Lipschitz approximation property with respect to ˆG of order 1
2783
+ n. Indeed,
2784
+ let l ∈ N, then for any R > 0 there exists an M ∈ N, such that BRNn(0, R) ⊆ BRNn(0, m1/(2Nn))
2785
+ for all m ≥ M. Furthermore by Theorem 34 and Lemma 33 there exists for all m ≥ M an
2786
+ element Gn,m ∈ Un,m,
2787
+ Gn,m(t, u) =
2788
+ Nn
2789
+
2790
+ i=1
2791
+ sn
2792
+ i (t, (u1, ..., uNn))ei,
2793
+ for some sn(t, u) := (sn
2794
+ 1(t, u), ..., sn
2795
+ Nn(t, u)) , such that sn
2796
+ i satisfies (35) for gn
2797
+ i , such that
2798
+ sup
2799
+ (t,u)∈[0,T]×BH(0,R)
2800
+ ∥Gn,m(t, u) − ˆGn(t, u)∥H
2801
+
2802
+ sup
2803
+ (t,u)∈[0,T]×BRNn (0,R)
2804
+ |sn(t, u) − gn(t, u)|
2805
+
2806
+ sup
2807
+ (t,u)∈[0,T]×BRNn (0,m1/(2n))
2808
+ |sn(t, u) − gn(t, u)|
2809
+ ≤ Clcqum−l/(2Nn)
2810
+ 28
2811
+
2812
+ for all m ≥ M. Due to Lemma 32 any Gm,n has Lipschitz constant independent of m and
2813
+ since
2814
+ ǫn,R
2815
+ m
2816
+ =
2817
+ sup
2818
+ (t,u)∈[0,T]×BH(0,R)
2819
+ ∥Gn,m(t, u) − ˆGn(t, u)∥H
2820
+ ≤ Clcqum−l/(2Nn) → 0,
2821
+ (Um,n)m∈N satisfies the Lipschitz approximation property with respect to ˆG of order 1
2822
+ n.
2823
+ References
2824
+ [BEJ19] C. Beck, W. E, and A. Jentzen, Machine learning approximation algorithms for high-dimensional
2825
+ fully nonlinear partial differential equations and second-order backward stochastic differential equa-
2826
+ tions, J. Nonlinear Sci. 29 (2019), 1563–1619.
2827
+ [BEKT13a] R. Buchholz, H. Engel, E. Kammann, and F. Tr¨oltzsch, Erratum to: On the optimal control of the
2828
+ schl¨ogl-model, Comput. Optim. Appl. 56 (2013), 187–188.
2829
+ [BEKT13b]
2830
+ , On the optimal control of the schl¨ogl-model, Comput. Optim. Appl. 56 (2013), 153–185.
2831
+ [CDP18] F. Cordoni and L. Di Persio, Optimal control for the stochastic FitzHugh-Nagumo model with
2832
+ recovery variable, Evol. Eq. Control Theory 7 (2018), 571–585.
2833
+ [CL21] R. Carmona and M. Lauri`ere, Convergence analysis of machine learning algorithms for the nu-
2834
+ merical solution of mean field control and games i: The ergodic case, SIAM Journal on Numerical
2835
+ Analysis 59 (2021), no. 3, 1455–1485 (English (US)).
2836
+ [CL22] R. Carmona and M. Lauri`ere, Convergence analysis of machine learning algorithms for the nu-
2837
+ merical solution of mean field control and games: II—the finite horizon case, Ann. Appl. Probab.
2838
+ 32 (2022), 4065–4105.
2839
+ [DKK21] S. Dolgov, D. Kalise, and K. K. Kunisch, Tensor decomposition methods for high-dimensional
2840
+ Hamilton-Jacobi-Bellman equations, SIAM J. Sci. Comput. 43 (2021), A1625–A1650.
2841
+ [DM13] K. Du and Q. Meng, A maximum principle for optimal control of stochastic evolution equations,
2842
+ SIAM J. Control Optim. 51 (2013), 4343–4362.
2843
+ [DMPV19] T. Dunst, A. K. Majee, A. Prohl, and G. Vallet, On stochastic optimal control in ferromagnetism,
2844
+ Arch. Ration. Mech. Anal. 233 (2019), 1383–1440.
2845
+ [DP16] T. Dunst and A. Prohl, The forward-backward stochastic heat equation: Numerical analysis and
2846
+ simulation, SIAM J. Sci. Comput. 38 (2016), A2725–A2755.
2847
+ [DPZ14] G. Da Prato and J. Zabczyk, Stochastic equations in infinite dimensions, Cambridge University
2848
+ Press, 2014.
2849
+ [EHJ17] W. E, J. Han, and A. Jentzen, Deep learning-based numerical methods for high-dimensional
2850
+ parabolic partial differential equations and backward stochastic differential equations, Commun.
2851
+ Math. Stat. 5 (2017), 349–380.
2852
+ [FG95] F. Flandoli and D. Gatarek, Martingale and stationary solutions for stochastic Navier-Stokes
2853
+ equations, Probab. Theory Related Fields 102 (1995), no. 3, 367–391. MR1339739
2854
+ [FG´S17a] G. Fabbri, F. Gozzi, and A. ´Swiech, Stochastic optimal control in infinite dimension, Springer,
2855
+ 2017.
2856
+ [FGS17b] G. Fabbri, F. Gozzi, and A. Swiech, Stochastic optimal control in infinite dimension : dynamic
2857
+ programming and hjb equations, 2017.
2858
+ [FHT13] M. Fuhrman, Y. Hu, and G. Tessitore, Stochastic maximum principle for optimal control of SPDEs,
2859
+ Appl. Math. Optim. 68 (2013Oct), 181–217.
2860
+ [FHT18]
2861
+ , Stochastic maximum principle for optimal control of partial differential equations driven
2862
+ by white noise, Stoch. Partial Differ. Equ. Anal. Comput. 6 (2018), 255–285.
2863
+ [FO16] M. Fuhrman and C. Orrieri, Stochastic maximum principle for optimal control of a class of non-
2864
+ linear SPDEs with dissipative drift, SIAM J. Control Optim. 54 (2016), 341–371.
2865
+ [FZ20] H. Frankowska and X. Zhang, Necessary conditions for stochastic optimal control problems in
2866
+ infinite dimensions, Stochastic Process. Appl. 130 (2020), 4081–4103.
2867
+ 29
2868
+
2869
+ [GKM18] A. Gorodetsky, S. Karaman, and Y. Marzouk, High-dimensional stochastic optimal control using
2870
+ continuous tensor decompositions, Int. J. Robot. Res. 37 (2018), 340–377.
2871
+ [HPUU09] M. Hinze, R. Pinnau, M. Ulbrich, and S. Ulbrich, Optimization with PDE constraints, Springer,
2872
+ 2009.
2873
+ [KK18] D. Kalise and K. Kunisch, Polynomial approximation of high-dimensional Hamilton-Jacobi-
2874
+ Bellman equations and applications to feedback control of semilinear parabolic PDEs, SIAM J.
2875
+ Sci. Comput. 40 (2018), A629–A652.
2876
+ [KL12] R. Kruse and S. Larsson, Optimal regularity for semilinear stochastic partial differential equations
2877
+ with multiplicative noise, Electronic Journal of Probability 17 (2012), 1–19.
2878
+ [KLL1003] M. Kov´acs, S. Larsson, and F. Lindgren, Strong convergence of the finite element method with trun-
2879
+ cated noise for semilinear parabolic stochastic equations with additive noise, Numerical Algorithms
2880
+ 53 (201003), 309–320.
2881
+ [Kru1403] R. Kruse, Optimal error estimates of galerkin finite element methods for stochastic partial differ-
2882
+ ential equations with multiplicative noise, IMA Journal of Numerical Analysis (201403).
2883
+ [LR15] W. Liu and M. R¨ockner, Stochastic partial differential equations: An introduction, Springer, 2015.
2884
+ [LY95] X. Li and J. Yong, Optimal control theory for infinite dimensional systems, Birkh¨auser, Boston,
2885
+ MA, 1995.
2886
+ [LZ14] Q. L¨u and X. Zhang, General Pontryagin-type stochastic maximum principle and backward stochas-
2887
+ tic evolution equations in infinite dimensions, Springer, 2014.
2888
+ [LZ15]
2889
+ , Transposition method for backward stochastic evolution equations revisited, and its appli-
2890
+ cation, Math. Control Relat. Fields 5 (2015), 529–555.
2891
+ [LZ18]
2892
+ , Operator-valued backward stochastic Lyapunov equations in infinite dimensions, and its
2893
+ application, Math. Control Relat. Fields 8 (2018), 337–381.
2894
+ [NR21] N. N¨usken and L. Richter, Solving high-dimensional Hamilton-Jacobi-Bellman PDEs using neural
2895
+ networks: perspectives from the theory of controlled diffusions and measures on path space, Partial
2896
+ Differ. Equ. Appl. 2 (2021).
2897
+ [OSS22] M. Oster, L. Sallandt, and R. Schneider, Approximating optimal feedback controllers of finite
2898
+ horizon control problems using hierarchical tensor formats, SIAM J. Sci. Comput. 44 (2022).
2899
+ [Pin99] A. Pinkus, Approximation theory of the mlp model in neural networks, Acta Numerica (1999).
2900
+ [PW21] Prohl, Andreas and Wang, Yanqing, Strong rates of convergence for a space-time discretization of
2901
+ the backward stochastic heat equation, and of a linear-quadratic control problem for the stochastic
2902
+ heat equation*, ESAIM: COCV 27 (2021), 54.
2903
+ [RLM+16] C. Ryll, J. L¨ober, S. Martens, H. Engel, and F. Tr¨oltzsch, Analytical, optimal, and sparse optimal
2904
+ control of traveling wave solutions to reaction-diffusion systems, Control of self-organizing nonlinear
2905
+ systems, 2016, pp. 189–210.
2906
+ [RSN21] L. Richter, L. Sallandt, and N. N¨usken, Solving high-dimensional parabolic pdes using the tensor
2907
+ train format, 2021.
2908
+ [RSZ22] M. R¨ockner, S. Shang, and T. Zhang, Well-posedness of stochastic partial differential equations
2909
+ with fully local monotone coefficients, arXiv, 2022.
2910
+ [Ryl17] C. Ryll, Optimal control of patterns in some reaction-diffusion-systems, Doctoral Thesis, Berlin,
2911
+ Germany, 2017.
2912
+ [SV23] W. Stannat and A. Vogler, Approximation of optimal feedback controls for stochastic reaction-
2913
+ diffusion equations, In preparation. (2023+).
2914
+ [SVW23] W. Stannat, V. Vogler, and L. Wessels, Neural network approximation of optimal controls for
2915
+ stochastic reaction-diffusion equations, 2023+.
2916
+ [SW20] W. Stannat and L. Wessels, Deterministic control of stochastic reaction-diffusion equations, Evo-
2917
+ lution Equations & Control Theory (2020).
2918
+ [SW21a] W. Stannat and L. Wessels, Deterministic control of stochastic reaction-diffusion equations, Evol.
2919
+ Equ. Control Theory 10 (2021), 701–722.
2920
+ [SW21b]
2921
+ , Peng’s maximum principle for stochastic partial differential equations, SIAM J. Control
2922
+ Optim. 59 (2021), 3552–3573.
2923
+ [SW22]
2924
+ , Necessary and sufficient conditions for optimal control of semilinear stochastic partial
2925
+ differential equations, 2022.
2926
+ 30
2927
+
2928
+ [Tr¨o10] F. Tr¨oltzsch, Optimal control of partial differential equations, Graduate Studies in Mathematics,
2929
+ American Mathematical Society, Providence, RI, 2010.
2930
+ [Tud90] C. Tudor, Quadratic control for stochastic systems defined by evolution operators and square inte-
2931
+ grable martingales, Math. Nachr. 147 (1990), 205–218.
2932
+ [Wen04] H. Wendland, Scattered data approximation, Cambridge Monographs on Applied and Computa-
2933
+ tional Mathematics, Cambridge University Press, 2004.
2934
+ [Wen98]
2935
+ , Error estimates for interpolation by compactly supported radial basis functions of minimal
2936
+ degree, Journal of Approximation Theory 93 (1998), no. 2, 258–272.
2937
+ [Wes22] L. Wessels, Optimal control of stochastic reaction-diffusion equations, Doctoral Thesis, Berlin,
2938
+ Germany, 2022.
2939
+ 31
2940
+
59FKT4oBgHgl3EQf-y48/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dE2T4oBgHgl3EQfPQbU/content/tmp_files/2301.03758v1.pdf.txt ADDED
@@ -0,0 +1,3362 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Sequential Fair Resource Allocation under a Markov Decision Process Framework
2
+ Parisa Hassanzadeh1 , Eleonora Kreaˇci´c1 , Sihan Zeng2 , Yuchen Xiao1 and Sumitra Ganesh1
3
+ 1J.P. Morgan AI Research, 2Georgia Institute of Technology
4
+ {parisa.hassanzadeh, eleonora.kreacic, yuchen.xiao, sumitra.ganesh}@jpmorgan.com,
5
+ [email protected]@jpmorgan.com
6
+ Abstract
7
+ We study the sequential decision-making problem
8
+ of allocating a limited resource to agents that re-
9
+ veal their stochastic demands on arrival over a fi-
10
+ nite horizon.
11
+ Our goal is to design fair alloca-
12
+ tion algorithms that exhaust the available resource
13
+ budget. This is challenging in sequential settings
14
+ where information on future demands is not avail-
15
+ able at the time of decision-making. We formu-
16
+ late the problem as a discrete time Markov deci-
17
+ sion process (MDP). We propose a new algorithm,
18
+ SAFFE, that makes fair allocations with respect to
19
+ the entire demands revealed over the horizon by ac-
20
+ counting for expected future demands at each ar-
21
+ rival time. The algorithm introduces regularization
22
+ which enables the prioritization of current revealed
23
+ demands over future potential demands depending
24
+ on the uncertainty in agents’ future demands. Us-
25
+ ing the MDP formulation, we show that SAFFE
26
+ optimizes allocations based on an upper bound on
27
+ the Nash Social Welfare fairness objective, and we
28
+ bound its gap to optimality with the use of concen-
29
+ tration bounds on total future demands. Using syn-
30
+ thetic and real data, we compare the performance
31
+ of SAFFE against existing approaches and a re-
32
+ inforcement learning policy trained on the MDP.
33
+ We show that SAFFE leads to more fair and effi-
34
+ cient allocations and achieves close-to-optimal per-
35
+ formance in settings with dense arrivals.
36
+ 1
37
+ Introduction
38
+ The problem of multi-agent resource allocation arises in nu-
39
+ merous disciplines including economics [Cohen et al., 1965],
40
+ power system optimization [Yi et al., 2016; Nair et al.,
41
+ 2018], and cloud computing [Balasubramanian et al., 2007;
42
+ Abid et al., 2020]. It comes in various flavors depending on
43
+ the nature of resources, the agents’ behavior, the timing of al-
44
+ location decisions, and the overall objective of the allocation
45
+ process. A common element shared by various settings is the
46
+ existence of a limited resource that needs to be distributed to
47
+ various agents based on their reported requests.
48
+ There are various objectives that one might wish to opti-
49
+ mize in the context of resource allocation. Efficiency max-
50
+ imization only aims at reducing the leftover resource, while
51
+ other objectives combine efficiency with various notions of
52
+ fairness. Among different fairness metrics, the Nash Social
53
+ Welfare (NSW) is a well-known objective defined as the ge-
54
+ ometric mean of the agents’ “satisfaction” with their allo-
55
+ cation. In the offline setting where we observe all requests
56
+ prior to making an allocation decision, the NSW enjoys a
57
+ few favorable properties including being Pareto-efficient (for
58
+ any other allocation there would be at least one agent who is
59
+ worse off compared to the current one), envy-free (no agent
60
+ prefers another agent’s allocation), and proportionally fair
61
+ (every agent gets their fair share of the resource), and thus
62
+ exhausts the total budget under a limited resource [Varian,
63
+ 1973].
64
+ In this work, we study the allocation of divisible resources
65
+ to truthful agents with the aim of optimizing the NSW. We
66
+ consider the much more challenging online (or sequential)
67
+ setting where the agents place requests in a sequential manner
68
+ and allocation decisions have to be made instantaneously. As
69
+ the decision cannot be modified once it is made, every allo-
70
+ cation affects all future allocations which leads to a compro-
71
+ mise between fairness and efficiency. Intuitively, to achieve
72
+ fairness we need to reserve the resource for anticipated future
73
+ agents, which can lead to wasted resources if the expected
74
+ future agents do not arrive.
75
+ Online allocation algorithms are commonly evaluated in
76
+ comparison to their offline (or hindsight) counterpart [Gal-
77
+ lego et al., 2015; Sinclair et al., 2020; Sinclair et al., 2022].
78
+ However, there is no standard notion of fairness in the sequen-
79
+ tial setting, as it may be impossible to satisfy all of the favor-
80
+ able fair properties simultaneously[Sinclair et al., 2022]. We
81
+ aim to fill this gap on the formulation and to design efficient
82
+ and reliable algorithms for the online allocation problem. Our
83
+ contributions are as follows.
84
+ Main Contributions
85
+ • We formulate a notion of fair allocations in sequential set-
86
+ tings where agents can submit multiple demands over the
87
+ horizon.
88
+ • We formulate the problem as a Markov decision process
89
+ (MDP), and design the reward function so that its cumu-
90
+ lative rewards matches our fairness objective. This offers
91
+ us a tool to quantitatively evaluate the performance of al-
92
+ location policies.
93
+ arXiv:2301.03758v1 [cs.LG] 10 Jan 2023
94
+
95
+ • We introduce SAFFE, a novel intuitive sequential algo-
96
+ rithm that makes close-to-optimal allocations and is easy
97
+ to implement. We further introduce SAFFE-D, character-
98
+ ized by a tunable parameter that balances efficiency and
99
+ fairness. The parameter can be tuned with the use of con-
100
+ centration bounds around expected future demands.
101
+ • We provide theoretical upper bounds on the sub-
102
+ optimality gap using concentration bounds around the ex-
103
+ pected demand, and illustrate the close-to-optimal perfor-
104
+ mance of SAFFE-D in different settings using numerical
105
+ simulations and real data.
106
+ 2
107
+ Problem Formulation
108
+ We consider a supplier that has a divisible resource with a
109
+ limited budget size B, and N agents that arrive sequentially
110
+ over T time steps requesting (possibly fractional) units of the
111
+ resource. At time t ∈ {1, . . . , T}, agent i ∈ {1, . . . , N}
112
+ arrives and reveals its demand Xt
113
+ i ∈ R sampled from dis-
114
+ tribution PXt
115
+ i |X1
116
+ i ,...,Xt−1
117
+ i
118
+ .
119
+ We assume that each agent has
120
+ at least one demand over the horizon T. The supplier ob-
121
+ serves demands Xt = (Xt
122
+ 1, . . . , Xt
123
+ N), and makes an allo-
124
+ cation At = (At
125
+ 1, . . . , At
126
+ N), where At
127
+ i ∈ R≥0 denotes the
128
+ resource amount allocated to agent i. We assume that the al-
129
+ locations are immediately taken by the agents and removed
130
+ from the inventory. We also assume that the setting is re-
131
+ peated, i.e., after T time steps, a new budget is drawn and the
132
+ next allocation round of T time steps starts.
133
+ Agent i has a utility function u(Ai, Xi), representing its
134
+ satisfaction with the allocation Ai = (A1
135
+ i , . . . , AT
136
+ i ) given
137
+ its (latent) demands. The utility function is a non-decreasing
138
+ non-negative concave function. In this work, we consider the
139
+ following utility function, where an agent’s utility linearly in-
140
+ creases with its total allocation up to its total request
141
+ u(Ai, Xi) =
142
+ T
143
+
144
+ t=1
145
+ min
146
+
147
+ At
148
+ i, Xt
149
+ i
150
+
151
+ .
152
+ (1)
153
+ An agent with the utility function in (1) only values an allo-
154
+ cation in the time step it requested the resource, and not in
155
+ earlier or later steps, which is suitable in settings where the
156
+ allocation process is time sensitive and the supplier is not able
157
+ to delay the decision-making outside of the current time step.
158
+ If all agent demands X1, . . . , XN are known to the supplier
159
+ at the time of decision-making, they can be used for deter-
160
+ mining the allocations. This setting is often referred to as
161
+ offline. However, in the online or sequential setting, the agent
162
+ demands are gradually revealed over time, such that the sup-
163
+ plier only learns about Xt
164
+ 1, . . . , Xt
165
+ N at time t.
166
+ Notation
167
+ (x)+ = max{x, 0}. For vectors X and Y, we
168
+ use X ≥ Y to denote Xi ≥ Yi for each i. 0 denotes a zero
169
+ vector. N(µ, σ2) denotes the Normal distribution with mean
170
+ µ and variance σ2.
171
+ 2.1
172
+ Fairness in Allocation Problems
173
+ The supplier aims to allocate the resource efficiently, i.e.,
174
+ with minimal leftover at the end of horizon T, and in a
175
+ fair manner maximizing the NSW. The NSW is defined as
176
+ �N
177
+ i=1 u(Ai, Xi)wi, where wi ∈ R+ reflects the weight as-
178
+ signed to agent i by the supplier. The NSW is a balanced
179
+ compromise between the utilitarian welfare objective, which
180
+ maximizes the utility of a larger number of agents, and the
181
+ egalitarian welfare objective, which maximizes the utility of
182
+ the worst-off agent. Since
183
+ arg max
184
+ Ai
185
+ N
186
+
187
+ i=1
188
+ u(Ai, Xi)wi = arg max
189
+ Ai
190
+ N
191
+
192
+ i=1
193
+ wi log u(Ai, Xi),
194
+ (2)
195
+ the logarithm of NSW is often used as the objective function
196
+ in allocation problems, such as in the Eisenberg-Gale pro-
197
+ gram [Eisenberg and Gale, 1959]. We refer to this as the
198
+ log-NSW objective.
199
+ In the sequential setting, it is not guaranteed that there
200
+ always exists an allocation that is simultaneously Pareto-
201
+ efficient, envy-free, and proportional [Sinclair et al., 2020,
202
+ Lemma 2.3]. Motivated by the properties of the NSW ob-
203
+ jective in the offline setting, and the fact that our repeated
204
+ setting can be viewed as multiple draws of the offline setting,
205
+ we propose a modified NSW objective for the sequential set-
206
+ ting. Our goal in the sequential setting is to find an allocation
207
+ that maximizes the log-NSW in expectation. Specifically,
208
+ arg max
209
+ Ai
210
+ N
211
+
212
+ i=1
213
+ wiEXi
214
+
215
+ log u(Ai, Xi)
216
+
217
+ .
218
+ (3)
219
+ With the goal of measuring the performance of an allo-
220
+ cation in the sequential setting, [Sinclair et al., 2020] intro-
221
+ duces approximate fairness metrics ∆Amax and ∆Amean. Let
222
+ Aonline
223
+ i
224
+ denote the allocation vector of agent i given by an
225
+ online algorithm subject to latent demands, and let Ahindsight
226
+ i
227
+ denote the allocation vector in hindsight after all demands
228
+ are revealed, defined as (14) in Sec. 4. The expected dif-
229
+ ference between the overall allocations for each agents can
230
+ be used to measure the fairness of the online algorithm. Let
231
+ ∆Ai :=
232
+ ��� �T
233
+ t=1 At,hindsight
234
+ i
235
+ − �T
236
+ t=1 At,online
237
+ i
238
+ ���. Then,
239
+ ∆Amax = E
240
+
241
+ max
242
+ i
243
+ ∆Ai
244
+
245
+ , ∆Amean = 1
246
+ N
247
+ N
248
+
249
+ i=1
250
+ E[∆Ai], (4)
251
+ are concerned with the worst-off agent and average agent in
252
+ terms of cumulative allocations in hindsight, respectively1.
253
+ While our optimization objective is not to minimize ∆Amax
254
+ or ∆Amean, we use them as metrics to evaluate the fairness of
255
+ online allocation algorithms in the experiments in Sec. 7.
256
+ 3
257
+ Markov Decision Process Formulation
258
+ Determining the optimal allocations under the NSW objec-
259
+ tive is a sequential decision-making problem as the alloca-
260
+ tion in one step affects the budget and allocations in future
261
+ 1∆A is defined for the additive utility function in (1), and may
262
+ need to be redefined for alternative utilities.
263
+
264
+ steps. We formulate the problem as a finite-horizon total-
265
+ reward Markov Decision Process (MDP) modeled as a tu-
266
+ ple < {St, At, Pt, Rt}t=1,...,T >.
267
+ St denotes the under-
268
+ lying time-dependent state space, At is the action space,
269
+ Pt : St × At × St+1 → R≥0 describes the state transi-
270
+ tion dynamics conditioned upon the previous state and ac-
271
+ tion, Rt : St × At → R≥0 is a non-negative reward func-
272
+ tion, and T is the horizon over which the resource is allo-
273
+ cated. The goal of the supplier is to find an allocation policy
274
+ π = {π1, . . . , πT | πt : St → At} mapping the state to
275
+ an action, in order to maximize the expected sum of rewards
276
+ E[�T
277
+ t=1 Rt(st, πt(st))]. Next, we describe the components
278
+ of the MDP in details.
279
+ State Space
280
+ The state space St is time-dependent, and the
281
+ state size increases with time step t since the state captures
282
+ the past demand and allocation information. Specifically, the
283
+ state at step t is defined as st = (X1:t, A1:t−1, Bt), where
284
+ X1:t := (X1, . . . , Xt), A1:t := (A1, . . . , At), and
285
+ Bt =
286
+
287
+ Bt−1 − �N
288
+ i=1 At−1
289
+ i
290
+ t ≥ 1
291
+ B
292
+ t = 1
293
+ (5)
294
+ Action Space
295
+ The actions space is state and time-
296
+ dependent. For any st = (X1:t, A1:t−1, Bt) ∈ St, we have
297
+ At = {At ∈ RN :
298
+ N
299
+
300
+ i=1
301
+ At
302
+ i ≤ Bt}
303
+ (6)
304
+ The state and action space are both continuous and therefore
305
+ infinitely large. However, At is a compact polytope for any
306
+ st ∈ St, and St is compact if the requests are bounded.
307
+ State Transition Function
308
+ Given state s ∈ St and action
309
+ a ∈ At, the system transitions to the next state s′ ∈ St+1
310
+ with probability
311
+ P(s, a, s′) = Prob(st+1 = s′ | st = s, at = a),
312
+ (7)
313
+ where Xt+1
314
+ i
315
+ ∼ PXt+1
316
+ i
317
+ |X1
318
+ i ,...,Xt
319
+ i .
320
+ Reward Function
321
+ The reward at time step t ∈ {1, . . . , T},
322
+ is defined as follows
323
+ Rt(st, πt(st)) =
324
+ N
325
+
326
+ i=1
327
+ 1{Xt
328
+ i > 0} . wi(U t
329
+ i − U t−1
330
+ i
331
+ ),
332
+ (8)
333
+ where
334
+ U t
335
+ i = log
336
+
337
+ t
338
+
339
+ τ=1
340
+ min{Aτ
341
+ i , Xτ
342
+ i } + ϵ
343
+
344
+ , t ∈ {1, . . . , T}, (9)
345
+ U 0
346
+ i = 0, and ϵ is a small value added for to ensure values are
347
+ within the domain of the log function2. The indicator function
348
+ 1{ �
349
+ Xt
350
+ i > 0} ensures that we only account for the agents with
351
+ a demand at time t. Then, the expected sum of rewards over
352
+ the entire horizon T is equivalent to the expected log-NSW
353
+ objective defined in (3) for ϵ → 0.
354
+ 2For ϵ ≪ 1, this will lead to a maximum error of ϵ for x ≥ 1.
355
+ At time t, with state st ∈ St and action (allocation)
356
+ At ∈ At, the optimal Q-values satisfy the Bellman optimal-
357
+ ity equation [Bellman, 1966]:
358
+ Qt(st, At) = Rt(st, At) + E
359
+
360
+ max
361
+ At+1∈At+1
362
+ Qt+1(st+1, At+1)
363
+
364
+ .
365
+ (10)
366
+ We denote the optimal policy corresponding to Eq. (10) by
367
+ π⋆
368
+ t . Then, the optimal allocation is the solution to
369
+ arg max
370
+ At Qt(st, At).
371
+ (11)
372
+ We show in Appendix A that an optimal policy exists for
373
+ the MDP, and it can be derived by recursively solving (11)
374
+ backward in time.
375
+ This quickly becomes computationally
376
+ intractable, which motivates us to find alternative solutions
377
+ that trade-off sub-optimality for computational efficiency. In
378
+ Sec. 5, we introduce a heuristic algorithm that uses estimates
379
+ of future demands to determine the allocations, and we dis-
380
+ cuss a learning-based approach in Sec. 7.5.
381
+ 4
382
+ Offline (Hindsight) Setting
383
+ If the supplier could postpone the decision-making till the end
384
+ of the horizon T, it would have perfect knowledge of all de-
385
+ mands X1, . . . , XT . Let �
386
+ Xi = �T
387
+ τ=1 Xτ
388
+ i denote the total
389
+ demands of agent i. Then, the supplier solves the following
390
+ convex program, referred to as the Eisenberg-Gale program
391
+ [Eisenberg, 1961], to maximize the NSW objective in (3) for
392
+ allocations �A = ( �A1, . . . , �AN),
393
+ max
394
+
395
+ A≥0
396
+ N
397
+
398
+ i=1
399
+ wi log
400
+
401
+ u( �Ai, �
402
+ Xi)
403
+
404
+ s.t.
405
+ N
406
+
407
+ i=1
408
+ �Ai ≤ B.
409
+ (12)
410
+ While the optimal solution to (12) may not be achievable in
411
+ the sequential setting, it provides an upper bound on the log-
412
+ NSW achieved by any online algorithm, and serves as a base-
413
+ line for comparison. With the utility function in Eq. (1), allo-
414
+ cating resources beyond the agent’s request does not increase
415
+ the utility. Therefore, solving (12) is equivalent to the follow-
416
+ ing
417
+ max
418
+
419
+ A
420
+ N
421
+
422
+ i=1
423
+ wi log( �Ai)
424
+ s.t. 0 ≤ �Ai ≤ �
425
+ Xi, ∀i
426
+ N
427
+
428
+ i=1
429
+ �Ai ≤ B.
430
+ (13)
431
+ Then, any distribution of agent i’s allocation �Ai across the T
432
+ time steps that satisfies the demand constraint at each step,
433
+ would be an optimal allocation in hindsight Ahindsight
434
+ i
435
+ , i.e.,
436
+ Ahindsight
437
+ i
438
+
439
+
440
+ (A1
441
+ i , . . . , AT
442
+ i ) : 0 ≤ At
443
+ i ≤ Xt
444
+ i, ∀t,
445
+ T
446
+
447
+ τ=1
448
+ At
449
+ i = �Ai
450
+
451
+ .
452
+ (14)
453
+
454
+ The optimal solution to (13) takes the form
455
+ �A⋆
456
+ i
457
+ =
458
+ min{ �
459
+ Xi, µ}, where µ is a function of budget B and demands
460
+ �X such that �N
461
+ i=1 �Ai = B. The solution can be efficiently
462
+ derived by the water-filling algorithm in Algorithm 1, and the
463
+ threshold µ can be interpreted as the water-level shown in
464
+ Fig. 1a.
465
+ (a)
466
+ (b)
467
+ Figure 1: Water-filling solution for equal unit weights: Each bar
468
+ shows the demands or allocations of an agent. (a) In hindsight, the
469
+ resource is allocated using water-level µ determined such that the
470
+ total allocations are equal to the budget size. (b) In the sequential
471
+ setting, at time t, the cumulative prior allocations and total expected
472
+ future demands are accounted for when determining water-level µt.
473
+ Algorithm 1 Water-filling algorithm with weights for solving
474
+ (13)
475
+ 1: Input: number of agents N, resource budget B, demand
476
+ vector �X ∈ RN, weight vector w ∈ RN
477
+ 2: Output: allocation vector �A ∈ RN
478
+ 3: Find an ordered index set {i1, . . . , iN} by sorting the
479
+ agents such that
480
+
481
+ Xi1
482
+ wi1 ≤ · · · ≤
483
+
484
+ XiN
485
+ wiN
486
+ 4: αj =
487
+ wij
488
+ wij +···+wiN for j = 1, . . . , N
489
+ 5: j ← 1
490
+ 6: while j ≤ N and B > 0 do
491
+ 7:
492
+ if B ≤ �
493
+ Xij/αj then
494
+ 8:
495
+ �Aik = αkB for k = j, . . . , N
496
+ 9:
497
+ break
498
+ 10:
499
+ else
500
+ 11:
501
+ �Aij = �
502
+ Xij
503
+ 12:
504
+ B ← B − �Aij
505
+ 13:
506
+ j ← j + 1
507
+ 14:
508
+ end if
509
+ 15: end while
510
+ 5
511
+ Sequential Setting: Heuristic Algorithm
512
+ In this section, we propose a simple and computationally effi-
513
+ cient heuristic algorithm, which we name Sequential Alloca-
514
+ tions with Fairness based on Future Estimates (SAFFE), as
515
+ well as its variant SAFFE-Discounted. This online algorithm
516
+ uses Algorithm 1 as a sub-routine to compute the allocations
517
+ at each step t.
518
+ 5.1
519
+ SAFFE Algorithm
520
+ SAFFE is based on the simple principle of substituting unob-
521
+ served future requests with their expectations. By doing so,
522
+ we convert the sequential decision-making problem into solv-
523
+ ing the offline problem in each time step. With the algorithm
524
+ formally stated in Algorithm 2, at each time step t we use the
525
+ expected future demands to determine the total resources we
526
+ expect to allocate to each agent by time T. This allows us to
527
+ reserve a portion of the available budget for future demands.
528
+ Specifically, at t = 1, . . . , T, we solve the following problem
529
+ max
530
+ Ct
531
+ N
532
+
533
+ i=1
534
+ 1{Y t
535
+ i > 0} . wi log( �At
536
+ i + Ct
537
+ i)
538
+ s.t. 0 ≤ Ct
539
+ i ≤ Y t
540
+ i , ∀i,
541
+ N
542
+
543
+ i=1
544
+ Ct
545
+ i ≤ Bt,
546
+ (15)
547
+ where
548
+ Y t
549
+ i = Xt
550
+ i + E
551
+
552
+ T
553
+
554
+ τ=t+1
555
+
556
+ i
557
+
558
+ ,
559
+ i = 1, . . . , N
560
+ (16)
561
+ The indicator function 1{Y t
562
+ i > 0} ensures that we do not
563
+ consider absent agents, i.e., those with no current or expected
564
+ future demands3. Ct
565
+ i denotes the total allocation for agent i
566
+ over the period t, . . . , T, if the future demands would arrive
567
+ exactly as their expectations. In other words, Ct
568
+ i consists of
569
+ the allocation in the current time step and the reserved allo-
570
+ cations for the future. Then, the current allocation At
571
+ i is a
572
+ fraction of Ct
573
+ i computed as
574
+ At
575
+ i = Ct
576
+ i
577
+ Xt
578
+ i
579
+ Y t
580
+ i
581
+ .
582
+ (17)
583
+ Similar to the hindsight problem (13), we can efficiently solve
584
+ (15) using a variant of the water-filling algorithm given in
585
+ Algorithm 3 in Appendix B. As illustrated in Fig. 1b, at time
586
+ step t, the water-level µt is calculated while accounting for
587
+ all previous allocations to the agents and their total expected
588
+ future demands.
589
+ Algorithm 2 SAFFE Algorithm
590
+ 1: Input: number of agents N, resource budget B, demand
591
+ vectors X1, . . . XT ∈ RN, weight vector w ∈ RN, de-
592
+ mand distributions PX1, . . . , PXN
593
+ 2: Output: allocation vectors A1, . . . , AT ∈ RN
594
+ 3: for For t = 1, . . . , T do
595
+ 4:
596
+ Y t
597
+ i = Xt
598
+ i + E[�T
599
+ τ=t+1 Xτ
600
+ i ] for i = 1, . . . , N
601
+ 5:
602
+ �At
603
+ i = �t
604
+ τ=1 Aτ
605
+ i for i = 1, . . . , N
606
+ 6:
607
+ Ct ← Algorithm 3 with inputs (N, B, Yt, w, �At) in
608
+ App. B
609
+ 7:
610
+ At
611
+ i = Ct
612
+ iXt
613
+ i/Y t
614
+ i for i = 1, . . . , N
615
+ 8:
616
+ B ← B − �N
617
+ i=1 At
618
+ i
619
+ 9: end for
620
+ 5.2
621
+ SAFFE-Discounted Algorithm
622
+ While SAFFE is simple and easy to interpret, it is sub-
623
+ optimal. In fact, SAFFE maximizes an upper bound of the
624
+ 3With a slight abuse of notation, in the objective function, we
625
+ assume 0 × −∞ = 0 to ensure that an agent without demand is not
626
+ included, and gets no allocation.
627
+
628
+ x;
629
+ Ai|A2|A3|A4|A5YicIc?
630
+ μt
631
+ A!optimal Q-values of the MDP defined in Sec. 3 as ϵ → 0.
632
+ This implies that SAFFE overestimates the expected reward
633
+ gain from the future and reserves the budget excessively for
634
+ future demands. To correct the over-reservation, we propose
635
+ SAFFE-Discounted (SAFFE-D), which penalizes uncertain
636
+ future requests by their standard deviations. At every step
637
+ t, the algorithm computes
638
+ Y t
639
+ i = Xt
640
+ i +
641
+ T
642
+
643
+ τ=t+1
644
+
645
+ E[Xτ
646
+ i ] − λ std(Xτ
647
+ i )
648
+ �+
649
+ (18)
650
+ for some regularization parameter λ ≥ 0 and solves (15).
651
+ As in SAFFE, the current allocation At
652
+ i is split proportion-
653
+ ally from Ct
654
+ i according to (17). The regularizer λ is a hyper-
655
+ parameter that can be tuned to provide the optimal trade-off
656
+ between consuming too much of the budget at the current step
657
+ and reserving too much for the future. We show in Sec. 6,
658
+ the uncertainty in future demands reduces as we approach
659
+ T, and we expect better performance with a decreasing time-
660
+ dependent function such as λ(t) =
661
+
662
+ T − t λ for some λ > 0.
663
+ Alternatively, λ(t) can be learned as a function of time.
664
+ Remark 1. In this paper, we assume access to historical
665
+ data from which expected future demands can be estimated,
666
+ and we mainly focus on the decision-making aspect for al-
667
+ locations. These estimates are directly used by SAFFE and
668
+ SAFFE-D. We empirically study how sensitive the algorithms
669
+ are to estimation errors in Sec. 7.3.
670
+ 6
671
+ On the Sub-Optimality of SAFFE-D
672
+ In order to determine how sub-optimal SAFFE-D is, we
673
+ upper bound the performance gap between SAFFE-D and
674
+ the hindsight solution, in terms of ∆Amax introduced in
675
+ (4). Let Aoracle denote the allocations derived using SAFFE-
676
+ D in a setting where an oracle has perfect knowledge of
677
+ the sequence of incoming demands, i.e., when SAFFE-D
678
+ is used with no stochasticity.
679
+ We refer to this setup as
680
+ SAFEE-Oracle. We upper bound ∆Amax, the distance be-
681
+ tween ASAFFE-D and Ahindsight, in two steps: by bounding the
682
+ distance between SAFFE-D and SAFFE-Oracle (Sec. 6.1)
683
+ and between SAFFE-Oracle and hindsight (Sec. 6.2). Fi-
684
+ nally, Theorem 4 upper bounds the distance ∆Amax between
685
+ SAFFE-D and hindsight in terms of the sum of these two dis-
686
+ tances. Our arguments rely on concentration inequalities and
687
+ are in spirit similar to the idea of guardrails in [Sinclair et al.,
688
+ 2022].
689
+ 6.1
690
+ SAFFE-Discounted vs SAFFE-Oracle
691
+ Under mild assumptions on the distribution of demands, we
692
+ can quantify the distance between SAFFE-D and SAFFE-
693
+ Oracle allocations using concentration inequalities on the de-
694
+ viation of future demands from their expected value. Let us
695
+ define
696
+ Y
697
+ t
698
+ i = Xt
699
+ i + E
700
+
701
+ T
702
+
703
+ τ=t+1
704
+
705
+ i
706
+
707
+ +
708
+
709
+ T − t
710
+ √ξ
711
+ std(Xτ
712
+ i )
713
+ (19)
714
+ Yt
715
+ i = Xt
716
+ i + E
717
+
718
+ T
719
+
720
+ τ=t+1
721
+
722
+ i
723
+
724
+
725
+
726
+ T − t
727
+ √ξ
728
+ std(Xτ
729
+ i )
730
+ (20)
731
+ For simplicity assume that agent i’s demands are i.i.d (this
732
+ assumption can be relaxed see Appendix C). Then, for ξ > 0,
733
+ with probability at least 1−ξ, based on Chebyshev’s inequal-
734
+ ity we have
735
+ Yt
736
+ i ≤ Xt
737
+ i +
738
+ T
739
+
740
+ τ=t+1
741
+
742
+ i ≤ Y
743
+ t
744
+ i
745
+ (21)
746
+ We further assume that all agents have equal std(Xτ
747
+ i ), but
748
+ their expectations might differ (the assumption simplifies the
749
+ presentation, and is not crucial. See Appendix C). We first
750
+ present the worst-case scenario bound, where we allow highly
751
+ unbalanced future demands for different agents, i.e. there is
752
+ an agent k such that Yt
753
+ k ≥ Y
754
+ t
755
+ j for all other agents j ̸= k.
756
+ Theorem 1 (Unbalanced demands bound). Let At,SAFFE-D
757
+ i
758
+ and At,oracle
759
+ i
760
+ denote allocations by SAFFE-D for λ(t) =
761
+
762
+ T −t
763
+ ξ
764
+ and SAFFE-Oracle, respectively. Then, for all agents
765
+ i we have
766
+ ���At,SAFFE-D
767
+ i
768
+ − At,oracle
769
+ i
770
+ ��� ≤
771
+
772
+
773
+
774
+
775
+
776
+
777
+
778
+ 2N
779
+
780
+ (T −t)
781
+ ξ
782
+ std(Xt
783
+ i)
784
+ if Bt ≤
785
+ N
786
+
787
+ i=1
788
+ Y
789
+ t
790
+ i,
791
+ 4
792
+
793
+ (T −t)
794
+ ξ
795
+ std(Xt
796
+ i)
797
+ if Bt ≥
798
+ N
799
+
800
+ i=1
801
+ Y
802
+ t
803
+ i
804
+ with probability at least 1 − ξ.
805
+ Proof. The detailed proof is in Appendix C. Intuitively, the
806
+ discrepancy scales with the number of agents, since if all ag-
807
+ nets j ̸= k submit demands according to their upper bound
808
+ Y
809
+ t
810
+ j, then the water-level moves so that their SAFFE-Oracle
811
+ allocations increase compared to SAFFE-Oracle with Yt
812
+ j,
813
+ which happens on the account of agent j who now gets less.
814
+ Finally, using (21) completes the proof, as we can translate
815
+ the discrepancy between SAFFE-Oracle with Yt
816
+ i and Y
817
+ t
818
+ i to
819
+ that between SAFFE-D and SAFFE-Oracle with Y t
820
+ i .
821
+ In order to move beyond the worst-case scenario of highly
822
+ unbalanced request distributions, we now assume that all
823
+ agents have the same Y
824
+ t
825
+ i and Yt
826
+ i, e.g. if their demands are
827
+ from the same distribution, the discrepancy between alloca-
828
+ tions scales better.
829
+ Theorem 2 (Balanced demands bound). If for any two agents
830
+ i and j we have the same bounds in (21), i.e. Y
831
+ t
832
+ i = Y
833
+ t
834
+ j and
835
+ Yt
836
+ i = Yt
837
+ j, then for all agents i, with probability at least 1 − ξ,
838
+ we have
839
+ ���At,SAFFE-D
840
+ i
841
+ − At,oracle
842
+ i
843
+ ��� ≤
844
+
845
+
846
+
847
+
848
+
849
+
850
+
851
+ 0
852
+ if Bt ≤
853
+ N
854
+
855
+ i=1
856
+ Yt
857
+ i,
858
+ 4
859
+
860
+ (T −t)
861
+ ξ
862
+ std(Xt
863
+ i)
864
+ if Bt ≥
865
+ N
866
+
867
+ i=1
868
+ Yt
869
+ i
870
+ Proof. See Appendix C for the detailed proof, which follows
871
+ a similar argument as the proof of Theorem 1.
872
+
873
+ 6.2
874
+ SAFFE-Oracle Matches Hindsight
875
+ Now that we have upper bounded the discrepancy between
876
+ the allocations of SAFFE-D and SAFFE-Oracle, our next step
877
+ is to show that SAFFE-Oracle achieves the optimal alloca-
878
+ tions in hindsight.
879
+ Theorem 3. SAFFE-Oracle achieves optimal allocations in
880
+ hindsight, i.e. for all i we have �T
881
+ t=1 At,oracle
882
+ i
883
+ = �
884
+ Ai, where
885
+
886
+ Ai is the solution to the Eisenber-Gale program (12).
887
+ Proof. See Appendix D for a detailed proof, which relies on
888
+ the following observations: 1) For t = 1, total allocations for
889
+ the current step and the reserved allocations for the future C1
890
+ i ,
891
+ equals the solution �
892
+ Ai of (12), and 2) SAFFE-Oracle fully
893
+ distributes the total reserved allocations for future by the end
894
+ of the horizon T.
895
+ 6.3
896
+ SAFFE-Discounted vs Hindsight
897
+ We can now bound the gap between SAFFE-D and hindsight.
898
+ Theorem 4 (Gap between SAFFE-D and hindsight). In the
899
+ unbalanced demands setting, for the gap between SAFFE-D
900
+ and hindsight measured by ∆Amax introduced in (4) we have
901
+ ∆Amax ≤ N T 3/2
902
+ √ξ std(Xt
903
+ i).
904
+ (22)
905
+ In the balanced demands setting, we have
906
+ ∆Amax ≤ 2T 3/2
907
+ √ξ
908
+ std(Xt
909
+ i).
910
+ (23)
911
+ Proof. Firstly, let us note that Theorem 3 guarantees that
912
+ ∆Amax = E
913
+
914
+ max
915
+ i
916
+ �����
917
+ T
918
+
919
+ t=1
920
+ At,SAFFE-D −
921
+ T
922
+
923
+ t=1
924
+ At,oracle
925
+ �����
926
+
927
+ ,
928
+ as SAFFE-Oracle achieves the hindsight solution. It remains
929
+ to employ Theorems 1 and 2 together with the triangle in-
930
+ equality in order to obtain an upper bound on the right hand
931
+ side.
932
+ In the case of unbalanced demands, this results in
933
+ ∆Amax ≤ N T 3/2
934
+ √ξ std(Xt
935
+ i). In the case of balanced demands,
936
+ we have ∆Amax ≤ 2T 3/2
937
+ √ξ
938
+ std(Xt
939
+ i)
940
+ Remark 2. As ∆Amean ≤ ∆Amax, Theorem 4 also provides
941
+ an upper bound on ∆Amean.
942
+ 7
943
+ Experimental Results
944
+ In this section, we use synthetic data to evaluate SAFFE-
945
+ D under different settings and to compare its performance
946
+ against baseline sequential algorithms in terms of fairness
947
+ metrics and budget allocation efficiency. In the experiments,
948
+ we study: 1) how the fairness of SAFFE-D allocations is af-
949
+ fected as the budget size, number of agents and time horizon
950
+ vary (Sec. 7.1), 2) whether the algorithm favors agents de-
951
+ pending on their arrival times or demand sizes (Sec. 7.2), 3)
952
+ how sensitive the algorithm is to future demand estimation
953
+ errors (Sec. 7.3), 4) how the discounting in SAFFE-D im-
954
+ proves fairness (Sec. 7.4), and 5) how SAFFE-D compares to
955
+ allocation policies learned using reinforcement learning (RL)
956
+ (Sec. 7.5). Finally, in Sec. 7.6, we evaluate SAFFE-D on real
957
+ data.
958
+ Evaluation Metrics
959
+ We consider the following metrics to
960
+ compare the fairness and efficiency of sequential allocation
961
+ algorithms:
962
+ • Log-NSW: Expected log-NSW in hindsight as in Eq. (3).
963
+ Since the value of log-NSW is not directly comparable
964
+ across different settings, we use its normalized distance
965
+ to the hindsight log-NSW when comparing algorithms,
966
+ denoted by ∆Log-NSW.
967
+ • Utilization (%): The fraction of available budget dis-
968
+ tributed to the agents over the horizon. Due to the stochas-
969
+ ticity in experiments described next, we may have an
970
+ over-abundance of initial budget that exceeds the total de-
971
+ mands over the horizon. Therefore, we define this met-
972
+ ric by only considering the required fraction of available
973
+ budget B as
974
+ �N
975
+ i=1
976
+ �T
977
+ t=1 At
978
+ i
979
+ min{B, �N
980
+ i=1
981
+ �T
982
+ t=1 Xt
983
+ i}
984
+ × 100
985
+ • ∆Amean and ∆Amax: The average and maximum nor-
986
+ malized deviation of per-agent cumulative allocations
987
+ compared to hindsight allocations as defined in Eq. (4).
988
+ For better scaling in visualizations, we make a slight
989
+ change by normalizing these metrics with respect to hind-
990
+ sight as
991
+ ∆Ai
992
+ �T
993
+ t=1 At,hindsight
994
+ i
995
+ . Since these metrics measure dis-
996
+ tance, an algorithm with lower ∆A is considered more
997
+ fair in terms of this metric.
998
+ Allocation Algorithm Baselines
999
+ We compare our algo-
1000
+ rithms SAFFE and SAFFE-D with the following baselines:
1001
+ • Hindsight: As discussed in Sec. 4, the solution to (13)
1002
+ represents a baseline for evaluating sequential algorithms
1003
+ since its Log-NSW provides an upper bound for other al-
1004
+ gorithms.
1005
+ • HOPE-Online: Motivated by the mobile food-bank al-
1006
+ location problem, this algorithm was proposed in [Sin-
1007
+ clair et al., 2020] for a setting where N agent demands
1008
+ are sequentially revealed over T = N. As we explain in
1009
+ Appendix E, HOPE-Online coincides with SAFFE in the
1010
+ special case where each agent makes only one request.
1011
+ • Guarded-HOPE: It was proposed in [Sinclair et al.,
1012
+ 2022] to achieve the correct trade-off between fairness
1013
+ (in terms of envy-freeness) and efficiency with an input
1014
+ parameter LT derived based on concentration arguments.
1015
+ The algorithm is designed for a setting of one request per
1016
+ horizon for an individual. We modify Guarded-HOPE
1017
+ (Algorithm 4 in Appendix F) to be applicable to our set-
1018
+ ting, and to provide meaningful confidence bounds for the
1019
+ multiple demand case. As in [Sinclair et al., 2022], we
1020
+ use LT = T −1/2 and LT = T −1/3.
1021
+ Demand Processes
1022
+ We investigate various settings by con-
1023
+ sidering the following demand processes, for which we are
1024
+ able to analytically derive the future demand means and stan-
1025
+ dard deviations:
1026
+ • Symmetric Setting (Homogeneous Bernoulli arrivals
1027
+ with Normal demands). At time t, agent i makes a re-
1028
+ quest Xi ∼ N(µi, σ2
1029
+ i ) with probability p, independently
1030
+
1031
+ from other agents. The distribution parameters are such
1032
+ that µi ∼ Uniform(10, 100), and σi = µi/5. We study
1033
+ regimes where p = c
1034
+ T , 1 ≤ c ≤ T, is the average number
1035
+ of arrivals per agent.
1036
+ • Non-symmetric
1037
+ Arrivals
1038
+ Setting
1039
+ (Inhomogeneous
1040
+ Bernoulli arrivals with Normal demands).
1041
+ In this
1042
+ setup, we assume that the likelihood of arrivals over
1043
+ the horizon varies across agents, which we use to
1044
+ evaluate whether the algorithms favor agents based on
1045
+ their arrival times. We implement this using Bernoulli
1046
+ arrivals with a time-varying parameter p. We consider
1047
+ three groups. Ask-Early: 1/3rd of the agents are more
1048
+ likely to frequently visit earlier in the horizon such
1049
+ that pt
1050
+ i ∝ (T − t), Ask-Late: 1/3rd of the agents are
1051
+ more likely to frequently visit later in the horizon with
1052
+ pt
1053
+ i ∝ t, and Uniform: the remaining agents do not have
1054
+ a preference in terms of time with constant pt
1055
+ i.
1056
+ The
1057
+ Bernoulli parameters of the three groups are normalized
1058
+ to have equal expected number of visits.
1059
+ • Non-symmetric
1060
+ Demands
1061
+ Setting
1062
+ (Homogeneous
1063
+ Bernoulli arrivals and varying Normal demands).
1064
+ We
1065
+ consider homogeneous arrivals but with time-varying
1066
+ demand sizes across agents. We have three groups with
1067
+ agents that make requests with the same probability p
1068
+ over T. More-Early: 1/3rd of the agents have Normal
1069
+ demands with mean µt
1070
+ i ∝ (T − t), More-Late: 1/3rd
1071
+ of the agents have µt
1072
+ i ∝ t, and Uniform: the remaining
1073
+ agents have constant µt
1074
+ i. The parameters are normalized
1075
+ to have the same total demands across the groups.
1076
+ Standard deviation σi is assumed to be time-independent
1077
+ for all agents.
1078
+ Real Data
1079
+ We evaluate SAFFE-D using a real dataset4 con-
1080
+ taining five years of store-item sales data for 10 stores. We
1081
+ assume that each store (agent) requests its total daily sales
1082
+ from a warehouse (supplier) with limited inventory, and the
1083
+ warehouse aims to be fair when supplying the stores on a
1084
+ weekly basis, i.e., when T = 7. We use the first three years
1085
+ to estimate the expected demands and standard deviations for
1086
+ each weekday, and we use the remaining two years to evalu-
1087
+ ate SAFFE-D for fair daily allocations.
1088
+ We report the results on synthetic data as an average
1089
+ over 200 experiment realizations with one standard deviation.
1090
+ For SAFFE-D we use λ(t) = λ
1091
+
1092
+ T − t, where the hyper-
1093
+ parameter λ is optimized with respect to Log-NSW. We ex-
1094
+ press the budget size B as the fraction of total expected de-
1095
+ mands such that a budget of 0.1 means enough budget to meet
1096
+ only 10% of the expected demands.
1097
+ 7.1
1098
+ Scaling System Parameters
1099
+ In Fig. 2a, we compare SAFEE-D with the baselines as the
1100
+ supplier’s budget increases from 0.1 to 1. We consider the
1101
+ Symmetric setting with N = 50 agents and 2 expected ar-
1102
+ rivals over horizon T = 40. We observe that SAFFE-D out-
1103
+ performs all other approaches in terms of both ∆Log-NSW
1104
+ and resource utilization across all budgets. The advantage of
1105
+ 4https://www.kaggle.com/c/demand-forecasting-kernels-only
1106
+ SAFFE-D in comparison to other algorithms is that it pre-
1107
+ vents over-reserving for the future, and thus achieves higher
1108
+ utilization and lower ∆Log-NSW. In contrast, SAFFE does
1109
+ not impose the regularization term which potentially results
1110
+ in overestimating future demands.
1111
+ Hope-Guardrail is de-
1112
+ signed to find a balance between utilization and envy, which
1113
+ does not necessarily mean balance in terms of Log-NSW. Ad-
1114
+ ditional experiments showing how the performance of the al-
1115
+ gorithms scale with the number of agents N, time horizon
1116
+ T and the per-agent expected arrivals are provided in Ap-
1117
+ pendix G.1. The results suggest that SAFFE-D, although sub-
1118
+ optimal, performs close to Hindsight.
1119
+ 7.2
1120
+ Non-Symmetric Arrivals or Demands
1121
+ We investigate whether SAFFE-D allocates to agents differ-
1122
+ ently based on their arrival or demand patterns. We consider
1123
+ N = 50 agents with 2 expected arrivals over the horizon
1124
+ T = 40, and Normal demands with µi = 50, and budget size
1125
+ 0.5. Under the Non-symmetric Arrivals setting, we compare
1126
+ the agents’ allocations for each algorithm with respect to the
1127
+ Hindsight allocations in Fig. 3. In this setting, agents have
1128
+ different likelihoods of arriving over the horizon. We ob-
1129
+ serve that despite being optimized for the log-NSW objective,
1130
+ SAFFE-D outperforms all other algorithms on average, and is
1131
+ more uniform across the three groups compared to SAFFE
1132
+ and Guarded-HOPE which favor the Ask-Late agents.
1133
+ In
1134
+ terms of the worst-case agent, SAFFE outperforms all other
1135
+ methods and has similar ∆Amax across all three groups. The
1136
+ algorithms are compared under the Non-symmetric Demands
1137
+ setting in Appendix G.2.
1138
+ Table 1: Improvement of SAFFE-D with choice of λ.
1139
+ Log-NSW (↑)
1140
+ Utilization % (↑)
1141
+ ∆Amean (↓)
1142
+ ∆Amax (↓)
1143
+ Hindsight
1144
+ 236.57±10.21
1145
+ 100.0±0.0
1146
+
1147
+
1148
+ SAFFE-D (λ(t))
1149
+ 235.91±10.26
1150
+ 99.45±1.5
1151
+ 0.05±0.02
1152
+ 0.45±0.23
1153
+ SAFFE-D (λ)
1154
+ 234.12±10.67
1155
+ 97.86±3.5
1156
+ 0.09±0.03
1157
+ 0.65±0.22
1158
+ SAFFE (λ = 0)
1159
+ 232.89±10.91
1160
+ 95.77±4.5
1161
+ 0.11±0.03
1162
+ 0.69±0.21
1163
+ 7.3
1164
+ Sensitivity to Estimation Errors
1165
+ We investigate how sensitive the algorithms are to estimation
1166
+ errors by scaling each agent’s mean estimate at each step as
1167
+ �µt
1168
+ i = (1 + δ)µt
1169
+ i, where δ denotes the noise level. Fig. 2b
1170
+ shows the change in performance as we vary the noise level
1171
+ δ from −0.5 to 0.5, for the Symmetric setting with N = 50
1172
+ agents, 2 expected per-agent arrivals, T = 40, and budget
1173
+ 0.5. We observe that SAFFE-D is robust to mean estimation
1174
+ noise while all other algorithms are impacted. This results
1175
+ from the discounting term in SAFFE-D, for which the hyper-
1176
+ parameter λ can be tuned to the estimation errors. However,
1177
+ when over-estimating the future demands, SAFFE and other
1178
+ methods will be initially more conservative which can lead to
1179
+ lower utilization and less fair allocations due to the leftover
1180
+ budget. When under-estimating the expected demands, they
1181
+ use the budget more greedily earlier on and deplete the budget
1182
+ sooner, resulting in less allocations to agents arriving later
1183
+ (especially in Gaurded-HOPE).
1184
+ 7.4
1185
+ Choice of λ for SAFFE-D
1186
+ The discounting term in SAFFE-D uses the confidence in es-
1187
+ timates to improve the performance of SAFFE by balancing
1188
+
1189
+ (a) Different budget size B.
1190
+ (b) Sensitivity to estimation errors.
1191
+ Figure 2: Symmetric Setting with N = 50 and T = 40. (a) SAFFE-D performs close to Hindsight achieving high utilization and low
1192
+ ∆Log-NSW, ∆Amean and ∆Amax, (b) SAFFE-D is robust to expected demands estimation errors.
1193
+ Figure 3: Non-symmetric Arrivals Setting: SAFFE-D outperforms
1194
+ in the average case across groups with different arrival patterns and
1195
+ SAFFE is more uniform in the worst case.
1196
+ the budget between allocating now vs reserving for future ar-
1197
+ rivals. We compare the performance of SAFFE-D in terms of
1198
+ the discounting function in Table 1 for constant or decreasing
1199
+ λ over the horizon. In both cases, the parameter is tuned to
1200
+ maximize Log-NSW. As expected from Sec. 5.2, the perfor-
1201
+ mance of SAFFE-D improves for λ(t) decreasing over time.
1202
+ This is because the uncertainty in expected future demands
1203
+ reduces and the supplier can be less conservative when mak-
1204
+ ing allocation decisions.
1205
+ 7.5
1206
+ Reinforcement Learning Results
1207
+ We investigate learning an allocation strategy using RL under
1208
+ the Symmetric setting. We consider N = 10 agents, T = 10
1209
+ and varying budget size sampled from Uniform(0.4, 0.8).
1210
+ We use the Soft Actor-Critic (SAC) [Haarnoja et al.,
1211
+ 2018a; Achiam, 2018] method with automatic entropy tun-
1212
+ ing [Haarnoja et al., 2018b] to learn a policy (See Ap-
1213
+ pendix H). The results averaged over 200 experiment roll-
1214
+ outs for five random seeds are reported in Table 2, for two
1215
+ cases where we expect to have 2 and 4 per-agent arrivals.
1216
+ We observe that while the RL policy is not able to match the
1217
+ hindsight performance, it outperforms SAFFE-D and other
1218
+ approaches in terms of Log-NSW under sparse (2 per-agent)
1219
+ arrivals. With denser (4 per-agent) arrivals, the RL policy per-
1220
+ forms slightly worse than SAFFE-D while still outperforming
1221
+ others. These observations are in line with other experiments
1222
+ illustrating the close-to-optimal performance of SAFFE-D es-
1223
+ pecially in settings with more arrivals.
1224
+ 7.6
1225
+ Real Data
1226
+ In contrast to the demand processes considered in previ-
1227
+ ous experiments, in this case, we need to estimate the ex-
1228
+ pected demands and their standard deviations. The efficiency
1229
+ and fairness metrics are reported in Table 3 for budget size
1230
+ 0.5.
1231
+ We observe that SAFFE-D is optimal, and SAFFE
1232
+ and HOPE-Online perform very close to Hindsight in terms
1233
+ of Utilization and Log-NSW. As shown in Fig. 4c in Ap-
1234
+ pendix G.1, we expect that SAFFE-D achieves (close to)
1235
+ hindsight performance for dense agent arrivals as with the
1236
+ daily arrivals in this setting. In order to investigate less dense
1237
+ scenarios, we impose sparsity in the arrivals by erasing each
1238
+ arrival with probability p. As observed in Table 3, SAFFE-D
1239
+ is no longer optimal but outperforms all other methods. Ad-
1240
+ ditional results are provided in Appendix G.3.
1241
+ 8
1242
+ Related Work
1243
+ Offline resource allocation is a classic problem that has
1244
+ been extensively studied for single and multiple resources,
1245
+ various utility functions, and resource types.
1246
+ In the non-
1247
+ strategic setup where agents are assumed to truthfully report
1248
+ their demands and to take the entirety of their allocations,
1249
+ several heuristics-based and optimization-based approaches
1250
+ have been proposed achieving different levels of optimal-
1251
+ ity guarantees and computational efficiency [Bretthauer and
1252
+ Shetty, 1995; Katoh and Ibaraki, 1998; Lee and Lee, 2005;
1253
+ Patriksson, 2008]. This problem finds important applications
1254
+ in computer and vehicle network management, where exist-
1255
+ ing works take advantage of the problem structure [Wong et
1256
+ al., 2004; Zhao et al., 2015; Wang et al., 2018; Gatzianas et
1257
+ al., 2021; Xu et al., 2021].
1258
+
1259
+ Hindsight
1260
+ SAFFE-D
1261
+ SAFFE
1262
+ HOPE-Online
1263
+ Guarded-HOPE (L↑ = T-1/2)
1264
+ Guarded-HOPE (LT = T-1/3)
1265
+ 100
1266
+ 0.14 -
1267
+ 0.5
1268
+ 4.0
1269
+ 98
1270
+ 3.5
1271
+ 0.12
1272
+ (%)
1273
+ 96
1274
+ 0.4
1275
+ -NSW
1276
+ 0.10
1277
+ 3.0
1278
+ Utilization
1279
+ 0.3
1280
+ 2.5
1281
+ 92
1282
+ △Log-I
1283
+ 0.08
1284
+ 2.0
1285
+ 0.06
1286
+ 0.2
1287
+ 1.5
1288
+ 88
1289
+ 0.04
1290
+ 1.0
1291
+ 86
1292
+ 0.0
1293
+ 0.1
1294
+ 0.5
1295
+ 84
1296
+ 0.00
1297
+ 0.0
1298
+ 0.2
1299
+ 0.4
1300
+ 0.6
1301
+ 0.8
1302
+ 1.0
1303
+ 0.2
1304
+ 0.4
1305
+ 0.6
1306
+ 0.8
1307
+ 1.0
1308
+ 0.2
1309
+ 0.4
1310
+ 0.6
1311
+ 0.8
1312
+ 1.0
1313
+ 0.2
1314
+ 0.4
1315
+ 0.6
1316
+ 0.8
1317
+ 1.0
1318
+ Budget Fraction
1319
+ Budget Fraction
1320
+ Budget Fraction
1321
+ Budget Fraction100
1322
+ 1.6
1323
+ 00
1324
+ 0.35
1325
+ 95
1326
+ 0.25
1327
+ 0.30
1328
+ 1.4
1329
+ (%)
1330
+ 06
1331
+ Utilization
1332
+ 0.20 -
1333
+ 1.2
1334
+ 85
1335
+ 0.25
1336
+ 80
1337
+ 0.20
1338
+ 75
1339
+ 0.10
1340
+ 0.15 -
1341
+ 0.8
1342
+ 70 -
1343
+ 0.05 -
1344
+ 0.10
1345
+ 0.6
1346
+ 65
1347
+ 0.00
1348
+ -0.4
1349
+ -0.2
1350
+ 0.0
1351
+ 0.2
1352
+ -0.4
1353
+ -0.2
1354
+ 0
1355
+ 0.2
1356
+ 0.4
1357
+ 0.4
1358
+ -0.2
1359
+ 0.0
1360
+ 0.2
1361
+ 0.4
1362
+ -0.4
1363
+ -0.2
1364
+ 0.0
1365
+ 0.2
1366
+ +
1367
+ Noise Level §
1368
+ Noise Level §
1369
+ Noise Level §
1370
+ Noise Level §0.40
1371
+ All
1372
+ 0.35
1373
+ Ask-Early
1374
+ 1.0
1375
+ 0.30
1376
+ Uniform
1377
+ Ask-Late
1378
+ 0.8
1379
+ mean
1380
+ 0.25
1381
+ max
1382
+ 0.20
1383
+ 0.6
1384
+ 0.15
1385
+ 0.4
1386
+ 0.10
1387
+ 0.2
1388
+ 0.05
1389
+ 0.00
1390
+ 0.0
1391
+ SAFFE-D
1392
+ SAFFE
1393
+ HOPE-Online
1394
+ SAFFE-D
1395
+ SAFFE
1396
+ Guarded-HOPE
1397
+ HOPE-Online
1398
+ Guarded-HOPE
1399
+ (L = T~1/3)
1400
+ = T1/3 )
1401
+ Algorithm
1402
+ AlgorithmTable 2: SAFFE-D vs RL allocation policy in the Symmetric setting for N = 10 agents with different per-agent arrivals.
1403
+ 2 Per-agent Arrivals (Sparse)
1404
+ 4 Per-agent Arrivals (Dense)
1405
+ Log-NSW (↑)
1406
+ Utilization % (↑)
1407
+ ∆Amean (↓)
1408
+ ∆Amax (↓)
1409
+ Log-NSW (↑)
1410
+ Utilization % (↑)
1411
+ ∆Amean (↓)
1412
+ ∆Amax (↓)
1413
+ Hindsight
1414
+ 35.74±1.23
1415
+ 100.0±0.0
1416
+
1417
+
1418
+ 47.37±2.20
1419
+ 100.0±0.0
1420
+
1421
+
1422
+ RL Policy (SAC)
1423
+ 35.11±1.20
1424
+ 95.63±0.49
1425
+ 0.13 ± 0.01
1426
+ 0.43 ± 0.01
1427
+ 47.00±2.20
1428
+ 98.30±0.45
1429
+ 0.12±0.01
1430
+ 0.34±0.02
1431
+ SAFFE-D
1432
+ 35.01±1.28
1433
+ 99.54±0.42
1434
+ 0.15±0.05
1435
+ 0.51± 0.16
1436
+ 47.12± 2.22
1437
+ 99.82±0.36
1438
+ 0.11±0.04
1439
+ 0.32±0.09
1440
+ SAFFE
1441
+ 34.77±1.19
1442
+ 92.74±0.41
1443
+ 0.16±0.02
1444
+ 0.53±0.03
1445
+ 46.87±2.15
1446
+ 97.14±0.43
1447
+ 0.12±0.02
1448
+ 0.35±0.03
1449
+ Table 3: Experiments on real data for daily per-agent demands (p = 1), and more sparse demand arrivals (p = 0.5).
1450
+ p = 1
1451
+ p = 0.5
1452
+ Log-NSW (↑)
1453
+ Utilization % (↑)
1454
+ ∆Amean (↓)
1455
+ ∆Amax (↓)
1456
+ Log-NSW (↑)
1457
+ Utilization % (↑)
1458
+ ∆Amean (↓)
1459
+ ∆Amax (↓)
1460
+ Hindsight
1461
+ 42.72±0.00
1462
+ 100.0±0.0
1463
+
1464
+
1465
+ 35.24±0.94
1466
+ 100.0±0.0
1467
+
1468
+
1469
+ SAFFE-D
1470
+ 42.72±0.00
1471
+ 100.0±0.0
1472
+ 0
1473
+ 0
1474
+ 35.16±0.94
1475
+ 100.0±0.0
1476
+ 0.06±0.04
1477
+ 0.17±0.14
1478
+ SAFFE
1479
+ 42.72±0.02
1480
+ 99.98±0.15
1481
+ 0.01±0.01
1482
+ 0.01±0.03
1483
+ 34.82±1.10
1484
+ 99.16±2.94
1485
+ 0.17±0.08
1486
+ 0.37±0.16
1487
+ HOPE-Online
1488
+ 42.71±0.02
1489
+ 99.98±0.15
1490
+ 0.10±0.04
1491
+ 0.04±0.01
1492
+ 34.44±1.10
1493
+ 99.10±3.03
1494
+ 0.27±0.06
1495
+ 0.60±0.15
1496
+ Guarded-HOPE (LT = T −1/2)
1497
+ 42.48±0.30
1498
+ 97.93±2.80
1499
+ 0.07±0.02
1500
+ 0.16±0.05
1501
+ 33.55±3.67
1502
+ 95.93±6.24
1503
+ 0.27±0.06
1504
+ 0.62±0.15
1505
+ Guarded-HOPE (LT = T −1/3)
1506
+ 42.55±0.21
1507
+ 98.64±1.94
1508
+ 0.07±0.02
1509
+ 0.15±0.05
1510
+ 33.59±3.67
1511
+ 96.54±5.61
1512
+ 0.28±0.07
1513
+ 0.63±0.15
1514
+ Other settings involve agents that can misreport their true
1515
+ demands to receive more favorable allocations, where allo-
1516
+ cation mechanisms need to be designed to incentivize truth-
1517
+ ful behavior [Guo et al., 2009; Cole et al., 2013; Sinha and
1518
+ Anastasopoulos, 2015; Abebe et al., 2020; Tan et al., 2020].
1519
+ In particular, [Cole et al., 2013] achieves this by strategically
1520
+ withholding a portion of the resources at the cost of compro-
1521
+ mised efficiency. [Tan et al., 2020] collects payments from
1522
+ agents when they place requests, and [Guo et al., 2009] stud-
1523
+ ies the repeated allocation of a single resource among the
1524
+ same agents and collects an artificial payment which intu-
1525
+ itively captures the credibility of the agents in the past.
1526
+ In the online setting, a number of works [Tesauro and
1527
+ others, 2005; Asadpour et al., 2020; Gallego et al., 2015;
1528
+ Wang et al., 2017; Sinclair et al., 2020; Sinclair et al., 2022]
1529
+ consider real-time allocation decision-making, among which
1530
+ [Sinclair et al., 2020; Sinclair et al., 2022] are closest to
1531
+ our setup. They study allocating multiple divisible resources
1532
+ among truthful agents that are characterized by a finite num-
1533
+ ber of types. Motivated by the food-bank allocation problem,
1534
+ they consider one request per agent. In our work, we study
1535
+ the more general scenario where the agents’ requests may ar-
1536
+ rive multiple times and the number of types need not be finite.
1537
+ Our goal is to be fair to the agents considering all their allo-
1538
+ cations over the horizon.
1539
+ 9
1540
+ Conclusions
1541
+ This paper studies the problem of fair resource allocation
1542
+ in the sequential setting, and mathematically formulates the
1543
+ NSW fairness objective under the MDP framework. With the
1544
+ goal to maximize the return in the MDP, we propose SAFFE-
1545
+ D, a new intuitive algorithm that enjoys a worst-case theoret-
1546
+ ical sub-optimality bound. We show that SAFFE-D signifi-
1547
+ cantly outperforms existing approaches through extensive ex-
1548
+ periments, and effectively balances how much of the budget
1549
+ should be used at each step versus preserved for the future.
1550
+ Empirical results over several generated demand processes
1551
+ demonstrate the superiority of SAFFE-D under different bud-
1552
+ get sizes, number of agents, and time horizon lengths, espe-
1553
+ cially in settings with dense arrivals. The uncertainty-based
1554
+ discount in SAFFE-D also improves the robustness of the al-
1555
+ locations to errors in future demand estimations. Future work
1556
+ includes exploring learning-based allocation policies, learn-
1557
+ ing the optimal λ(t) in SAFFE-D, and extensions to settings
1558
+ with strategic agents.
1559
+ Disclaimer
1560
+ This paper was prepared for informational pur-
1561
+ poses in part by the Artificial Intelligence Research group of
1562
+ JPMorgan Chase & Co˙and its affiliates (“JP Morgan”), and
1563
+ is not a product of the Research Department of JP Morgan.
1564
+ JP Morgan makes no representation and warranty whatsoever
1565
+ and disclaims all liability, for the completeness, accuracy or
1566
+ reliability of the information contained herein. This docu-
1567
+ ment is not intended as investment research or investment ad-
1568
+ vice, or a recommendation, offer or solicitation for the pur-
1569
+ chase or sale of any security, financial instrument, financial
1570
+ product or service, or to be used in any way for evaluating the
1571
+ merits of participating in any transaction, and shall not con-
1572
+ stitute a solicitation under any jurisdiction or to any person,
1573
+ if such solicitation under such jurisdiction or to such person
1574
+ would be unlawful.
1575
+ References
1576
+ [Abebe et al., 2020] Rediet Abebe, Richard Cole, Vasilis
1577
+ Gkatzelis, and Jason D Hartline. A truthful cardinal mech-
1578
+ anism for one-sided matching. In Proceedings of the four-
1579
+ teenth annual ACM-SIAM symposium on discrete algo-
1580
+ rithms, pages 2096–2113. SIAM, 2020.
1581
+ [Abid et al., 2020] Adnan Abid, Muhammad Faraz Man-
1582
+ zoor, Muhammad Shoaib Farooq, Uzma Farooq, and
1583
+ Muzammil Hussain. Challenges and issues of resource al-
1584
+ location techniques in cloud computing. KSII Transactions
1585
+ on Internet and Information Systems (TIIS), 14(7):2815–
1586
+ 2839, 2020.
1587
+ [Achiam, 2018] Joshua Achiam. Spinning Up in Deep Rein-
1588
+ forcement Learning. 2018.
1589
+ [Asadpour et al., 2020] Arash Asadpour, Xuan Wang, and
1590
+ Jiawei Zhang. Online resource allocation with limited flex-
1591
+ ibility. Management Science, 66(2):642–666, 2020.
1592
+
1593
+ [Balasubramanian et al., 2007] Aruna
1594
+ Balasubramanian,
1595
+ Brian Levine, and Arun Venkataramani. Dtn routing as a
1596
+ resource allocation problem. In Proceedings of the 2007
1597
+ conference on Applications, technologies, architectures,
1598
+ and protocols for computer communications,
1599
+ pages
1600
+ 373–384, 2007.
1601
+ [Bellman, 1966] Richard Bellman. Dynamic programming.
1602
+ Science, 153(3731):34–37, 1966.
1603
+ [Bretthauer and Shetty, 1995] Kurt M Bretthauer and Bala
1604
+ Shetty. The nonlinear resource allocation problem. Op-
1605
+ erations research, 43(4):670–683, 1995.
1606
+ [Cohen et al., 1965] Kalman J Cohen, Richard Michael Cy-
1607
+ ert, et al. Theory of the firm; resource allocation in a mar-
1608
+ ket economy. Prentice-Hall International Series in Man-
1609
+ agement (EUA), 1965.
1610
+ [Cole et al., 2013] Richard Cole,
1611
+ Vasilis Gkatzelis,
1612
+ and
1613
+ Gagan Goel. Mechanism design for fair division: allocat-
1614
+ ing divisible items without payments. In Proceedings of
1615
+ the fourteenth ACM conference on Electronic commerce,
1616
+ pages 251–268, 2013.
1617
+ [Eisenberg and Gale, 1959] Edmund Eisenberg and David
1618
+ Gale.
1619
+ Consensus of subjective probabilities: The pari-
1620
+ mutuel method. The Annals of Mathematical Statistics,
1621
+ 30(1):165–168, 1959.
1622
+ [Eisenberg, 1961] Edmund Eisenberg. Aggregation of utility
1623
+ functions. Management Science, 7(4):337–350, 1961.
1624
+ [Furukawa, 1972] Nagata Furukawa.
1625
+ Markovian decision
1626
+ processes with compact action spaces.
1627
+ The Annals of
1628
+ Mathematical Statistics, 43(5):1612–1622, 1972.
1629
+ [Gallego et al., 2015] Guillermo Gallego, Anran Li, Van-
1630
+ Anh Truong, and Xinshang Wang.
1631
+ Online resource
1632
+ allocation
1633
+ with
1634
+ customer
1635
+ choice.
1636
+ arXiv
1637
+ preprint
1638
+ arXiv:1511.01837, 2015.
1639
+ [Gatzianas et al., 2021] Marios Gatzianas, Agapi Mesodi-
1640
+ akaki, George Kalfas, Nikos Pleros, Francesca Moscatelli,
1641
+ Giada Landi, Nicola Ciulli, and Leonardo Lossi. Offline
1642
+ joint network and computational resource allocation for
1643
+ energy-efficient 5g and beyond networks.
1644
+ Applied Sci-
1645
+ ences, 11(22):10547, 2021.
1646
+ [Guo et al., 2009] Mingyu Guo,
1647
+ Vincent Conitzer,
1648
+ and
1649
+ Daniel M Reeves. Competitive repeated allocation with-
1650
+ out payments. In International Workshop on Internet and
1651
+ Network Economics, pages 244–255. Springer, 2009.
1652
+ [Haarnoja et al., 2018a] Tuomas Haarnoja, Aurick Zhou,
1653
+ Pieter Abbeel, and Sergey Levine.
1654
+ Soft actor-critic:
1655
+ Off-policy maximum entropy deep reinforcement learning
1656
+ with a stochastic actor. In Proceedings of the 35th Interna-
1657
+ tional Conference on Machine Learning, volume 80, pages
1658
+ 1856–1865, 2018.
1659
+ [Haarnoja et al., 2018b] Tuomas Haarnoja, Aurick Zhou,
1660
+ Kristian Hartikainen, George Tucker, Sehoon Ha, Jie
1661
+ Tan, Vikash Kumar, Henry Zhu, Abhishek Gupta, Pieter
1662
+ Abbeel, and Sergey Levine. Soft actor-critic algorithms
1663
+ and applications. arXiv preprint, arXiv:1812.05905, 2018.
1664
+ [Katoh and Ibaraki, 1998] Naoki
1665
+ Katoh
1666
+ and
1667
+ Toshihide
1668
+ Ibaraki.
1669
+ Resource allocation problems.
1670
+ Handbook of
1671
+ combinatorial optimization, pages 905–1006, 1998.
1672
+ [Lee and Lee, 2005] Zne-Jung Lee and Chou-Yuan Lee. A
1673
+ hybrid search algorithm with heuristics for resource allo-
1674
+ cation problem. Information sciences, 173(1-3):155–167,
1675
+ 2005.
1676
+ [Nair et al., 2018] Arun Sukumaran Nair, Tareq Hossen,
1677
+ Mitch Campion, Daisy Flora Selvaraj, Neena Goveas,
1678
+ Naima Kaabouch, and Prakash Ranganathan. Multi-agent
1679
+ systems for resource allocation and scheduling in a smart
1680
+ grid. Technology and Economics of Smart Grids and Sus-
1681
+ tainable Energy, 3(1):1–15, 2018.
1682
+ [Patriksson, 2008] Michael Patriksson. A survey on the con-
1683
+ tinuous nonlinear resource allocation problem. European
1684
+ Journal of Operational Research, 185(1):1–46, 2008.
1685
+ [Sinclair et al., 2020] Sean R Sinclair, Gauri Jain, Sid-
1686
+ dhartha Banerjee, and Christina Lee Yu. Sequential fair
1687
+ allocation of limited resources under stochastic demands.
1688
+ arXiv preprint arXiv:2011.14382, 2020.
1689
+ [Sinclair et al., 2022] Sean R Sinclair, Siddhartha Banerjee,
1690
+ and Christina Lee Yu. Sequential fair allocation: Achiev-
1691
+ ing the optimal envy-efficiency tradeoff curve. In Abstract
1692
+ Proceedings of the 2022 ACM SIGMETRICS/IFIP PER-
1693
+ FORMANCE Joint International Conference on Measure-
1694
+ ment and Modeling of Computer Systems, pages 95–96,
1695
+ 2022.
1696
+ [Sinha and Anastasopoulos, 2015] Abhinav
1697
+ Sinha
1698
+ and
1699
+ Achilleas Anastasopoulos.
1700
+ Mechanism design for fair
1701
+ allocation.
1702
+ In 2015 53rd Annual Allerton Conference
1703
+ on Communication, Control, and Computing (Allerton),
1704
+ pages 467–473. IEEE, 2015.
1705
+ [Tan et al., 2020] Xiaoqi Tan, Bo Sun, Alberto Leon-Garcia,
1706
+ Yuan Wu, and Danny HK Tsang. Mechanism design for
1707
+ online resource allocation: A unified approach. Proceed-
1708
+ ings of the ACM on Measurement and Analysis of Comput-
1709
+ ing Systems, 4(2):1–46, 2020.
1710
+ [Tesauro and others, 2005] Gerald Tesauro et al.
1711
+ Online
1712
+ resource allocation using decompositional reinforcement
1713
+ learning. In AAAI, volume 5, pages 886–891, 2005.
1714
+ [Varian, 1973] Hal R Varian. Equity, envy, and efficiency.
1715
+ 1973.
1716
+ [Wang et al., 2017] Lin Wang, Lei Jiao, Jun Li, and Max
1717
+ M¨uhlh¨auser. Online resource allocation for arbitrary user
1718
+ mobility in distributed edge clouds. In 2017 IEEE 37th In-
1719
+ ternational Conference on Distributed Computing Systems
1720
+ (ICDCS), pages 1281–1290. IEEE, 2017.
1721
+ [Wang et al., 2018] Jun-Bo Wang, Junyuan Wang, Yongpeng
1722
+ Wu, Jin-Yuan Wang, Huiling Zhu, Min Lin, and Jiangzhou
1723
+ Wang.
1724
+ A machine learning framework for resource al-
1725
+ location assisted by cloud computing.
1726
+ IEEE Network,
1727
+ 32(2):144–151, 2018.
1728
+ [Wong et al., 2004] Ian C Wong, Zukang Shen, Brian L
1729
+ Evans, and Jeffrey G Andrews. A low complexity algo-
1730
+ rithm for proportional resource allocation in ofdma sys-
1731
+
1732
+ tems.
1733
+ In IEEE Workshop onSignal Processing Systems,
1734
+ 2004. SIPS 2004., pages 1–6. IEEE, 2004.
1735
+ [Xu et al., 2021] Yongjun Xu, Guan Gui, Haris Gacanin, and
1736
+ Fumiyuki Adachi. A survey on resource allocation for 5g
1737
+ heterogeneous networks: Current research, future trends,
1738
+ and challenges. IEEE Communications Surveys & Tutori-
1739
+ als, 23(2):668–695, 2021.
1740
+ [Yi et al., 2016] Peng Yi, Yiguang Hong, and Feng Liu.
1741
+ Initialization-free distributed algorithms for optimal re-
1742
+ source allocation with feasibility constraints and applica-
1743
+ tion to economic dispatch of power systems. Automatica,
1744
+ 74:259–269, 2016.
1745
+ [Zhao et al., 2015] Dan Zhao, Chuan Huang, Yue Chen,
1746
+ Fuad Alsaadi, and Shuguang Cui.
1747
+ Resource allocation
1748
+ for multiple access channel with conferencing links and
1749
+ shared renewable energy sources. IEEE Journal on Se-
1750
+ lected Areas in Communications, 33(3):423–437, 2015.
1751
+
1752
+ Sequential Fair Resource Allocation under a Markov Decision
1753
+ Process Framework
1754
+ Supplementary Materials
1755
+ A
1756
+ Existence of Optimal Policy
1757
+ The state space of the MDP is continuous, the action space
1758
+ is continuous and state-dependent, and the reward is bounded
1759
+ and continuous due to the constant ϵ in Eq. (9). As a result of
1760
+ [Furukawa, 1972][Theorem 4.2], a stationary optimal policy
1761
+ π⋆ = (π⋆
1762
+ 1, . . . , π⋆
1763
+ T ) is known to exist.
1764
+ If we restrict the action space to allocations that satisfy
1765
+ At
1766
+ i ≤ Xt
1767
+ i for all i and t, the reward at step t (8) becomes
1768
+ Rt(st, At) =
1769
+ N
1770
+
1771
+ i=1
1772
+ 1{Xt
1773
+ i > 0} . wi
1774
+
1775
+ log( �At−1
1776
+ i
1777
+ + At
1778
+ i + ϵ) − log( �At−1
1779
+ i
1780
+ + ϵ)
1781
+
1782
+ ,
1783
+ (24)
1784
+ where �At
1785
+ i := �t
1786
+ τ=1 Aτ
1787
+ i denotes the cumulative allocated re-
1788
+ sources to agent i till time t. At time step T, π⋆
1789
+ T maximizes
1790
+ QT (sT , AT ) = RT (sT , AT ) which does not depend on fu-
1791
+ ture allocations. The optimal allocation AT ⋆ can be directly
1792
+ computed from QT since there is no uncertainty about future
1793
+ demands. Then, the optimal policy for all t can be derived by
1794
+ recursively solving (11) backward in time. This quickly be-
1795
+ comes computationally intractable, which motivates us to find
1796
+ alternative solutions that trade-off sub-optimality for compu-
1797
+ tational efficiency.
1798
+ B
1799
+ Water-Filling Algorithm with Past
1800
+ Allocations
1801
+ Algorithm 3 extends the water-filling algorithm presented in
1802
+ Algorithm 1 for agents with different weights to a setting
1803
+ where each agent may have past allocations denoted by A0.
1804
+ This algorithm is used as a base algorithm in SAFFE (Al-
1805
+ gorithm 2) to compute the allocations during each time step
1806
+ based on past allocations, and current and expected future de-
1807
+ mands. In line 3, the agents are ordered according to their
1808
+ demands, past allocations and weights.
1809
+ This ordering de-
1810
+ termines which agent is used to compute the water-level µ.
1811
+ For each selected agent ij, the condition in line 6 determines
1812
+ whether there is enough budget to fully satisfy agent ij’s de-
1813
+ mand Xij. If there is enough budget, agent ij receives its
1814
+ full request (line 10) and the supplier moves on to the next
1815
+ agent in order. Otherwise, the available budget is fully di-
1816
+ vided among the remaining agents (line 8) according to a
1817
+ water-level µ computed in line 7. The water-level accounts
1818
+ for the agent’s past allocations as well as their weights.
1819
+ C
1820
+ SAFFE-D vs SAFFE-Oracle
1821
+ Lemma 1 (Chebyshev’s inequality). For a random variable
1822
+ Y with finite expectation and a finite non-zero variance, we
1823
+ Algorithm 3 Water-Filling Algorithm with Past Allocations
1824
+ 1: Input: number of agents N, resource budget B, demand
1825
+ vector X ∈ RN, weight vector w ∈ RN, past allocations
1826
+ A0 ∈ RN
1827
+ 2: Output: allocation vector A ∈ RN
1828
+ 3: Find an ordered index set {i1, . . . , iN} by sorting the
1829
+ agents such that
1830
+ Xi1+A0
1831
+ i1
1832
+ wi1
1833
+ ≤ · · · ≤
1834
+ XiN +A0
1835
+ iN
1836
+ wiN
1837
+ 4: j ← 1
1838
+ 5: while j ≤ N and B > 0 do
1839
+ 6:
1840
+ if B ≤ �N
1841
+ k=j
1842
+ � wik
1843
+ wij (Xij + A0
1844
+ ij) − A0
1845
+ ik
1846
+ �+
1847
+ then
1848
+ 7:
1849
+ Solve �N
1850
+ k=j(
1851
+ wik
1852
+ wij µ − A0
1853
+ ij)+ = B for µ
1854
+ 8:
1855
+ Aik = (
1856
+ wik
1857
+ wij µ − A0
1858
+ ij)+ for k = j, . . . , N
1859
+ 9:
1860
+ break
1861
+ 10:
1862
+ else
1863
+ 11:
1864
+ Aij = Xij
1865
+ 12:
1866
+ B ← B − Aij
1867
+ 13:
1868
+ j ← j + 1
1869
+ 14:
1870
+ end if
1871
+ 15: end while
1872
+ have
1873
+ P
1874
+
1875
+ |Y − E(Y )| ≥
1876
+ 1
1877
+ √ξ
1878
+
1879
+ Var(Y )
1880
+
1881
+ ≤ ξ
1882
+ In particular, under the assumption from Section 6.1 that
1883
+ agent i’s requests are i.i.d, Chebyshev’s inequality gives us
1884
+ that Eq. (21) holds with probability 1 − ξ. Note however that
1885
+ the assumption is not crucial, and in a more general case we
1886
+ would have
1887
+ Yt
1888
+ i = E[
1889
+ T
1890
+
1891
+ τ=t+1
1892
+
1893
+ i ] − 1
1894
+ √ξ
1895
+
1896
+
1897
+
1898
+ �Var
1899
+
1900
+ T
1901
+
1902
+ τ=t+1
1903
+
1904
+ i
1905
+
1906
+ and
1907
+ Y
1908
+ t
1909
+ i = E[
1910
+ T
1911
+
1912
+ τ=t+1
1913
+
1914
+ i ] + 1
1915
+ √ξ
1916
+
1917
+
1918
+
1919
+ �Var
1920
+
1921
+ T
1922
+
1923
+ τ=t+1
1924
+
1925
+ i
1926
+
1927
+ .
1928
+ See also Remark 3 on how the assumption on equal standard
1929
+ deviations std(Xτ
1930
+ i ) = std(Xτ
1931
+ j ) for any two agents i and j is
1932
+ not crucial for the analysis.
1933
+ We proceed as follows.
1934
+ First, we state the result for
1935
+ SAFFE-Oracle in the unbalanced demands regime, i.e. when
1936
+ there is an agent k such that Yt
1937
+ k ≥ Y
1938
+ t
1939
+ j for all j ̸= k. Then, we
1940
+
1941
+ state the result for the case of balanced demands, i.e. when
1942
+ Yt
1943
+ i = Yt
1944
+ j and Y
1945
+ t
1946
+ i = Y
1947
+ t
1948
+ j for any two i and j. Finally, we
1949
+ present the proof for both results.
1950
+ Lemma 2 (Unbalanced demands SAFFE-Oracle). Let A
1951
+ t
1952
+ i
1953
+ and At
1954
+ i denote the allocations of SAFFE-Oracle with Y t
1955
+ i =
1956
+ Y
1957
+ t
1958
+ i and Y t
1959
+ i = Yt
1960
+ i, respectively. Then for all agents i we have
1961
+ |A
1962
+ t
1963
+ i − At
1964
+ i| ≤
1965
+
1966
+
1967
+
1968
+
1969
+
1970
+
1971
+
1972
+
1973
+
1974
+
1975
+
1976
+
1977
+
1978
+
1979
+
1980
+ 2N
1981
+
1982
+ (T −t)
1983
+ ξ
1984
+ std(Xτ
1985
+ i )
1986
+ if Bt ≤
1987
+ N
1988
+
1989
+ i=1
1990
+ Yt
1991
+ i,
1992
+ 2N
1993
+
1994
+ (T −t)
1995
+ ξ
1996
+ std(Xτ
1997
+ i )
1998
+ if
1999
+ N
2000
+
2001
+ i=1
2002
+ Yt
2003
+ i ≤ Bt ≤
2004
+ N
2005
+
2006
+ i=1
2007
+ Y
2008
+ t
2009
+ i,
2010
+ 4
2011
+
2012
+ (T −t)
2013
+ ξ
2014
+ std(Xτ
2015
+ i )
2016
+ if Bt ≥
2017
+ N
2018
+
2019
+ i=1
2020
+ Y
2021
+ t
2022
+ i
2023
+ (25)
2024
+ Lemma 3 (Balanced demands SAFFE-Oracle). Let A
2025
+ t
2026
+ i and
2027
+ At
2028
+ i denote the allocations of SAFFE-Oracle with Y t
2029
+ i = Y
2030
+ t
2031
+ i
2032
+ and Y t
2033
+ i = Yt
2034
+ i, respectively. Then we have
2035
+ |A
2036
+ t
2037
+ i − At
2038
+ i| ≤
2039
+
2040
+
2041
+
2042
+
2043
+
2044
+
2045
+
2046
+
2047
+
2048
+
2049
+
2050
+
2051
+
2052
+
2053
+
2054
+ 0
2055
+ if Bt ≤
2056
+ N
2057
+
2058
+ i=1
2059
+ Yt
2060
+ i,
2061
+ 4
2062
+
2063
+ (T −t)
2064
+ ξ
2065
+ std(Xτ
2066
+ i )
2067
+ if
2068
+ N
2069
+
2070
+ i=1
2071
+ Yt
2072
+ i ≤ Bt ≤
2073
+ N
2074
+
2075
+ i=1
2076
+ Y
2077
+ t
2078
+ i,
2079
+ 4
2080
+
2081
+ (T −t)
2082
+ ξ
2083
+ std(Xτ
2084
+ i )
2085
+ if Bt ≥
2086
+ N
2087
+
2088
+ i=1
2089
+ Y
2090
+ t
2091
+ i
2092
+ (26)
2093
+ Proof of Lemma 2 and Lemma 3.
2094
+ Case Bt
2095
+
2096
+ �N
2097
+ n=1 Yt
2098
+ i.
2099
+ Agents whose lower bound
2100
+ demands are fully filled by the lower bound solution with
2101
+ Y t
2102
+ i
2103
+ = Yt
2104
+ i might increase the water-level when submitting
2105
+ larger demands, which will cause other agents to have smaller
2106
+ C
2107
+ t
2108
+ j in comparison to Ct
2109
+ j. In the worst-case scenario, where
2110
+ agent i’s lower bound demand is greater than all other agents’
2111
+ upper bound demands, the difference Ct
2112
+ i − C
2113
+ t
2114
+ i can be at most
2115
+
2116
+ j̸=i
2117
+
2118
+ Y
2119
+ t
2120
+ i − Yt
2121
+ i
2122
+
2123
+ ,
2124
+ i.e., agent i has to compensate for the excess demands of
2125
+ all other agents.
2126
+ If std(Xτ
2127
+ i ) is equal for all agents, the
2128
+ difference in the worst-case scenario is at most 2(N −
2129
+ 1)
2130
+
2131
+ (T −t)
2132
+ ξ
2133
+ std(Xτ
2134
+ i ), which leads to a difference between
2135
+ At
2136
+ i − A
2137
+ t
2138
+ i of at most 2N
2139
+
2140
+ (T −t)
2141
+ ξ
2142
+ std(Xτ
2143
+ i ) as a consequence
2144
+ of Lemma 4.
2145
+ On the other hand if instead of the worst-case scenario
2146
+ we assume that Y
2147
+ t
2148
+ i and Yt
2149
+ i are the same for all agents (e.g.
2150
+ same demand distributions), then the water-level would not
2151
+ move in SAFFE using Y t
2152
+ i = Y
2153
+ t
2154
+ i in comparison to SAFFE
2155
+ using Y t
2156
+ i = Yt
2157
+ i, and thus there would be no change in the
2158
+ allocations resulting from the two problems.
2159
+ Case �N
2160
+ n=1 Yt
2161
+ i ≤ Bt ≤ �N
2162
+ n=1 Y
2163
+ t
2164
+ i.
2165
+ There is enough
2166
+ budget to satisfy all agents’ demands under the lower bound
2167
+ constraint but not eoug budget under the upper bound one.
2168
+ Compared to Ct
2169
+ i, in the worst-case scenario, C
2170
+ t
2171
+ i can decrease
2172
+ by at most
2173
+
2174
+ j̸=i
2175
+ Y
2176
+ t
2177
+ i −
2178
+
2179
+ j̸=i
2180
+ Yt
2181
+ i
2182
+ where agent i’s lower bound demand is larger than any other
2183
+ agents’ upper bound demands, and therefore, the water-filling
2184
+ algorithm will satisfy the upper bound demands of all other
2185
+ agents on the account of agent i. If all agents have equal
2186
+ std(Xτ
2187
+ i ), in the worst-case scenario, the difference is again at
2188
+ most 2(N − 1)
2189
+
2190
+ (T −t)
2191
+ ξ
2192
+ std(Xτ
2193
+ i ). Following Lemma 4, this
2194
+ leads to a difference of at most 2N
2195
+
2196
+ (T −t)
2197
+ ξ
2198
+ std(Xτ
2199
+ i ) between
2200
+ At
2201
+ i and A
2202
+ t
2203
+ i.
2204
+ On the other hand, if we assume that �
2205
+ j̸=i Y
2206
+ t
2207
+ i and
2208
+
2209
+ j̸=i Yt
2210
+ i are the same for all agents, then all agents will re-
2211
+ ceive an equal share of the surplus, i.e. the difference between
2212
+ Ct
2213
+ i and C
2214
+ t
2215
+ i becomes
2216
+ 1
2217
+ N
2218
+
2219
+ �Bt −
2220
+
2221
+ j̸=i
2222
+ Yt
2223
+ i
2224
+
2225
+ � .
2226
+ Given that Bt ≤ �N
2227
+ n=1 Y
2228
+ t
2229
+ i, and due to (21), this is at most
2230
+ 2
2231
+
2232
+ (T −t)
2233
+ ξ
2234
+ std(Xτ
2235
+ i ). As a consequence of Lemma 4, this leads
2236
+ to difference of at most 4
2237
+
2238
+ (T −t)
2239
+ ξ
2240
+ std(Xτ
2241
+ i ) between At
2242
+ i and
2243
+ A
2244
+ t
2245
+ i.
2246
+ Case �N
2247
+ n=1 Y
2248
+ t
2249
+ i ≤ Bt.
2250
+ There is enough budget to sat-
2251
+ isfy all agents’ demands even under the upper bound, so the
2252
+ difference between C
2253
+ t
2254
+ i and Ct
2255
+ i is purely driven by the differ-
2256
+ ence between lower and upper bound demands, i.e. it equals
2257
+ Y
2258
+ t
2259
+ i − Yt
2260
+ i which is 2
2261
+
2262
+ (T −t)
2263
+ ξ
2264
+ std(Xτ
2265
+ n). Following Lemma 4,
2266
+ this leads to a difference of at most 4
2267
+
2268
+ (T −t)
2269
+ ξ
2270
+ std(Xt′
2271
+ i ) be-
2272
+ tween At
2273
+ i and A
2274
+ t
2275
+ i.
2276
+ Lemma 4. If |C
2277
+ t
2278
+ i − Ct
2279
+ i| ≤ D, then we have
2280
+ |A
2281
+ t
2282
+ i − At
2283
+ i| ≤ D + 2
2284
+
2285
+ (T − t)
2286
+ ξ
2287
+ std(Xτ
2288
+ i ).
2289
+ Proof. Firstly, let us note that
2290
+ Xt
2291
+ iC
2292
+ t
2293
+ iYt
2294
+ i − Xt
2295
+ iCt
2296
+ iY
2297
+ t
2298
+ i = Xt
2299
+ iYt
2300
+ i(C
2301
+ t
2302
+ i − Ct
2303
+ i) + Xt
2304
+ iCt
2305
+ iYt
2306
+ i
2307
+ − Xt
2308
+ iCt
2309
+ iYt
2310
+ i − Xt
2311
+ iCt
2312
+ i
2313
+
2314
+ Y
2315
+ t
2316
+ i − Yt
2317
+ i
2318
+
2319
+
2320
+ and hence we have
2321
+ ���Xt
2322
+ iC
2323
+ t
2324
+ iYt
2325
+ i − Xt
2326
+ iCt
2327
+ iY
2328
+ t
2329
+ i
2330
+ ��� ≤ Xt
2331
+ iYt
2332
+ i
2333
+ ���C
2334
+ t
2335
+ i − Ct
2336
+ i
2337
+ ��� + Xt
2338
+ iCt
2339
+ i
2340
+ ���Y
2341
+ t
2342
+ i − Yt
2343
+ i
2344
+ ���
2345
+ ≤ Xt
2346
+ iYt
2347
+ i · D + 2Xt
2348
+ iCt
2349
+ i
2350
+
2351
+ T − t
2352
+ ξ
2353
+ std(Xτ
2354
+ i )
2355
+ ≤ Xt
2356
+ iYt
2357
+ i
2358
+
2359
+ D + 2
2360
+
2361
+ T − t
2362
+ ξ
2363
+ std(Xτ
2364
+ i )
2365
+
2366
+ where in the last inequality we use Ct
2367
+ i ≤ Yt
2368
+ i.
2369
+ Thus
2370
+ |A
2371
+ t
2372
+ i − At
2373
+ i| =
2374
+ �����
2375
+ Xt
2376
+ iC
2377
+ t
2378
+ i
2379
+ Y
2380
+ t
2381
+ i
2382
+ − Xt
2383
+ iCt
2384
+ i
2385
+ Yt
2386
+ i
2387
+ �����
2388
+ =
2389
+ �����
2390
+ Xt
2391
+ iC
2392
+ t
2393
+ iYt
2394
+ i − Xt
2395
+ iCt
2396
+ iY
2397
+ t
2398
+ i
2399
+ Y
2400
+ t
2401
+ iYt
2402
+ i
2403
+ �����
2404
+
2405
+ (D + 2
2406
+
2407
+ (T −t)
2408
+ ξ
2409
+ std(Xτ
2410
+ i ))Xt
2411
+ i
2412
+ Y
2413
+ t
2414
+ i
2415
+ ≤ D + 2
2416
+
2417
+ (T − t)
2418
+ ξ
2419
+ std(Xτ
2420
+ i )
2421
+ Remark 3. The equal standard deviation assumption that for
2422
+ any two agents i and j, we have std(Xτ
2423
+ i ) = std(Xτ
2424
+ j ) is
2425
+ used in the proofs only to simplify �
2426
+ j̸=i std(Xτ
2427
+ j ) = (N −
2428
+ 1) std(Xτ
2429
+ j ). Thus, the assumption can be removed.
2430
+ D
2431
+ SAFFE-Oracle Matches hindsight
2432
+ Lemma 5. At t=1, the solution C1,oracle
2433
+ i
2434
+ to the SAFFE-Oracle
2435
+ problem coincides with the solution ˜Ai to the Eisenber-Gale
2436
+ program (12) i.e. C1,oracle
2437
+ i
2438
+ = �
2439
+ Ai.
2440
+ Proof. At t = 1, SAFFE-Oracle solves the following prob-
2441
+ lem
2442
+ max
2443
+ {C1
2444
+ i }
2445
+
2446
+ i:�T
2447
+ t=1 Xt
2448
+ i >0
2449
+ log(C1
2450
+ i )
2451
+ s.t. 0 ≤ C1
2452
+ i ≤
2453
+ T
2454
+
2455
+ t=1
2456
+ Xt
2457
+ i,
2458
+ N
2459
+
2460
+ n=1
2461
+ C1
2462
+ i ≤ B.
2463
+ This is equivalent to problem (12) with Ai = C1
2464
+ i , and hence,
2465
+ we have C1,oracle
2466
+ i
2467
+ = ˜Ai.
2468
+ Lemma 6. With SAFFE-Oracle, for any agent i we have
2469
+ C1,oracle
2470
+ i
2471
+ =
2472
+ T
2473
+
2474
+ t=1
2475
+ At,oracle
2476
+ i
2477
+ i.e. its future allocation from the first round is allocated in
2478
+ full by the end of the T th round.
2479
+ Proof. First, we prove that for t = 2, . . . , T we have
2480
+ t−1
2481
+
2482
+ τ=1
2483
+ Aτ,oracle
2484
+ i
2485
+ + Ct,oracle
2486
+ i
2487
+ =
2488
+ t−2
2489
+
2490
+ τ=1
2491
+ Aτ,oracle
2492
+ i
2493
+ + Ct−1,oracle
2494
+ i
2495
+ i.e. the past plus future allocation from the previous step is
2496
+ preserved in the following step. Recall that in each step we
2497
+ are solving
2498
+ max
2499
+ {Ct
2500
+ i }
2501
+
2502
+ i:�T
2503
+ τ=t Xτn>0
2504
+ log(
2505
+ t−1
2506
+
2507
+ τ=1
2508
+ Aτ,oracle
2509
+ i
2510
+ + Ct
2511
+ i)
2512
+ (27)
2513
+ s.t. 0 ≤ Ct
2514
+ i ≤
2515
+ T
2516
+
2517
+ τ=t
2518
+
2519
+ i ,
2520
+ N
2521
+
2522
+ n=1
2523
+ Ct
2524
+ i ≤ Bt.
2525
+ where the sequence of future demands is known to the oracle.
2526
+ It is easy to see that
2527
+ t−1
2528
+
2529
+ τ=1
2530
+ Aτ,oracle
2531
+ i
2532
+ + Ct,oracle
2533
+ i
2534
+
2535
+ t−2
2536
+
2537
+ τ=1
2538
+ Aτ,oracle
2539
+ i
2540
+ + Ct−1,oracle
2541
+ i
2542
+ because the constraints in step t are tighter. If this didn’t
2543
+ hold, the previous round solution Ct−1,oracle
2544
+ i
2545
+ would not be
2546
+ the maximizing solution in step t − 1. It remains to note
2547
+ that �t−1
2548
+ τ=1 Aτ,oracle
2549
+ i
2550
+ + Ct,oracle
2551
+ i
2552
+ can achieve its upper bound,
2553
+ because compared to the previous step t − 1, the remaining
2554
+ budget was reduced by exactly
2555
+ N
2556
+
2557
+ n=1
2558
+ �t−1
2559
+
2560
+ τ=1
2561
+ Aτ,oracle
2562
+ i
2563
+
2564
+ t−2
2565
+
2566
+ τ=1
2567
+ Aτ,oracle
2568
+ i
2569
+
2570
+ .
2571
+ Therefore,
2572
+ Ct,oracle
2573
+ i
2574
+ = Ct−1,oracle
2575
+ i
2576
+
2577
+ �t−1
2578
+
2579
+ τ=1
2580
+ Aτ,oracle
2581
+ i
2582
+
2583
+ t−2
2584
+
2585
+ τ=1
2586
+ Aτ,oracle
2587
+ i
2588
+
2589
+ satisifes the constraints.
2590
+ This means that Ct,oracle
2591
+ i
2592
+ =
2593
+ Ct−1,oracle
2594
+ i
2595
+ − At−1,oracle
2596
+ i
2597
+ , i.e., the current plus future alloca-
2598
+ tion in step t equals its counterpart in step t − 1 minus the
2599
+ allocation in step t − 1. In particular, we get
2600
+ C2,oracle
2601
+ i
2602
+ = C1,oracle
2603
+ i
2604
+ − A1,oracle
2605
+ i
2606
+ (28)
2607
+ = C1,oracle
2608
+ n
2609
+
2610
+ X1
2611
+ i
2612
+ �T
2613
+ τ=1 Xτ
2614
+ i
2615
+ C1,oracle
2616
+ i
2617
+ (29)
2618
+ =
2619
+
2620
+ 1 −
2621
+ X1
2622
+ n
2623
+ �T
2624
+ τ=1 Xτn
2625
+
2626
+ C1,oracle
2627
+ i
2628
+ ,
2629
+ (30)
2630
+ C3,oracle
2631
+ i
2632
+ = C2,oracle
2633
+ i
2634
+ − A2,oracle
2635
+ i
2636
+ (31)
2637
+ =
2638
+
2639
+ 1 −
2640
+ X2
2641
+ n
2642
+ �T
2643
+ τ=2 Xτn
2644
+
2645
+ C2,oracle
2646
+ i
2647
+ (32)
2648
+ =
2649
+
2650
+ 1 −
2651
+ X2
2652
+ n
2653
+ �T
2654
+ τ=2 Xτn
2655
+ � �
2656
+ 1 −
2657
+ X1
2658
+ n
2659
+ �T
2660
+ τ=1 Xτn
2661
+
2662
+ C1,oracle
2663
+ i
2664
+ (33)
2665
+
2666
+ and in general we have
2667
+ Ct,oracle
2668
+ i
2669
+ =
2670
+
2671
+ 1 −
2672
+ Xt−1
2673
+ i
2674
+ �T
2675
+ τ=t−1 Xτ
2676
+ i
2677
+
2678
+ · · ·
2679
+
2680
+ 1 −
2681
+ X1
2682
+ i
2683
+ �T
2684
+ τ=1 Xτ
2685
+ i
2686
+
2687
+ C1,oracle
2688
+ i
2689
+ (34)
2690
+ and
2691
+ At,oracle
2692
+ n
2693
+ =
2694
+
2695
+ 1 −
2696
+ Xt−1
2697
+ i
2698
+ �T
2699
+ τ=t−1 Xτ
2700
+ i
2701
+
2702
+ · · ·
2703
+
2704
+ 1 −
2705
+ X1
2706
+ i
2707
+ �T
2708
+ τ=1 Xτ
2709
+ i
2710
+
2711
+ Xt
2712
+ i
2713
+ �T
2714
+ τ=t Xτ
2715
+ i
2716
+ C1,oracle
2717
+ i
2718
+ (35)
2719
+ Proof of Theorem 3. As a consequence of Lemmas 5 and 6,
2720
+ we have ˜At
2721
+ i = �T
2722
+ t=1 At,oracle
2723
+ i
2724
+ for every i. This completes the
2725
+ proof.
2726
+ E
2727
+ SAFFE as a generalization of HOPE-Online
2728
+ The heuristic algorithm HOPE-Online in [Sinclair et al.,
2729
+ 2020] coincides with SAFFE under a simplified demand pro-
2730
+ cess. HOPE-Online is designed for a setting where the sup-
2731
+ plier visits a set of agents sequentially in order. SAFFE gen-
2732
+ eralizes the allocation algorithm to a setup where agents can
2733
+ arrive simultaneously and several times over the horizon T.
2734
+ Similar to SAFFE-D which improves SAFFE using the un-
2735
+ certainty of future demand estimates, Guarded-HOPE pro-
2736
+ posed in [Sinclair et al., 2022] improves HOPE-Online and
2737
+ achieves the correct trade-off between a measure of fairness
2738
+ (envy-freeness) and resource leftover by learning a “lower
2739
+ guardrail” on the optimal solution in hindsight. We highlight
2740
+ that Guarded-HOPE is designed for the setting where agents
2741
+ are not making repeated demands over the horizon i.e. each
2742
+ individual agent has a request at most once during the hori-
2743
+ zon. In that sense, our SAFFE and SAFFE-D represent gen-
2744
+ eralizations as we allow for agents with multiple demands. In
2745
+ our analysis of the optimality of SAFFE-D, we rely on con-
2746
+ centration inequalities for deviation of future demands from
2747
+ their expected values, which is in spirit similar to the opti-
2748
+ mality analysis of the guardrail approach in [Sinclair et al.,
2749
+ 2022].
2750
+ F
2751
+ Extension of Guarded-HOPE to Our
2752
+ Setting
2753
+ Since Guarded-HOPE was designed for a setting where in
2754
+ each time-step a number of individuals of the same type ar-
2755
+ rive, we slightly modify it to be applicable to our setting in Al-
2756
+ gorithm 4. The key components of the algorithm are the upper
2757
+ and lower guardrails defined in lines 7 and 10. Specifically,
2758
+ X, X ∈ RN are high-confidence lower and upper bounds on
2759
+ the future demands, and A, A ∈ RN, which [Sinclair et al.,
2760
+ 2020] refers to as upper and lower guardrails, respectively,
2761
+ are the optimal hindsight allocations under X, X. When the
2762
+ demands Xt are revealed in time step t, the condition in line
2763
+ 13 first checks if the budget is insufficient to even allow an
2764
+ allocation according to the lower guardrail. If so, the budget
2765
+ is allocated right away and none is reserved. The condition
2766
+ in line 15 checks if the current demands can be allocated ac-
2767
+ cording to the upper guardrail assuming that the remaining
2768
+ budget is still enough to allow for allocations according to
2769
+ the lower guardrail for anticipated future demands. If so, the
2770
+ the upper guardrail is allocated to the agents with demands at
2771
+ the current step. Otherwise, the lower guardrail is allocated.
2772
+ Algorithm 4 Guarded-HOPE (Modified Compared to [Sin-
2773
+ clair et al., 2022])
2774
+ 1: Input: number of agents N, resource budget B, de-
2775
+ mand vectors X1, . . . XT ∈ RN, demand distributions
2776
+ PX1, . . . , PXN , bound on envy LT
2777
+ 2: Output: allocation vectors A1, . . . , AT ∈ RN
2778
+ 3: Define
2779
+ confidence
2780
+ bound
2781
+ CONFi
2782
+ =
2783
+
2784
+ std(X1
2785
+ i )E[X1
2786
+ i ](T − 1)
2787
+ 4: EXi := �T
2788
+ τ=1 E[Xτ
2789
+ i ]
2790
+ 5: ci = Lt(1 + CONFt
2791
+ i/EXi) − CONFt
2792
+ i/EXi for all i =
2793
+ 1, . . . , N
2794
+ 6: Solve A for X := EX(1 − c) using Algorithm 1
2795
+ 7: Ai ← Ai/Xi
2796
+ 8: γi = CONFt
2797
+ i/EXi
2798
+ 9: Solve A for X := EX(1 + γ) using Algorithm 1
2799
+ 10: Ai ← Ai/Xi
2800
+ 11: for For t = 1, . . . , T do
2801
+ 12:
2802
+ Define
2803
+ confidence
2804
+ bound
2805
+ CONFt
2806
+ i
2807
+ =
2808
+
2809
+ std(Xt
2810
+ i)E[Xt
2811
+ i](T − t)
2812
+ 13:
2813
+ if B ≤ �N
2814
+ i=1 Xt
2815
+ iAi then
2816
+ 14:
2817
+ At
2818
+ i = 1{Xt
2819
+ i > 0} × B/
2820
+ � �N
2821
+ i=1 1{Xt
2822
+ i > 0}
2823
+
2824
+ for
2825
+ i = 1, . . . , N
2826
+ 15:
2827
+ else if B ≥ �N
2828
+ i=1 Xt
2829
+ iAi + �N
2830
+ i=1 Ai
2831
+
2832
+ E[�T
2833
+ τ=t Xτ
2834
+ i ] +
2835
+ CONFt
2836
+ i
2837
+
2838
+ then
2839
+ 16:
2840
+ At
2841
+ i = 1{Xt
2842
+ i > 0} × Xt
2843
+ iAi for i = 1, . . . , N
2844
+ 17:
2845
+ else
2846
+ 18:
2847
+ At
2848
+ i = 1{Xt
2849
+ i > 0} × Xt
2850
+ iAi for i = 1, . . . , N
2851
+ 19:
2852
+ end if
2853
+ 20:
2854
+ B ← B − �N
2855
+ i=1 At
2856
+ i
2857
+ 21: end for
2858
+ G
2859
+ Additional Experiments
2860
+ G.1
2861
+ Scaling System Parameters
2862
+ SAFFE-D is compared to the baselines in terms of utilization
2863
+ and fairness metrics in Fig. 4, as different system parame-
2864
+ ters vary. Unless otherwise stated, the settings have N = 50
2865
+ agents, budget size 0.5, time horizon T = 40, and there are
2866
+ 2 expected arrivals per-agent. In all experiments, we observe
2867
+ that SAFFE-D is more efficient and more fair compared to
2868
+ other methods, i.e., it achieves higher utilization, and lower
2869
+ ∆Log-NSW, ∆Amean and ∆Amax. In Fig. 4a, we observe
2870
+ that as the number of agents increases over the same horizon,
2871
+ the algorithms initially achieve higher utilization and lower
2872
+ ∆Log-NSW, which eventually levels out. However, in terms
2873
+
2874
+ of ∆Amax fairness which measures the allocation difference
2875
+ with respect to hindsight for the worst agent, SAFEE-D is
2876
+ the least affected across different number of agents, while all
2877
+ other algorithms become worse. Fig. 4b shows the metrics
2878
+ for varying horizon T while having the same number of ex-
2879
+ pected arrivals, i.e., when the arrivals are more spread out
2880
+ across time. In this setting, utilization and fairness metrics
2881
+ seem relatively unaffected across all methods.
2882
+ In Fig. 4c, we compare the algorithms as the number of
2883
+ arrivals over the horizon increases. We observe that SAFFE-
2884
+ D is able to use all the budget and match the fair hindsight
2885
+ allocations when it is expected to have more than 5 arrivals
2886
+ per-agent over T = 40. SAFFE is able to match the perfor-
2887
+ mance of SAFFE-D in terms of utilization and ∆Log-NSW
2888
+ as the arrivals become denser. As discussed in Appendix E,
2889
+ HOPE-Online and Guarded-HOPE are designed for settings
2890
+ with a single per-agent arrival. As expected, when there are
2891
+ several arrivals per agents, they are not able to match SAFFE-
2892
+ D or SAFFE since they do not account for an agent’s past
2893
+ allocations when distributing the budget.
2894
+ G.2
2895
+ Non-Symmetric Demands
2896
+ Fig. 5 shows how SAFFE-D compares to other baselines in
2897
+ terms of allocations using the Non-symmetric Demands Set-
2898
+ ting, where some agents request larger demands earlier, while
2899
+ others have larger requests later or have no preference. We
2900
+ observe that SAFFE-D and SAFFE achieve lower ∆Amean,
2901
+ and have low variability across the groups on average. When
2902
+ considering the worst-case agent, SAFFE-D is less fair to
2903
+ agents that have larger demands earlier in the horizon, as it
2904
+ reserves the budget early on accounting for future expected
2905
+ demands. However, Uniform and More-Late agents receive
2906
+ allocations closer to hindsight compared to other algorithms.
2907
+ G.3
2908
+ Real Data
2909
+ In order to study how SAFFE-D performs on real data with
2910
+ sparser arrivals over the horizon, we enforce less per-agent
2911
+ requests by erasing each arrival with probability p.
2912
+ Since
2913
+ T = 7, setting p = 2
2914
+ 7 corresponds to two weekly demands
2915
+ per store. As observed from Fig. 6, SAFFE-D outperforms
2916
+ the other methods in terms of efficiency and fairness. We re-
2917
+ mark that while with the uniform random erasures, we have
2918
+ imposed Bernoulli arrivals similar to the demand processes
2919
+ described in Sec. 7, the results presented here are based on
2920
+ the real demand sizes and reflect using imperfect estimates
2921
+ that are computed based on real data. However, further ex-
2922
+ periments on real datasets are needed to compare the perfor-
2923
+ mance of SAFFE-D under more general arrival processes that
2924
+ are correlated across time.
2925
+ H
2926
+ Training of Reinforcement Learning Policy
2927
+ We
2928
+ implement
2929
+ a
2930
+ variation
2931
+ of
2932
+ the
2933
+ Soft
2934
+ Actor-Critic
2935
+ method [Haarnoja et al., 2018a] with clipped double-Q learn-
2936
+ ing [Achiam, 2018] as well as automatic entropy [Haarnoja
2937
+ et al., 2018b] tuning.
2938
+ We train the SAC policy for 100K
2939
+ episodes for 5 random seeds, and then evaluate the 5 check-
2940
+ points under another 200 rollouts in order to compare with
2941
+ other baselines. We report the average performance with one
2942
+ standard deviation over the four metrics of Log-NSW, Uti-
2943
+ lization, ∆Amean and ∆Amax in Table 2.
2944
+ The policy network architecture consists of three Fully
2945
+ Connected (FC) layers followed by one output layer, where
2946
+ each FC layer has 256 neurons with ReLU activation func-
2947
+ tions.
2948
+ Since the MDP state is time dependent, to pre-
2949
+ vent the input state vector size from growing over the time
2950
+ horizon T during training, we represent the state vector as
2951
+ ⟨ �Xt, �At, Bt, t⟩, where
2952
+
2953
+ Xt
2954
+ i =
2955
+ t
2956
+
2957
+ τ=1
2958
+
2959
+ i ,
2960
+ �At
2961
+ i =
2962
+ t
2963
+
2964
+ τ=1
2965
+
2966
+ i .
2967
+ We guarantee the step-wise budget constraint �N
2968
+ i=1 At
2969
+ i ≤
2970
+ Bt, by designing the output layer to have two heads: one head
2971
+ with a Sigmoid activation function, which outputs a scalar de-
2972
+ termining the step-wise budget utilization ratio ut ∈ [0, 1];
2973
+ and another head with a Softmax activation function, which
2974
+ outputs an allocation ratio vector, zt ∈ RN : �N
2975
+ i=1 zt
2976
+ i = 1
2977
+ over the agents. The final allocation for each agent is deter-
2978
+ mined by At
2979
+ i = zt
2980
+ iutBt.
2981
+ We perform hyper-parameter tuning using a grid search
2982
+ over a set of candidates. The results in Table 2 are achieved
2983
+ by using the hyper-parameters summarized in Table 4.
2984
+ Table 4: SAC Hyper-parameters used in experiments.
2985
+ Parameter
2986
+ Sparse
2987
+ Dense
2988
+ (2 arrivals)
2989
+ (4 arrivals)
2990
+ Learning rate
2991
+ 3 · 10−4
2992
+ 3 · 10−4
2993
+ Replay-buffer size
2994
+ 8 · 105
2995
+ 106
2996
+ Batch size
2997
+ 512
2998
+ 512
2999
+ Target smoothing coefficient(τ)
3000
+ 0.005
3001
+ 0.005
3002
+ Update interval (step)
3003
+ 5
3004
+ 1
3005
+ Update after (step)
3006
+ 105
3007
+ 5 · 105
3008
+ Uniform-random action selection (step)
3009
+ 105
3010
+ 5 · 105
3011
+ I
3012
+ Multiple-Resource Setting
3013
+ The setting in this paper can be easily extended to the sup-
3014
+ plier having M divisible resources, where resource j
3015
+
3016
+ {1, . . . , M} has a limited budget of size Bj, and B =
3017
+ (B1, . . . , BM). At time t ∈ {1, . . . , T}, agent i’s demands
3018
+ i denoted by Xt
3019
+ i = (Xt
3020
+ i,1, . . . , Xt
3021
+ i,M) ∈ RM, and the sup-
3022
+ plier’s allocation is At
3023
+ i = (At
3024
+ i,1, . . . , At
3025
+ i,M) ∈ RM.
3026
+ For
3027
+ multiple resources, Θi = (X1
3028
+ i,j, . . . , XT
3029
+ i,j, Vi), where Vi =
3030
+ (vi,1, . . . , vi,M) denotes the per-unit value that agent i asso-
3031
+ ciates to each resource,
3032
+ u(Ai, Θi) =
3033
+ T
3034
+
3035
+ t=1
3036
+ M
3037
+
3038
+ j=1
3039
+ vi,j min
3040
+
3041
+ At
3042
+ i,j, Xt
3043
+ i,j
3044
+
3045
+ (36)
3046
+ While we present the paper in terms of a single resource, all
3047
+ algorithms and proofs can be extend to the multiple-resource
3048
+ setting. In this case, the optimal allocation in hindsight or the
3049
+ sequential setting will not have closed-form solutions as in
3050
+ the water-filling algorithm, but can be computed using convex
3051
+ optimization techniques.
3052
+
3053
+ (a) Different number of agents N.
3054
+ (b) Different horizons T.
3055
+ (c) Different per-agent expected arrivals.
3056
+ Figure 4: Symmetric Setting : SAFFE-D performs close to Hindsight and outperforms other methods by achieving higher utilization and
3057
+ lower ∆Log-NSW, ∆Amean and ∆Amax.
3058
+ Figure 5: Non-symmetric Demands Setting: SAFFE-D allocates
3059
+ uniformly across agents with different arrival patterns on average,
3060
+ while SAFFE outperforms in the worst case.
3061
+
3062
+ Hindsight
3063
+ SAFFE-D
3064
+ SAFFE
3065
+ HOPE-Online
3066
+ Guarded-HOPE (Lt = T-1/2)
3067
+ Guarded-HOPE (LT = T-1/3)
3068
+ 100.0
3069
+ 0.08
3070
+ 2.25
3071
+ 97.5
3072
+ 0.30
3073
+ 2.00
3074
+ (%)
3075
+ 95.0
3076
+ 0.06
3077
+ 0.25
3078
+ 1.75
3079
+ Utilization
3080
+ 92.5
3081
+ ISN-
3082
+ max
3083
+ 1.50 -
3084
+ ALog-i
3085
+ 0.20
3086
+ 90.0
3087
+ 0.04
3088
+ 1.25
3089
+ 87.5
3090
+ 0.15
3091
+ 1.00
3092
+ 85.0
3093
+ 0.02
3094
+ 0.10
3095
+ 0.75
3096
+ 82.5
3097
+ 0.50
3098
+ 0.00 -
3099
+ 25
3100
+ 50
3101
+ 75
3102
+ 100
3103
+ 125
3104
+ 150
3105
+ 175
3106
+ 200
3107
+ 25
3108
+ 50
3109
+ 75
3110
+ 100
3111
+ 125
3112
+ 150
3113
+ 175
3114
+ 200
3115
+ 25
3116
+ 50
3117
+ 75
3118
+ 100
3119
+ 125
3120
+ 150
3121
+ 175
3122
+ 200
3123
+ 25
3124
+ 50
3125
+ 75
3126
+ 100
3127
+ 125
3128
+ 150
3129
+ 175
3130
+ 200
3131
+ Number of Agents
3132
+ Number of Agents
3133
+ Number of Agents
3134
+ Number of AgentsHindsight
3135
+ SAFFE-D
3136
+ SAFFE
3137
+ HOPE-Online
3138
+ Guarded-HOPE (Lt = T-1/2)
3139
+ Guarded-HOPE (LT = T-1/3)
3140
+ 100
3141
+ 1.6
3142
+ 0.06
3143
+ - 86
3144
+ 00
3145
+ (%)
3146
+ 1.4
3147
+ 96
3148
+ 0.05
3149
+ MSN-
3150
+ t6
3151
+ 0.25
3152
+ Utilization
3153
+ 0.04
3154
+ 1.2
3155
+ 92
3156
+ △Log-I
3157
+ 0.20
3158
+ K
3159
+ 0.03
3160
+ 1.0
3161
+ 0.02
3162
+ 0.15 -
3163
+ 0.8 -
3164
+ 88
3165
+ 0.01
3166
+ 0.10
3167
+ 0.6 -
3168
+ 84
3169
+ 25
3170
+ 50
3171
+ 75
3172
+ 100
3173
+ 125
3174
+ 150
3175
+ 175
3176
+ 25
3177
+ 50
3178
+ 75
3179
+ 100
3180
+ 125
3181
+ 150
3182
+ 175
3183
+ 25
3184
+ 50
3185
+ 75
3186
+ 100
3187
+ 125
3188
+ 150
3189
+ 175
3190
+ 25
3191
+ 50
3192
+ 75
3193
+ 100
3194
+ 125
3195
+ 150
3196
+ 175
3197
+ Horizon T
3198
+ Horizon T
3199
+ Horizon T
3200
+ Horizon THindsight
3201
+ SAFFE-D
3202
+ SAFFE
3203
+ HOPE-Online
3204
+ Guarded-HOPE (Lt = T-1/2)
3205
+ Guarded-HOPE (LT = T-1/3)
3206
+ 1.75-
3207
+ 100.0
3208
+ 0.30
3209
+ 0.08
3210
+ 97.5
3211
+ 1.50
3212
+ 0.25
3213
+ (%)
3214
+ 95.0
3215
+ 0.06 -
3216
+ 1.25
3217
+ 0.20
3218
+ Utilization
3219
+ 92.5
3220
+ max
3221
+ 1.00
3222
+ 0'06
3223
+ 0.15
3224
+ 0.75
3225
+ 87.5
3226
+ 0.10
3227
+ 0.50
3228
+ 85.0
3229
+ 0.02
3230
+ 0.05
3231
+ 82.5
3232
+ 0.25
3233
+ 80.0
3234
+ 0.00
3235
+ 0.00
3236
+ 0.00 -
3237
+ 10
3238
+ 15
3239
+ 20
3240
+ 25
3241
+ 30
3242
+ 35
3243
+ 40
3244
+ 0
3245
+ 5
3246
+ 10
3247
+ 15
3248
+ 20
3249
+ 25
3250
+ 30
3251
+ 35
3252
+ 40
3253
+ 10
3254
+ 15
3255
+ 20
3256
+ 25
3257
+ 30
3258
+ 35
3259
+ 10
3260
+ 15
3261
+ 20
3262
+ 25
3263
+ 30
3264
+ 35
3265
+ 40
3266
+ Expected Per-Agent Arriavls
3267
+ Expected Per-Agent Arriavls
3268
+ Expected Per-Agent Arriavls
3269
+ Expected Per-Agent Arriavls0.40
3270
+ 1.6
3271
+ All
3272
+ 0.35
3273
+ More-Early
3274
+ 1.4
3275
+ Uniform
3276
+ 0.30
3277
+ 1.2
3278
+ More-Late
3279
+ mean
3280
+ 0.25
3281
+ xew
3282
+ 1.0
3283
+ 0.20
3284
+ 0.8
3285
+ 0.15
3286
+ 0.6
3287
+ 0.10
3288
+ 0.4
3289
+ 0.05
3290
+ 0.2
3291
+ 0.00
3292
+ 0.0
3293
+ SAFFE-D
3294
+ SAFFE
3295
+ HOPE-Online
3296
+ Guarded-HOPE
3297
+ SAFFE-D
3298
+ SAFFE
3299
+ HOPE-Online
3300
+ Guarded-HOPE
3301
+ (L = T~1/3)
3302
+ Algorithm
3303
+ AlgorithmFigure 6: Experiments on real data for different budgets when p = 2
3304
+ 7. SAFFE-D performs close to Hindsight achieving high utilization and
3305
+ low ∆Log-NSW, ∆Amean and ∆Amax.
3306
+
3307
+ Hindsight
3308
+ SAFFE-D
3309
+ SAFFE
3310
+ HOPE-Online
3311
+ Guarded-HOPE (Lt = T-1/2)
3312
+ Guarded-HOPE (Lt = T-1/3)
3313
+ 100
3314
+ 0.4
3315
+ 0.45 -
3316
+ 1.2 -
3317
+ 0.40
3318
+ (%) oez!n
3319
+ 86
3320
+ -NSW
3321
+ EO
3322
+ 0.35
3323
+ 1.0
3324
+ mean
3325
+ - 96
3326
+ -00
3327
+ max
3328
+ 0.8
3329
+ 0.25
3330
+ t6
3331
+ 0.20
3332
+ 0.6 -
3333
+ 0.1
3334
+ 0.15
3335
+ 92
3336
+ 0.10
3337
+ 0.0
3338
+ 0.2
3339
+ 0.2
3340
+ 0.4
3341
+ 0.6
3342
+ 0.8
3343
+ 1.0
3344
+ 0.2
3345
+ 0.4
3346
+ 0.6
3347
+ 0.8
3348
+ 1.0
3349
+ 0.2
3350
+ 0.4
3351
+ 0.6
3352
+ 0.8
3353
+ 1.0
3354
+ 0.2
3355
+ 0.4
3356
+ 0.6
3357
+ 0.8
3358
+ 1.0
3359
+ Budget Fraction
3360
+ Budget Fraction
3361
+ Budget Fraction
3362
+ Budget Fraction
7dE2T4oBgHgl3EQfPQbU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
A9E4T4oBgHgl3EQf5A6T/content/tmp_files/2301.05319v1.pdf.txt ADDED
@@ -0,0 +1,3079 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Nuclear level densities and γ−ray strength functions in 120,124Sn isotopes: impact of
2
+ Porter-Thomas fluctuations
3
+ M. Markova,1, ∗ A. C. Larsen,1, † P. von Neumann-Cosel,2 S. Bassauer,2 A. G¨orgen,1
4
+ M. Guttormsen,1 F. L. Bello Garrote,1 H. C. Berg,1 M. M. Bjørøen,1 T. K. Eriksen,1 D. Gjestvang,1
5
+ J. Isaak,2 M. Mbabane,1 W. Paulsen,1 L. G. Pedersen,1 N. I. J. Pettersen,1 A. Richter,2
6
+ E. Sahin,1 P. Scholz,3, 4 S. Siem,1 G. M. Tveten,1 V. M. Valsdottir,1 and M. Wiedeking5, 6
7
+ 1Department of Physics, University of Oslo, N-0316 Oslo, Norway
8
+ 2Institut f¨ur Kernphysik, Technische Universit¨at Darmstadt, D-64289 Darmstadt, Germany
9
+ 3Institut f¨ur Kernphysik, Universit¨at zu K¨oln, D-50937 K¨oln, Germany
10
+ 4Department of Physics, University of Notre Dame, Indiana 46556-5670, USA
11
+ 5Deptartment of Subatomic Physics to SSC Laboratory,
12
+ iThemba LABS, Somerset West 7129, South Africa
13
+ 6School of Physics, University of the Witwatersrand, Johannesburg 2050, South Africa
14
+ (Dated: January 16, 2023)
15
+ Nuclear level densities (NLDs) and γ-ray strength functions (GSFs) of 120,124Sn have been ex-
16
+ tracted with the Oslo method from proton-γ coincidences in the (p, p′γ) reaction. The functional
17
+ forms of the GSFs and NLDs have been further constrained with the Shape method by studying
18
+ primary γ-transitions to the ground and first excited states. The NLDs demonstrate good agreement
19
+ with the NLDs of 116,118,122Sn isotopes measured previously. Moreover, the extracted partial NLD
20
+ of 1− levels in 124Sn is shown to be in fair agreement with those deduced from spectra of relativistic
21
+ Coulomb excitation in forward-angle inelastic proton scattering.
22
+ The experimental NLDs have been applied to estimate the magnitude of the Porter-Thomas
23
+ (PT) fluctuations. Within the PT fluctuations, we conclude that the GSFs for both isotopes can
24
+ be considered to be independent of initial and final excitation energies, in accordance with the
25
+ generalized Brink-Axel hypothesis. Particularly large fluctuations observed in the Shape-method
26
+ GSFs present a considerable contribution to the uncertainty of the method, and may be one of the
27
+ reasons for deviations from the Oslo-method strength at low γ-ray energies and low values of the
28
+ NLD (below ≈ 1 · 103 − 2 · 103 MeV−1).
29
+ I.
30
+ INTRODUCTION
31
+ Numerous experimental and theoretical efforts have
32
+ been dedicated to the study of γ−decay processes in
33
+ atomic nuclei. The decay properties of excited nuclei are
34
+ not only pivotal for the basic nuclear physics research,
35
+ but also are the core ingredients for large-scale calcula-
36
+ tions of nucleosynthesis and element abundances in the
37
+ universe [8, 24].
38
+ While gradually moving from the lowest to higher ex-
39
+ citation energies of a nucleus, the spacing between indi-
40
+ vidual excited states becomes smaller, and the sensitiv-
41
+ ity of experimental techniques might be no longer suffi-
42
+ cient to resolve them separately. Here, the nucleus enters
43
+ the quasi-continuum regime and the concept of the nu-
44
+ clear level density (NLD), i.e.
45
+ the number of nuclear
46
+ states per excitation energy unit, becomes an indispens-
47
+ able tool for a statistical description of nuclei. By anal-
48
+ ogy, the γ-ray strength function (GSF), or the average,
49
+ reduced γ-transition probability, becomes more suitable
50
+ to describe the numerous γ-transitions. The statistical
51
+ model as formulated by Hauser and Feshbach [37] with
52
+ ingredients such as the NLD and GSF, provides the main
53
54
55
+ framework for modelling nuclear reactions and calculat-
56
+ ing their cross-sections for astrophysical purposes (e.g.
57
+ [8]), the design of nuclear reactors [18], and the transmu-
58
+ tation of nuclear waste [61].
59
+ Among all experimental techniques used for the extrac-
60
+ tion of GSFs [25], the Oslo method has been widely used
61
+ to obtain the dipole strength below the neutron threshold
62
+ by studying the γ-decay of residual nuclei formed in light-
63
+ ion induced reactions [33, 34, 63]. The main advantage
64
+ of the method is a simultaneous extraction of the NLD
65
+ and GSF from primary γ−decay spectra at excitation
66
+ energies below the neutron separation energy Sn. The
67
+ GSFs for many nuclei obtained by employing different
68
+ experimental techniques have previously been reported
69
+ to provide a rather good agreement in absolute values
70
+ and/or general shapes with the Oslo method strengths
71
+ [13, 51, 70]. A few cases of large discrepancies have also
72
+ been reported (e.g. the comparison of the Oslo and (γ, γ′)
73
+ data for 89Y and 139La presented in Ref. [25]).
74
+ A large fraction of theoretical and experimental tech-
75
+ niques focusing on calculating or measuring the GSF,
76
+ including the Oslo method, rely on the validity of the
77
+ generalized Brink-Axel (gBA) hypothesis [10, 14]. In its
78
+ most general form, the hypothesis states that the GSF
79
+ is independent of excitation energies, spins and parities
80
+ of initial and final states and depends solely on the γ-
81
+ ray energy of involved transitions.
82
+ This is often used
83
+ as a necessary approximation and simplification in many
84
+ arXiv:2301.05319v1 [nucl-ex] 12 Jan 2023
85
+
86
+ 2
87
+ methods, and allows to set a direct correspondence be-
88
+ tween strengths extracted from the γ-decay and photo-
89
+ excitation processes [14, 50]. Even though this hypothesis
90
+ is experimentally established at high energies, i.e., in the
91
+ vicinity of the giant dipole resonance, its validity below
92
+ the neutron threshold still triggers quite some debate.
93
+ For example, several theoretical studies suggest the need
94
+ of a modification of the hypothesis [15, 38, 40, 44, 54],
95
+ while experimental studies range from claims of a viola-
96
+ tion [7, 42, 43, 56] to a validity [16, 32, 50, 51, 64]. The
97
+ question regarding the validity is a rather difficult one,
98
+ partially depending on what degree of violation is consid-
99
+ ered acceptable in different experimental and theoretical
100
+ applications.
101
+ A crucial point to be considered when addressing the
102
+ applicability of the gBA hypothesis is the presence of
103
+ fluctuations of partial radiative widths, or the so-called
104
+ Porter-Thomas (PT) fluctuations [59]. The partial radia-
105
+ tive widths are proportional to the corresponding reduced
106
+ transition strengths (B(XL) values where X is the elec-
107
+ tromagnetic character and L the angular momentum of
108
+ the γ ray). At sufficiently high excitation energies and
109
+ high NLD values, the nuclear wave functions are quite
110
+ complex with many components. In this region, accord-
111
+ ing to random-matrix theory [69], the partial widths fol-
112
+ low a χ2
113
+ ν behavior with ν = 1 degree of freedom, while
114
+ the total widths are more narrowly distributed with the
115
+ variance inversely proportional to the number of inde-
116
+ pendently contributing partial widths.
117
+ Such a variation of partial widths is directly reflected
118
+ in the variation of the GSF, which may mask the ex-
119
+ citation energy independence of the strength, and thus
120
+ a test of the gBA hypothesis might become especially
121
+ difficult. Indeed, for relatively light nuclei, e.g.
122
+ 64,65Ni
123
+ [16] and 46Ti [31], the NLDs are rather low, and tests of
124
+ the gBA hypothesis are limited. On the other hand, the
125
+ 238Np nucleus [32] with a particularly high NLD, makes
126
+ a perfect case for studying the GSF as a function of ini-
127
+ tial and final excitation energies, as fluctuations of the
128
+ strength are strongly suppressed. The Sn isotopes inves-
129
+ tigated here present an intermediate case for studying to
130
+ what degree the PT fluctuations are expected to distort
131
+ excitation energy dependence of the GSF.
132
+ Moving away from the valley of stability opens up
133
+ new perspectives for studying exotic, neutron-rich nuclei,
134
+ with applications to heavy-element nucleosynthesis [48],
135
+ using for example the β-Oslo method [65] and the Oslo
136
+ method in inverse kinematics [41]. However, this leads
137
+ to additional complications, such as the lack of neutron-
138
+ resonance data for normalizing the NLD and GSF from
139
+ the Oslo-method data. Moreover, some of the light-ion
140
+ induced reactions may lead to a population of a limited
141
+ spin range, which might introduce additional assump-
142
+ tions and uncertainties when extracting the shapes of the
143
+ NLD and GSF.
144
+ A novel technique, the Shape method [71], has recently
145
+ been proposed to mend this problem. Applied to the pri-
146
+ mary γ-transitions to several low-lying discrete states at
147
+ consecutive excitation energy bins, it allows for an inde-
148
+ pendent determination of the shape of the GSF. Thus,
149
+ the shape of the strength and the interlinked slope of the
150
+ NLD extracted with the Oslo method can be addition-
151
+ ally constrained by the Shape method. However, as the
152
+ latter is using data on direct decays to low-lying discrete
153
+ states only, the PT fluctuations of the involved partial
154
+ widths are expected to be significantly larger than for
155
+ the Oslo-method GSF.
156
+ In this work, the potential role of PT fluctuations in
157
+ establishing the validity of the gBA hypothesis as well as
158
+ the application of the Shape method are addressed for
159
+ 120Sn and 124Sn. Both the Oslo method and the Shape
160
+ method have been applied to the same data sets. Exper-
161
+ imental NLDs have been used to estimate fluctuations of
162
+ the strengths for different specific initial and final excita-
163
+ tion energies and compared with previous Oslo-method
164
+ NLDs for even-even isotopes [4, 66, 67]. In Sec. II the
165
+ details of the experimental procedure, the application of
166
+ the Oslo method (Subsec. II A) and the Shape method
167
+ (Subsec. II B) are presented. Section III focuses on the
168
+ NLDs for 120,124Sn and the comparison with other exper-
169
+ imental and theoretical results. In Sec. IV the procedure
170
+ of estimating fluctuations of the strengths is presented
171
+ together with the Shape method results, and the study
172
+ of fluctuations and GSFs as functions of initial and fi-
173
+ nal excitation energies. Finally, the main conclusions are
174
+ summarised in Sec. V.
175
+ II.
176
+ DETAILS OF THE EXPERIMENT AND
177
+ DATA ANALYSIS
178
+ Experiments on both 120Sn and 124Sn were performed
179
+ in February 2019 at the Oslo Cyclotron Laboratory
180
+ (OCL). The isotopes were studied through the inelastic
181
+ scattering reactions 120,124Sn(p, p′γ) with a proton beam
182
+ of energy 16 MeV and intensity I ≈ 3 − 4 nA provided
183
+ by the MC-35 Scanditronix cyclotron. Both targets used
184
+ in the experiment were self-supporting with thicknesses
185
+ and enrichments of 2.0 mg/cm2, 99.6% for 120Sn and 0.47
186
+ mg/cm2, 95.3% for 124Sn, respectively. The 120Sn target
187
+ was placed in the beam for approximately 24 hours, while
188
+ the whole run on 124Sn lasted approximately 17 hours. A
189
+ self-supporting 28Si target (natural Si, 92.2% 28Si) with
190
+ thickness of 4 mg/cm2 was placed in the same proton
191
+ beam for ≈ 1.5 hours at the end of the experiment for
192
+ the energy calibration of the γ detectors.
193
+ The experimental setup at the OCL comprises of
194
+ the target chamber surrounded by 30 cylindrical large-
195
+ volume LaBr3(Ce) detectors (Oslo SCintillator ARray,
196
+ OSCAR for short) [41, 74], and 64 Si particle ∆E − E
197
+ telescopes (SiRi) [30]. The LaBr3(Ce) scintillator detec-
198
+ tors with �3.5′′×8′′ crystals were mounted on a trun-
199
+ cated icosahedron frame with all front-ends fixed at a
200
+ distance of 16.3 cm from the center of the target cham-
201
+ ber, thus covering ≈ 57% of the total solid angle. The
202
+ full-energy peak efficiency and energy resolution of OS-
203
+
204
+ 3
205
+ 2
206
+ 4
207
+ 6
208
+ 8
209
+ 10
210
+ 12
211
+ 14
212
+ E (MeV)
213
+ 0.5
214
+ 1
215
+ 1.5
216
+ 2
217
+ 2.5
218
+ 3
219
+ 3.5
220
+ 4
221
+ 4.5
222
+ E (MeV)
223
+ D
224
+ 1
225
+ 10
226
+ 2
227
+ 10
228
+ 3
229
+ 10
230
+ 4
231
+ 10
232
+ 5
233
+ 10
234
+ p
235
+ d
236
+ t
237
+ Sn g.s.
238
+ 124
239
+ +
240
+ Sn 2
241
+ 124
242
+ Sn g.s.
243
+ 122
244
+ FIG. 1.
245
+ Experimental E-∆E spectrum measured for the
246
+ 124Sn isotope. The proton channel used for the data analysis
247
+ is marked with the red solid line. The ground and first excited
248
+ states of 124Sn in the proton channel and the ground state of
249
+ 122Sn in the triton channel, used for the calibration of the
250
+ particle telescope, are marked with yellow circles.
251
+ CAR have been measured to be ≈ 20% and ≈ 2.7%,
252
+ respectively, at Eγ = 662 keV for the 137Cs calibration
253
+ source placed at the same distance from the front-ends
254
+ of the detectors.
255
+ The (p, p′γ) reaction on 120,124Sn was one of the first
256
+ in the series of experiments performed with OSCAR, in-
257
+ stalled in 2018 at the OCL. As compared to the pre-
258
+ viously used array CACTUS, consisting of 28 5′′×5′′
259
+ NaI(Tl) detectors [28], OSCAR provides greatly im-
260
+ proved timing and γ−energy resolution.
261
+ All the scin-
262
+ tillator crystals in the OSCAR array are coupled to
263
+ Hamamatsu R10233-100 photomultiplier tubes with ac-
264
+ tive voltage dividers (LABRVD) [60].
265
+ In these experiments, the SiRi particle-telescope array
266
+ was placed in backward angles with respect to the beam
267
+ direction, covering a rather narrow range of angles from
268
+ 126◦ to 140◦ and making up ≈ 6% of the total solid-
269
+ angle coverage. SiRi consists of eight trapezoidal-shaped
270
+ ∆E −E telescopes with a thick E-detector and a thinner
271
+ ∆E-detector with thicknesses of 1550 µm and 130 µm,
272
+ respectively. Each of the eight ∆E detectors is segmented
273
+ into eight curved pads, amounting to 2◦ of particle scat-
274
+ tering angle per pad, yielding an angular resolution of
275
+ 2◦. For the 120,124Sn(p, p′γ) experiment, the full width
276
+ at half maximum (FWHM) for SiRi was estimated to be
277
+ ≈ 100 − 120 keV from a Gaussian fit to the elastically
278
+ scattered protons. All particle-γ coincidences in the ex-
279
+ periment were recorded using XIA digital electronics [72].
280
+ SiRi enables the exploitation of the ∆E − E technique
281
+ to differentiate between the various observed reaction
282
+ channels, as shown in Fig. 1.
283
+ The elastic peak in the
284
+ proton channel and the ground-state peak in the triton
285
+ channel, combined with the known energy deposition in
286
+ each of the 64 ∆E − E pads, were used to perform a
287
+ linear calibration of the SiRi detectors for both targets.
288
+ The kinematics of the reactions were used to convert the
289
+ proton energies deposited in the SiRi detectors into the
290
+ corresponding excitation energies of the target nucleus.
291
+ As previously shown for �3.5′′×8′′ LaBr3(Ce) detec-
292
+ tors coupled to the same type of photomultiplier and volt-
293
+ age divider, the energy response of the detector remains
294
+ rather linear up to ≈ 17 − 18 MeV [22]. However, to ac-
295
+ count for minor non-linearity effects, a quadratic calibra-
296
+ tion was applied to all 30 OSCAR detectors. Prominent
297
+ γ transitions in 28Si ranging from 1.78 to 7.93 MeV were
298
+ used for this purpose. Further, by applying graphical en-
299
+ ergy (see Fig. 1) and timing cuts on the studied proton
300
+ channel, putting gates on the prompt timing peak and
301
+ subtracting background for particle and γ detection in
302
+ SiRi and OSCAR, a so-called raw coincidence matrix was
303
+ constructed for both studied nuclei. The raw matrices are
304
+ shown in Figs. 2(a) and (d) for 120Sn and 124Sn, respec-
305
+ tively. Consecutive diagonals indicate direct transitions
306
+ to the ground and first excited states. For excitation en-
307
+ ergies between 7 and 9 MeV, peaks that are due to minor
308
+ 12C and 16O contaminants in the targets are observed.
309
+ At further stages of the analysis these peaks were re-
310
+ moved1 to minimize the effect of these contaminants and
311
+ any related artefacts on the final results. Approximately
312
+ 5.3×107 and 1.3×107 p-γ events in the excitation-energy
313
+ range up to the neutron separation energy were collected
314
+ for 120Sn and 124Sn, respectively.
315
+ The γ spectra for each excitation-energy bin of the
316
+ coincidence matrices were further unfolded according to
317
+ the procedure outlined in [34], using the most recent re-
318
+ sponse function of the OSCAR detectors [76] simulated
319
+ with the Geant4 simulation tool [3, 5, 6]. This proce-
320
+ dure has been applied to a large number of Oslo-type
321
+ data published throughout the past two decades, and
322
+ has been repeatedly shown to provide valuable results.
323
+ A great advantage of the method is the preservation of
324
+ statistical fluctuations of the raw coincidence spectrum
325
+ into the unfolded one by using the so-called Compton
326
+ subtraction method [34]. This technique strongly sup-
327
+ presses additional, artificial fluctuations. The unfolded
328
+ matrices for 120Sn and 124Sn are shown in Figs. 2(b) and
329
+ (e).
330
+ The main objective of the analysis is to extract the sta-
331
+ tistical nuclear properties, namely the NLD and GSF, by
332
+ exploiting their proportionality to the decay probability
333
+ 1 The contaminants were removed after unfolding of the γ spectra.
334
+ A narrow graphical gate is put on each Gaussian-like contami-
335
+ nant peak in the unfolded matrix, and the parts of the spectra
336
+ within the gate are obtained by interpolating the neighbouring
337
+ regions of the matrix.
338
+
339
+ 4
340
+ 0
341
+ 2
342
+ 4
343
+ 6
344
+ 8
345
+ 10
346
+ (MeV)
347
+ γ
348
+ E
349
+ 0
350
+ 2
351
+ 4
352
+ 6
353
+ 8
354
+ 10
355
+ (MeV)
356
+ x
357
+ E
358
+ Sn
359
+ 120
360
+ (a)
361
+ n
362
+ S
363
+ Raw coincidence matrix
364
+ 0
365
+ 2
366
+ 4
367
+ 6
368
+ 8
369
+ 10
370
+ (MeV)
371
+ γ
372
+ E
373
+ 0
374
+ 2
375
+ 4
376
+ 6
377
+ 8
378
+ 10
379
+ (MeV)
380
+ x
381
+ E
382
+ Sn
383
+ 120
384
+ n
385
+ S
386
+ (b)
387
+ Unfolded matrix
388
+ 0
389
+ 2
390
+ 4
391
+ 6
392
+ 8
393
+ 10
394
+ (MeV)
395
+ γ
396
+ E
397
+ (MeV)
398
+ x
399
+ E
400
+ 1
401
+ 10
402
+ 2
403
+ 10
404
+ 3
405
+ 10
406
+ 4
407
+ 10
408
+ 5
409
+ 10
410
+ 6
411
+ 10
412
+ Number of counts
413
+ Sn
414
+ 120
415
+ n
416
+ S
417
+ (c)
418
+ 1
419
+ 2
420
+ 3
421
+ Primary matrix
422
+ 0
423
+ 2
424
+ 4
425
+ 6
426
+ 8
427
+ 10
428
+ (MeV)
429
+ γ
430
+ E
431
+ 0
432
+ 1
433
+ 2
434
+ 3
435
+ 4
436
+ 5
437
+ 6
438
+ 7
439
+ 8
440
+ 9
441
+ 10
442
+ (MeV)
443
+ x
444
+ E
445
+ Sn
446
+ 124
447
+ (d)
448
+ n
449
+ S
450
+ 0
451
+ 2
452
+ 4
453
+ 6
454
+ 8
455
+ 10
456
+ (MeV)
457
+ γ
458
+ E
459
+ 0
460
+ 2
461
+ 4
462
+ 6
463
+ 8
464
+ 10
465
+ (MeV)
466
+ x
467
+ E
468
+ Sn
469
+ 124
470
+ (e)
471
+ n
472
+ S
473
+ 0
474
+ 2
475
+ 4
476
+ 6
477
+ 8
478
+ 10
479
+ (MeV)
480
+ γ
481
+ E
482
+ 0
483
+ 2
484
+ 4
485
+ 6
486
+ 8
487
+ 10
488
+ (MeV)
489
+ x
490
+ E
491
+ 1
492
+ 10
493
+ 2
494
+ 10
495
+ 3
496
+ 10
497
+ 4
498
+ 10
499
+ 5
500
+ 10
501
+ 6
502
+ 10
503
+ Number of counts
504
+ Sn
505
+ 124
506
+ n
507
+ S
508
+ (f)
509
+ 1
510
+ 2
511
+ 3
512
+ FIG. 2.
513
+ Experimental raw p − γ coincidence ((a) and (d)), unfolded ((b) and (e)) and primary ((c) and (f)) matrices for
514
+ 120,124Sn obtained in the (p, p′γ) experiments. Yellow dashed lines indicate the neutron separation energies. Red and green
515
+ dashed lines in panels (c) and (f) confine transitions to the ground (region 1) and the first excited Jπ = 2+ (region 2) states.
516
+ Blue solid lines (region 3) indicate the areas of the primary matrices used further in the Oslo method. Bin sizes are 64 keV×64
517
+ keV and 80 keV×80 keV for 120Sn and 124Sn, respectively. Blue arrows mark the sequence of the analysis steps.
518
+ at each specific excitation energy and γ energy. Infor-
519
+ mation regarding this decay probability can be obtained
520
+ by isolating the first γ rays in a cascade emitted by the
521
+ nucleus at a certain excitation energy, i.e.
522
+ primary γ
523
+ rays originating directly from the nucleus decaying from
524
+ this excited state, or the so-called first-generation γ rays.
525
+ The unfolded matrix contains all possible generations of
526
+ γ rays emitted in every cascade from all excitation ener-
527
+ gies up to the neutron separation energy. The γ-ray spec-
528
+ tra for each excitation-energy bin in the unfolded matrix
529
+ are expected to contain the same γ rays as in the lower-
530
+ lying bins, in addition to the γ rays originating from the
531
+ excited states confined by this energy bin. This fact is
532
+ the key for the iterative subtraction technique, the so-
533
+ called first-generation method, applied to both unfolded
534
+ matrices for 120Sn and 124Sn. This technique relies on
535
+ the assumption that γ decay is independent of whether
536
+ states were populated directly in a reaction or via decays
537
+ from higher-lying states. The details of the procedure are
538
+ outlined in [33]. The primary matrices obtained after 23
539
+ iterations for both nuclei are shown in Figs. 2(c) and (f).
540
+ At this stage, two alternative methods can be used
541
+ in order to extract the GSF from the primary matrix,
542
+ namely the Oslo method and the Shape method. The
543
+ former is a well-developed procedure primarily used to
544
+ extract nuclear properties from the OCL data and it has
545
+ been in use for more than two decades (see e.g. [47]).
546
+ In addition to the GSF, it provides the simultaneous ex-
547
+ traction of the NLD, which are the main characteristics of
548
+ interest in this article. The latter procedure, the Shape
549
+ method, has been recently presented and published in
550
+ Ref. [71]. The two methods are expected to complement
551
+ each other and a combined analysis yields an improved
552
+ normalisation of the GSF and, therefore, the NLD. All
553
+ details of these procedures applied to the 120,124Sn iso-
554
+ topes are provided in the subsequent sections.
555
+ A.
556
+ Analysis with the Oslo method
557
+ As already mentioned, the primary matrix is propor-
558
+ tional to the decay probability from a set of initial excited
559
+ states i within a chosen bin Ei to final states f confined
560
+ within a bin Ef of the same size with γ rays of energy
561
+ Eγ = Ei − Ef. The first step of the Oslo-type of anal-
562
+ ysis is the decomposition of the primary matrix into the
563
+ density of final states ρf and the γ-ray transmission co-
564
+ efficient Ti→f:
565
+ P(Eγ, Ei) ∝ Ti→f · ρf.
566
+ (1)
567
+
568
+ 5
569
+ Here, Ti→f, the transmission coefficient, is a function
570
+ of γ-ray energy depending on both the initial and final
571
+ state.
572
+ The thorough derivations of this decomposition
573
+ using Fermi’s golden rule and the Hauser–Feshbach the-
574
+ ory of statistical reactions as starting points can be found
575
+ in Refs. [52] and [53], correspondingly. This relation is
576
+ expected to hold for relatively high excitation energies
577
+ below the neutron threshold, corresponding to the com-
578
+ pound states and their decay [47]. This energy range es-
579
+ sentially coincides with the range of applicability of the
580
+ first generation method.
581
+ This form of dependence on Ei, Ef and Eγ, however,
582
+ does not allow a simultaneous extraction of the transmis-
583
+ sion coefficient and NLD. To enable such an extraction,
584
+ the gBA hypothesis is adopted as one of the central as-
585
+ sumptions in the Oslo method [10, 14]. As mentioned
586
+ previously, the gBA hypothesis suggests an independence
587
+ of the GSF (and, therefore, the transmission coefficient)
588
+ of spins, parities and energies of initial and final states,
589
+ leading to a dependence on γ-ray energy only. This signif-
590
+ icantly simplifies the form of the relation given in Eq. (1):
591
+ Ti→f → T (Eγ) and ρf = ρ(Ef) = ρ(Ei − Eγ).
592
+ In earlier applications of the Oslo method, the gBA hy-
593
+ pothesis has been found to be adequate for the relatively
594
+ low-temperature regimes studied (T ≈ 0.7 − 1.5 MeV)
595
+ [31]. However, as the Oslo method relies on the gBA hy-
596
+ pothesis, it cannot be used alone to test its validity. To
597
+ investigate the validity of the hypothesis, either compar-
598
+ isons of independent experimental methods [50] or addi-
599
+ tional tests suggested in, e.g., [16, 32] are required. This
600
+ matter is of particular importance and will be discussed
601
+ in more detail in Sec. IV.
602
+ The next step of the Oslo method includes an itera-
603
+ tive χ2-minimization procedure between the experimen-
604
+ tal first-generation matrix P(Eγ, Ei) normalized to unity
605
+ for each Ei bin and the theoretical Pth(Eγ, Ei) given by
606
+ the following expression [63]:
607
+ Pth(Eγ, Ei) =
608
+ T (Eγ)ρ(Ei − Eγ)
609
+ �Ei
610
+ Eγ=Emin
611
+ γ
612
+ T (Eγ)ρ(Ei − Eγ)
613
+ .
614
+ (2)
615
+ This χ2 fit of the transmission coefficient and NLD nor-
616
+ mally gives a very good agreement with the experimental
617
+ matrix P(Eγ, Ei) when applied to the statistical region
618
+ of excitation energies.
619
+ The step-by-step description of
620
+ the minimization procedure is provided in Ref. [63]. To
621
+ ensure the applicability of the statistical assumptions,
622
+ minimum excitation energies of Emin
623
+ i
624
+ = 4.5 MeV for
625
+ 120Sn and 5.0 MeV for 124Sn were chosen.
626
+ Sufficient
627
+ statistics at higher energies allows us to set Emax
628
+ i
629
+ to the
630
+ neutron separation energy for each isotope, Sn = 9.1
631
+ and 8.5 MeV for 120Sn and 124Sn, respectively. To ex-
632
+ clude regions where counts have been over-subtracted in
633
+ the first-generation procedure, minimum γ-ray energies
634
+ Emin
635
+ γ
636
+ = 1.3 and 1.6 MeV were set accordingly for 120Sn
637
+ and 124Sn. The resulting areas where the Oslo method
638
+ was applied in this work are marked by the blue lines in
639
+ Figs. 2(c) and (f).
640
+ The global χ2 fit yields only functional forms of the
641
+ transmission coefficient T (Eγ) and NLD ρ(Ei − Eγ). It
642
+ can be shown mathematically that one can construct an
643
+ infinite set of T (Eγ) and ρ(Ei − Eγ) combinations cor-
644
+ responding to the obtained fit and given by the forms
645
+ [63]:
646
+ ˜ρ(Ei − Eγ) =Aρ(Ei − Eγ) exp(α(Ei − Eγ)),
647
+ ˜T (Eγ) =BT (Eγ) exp(αEγ),
648
+ (3)
649
+ where ρ and T are two fixed solutions, A and B are the
650
+ scaling parameters, and α is the slope parameter shared
651
+ by both the transmission coefficient and NLD. For each
652
+ studied nucleus this ambiguity must be removed via de-
653
+ termining unique normalization parameters A, B and α
654
+ from external experimental data. If available, low-lying
655
+ discrete states and neutron-resonance data are the main
656
+ input parameters, combined with models for the spin dis-
657
+ tribution and for extrapolations where there is a lack of
658
+ experimental data.
659
+ The first step of the normalization procedure is to de-
660
+ termine the unique NLD solution ρ(Ei−Eγ). The param-
661
+ eters A and α can be constrained by fitting the NLD to
662
+ low-lying discrete states [1] in the excitation-energy range
663
+ where the level scheme can be considered complete. At
664
+ the neutron separation energy, the NLD can be normal-
665
+ ized to the total NLD calculated from neutron-resonance
666
+ spacings [55]. These data also provide the average, to-
667
+ tal radiative width ⟨Γγ⟩ used to determine the scaling
668
+ parameter B for the transmission coefficient. All details
669
+ of the normalization procedure for 120Sn and 124Sn have
670
+ been presented in the Supplemental Material of Ref. [50].
671
+ However, some minor changes were introduced in this
672
+ work to improve the normalization and the estimated un-
673
+ certainties. We would like to stress that these changes do
674
+ not affect the results presented in Ref. [50] in any signif-
675
+ icant way, and do not undermine any of the presented
676
+ conclusions. To avoid any confusion regarding the nor-
677
+ malization parameters, we provide the updated and com-
678
+ plete description of this procedure in the following.
679
+ The most recent compilation of the discrete states [1]
680
+ was used to anchor the NLD for 120,124Sn at low excita-
681
+ tion energies. As compared to the compilation from 2003
682
+ used in the previous analysis, some changes in the num-
683
+ ber and the excitation energies of low-lying states appear
684
+ and give a slightly different slope of the NLD. The anchor
685
+ point at the neutron separation energy, ρ(Sn), is usually
686
+ extracted from the neutron resonance spacing D0 for s-
687
+ wave neutrons or D1 for p-wave neutrons. As 123Sn is an
688
+ unstable target nucleus (T1/2 = 129.2 d [1]), no neutron
689
+ resonance data are available, and we used other means
690
+ to estimate ρ(Sn) and ⟨Γγ⟩ for 124Sn.
691
+ The normalization procedure for
692
+ 120Sn is rather
693
+ straightforward, in accordance with the steps outlined
694
+ in Ref. [47], due to the available s-wave neutron capture
695
+ data. The target spin of 119Sn is Iπ
696
+ t = 1/2+, thus spins
697
+ 0+ and 1+ of the compound nucleus 120Sn are populated
698
+ in s-wave capture. Assuming that both positive and neg-
699
+ ative parities contribute equally to ρ(Sn), the average
700
+
701
+ 6
702
+ 5
703
+ 6
704
+ 7
705
+ 8
706
+ 9
707
+ 10
708
+ 11
709
+ 20
710
+ 40
711
+ 60
712
+ 80
713
+ 100
714
+ 120
715
+ 140
716
+ 160
717
+ (meV)
718
+
719
+ γ
720
+ Γ
721
+
722
+ Sn
723
+ 124
724
+ Estimated value for
725
+ Even Sn isotopes, exp. value
726
+ Odd Sn isotopes, exp. value
727
+ fit
728
+ 2
729
+ χ
730
+ Sn
731
+ 113
732
+ Sn
733
+ 115
734
+ Sn
735
+ 117
736
+ Sn
737
+ 119
738
+ Sn
739
+ 121
740
+ Sn
741
+ 123
742
+ Sn
743
+ 125
744
+ Sn
745
+ 114
746
+ Sn
747
+ 116
748
+ Sn
749
+ 118
750
+ Sn
751
+ 120
752
+ Sn
753
+ 124
754
+ (a)
755
+ 5
756
+ 6
757
+ 7
758
+ 8
759
+ 9
760
+ 10
761
+ 11
762
+ (MeV)
763
+ n
764
+ S
765
+ 4
766
+ 10
767
+ 5
768
+ 10
769
+ 6
770
+ 10
771
+ )
772
+ -1
773
+ ) (MeV
774
+ n
775
+ (S
776
+ ρ
777
+ Sn
778
+ 113
779
+ Sn
780
+ 115
781
+ Sn
782
+ 117
783
+ Sn
784
+ 119
785
+ Sn
786
+ 121
787
+ Sn
788
+ 123
789
+ Sn
790
+ 125
791
+ Sn
792
+ 114
793
+ Sn
794
+ 116
795
+ Sn
796
+ 118
797
+ Sn
798
+ 120
799
+ Sn
800
+ 124
801
+ (b)
802
+ Sn
803
+ 124
804
+ Estimated value for
805
+ Sn, shifted
806
+ 124
807
+ Value for
808
+ Even isotopes, exp. value
809
+ Even isotopes, shifted
810
+ Odd isotopes, exp. value
811
+ fit
812
+ 2
813
+ χ
814
+ Sn
815
+ 120
816
+ FIG. 3.
817
+ (a) Experimental systematics for the average total
818
+ radiative width for Sn isotopes. (b) Experimental systematics
819
+ for the NLD at the neutron separation energy. The estimated
820
+ values of ⟨Γγ⟩ and ρ(Sn) for 124Sn are marked with stars, the
821
+ experimental ⟨Γγ⟩ values are taken from [55], the level den-
822
+ sities are obtained from the D0 values given in [55]. Arrows
823
+ mark ρ(Sn) values shifted by the neutron pair-gap values for
824
+ the χ2 fit.
825
+ s-wave neutron resonance spacing D0 can be written as
826
+ [47]:
827
+ 1
828
+ D0
829
+ = 1
830
+ 2 [ρ(Sn, It + 1/2) + ρ(Sn, It − 1/2)] .
831
+ (4)
832
+ A transformation of the partial NLD for specific spins
833
+ into the total NLD can be performed by adopting the
834
+ back-shifted Fermi gas model (BSFG) for the NLD
835
+ ρ(Ex, J) = ρ(Ex)·g(Ex, J) (Ex here stands for the excita-
836
+ tion energy variable) with the spin distribution function
837
+ given by [20, 23]:
838
+ g(Ex, J) ≃ 2J + 1
839
+ 2σ2
840
+ exp
841
+
842
+ −(J + 1/2)2
843
+ 2σ2
844
+
845
+ ,
846
+ (5)
847
+ where σ is the spin-cutoff parameter. Given this distri-
848
+ bution function, Eq. (5) can be rewritten for the total
849
+ NLD at the neutron separation energy as a function of
850
+ the experimental resonance spacing D0 (taken from Ref.
851
+ [55]) and the target nucleus spin [47]:
852
+ ρ(Sn) = 2σ2
853
+ D0
854
+ 1
855
+ (It + 1) exp
856
+
857
+ − (It+1)2
858
+ 2σ2
859
+
860
+ + It exp
861
+
862
+ − I2
863
+ t
864
+ 2σ2
865
+ �.
866
+ (6)
867
+ Note that the spin-cutoff parameter is an excitation-
868
+ energy dependent function. The form of the spin-cutoff
869
+ parameter at Sn of Ref. [68] was chosen for 120,124Sn
870
+ σ2(Sn) = 0.0146A5/3 1 +
871
+
872
+ 1 + 4a(Sn − E1)
873
+ 2a
874
+ .
875
+ (7)
876
+ Here, a and E1 are the level-density parameter and the
877
+ back-shift parameter for the BSFG model taken from
878
+ Ref. [68].
879
+ In the Oslo method, the measured level densities do
880
+ not reach up to Ex = Sn due to the non-zero minimum
881
+ γ-ray energy limit in the extraction of ρ(Ei−Eγ). To use
882
+ the ρ(Sn) value as an anchor point for the normalization,
883
+ the experimental Oslo data were extrapolated using the
884
+ constant temperature (CT) level density model [21, 23,
885
+ 68]:
886
+ ρCT (Ex) =
887
+ 1
888
+ TCT
889
+ exp
890
+ �Ex − E0
891
+ TCT
892
+
893
+ ,
894
+ (8)
895
+ characterized by temperature (TCT ) and shift energy
896
+ (E0) parameters. Earlier Oslo-method analyses exploited
897
+ the BSFG model as an alternative for the interpolation
898
+ procedure [47], however, the choice between these two al-
899
+ ternatives is defined by the fit quality in each particular
900
+ case (see Sec.III).
901
+ As
902
+ the
903
+ experimental
904
+ information
905
+ on
906
+ the
907
+ s-wave
908
+ neutron-resonance spacing is available for 120Sn, Eq. (6)
909
+ was used directly to transform the D0 value into ρ(Sn).
910
+ For 124Sn, this value was estimated from the systematics
911
+ for even-even and even-odd Sn isotopes in the following
912
+ way. The ρ(Sn) values were estimated for each Sn iso-
913
+ tope with available neutron-resonance spacing D0 using
914
+ Eq. (6). The resulting systematics for the ρ(Sn) values
915
+ are shown in the lower panel of Fig. 3. The values of
916
+ ρ(Sn) for even-even isotopes were shifted by the corre-
917
+ sponding values of the neutron pairing gaps calculated
918
+ from the AME 2003 mass evaluation [9] using Eq. (1) of
919
+ Ref. [19]. Finally, the value of ρ(Sn) for 124Sn was cal-
920
+ culated from a log-linear fit through the data points for
921
+ even-odd and shifted even-even isotopes as shown by the
922
+ red dashed line in Fig. 3(b).
923
+ The second step after constraining the A and α param-
924
+ eters for the NLD is to normalize the transmission coeffi-
925
+ cient (and thus the GSF). As the slope α is already deter-
926
+ mined by the NLD normalization, the scaling parameter
927
+ B is the only parameter that remains to be estimated.
928
+ The starting point for normalizing the γ-transmission co-
929
+ efficient is the following relation [46]:
930
+ ⟨Γ(Ex, J, π)⟩ =
931
+ 1
932
+ 2πρ(Ex, J, π)
933
+
934
+ XL
935
+
936
+ Jf ,πf
937
+ � Ex
938
+ Eγ=0
939
+ dEγ×
940
+ × TXL(Eγ)ρ(Ex − Eγ, J, π),
941
+ (9)
942
+
943
+ 7
944
+ where ⟨Γ(Ex, J, π)⟩ is the average radiative width for
945
+ states with spin J, parity π at excitation energy Ex, and
946
+ X and L indicate the electromagnetic character and mul-
947
+ tipolarity, respectively. The GSF, fXL(Eγ), is connected
948
+ to the transmission coefficient by [2]:
949
+ TXL(Eγ) = 2πE(2L+1)
950
+ γ
951
+ fXL(Eγ).
952
+ (10)
953
+ At high excitation energies, there is experimental ev-
954
+ idence the dipole radiation is dominant (L = 1) (e.g.,
955
+ Ref. [46]).
956
+ The Oslo-type of experiments and analysis
957
+ does not allow for distinguishing between different types
958
+ of radiation, and, thus, the strength extracted with the
959
+ Oslo method is presented by the total contribution of
960
+ both electric and magnetic types of dipole transitions,
961
+ E1 and M1.
962
+ Insertion into Eq. (9) links the experimental dipole
963
+ GSF f(Eγ) to the value of the total average radiative
964
+ width ⟨Γγ⟩ obtained from s-wave neutron capture [55].
965
+ For a target nucleus with ground state spin It and parity
966
+ πt, Eq. (9) can be rewritten as
967
+ ⟨Γγ⟩ = ⟨Γ(Sn, It ± 1/2, πt)⟩ =
968
+ 1
969
+ 2ρ(Sn, It ± 1/2, πt)×
970
+ ×
971
+ � Sn
972
+ Eγ=0
973
+ dEγE3
974
+ γf(Eγ)ρ(Sn − Eγ)×
975
+ ×
976
+ 1
977
+
978
+ J=−1
979
+ g(Sn − Eγ, It ± 1/2 + J).
980
+ (11)
981
+ Here, we adopt again the assumption on an equal contri-
982
+ bution of states with positive and negative parities, and
983
+ apply the spin distribution function of Eq. (5). It can be
984
+ easily seen that the 1/ρ(Sn, It ± 1/2, πt) term equals the
985
+ D0 value. For the spin-cutoff parameter dependence on
986
+ the excitation energy, we follow the procedure outlined
987
+ in Ref. [17]:
988
+ σ2(Ex) = σ2
989
+ d + Ex − Ed
990
+ Sn − Ed
991
+ [σ2(Sn) − σ2
992
+ d],
993
+ (12)
994
+ where σd is estimated from the discrete lower-lying states
995
+ at Ex ≈ Ed [1] (see Table I).
996
+ In the case of 120Sn, the average total radiative width
997
+ ⟨Γγ⟩ was estimated as an average of three s-wave neu-
998
+ tron resonances with energies in the range of ≈ 455-
999
+ 828 eV [55]. The remaining two resonances presented in
1000
+ [55] were excluded due to either being possibly of p-wave
1001
+ nature, or having a significantly lower value as compared
1002
+ to values for confirmed s-wave resonances found in the
1003
+ neighbouring Sn isotopes. In the case of 124Sn, we per-
1004
+ formed a linear fit through all values of ⟨Γγ⟩ available for
1005
+ other Sn isotopes as shown in Fig. 3(a) to estimate the
1006
+ ⟨Γγ⟩ value for 124Sn.
1007
+ Ideally, the fit of the NLD to the low-lying discrete
1008
+ levels and the ρ(Sn) value are sufficient to constrain the
1009
+ slope parameter α for the GSF and NLD. However, the
1010
+ latter can be influenced by the range of experimentally
1011
+ 0
1012
+ 2
1013
+ 4
1014
+ 6
1015
+ 8
1016
+ 1
1017
+
1018
+ 10
1019
+ 1
1020
+ 10
1021
+ 2
1022
+ 10
1023
+ 3
1024
+ 10
1025
+ 4
1026
+ 10
1027
+ 5
1028
+ 10
1029
+ 6
1030
+ 10
1031
+ )
1032
+ -1
1033
+ ) (MeV
1034
+ x
1035
+ (E
1036
+ ρ
1037
+ Level density
1038
+ Oslo data
1039
+ Oslo data, red.
1040
+ Known descrete levels
1041
+ ) from neutron res. data
1042
+ n
1043
+ (S
1044
+ ρ
1045
+
1046
+ CT model
1047
+ Sn
1048
+ 120
1049
+ (a)
1050
+ 0
1051
+ 2
1052
+ 4
1053
+ 6
1054
+ 8
1055
+ (MeV)
1056
+ x
1057
+ Excitation energy E
1058
+ 1
1059
+
1060
+ 10
1061
+ 1
1062
+ 10
1063
+ 2
1064
+ 10
1065
+ 3
1066
+ 10
1067
+ 4
1068
+ 10
1069
+ 5
1070
+ 10
1071
+ 6
1072
+ 10
1073
+ )
1074
+ -1
1075
+ ) (MeV
1076
+ x
1077
+ (E
1078
+ ρ
1079
+ Level density
1080
+ Oslo data
1081
+ Oslo data, red.
1082
+ Known descrete levels
1083
+ ) from syst.
1084
+ n
1085
+ (S
1086
+ ρ
1087
+
1088
+ ) from syst., red.
1089
+ n
1090
+ (S
1091
+ ρ
1092
+
1093
+ CT model
1094
+ Sn
1095
+ 124
1096
+ (b)
1097
+ FIG. 4.
1098
+ Experimental nuclear level densities for 120Sn (a) and
1099
+ 124Sn (b). The NLDs at Sn are marked with crosses, discrete
1100
+ states are shown as shaded areas. For the 124Sn isotope both
1101
+ the total and reduced NLDs are shown. The first two vertical
1102
+ arrows at lower Ex energies on each figure constrain the lower
1103
+ excitation energy fit region, while the last two arrows at higher
1104
+ Ex energies mark the lower and upper limits for the higher
1105
+ excitation energy fit region.
1106
+ populated spins, which might be narrower than the in-
1107
+ trinsic2 spin distribution. This issue was previously dis-
1108
+ cussed in Refs. [73, 75]. An analysis of the observed tran-
1109
+ sitions in the unfolded matrices below Ei ≈ 4 − 5 MeV
1110
+ and their relative intensities can aid to reveal the popu-
1111
+ lated spins of the 120,124Sn nuclei populated in the (p, p′γ)
1112
+ reaction. However, this method has a large uncertainty
1113
+ in the determination of the exact maximum spin popu-
1114
+ lated in the reaction. Alternatively, one can make use
1115
+ of the new Shape method [71] to obtain the NLD slope
1116
+ that corresponds to the experimental spin range. This
1117
+ is of particular importance for 124Sn with no available
1118
+ neutron-resonance parameters.
1119
+ The application of the
1120
+ Shape method will be discussed in detail in Sec. II B.
1121
+ From the Shape method we obtained a reduction factor
1122
+ β for ρ(Sn), representing a certain fraction of the total
1123
+ 2 All existing spins possible for a given nucleus at a given excitation
1124
+ energy.
1125
+
1126
+ 8
1127
+ TABLE I. Parameters used for the normalization of the nuclear LD and GSF for 120,124Sn.
1128
+ Nucleus
1129
+ Sn
1130
+ D0
1131
+ a
1132
+ E1
1133
+ Ed
1134
+ σd
1135
+ σ(Sn)
1136
+ ρ(Sn)
1137
+ T
1138
+ E0
1139
+ β
1140
+ ⟨Γγ⟩
1141
+ (MeV)
1142
+ (eV)
1143
+ (MeV−1)
1144
+ (MeV)
1145
+ (MeV)
1146
+ (105 MeV −1)
1147
+ (MeV)
1148
+ (MeV)
1149
+ (meV)
1150
+ 120Sn
1151
+ 9.105
1152
+ 95(14)
1153
+ 13.92
1154
+ 1.12
1155
+ 2.53(4)
1156
+ 3.4(5)
1157
+ 5.82
1158
+ 3.66(54)
1159
+ 0.72+1
1160
+ −2
1161
+ 0.19+9
1162
+ −4
1163
+ 0.70
1164
+ 121(25)b
1165
+ 124Sn
1166
+ 8.489
1167
+
1168
+ 12.92
1169
+ 1.03
1170
+ 2.77(3)
1171
+ 3.3(5)
1172
+ 6.00
1173
+ 1.38(30)a
1174
+ 0.75+2
1175
+ −2
1176
+ -0.11+11
1177
+ −6
1178
+ 0.20
1179
+ 82(19)a
1180
+ a From systematics.
1181
+ b Modified with respect to the value pubished in Ref. [55].
1182
+ spin distribution from Eq. (5), corresponding to the re-
1183
+ duced spin range from J = 0 to a certain maximum spin.
1184
+ This was done by requesting optimally matching slopes
1185
+ of the Oslo method and the Shape method GSFs above
1186
+ Eγ ≈ 5 MeV. A rather strong reduction of the level den-
1187
+ sity in 124Sn at the neutron separation energy might re-
1188
+ flect some maximum limit of the experimental spin range.
1189
+ However, it is important to note that using experimental
1190
+ systematics of the ρ(Sn) and ⟨Γγ⟩ might have large un-
1191
+ certainties. In the case of 124Sn, it is quite probable that
1192
+ such a large reduction factor is needed due to, e.g., an
1193
+ overestimated ρ(Sn) from the χ2 fit of the systematics.
1194
+ The simultaneous use of the Oslo and Shape methods
1195
+ can therefore significantly reduce systematic uncertain-
1196
+ ties for the slopes of extracted strengths and level densi-
1197
+ ties. All parameters used in the normalization procedure
1198
+ for 120,124Sn are listed in Table I. The resulting NLDs
1199
+ for 120Sn and 124Sn with their estimated error bands are
1200
+ shown in Fig. 4.
1201
+ We note that the errors in Table I and the resulting
1202
+ error bands for the NLD and the GSF presented in sec-
1203
+ tions III and IV combine statistical and systematic com-
1204
+ ponents.
1205
+ The latter includes uncertainties introduced
1206
+ by the unfolding and the first-generation procedures for
1207
+ both 120,124Sn isotopes. These are propagated through
1208
+ the Oslo method according to the procedure outlined
1209
+ in Ref. [63].
1210
+ In addition, systematic uncertainties due
1211
+ to the normalization parameters are included. For the
1212
+ 120Sn isotope, the experimental uncertainty (1 standard
1213
+ deviation) of the D0 value was propagated to estimate
1214
+ the error for the NLD at the neutron separation energy.
1215
+ The experimental uncertainties of the radiative widths
1216
+ in 120Sn [55] were used to estimate the error of the aver-
1217
+ age, total radiative width ⟨Γγ⟩, contributing to the un-
1218
+ certainty of the scaling factor B. In the case of the 124Sn
1219
+ isotope, the errors of the ρ(Sn) and ⟨Γγ⟩ were calculated
1220
+ from the uncertainties of the χ2 fit parameters and prop-
1221
+ agated into the total uncertainties of the NLD and GSF.
1222
+ In the previously published result on 124Sn [50], a 50%
1223
+ uncertainty of ρ(Sn) was assumed to account for presum-
1224
+ ably underestimated errors from the χ2 fit. However, the
1225
+ excellent agreement within the estimated error bands of
1226
+ the slopes of the GSFs obtained with the Oslo and Shape
1227
+ method allows us to apply a more modest error band as
1228
+ presented in this work. All errors of the normalization
1229
+ parameters described above are summarised in Table I.
1230
+ B.
1231
+ Analysis with the Shape method
1232
+ Quite often, nuclei with no available neutron resonance
1233
+ data and/or a restricted experimental spin range are en-
1234
+ countered. One possible way to overcome this is the use
1235
+ of isotopic systematics comprising of nuclei with stable
1236
+ neighbouring A − 1 isotopes as applied in the present
1237
+ case for 124Sn.
1238
+ However, this is often not possible in
1239
+ other isotopic chains due to the lack of data (e.g. 127Sb
1240
+ [57]).
1241
+ Moreover, the question on whether systematics
1242
+ from neighbouring isotopic chains can be used for a given
1243
+ nucleus, and to what extent one can rely on these sys-
1244
+ tematics, is still open. Hence, an alternative way to con-
1245
+ strain the normalization parameters is required.
1246
+ The
1247
+ novel Shape method [71] provides a way to determine
1248
+ the slope parameter α for the NLD and the GSF without
1249
+ making use of neutron resonance data.
1250
+ The starting point for the method is extracting ex-
1251
+ perimental intensities of first generation γ transitions to
1252
+ specific final states with spins and parities Jπ at final
1253
+ excitation energies Ef, represented by diagonals in the
1254
+ primary matrix. The intensities (related to the branch-
1255
+ ing ratios) of these γ transitions are proportional to the
1256
+ number of counts ND in the diagonals.
1257
+ The selection
1258
+ of which diagonals are to be used depends on a partic-
1259
+ ular nucleus, the spacing between the final states, and
1260
+ whether the resolution is sufficient to distinguish between
1261
+ different diagonals. The main concept behind the Shape
1262
+ method is that the intensities of the γ transitions are
1263
+ proportional to the partial widths and hence to the GSF.
1264
+ By taking intensities of transitions in successive excita-
1265
+ tion energy bins, the functional form of the GSF can be
1266
+ obtained.
1267
+ In the case of 120,124Sn, the only two diagonals clearly
1268
+ seen in the primary matrices are the ground state di-
1269
+ agonal D1 and the diagonal corresponding to the first
1270
+ excited state D2 (marked accordingly as regions 1 and 2
1271
+ in Fig. 2(c) and (f)). For given initial excitation-energy
1272
+ bins Ei (horizontal line) they define the direct decay to
1273
+ the final excitation energy Ef at the ground state with
1274
+ Jπ = 0+ and the first excited state with Jπ = 2+ with
1275
+ γ-ray energies Eγ = Ei − Ef.
1276
+ The Shape method adopts the same form of the spin
1277
+ distribution, given by Eq. (5), as used in the Oslo
1278
+ method, and assumes γ transitions to be of predomi-
1279
+ nantly dipole nature (this has been confirmed by mea-
1280
+ suring angular distributions). According to Eq. (13) in
1281
+
1282
+ 9
1283
+ Ref. [71], the number of counts in a chosen diagonal
1284
+ ND corresponding to the final energy Ef is proportional
1285
+ to the population cross-section of initial states Ei with
1286
+ Ji = Jf −1, Jf, Jf +1, spin distribution function g(Ei, Ji)
1287
+ and the partial γ-decay width. For the case of 120,124Sn
1288
+ with the ground and first excited state diagonals D1 and
1289
+ D2, the following relations can be written
1290
+ f(Eγ1) ∝
1291
+ ND1
1292
+ E3
1293
+ γ1 · g(Ei, 1)
1294
+ f(Eγ2) ∝
1295
+ ND2
1296
+ E3
1297
+ γ2 · [g(Ei, 1) + g(Ei, 2) + g(Ei, 3)].
1298
+ (13)
1299
+ By varying Ei, one obtains corresponding pairs of values
1300
+ f(Eγ = Ei) and f(Eγ = Ei − Ex(2+)). As Eqs. (13)
1301
+ only give the proportionality with the GSF, these pairs
1302
+ are not normalized in absolute value.
1303
+ Firstly, the consecutive pairs of values are normalized
1304
+ internally, as shown and described in Fig. 2 of Ref. [71],
1305
+ to reconstruct the functional shape of the GSF. Thus,
1306
+ one can extract two GSFs, corresponding to decays to
1307
+ the ground state and decays to the first excited state.
1308
+ Secondly, the general shape of both GSF must be scaled
1309
+ to match any available strength below the neutron sepa-
1310
+ ration energy, i.e. normalizing to external experimental
1311
+ data. This is the main limitation of the method, as it
1312
+ provides only a slope, or a shape of the strength, but not
1313
+ the absolute GSF, and therefore requires some additional
1314
+ experimental information. For the 120,124Sn isotopes, the
1315
+ GSFs extracted from relativistic Coulomb excitation in
1316
+ forward-angle inelastic proton scattering below the neu-
1317
+ tron separation energy [12] were used to scale the GSF
1318
+ points obtained for both diagonals separately [50].
1319
+ The upper excitation energy limit for the application
1320
+ of the Shape method can, in principle, be extended to
1321
+ Sn, whilst the definition of the lower limit is rather ar-
1322
+ bitrary.
1323
+ The applicability of Eqs. (13) is restricted to
1324
+ the statistical excitation energy region where the spin
1325
+ distribution function g(Ex, J) can be trusted. There is
1326
+ no clear criterion for the minimum level density which
1327
+ can be considered high enough to assume this is fulfilled.
1328
+ In this work, we require that the level density must be
1329
+ at least 10 levels per excitation energy bin for the spin
1330
+ distribution g(Ex, J) to be applied.
1331
+ III.
1332
+ NUCLEAR LEVEL DENSITIES
1333
+ The experimental NLDs of 120,124Sn displayed in Fig. 4
1334
+ follow nicely the discrete low-lying states up to ≈ 3 MeV
1335
+ for 120Sn and ≈ 2.7 MeV for 124Sn.
1336
+ At higher ener-
1337
+ gies, the NLDs increase rapidly and reach an exponen-
1338
+ tial, constant-temperature behavior. This suggests that
1339
+ the level schemes used for the normalization of the NLDs
1340
+ can be considered complete up to ≈ 3 and 2.7 MeV for
1341
+ 120Sn and 124Sn, respectively. The energy resolution is
1342
+ sufficient to distinguish the ground state and the first ex-
1343
+ cited states, presented by two bumps at 0 and ≈ 1.1−1.2
1344
+ MeV for both nuclei. The presence of the data points
1345
+ between the ground and first excited states can be ex-
1346
+ plained by the finite excitation energy resolution of order
1347
+ 100 keV and presence of the leftover counts between the
1348
+ diagonals in the primary matrices after the background
1349
+ subtraction procedure. At higher excitation energies, the
1350
+ experimental points are following the CT model predic-
1351
+ tion, starting from ≈ 4 MeV. The normalization of the
1352
+ NLDs was found to be rather insensitive to the exact
1353
+ choice of the two upper normalization limits (the two ar-
1354
+ rows at higher excitation energies in Fig. 4), due to the
1355
+ smooth behaviour of the NLDs at higher excitation en-
1356
+ ergies.
1357
+ In
1358
+ Fig.
1359
+ 5
1360
+ we
1361
+ show
1362
+ a
1363
+ comparison
1364
+ of
1365
+ the
1366
+ total
1367
+ NLDs for Sn isotopes extracted with the Oslo method,
1368
+ including
1369
+ the
1370
+ present
1371
+ results
1372
+ for
1373
+ 120,124Sn.
1374
+ The
1375
+ 116,117,118,119,121,122Sn isotopes were previously studied
1376
+ with a 38-MeV beam of 3He using the (3He, αγ) and
1377
+ (3He, 3He γ) reaction channels and reported in Refs. [4,
1378
+ 66, 67]. The slopes of the NLDs for 120,124Sn are quite
1379
+ similar to each other (T = 0.72 and 0.75 MeV, see Ta-
1380
+ ble I) and those of other even-mass isotopes. All NLDs of
1381
+ even-mass nuclei agree quite well within the estimated er-
1382
+ ror bands below the neutron separation energy. However,
1383
+ it is important to note some differences in the normaliza-
1384
+ tion procedures in the newest analysis of 120,124Sn and
1385
+ the older analyses of even-mass isotopes. Firstly, all pre-
1386
+ vious analyses exploited the BSFG for the extrapolation
1387
+ of the highest experimental NLD points to the ρ(Sn) val-
1388
+ ues instead of the CT model. As was previously shown in
1389
+ Ref. [27] and confirmed for 120,124Sn, the CT model re-
1390
+ sults in a better χ2 fit value. For example, between ≈ 4.8
1391
+ and 6.8 MeV in 124Sn, the reduced χ2 value is a factor
1392
+ of 4 smaller for the CT model than for the BSFG model.
1393
+ This factor becomes larger and might exceed 10 if lower
1394
+ excitation energy points above ≈ 3 MeV are included.
1395
+ Secondly, the different form of the spin-cutoff parame-
1396
+ ter taken from Ref. [23] was used in the older analyses.
1397
+ The immediate consequence of this choice is slightly less
1398
+ steep slopes of the NLDs if the CT extrapolation is used.
1399
+ However, in combination with the BSFG extrapolation
1400
+ model, the resulting slopes of the NLDs in 116,118,122Sn
1401
+ are expected to be close to those obtained for 120,124Sn,
1402
+ as can also be observed in Fig. 5.
1403
+ In general, the NLDs of odd-mass Sn isotopes are by
1404
+ a factor of 7-8 higher than for the even-mass isotopes,
1405
+ primarily due to the unpaired valence neutron [29]. As
1406
+ compared to other even-mass isotopes, 120,124Sn demon-
1407
+ strate essentially the same features, such as the well-
1408
+ defined bumps at the ground and the first excited state
1409
+ and a step-like structure right below 3 MeV excitation
1410
+ energy.
1411
+ Earlier studies exploiting microscopic calcula-
1412
+ tions based on the seniority model link the latter fea-
1413
+ ture to breaking of consecutive nucleon Cooper pairs [62].
1414
+ Due to the closed proton shell, Z = 50, the break-
1415
+ ing of proton Cooper pairs is suppressed until higher
1416
+ excitation energies are reached.
1417
+ Thus, these step-like
1418
+ structures are likely to be correlated with the break-
1419
+
1420
+ 10
1421
+ 0
1422
+ 2
1423
+ 4
1424
+ 6
1425
+ 8
1426
+ (MeV)
1427
+ x
1428
+ Excitation energy E
1429
+ 1
1430
+
1431
+ 10
1432
+ 1
1433
+ 10
1434
+ 2
1435
+ 10
1436
+ 3
1437
+ 10
1438
+ 4
1439
+ 10
1440
+ 5
1441
+ 10
1442
+ )
1443
+ -1
1444
+ ) (MeV
1445
+ x
1446
+ (E
1447
+ ρ
1448
+ Level density
1449
+ Sn, Agvaanluvsan et al. (2009)
1450
+ 116
1451
+
1452
+ Sn, Agvaanluvsan et al. (2009)
1453
+ 117
1454
+
1455
+ Sn, Toft et al. (2010)
1456
+ 118
1457
+
1458
+ Sn, Toft et al. (2010)
1459
+ 119
1460
+
1461
+ Sn, present work
1462
+ 120
1463
+
1464
+ Sn, Toft et al. (2011)
1465
+ 121
1466
+
1467
+ Sn, Toft et al. (2011)
1468
+ 122
1469
+
1470
+ Sn, present work
1471
+ 124
1472
+
1473
+ FIG. 5.
1474
+ Experimental total nuclear level densities for 116Sn
1475
+ [4], 117Sn [4], 118Sn [66], 118Sn [66], 120Sn, 121Sn [67], 122Sn
1476
+ [67], 124Sn.
1477
+ ing of neutron pairs at energies exceeding 2∆n = 2.6
1478
+ and 2.5 MeV [19] for 120Sn and 124Sn, respectively. For
1479
+ higher excitation energies, where a continuous “melting”
1480
+ of Cooper pairs sets in, the NLDs follow a smooth trend
1481
+ with no distinctive structures, as previously observed for
1482
+ 116,118,122Sn [4, 66, 67].
1483
+ The inelastic proton scattering data [12], used for the
1484
+ absolute normalization of the Shape method GSFs, can
1485
+ also provide information on the partial NLD. The NLD
1486
+ of 1− states in 124Sn was extracted for the excitation-
1487
+ energy range ≈ 4.5 − 14.5 MeV by means of the fluctu-
1488
+ ation analysis [36], applying procedures analog to those
1489
+ used in Refs. [13, 58]. All details of the extraction proce-
1490
+ dure can be found in Ref. [11]. To compare with the Oslo
1491
+ data, we apply the spin distribution function in Eq. (5)
1492
+ to the total NLD of 124Sn to reduce it to the density
1493
+ of J = 1 levels for excitation energies above ≈ 3.2 MeV,
1494
+ where this function can be assumed to be applicable. Fur-
1495
+ ther, applying the assumption on equal contribution of
1496
+ positive- and negative-parity states [45, 49], the density
1497
+ of J = 1− states was obtained. In contrast to the previ-
1498
+ ously published results on 96Mo [51] and 208Pb [13], there
1499
+ is in fact a region of overlap between the two data sets, as
1500
+ shown in Fig. 6. The Oslo data, as well as the CT model
1501
+ used in the normalization procedure (blue dashed line),
1502
+ lie within, but closer to the lower edge of the error band
1503
+ for the inelastic proton scattering data up to ≈ 10.5 MeV.
1504
+ This provides support of the spin-cutoff model adopted
1505
+ in the Oslo-method normalization. A model predicting a
1506
+ higher spin-cutoff value than presented in Table I would
1507
+ imply a wider spin distribution and, therefore, a signifi-
1508
+ cantly lower fraction of J = 1 states leading to a larger
1509
+ 2
1510
+ 4
1511
+ 6
1512
+ 8
1513
+ 10
1514
+ 12
1515
+ 14
1516
+ 16
1517
+ (MeV)
1518
+ x
1519
+ Excitation energy E
1520
+ 10
1521
+ 2
1522
+ 10
1523
+ 3
1524
+ 10
1525
+ 4
1526
+ 10
1527
+ 5
1528
+ 10
1529
+ 6
1530
+ 10
1531
+ )
1532
+ -1
1533
+ ) (MeV
1534
+ x
1535
+ (E
1536
+ ρ
1537
+ Level density
1538
+ Oslo data
1539
+ (p,p') data
1540
+ ) from syst.
1541
+ n
1542
+ (S
1543
+ ρ
1544
+
1545
+ Composite formula, G&C (1965)
1546
+ BSFG model fit
1547
+ CT model fit
1548
+ Goriely et al. (2008)
1549
+ Hilaire et al. (2013)
1550
+ FIG. 6.
1551
+ Experimental nuclear level densities for 1± states
1552
+ for 124Sn obtained with the Oslo method (blue data points)
1553
+ and the (p, p′) data [12] (orange data points).
1554
+ The pre-
1555
+ diction of the CT model used for the normalization of the
1556
+ Oslo method data is shown by the dashed blue line.
1557
+ A
1558
+ fit with the BSFG through all data and with the compos-
1559
+ ite formula [23] are shown by the dashed magenta and solid
1560
+ cyan lines.
1561
+ Predictions of the microscopic Hartree-Fock-
1562
+ Bogoliubov+combinatorial method [26] and Hartree-Fock-
1563
+ Bogolyubov+Gogny force calculations [39] are marked by the
1564
+ dashed light and dark grey lines respectively.
1565
+ discrepancy between the Oslo and the (p, p′) data in the
1566
+ overlapping area. Thus, we can conclude that the spin-
1567
+ cutoff estimate provided by Eq. (7) is reasonable, and
1568
+ probably lies closer to the upper limit in the range of
1569
+ acceptable spin-cutoff values that would make the two
1570
+ experimental NLDs agree with each other.
1571
+ The constant temperature regime, characterized by the
1572
+ pair-breaking process, continues at least up to the neu-
1573
+ tron separation energy or higher, where the temperature
1574
+ begins to rise and the Fermi gas behaviour of nucleons
1575
+ sets in.
1576
+ As shown in Fig. 6, the CT model begins to
1577
+ deviate quite drastically from the (p, p′) data at higher
1578
+ excitation energies, well above the Sn value.
1579
+ For this
1580
+ reason, the BSFG model is expected to provide a more
1581
+ accurate description of the NLD at high excitation en-
1582
+ ergies, although it is not an appropriate model at lower
1583
+ excitation energies. The global fit of all data with the
1584
+ BSFG model only indeed fails to reproduce the regime of
1585
+ increasing nuclear temperature between ≈ 6.5−14 MeV,
1586
+ especially in the vicinity of the neutron separation energy
1587
+ and slightly above. The composite NLD formula, intro-
1588
+ duced by Gilbert and Cameron in Ref. [23] (denoted as
1589
+ G&C), combines the CT model at lower excitation ener-
1590
+ gies and the BSFG model at higher energies, and appears
1591
+ to be more suitable for the simultaneous description of
1592
+
1593
+ 11
1594
+ the Oslo and (p, p′) data. From the result of the fit with
1595
+ the composite NLD formula, the constant temperature
1596
+ regime holds up to ≈ 8.5 MeV, i.e. in the vicinity of the
1597
+ neutron separation energy. Even though this formula re-
1598
+ produces the general trend and performs better than the
1599
+ BSFG, it is still not able to completely describe the NLD
1600
+ above the neutron separation limit.
1601
+ Microscopic spin- and parity-dependent NLD calcula-
1602
+ tions based on the Hartree-Fock-Bogoliubov plus com-
1603
+ binatorial method [26] deviate from both the Oslo and
1604
+ the (p, p′) data throughout the whole energy range
1605
+ (from 3.2 to 14 MeV), being higher by a factor of ≈4-
1606
+ 5 on average.
1607
+ On the other hand, the NLD calcu-
1608
+ lated within the temperature-dependent Hartree-Fock-
1609
+ Bogolyubov approach with the Gogny force [39] follows
1610
+ the (p, p′) data and the composite formula prediction
1611
+ nicely from ≈ 6.5 MeV excitation energy and above,
1612
+ while still being about a factor of 3 higher than the Oslo-
1613
+ method NLD. For the case of the total NLD, this devia-
1614
+ tion might reach up to two orders of magnitude. We con-
1615
+ clude that although microscopic models are appealing, as
1616
+ they should in principle grasp the underlying physics in
1617
+ contrast to simple analytical formulae, they are at this
1618
+ point not able to describe experimental data well enough
1619
+ over a wide excitation-energy range.
1620
+ IV.
1621
+ PORTER-THOMAS FLUCTUATIONS AND
1622
+ γ−RAY STRENGTH FUNCTIONS
1623
+ The experimental GSFs extracted with the Oslo
1624
+ method result from averaging γ transitions over relatively
1625
+ wide excitation-energy windows, ≈ 4.6 for 120Sn and 3.5
1626
+ MeV for 124Sn (region 3 in Fig. 2(c) and (f)). Therefore,
1627
+ any variations of the strength due to PT fluctuations are
1628
+ expected to be strongly suppressed, lying well within the
1629
+ estimated error bands. As such, PT fluctuations play a
1630
+ minor role and have little influence on the overall shapes
1631
+ of the GSFs. However, to test the gBA hypothesis, it is
1632
+ necessary to investigate how the GSF varies as a function
1633
+ of excitation energy (and also, in principle, spin and par-
1634
+ ity of the initial and final states). Then, a complication
1635
+ arises, because the action of narrowing down the aver-
1636
+ aging interval to study the GSF for different specific ini-
1637
+ tial and final excitation energies will inevitably introduce
1638
+ larger uncertainties due to increased PT fluctuations of
1639
+ the partial radiative widths.
1640
+ Oslo-method data have previously been used to study
1641
+ the shapes of the GSFs as functions of initial and final
1642
+ excitation energies to address the question on the validity
1643
+ of the gBA hypothesis [16, 31, 32, 35]. With the excep-
1644
+ tion of Ref. [16], which presents a detailed discussion and
1645
+ estimates of the PT fluctuations for the case of 64,65Ni,
1646
+ the role of these fluctuations are approached mostly in a
1647
+ qualitative way. Due to the particularly high density of
1648
+ initial and accessible final states in 238Np, studied in Ref.
1649
+ [32], reaching up to ≈ 4.3·106 states at Sn = 5.488 MeV,
1650
+ the PT fluctuations are expected to be negligible for the
1651
+ comparison of individual GSFs for different individual
1652
+ initial and final excitation energies with the Oslo-method
1653
+ strength.
1654
+ An excellent agreement of all strengths was
1655
+ found, and this indeed serves as a strong argument for
1656
+ the validity of the gBA hypothesis [32]. Such a compari-
1657
+ son, however, is much more difficult in the case of lighter
1658
+ nuclei such as 46Ti [31], 64,65Ni [16], and 92Zr [71]. For
1659
+ example, the density of levels at Sn = 9.658 MeV in 64Ni
1660
+ is only ≈ 2.6·103 MeV−1, and variations on the strengths
1661
+ for specific excitation energies might reach some tens of
1662
+ percent of the absolute value [16]. In this regard, the nu-
1663
+ clei studied in this work present an intermediate case be-
1664
+ tween the heavy 238Np and relatively light 64,65Ni nuclei,
1665
+ with the total NLDs of ≈ 2.5 · 105 MeV−1 at Sn = 9.104
1666
+ MeV for 120Sn and ≈ 8.8·104 MeV−1 at Sn = 8.489 MeV
1667
+ for 124Sn.
1668
+ To study the variation in the GSFs of 120,124Sn, we
1669
+ follow the procedure outlined in Refs. [16, 35], assuming
1670
+ that the fluctuations of the GSF follow a χ2
1671
+ ν distribution
1672
+ with the number of degrees of freedom corresponding to
1673
+ the number of γ-ray transitions n(Eγ) at a given tran-
1674
+ sition energy Eγ. Relative fluctuations of the GSF are
1675
+ given by the ratio between the deviation σP T and average
1676
+ µ, or r = σP T /µ =
1677
+
1678
+ 2/ν, of the χ2
1679
+ ν distribution [59].
1680
+ The number of transitions (i.e., the number of partial
1681
+ widths, or primary transitions) n can be calculated for
1682
+ each Eγ for specific initial and final excitation energies,
1683
+ allowing to study how the fluctuations evolve with γ-ray
1684
+ and excitation energy. We adopt the following relation
1685
+ from Refs. [16, 35] to estimate the number of transitions
1686
+ n(Eγ, Ei):
1687
+ n(Eγ, Ei) =∆E2 �
1688
+
1689
+ 1
1690
+
1691
+ L=−1
1692
+
1693
+ π′
1694
+ ρ(Ei, J, π)×
1695
+ × ρ(Ei − Eγ, J + L, π′),
1696
+ (14)
1697
+ where we consider dipole transitions only, and ∆E is the
1698
+ excitation energy bin width. By substituting Ei with Ef
1699
+ and Ei − Eγ with Ef + Eγ, it is also possible to obtain
1700
+ the number of transitions as a function of Eγ and final
1701
+ excitation energy.
1702
+ We limit ourselves to two types of cases in estimating
1703
+ the GSF fluctuations. Firstly, we study the case when the
1704
+ initial Ei and final Ef excitation energies both lie within
1705
+ the quasi-continuum region, for which the spin distribu-
1706
+ tion of Eq. (5) is considered applicable. This allows to
1707
+ apply this distribution to account for the spin dependence
1708
+ of the NLDs in Eq. (14). Further, it is assumed again an
1709
+ equal contribution of positive- and negative-parity states
1710
+ within the quasi-continuum.
1711
+ We also require a mini-
1712
+ mum level density of 10 levels per bin, corresponding
1713
+ to Ef ≈ 3.2 MeV in 120Sn and Ef ≈ 3.0 MeV in 124Sn.
1714
+ Note that this is a rather crude estimate that should be
1715
+ taken with some caution. However, since we want to ob-
1716
+ tain an approximate magnitude of the fluctuations, small
1717
+ deviations from the spin distribution formula are not ex-
1718
+ pected to impact the results. Secondly, we consider ini-
1719
+ tial excited states within the quasi-continuum and final
1720
+
1721
+ 12
1722
+ 0
1723
+ 1
1724
+ 2
1725
+ 3
1726
+ 4
1727
+ 5
1728
+ 6
1729
+ (MeV)
1730
+ γ
1731
+ E
1732
+ 4
1733
+
1734
+ 10
1735
+ 3
1736
+
1737
+ 10
1738
+ 2
1739
+
1740
+ 10
1741
+ )
1742
+ γ
1743
+ r(E
1744
+ = 9.09 MeV
1745
+ i
1746
+ E
1747
+ = 8.19 MeV
1748
+ i
1749
+ E
1750
+ = 7.17 MeV
1751
+ i
1752
+ E
1753
+ = 6.14 MeV
1754
+ i
1755
+ E
1756
+ = 5.12 MeV
1757
+ i
1758
+ E
1759
+ Sn
1760
+ 120
1761
+ (a)
1762
+ 0
1763
+ 1
1764
+ 2
1765
+ 3
1766
+ 4
1767
+ 5
1768
+ 6
1769
+ (MeV)
1770
+ γ
1771
+ E
1772
+ 4
1773
+
1774
+ 10
1775
+ 3
1776
+
1777
+ 10
1778
+ 2
1779
+
1780
+ 10
1781
+ )
1782
+ γ
1783
+ r(E
1784
+ = 8.48 MeV
1785
+ i
1786
+ E
1787
+ = 7.36 MeV
1788
+ i
1789
+ E
1790
+ = 6.40 MeV
1791
+ i
1792
+ E
1793
+ = 5.44 MeV
1794
+ i
1795
+ E
1796
+ Sn
1797
+ 124
1798
+ (b)
1799
+ FIG. 7.
1800
+ Relative fluctuations of the GSF r(Eγ, Ei) for dif-
1801
+ ferent initial excitation energies for (a) 120Sn and (b) 124Sn.
1802
+ All initial Ei and final energies Ei − Eγ lie within the quasi-
1803
+ continuum region. The excitation and γ-ray energy bins are
1804
+ 128 keV for 120Sn and 160 keV for 124Sn.
1805
+ states with known parities and spins within the discrete
1806
+ region. Here, the level density at the final excitation en-
1807
+ ergy can be calculated directly using the known states
1808
+ from Ref. [1].
1809
+ Figure
1810
+ 7
1811
+ shows
1812
+ the
1813
+ relative
1814
+ GSF
1815
+ fluctuations
1816
+ r(Eγ, Ei) =
1817
+
1818
+ 2/n(Eγ, Ei) as functions of Eγ for transi-
1819
+ tions from different initial excitation-energy bins within
1820
+ the quasi-continuum for 120Sn and 124Sn. The data are
1821
+ shown for Ef ≥ 3.2 MeV for 120Sn and Ef ≥ 3.0 MeV
1822
+ for 124Sn, so that the final excitation energies of the in-
1823
+ cluded transitions lie within the quasi-continuum. The
1824
+ experimental level densities were used for the calculation.
1825
+ Similar to the results for 64,65Ni [16], the fluctuations in-
1826
+ crease exponentially with γ-ray energy for a given Ei, as
1827
+ well as from the lowest to the highest initial excitation
1828
+ energy at a given Eγ. This behaviour can easily be ex-
1829
+ plained by the decreasing number of possible transitions
1830
+ for consecutively lower excitation energies, given the ex-
1831
+ ponentially decreasing density of accessible levels.
1832
+ The magnitudes of the fluctuations in both nuclei are
1833
+ quite similar due to the similar values of the total NLDs,
1834
+ and all minor differences stem primarily from a slight
1835
+ difference in the bin width. At the neutron separation
1836
+ 0
1837
+ 2
1838
+ 4
1839
+ 6
1840
+ 8
1841
+ (MeV)
1842
+ γ
1843
+ E
1844
+ 3
1845
+
1846
+ 10
1847
+ 2
1848
+
1849
+ 10
1850
+ 1
1851
+
1852
+ 10
1853
+ 1
1854
+ 10
1855
+ 2
1856
+ 10
1857
+ )
1858
+ γ
1859
+ r(E
1860
+ g.s.)
1861
+ +
1862
+ = 0 MeV (0
1863
+ f
1864
+ E
1865
+ )
1866
+ +
1867
+ = 1.17 MeV (2
1868
+ f
1869
+ E
1870
+ )
1871
+ -
1872
+ , 7
1873
+ +
1874
+ , 4
1875
+ +
1876
+ , 2
1877
+ -
1878
+ = 2.43 MeV (3
1879
+ f
1880
+ E
1881
+ = 3.33 MeV
1882
+ f
1883
+ E
1884
+ = 4.35 MeV
1885
+ f
1886
+ E
1887
+ = 5.38 MeV
1888
+ f
1889
+ E
1890
+ = 6.40 MeV
1891
+ f
1892
+ E
1893
+ Sn
1894
+ 120
1895
+ (a)
1896
+ 0
1897
+ 2
1898
+ 4
1899
+ 6
1900
+ 8
1901
+ (MeV)
1902
+ γ
1903
+ E
1904
+ 3
1905
+
1906
+ 10
1907
+ 2
1908
+
1909
+ 10
1910
+ 1
1911
+
1912
+ 10
1913
+ 1
1914
+ 10
1915
+ 2
1916
+ 10
1917
+ )
1918
+ γ
1919
+ r(E
1920
+ g.s.)
1921
+ +
1922
+ = 0 MeV (0
1923
+ f
1924
+ E
1925
+ )
1926
+ +
1927
+ = 1.13 MeV (2
1928
+ f
1929
+ E
1930
+ )
1931
+ +
1932
+ , 4
1933
+ -
1934
+ , 5
1935
+ +
1936
+ = 2.24 MeV (0
1937
+ f
1938
+ E
1939
+ = 3.20 MeV
1940
+ f
1941
+ E
1942
+ = 4.16 MeV
1943
+ f
1944
+ E
1945
+ = 5.12 MeV
1946
+ f
1947
+ E
1948
+ = 6.08 MeV
1949
+ f
1950
+ E
1951
+ Sn
1952
+ 124
1953
+ (b)
1954
+ FIG. 8.
1955
+ Relative fluctuations of the GSF r(Eγ, Ef) for dif-
1956
+ ferent final excitation energies for (a) 120Sn and (b) 124Sn.
1957
+ All initial energies Ei − Eγ lie within the quasi-continuum
1958
+ region. The same applies to the different final energies Ef
1959
+ represented by blue lines. The red dashed line corresponds to
1960
+ the ground state as the final state, the green one corresponds
1961
+ to the first excited 2+ state as the final state, and the yellow
1962
+ one corresponds to several discrete final low-lying states. The
1963
+ excitation and γ-ray energy bins are 128 keV for 120Sn and
1964
+ 160 keV for 124Sn.
1965
+ energy, fluctuations in both nuclei range from ≈ 10−4 to
1966
+ 4 − 5 · 10−3 %, while for the lower excitation energy they
1967
+ reach up to ≈ 3 − 6%. Fluctuations of these orders of
1968
+ magnitude are indeed expected for the relatively heavy
1969
+ 120,124Sn nuclei. For example, based on the NLD of 64Ni
1970
+ [16] and 120Sn, the number of transitions at Ei ≈ 7.7
1971
+ MeV at Eγ ≈ 2.3 MeV in 120Sn is roughly by a factor
1972
+ of 1000 larger than in 64Ni, which indeed yields larger
1973
+ fluctuations in 64Ni by approximately a factor of 30.
1974
+ The relative GSF fluctuations calculated from the tran-
1975
+ sitions to specific final excitation energies demonstrate an
1976
+ opposite trend, exponentially decreasing with γ-ray en-
1977
+ ergies, as shown in Fig. 8. These trends are displayed
1978
+ with an approximately equal spacing for several final ex-
1979
+ citation energy bins within the quasi-continuum, as well
1980
+ as the bins containing the ground state, the first excited
1981
+ state, and several known low-lying excited states. In con-
1982
+ trast to the lowest initial excitation energies, fluctuations
1983
+ at final excitation energies below Ef ≈ 3 MeV reach up
1984
+
1985
+ 13
1986
+ to tens of percent and might become a considerable con-
1987
+ tribution to the total uncertainty of the GSF.
1988
+ The estimates of the PT fluctuations can be fur-
1989
+ ther put into the context of testing the gBA hypothesis
1990
+ for 120,124Sn.
1991
+ By analogy with the 238Np results from
1992
+ Ref. [32], the experimental data obtained for 120,124Sn
1993
+ can be readily used to test whether the transmission co-
1994
+ efficients, and, therefore, the GSFs, are dependent on the
1995
+ initial and final excitation energies. Equation (1) can be
1996
+ rewritten in the form [32]:
1997
+ P(Eγ, Ei)N(Ei) = T (Eγ) · ρ(Ei − Eγ),
1998
+ (15)
1999
+ where we introduce an additional energy-dependent fac-
2000
+ tor N(Ei) given by:
2001
+ N(Ei) =
2002
+ � Ei
2003
+ 0
2004
+ T (Eγ) · ρ(Ei − Eγ)dEγ
2005
+ � Ei
2006
+ 0
2007
+ P(Eγ, Ei)dEγ
2008
+ .
2009
+ (16)
2010
+ Here, we make use of the transmission coefficient ex-
2011
+ tracted from the Oslo method, and hence averaged over
2012
+ a wide range of excitation energies. We can deduce the
2013
+ transmission coefficient as a function of excitation energy
2014
+ and γ energy through
2015
+ T (Eγ, Ei) = P(Eγ, Ei)N(Ei)
2016
+ ρ(Ei − Eγ)
2017
+ .
2018
+ (17)
2019
+ A similar relation can be obtained for the final excitation
2020
+ energy by substituting Ei with Ef + Eγ.
2021
+ The GSFs for several initial excitation energies in the
2022
+ case of 120Sn were previously published in Ref. [50], where
2023
+ they were compared with the strength extracted with the
2024
+ Oslo method. In this work, we present the comparison
2025
+ of the individual GSFs for different initial and final ex-
2026
+ citation energy bins for both 120Sn and 124Sn with the
2027
+ corresponding Oslo-method results. Individual strengths
2028
+ are shown together with the error band due to the sta-
2029
+ tistical uncertainty propagated through the method, de-
2030
+ noted by statistical for short. As the Oslo-method GSF
2031
+ is an averaged strength with heavily suppressed PT fluc-
2032
+ tuations, it is shown with the total error band as well
2033
+ as additional error bars, denoting the expected PT fluc-
2034
+ tuations, or rather expected deviations of the individual
2035
+ strengths due to PT fluctuations. The latter is essential
2036
+ to assess whether there is an agreement or not between
2037
+ the strengths extracted for various excitation-energy bins
2038
+ and the Oslo-method strengths.
2039
+ The results for 120Sn at four initial excitation energies
2040
+ are shown in the upper row of Fig. 9.
2041
+ The dark grey
2042
+ shaded areas indicate regions of potential infinite fluctu-
2043
+ ations due to the expected zero values of the NLD at the
2044
+ final excitation energies in the energy gaps between the
2045
+ first few discrete states. As can be seen from Fig. 4, the
2046
+ experimental NLD has small non-zero values between the
2047
+ ground state and the first and second excited states at
2048
+ ≈ 1.171 and 1.875 MeV due to the experimental resolu-
2049
+ tion and the presence of some residual counts in the raw
2050
+ matrix after the background subtraction. The analysis
2051
+ applied to each individual excitation energy Ei gener-
2052
+ ates a continuous data set for the GSF from the high-
2053
+ est possible gamma-ray energy at Eγ = Ei downward
2054
+ to gamma-ray energies below 2 MeV shown for 120Sn in
2055
+ Fig. 9(a)-(d). The GSF values in the dark grey region at
2056
+ higher gamma energies belong to hypothetical primary
2057
+ gamma-ray transitions in the energy range between the
2058
+ ground state and 1.171 MeV, while the dark grey region
2059
+ at lower energies belongs to decays into the energy range
2060
+ from 1.171 MeV to 1.875 MeV. However, it should be
2061
+ mentioned that direct gamma decays to those final exci-
2062
+ tation energy regions are physically not possible and that
2063
+ the corresponding data points are artifacts of the contin-
2064
+ uous analysis. It is, however, interesting to observe that
2065
+ the PT fluctuation analysis reveals those regions by un-
2066
+ usually large PT fluctuations
2067
+ In case of fixed initial excitation energies, light grey
2068
+ shaded areas correspond to energy bins where the fluc-
2069
+ tuations can not be estimated either due to to Eγ > Ei
2070
+ or unambiguous spins of some final excited states. In the
2071
+ latter case it is no longer possible to define what spins of
2072
+ initial states within the quasi-continuum yielding dipole
2073
+ transitions must be included to the sum in Eq. 14 . For
2074
+ the rest of the experimental points, the fluctuations were
2075
+ estimated and shown in Fig. 9 as vertical error bars. The
2076
+ values of these errors exceed or are of the same magni-
2077
+ tude as the statistical uncertainties for high Eγ for all
2078
+ of the presented cases. For the highest initial excitation
2079
+ energies in Fig. 9, Ei = 7.74 and 7.10 MeV, they become
2080
+ increasingly suppressed as compared to the statistical er-
2081
+ rors, by roughly a factor of 10 at Eγ ≈ 4.5 MeV, gradu-
2082
+ ally increasing to ≈ 102 toward Eγ ≈ 1 MeV. For lower
2083
+ initial excitation energies, this factors are of order 1 and
2084
+ 10. Except for the strong deviations in the areas with ex-
2085
+ pected large fluctuations (dark grey areas), all strengths
2086
+ are in fairly good agreement with the Oslo-method result
2087
+ within its error band.
2088
+ Similar results with an excitation energy bin width of
2089
+ 160 keV are shown for 124Sn in the upper row of Fig. 10.
2090
+ Since the range of populated spins might be limited in
2091
+ this case, using the total NLD provides a lower estimate
2092
+ of the PT fluctuations, and they might be slightly larger
2093
+ than shown in the figure.
2094
+ By analogy with the case
2095
+ of 120Sn, the GSFs for different initial excitation ener-
2096
+ gies are in rather good agreement with the Oslo-method
2097
+ strength within the shown error bands and areas of ex-
2098
+ pected finite PT fluctuations. These results for both the
2099
+ 120,124Sn isotopes bring further support to the GSF be-
2100
+ ing independent on the initial excitation energy, in ac-
2101
+ cordance with the gBA hypothesis.
2102
+ At lower excitation energies, the uncertainty due to PT
2103
+ fluctuations is expected to gradually outweigh the statis-
2104
+ tical error bar. This effect becomes especially apparent
2105
+ for the GSFs extracted for specific final excitation-energy
2106
+ bins. The GSF for the ground state and the first excited
2107
+ state at 1.171 MeV in 120Sn are demonstrated in compari-
2108
+ son with the Oslo-method GSF in Figs. 9(e) and (f). The
2109
+ data are shown for Ef + Eγ ≥ 3.2 MeV. The area below
2110
+
2111
+ 14
2112
+ 8
2113
+
2114
+ 10
2115
+ 7
2116
+
2117
+ 10
2118
+ 6
2119
+
2120
+ 10
2121
+ )
2122
+ -3
2123
+ GSF (MeV
2124
+ = 5.82 MeV
2125
+ i
2126
+ E
2127
+ PT fluctuations
2128
+ Oslo method
2129
+ (a)
2130
+ )
2131
+ -3
2132
+ GSF (MeV
2133
+ = 6.46 MeV
2134
+ i
2135
+ E
2136
+ (b)
2137
+ 8
2138
+
2139
+ 10
2140
+ 7
2141
+
2142
+ 10
2143
+ 6
2144
+
2145
+ 10
2146
+ = 7.10 MeV
2147
+ i
2148
+ E
2149
+ (c)
2150
+ 8
2151
+
2152
+ 10
2153
+ 7
2154
+
2155
+ 10
2156
+ 6
2157
+
2158
+ 10
2159
+ = 7.74 MeV
2160
+ i
2161
+ E
2162
+ (d)
2163
+ 1
2164
+ 2
2165
+ 3
2166
+ 4
2167
+ 5
2168
+ 6
2169
+ 7
2170
+ 8
2171
+ 9
2172
+ (MeV)
2173
+ γ
2174
+ E
2175
+ 8
2176
+
2177
+ 10
2178
+ 7
2179
+
2180
+ 10
2181
+ 6
2182
+
2183
+ 10
2184
+ )
2185
+ -3
2186
+ GSF (MeV
2187
+ (e)
2188
+ = 0 MeV, g.s.
2189
+ f
2190
+ E
2191
+ PT fluctuations
2192
+ 1
2193
+ 2
2194
+ 3
2195
+ 4
2196
+ 5
2197
+ 6
2198
+ 7
2199
+ 8
2200
+ 9
2201
+ (MeV)
2202
+ γ
2203
+ E
2204
+ 8
2205
+
2206
+ 10
2207
+ 7
2208
+
2209
+ 10
2210
+ 6
2211
+
2212
+ 10
2213
+ )
2214
+ -3
2215
+ GSF (MeV
2216
+ (f)
2217
+ = 1.17 MeV
2218
+ f
2219
+ E
2220
+ 1
2221
+ 2
2222
+ 3
2223
+ 4
2224
+ 5
2225
+ 6
2226
+ 7
2227
+ 8
2228
+ 9
2229
+ (MeV)
2230
+ γ
2231
+ E
2232
+ 8
2233
+
2234
+ 10
2235
+ 7
2236
+
2237
+ 10
2238
+ 6
2239
+
2240
+ 10
2241
+ )
2242
+ -3
2243
+ GSF (MeV
2244
+ (g)
2245
+ = 2.50 MeV
2246
+ f
2247
+ E
2248
+ 1
2249
+ 2
2250
+ 3
2251
+ 4
2252
+ 5
2253
+ 6
2254
+ 7
2255
+ 8
2256
+ 9
2257
+ (MeV)
2258
+ γ
2259
+ E
2260
+ 8
2261
+
2262
+ 10
2263
+ 7
2264
+
2265
+ 10
2266
+ 6
2267
+
2268
+ 10
2269
+ )
2270
+ -3
2271
+ GSF (MeV
2272
+ Sn
2273
+ 120
2274
+ (h)
2275
+ = 3.26 MeV
2276
+ f
2277
+ E
2278
+ FIG. 9.
2279
+ GSFs for 120Sn at initial excitation energies (a) 5.82 MeV, (b) 6.46 MeV, (c) 7.10 MeV, (d) 7.74 MeV and final
2280
+ excitation energies (e) ground state, (f) first excited state, (g) 2.50 MeV, (h) 3.26 MeV compared to the Oslo method strength
2281
+ (blue shaded band). For each strength the statistical error band is shown together with the error due to the PT fluctuations.
2282
+ Dark grey regions correspond to the areas of expected infinite PT fluctuations, light grey area marks energies for which the
2283
+ fluctuations of the strength were not determined. The γ-ray and excitation energy bin widths are both 128 keV.
2284
+ 8
2285
+
2286
+ 10
2287
+ 7
2288
+
2289
+ 10
2290
+ 6
2291
+
2292
+ 10
2293
+ )
2294
+ -3
2295
+ GSF (MeV
2296
+ = 5.52 MeV
2297
+ i
2298
+ E
2299
+ PT fluctuations
2300
+ Oslo method
2301
+ (a)
2302
+ )
2303
+ -3
2304
+ GSF (MeV
2305
+ = 6.16 MeV
2306
+ i
2307
+ E
2308
+ (b)
2309
+ 8
2310
+
2311
+ 10
2312
+ 7
2313
+
2314
+ 10
2315
+ 6
2316
+
2317
+ 10
2318
+ = 6.96 MeV
2319
+ i
2320
+ E
2321
+ (c)
2322
+ 8
2323
+
2324
+ 10
2325
+ 7
2326
+
2327
+ 10
2328
+ 6
2329
+
2330
+ 10
2331
+ = 7.76 MeV
2332
+ i
2333
+ E
2334
+ (d)
2335
+ 1
2336
+ 2
2337
+ 3
2338
+ 4
2339
+ 5
2340
+ 6
2341
+ 7
2342
+ 8
2343
+ 9
2344
+ (MeV)
2345
+ γ
2346
+ E
2347
+ 8
2348
+
2349
+ 10
2350
+ 7
2351
+
2352
+ 10
2353
+ 6
2354
+
2355
+ 10
2356
+ )
2357
+ -3
2358
+ GSF (MeV
2359
+ (e)
2360
+ = 0 MeV, g.s.
2361
+ f
2362
+ E
2363
+ PT fluctuations
2364
+ 1
2365
+ 2
2366
+ 3
2367
+ 4
2368
+ 5
2369
+ 6
2370
+ 7
2371
+ 8
2372
+ 9
2373
+ (MeV)
2374
+ γ
2375
+ E
2376
+ 8
2377
+
2378
+ 10
2379
+ 7
2380
+
2381
+ 10
2382
+ 6
2383
+
2384
+ 10
2385
+ )
2386
+ -3
2387
+ GSF (MeV
2388
+ (f)
2389
+ = 1.13 MeV
2390
+ f
2391
+ E
2392
+ 1
2393
+ 2
2394
+ 3
2395
+ 4
2396
+ 5
2397
+ 6
2398
+ 7
2399
+ 8
2400
+ 9
2401
+ (MeV)
2402
+ γ
2403
+ E
2404
+ 8
2405
+
2406
+ 10
2407
+ 7
2408
+
2409
+ 10
2410
+ 6
2411
+
2412
+ 10
2413
+ )
2414
+ -3
2415
+ GSF (MeV
2416
+ (g)
2417
+ = 2.80 MeV
2418
+ f
2419
+ E
2420
+ 1
2421
+ 2
2422
+ 3
2423
+ 4
2424
+ 5
2425
+ 6
2426
+ 7
2427
+ 8
2428
+ 9
2429
+ (MeV)
2430
+ γ
2431
+ E
2432
+ 8
2433
+
2434
+ 10
2435
+ 7
2436
+
2437
+ 10
2438
+ 6
2439
+
2440
+ 10
2441
+ )
2442
+ -3
2443
+ GSF (MeV
2444
+ Sn
2445
+ 124
2446
+ (h)
2447
+ = 3.44 MeV
2448
+ f
2449
+ E
2450
+ FIG. 10.
2451
+ GSFs for 124Sn at initial excitation energies (a) 5.52 MeV, (b) 6.16 MeV, (c) 6.96 MeV, (d) 7.76 MeV and final
2452
+ excitation energies (e) ground state, (f) first excited state, (g) 2.80 MeV, (h) 3.44 MeV compared to the Oslo method strength
2453
+ (blue shaded band). For each strength the statistical error band is shown together with the error due to the PT fluctuations.
2454
+ Dark grey regions correspond to the areas of expected infinite PT fluctuations, light grey area marks energies for which the
2455
+ fluctuations of the strength were not determined. The γ-ray and excitation energy bin widths are both 160 keV.
2456
+ this energy and the area corresponding to Ef + Eγ > Sn
2457
+ are shaded. The fluctuations of the ground-state strength
2458
+ are large below ≈ 5 MeV, where they reach ≈ 40% of the
2459
+ absolute value. Between Eγ ≈ 3.3 and 5 MeV, the fluc-
2460
+ tuations of the strength are ≈ 60% on average and reach
2461
+ up to 90% toward the lowest γ energy. The latter case
2462
+ corresponds to only 1-3 possible dipole transitions at this
2463
+ Eγ. Applying the χ2
2464
+ ν distribution for fluctuations of so
2465
+
2466
+ 15
2467
+ 1
2468
+ 2
2469
+ 3
2470
+ 4
2471
+ 5
2472
+ 6
2473
+ 7
2474
+ 8
2475
+ 9
2476
+ (MeV)
2477
+ γ
2478
+ E
2479
+ 8
2480
+
2481
+ 10
2482
+ 7
2483
+
2484
+ 10
2485
+ 6
2486
+
2487
+ 10
2488
+ )
2489
+ -3
2490
+ GSF (MeV
2491
+ Oslo method
2492
+ -rays to the ground state
2493
+ γ
2494
+ Shape method,
2495
+ Porter-Thomas fluctuations
2496
+ (a)
2497
+ 1
2498
+ 2
2499
+ 3
2500
+ 4
2501
+ 5
2502
+ 6
2503
+ 7
2504
+ 8
2505
+ 9
2506
+ (MeV)
2507
+ γ
2508
+ E
2509
+ 8
2510
+
2511
+ 10
2512
+ 7
2513
+
2514
+ 10
2515
+ 6
2516
+
2517
+ 10
2518
+ )
2519
+ -3
2520
+ GSF (MeV
2521
+ -rays to the first excited state
2522
+ γ
2523
+ Shape method,
2524
+ Porter-Thomas fluctuations
2525
+ Sn
2526
+ 120
2527
+ (b)
2528
+ FIG. 11.
2529
+ Shape-method GSFs of 120Sn for γ−rays feeding
2530
+ the ground state (a) and the first excited state (b) compared
2531
+ to the Oslo method result (blue band). The Shape method re-
2532
+ sults are shown together with the statistical error propagated
2533
+ through the method, shown as a band (significantly smaller
2534
+ in width than the size of the data points), and the error bars
2535
+ due to the PT fluctuations. The Oslo method GSF is shown
2536
+ with the total (stat.+syst.) error band.
2537
+ few transition widths is not justified as it is valid solely
2538
+ in the statistical regime. Thus, the estimation procedure
2539
+ should be taken with great care when r(Eγ) approaches
2540
+ values of 1.
2541
+ Below ≈ 5 MeV, some strong deviations of the ground
2542
+ state strength from the Oslo-method result are observed.
2543
+ Besides the strong PT fluctuations at these γ-ray ener-
2544
+ gies, there might be some quadrupole transitions that
2545
+ cause methodical problems in this region. As the extrac-
2546
+ tion of the GSF relies on dipole radiation being dom-
2547
+ inant, quadrupole transitions from numerous low-lying
2548
+ 2+ states to the ground state could distort the strength
2549
+ as the factor of E5
2550
+ γ should be used instead of E3
2551
+ γ.
2552
+ At
2553
+ higher γ-ray energies, the ground-state strength repro-
2554
+ duces the slope of the Oslo method strength, lying well
2555
+ within the Oslo-method error band. Similar effects can
2556
+ be seen for the 124Sn (in Fig. 10(e), Ef +Eγ ≥ 3.0 MeV),
2557
+ where the fluctuations were again estimated with the to-
2558
+ tal NLD and, therefore, should be considered lower-limit
2559
+ estimates.
2560
+ High PT fluctuations of 10-60% are observed also for
2561
+ 1
2562
+ 2
2563
+ 3
2564
+ 4
2565
+ 5
2566
+ 6
2567
+ 7
2568
+ 8
2569
+ 9
2570
+ (MeV)
2571
+ γ
2572
+ E
2573
+ 8
2574
+
2575
+ 10
2576
+ 7
2577
+
2578
+ 10
2579
+ 6
2580
+
2581
+ 10
2582
+ )
2583
+ -3
2584
+ GSF (MeV
2585
+ Oslo method
2586
+ -rays to the ground state
2587
+ γ
2588
+ Shape method,
2589
+ Porter-Thomas fluctuations
2590
+ (a)
2591
+ 1
2592
+ 2
2593
+ 3
2594
+ 4
2595
+ 5
2596
+ 6
2597
+ 7
2598
+ 8
2599
+ 9
2600
+ (MeV)
2601
+ γ
2602
+ E
2603
+ 8
2604
+
2605
+ 10
2606
+ 7
2607
+
2608
+ 10
2609
+ 6
2610
+
2611
+ 10
2612
+ )
2613
+ -3
2614
+ GSF (MeV
2615
+ -rays to the first excited state
2616
+ γ
2617
+ Shape method,
2618
+ Porter-Thomas fluctuations
2619
+ Sn
2620
+ 124
2621
+ (b)
2622
+ FIG. 12.
2623
+ Same as Fig. 11, but for 124Sn.
2624
+ the GSF to the first excited states in both isotopes, as
2625
+ shown in Fig. 9(f) and 10(f).
2626
+ For both nuclei these
2627
+ strengths reproduce the slopes of the Oslo method GSF
2628
+ in the region between 5 and 6.5 MeV quite well. For the
2629
+ higher final excitation energies, the fluctuations of the
2630
+ strengths are at most by one order of magnitude larger
2631
+ than the statistical uncertainties at low γ−ray energies,
2632
+ whilst at higher γ−ray energies they are by one order of
2633
+ magnitude smaller. For these strengths it is challenging
2634
+ to argue for an exact agreement with the Oslo method
2635
+ result.
2636
+ If taking a general agreement of the strengths
2637
+ within the error bars as a criterion, it can be possible to
2638
+ claim an overall independence of the strengths of final
2639
+ excitation energy for 120,124Sn.
2640
+ As the PT fluctuations become more significant at
2641
+ lower final excitation energies, they are expected to make
2642
+ a considerable contribution to the total error band of the
2643
+ Shape-method results. In figures 11 and 12, the GSFs
2644
+ for γ rays feeding the ground state and the first excited
2645
+ 2+ state are shown for 120Sn and 124Sn, respectively, to-
2646
+ gether with the corresponding Oslo-method strengths.
2647
+ To test what a reasonable minimum excitation-energy
2648
+ limit would be for the application of the Shape method,
2649
+ we choose Ei = 4 MeV in both nuclei as a starting point.
2650
+ The Shape method results are presented with their statis-
2651
+ tical uncertainties, propagated through the unfolding and
2652
+ the first generation method. The Oslo-method strength
2653
+
2654
+ 16
2655
+ is shown with the total error band and the expected vari-
2656
+ ations of the corresponding ground-state or first-excited
2657
+ state strengths due to the PT fluctuations. Both of these
2658
+ strengths for 120Sn follow the shape of the Oslo-method
2659
+ strength quite well from the neutron separation energy
2660
+ and down to ≈ 5.5 − 6 MeV. Here, they start deviating
2661
+ gradually for lower γ-ray energies. In 124Sn, the agree-
2662
+ ment between the GSFs is quite good from Eγ ≈ 5 MeV
2663
+ and higher.
2664
+ Remarkably, the ground-state strengths and the first-
2665
+ excited state strengths for 120,124Sn demonstrate quite
2666
+ significant enhancements between 3 and 5 MeV, which
2667
+ can not be attributed to any real features of the strength.
2668
+ Moreover, there are no noticeable structures on the diag-
2669
+ onals at 4 < Ei < 5 MeV that might have induced these
2670
+ features. No similar effect was previously reported for
2671
+ even-even isotopes [71]. The appearance of these bumps
2672
+ might partly arise from the failure of the internal normal-
2673
+ isation technique at relatively low γ-ray energies where
2674
+ large fluctuations of the strengths are observed. The fluc-
2675
+ tuations of the ground-state strength in 120,124Sn range
2676
+ from ≈30 to 70% below 5.5 MeV, and from ≈15-35%
2677
+ below 4.3 MeV for the GSF corresponding to the first
2678
+ excited state. Since the pairs of data points for the two
2679
+ diagonals at each excitation energy are normalized in-
2680
+ ternally to each other (see Ref. [71]), large variations of
2681
+ the strengths could lead to an erratic internal normal-
2682
+ ization at relatively low γ-ray energies. When reaching
2683
+ densities of 1·103-2·103 levels per MeV, the distorting ef-
2684
+ fect due to the PT fluctuations becomes smaller, and
2685
+ the Shape-method results follow nicely the Oslo-method
2686
+ strength in both cases. This potential problem should be
2687
+ considered in future studies performed with the Shape
2688
+ method. When approaching the neutron separation en-
2689
+ ergies in 120,124Sn, fluctuations of the strengths do not
2690
+ exceed a few percent, which is comparable to the sta-
2691
+ tistical error bands shown in Figs. 11 and 12, whilst for
2692
+ the rest of the energy range, the PT fluctuations make a
2693
+ noticeable contribution to the uncertainties.
2694
+ Additional explanations for the smooth bump-like
2695
+ structures observed in the GSF might come from the fail-
2696
+ ure of some basic assumptions in the Shape method such
2697
+ as a symmetric parity distribution of the initial nuclear
2698
+ levels, pure dipole transitions of the involved γ-ray de-
2699
+ cays, and a spin-independent excitation probability in
2700
+ the (p, p′γ) reaction at 16 MeV. The lower the excitation
2701
+ energy, the less the assumption of a symmetric parity dis-
2702
+ tribution might be justified, especially in the magic Sn
2703
+ isotopes, so this may lead to deviations when using the
2704
+ Shape method at excitation energies below 5-6 MeV. Fur-
2705
+ thermore, similar to the discussion of the Oslo method,
2706
+ potential contributions of quadrupole transitions can dis-
2707
+ tort the analysis procedure due to the different energy
2708
+ factor of E5
2709
+ γ as compared to E3
2710
+ γ for dipole transitions.
2711
+ In particular, the excited 2+ states will most likely de-
2712
+ cay (on average) preferably to the first 2+ instead to the
2713
+ ground state. Within the Shape method, this can lead
2714
+ to the fact that the value of the GSF for the ground
2715
+ state γ-decay is (on average) smaller than for the decay
2716
+ into the first 2+ state. Thus the value pair in the Shape
2717
+ method has an increasing course towards low gamma en-
2718
+ ergies due to fto 2+[Ei − Ex(2+)] > fto g.s.[Ei − Ex(g.s.)]
2719
+ and might explain the increasing bump-like trend of the
2720
+ GSF. It remains an open question as to why the devia-
2721
+ tion of the strengths is systematically upward (always an
2722
+ increase) and whether the PT fluctuations, asymmetric
2723
+ parity distributions or the specific decay behavior of 2+
2724
+ states at low excitation energies are the main cause of
2725
+ the observed deviation
2726
+ V.
2727
+ CONCLUSIONS
2728
+ The nuclear level densities and γ-ray strength func-
2729
+ tions of 120,124Sn were extracted using the Oslo method,
2730
+ and the slopes of the strengths were additionally con-
2731
+ strained with the Shape method. The NLDs were found
2732
+ to be in good agreement with previously deduced NLDs
2733
+ for 116,118,122Sn, with slight deviations primarily due to
2734
+ some differences in the normalization procedures. The
2735
+ Oslo-method NLD for 1− states in 124Sn is in fairly
2736
+ good agreement within the estimated error bands with
2737
+ the result obtained from the fluctuation analysis of high-
2738
+ resolution inelastic proton scattering spectra above 6
2739
+ MeV. Given the model-independence of the (p, p′) result,
2740
+ this agreement supports the choice of the spin distribu-
2741
+ tion function and the spin-cutoff parameter employed in
2742
+ the Oslo method. The combined results covering excita-
2743
+ tion energies up to 14 MeV clearly demonstrate the tran-
2744
+ sition between the constant temperature and the Fermi
2745
+ gas regimes at ≈ 7 MeV.
2746
+ The experimental NLDs were used to estimate the role
2747
+ of the Porter-Thomas fluctuations in assessing the gen-
2748
+ eralised Brink-Axel hypothesis below the neutron sepa-
2749
+ ration energy in 120,124Sn, as well as the applicability of
2750
+ the Shape method. Most of the deviations of the GSFs
2751
+ for different initial and final excitation energies from
2752
+ the Oslo-method strength can be explained by strong
2753
+ PT fluctuations due to very few γ transitions. For the
2754
+ ground-state and the first-excited state strengths, this
2755
+ effect is especially apparent, with the PT fluctuations
2756
+ reaching up to 90-100% at low γ-ray energies. Despite
2757
+ some local discrepancies, the individual GSFs are in over-
2758
+ all good agreement with the Oslo-method strength within
2759
+ the error bands, suggesting an independence of initial
2760
+ and final excitation energies in support of the general-
2761
+ ized Brink-Axel hypothesis within uncertainties of the
2762
+ Oslo method.
2763
+ Strong PT fluctuations were found to play a notice-
2764
+ able role in the extraction of the GSFs with the Shape
2765
+ method, as they might contribute to considerable devia-
2766
+ tions from the Oslo-method result at low γ-ray energies.
2767
+ The reliability of the Shape method applied to 120,124Sn
2768
+ is under question for values of the NLDs below 1·103-
2769
+ 2·103 levels per MeV, but quite satisfactory above this
2770
+ limit in both nuclei. Further investigations are needed
2771
+
2772
+ 17
2773
+ to understand why the Shape method seemingly leads to
2774
+ an overestimate of the low-energy strength in the region
2775
+ where the PT fluctuations are large.
2776
+ ACKNOWLEDGMENTS
2777
+ The authors express their thanks to J. C. M¨uller,
2778
+ P. A. Sobas, and J. C. Wikne at the Oslo Cyclotron
2779
+ Laboratory for operating the cyclotron and providing
2780
+ excellent experimental conditions. A. Zilges is sincerely
2781
+ thanked for stimulating discussions and for providing the
2782
+ 120,124Sn targets. This work was supported in part by
2783
+ the National Science Foundation under Grant No. OISE-
2784
+ 1927130 (IReNA), by the Deutsche Forschungsgemein-
2785
+ schaft (DFG, German Research Foundation) under Grant
2786
+ No. SFB 1245 (project ID 279384907), by the Norwegian
2787
+ Research Council Grant 263030, and by the National Re-
2788
+ search Foundation of South Africa (Grant No. 118846).
2789
+ A. C. L. gratefully acknowledges funding by the Euro-
2790
+ pean Research Council through ERC-STG-2014 under
2791
+ Grant Agreement No. 637686, and from the Research
2792
+ Council of Norway, project number 316116.
2793
+ J. I. ac-
2794
+ knowledges the support by the State of Hesse within the
2795
+ Research Cluster ELEMENTS (Project ID 500/10.006)
2796
+ and within the LOEWE program “Nuclear Photonics”
2797
+ [1] Data taken from the ENSDF database of the NNDC
2798
+ online data service, https://www.nndc.bnl.gov/ensdf/.
2799
+ Last accessed: January 19, 2022.
2800
+ [2] Handbook for Calculations of Nuclear Reaction Data,
2801
+ RIPL-2. Number 1506 in TECDOC Series. International
2802
+ Atomic Energy Agency, Vienna, 2006.
2803
+ [3] S. Agostinelli, J. Allison, K. Amako, J. Apostolakis,
2804
+ H. Araujo, P. Arce, M. Asai, D. Axen, S. Banerjee,
2805
+ G. Barrand, et al. Nucl. Instrum. Methods Phys. Res.
2806
+ A, 506(3):250–303, 2003.
2807
+ [4] U.
2808
+ Agvaanluvsan,
2809
+ A.
2810
+ C.
2811
+ Larsen,
2812
+ M.
2813
+ Guttormsen,
2814
+ R. Chankova, G. E. Mitchell, A. Schiller, S. Siem, and
2815
+ A. Voinov. Phys. Rev. C, 79:014320, Jan 2009.
2816
+ [5] J. Allison,
2817
+ K. Amako,
2818
+ J. Apostolakis,
2819
+ H. Araujo,
2820
+ P. Arce Dubois, M. Asai, G. Barrand, R. Capra, S. Chau-
2821
+ vie, R. Chytracek, et al.
2822
+ IEEE Trans. Nucl. Sci.,
2823
+ 53(1):270–278, 2006.
2824
+ [6] J. Allison, K. Amako, J. Apostolakis, P. Arce, M. Asai,
2825
+ T. Aso, E. Bagli, A. Bagulya, S. Banerjee, G. Barrand,
2826
+ et al. Nucl. Instrum. Methods Phys. Res. A, 835:186–225,
2827
+ 2016.
2828
+ [7] C. T. Angell, S. L. Hammond, H. J. Karwowski, J. H.
2829
+ Kelley, M. Krtiˇcka, E. Kwan, A. Makinaga, and G. Ru-
2830
+ sev. Phys. Rev. C, 86:051302, Nov 2012.
2831
+ [8] M. Arnould, S. Goriely, and K. Takahashi. Phys. Rep.,
2832
+ 450(4):97 – 213, 2007.
2833
+ [9] G. Audi, A.H. Wapstra, and C. Thibault. Nucl. Phys. A,
2834
+ 729(1):337 – 676, 2003.
2835
+ [10] P. Axel. Phys. Rev., 126(2):671–683, April 1962.
2836
+ [11] S. Bassauer. PhD thesis, Universit¨at Darmstadt, 2019.
2837
+ D17.
2838
+ [12] S. Bassauer, P. von Neumann-Cosel, P.-G. Reinhard,
2839
+ A. Tamii, S. Adachi, C. A. Bertulani, P. Y. Chan,
2840
+ A. D’Alessio, H. Fujioka, H. Fujita, et al.
2841
+ Phys. Rev.
2842
+ C, 102:034327, Sep 2020.
2843
+ [13] S. Bassauer, P. von Neumann-Cosel, and A. Tamii. Phys.
2844
+ Rev. C, 94:054313, Nov 2016.
2845
+ [14] D. M. Brink, 1955. Doctoral thesis, Oxford University.
2846
+ [15] B. Alex Brown and A. C. Larsen.
2847
+ Phys. Rev. Lett.,
2848
+ 113:252502, Dec 2014.
2849
+ [16] L. Crespo Campo, M. Guttormsen, F. L. Bello Garrote,
2850
+ T. K. Eriksen, F. Giacoppo, A. G¨orgen, K. Hadynska-
2851
+ Klek, M. Klintefjord, A. C. Larsen, T. Renstrøm, et al.
2852
+ Phys. Rev. C, 98:054303, Nov 2018.
2853
+ [17] R. Capote, M. Herman, P. Obloˇzinsk´y, P.G. Young,
2854
+ S. Goriely, T. Belgya, A.V. Ignatyuk, A.J. Koning, S. Hi-
2855
+ laire, V.A. Plujko, et al. Nucl. Data Sheets, 110:3107–
2856
+ 3214, 2009.
2857
+ [18] M. B. Chadwick, M. Herman, P. Oblo˘zinsk´y, M. E.
2858
+ Dunn, Y. Danon, A. C. Kahler, D. L. Smith, B. Prity-
2859
+ chenko, G. Arbanas, R. Arcilla, et al. Nucl. Data Sheets,
2860
+ 112(12):2887 – 2996, 2011. Special Issue on ENDF/B-
2861
+ VII.1 Library.
2862
+ [19] J. Dobaczewski, P. Magierski, W. Nazarewicz, W. Satu�la,
2863
+ and Z. Szyma´nski. Phys. Rev. C, 63:024308, Jan 2001.
2864
+ [20] T. Ericson and V. Strutinski.
2865
+ Nucl. Phys., 8:284–293,
2866
+ June 1958.
2867
+ [21] Torleif Ericson. Nucl. Phys., 11:481–491, 1959.
2868
+ [22] A. Giaz, L. Pellegri, S. Riboldi, F. Camera, N. Blasi,
2869
+ C. Boiano, A. Bracco, S. Brambilla, S. Ceruti, S. Coelli,
2870
+ et al. Nucl. Instrum. Methods. Phys. Res. A, 729:910–
2871
+ 921, 2013.
2872
+ [23] A. Gilbert and A. G. W. Cameron.
2873
+ Can. J. Phys.,
2874
+ 43(8):1446–1496, 1965.
2875
+ [24] S. Goriely. Phys. Lett. B, 436(1):10 – 18, 1998.
2876
+ [25] S. Goriely, P. Dimitriou, M. Wiedeking, T. Belgya,
2877
+ R. Firestone,
2878
+ J. Kopecky,
2879
+ M. Krtiˇcka,
2880
+ V. Plujko,
2881
+ R. Schwengner, S. Siem, et al. Eur. Phys. J. A, 55:172,
2882
+ 2019.
2883
+ [26] S. Goriely, S. Hilaire, and A. J. Koning. Phys. Rev. C,
2884
+ 78:064307, Dec 2008.
2885
+ [27] M. Guttormsen, M. Aiche, F. L. Bello Garrote, L. A.
2886
+ Bernstein, D. L. Bleuel, Y. Byun, Q. Ducasse, T. K.
2887
+ Eriksen, F. Giacoppo, A. G¨orgen, et al. Eur. Phys. J.
2888
+ A, 51:170, 2015.
2889
+ [28] M. Guttormsen, A. Ata¸c, K. Klungland, S. Messelt,
2890
+ T. Ramsøy, J. Rekstad, T.S. Tveter, and Z. Zelazny.
2891
+ Nucl. Phys. A, 531(2):370–382, 1991.
2892
+ [29] M. Guttormsen, A. Bagheri, R. Chankova, J. Rekstad,
2893
+ S. Siem, A. Schiller, and A. Voinov.
2894
+ Phys. Rev. C,
2895
+ 68:064306, Dec 2003.
2896
+ [30] M. Guttormsen, A. B¨urger, T. E. Hansen, and N. Lietaer.
2897
+ Nucl. Instrum. Methods Phys. Res. A, 648(1):168–173,
2898
+ August 2011.
2899
+ [31] M. Guttormsen, A. C. Larsen, A. B¨urger, A. G¨orgen,
2900
+ S. Harissopulos, M. Kmiecik, T. Konstantinopoulos,
2901
+ M. Krtiˇcka, A. Lagoyannis, T. L¨onnroth, et al.
2902
+ Phys.
2903
+ Rev. C, 83:014312, Jan 2011.
2904
+ [32] M. Guttormsen, A. C. Larsen, A. G¨orgen, T. Renstrøm,
2905
+ S. Siem, T. G. Tornyi, and G. M. Tveten. Phys. Rev.
2906
+
2907
+ 18
2908
+ Lett., 116:012502, Jan 2016.
2909
+ [33] M. Guttormsen, T. Ramsøy, and J. Rekstad.
2910
+ Nucl.
2911
+ Instrum. Methods Phys. Res. A, 255(3):518–523, April
2912
+ 1987.
2913
+ [34] M. Guttormsen, T. S. Tveter, L. Bergholt, F. Ingebret-
2914
+ sen, and J. Rekstad. Nucl. Instrum. Methods Phys. Res.
2915
+ A, 374(3):371–376, June 1996.
2916
+ [35] Magne
2917
+ Guttormsen,
2918
+ Ann-Cecilie
2919
+ Larsen,
2920
+ Andreas
2921
+ G¨orgen,
2922
+ Therese
2923
+ Renstrøm,
2924
+ Sunniva
2925
+ Siem,
2926
+ Tamas
2927
+ Tornyi, and Gry Merete Tveten.
2928
+ PoS, INPC2016:062,
2929
+ 2017.
2930
+ [36] P. O. Hansen, B. Jonson, and A. Richter. Nucl. Phys. A,
2931
+ 518(1):13–34, 1990.
2932
+ [37] Walter Hauser and Herman Feshbach.
2933
+ Phys. Rev.,
2934
+ 87:366–373, Jul 1952.
2935
+ [38] Ra´ul A. Herrera, Calvin W. Johnson, and George M.
2936
+ Fuller. Phys. Rev. C, 105:015801, Jan 2022.
2937
+ [39] S. Hilaire, M. Girod, S. Goriely, and A. J. Koning. Phys.
2938
+ Rev. C, 86:064317, Dec 2012.
2939
+ [40] N. Quang Hung, N. Dinh Dang, and L. T. Quynh Huong.
2940
+ Phys. Rev. Lett., 118:022502, Jan 2017.
2941
+ [41] V. W. Ingeberg, S. Siem, M. Wiedeking, K. Sieja, D. L.
2942
+ Bleuel, C. P. Brits, T. D. Bucher, T. S. Dinoko, J. L.
2943
+ Easton, A. G¨orgen, et al.
2944
+ Eur. Phys. J. A, 56(2):68,
2945
+ 2020.
2946
+ [42] J. Isaak, D. Savran, M. Krtiˇcka, M.W. Ahmed, J. Beller,
2947
+ E. Fiori, J. Glorius, J.H. Kelley, B. L¨oher, N. Pietralla,
2948
+ et al. Phys. Lett. B, 727(4):361–365, 2013.
2949
+ [43] J. Isaak, D. Savran, B. L¨oher, T. Beck, M. Bhike,
2950
+ U.
2951
+ Gayer,
2952
+ Krishichayan,
2953
+ N.
2954
+ Pietralla,
2955
+ M.
2956
+ Scheck,
2957
+ W. Tornow, et al. Phys. Lett. B, 788:225 – 230, 2019.
2958
+ [44] Calvin W. Johnson. Phys. Lett. B, 750:72 – 75, 2015.
2959
+ [45] Y. Kalmykov, C. ¨Ozen, K. Langanke, G. Mart´ınez-
2960
+ Pinedo, P. von Neumann-Cosel, and A. Richter. Phys.
2961
+ Rev. Lett., 99:202502, Nov 2007.
2962
+ [46] J. Kopecky and M. Uhl.
2963
+ Phys. Rev. C, 41:1941–1955,
2964
+ May 1990.
2965
+ [47] A. C. Larsen, M. Guttormsen, M. Krtiˇcka, E. Bˇet´ak,
2966
+ A. B¨urger,
2967
+ A. G¨orgen,
2968
+ H. T. Nyhus,
2969
+ J. Rekstad,
2970
+ A. Schiller, S. Siem, et al. Phys. Rev. C, 83:034315, Mar
2971
+ 2011.
2972
+ [48] A. C. Larsen, A. Spyrou, S.N. Liddick, and M. Guttorm-
2973
+ sen. Prog. Part. Nucl. Phys., 107:69–108, 2019.
2974
+ [49] S.J. Lokitz, G.E. Mitchell, and J.F. Shriner. Phys. Lett.
2975
+ B, 599(3):223–229, 2004.
2976
+ [50] M. Markova, P. von Neumann-Cosel, A. C. Larsen,
2977
+ S. Bassauer, A. G¨orgen, M. Guttormsen, F. L. Bello Gar-
2978
+ rote, H. C. Berg, M. M. Bjørøen, T. Dahl-Jacobsen, et al.
2979
+ Phys. Rev. Lett., 127:182501, Oct 2021.
2980
+ [51] D. Martin, P. von Neumann-Cosel, A. Tamii, N. Aoi,
2981
+ S. Bassauer, C. A. Bertulani, J. Carter, L. Donaldson,
2982
+ H. Fujita, Y. Fujita, et al. Phys. Rev. Lett., 119:182503,
2983
+ Nov 2017.
2984
+ [52] J. E. Midtbø. PhD thesis, University of Oslo, 2019.
2985
+ [53] Jørgen E. Midtbø, Fabio Zeiser, Erlend Lima, Ann-
2986
+ Cecilie
2987
+ Larsen,
2988
+ Gry
2989
+ M.
2990
+ Tveten,
2991
+ Magne
2992
+ Guttorm-
2993
+ sen, Frank Leonel Bello Garrote, Anders Kvellestad,
2994
+ and Therese Renstrøm.
2995
+ Comput. Phys. Commun.,
2996
+ 262:107795, 2021.
2997
+ [54] G. Wendell Misch, George M. Fuller, and B. Alex Brown.
2998
+ Phys. Rev. C, 90:065808, Dec 2014.
2999
+ [55] Said Mughabghab. Atlas of neutron resonances; 6th ed.
3000
+ Elsevier, Amsterdam, 2018.
3001
+ [56] L. Netterdon, A. Endres, S. Goriely, J. Mayer, P. Scholz,
3002
+ M. Spieker, and A. Zilges. Phys. Lett. B, 744:358–362,
3003
+ 2015.
3004
+ [57] F. Pogliano et al. in preparation, 2022.
3005
+ [58] I. Poltoratska, R. W. Fearick, A. M. Krumbholz, E. Litvi-
3006
+ nova, H. Matsubara, P. von Neumann-Cosel, V. Yu.
3007
+ Ponomarev, A. Richter, and A. Tamii.
3008
+ Phys. Rev. C,
3009
+ 89:054322, May 2014.
3010
+ [59] C. E. Porter and R. G. Thomas. Phys. Rev., 104:483–491,
3011
+ Oct 1956.
3012
+ [60] Stefano Riboldi, Franco Camera, Nives Blasi, Sergio
3013
+ Brambilla, Ciro Boiano, Fabio C.L. Crespi, Agnese Giaz,
3014
+ Benedicte Million, Roberto Nicolini, Luna Pellegri, and
3015
+ Oliver Wieland. In 2011 IEEE Nuclear Science Sympo-
3016
+ sium Conference Record, pages 776–778, 2011.
3017
+ [61] M. Salvatores and G. Palmiotti. Prog. Part. Nucl. Phys.,
3018
+ 66(1):144 – 166, 2011.
3019
+ [62] A. Schiller, E. Algin, L. A. Bernstein, P. E. Garrett,
3020
+ M. Guttormsen, M. Hjorth-Jensen, C. W. Johnson, G. E.
3021
+ Mitchell, J. Rekstad, S. Siem, et al.
3022
+ Phys. Rev. C,
3023
+ 68:054326, Nov 2003.
3024
+ [63] A. Schiller, L. Bergholt, M. Guttormsen, E. Melby,
3025
+ J. Rekstad, and S. Siem. Nucl. Instrum. Methods Phys.
3026
+ Res. A, 447(3):498–511, June 2000.
3027
+ [64] P. Scholz, M. Guttormsen, F. Heim, A. C. Larsen,
3028
+ J. Mayer, D. Savran, M. Spieker, G. M. Tveten, A. V.
3029
+ Voinov, J. Wilhelmy, F. Zeiser, and A. Zilges. Phys. Rev.
3030
+ C, 101:045806, Apr 2020.
3031
+ [65] A. Spyrou, S. N. Liddick, A. C. Larsen, M. Guttormsen,
3032
+ K. Cooper, A. C. Dombos, D. J. Morrissey, F. Naqvi,
3033
+ G. Perdikakis, S. J. Quinn, et al.
3034
+ Phys. Rev. Lett.,
3035
+ 113:232502, Dec 2014.
3036
+ [66] H. K. Toft, A. C. Larsen, U. Agvaanluvsan, A. B¨urger,
3037
+ M. Guttormsen, G. E. Mitchell, H. T. Nyhus, A. Schiller,
3038
+ S. Siem, N. U. H. Syed, and A. Voinov. Phys. Rev. C,
3039
+ 81:064311, Jun 2010.
3040
+ [67] H. K. Toft, A. C. Larsen, A. B¨urger, M. Guttormsen,
3041
+ A. G¨orgen, H. T. Nyhus, T. Renstrøm, S. Siem, G. M.
3042
+ Tveten, and A. Voinov. Phys. Rev. C, 83:044320, Apr
3043
+ 2011.
3044
+ [68] T. von Egidy and D. Bucurescu. Phys. Rev. C, 72:044311,
3045
+ Oct 2005.
3046
+ [69] H. A. Weidenm¨uller and G. E. Mitchell. Rev. Mod. Phys.,
3047
+ 81:539–589, May 2009.
3048
+ [70] M. Wiedeking, L. A. Bernstein, M. Krtiˇcka, D. L. Bleuel,
3049
+ J. M. Allmond, M. S. Basunia, J. T. Burke, P. Fallon,
3050
+ R. B. Firestone, B. L. Goldblum, et al. Phys. Rev. Lett.,
3051
+ 108:162503, Apr 2012.
3052
+ [71] M. Wiedeking, M. Guttormsen, A. C. Larsen, F. Zeiser,
3053
+ A. G¨orgen, S. N. Liddick, D. M¨ucher, S. Siem, and
3054
+ A. Spyrou. Phys. Rev. C, 104:014311, Jul 2021.
3055
+ [72] XIA. Pixie-16 User Manual, Version 3.06, 2019.
3056
+ [73] F. Zeiser, G. Potel, G. M. Tveten, A. C. Larsen, M. Gut-
3057
+ tormsen, T. A. Laplace, S. Siem, D. L. Bleuel, B. L.
3058
+ Goldblum, L. A. Bernstein, et al. Springer Proc. Phys.,
3059
+ 254:195–202, 2020.
3060
+ [74] F. Zeiser, G. M. Tveten, F. L. Bello Garrote, M. Gut-
3061
+ tormsen, A. C. Larsen, V. W. Ingeberg, A. G¨orgen,
3062
+ and S. Siem.
3063
+ Nucl. Instrum. Methods Phys. Res. A,
3064
+ 985(1):164678, January 2021.
3065
+ [75] F. Zeiser, G. M. Tveten, G. Potel, A. C. Larsen, M. Gut-
3066
+ tormsen, T. A. Laplace, S. Siem, D. L. Bleuel, B. L. Gold-
3067
+ blum, L. A. Bernstein, et al. Phys. Rev. C, 100:024305,
3068
+ Aug 2019.
3069
+
3070
+ 19
3071
+ [76] Fabio
3072
+ Zeiser
3073
+ and
3074
+ Gry
3075
+ M
3076
+ Tveten.
3077
+ oslocyclotron-
3078
+ lab/ocl geant4: Geant4 model of OSCAR, August 2018.
3079
+
A9E4T4oBgHgl3EQf5A6T/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BdAzT4oBgHgl3EQf___2/content/tmp_files/2301.01958v1.pdf.txt ADDED
@@ -0,0 +1,1192 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.01958v1 [math.CO] 5 Jan 2023
2
+ Interaction graphs of isomorphic automata networks I:
3
+ complete digraph and minimum in-degree
4
+ Florian Bridoux∗, K´evin Perrot†, Aymeric Picard Marchetto‡, Adrien Richard§,
5
+ January 6, 2023
6
+ Abstract
7
+ An automata network with n components over a finite alphabet Q of size q is a discrete
8
+ dynamical system described by the successive iterations of a function f : Qn → Qn. In most
9
+ applications, the main parameter is the interaction graph of f: the digraph with vertex set
10
+ [n] that contains an arc from j to i if fi depends on input j. What can be said on the set
11
+ G(f) of the interaction graphs of the automata networks isomorphic to f? It seems that this
12
+ simple question has never been studied. Here, we report some basic facts. First, we prove
13
+ that if n ≥ 5 or q ≥ 3 and f is neither the identity nor constant, then G(f) always contains
14
+ the complete digraph Kn, with n2 arcs. Then, we prove that G(f) always contains a digraph
15
+ whose minimum in-degree is bounded as a function of q. Hence, if n is large with respect to
16
+ q, then G(f) cannot only contain Kn. However, we prove that G(f) can contain only dense
17
+ digraphs, with at least ⌊n2/4⌋ arcs.
18
+ 1
19
+ Introduction
20
+ An automata network with n components over a finite alphabet Q is a function
21
+ f : Qn → Qn,
22
+ x = (x1, . . . , xn) �→ f(x) = (f1(x), . . . , fn(x)).
23
+ The components fi : Qn → Q, are usually called the local transition functions of the network,
24
+ while f is referred as the global transition function (but here we identify this function as the
25
+ network). Automata networks are also called finite dynamical systems, and in the binary case,
26
+ when Q = {0, 1}, the term Boolean networks is applied.
27
+ The dynamics described by f is explicitly represented by the digraph Γ(f) with vertex set
28
+ Qn and an arc from x to f(x) for every x ∈ Qn. Two automata networks f, h : Qn → Qn are
29
+ isomorphic, f ∼ h in notation, if Γ(f) and Γ(h) are isomorphic in the usual sense; equivalently,
30
+ there is permutation π of Qn such that π ◦f = h◦π. An equivalence class of ∼ then corresponds
31
+ to an unlabeled digraph with |Q|n vertices in which each vertex has out-degree exactly one.
32
+ Automata networks have many applications.
33
+ In particular, they are omnipresent in the
34
+ modeling of neural and gene networks (see [5] for a review). The “network” terminology comes
35
+ from the fact that the interaction graph of f is often considered as the main parameter: it is
36
+ the digraph G(f) with vertex set [n] = {1, . . . , n} and such that, for all i, j ∈ [n], there is an arc
37
+ ∗Universit´e Cˆote d’Azur, CNRS, I3S, Sophia Antipolis, France. ([email protected])
38
+ †Aix-Marseille Universit´e, Universit´e de Toulon, CNRS, LIS, Marseille, France. ([email protected])
39
+ ‡Universit´e Cˆote d’Azur, CNRS, I3S, Sophia Antipolis, France. ([email protected])
40
+ §Universit´e Cˆote d’Azur, CNRS, I3S, Sophia Antipolis, France. ([email protected])
41
+ 1
42
+
43
+ x
44
+ f(x)
45
+ 000
46
+ 000
47
+ 001
48
+ 100
49
+ 010
50
+ 000
51
+ 011
52
+ 100
53
+ 100
54
+ 000
55
+ 101
56
+ 100
57
+ 110
58
+ 000
59
+ 111
60
+ 100
61
+ Γ(f)
62
+ 000
63
+ 100
64
+ 010
65
+ 110
66
+ 001 101 011 111
67
+ f1(x) = x3
68
+ f2(x) = 0
69
+ f3(x) = 0
70
+ G(f)
71
+ 1
72
+ 2
73
+ 3
74
+ x
75
+ h(x)
76
+ 000
77
+ 000
78
+ 001
79
+ 111
80
+ 010
81
+ 111
82
+ 011
83
+ 111
84
+ 100
85
+ 111
86
+ 101
87
+ 000
88
+ 110
89
+ 000
90
+ 111
91
+ 000
92
+ Γ(h)
93
+ 000
94
+ 111
95
+ 101
96
+ 110
97
+ 100 010 001 011
98
+ h1(x) = x1 + (x2 ∨ x3)
99
+ h2(x) = x1 + (x2 ∨ x3)
100
+ h3(x) = x1 + (x2 ∨ x3)
101
+ G(h)
102
+ 1
103
+ 2
104
+ 3
105
+ Figure 1: Two isomorphic automata networks on {0, 1}3 with different interaction graphs.
106
+ from j to i if fi depends on input j, that is, if there exist x, y ∈ Qn which only differ in xj ̸= yj
107
+ such that fi(x) ̸= fi(y).
108
+ In many applications, as modeling of gene networks, the interaction graph is often well ap-
109
+ proximated while the actual dynamics is not [7, 5]. One is thus faced with the following question:
110
+ what can be said on the dynamics described by f from G(f) only? There are many results in
111
+ this direction; see [4] for a review. In most cases, the studied dynamical properties are invariant
112
+ by isomorphism: number of fixed points, number of images, number of periodic configurations,
113
+ number and size of limit cycles, transient length and so on. However, the interaction graph is
114
+ not invariant by isomorphism: even if f and h are isomorphic, their interaction graphs can be
115
+ very different, as shown by Figure 1. This variaton can give some limit to the central question
116
+ stated above and we think it deserves some study.
117
+ Hence, we propose a systematic study of this variation, considering the set G(f) of interaction
118
+ graphs of automata networks isomorphic to f:
119
+ G(f) = {G(h) | h : Qn → Qn, h ∼ f}.
120
+ If G ∈ G(f) we say that f can be produced by G. For instance, if f is constant, we write this
121
+ f = cst, then G(f) contains a single digraph, the digraph on [n] without arcs, and if f is the
122
+ identity, we write this f = id, then G(f) also contains a single digraph, the digraph on [n] with n
123
+ loops (cycles of length one) and no other arcs. So the identity and constant automata networks
124
+ can be produced by a single digraph.
125
+ Even if the systematic study of G(f) seems to us a new perspective, some classical results
126
+ can be stated in this setting. For instance, let us say that a digraph is a companion digraph if
127
+ it can be obtained from a directed path with n vertices by adding between 0 and n arcs, all
128
+ pointing to the first vertex of the path. If f is a linear network with n components over the
129
+ field Q = Fp for some prime p, that is if f(x) = Mx for some n × n matrices M over Fp, then
130
+ 2
131
+
132
+ considering the Frobenius normal form of M, we obtain that f is isomorphic to a linear network
133
+ h whose interaction graph G is a disjoint union of companion digraphs [2]. Consequently, any
134
+ linear network f can be produced by a digraph G ∈ G(f) which is a disjoint union of companion
135
+ digraphs, and which is thus very sparse: G has at most 2n − 1 arcs.
136
+ The results we give on G(f) in this paper differ in that they do not rely on any hypothesis
137
+ made on f: we work with the whole set F(n, q) of automata networks with n components over
138
+ an alphabet of size q. Our first result shows that, excepted few exceptions, f can always be
139
+ produced by the complete digraph on [n], that is the digraph on [n] with n2 arcs, denoted Kn.
140
+ Theorem 1. Let n, q ≥ 2 with n ≥ 5 or q ≥ 3. If f ∈ F(n, q) and f ̸= cst, id, then Kn ∈ G(f).
141
+ This indeed gives some limitations of what can be deduced on f from G(f): if G(f) = Kn
142
+ nothing can be said on the dynamics of f up to isomorphism except that f has at least two
143
+ images and at most qn − 1 fixed points. As explained above, if f = cst or f = id then f can
144
+ only be produced by one digraph: the empty digraph and the digraph with n loops, respectively.
145
+ The previous theorem says that if f ̸= cst, id can only be produced by one digraph, then this
146
+ digraph is necessarily Kn. But is there at least one such automata network f, whose dynamics
147
+ is completely specific to the complete digraph? For n = 2 and q ≥ 3 we exhibit such f, and we
148
+ show that it does not exist when n is large enough with respect to q.
149
+ We obtain these results by studying the minimum in-degree of the digraphs in G(f). We first
150
+ prove, using a difficult result in additive number theory, that G(f) always contains a digraph
151
+ whose minimum in-degree is bounded by a constant cq that only depends on q, and which is 5 for
152
+ q = 2. Hence, any automata network f is isomorphic to an automata network h which contains
153
+ a “simple” local transition function hi, in that hi only depends on at most cq components.
154
+ Conversely, we prove that, for some f ∈ F(n, q), every digraph in G(f) has minimum in-degree
155
+ at least 2. To state these results compactly, for n, q ≥ 2 we denote by δ−(n, q) the minimum
156
+ number d such that, for any f ∈ F(n, q), some digraph in G(f) has minimum in-degree at most
157
+ d.
158
+ Theorem 2. For all n, q ≥ 2 with n ≥ 3 or q ≥ 3 we have
159
+ 2 ≤ δ−(n, 2) ≤ 5
160
+ and
161
+ 2 ≤ δ−(n, q) ≤ (2 + o(1))q
162
+ where o(1) tends to 0 as q tends to infinity, and does not depend on n.
163
+ Hence, for any q ≥ 3, since δ−(2, q) ≥ 2 there is f ∈ F(2, q) such that every digraph G(f)
164
+ has minimum in-degree at least 2, and thus G(f) = {K2}. So there are indeed some automata
165
+ networks in F(2, q) which are only produced by K2. On the other hand, for n large enough
166
+ with respect to q, we have δ−(n, q) < n, so for any f ∈ F(n, q) there is a digraph G ∈ G(f)
167
+ with minimum in-degree at most n − 1, which is thus distinct from Kn: no automata network
168
+ in F(n, q) is only produced by Kn. That some automata networks in F(n, q) are only produced
169
+ by Kn when q is large enough with respect to n is open.
170
+ Even if for n large with respect to q there are no automata networks only produced by Kn,
171
+ we may ask if there are automata networks which are only produced by dense digraphs. We
172
+ answer this positively (and thus the fact, mentioned above, that a linear network can always be
173
+ produced by a sparse digraph is specific to the linear case).
174
+ Theorem 3. For all n, q ≥ 2, there exists f ∈ F(n, q) such that every digraph in G(f) has at
175
+ least ⌊n2/4⌋ arcs.
176
+ The previous results shed light on the case |G(f)| = 1. We may take the converse direction
177
+ and focus on automata networks f for which |G(f)| is large. Certainly |G(f)| ≤ 2n2 and the
178
+ 3
179
+
180
+ inequality is strict, since otherwise G(f) contains the empty digraph, so that f = cst and thus
181
+ |G(f)| = 1. So |G(f)| ≤ 2n2 − 1. In a subsequent paper we will prove, in particular, that
182
+ this bound can be reached. Hence, while Kn is in some sense universal in that any automata
183
+ network f ̸= cst, id with n components can be produced by Kn, there are also universal automata
184
+ networks f with n components in that f can be produced by all the digraphs on [n] except the
185
+ empty one.
186
+ The paper is organized as follows. Theorems 1, 2 and 3 are proved in Sections 2, 3 and 4
187
+ respectively. Concluding remarks are given in Section 5.
188
+ Notations and terminologies
189
+ n and q are always integers greater than 1. We set [n] =
190
+ {1, . . . , n} and �q� = {0, 1, . . . , q − 1}. Elements of �q�n are called configurations, and those of
191
+ [n] are called components. We denote by F(n, q) the set of functions f : �q�n → �q�n; so we
192
+ always assume, without loss, that Q = �q�. In the following, the members of F(n, q) are referred
193
+ as functions instead of automata networks. We denote by 0 (resp. 1) the configurations x such
194
+ that xi = 0 (resp. 1) for all i ∈ [n]. For k ∈ �q�, we denote kei the configuration x such that
195
+ xi = k and xj = 0 for all j ̸= i. We write ei instead of 1ei. The (Hamming) weight of x ∈ �q�n
196
+ is the number of i ∈ [n] with xi ̸= 0. For x, y ∈ �q�n, the sum x + y is applied component-wise
197
+ modulo q. Hence, x and x + ei differ only in component i. So the interaction graph G(f) of
198
+ f ∈ F(n, q) has an arc from j to i if and only if there is x ∈ �q�n such that fi(x) ̸= fi(x + ej). A
199
+ fixed point is a configuration x such that f(x) = x. A limit cycle of f is a cycle of Γ(f). Hence,
200
+ fixed points correspond to limit cycles of length one. An independent set of f is an independent
201
+ set of Γ(f), equivalently, it is a set A ⊆ �q�n such that f(A) ∩ A = ∅.
202
+ 2
203
+ Complete digraph
204
+ In this section, we will prove Theorem 1 which states that Kn ∈ G(f) for every f ∈ F(n, q) with
205
+ f ̸= cst, id and n ≥ 5 or q ≥ 3. For that, we exhibit several sufficient conditions for Kn ∈ G(f),
206
+ and we then prove that at least one of these sufficient conditions must be satisfied. As the proof
207
+ for q ≥ 3 is much simpler, we will start with it. We will then treat the case n ≥ 5 independently.
208
+ 2.1
209
+ Case q ≥ 3
210
+ We say that f ∈ F(n, q) contains a complete-pattern if there is x ∈ �q�n and a subset A ⊆ �q�n
211
+ of size n such that x, f(x) /∈ A ∪ f(A) and either x ̸= f(x) or A ∩ f(A) = ∅; in that case we say
212
+ that the complete-pattern is rooted in (x, A).
213
+ We prove, in Lemma 1 below, that, for q ≥ 3 and n ≥ 2, we have Kn ∈ G(f) whenever f
214
+ has a complete-pattern. We then prove, in Lemma 2, that if f ̸= cst, id then f must contain a
215
+ complete-pattern. Together, this proves Theorem 1 for q ≥ 3.
216
+ Lemma 1. Let f ∈ F(n, q) with q ≥ 3 and n ≥ 2. If f has a complete-pattern then Kn ∈ G(f).
217
+ Proof. Suppose that f has a complete-pattern rooted in (x, A). We have three cases:
218
+ • Case 1: x ̸= f(x) and f(A) ∩ A ̸= ∅. Let π be any permutation of �q�n such that:
219
+ – π(x) = 0,
220
+ – π(f(x)) = 1,
221
+ – π(A) = {2e1, . . . , 2en},
222
+ – π(f(A) \ A) ⊆ {0, 2}n \ {0, 2e1, . . . , 2en}.
223
+ 4
224
+
225
+ See Figure 2 for an illustration. Note that since f(A) ∩ A ̸= ∅ the size of f(A) \ A is at
226
+ most n − 1, and since n − 1 ≤ 2n − (n + 1) the configurations in f(A) \ A can indeed have
227
+ distinct images by π inside {0, 2}n \ {0, 2e1, . . . , 2en}. Let h = π ◦ f ◦ π−1 and let us prove
228
+ that G(h) = Kn. For all i ∈ [n], the configurations 2ei and 0 differ only in component i,
229
+ while h(2ei) ∈ {0, 2}n and h(0) = 1 differ in every component. Hence, G(h) has an arc
230
+ from i to every component. Thus, G(h) = Kn and since h ∼ f we have Kn ∈ G(f).
231
+ • Case 2: x ̸= f(x) and f(A) ∩ A = ∅. Let π be any permutation of �q�n such that:
232
+ – π(x) = 0,
233
+ – π(f(x)) = 1,
234
+ – π(A) = {e1, . . . , en},
235
+ – π(f(A)) ⊆ {2e1, . . . , 2en}.
236
+ See Figure 3 for an illustration. Let h = π ◦ f ◦ π−1 and let us prove that G(h) = Kn. For
237
+ all i ∈ [n], the configurations ei and 0 differ only in component i, while h(ei) ∈ {0, 2}n and
238
+ h(0) = 1 differ in every component. Hence, G(h) has an arc from i to every component.
239
+ Thus, G(h) = Kn and since h ∼ f we have Kn ∈ G(f).
240
+ • Case 3: x = f(x) and f(A) ∩ A = ∅. Let π be any permutation of �q�n such that:
241
+ – π(x) = 0,
242
+ – π(A) = {e1, . . . , en},
243
+ – π(f(A)) ⊆ {1 + e1, . . . , 1 + en}.
244
+ See Figure 4 for an illustration. Let h = π ◦ f ◦ π−1 and let us prove that G(h) = Kn. For
245
+ all i ∈ [n], the configurations ei and 0 differ only in component i, while h(ei) ∈ {1, 2}n and
246
+ h(0) = 0 differ in every component. Hence, G(h) has an arc from i to every component.
247
+ Thus, G(h) = Kn and since h ∼ f we have Kn ∈ G(f).
248
+ 00
249
+ 20
250
+ 02
251
+ x
252
+ A
253
+ 11
254
+ 00
255
+ 20
256
+ 02
257
+ x
258
+ A
259
+ 11
260
+ 00
261
+ 20
262
+ 02
263
+ x
264
+ A
265
+ 11
266
+ 22
267
+ 00
268
+ 20
269
+ 02
270
+ x
271
+ A
272
+ 11
273
+ 00
274
+ 20
275
+ 02
276
+ x
277
+ A
278
+ 11
279
+ 22
280
+ Figure 2: Labelling by π of complete-patterns in the first case of Lemma 1 for n = 2.
281
+ 00
282
+ 10
283
+ 01
284
+ x
285
+ A
286
+ 11
287
+ 20
288
+ 02
289
+ 00
290
+ 10
291
+ 01
292
+ x
293
+ A
294
+ 11
295
+ 20
296
+ Figure 3: Labelling by π of complete-patterns in the second case of Lemma 1 for n = 2.
297
+ Lemma 2. Let f ∈ F(n, q) with q ≥ 3 and n ≥ 2. If f ̸= cst, id then f has a complete-pattern.
298
+ 5
299
+
300
+ 00
301
+ 10
302
+ 01
303
+ x
304
+ A
305
+ 21
306
+ 12
307
+ 00
308
+ 10
309
+ 01
310
+ x
311
+ A
312
+ 21
313
+ Figure 4: Labelling by π of complete-patterns in the third case of Lemma 1 for n = 2.
314
+ Proof. Suppose that there exists a configuration a with at least n + 1 pre-images by f. Then
315
+ there is a set A of size n contained in f −1(a) \ {a}. Since f ̸= cst, f has an image y ̸= a. Let
316
+ x ∈ f −1(y). Then x and f(x) = y are not in in the union of A and f(A) = {a}, and since a /∈ A,
317
+ f has a complete-pattern rooted in (x, A).
318
+ Suppose now that every configuration has at most n pre-images by f. Since f ̸= id, there
319
+ is x ∈ �q�n such that f(x) ̸= x. Let B be the images of f distinct from x and f(x). Then
320
+ |f −1(B)| + |f −1(x)| + |f −1(f(x))| = qn and we deduce that |f −1(B)| ≥ qn − 2n which is at least
321
+ n+1 since q ≥ 3. So there is a subset A ⊆ f −1(B)\{f(x)} of size n, and since x, f(x) /∈ A∪f(A)
322
+ we deduce that f has a complete pattern rooted in (x, A).
323
+ 2.2
324
+ Case n ≥ 5
325
+ We proceed by showing that, given f ∈ F(n, q) with n ≥ 5, q ≥ 2 and f ̸= cst, id, we have
326
+ Kn ∈ G(f) if at least one of the following three conditions holds:
327
+ • f has at least 2n fixed points,
328
+ • f has at least n limit cycles of length ≥ 3,
329
+ • f has an independent set of size ≥ 2n.
330
+ We then prove that, if f ̸= cst, id, then at least one of the three conditions must hold. Together
331
+ this proves Theorem 1 for n ≥ 5. We start by proving that the first two conditions, involving
332
+ fixed points and limit cycles, are sufficient for Kn ∈ G(f).
333
+ Lemma 3. Let f ∈ F(n, q) with f ̸= id. If f has at least 2n fixed points, then Kn ∈ G(f).
334
+ Proof. Since f ̸= id we have f(c) ̸= c for some configuration c, and since f has at least 2n fixed
335
+ points, it has 2n − 1 fixed points distinct from f(c), say a0, a1, . . . , an, b3, . . . , bn (these are also
336
+ distinct from c since c is not a fixed point). Let π be any permutation of �q�n such that:
337
+ • π(a0) = 0,
338
+ • π(ai) = ei for 1 ≤ i ≤ n,
339
+ • π(bi) = e1 + e2 + ei for 3 ≤ i ≤ n,
340
+ • π(c) = e1 + e2,
341
+ • π(f(c)) = e1 + e2 + 1.
342
+ See Figure 5 for an illustration. Let h = π ◦ f ◦ π−1 and let us prove that G(h) = Kn. For
343
+ i ∈ [n], the configurations 0 and ei only differ in component i, and since h(0) = 0 and h(ei) = ei
344
+ we deduce that G(h) has a loop on i. It remains to prove that G(h) has an arc from i to j for
345
+ distinct i, j ∈ [n]. The configurations e2 and e1 +e2 only differ in component 1, while h(e2) = e2
346
+ and h(e1 +e2) = e1 +e2 +1 differ in every component j ̸= 1. So G(h) has an arc from 1 to every
347
+ component j ̸= 1. Similarly, the configurations e1 and e1 + e2 only differ in component 2, while
348
+ 6
349
+
350
+ h(e1) = e1 and h(e1 +e2) = e1 +e2 +1 differ in every component j ̸= 2. So G(h) has an arc from
351
+ 2 to every component j ̸= 2. Finally, for 3 ≤ i ≤ n, the configurations e1 + e2 and e1 + e2 + ei
352
+ only differ in component i, while h(e1 + e2 + ei) = e1 + e2 + ei and h(e1 + e2) = e1 + e2 + 1
353
+ differ in every component j ̸= i. So G(h) has an arc from i to every j ̸= i. Thus, G(h) = Kn
354
+ and since h ∼ f we have Kn ∈ G(f).
355
+ 00000
356
+ a0
357
+ 10000
358
+ a1
359
+ 01000
360
+ a2
361
+ 00100
362
+ a3
363
+ 00010
364
+ a4
365
+ 00001
366
+ a5
367
+ 11000
368
+ c
369
+ 11100
370
+ b3
371
+ 11010
372
+ b4
373
+ 11001
374
+ b5
375
+ 00111
376
+ f(c)
377
+ Figure 5: Labelling by π in Lemma 3 for n = 5.
378
+ Lemma 4. Let f ∈ F(n, q). If f has at least n limit cycles of length ≥ 3, then Kn ∈ G(f).
379
+ Proof. Suppose that f has n limit cycles of length ≥ 3; this implies n ≥ 4. Then there are n
380
+ configurations a1, . . . , an that belong to distinct limit cycles of f of length ≥ 3. For i ∈ [n], let
381
+ bi = f(ai) and ci = f(bi). Then a1, . . . , an, b1, . . . , bn, c1, . . . , cn are all distinct. Let π be any
382
+ permutation of �q�n such that
383
+ • π(ai) = ei−1 + ei,
384
+ • π(bi) = ei−1,
385
+ • π(ci) = ei−1 + 1,
386
+ where e0 means en. See Figure 6 for an illustration. Note that the map π is indeed injective on
387
+ the 3n selected configurations: the weights of π(ai), π(bi), and π(ci) are 2, 1, and n − 1 ≥ 4 − 1
388
+ respectively. Let h = π◦f ◦π−1 and let us prove that G(h) = Kn. For i ∈ [n], the configurations
389
+ ei−1 and ei−1 + ei only differ in component i, while h(ei−1) = ei−1 + 1 and h(ei−1 + ei) = ei−1
390
+ differ in every component. So G(h) has an arc from i to every j ∈ [n]. Thus, G(h) = Kn and
391
+ since h ∼ f we have Kn ∈ G(f).
392
+ 10001
393
+ a1
394
+ 00001
395
+ b1
396
+ 11110
397
+ c1
398
+ 11000
399
+ a2
400
+ 10000
401
+ b2
402
+ 01111
403
+ c2
404
+ 01100
405
+ a3
406
+ 01000
407
+ b3
408
+ 10111
409
+ c3
410
+ 00110
411
+ a4
412
+ 00100
413
+ b4
414
+ 11011
415
+ c4
416
+ 00011
417
+ a5
418
+ 00010
419
+ b5
420
+ 11101
421
+ c5
422
+ Figure 6: Labelling by π in Lemma 4 for n = 5.
423
+ We now prove that the third condition given at the beginning of the subsection, involving
424
+ independent sets, is sufficient for Kn ∈ G(f). The precise statement is as follows.
425
+ Lemma 5. Let f ∈ F(n, q) with n ≥ 5 and f ̸= cst. If f has an independent set of size at least
426
+ 2n, then Kn ∈ G(f).
427
+ 7
428
+
429
+ The proof is more involved than for fixed points and limit cycles, and so we split the proof.
430
+ We first prove that, if n ≥ 5 and f ̸= cst, then Kn ∈ G(f) whenever at least one of the following
431
+ condition holds:
432
+ • f has an independent set A with |A| ≥ n + k and |f(A)| = 2k for some 1 ≤ k ≤ n.
433
+ • f has an independent set A with |A| > n and |f(A)| = 1.
434
+ We then prove that if f has an independent set of size at least 2n, then at least one of the two
435
+ conditions must hold, and this proves Lemma 5.
436
+ Lemma 6. Let f ∈ F(n, q) with n ≥ 5. If f has an independent set A such that |A| ≥ n + k
437
+ and |f(A)| = 2k for some 1 ≤ k ≤ n, then Kn ∈ G(f).
438
+ Proof. Suppose that f has an independent set A of f such that |A| ��� n + k and |f(A)| = 2k for
439
+ some 1 ≤ k ≤ n, and suppose that |A| is minimal for those properties.
440
+ (1) |A| = n + k.
441
+ Indeed, if |A| > n+k, then |A| > 2k and thus there are distinct a, a′ ∈ A with f(a) = f(a′).
442
+ Hence, A′ = A \ {a} is an independent set of f such that |A′| = |A| − 1 ≥ n + k and
443
+ |f(A′)| = 2k, and this contradicts the minimality of |A|. This proves (1).
444
+ Let us write f(A) = {a1, . . . , a2k}, and let Ap = f −1(ap)∩A for p ∈ [2k]. Hence, {A1, . . . , A2k}
445
+ is a partition of A. We now come to the technical part of the proof.
446
+ (2) There are disjoint subsets X1, . . . , X2k of {0, 1}n of size |A1|, . . . , |A2k| respectively, such
447
+ that, for all i ∈ [n], there are p ∈ [k] and x ∈ X2p−1 with x + ei ∈ X2p.
448
+ Let I1, . . . , I2k be a partition of [n] (with some members possibly empty) such that, for
449
+ 1 ≤ ℓ ≤ 2k, the size of Iℓ is |Aℓ| − 1 if ℓ is odd, and |Aℓ| otherwise; such a partition exists
450
+ since |A1| + · · · + |A2k| = n + k by (1).
451
+ For p ∈ [k], select a configuration x2p−1 ∈ {0, 1}n, a component j2p ∈ I2p, and let
452
+ X2p−1
453
+ =
454
+ {x2p−1} ∪ {x2p−1 + ej2p + ei | i ∈ I2p−1},
455
+ X2p
456
+ =
457
+ {x2p−1 + ei | i ∈ I2p}.
458
+ Clearly, |X2p−1| = |I2p−1| + 1 = |A2p−1| and |X2p| = |I2p| = |A2p|.
459
+ Let i ∈ [n] and let us prove that there are p ∈ [k] and x ∈ X2p−1 with x + ei ∈ X2p. We
460
+ have i ∈ Iℓ for some 1 ≤ ℓ ≤ 2k. If ℓ = 2p − 1 then, setting x = x2p−1 + ej2p + ei, we
461
+ have x ∈ X2p−1 and x + ei = x2p−1 + ej2p ∈ X2p. If ℓ = 2p then, setting x = x2p−1, we
462
+ have x ∈ X2p−1 and x + ei ∈ X2p. Thus, fixing the components j2p arbitrarily, we only
463
+ have to prove that we can choose the configurations x2p−1 so that the sets X1, . . . , X2k are
464
+ pairwise disjoint.
465
+ This is obvious if k = 1, since X1 and X2 are disjoint for any choice of x1. If k = 2,
466
+ then, since n ≥ 5, the sets X1, X2, X3, X4 are disjoint by taking x1 = 0 and x3 = 1:
467
+ configurations in X1 have weight 0 or 2; configurations in X2 are of weight 1; configurations
468
+ in X3 are of weight n or n − 2; and configurations in X4 are of weight n − 1.
469
+ Suppose now that k ≥ 3 and choose x2p−1 = ej2p−2 for all p ∈ [k], where j0 means j2k.
470
+ Then each X2p−1 only contains configurations of weight 1 or 3 and each X2p only contains
471
+ configurations of weight 2. Hence, given 1 ≤ p < q ≤ k, we have to prove that X2p−1 ∩
472
+ X2q−1 = ∅ and X2p ∩ X2q = ∅.
473
+ 8
474
+
475
+ Suppose that x ∈ X2p−1 ∩ X2q−1. If the weight of x is 1 then we deduce that x = ej2p−2 =
476
+ ej2q−2 which is false since p ̸= q. If the weight of x is 3 then xi = 1 for some i ∈ I2p−1
477
+ while yi = 0 for all y ∈ X2q−1, a contradiction. Thus, X2p−1 ∩ X2q−1 = ∅.
478
+ Suppose now that x ∈ X2p ∩ X2q. Then x = ej2p−2 + ei2p = ej2q−2 + ei2q for some i2p ∈ I2p
479
+ and i2q ∈ I2q. Thus, i2p = j2q−2 and i2q = j2p−2. Hence, j2q−2 ∈ I2p, and since p < q this
480
+ implies q = p + 1. Also, j2p−2 ∈ I2q and since p < q this implies p = 1 and q = k, but
481
+ then q ̸= p + 1 since k ≥ 3. Thus, X2p ∩ X2q = ∅. Hence, the sets X1, . . . , X2k are indeed
482
+ pairwise disjoint. This proves (2).
483
+ Let X1, . . . , X2k be as in (2). Let X = X1 ∪ · · · ∪ X2k, which is of size n + k.
484
+ (3) There is Y ⊆ {0, 1}n with |Y | ≥ n such that Y , Y + 1 and X are pairwise disjoint.
485
+ Let Z be any subset of {0, 1}n of size 2n−1 such that Z and Z + 1 are disjoint. Let Y be
486
+ the set of y ∈ Z such that y, y + 1 /∈ X. Clearly, Y, Y + 1, X are pairwise disjoint, so it
487
+ is sufficient to prove that |Y | ≥ n. Setting X0 = X ∩ Z and X1 = X ∩ (Z + 1), we have
488
+ Y = Z \(X0 ∪ (X1 + 1)) and thus |Y | ≥ |Z| − |X0| − |X1|. Since Z and Z + 1 are disjoint,
489
+ X0 and X1 are disjoint subsets of X, so
490
+ |Y | ≥ |Z| − |X| = 2n−1 − (n + k) ≥ 2n−1 − 2n ≥ n.
491
+ where the last inequality holds since n ≥ 5.
492
+ Let Y = {y1, . . . , yk} be a subset of {0, 1}n of size k such that Y , Y + 1 and X are pairwise
493
+ disjoint, which exists by (3). Hence, there is a permutation π of {0, 1}n such that, for all p ∈ [k]:
494
+ • π(a2p−1) = yp,
495
+ • π(a2p) = yp + 1,
496
+ • π(A2p−1) = X2p−1,
497
+ • π(A2p) = X2p.
498
+ See Figure 7 for an illustration. Let h = π ◦ f ◦ π−1 and let us prove that G(h) = Kn. Since
499
+ the sets X1, . . . , X2k are as in (2), for every i ∈ [n] there is p ∈ [k] and x ∈ X2p−1 with
500
+ x + ei ∈ X2p. Since π−1(x) ∈ A2p−1 and π−1(x + ei) ∈ A2p, we have h(x) = π(a2p−1) = yp and
501
+ h(x + ei) = π(a2p) = yp + 1. Thus, h(x) and h(x + ei) differ in every component, and so G(h)
502
+ has an arc from i to every j ∈ [n]. Thus, G(h) = Kn and since h ∼ f we have Kn ∈ G(f).
503
+ Lemma 7. Let f ∈ F(n, q) with n ≥ 5 and f ̸= cst. If f has an independent set A such that
504
+ |A| > n and |f(A)| = 1, then Kn ∈ G(f).
505
+ Proof. Let A be an independent set of f with |A| > n and |f(A)| = 1. Then f(A) = {a} for
506
+ some configuration a ∈ �q�n. Since f ̸= cst, there is b ∈ �q�n with f(b) ̸= a, and thus b /∈ A. We
507
+ consider three cases.
508
+ • Case 1: f(a) ̸= a. Since |A| > n, there are n configurations a1, . . . , an in A distinct from
509
+ f(a). Then a1, . . . , an, a, f(a) are all distinct, so there is a permutation π of �q�n such
510
+ that:
511
+ – π(a) = 0,
512
+ – π(f(a)) = 1,
513
+ – π(ai) = ei for 1 ≤ i ≤ n.
514
+ 9
515
+
516
+ 00001
517
+ 11001
518
+ 01001
519
+ 01000
520
+ 01100
521
+ 01010
522
+ 00100
523
+ 00101
524
+ A
525
+ A1
526
+ A2
527
+ A3
528
+ A4
529
+ A5
530
+ A6
531
+ X1
532
+ X2
533
+ X3
534
+ X4
535
+ X5
536
+ X6
537
+ 00000
538
+ a1
539
+ 11111
540
+ a2
541
+ 10000
542
+ a3
543
+ 01111
544
+ a4
545
+ 00010
546
+ a5
547
+ 11101
548
+ a6
549
+ Figure 7: Labelling by π in Lemma 6 for n = 5 and k = 3. The independent set A is of size |A| =
550
+ n+k = 8 and its image f(A) = {a1, . . . , a6} is of size 2k = 6. Since the consecutive sizes of the set
551
+ A1, . . . , A6 are (2, 1, 1, 2, 1, 1), we have to choose a partition I of [n] into 6 parts I1, . . . , I6 whose
552
+ consecutive sizes are (1, 1, 0, 2, 0, 1). We take (I1, I2, I3, I4, I5, I6) = ({1}, {2}, ∅, {3, 4}, ∅, {5}).
553
+ We have to choose one member j2, j4, j6 in X2, X4, X6 respectively. We choose j2 = 2, j4 = 3
554
+ and j6 = 5. For these choices, we obtain the set X1, . . . , X6 described in the figure, which are
555
+ used to label the configurations in A1, . . . , A6. Finally, we have to choose a set Y of k = 3
556
+ configurations, such that Y, Y + 1 and X = X1 ∪ · · · ∪ X6 are pairwise disjoint. We choose
557
+ Y = {00000, 10000, 00010}, which is used to label a1, a3, a5, and Y + 1 is then used to label
558
+ a2, a4, a6 accordingly.
559
+ Note that: 11001 ∈ X1 and 01001 ∈ X2 only differ in component 1;
560
+ 01000 ∈ X1 and 01001 ∈ X2 only differ in component 2; 01000 ∈ X3 and 01100 ∈ X4 only
561
+ differ in component 3; 01000 ∈ X3 and 01010 ∈ X4 only differ in component 4; 00100 ∈ X5 and
562
+ 00101 ∈ X6 only differ in component 5.
563
+ See Figure 8 for an illustration. Let h = π ◦ f ◦ π−1 and let us prove that G(h) = Kn. For
564
+ i ∈ [n], h(0) = 1 and h(ei) = 0 differ in every component, therefore G(h) has an arc from
565
+ i to every j ∈ [n]. Thus, G(h) = Kn and since h ∼ f we have Kn ∈ G(f).
566
+ • Case 2: f(a) = a and f(b) = b. Let a1, . . . , an ∈ A, all distinct. Then a1, . . . , an, a, b are
567
+ all distinct since b = f(b) ̸= a. So there is a permutation π of �q�n such that:
568
+ – π(a) = 1,
569
+ – π(b) = 0,
570
+ – π(ai) = ei for 1 ≤ i ≤ n.
571
+ See Figure 9 for an illustration. Let h = π ◦ f ◦ π−1 and let us prove that G(h) = Kn. For
572
+ i ∈ [n], h(0) = 0 and h(ei) = 1 differ in every component, hence G(h) has an arc from i
573
+ to every j ∈ [n]. Thus, G(h) = Kn and since h ∼ f we have Kn ∈ G(f).
574
+ • Case 3: f(a) = a and f(b) ̸= b. Since |A| > n, there is A′ ⊆ A \ {f(b)} of size n. Then
575
+ A′ ∪ {b} is an independent set of size n + 1 and |f(A′ ∪ {b})| = |{a, f(b)}| = 2, thus
576
+ Kn ∈ G(f) by Lemma 6.
577
+ 00000
578
+ a
579
+ 11111
580
+ f(a)
581
+ 10000
582
+ a1
583
+ 01000
584
+ a2
585
+ 00100
586
+ a3
587
+ 00010
588
+ a4
589
+ 00001
590
+ a5
591
+ Figure 8: Labelling by π in the first case of Lemma 7 for n = 5.
592
+ 10
593
+
594
+ 11111
595
+ a
596
+ 10000
597
+ a1
598
+ 01000
599
+ a2
600
+ 00100
601
+ a3
602
+ 00010
603
+ a4
604
+ 00001
605
+ a5
606
+ 00000
607
+ b
608
+ Figure 9: Labelling by π in the second case of Lemma 7 for n = 5.
609
+ Proof of Lemma 5. Suppose that f has an independent set A of size |A| ≥ 2n. Then we can
610
+ choose A so that |A| = 2n, and then |f(A)| ≤ 2n. Consequently, if |f(A)| is even, we have
611
+ |f(A)| = 2k for some k ∈ [n] and thus Kn ∈ G(f) by Lemma 6. So assume that |f(A)| is odd.
612
+ If |f(A)| = 1 then Kn ∈ G(f) by Lemma 7. So assume that |f(A)| = 2k + 1 for some 1 ≤ k < n.
613
+ Let us write f(A) = {a1, . . . , a2k+1}, and let Ap = f −1(ap) ∩ A for 1 ≤ p ≤ 2k + 1. Suppose,
614
+ without loss, that |A1| ≤ |A2| ≤ · · · ≤ |A2k+1|. Then A′ = A \ A1 is an independent set with
615
+ |f(A′)| = 2k. If |A′| ≥ n + k then Kn ∈ G(f) by Lemma 6. So suppose that |A′| < n + k. Since
616
+ |A′| = 2n − |A1| we have |A1| > n − k. If |A2| ≥ k then A′′ = A1 ∪ A2 is an independent with
617
+ |A′′| ≥ n + 1 and |f(A′′)| = 2 thus Kn ∈ G(f) by Lemma 6. So assume that |A2| < k. Then
618
+ n − k < |A1| ≤ |A2| < k, so 2k > n. We deduce that
619
+ 2n = |A| = |A1| + · · · + |A2k+1| ≥ (2k + 1)|A1| > n|A1|.
620
+ So |A1| = 1 but then |A′| = 2n−1 ≥ n+k, a contradiction. Thus, Kn ∈ G(f) in every case.
621
+ By Lemmas 3, 4 and 5, to prove Theorem 1 for n ≥ 5 it is sufficient to prove the following.
622
+ Lemma 8. Let f ∈ F(n, q) with f ̸= cst, id and n ≥ 5. Then at least one of the following holds:
623
+ • f has at least 2n fixed points,
624
+ • f has at least n limit cycles of length ≥ 3,
625
+ • f has an independent set of size at least 2n.
626
+ Proof. Let F be the set of fixed points of f, and let L be a minimal subset of �q�n intersecting
627
+ every limit cycle of f of length ≥ 3. Let Γ′ be obtained from Γ(f) by deleting the vertices in
628
+ F ∪ L; then Γ′ has only cycles of length two, thus it is bipartite. Suppose that the first two
629
+ conditions are false, that is, |F| < 2n and |L| < n. Then Γ′ has at least N = qn −3n+2 vertices.
630
+ Since Γ′ is bipartite, it has an independent set A of size at least N/2. Since Γ′ is an induced
631
+ subgraph of Γ(f), A is an independent set of f, and since n ≥ 5 we have
632
+ |A| ≥ ⌈N/2⌉ ≥ ⌈(2n − 3n + 2)/2⌉ ≥ 2n
633
+ thus the third condition holds.
634
+ 3
635
+ Minimum in-degree
636
+ In this section, we will prove Theorem 2, that we restate. Given f ∈ F(n, q), we denote by δ−(f)
637
+ the minimum integer d such that some digraph in G(f) has minimum in-degree at most d. The
638
+ quantity δ−(n, q) defined in the introduction is then the maximum of δ−(f) for f ∈ F(n, q), and
639
+ Theorem 2 says that, for any n, q ≥ 2 with n ≥ 3 or q ≥ 3, we have
640
+ 2 ≤ δ−(n, 2) ≤ 5
641
+ and
642
+ 2 ≤ δ−(n, q) ≤ (2 + o(1))q.
643
+ 11
644
+
645
+ Instead of considering the in-degree, it is more convenient to consider the strict in-degree,
646
+ defined as follows. Given a digraph G on [n], the strict in-degree of i ∈ [n] in G is the number of
647
+ in-neighbors of i in G distinct from i. The minimum strict in-degree of G is then the minimum
648
+ strict in-degree of a vertex in G. Given f ∈ F(n, q), we denote by δ−
649
+ s (f) the smallest integer d
650
+ such that some digraph in G(f) has minimum strict in-degree at most d; we have δ−(f) − 1 ≤
651
+ δ−
652
+ s (f) ≤ δ−(f).
653
+ Our first goal is to give, for any 0 ≤ k < n, a necessary and sufficient condition for δ−
654
+ s (f) ≤
655
+ n − k − 1 which is invariant by isomorphism. In this way, we have a description of δ−
656
+ s (f) which
657
+ only relies on the isomorphic class of f. This description is based on the following definition.
658
+ Definition 1 (k-nice partition). Let f ∈ F(n, q) and k ∈ [n]. A k-nice partition of f is a
659
+ partition A = {A1, . . . , Aq} of �q�n, with some parts possibly empty, such that |Ap| and |Aℓ ∩
660
+ f −1(Ap)| are multiples of qk for all p, ℓ ∈ [q].
661
+ A partition is balanced when its parts have all the same size. The characterization is the
662
+ following.
663
+ Lemma 9. For every f ∈ F(n, q) and 0 ≤ k < n, we have δ−
664
+ s (f) ≤ n − k − 1 if and only if f
665
+ has a balanced k-nice partition.
666
+ Actually, the proof of Theorem 2 only uses one direction, that δ−
667
+ s (f) ≤ n − k − 1 if f has
668
+ a balanced k-nice partition. But the main property needed for the other direction will be used
669
+ later, and so we give it separately (in Lemma 10 below), and then put things together to get
670
+ the characterization. For that we use the following definitions. Given x, y ∈ �q�n, we denote
671
+ by ∆(x, y) the set of i ∈ [n] with xi ̸= yi. Given I ⊆ [n], a set X ⊆ �q�n is I-closed if, for any
672
+ x, y ∈ �q�n with ∆(x, y) ⊆ I, we have x ∈ X if and only if y ∈ X. It is easy to see that if X is
673
+ I-closed then |X| is a multiple of q|I|, and that if X and Y are both I-closed then so is X ∩ Y .
674
+ Lemma 10. Let f ∈ F(n, q) and suppose that G(f) has a vertex i with strict in-degree at most
675
+ n − k − 1. For 1 ≤ p ≤ q, let Ap be the set of x ∈ �q�n with xi = p − 1. Then A = {A1, . . . , Aq}
676
+ is a balanced k-nice partition of f.
677
+ Proof. For k = 0 the result is obvious, so assume that k ≥ 1. Since A is obviously balanced, we
678
+ just have to prove that A is k-nice. Since i is of strict in-degree at most n − k − 1, there is a set
679
+ I ⊆ [n] of size k such that G(f) has no arc from I to i and i /∈ I. Since i /∈ I, each Ap is I-closed.
680
+ Let x be any configuration in f −1(Ap), that is, fi(x) = p − 1. Since there are no arc from I to
681
+ i, for every y ∈ �q�n with ∆(x, y) ⊆ I we have fi(y) = fi(x) = p − 1 and thus y ∈ f −1(Ap). As
682
+ such, f −1(Ap) is I-closed. Since Aℓ and f −1(Ap) are I-closed for any p, ℓ ∈ [k], their intersection
683
+ Aℓ ∩ f −1(Ap) is also I-closed, and so |Aℓ ∩ f −1(Ap)| is a multiple of qk, as desired.
684
+ Proof of Lemma 9. For k = 0 the result is obvious, so assume that k ≥ 1.
685
+ First, let f ∈ F(n, q) and suppose that the minimum strict in-degree of G(h) is at most
686
+ n − k − 1 for some h ∼ f. By Lemma 10, h has a balanced k-nice partition and this trivially
687
+ implies that f has a balanced k-nice partition. This proves the first direction.
688
+ For the other direction, let f ∈ F(n, q) and suppose that f has a balanced k-nice partition
689
+ A = {A1, . . . , Aq}. For all p, ℓ ∈ [q], let A−
690
+ p = f −1(Ap) and ap,ℓ = |Ap ∩ A−
691
+ ℓ |/qk, which is an
692
+ integer since |Ap ∩ A−
693
+ ℓ | is a multiple of qk. Note that, for all p ∈ [q], we have
694
+
695
+ ℓ∈[q]
696
+ ap,ℓ = q−k �
697
+ ℓ∈[q]
698
+ |Ap ∩ A−
699
+ ℓ | = q−k|Ap| = qn−k−1.
700
+ 12
701
+
702
+ Hence, there is a partition Xp = {Xp,1, . . . , Xp,q} of �q�n−k−1 (with some members possibly
703
+ empty) such that |Xp,ℓ| = ap,ℓ for all ℓ ∈ [q]. For all p, ℓ ∈ [q], let
704
+ Yp,ℓ = {x ∈ �q�n | xn = p − 1, (x1, . . . , xn−k−1) ∈ Xp,ℓ}.
705
+ Since each configuration in Xp,ℓ is extended into exactly qk configurations in Yp,ℓ, we have
706
+ |Yp,ℓ| = ap,ℓqk = |Ap ∩ A−
707
+ ℓ |. Furthermore, it is clear that Yp,ℓ ∩ Yp′,ℓ′ = ∅ for all p, ℓ, p′, ℓ′ ∈ [q]
708
+ with (p, ℓ) ̸= (p′, ℓ′), so {Yp,ℓ | p, ℓ ∈ [q]} is a partition of �q�n. Hence, there is a permutation π
709
+ of �q�n such that π(Ap ∩ A−
710
+ ℓ ) = Yp,ℓ for all p, ℓ ∈ [q].
711
+ Let h = π ◦ f ◦ π−1 and let us prove that G(h) has no arc from I = [n − k, n − 1] to n. So
712
+ consider any x, y ∈ �q�n with ∆(x, y) ⊆ I, and let us prove that hn(x) = hn(y). Let p, ℓ ∈ [q]
713
+ such that x ∈ Yp,ℓ. Since Yp,ℓ is I-closed, we also have y ∈ Yp,ℓ. Hence, setting x′ = π−1(x)
714
+ and y′ = π−1(y), we have x′, y′ ∈ Ap ∩ A−
715
+ ℓ , and thus f(x′), f(y′) ∈ Aℓ. So there are r, s ∈ [q]
716
+ such that f(x′) ∈ Aℓ ∩ A−
717
+ r and f(y′) ∈ Aℓ ∩ A−
718
+ s , and we deduce that h(x) = π(f(x′)) ∈ Yℓ,r and
719
+ h(y) = π(f(x′)) ∈ Yℓ,s. Consequently, hn(x) = hn(y) = ℓ − 1 as desired. Hence, G(h) has no arc
720
+ from I to n, and thus the strict in-degree of n in G(h) is at most n − k − 1.
721
+ 3.1
722
+ Upper bounds
723
+ By the preceding characterization, to prove that δ−
724
+ s (f) is small we have to prove that f has a
725
+ balanced k-nice partition for some large k. We will prove that using two tools. The first is the
726
+ following easy lemma. Given f ∈ F(n, q), we say that X ⊆ �q�n is a weakly independent set of
727
+ f if f(x) /∈ X \ {x} for all x ∈ X (so X is an independent set that can contain loops).
728
+ Lemma 11. Let f ∈ F(n, q) and Y ⊆ �q�n. Then f has a weakly independent set X ⊆ Y with
729
+ |X| ≥ |Y |/3.
730
+ Proof. For X ⊆ �q�n, we denote by Γ[X] the subgraph of Γ(f) induced by X.
731
+ Let Z be a
732
+ minimal subset of Y intersecting every cycle of Γ[Y ] of length at least 3. Let Y ′ = Y \ Z. Since
733
+ |Z| ≤ |Y |/3 we have |Y ′| = |Y | − |Z| ≥ 2|Y |/3. Let Γ′ be obtained from Γ[Y ′] by removing
734
+ loops. Then Γ′ is bipartite, as every cycle is of length 2. So Γ′ has an independent set X ⊆ Y ′
735
+ with |X| ≥ |Y ′|/2 ≥ |Y |/3. Since X is an independent set of Γ′, there are no distinct x, y ∈ X
736
+ such that f(x) = y and we deduce that X is a weakly independent set of f.
737
+ The second tool comes from additive number theory and is based on the following definition.
738
+ Definition 2 (s(m, d)). For any integers m, d ≥ 1, let s(m, d) be the smallest integer s such
739
+ that, for any functions a1, . . . , ad : [s] → N, there is a subset X ⊆ [s] of size m such that
740
+
741
+ x∈X ai(x) is a multiple of m for every i ∈ [d].
742
+ That s(m, d) exists, and is at most (m − 1)md − 1, is an easy consequence of the pigeonhole
743
+ principle. Indeed, let us say that x, y ∈ [s] are equivalent if, for all i ∈ [d], we have ai(x) ≡ ai(y)
744
+ mod m. There are at most md equivalence classes and so if s ≥ (m − 1)md + 1 then, by the
745
+ pigeonhole principle, some class is of size at least m, and any subset X of size m in this class is
746
+ as in the definition. But much better bounds exist. Erd¨os, Ginzburg and Ziv famously proved
747
+ that s(m, 1) = 2m − 1 [3]. The exact value of s(m, 2) has been established by Reiher, resolving
748
+ a longstanding conjecture of Kemnitz.
749
+ Theorem 4 (Reiher [6]). For every m ≥ 1,
750
+ s(m, 2) = 4m − 3.
751
+ Hence, s(m, 1) and s(m, 2) are linear in m. Using deep arguments, Alon and Dubiner proved
752
+ that s(m, d) is actually linear in m for every fixed d.
753
+ 13
754
+
755
+ Theorem 5 (Alon-Dubiner [1]). There exists an absolute constant c such that, for all m, d ≥ 1,
756
+ s(m, d) ≤ (cd log2 d)dm.
757
+ We now prove that any f ∈ F(n, q) has a balanced k-nice partition for some large k, expressed
758
+ with the quantity s(m, d). We begin with the case q = 2, where we optimize the use of s(m, d) in
759
+ order to use the exact value given by Reiher for d = 2. The general case, where such optimization
760
+ is not needed, follows the same approach and is presented afterwards.
761
+ Lemma 12. Every f ∈ F(n, 2) has a balanced k-nice partition for any k such that
762
+ 3s(2k, 2) ≤ 2n−1.
763
+ Proof. Let f ∈ F(n, 2). For X ⊆ {0, 1}n, we use X− as a shorthand for f −1(X). Let k be as in
764
+ the statement. Observe that, by setting A1 = {0, 1}n and A2 = ∅, we obtain a k-nice partition
765
+ {A1, A2} since |A1| = |A1 ∩ A−
766
+ 1 | = 2n and |A2| = |A1 ∩ A−
767
+ 2 | = |A2 ∩ A−
768
+ 1 | = |A2 ∩ A−
769
+ 2 | = 0. So
770
+ there is a k-nice partition {A1, A2} with |A1| ≥ 2n−1 where A1 is minimal for this property. We
771
+ will prove that |A1| = 2n−1 so that the partition is balanced. Suppose, for a contradiction, that
772
+ |A1| > 2n−1.
773
+ By Lemma 11, there is a subset Y ⊆ A1 of size at least |A1|/3 which is a weakly independent
774
+ set. For x ∈ Y , let
775
+ α1(x) = |A1 ∩ f −1(x)|,
776
+ α2(x) = |A2 ∩ f −1(x)|,
777
+ β1(x) =
778
+
779
+ 1
780
+ if f(x) ∈ A1 \ {x},
781
+ 0
782
+ otherwise,
783
+ Since |A1| ≥ 2n−1 we have |Y | ≥ |A1|/3 ≥ 2n−1/3 ≥ s(2k, 2). Considering the 2 functions
784
+ a1, a2 defined on Y by a1(x) = α1(x) + β1(x) and a2(x) = α2(x) − β1(x), we deduce from the
785
+ definition of s that there is a subset X ⊆ Y of size 2k such that �
786
+ x∈X a1(x) and �
787
+ x∈X a2(x) are
788
+ multiples of 2k. Setting αi(X) = �
789
+ x∈X αi(x) for i = 1, 2 and β1(X) = �
790
+ x∈X β1(x) we obtain
791
+ that α1(X) + β1(X) and α2(X) − β1(X) are multiples of 2k. Furthermore:
792
+ αi(X) = |Ai ∩ X−| for i = 1, 2,
793
+ (1)
794
+ β1(X) = |X ∩ A−
795
+ 1 | − |X ∩ X−|.
796
+ (2)
797
+ (1) is obvious, since
798
+ |Ai ∩ X−| = |Ai ∩ (∪x∈Xf −1(x))| =
799
+
800
+ x∈X
801
+ |Ai ∩ f −1(x)| = αi(X).
802
+ For (2), note that β1(X) is the number of x ∈ X with f(x) ∈ A1 \ {x}. Since X is weakly
803
+ independent, f(x) ∈ A1 \ {x} is equivalent to f(x) ∈ A1 \ X, and thus β1(X) is the number of
804
+ x ∈ X with f(x) ∈ A1 \ X, that is, β1(X) = |X ∩ (A1 \ X)−| = |X ∩ A−
805
+ 1 | − |X ∩ X−|.
806
+ Consider the partition
807
+ {B1, B2} = {A1 \ X, A2 ∪ X}.
808
+ Recall that {A1, A2} is k-nice, hence |A1| is a multiple of 2k, and since we also have |A1| > 2n−1,
809
+ it follows that |B1| = |A1| − 2k ≥ 2n−1.
810
+ As a consequence, in order to obtain the desired
811
+ contradiction, it is sufficient to prove that {B1, B2} is k-nice. First, since |X| = 2k, it is clear
812
+ 14
813
+
814
+ that |B1| and |B2| are multiples of 2k. So it remains to prove that |Bi ∩ B−
815
+ j | is a multiple of 2k
816
+ for every 1 ≤ i, j ≤ 2. First, using (1) and (2), we have:
817
+ |B1 ∩ B−
818
+ 1 | = |(A1 \ X) ∩ (A−
819
+ 1 \ X−)|
820
+ = |A1 ∩ A−
821
+ 1 | − |A1 ∩ X−| − |X ∩ A−
822
+ 1 | + |X ∩ X−|
823
+ = |A1 ∩ A−
824
+ 1 | − α1(X) − β1(X)
825
+ |B2 ∩ B−
826
+ 1 | = |(A2 ∪ X) ∩ (A−
827
+ 1 \ X−)|
828
+ = |A2 ∩ A−
829
+ 1 | − |A2 ∩ X−| + |X ∩ A−
830
+ 1 | − |X ∩ X−|
831
+ = |A2 ∩ A−
832
+ 1 | − α2(X) + β1(X).
833
+ Since |A1 ∩ A−
834
+ 1 |, |A2 ∩ A−
835
+ 1 |, α1(X) + β1(X) and α2(X) − β1(X) are multiples of 2k, we deduce
836
+ that |B1 ∩ B−
837
+ 1 | and |B2 ∩ B−
838
+ 1 | are multiples of 2k. Then we have
839
+ |B1 ∩ B−
840
+ 2 | = |B1| − |B1 ∩ B−
841
+ 1 |
842
+ |B2 ∩ B−
843
+ 2 | = |B2| − |B2 ∩ B−
844
+ 1 |.
845
+ Since |B1|, |B2|, |B1 ∩ B−
846
+ 1 | and |B2 ∩ B−
847
+ 1 | are multiples of 2k, we deduce that |B1 ∩ B−
848
+ 2 | and
849
+ |B2 ∩ B−
850
+ 2 | are multiples of 2k. Thus, {B1, B2} is k-nice, a contradiction.
851
+ Combining this lemma with Lemma 9 and Reiher’s theorem, which says that s(m, 2) =
852
+ 4m − 3, we obtain the first upper bound in Theorem 2.
853
+ Lemma 13. For all n ≥ 1 we have δ−(n, 2) ≤ 5, and δ−(5, 2) ≤ 4.
854
+ Proof. Let f ∈ F(n, 2). Using Theorem 4 we have
855
+ 3s(2n−5, 2) = 12 · 2n−5 − 9 ≤ 16 · 2n−5 = 2n−1.
856
+ Hence, by Lemma 12, f has a balanced (n−5)-nice partition. Thus, δ−
857
+ s (f) ≤ n−(n−5)−1 = 4
858
+ by Lemma 9. This proves that δ−(n, 2) ≤ 5. Then, since 3s(2, 2) = 15 ≤ 24, we deduce from
859
+ Lemma 12 that every f ∈ F(5, 2) has a 1-nice partition and thus δ−
860
+ s (f) ≤ 3 by Lemma 9. This
861
+ proves that δ−(5, 2) ≤ 4.
862
+ We now extend the previous arguments to larger alphabets.
863
+ Lemma 14. Every f ∈ F(n, q) has a balanced k-nice partition for any k such that
864
+ 3s(qk, 2q) ≤ qn−1.
865
+ Proof. Let f ∈ F(n, q). For X ⊆ �q�n, we use X− as a shorthand for f −1(X). Let k be as in
866
+ the statement. Given a partition A = {A1, . . . , Aq} of �q�n, we say that A is 1-dominating if
867
+ |A1| ≥ qn−1 and |Ai| ≤ qn−1 for all 2 ≤ i ≤ q. Observe that, by setting A1 = �q�n and Ai = ∅
868
+ for 2 ≤ i ≤ q, we obtain a 1-dominating k-nice partition: for every 2 ≤ i ≤ q and 1 ≤ j ≤ q, we
869
+ have |A1| = |A1 ∩ A−
870
+ 1 | = qn and |Ai| = |A1 ∩ A−
871
+ i | = |Ai ∩ A−
872
+ j | = 0. So we can suppose that A is
873
+ a 1-dominating k-nice partition with |A1| minimal.
874
+ We will prove that |A1| = qn−1, which (since A is 1-dominating) forces A to be balanced.
875
+ Suppose, for a contradiction, that |A1| > qn−1. Since A is 1-dominating there is 2 ≤ i ≤ n such
876
+ that |Ai| < qn−1. Suppose, without loss, that |A2| < qn−1.
877
+ By Lemma 11, there is a subset Y ⊆ A1 of size at least |A1|/3 which is a weakly independent
878
+ set. For x ∈ Y and 1 ≤ i ≤ q let
879
+ αi(x) = |Ai ∩ f −1(x)|,
880
+ 15
881
+
882
+ βi(x) =
883
+
884
+ 1
885
+ if f(x) ∈ Ai \ {x},
886
+ 0
887
+ otherwise,
888
+ β′
889
+ i(x) =
890
+
891
+ βi(x) + 1
892
+ if i = 2 and f(x) = x,
893
+ βi(x)
894
+ otherwise.
895
+ Since |A1| ≥ qn−1 we have |Y | ≥ |A1|/3 ≥ qn−1/3 ≥ s(qk, 2q). Considering the 2q functions
896
+ αi, β′
897
+ i, we deduce from the definition of s that there is a subset X ⊆ Y of size qk such that αi(X) =
898
+
899
+ x∈X αi(x) and β′
900
+ i(X) = �
901
+ x∈X β′
902
+ i(x) are multiples of qk for all 1 ≤ i ≤ q. Furthermore:
903
+ αi(X) = |Ai ∩ X−| for all 1 ≤ i ≤ q,
904
+ (1)
905
+ βi(X) = |X ∩ A−
906
+ i | for all 2 ≤ i ≤ q,
907
+ (2)
908
+ β′
909
+ i(X) = |X ∩ A−
910
+ i | for all 3 ≤ i ≤ q,
911
+ (3)
912
+ β′
913
+ 1(X) = |X ∩ A−
914
+ 1 | − |X ∩ X−|,
915
+ (4)
916
+ β′
917
+ 2(X) = |X ∩ A−
918
+ 2 | + |X ∩ X−|.
919
+ (5)
920
+ (1) is obvious, since
921
+ |Ai ∩ X−| = |Ai ∩ (∪x∈Xf −1(x))| =
922
+
923
+ x∈X
924
+ |Ai ∩ f −1(x)| = αi(X).
925
+ For (2), note that βi(X) is the number of x ∈ X with f(x) ∈ Ai \ {x}, which is equivalent to
926
+ f(x) ∈ Ai since 2 ≤ i ≤ q and x ∈ A1. So βi(X) is the number of x ∈ X with f(x) ∈ Ai, that is,
927
+ βi(X) = |X ∩ A−
928
+ i |. (3) results from (2) since β′
929
+ i = βi for 3 ≤ i ≤ q. For (4), note that β′
930
+ 1 = β1
931
+ and that β1(X) is the number of x ∈ X with f(x) ∈ A1 \ {x}. Since X is weakly independent,
932
+ f(x) ∈ A1 \ {x} is equivalent to f(x) ∈ A1 \ X, and thus β′
933
+ 1(X) is the number of x ∈ X with
934
+ f(x) ∈ A1 \ X, that is, β′
935
+ 1(X) = |X ∩ (A1 \ X)−| = |X ∩ A−
936
+ 1 | − |X ∩ X−|. To prove (5), let ℓ be
937
+ the number of x ∈ X with f(x) = x. It is clear that β′
938
+ 2(X) = β2(X) + ℓ, and using the second
939
+ point we obtain β′
940
+ 2(X) = |X ∩ A−
941
+ 2 | + ℓ. But since X is weakly independent, for x ∈ X we have
942
+ f(x) = x if and only if f(x) ∈ X, and thus ℓ = |X ∩ X−| so that β′
943
+ 2(X) = |X ∩ A−
944
+ 2 | + |X ∩ X−|.
945
+ Consider the partition
946
+ B = {B1, B2, B3, . . . , Bq} = {A1 \ X, A2 ∪ X, A3, . . . , Aq}.
947
+ Recall that A is k-nice, hence |A1|, |A2| are multiples of qk, and since we also have |A1| > qn−1
948
+ and |A2| < qn−1, it follows that |B1| = |A1| − qk ≥ qn−1 and |B2| = |A2| + qk ≤ qn−1, therefore
949
+ B is 1-dominating. As a consequence, in order to obtain the desired contradiction, it is sufficient
950
+ to prove that B is k-nice. First, since |X| = qk, it is clear that |Bi| is a multiple of qk for every
951
+ 1 ≤ i ≤ q. So it remains to prove that |Bi ∩ B−
952
+ j | is a multiple of qk for every 1 ≤ i, j ≤ q. This
953
+ is obvious for 3 ≤ i, j ≤ q since |Bi ∩ B−
954
+ j | = |Ai ∩ A−
955
+ j |. We show that the other intersection sizes
956
+ are multiples of qk by expressing these sizes as a sum of (positive or negative) numbers that are
957
+ already known to be multiples of qk. For that we use many times the properties (1),(3),(4),(5).
958
+ We begin with the case 1 ≤ i, j ≤ 2:
959
+ |B1 ∩ B−
960
+ 1 | = |(A1 \ X) ∩ (A−
961
+ 1 \ X−)|
962
+ = |A1 ∩ A−
963
+ 1 | − |A1 ∩ X−| − |X ∩ A−
964
+ 1 | + |X ∩ X−|
965
+ = |A1 ∩ A−
966
+ 1 | − α1(X) − β′
967
+ 1(X)
968
+ |B1 ∩ B−
969
+ 2 | = |(A1 \ X) ∩ (A−
970
+ 2 ∪ X−)|
971
+ 16
972
+
973
+ = |A1 ∩ A−
974
+ 2 | + |A1 ∩ X−| − |X ∩ A−
975
+ 2 | − |X ∩ X−|
976
+ = |A1 ∩ A−
977
+ 2 | + α1(X) − β′
978
+ 2(X)
979
+ |B2 ∩ B−
980
+ 1 | = |(A2 ∪ X) ∩ (A−
981
+ 1 \ X−)|
982
+ = |A2 ∩ A−
983
+ 1 | − |A2 ∩ X−| + |X ∩ A−
984
+ 1 | − |X ∩ X−|
985
+ = |A2 ∩ A−
986
+ 1 | − α2(X) + β′
987
+ 1(X)
988
+ |B2 ∩ B−
989
+ 2 | = |(A2 ∪ X) ∩ (A−
990
+ 2 ∪ X−)|
991
+ = |A2 ∩ A−
992
+ 2 | + |A2 ∩ X−| + |X ∩ A−
993
+ 2 | + |X ∩ X−|
994
+ = |A2 ∩ A−
995
+ 2 | + α2(X) + β′
996
+ 2(X).
997
+ For 1 ≤ i ≤ 2 and 3 ≤ j ≤ q we have:
998
+ |B1 ∩ B−
999
+ j | = |(A1 \ X) ∩ A−
1000
+ j |
1001
+ = |A1 ∩ A−
1002
+ j | − |X ∩ A−
1003
+ j |
1004
+ = |A1 ∩ A−
1005
+ j | − β′
1006
+ j(X)
1007
+ |B2 ∩ B−
1008
+ j | = |(A2 ∪ X) ∩ A−
1009
+ j |
1010
+ = |A2 ∩ A−
1011
+ j | + |X ∩ A−
1012
+ j |
1013
+ = |A2 ∩ A−
1014
+ j | + β′
1015
+ j(X).
1016
+ Finally, for 3 ≤ i ≤ q and 1 ≤ j ≤ 2, we have:
1017
+ |Bi ∩ B−
1018
+ 1 | = |Ai ∩ (A−
1019
+ 1 \ X−)|
1020
+ = |Ai ∩ A−
1021
+ 1 | − |Ai ∩ X−|
1022
+ = |Ai ∩ A−
1023
+ 1 | − αi(X)
1024
+ |Bi ∩ B−
1025
+ 2 | = |Ai ∩ (A−
1026
+ 2 ∪ X−)|
1027
+ = |Ai ∩ A−
1028
+ 2 | + |Ai ∩ X−|
1029
+ = |Ai ∩ A−
1030
+ 2 | + αi(X).
1031
+ So |Bi ∩ B−
1032
+ j | is indeed a multiple of qk for all 1 ≤ i, j ≤ q, thus B is k-nice, a contradiction.
1033
+ Combining this lemma with Lemma 9 and Alon-Dubiner’s theorem, which says that s(m, d) ≤
1034
+ (cd log2 d)dm for some constant c, we obtain the second upper bound in Theorem 2.
1035
+ Lemma 15. For all n ≥ 1 and q ≥ 2, we have δ−(n, q) ≤ (2 + o(1))q.
1036
+ Proof. Let f ∈ F(n, q), let α(q) = 2c log2(2q) where c is as in Theorem 5, and let k = ⌊ℓ⌋ with
1037
+ ℓ = n − 2q logq(qα(q)) − 1 − logq 3.
1038
+ Using Theorem 5 for the first inequality, we have
1039
+ 3s(qk, 2q) ≤ 3(qα(q))2qqk ≤ 3(qα(q))2qqℓ = qn−1.
1040
+ Hence, by Lemma 14, f has a balanced k-nice partition, and thus δ−
1041
+ s (f) ≤ n−k−1 by Lemma 9.
1042
+ So δ−(f) ≤ n − k, and since k ≥ ℓ − 1 we have
1043
+ δ−(f) ≤ 2q logq(qα(q)) + 2 + logq 3 =
1044
+
1045
+ 2 + 2 logq(α(q)) + (2 + logq 3)q−1�
1046
+ q.
1047
+ Since 2 logq(α(q)) + (2 + logq 3)q−1 tends to 0 as q tends to infinity, this proves the lemma.
1048
+ 17
1049
+
1050
+ 3.2
1051
+ Lower bound
1052
+ It remains to prove the lower bound in Theorem 2, which is based on a simple construction.
1053
+ Lemma 16. For all n, q ≥ 2 with n ≥ 3 or q ≥ 3, we have δ−(n, q) ≥ 2.
1054
+ Proof. Let f ∈ F(n, q) with n, q ≥ 2 and n ≥ 3 or q ≥ 3. Suppose that f has a limit cycle
1055
+ of length ℓ = qn−1 + 1, whose configurations are x1, . . . , xℓ in order, and suppose that x1 is
1056
+ the image of the all configurations which are not in the limit cycle; so f has exactly ℓ images.
1057
+ See Figure 10 for an illustration. We will prove that G(f) has minimum in-degree at least two,
1058
+ and since f is described up to isomorphism this proves that δ−(f) ≥ 2 and the lemma follows.
1059
+ Suppose, for a contradiction, that G(f) has a vertex i with in-degree at most 1.
1060
+ If i is of in-degree 0, then fi is a constant function, which always returns some a ∈ �q�.
1061
+ Hence, xi = a for all the images x of f, and thus f has at most qn−1 < ℓ images, a contradiction.
1062
+ So i is of in-degree 1. Let j be its in-neighbor (we may have i = j). There is then a non-
1063
+ constant function g : �q� → �q� such that fi(x) = g(xj) for all x ∈ �q�n. Let Y = {x1, . . . , xℓ−1}
1064
+ and note that Y = �q�n \ f −1(x1) by construction. For a ∈ �q� we set Xi,a = {x ∈ �q�n |
1065
+ xi = a} and Xj,a = {x ∈ �q�n | xj = a}. If Xj,a is not included in Y , that is if there is a
1066
+ configuration x with xj = a and f(x) = x1, then g(a) = fi(x) = x1
1067
+ i . We deduce that if Xj,a is
1068
+ not included in Y for every a ∈ �q�, then g is a constant function (which always return x1
1069
+ i ), a
1070
+ contradiction. So Xj,a ⊆ Y for some a, and since Y is of size ℓ − 1 = qn−1 = |Xj,a| we deduce
1071
+ that Y = Xj,a. Hence, setting b = g(a), we have f(Y ) ⊆ Xi,b, and since f(Y ) = {x2, . . . , xℓ}
1072
+ is of size ℓ − 1 = qn−1 = |Xi,b| we deduce that f(Y ) = Xi,b. Consequently, Xj,a and Xi,b are
1073
+ distinct. Furthermore, they are not disjoint since Xj,a ∩ Xi,b = Y ∩ f(Y ) = {x2, . . . , xℓ−1} is
1074
+ of size ℓ − 2 = qn−1 − 1 > 0. We deduce that i ̸= j and thus |Xj,a ∩ Xi,b| = qn−2. We obtain
1075
+ qn−2 = qn−1 − 1, which is a contradiction since n ≥ 3 or q ≥ 3.
1076
+ x1
1077
+ x2
1078
+ x3
1079
+ x4
1080
+ x5
1081
+
1082
+
1083
+
1084
+ Figure 10: The function of Lemma 16 for n = 3 and q = 2.
1085
+ 4
1086
+ Dense digraphs
1087
+ In this section, we will prove Theorem 3, that for n, q ≥ 2 there is f ∈ F(n, q) such that every
1088
+ digraph in G(f) has at least ⌊n2/4⌋ arcs. We need two lemmas. In a digraph, the sources are
1089
+ the vertices of in-degree 0, and the non-sources are the vertices of in-degree at least 1.
1090
+ Lemma 17. Let f ∈ F(n, q) and let X be the images of f. Let k ∈ [n] and suppose that, for
1091
+ all non-empty strict subsets Y of X, |f −1(Y )| is not a multiple of qk. Then every non-source of
1092
+ G(f) has strict in-degree at least n − k.
1093
+ 18
1094
+
1095
+ Proof. Suppose, for a contradiction, that G(f) has a non-source i with strict in-degree at most
1096
+ n − k − 1. For 1 ≤ p ≤ q, let Ap be the set of x ∈ �q�n with xi = p − 1. By Lemma 10,
1097
+ A = {A1, . . . , Aq} is a balanced k-nice partition of f. Let 1 ≤ p ≤ q such that X ∩ Ap ̸= ∅ and
1098
+ let Y = X ∩ Ap. If X ⊆ Ap, then it means that fi is a constant function (which always returns
1099
+ p), which is a contradiction because i has in-degree at least 1. We deduce that Y is a non-
1100
+ empty strict subset of X. Furthermore, we have |f −1(Y )| = |f −1(Ap)| = �q
1101
+ ℓ=1 |Aℓ ∩ f −1(Ap)|.
1102
+ Since A is k-nice, each term of the sum is a multiple of qk. So |f −1(Y )| is a multiple of qk, a
1103
+ contradiction.
1104
+ Lemma 18. For all n, q ≥ 2 and k ∈ [n], there is f ∈ F(n, q) such that, for every G ∈ G(f), G
1105
+ has at least k non-sources and all the non-sources of G have strict in-degree at least n − k.
1106
+ Proof. Let X be a subset of �q�n of size qk and let x∗ ∈ X. Let f ∈ F(n, q) such that for all
1107
+ x ∈ �q�n, f(x) = x if x ∈ X and f(x) = x∗ otherwise. See Figure 11 for an illustration. The
1108
+ images of f are thus exactly X. We will prove that G(f) has at least k non-sources, each of
1109
+ strict in-degree at least n − k. Since f is described up to isomorphism, this proves the lemma.
1110
+ We first prove that every non-source of G(f) has strict in-degree at least n−k. Let Y be any
1111
+ non-empty strict subset of X, and let Y − = f −1(Y ). We have 0 < |Y | < |X| = qk thus |Y | is not
1112
+ a multiple of qk. We will show that |Y −| is not a multiple of qk. Note that |f −1(x∗)| = qn−qk+1
1113
+ and |f −1(x)| = 1 for all x ∈ X \ {x∗}. Thus, if x∗ /∈ Y then |Y −| = |Y | is not a multiple of qk.
1114
+ If x∗ ∈ Y then |Y −| = |f −1(x∗)| + |Y | − 1 = qn − qk + |Y |, and since |Y | is not a multiple of qk
1115
+ we deduce that |Y −| is not a multiple of qk. Consequently, by Lemma 17, every non-source of
1116
+ G(f) has strict in-degree at least n − k.
1117
+ Let ℓ be the number of non-sources of G(f). It remains to prove that ℓ ≥ k. Let I be the
1118
+ set of sources of G(f). For each i ∈ I, fi is a constant function which always returns some
1119
+ member ai ∈ �q�. Let Z be the set of x ∈ �q�n with xi = ai for all i ∈ I. We have X ⊆ Z, so
1120
+ qk = |X| ≤ |Z| = qn−|I| = qℓ. Thus, ℓ ≥ k as desired.
1121
+ x∗
1122
+
1123
+
1124
+
1125
+
1126
+
1127
+
1128
+
1129
+
1130
+
1131
+
1132
+
1133
+
1134
+
1135
+
1136
+
1137
+ Figure 11: The function of Lemma 18 for n = 4 and q = k = 2.
1138
+ The proof of Theorem 3 is now immediate: by Lemma 18 applied with k = ⌊n/2⌋, there
1139
+ is f ∈ F(n, q) such that every digraph in G(f) has at least ⌊n/2⌋ vertices of in-degree at least
1140
+ n − ⌊n/2⌋, and thus at least ⌊n/2⌋(n − ⌊n/2⌋) = ⌊n2/4⌋ arcs.
1141
+ 5
1142
+ Concluding remarks
1143
+ • Let us say that a digraph G is (n, q)-universal if G is isomorphic to some digraph in G(f)
1144
+ for every f ∈ F(n, q) with f ̸= id, cst. Theorem 1 says that Kn is (n, q)-universal if n ≥ 5
1145
+ or q ≥ 3. Actually, for n, q ≥ 2, any (n, q)-universal digraph is isomorphic to Kn. Indeed,
1146
+ suppose G is (n, q)-universal. First, if f ∈ F(n, q) is a bijection, then every digraph in
1147
+ G(f) has no source. Thus, G has no source. Then, by Lemma 18 applied with k = 1,
1148
+ there is f ∈ F(n, q) such that any digraph in G(f) has at least one non-source, and each
1149
+ 19
1150
+
1151
+ non-source has strict in-degree n − 1. So G has this property, and since it has no source,
1152
+ we deduce that each vertex has strict in-degree n − 1. Finally, if f ∈ F(n, q) has at least
1153
+ qn−1 + 1 fixed points, then we easily check that any digraph in G(f) has n loops. So G
1154
+ has n loops and we deduce that it is isomorphic to Kn.
1155
+ • We proved that there is no f ∈ F(n, q) such that G(f) only contains Kn when n is large
1156
+ compared to q, since we proved that δ−(n, q) ≤ cqq for some constant cq that only depends
1157
+ on q, and thus δ−(n, q) < n for n > cqq. In particular, for n ≥ 5, there is no f ∈ F(n, 2)
1158
+ such that G(f) = {Kn} since we proved that δ−(5, 2) ≤ 4 and δ−(n, 2) ≤ 5. However, for
1159
+ every q ≥ 3, there is f ∈ F(2, q) such that G(f) = {K2} since we proved that δ−(2, q) = 2.
1160
+ Does this phenomenon hold for every n, that is, for every fixed n and q large enough with
1161
+ respect to n, is there f ∈ F(n, q) such that G(f) = {Kn}? An equivalent formulation is:
1162
+ does δ−(n, q) necessarily increase with q? Also, we proved that 2 ≤ δ−(n, 2) ≤ 5, for every
1163
+ n ≥ 3, and we may ask if δ−(n, 2) is a constant, and if so which one of the four possible
1164
+ values it takes.
1165
+ • Let d(n, q) be the maximum real d ∈ [0, 1] such that there is f ∈ F(n, q) such that every
1166
+ digraph in G(f) has dn2 arcs, that is, has density d. We prove that d(n, q) ≥ 1/4 − 1/n2
1167
+ where 1/n2 tends to 0 as n tends to infinity, i.e. is o(1).
1168
+ Hence, this lower bound is
1169
+ independent of the alphabet size q, and we may ask, as above, whether d(n, q) is necessarily
1170
+ increasing with q.
1171
+ Acknowledgments
1172
+ This work was supported by the Young Researcher project ANR-18-
1173
+ CE40-0002-01 “FANs”.
1174
+ References
1175
+ [1] Noga Alon and Moshe Dubiner. A lattice point problem and additive number theory. Com-
1176
+ binatorica, 15(3):301–309, September 1995.
1177
+ [2] Bernard Elspas. The theory of autonomous linear sequential networks. IRE Transactions
1178
+ on Circuit Theory, 6(1):45–60, 1959.
1179
+ [3] Paul Erd¨os, Abraham Ginzburg, and Abraham Ziv. Theorem in the additive number theory.
1180
+ Bull. Res. Council Israel F, 10:41–43, 1961.
1181
+ [4] Maximilien Gadouleau.
1182
+ On the influence of the interaction graph on a finite dynamical
1183
+ system. Natural Computing, 19(1):15–28, 2020.
1184
+ [5] Nicolas Le Nov`ere. Quantitative and logic modelling of molecular and gene networks. Nature
1185
+ Reviews Genetics, 16:146–158, 2015.
1186
+ [6] Christian Reiher. On Kemnitz’conjecture concerning lattice-points in the plane. The Ra-
1187
+ manujan Journal, 13(1):333–337, 2007.
1188
+ [7] Ren´e Thomas and Marcelle Kaufman. Multistationarity, the basis of cell differentiation and
1189
+ memory. II. Logical analysis of regulatory networks in terms of feedback circuits. Chaos: An
1190
+ Interdisciplinary Journal of Nonlinear Science, 11(1):180–195, 2001.
1191
+ 20
1192
+
BdAzT4oBgHgl3EQf___2/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CNE2T4oBgHgl3EQfRwe0/content/tmp_files/2301.03785v1.pdf.txt ADDED
@@ -0,0 +1,2764 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Best Arm Identification in Stochastic Bandits: Beyond β−optimality
2
+ Arpan Mukherjee
3
+ Ali Tajer *
4
+ Abstract
5
+ This paper focuses on best arm identification (BAI) in stochastic multi-armed bandits (MABs) in the fixed-
6
+ confidence, parametric setting. In such pure exploration problems, the accuracy of the sampling strategy critically
7
+ hinges on the sequential allocation of the sampling resources among the arms. The existing approaches to BAI ad-
8
+ dress the following question: what is an optimal sampling strategy when we spend a β fraction of the samples on
9
+ the best arm? These approaches treat β as a tunable parameter and offer efficient algorithms that ensure optimality
10
+ up to selecting β, hence β−optimality. However, the BAI decisions and performance can be highly sensitive to the
11
+ choice of β. This paper provides a BAI algorithm that is agnostic to β, dispensing with the need for tuning β, and
12
+ specifies an optimal allocation strategy, including the optimal value of β. Furthermore, the existing relevant literature
13
+ focuses on the family of exponential distributions. This paper considers a more general setting of any arbitrary family
14
+ of distributions parameterized by their mean values (under mild regularity conditions).
15
+ 1
16
+ Introduction
17
+ We consider the problem of best arm identification (BAI) in stochastic multi-armed bandits in the fixed-confidence
18
+ setting. The bandit instances are assumed to be generated by a general class of distributions parameterized by their
19
+ mean values. Under some mild assumptions on the probability models, this model is general and subsumes the
20
+ common classes of distributions investigated in bandit models (e.g., Gaussian, exponential, and Bernoulli bandits). In
21
+ BAI, the objective is to identify the best arm (i.e., the arm with the largest mean value) within a pre-specified level
22
+ of confidence with the fewest number of samples. In this paper, we focus on the open problem of BAI in the fixed-
23
+ confidence parametric setting. Next, we review the relevant literature on BAI to provide context for specifying our
24
+ BAI setting and discussing our contributions.
25
+ Fixed- Confidence versus Budget.
26
+ BAI was first studied as a pure exploration bandit problem in [1]. Subsequently,
27
+ it has been investigated in two broad settings: the fixed-confidence setting and the fixed-budget setting. The goal in the
28
+ fixed-confidence setting is to identify the best arm within a specified guarantee on the decision confidence while using
29
+ as few samples as possible to arrive at a decision. Representative studies in the fixed-confidence setting include [2–7].
30
+ On the other hand, in the fixed-budget setting, the sampling budget is pre-specified. The goal is to minimize the
31
+ probability of error in the terminal decision. Representative studies in this regime include [1,8,9]. Our focus is on the
32
+ fixed-confidence setting, the literature on which is discussed next.
33
+ *The authors are with the Electrical, Computer, and System Engineering Department, Rensselaer Polytechnic Institute.
34
+ 1
35
+ arXiv:2301.03785v1 [stat.ML] 10 Jan 2023
36
+
37
+ Bayesian versus Non-Bayesian.
38
+ BAI in the fixed-confidence setting can be categorized into Bayesian and non-
39
+ Bayesian models. Bayesian settings assume a prior distribution on the space of parameters and make arm selection
40
+ decisions based on the posterior distribution computed from the prior and the observed rewards. In contrast, the non-
41
+ Bayesian settings do not use posterior sampling for arm selection. Top-two sampling was first introduced in [10] for
42
+ the Bayesian setting. The principle of top-two sampling involves dynamically, over time, identifying a leader and a
43
+ challenger as the top arm candidates. Subsequently, the sampling strategy randomizes between these two arms. The
44
+ top-two Thompson sampling (TTTS) algorithm, proposed and analyzed in [10, 11], involves sampling the posterior
45
+ for defining the leader and the challenger. Despite the simplicity of TTTS, it faces the computational challenge of
46
+ repeatedly sampling from the posterior in defining a challenger. To mitigate this, [11] proposed a computationally
47
+ efficient alternative called the top-two transportation cost (T3C) algorithm. The empirical performance of T3C was
48
+ further improved using a penalized transportation cost, promoting exploration, in [12].
49
+ In the non-Bayesian setting, [4] has proposed the track-and-stop (TaS) algorithm for BAI, with optimal perfor-
50
+ mance in the asymptote of diminishing probability of error. More investigations on TaS-based algorithms include [13]
51
+ and [14]. The TaS sampling strategies, in general, hinge on tracking the optimal allocation of sampling resources
52
+ over time. Maintaining such allocation in a bandit setting with K arms necessitates solving K equations at each time
53
+ using the bisection method. Hence, these approaches are generally computationally expensive. It was shown in [14]
54
+ that the tracking procedure could only be performed intermittently at exponentially spaced intervals. This reduces the
55
+ computational complexity for TaS. Nevertheless, the approach of [14] only applies to linear bandits with Gaussian
56
+ noise. To address this computational challenge, the top-two approach has also been used to design algorithms for the
57
+ non-Bayesian setting. Representative top-two non-Bayesian algorithms include top-two sequential probability ratio
58
+ test (TT-SPRT) [7,12,15], top-two expected improvement (TTEI) [16], and the empirical best leader with an improved
59
+ transportation cost (EB-TCI) [12]. While efficient, these algorithms achieve optimality performance only up to a tun-
60
+ able parameter. Specifically, these algorithms, at their core, identify an optimal allocation of the sampling resources
61
+ among the arms. The nature of the optimality guarantees offered by the top-two algorithms in the non-Bayesian setting
62
+ is as follows: if a β fraction of the sampling resources are reserved for the top arm, then these algorithms can determine
63
+ how to optimality allocate the remaining (1 − β) fraction among the rest of the arms. Hence, these algorithms are
64
+ said to be only β−optimal, where β ∈ (0, 1) is treated as a tunable parameter. In some settings, the choice of β can
65
+ critically affect the performance.
66
+ Parametric versus Non-parametric.
67
+ Algorithms for BAI can also be categorized based on whether the bandit
68
+ instance follows parametric or non-parametric families of distributions. In the case of the non-parametric family, the
69
+ upper confidence bound (UCB) based approaches have been investigated (e.g., [2, 5]) and shown to be optimal up to
70
+ constant factors for the family of sub-Gaussian bandits. More recently, the study in [13] has considered the class of
71
+ distributions satisfying a specific functional boundedness property. This study proposes a tracking-based sampling
72
+ strategy along with a likelihood ratio-based stopping rule, which was shown to be asymptotically optimal for this
73
+ specified class of distributions. For parametric bandits, most studies have focused on the single parameter exponential
74
+ family (e.g., [4,7,10,12,17]). Some investigations have considered the case of Gaussian bandits with known variances
75
+ and unknown means, e.g., [11, 16]. In both of these settings, the top-two sampling strategy is β−optimal, while the
76
+ TaS algorithm has been shown to be asymptotically optimal, despite being computationally expensive.
77
+ 2
78
+
79
+ Contributions.
80
+ This paper is focused on fixed-confidence, non-Bayesian, and parametric settings. Hence, the di-
81
+ rectly relevant literature to this scope includes [4,7,11,12,16]. We propose an algorithm, referred to as the transporta-
82
+ tion cost balancing (TCB) algorithm, that addresses two open problems. First, we dispense with the need for treating
83
+ β as a tuning parameter. Specifically, the TCB algorithm is agnostic to β and can specify its unique optimal value as a
84
+ by-product. In order to showcase the importance of determining β and the gap between a β−optimal solution and an
85
+ optimal solution, in Figure 1 we show how the sample complexity of the β−optimal solutions vary with respect to β,
86
+ demonstrating (i) the sensitivity of the sample complexity to β, and (ii) a substantial gap (e.g., an order of magnitude)
87
+ between the optimal and the β−optimal guarantees. β = 0.5 has been prescribed as a good choice for top-two algo-
88
+ rithms [10]. Nevertheless, in many instances that can be far from the optimal choice. For instance, Figure 1 confirms
89
+ demonstrates sub-optimality of choosing β = 0.5 in three existing approaches that ensure β−optimality. In all these
90
+ cases, the optimal value is β ≈ 0.27. As the second contribution, we also generalize the probability models to any
91
+ arbitrary class of parametric models (that satisfy certain regularity conditions). These models subsume the exponen-
92
+ tial family, which is the only parametric class for which algorithms and performance guarantees are available in the
93
+ literature.
94
+ 0.2
95
+ 0.3
96
+ 0.4
97
+ 0.5
98
+ 0.6
99
+ 5000
100
+ 6000
101
+ 7000
102
+ 8000
103
+ 9000
104
+ 10000
105
+ 11000
106
+ 12000
107
+ TT-SPRT
108
+ T3C
109
+ TS-TCI
110
+ Figure 1: Sample complexity versus β.
111
+ Methodology: Transport Cost Balancing (TCB).
112
+ For fixed-confidence BAI, for any bandit instance ν, the univer-
113
+ sal lower bound on the average sample complexity is inversely proportional to a problem complexity measure Γ(ν)
114
+ (specified later in (27)). Achieving this lower bound is predicated on sequentially determining an optimal allocation
115
+ of the sampling resources among the arms. While the TaS algorithm in [4] computes these optimal allocations, it is
116
+ computationally expensive. To mitigate this computational challenge, the top-two sampling rules assign a sampling
117
+ proportion β ∈ (0, 1) to the best arm, where β is a tunable parameter and, then determine the allocation of the re-
118
+ maining (1 − β) fraction over the rest. The analysis of the top-two methods shows that this facilitates convergence
119
+ to the β−optimal allocation. In these methods, the sample complexity is inversely proportional to the transportation
120
+ 3
121
+
122
+ cost Γβ(ν), where Γ(ν) ≥ Γβ(ν). Equality holds at the optimal value β⋆, which depends on the bandit instance
123
+ and is unknown a priori. In our approach, essentially, we also determine the optimal value of β, which was shown
124
+ by [10] to have a unique solution. Our algorithm guides its decisions by balancing transportation costs over time.
125
+ These decisions lead to efficiently estimating the optimal sampling proportion. The fundamental advantage of our arm
126
+ selection rules is that they can track the sampling proportions without having to compute the sampling proportions
127
+ at each round. Rather, the sampling proportion is estimated by sampling from the set of under-sampled arms in each
128
+ round.
129
+ 2
130
+ Stochastic BAI Model and Assumption
131
+ Stochastic Model. Denote the class of probability measures defined on any sample space Ω ⊆ R by Q(Ω). Let
132
+ P(Ω) ⊂ Q(Ω) denote the class of probability measures that are parameterized by their mean values, i.e.,
133
+ P(Ω) ≜ {P ∈ Q(Ω) : m(P) ∈ Θ} ,
134
+ (1)
135
+ where m(P) ≜ EP[X], and EP denotes the expectation under measure P. Furthermore, define M ≜ P⊗K(Ω) as the
136
+ Cartesian product of K sets of measures in P(Ω). We denote the likelihood function associated with measure P by
137
+ πP. We make the following assumptions on this stochastic model.
138
+ 1. Θ ⊆ R is a compact parameter space.
139
+ 2. All distributions in P(Ω) have the same support Ω.
140
+ 3. The likelihood functions πP are continuous and differentiable in m(P) for every P ∈ P(Ω).
141
+ 4. There exists σ2 > 0 such that for any P ∈ P(Ω),
142
+ ∂2 log πP(x | θ)
143
+ ∂θ2
144
+ ≤ −σ2 ,
145
+ ∀x ∈ Ω, ∀θ ∈ Θ .
146
+ (2)
147
+ The assumption in (2) specifies a bound on the second order derivative of the log-likelihood function over the
148
+ parameter space Θ. For instance, for the exponential family of distributions, (2) is equivalent to the variance
149
+ being bounded away from zero.
150
+ 5. There exists c > 0 such that for any P ∈ P(Ω), for any x, y ∈ Ω and for all θ ∈ Θ,
151
+ ����
152
+ ∂ log πP(x | θ)
153
+ ∂θ
154
+ − ∂ log πP(y | θ)
155
+ ∂θ
156
+ ���� ≤ c|x − y| .
157
+ (3)
158
+ The condition in (3) is a Lipschitz-related assumption on the derivative of the log-likelihood function with
159
+ respect to the realizations.
160
+ 6. For any θ, θ′ ∈ Θ, we assume that
161
+ EP
162
+ �����log πP(X | θ)
163
+ πP(X | θ′)
164
+ ����
165
+ 2�
166
+ < +∞ .
167
+ (4)
168
+ The condition in (4) implies that the log-likelihood ratio corresponding to parameters θ and θ′ has a finite second
169
+ moment. The condition in (4) holds for a wide variety of distributions, such as the exponential family and the
170
+ log-normal distribution.
171
+ 4
172
+
173
+ 7. Any P ∈ P(Ω) satisfies the L1 transportation inequality. Specifically, for any P ∈ P(Ω) and any reference
174
+ measure Q, we assume that there exists a universal constant c′ ∈ R+ such that
175
+ W1(P, Q) ≤
176
+
177
+ 2c′DKL(P∥Q) ,
178
+ (5)
179
+ where W1 denotes the Wasserstein distance metric between the measures P and Q, and DKL represents the
180
+ Kullback-Leibler (KL) divergence.
181
+ Assumptions 1-3 ensure the existence of the maximum likelihood estimates (MLEs) for the parameters of interest (i.e.,
182
+ the mean values) and that the KL divergence measures between any pair of distributions in M are finite. Assumptions
183
+ 3-6 are mild regularity conditions on the log-likelihood functions and are satisfied by a wide variety of distributions.
184
+ For instance, the exponential family of distributions satisfies these assumptions, which includes important bandit
185
+ models such as Gaussian and Bernoulli bandits. Examples not from the exponential family include the log-normal
186
+ distribution known up to one of the mean values and mixture distributions. Finally, let (M, DTV) denote the metric
187
+ space of the distributions in the set M endowed with the total variation distance metric DTV. The environment M
188
+ subsumes several classes of common parametric distribution families, such as the scalar parameter exponential family,
189
+ which has been widely investigated in the BAI literature [4,7,10,12].
190
+ Bandit Model.
191
+ Consider a K-armed stochastic bandit. The rewards of arm i ∈ [K] ≜ {1, · · · , K} are generated
192
+ from Pi ∈ P(Ω). We denote the likelihood function associated with Pi by πi, and define µ(i) ≜ m(Pi). Accordingly,
193
+ we define the bandit instance ν ≜ [P1, . . . , PK].
194
+ Sequential Decisions.
195
+ At each round t ∈ N, the learner chooses an action At ∈ [K], and receives a reward Xt ∼
196
+ PAt. We denote the sequence of actions, the corresponding rewards, and the filtration generated by the sequence of
197
+ actions and rewards by the ordered sets
198
+ At ≜ {As : s ∈ [t]} ,
199
+ Xt ≜ {Xs : s ∈ [t]} ,
200
+ and
201
+ Ft ≜ {A1, X1, · · · , At, Xt} .
202
+ (6)
203
+ Denote the set of rewards obtained by selecting an arm i ∈ [K] up till time t by
204
+ X i
205
+ t ≜ {Xs : s ∈ [t], As = i} .
206
+ (7)
207
+ The objective of the learner is to identify the best arm, which is assumed to be unique, and is defined as the arm with
208
+ the largest mean, i.e.,
209
+ a⋆ ≜ arg max
210
+ i∈[K]
211
+ µ(i) .
212
+ (8)
213
+ For the algorithm design, we use information projection measures defined as follows. For any measure P ∈ P(Ω) and
214
+ x ∈ R, we define
215
+ dU(P, x) ≜
216
+ inf
217
+ Q∈P(Ω): m(Q) ≤ x DKL(P∥Q) ,
218
+ (9)
219
+ and
220
+ dL(P, x) ≜
221
+ inf
222
+ Q∈P(Ω): m(Q) ≥ x DKL(P∥Q) .
223
+ (10)
224
+ 5
225
+
226
+ Specifically, the information measure dU(P, x) with respect to any distribution P ∈ P(Ω) and x ∈ R is the minimum
227
+ KL divergence between P and any distribution with mean at most x. Similarly, dL(P, x) measures the KL divergence
228
+ between P and any distribution with mean at least x. In the fixed confidence setting, the goal is to identify the best
229
+ arm with a pre-specified level of confidence while minimizing the number of samples in making the decision. Let τ
230
+ denote an F-adapted stopping time, i.e., {τ = t} ∈ Ft for every t ∈ N. Corresponding to the stochastic stopping time
231
+ τ, let ˆAτ denote the terminal decision of the learner. The δ-PAC objective of the learner is formalized next.
232
+ Definition 1 (δ−PAC). A BAI algorithm is δ−PAC if the algorithm has a stopping time τ adapted to {Ft : t ∈ N},
233
+ and at the stopping time with the terminal decision ˆAτ ∈ [K] it ensures
234
+ Pν{ ˆAτ = a⋆} > 1 − δ ,
235
+ (11)
236
+ where Pν denotes the probability measure induced by the interaction of the BAI algorithm with the bandit instance ν.
237
+ 3
238
+ Transportation Cost Balancing Algorithm
239
+ In this section, we specify (i) a stopping rule that decides when to stop collecting samples and form a confident decision
240
+ about the best arm, (ii) an arm selection rule that guides the order of sampling arms over time, and (iii) an estimation
241
+ routine that aims to learn the unknown model parameters of interest (e.g., the mean values). The central statistic that
242
+ guides all the three decisions in the TCB algorithm is the generalized log-likelihood ratio (GLLR). To formalize the
243
+ GLLRs, we define K hypotheses {Hi : i ∈ [K]} such that
244
+ Hi : arm i is the best arm.
245
+ (12)
246
+ For each arm i ∈ [K] at time t we next define
247
+ Λt(i) ≜ sup
248
+ Hi
249
+ Pν(Xt | Hi is true) ,
250
+ (13)
251
+ where supHi denotes taking a supremum with the constraint that all the realizations are generated by a bandit instance
252
+ in which arm i is the best arm. It can be readily verified that
253
+ Λt(i) =
254
+ sup
255
+ µ: µ(i)>max
256
+ j̸=i µ(j)
257
+
258
+ a∈[K]
259
+
260
+ s∈[t]:As=a
261
+ πa(Xs | µ(a)) ,
262
+ (14)
263
+ where we have defined
264
+ µ ≜ [µ(1), . . . , µ(K)] .
265
+ (15)
266
+ Accordingly, for any pair of arms (i, j) ∈ [K]2, at time t, we define the GLLR between arms i and j as
267
+ Λt(i, j) ≜ log supHi Pν(Xt | Hi is true)
268
+ supHj Pν(Xt | Hj is true)
269
+ (16)
270
+ = log Λt(i)
271
+ Λt(j) .
272
+ (17)
273
+ Next, we characterize a closed-form expressions for the GLLRs in (17). First, we provide a few relevant definitions
274
+ required for stating the closed-form expression.
275
+ 6
276
+
277
+ 1. Denote the log-likelihood ratio for arm i ∈ [K] corresponding to parameters θ, θ′ ∈ Θ by
278
+ LLRi(θ, θ′, x) ≜ log πi(x | θ)
279
+ πi(x | θ′) ,
280
+ ∀x ∈ Ω .
281
+ (18)
282
+ 2. At any time t ∈ N and for any arm i ∈ [K], and based on the samples available from this arm, we denote the
283
+ maximum likelihood estimate (MLE) of µ(i) by
284
+ µt(i) ≜ arg max
285
+ µ∈R
286
+
287
+ s∈[t]
288
+ log πi(Xs | µ) · 1{As=i} ,
289
+ (19)
290
+ where 1 denotes the indicator function.
291
+ 3. Define the set of superior arms relative to arm i as
292
+ Rt(i) ≜ {j ∈ [K] : µt(i) < µt(j)} .
293
+ (20)
294
+ 4. Finally, define ˜µt(i) as the solution to
295
+
296
+ ∂µ
297
+
298
+ � �
299
+ j∈Rt(i)
300
+
301
+ s∈[t]:As=i
302
+ log πj(Xs | µ)
303
+
304
+ � = 0 ,
305
+ (21)
306
+ which denotes the MLE for the arms j ∈ Rt(i) under the hypothesis that arm i ∈ [K] is the best arm. More
307
+ specifically, ˜µt(i) is the estimate of the mean of the arms j ∈ [K] which have a larger MLE µt(j) compared to
308
+ µt(i), under the hypothesis Hi. As an example, for the exponential family of distributions, ˜µi(t) is simply the
309
+ weighted combination of the MLEs of the arms j ∈ Rt(i) [4, Section 3.2].
310
+ Next, we state a closed-form expression for Λt(i, j) in (17).
311
+ Lemma 1. For any pair of arms (i, j) ∈ [K]2, the GLLRs Λt(i, j) can be equivalently expressed as follows.
312
+ 1. If µt(i) > µt(j):
313
+ Λt(i, j) =
314
+
315
+ a∈Rt(i)
316
+
317
+ s∈[t]:As=a
318
+ LLRa(˜µt(i), ˜µt(j), Xs)
319
+ +
320
+
321
+ a∈Rt(j)\Rt(i)
322
+
323
+ s∈[t]:As=a
324
+ LLRa(µt(a), ˜µt(j), Xs) ,
325
+ 2. If µt(i) ≤ µt(j):
326
+ Λt(i, j) =
327
+
328
+ a∈Rt(j)
329
+
330
+ s∈[t]:As=a
331
+ LLRa(˜µt(i), ˜µt(j), Xs)
332
+ +
333
+
334
+ a∈Rt(i)\Rt(j)
335
+
336
+ s∈[t]:As=a
337
+ LLRa(˜µt(i), µt(a), Xs) .
338
+ Proof. See Appendix A.
339
+
340
+ GLLR-based Stopping Rule.
341
+ We specify a GLLR-thresholding stopping criterion, which compares the GLLR
342
+ statistic against a time-varying threshold. When the GLLR statistic exceeds the threshold, the algorithm stops col-
343
+ lecting more samples and forms a decision about the best arm. Let us denote the maximum likelihood (ML) decision
344
+ at time t about the top arm by atop
345
+ t , i.e.,
346
+ atop
347
+ t
348
+ ≜ arg max
349
+ i∈[K]
350
+ µt(i) .
351
+ (22)
352
+ 7
353
+
354
+ Our stopping criterion is based on sufficiently distinguishing between the ML decision atop
355
+ t , and the most likely
356
+ contender compared to the best arm, which we refer to as the challenger. This challenger arm at time t is the arm
357
+ closest to the top arm in a GLLR sense, and it is specified by
358
+ ach
359
+ t
360
+
361
+ arg min
362
+ i∈[K]\{atop
363
+ t }
364
+ Λt(atop
365
+ t , i) .
366
+ (23)
367
+ In other words, ach
368
+ t
369
+ denotes the arm that is the top contender to the best arm atop
370
+ t , where the comparison is made
371
+ using the likelihood ratio between the arms. The stopping rule compares the GLLR between atop
372
+ t
373
+ and ach
374
+ t and stops
375
+ collecting samples when the GLLR exceeds a threshold. The threshold depends on the level of confidence δ required
376
+ on the final decision and it is denoted by βt(δ). The stopping rule is stated next.
377
+ τ ≜ inf
378
+
379
+ t ∈ N : Λt(atop
380
+ t , ach
381
+ t ) > βt(δ)
382
+
383
+ .
384
+ (24)
385
+ The threshold βt(δ) is specified in Theorem 1 such that it ensure the δ-PAC guarantee on the decision. Next, we
386
+ delineate the arm selection rules. For this purpose, we first formalize the problem complexity measure, which quan-
387
+ tifies the hardness of identification in a BAI instance. Specifically, the problem complexity captures the minimum
388
+ distance between the given bandit instance and any other bandit instance with a different best arm. Clearly, the smaller
389
+ the problem complexity, the larger the number of samples required for identification. We also state an equivalent
390
+ representation of the problem complexity, which motivates our arm selection strategies.
391
+ Problem complexity.
392
+ Consider a bandit instance ν = [P1, · · · , PK] with the top arm a⋆. Given a⋆, we define an
393
+ alternative set of bandit instances ¯ν = [¯P1, · · · , ¯PK] in which the top arm is not a⋆. Specifically,
394
+ alt(a⋆) ≜ {¯ν ∈ M : m(¯Pa⋆) ≤ max
395
+ i̸=a⋆ m(¯Pi)} .
396
+ (25)
397
+ Subsequently, given a⋆ and alt(a⋆), under the weight vector w = [w1, · · · , wK] ∈ ∆K, where ∆K represents the
398
+ K-dimensional probability simplex, we define the problem complexity associated with ν as the smallest weighted KL
399
+ divergence from ν to the set alt(a⋆). Specifically,
400
+ Γ(ν, w) ≜
401
+ inf
402
+ ¯ν∈alt(a⋆)
403
+
404
+ i∈[K]
405
+ wi DKL(Pi∥¯Pi) .
406
+ (26)
407
+ Given any weight vector w ∈ ∆K, Γ(ν, w) captures the hardness of distinguishing ν from the closest alternate
408
+ bandit instance, where the divergence between the arms is weighted by w. Finally, we define the problem complexity
409
+ associated with the bandit instance ν as
410
+ Γ(ν) ≜
411
+ sup
412
+ w∈∆K Γ(ν, w) .
413
+ (27)
414
+ It can be readily verified that Γ(ν) captures the maximum hardness in distinguishing ν from the closest bandit instance.
415
+ Accordingly, we define the maximizer weight vector as
416
+ w(ν) ≜ arg sup
417
+ w∈∆K
418
+ Γ(ν, w) .
419
+ (28)
420
+ The weight vector w(ν) characterizes the optimal allocation in which to sample arms, such that the sample complex-
421
+ ity for BAI for the bandit instance ν is minimized. Next, we provide an equivalent representation of the problem
422
+ complexity measure, which facilitates analyzing its key properties.
423
+ 8
424
+
425
+ Lemma 2. The problem complexity Γ(ν, w) defined in (26) can be equivalently expressed as
426
+ Γ(ν, w) = min
427
+ i̸=a⋆
428
+ inf
429
+ x∈[µ(i),µ(a⋆)]
430
+
431
+ wa⋆dU(Pa⋆, x) + widL(Pi, x)
432
+
433
+ .
434
+ (29)
435
+ Proof. The proof follows similar line of arguments as [4, Lemma 3]. For completeness, we provide the proof in
436
+ Appendix C.1.
437
+
438
+ The expression for Γ(ν, w) in (29) involves an inner minimization, which is a weighted combination of divergence
439
+ measures from ν to an alternate bandit instance. Note that the inner minimization only depends on the divergence
440
+ measures for the best arm a⋆ and any other arm i ̸= a⋆. Furthermore, the outer minimization acts over all the other
441
+ arms i ̸= a⋆, establishing that Γ(ν, w) is the weighted divergence measure between the bandit instance ν and the
442
+ closest alternate bandit instance.
443
+ Transportation cost balancing (TCB).
444
+ Designing the arm selection rule consists of two key components. The
445
+ first component ensures that none of the arms remain under-explored. Specifically, the objective in this phase is to
446
+ ensure that we have a reasonable estimate of each arm’s mean value, such that our estimates converge to the true
447
+ mean values if the arm selection rule is allowed to collect samples without stopping. While estimating the mean
448
+ values is not the goal in BAI, our arm selection rule performs estimation as an intermediate step to form a confident
449
+ decision about the best arm. The second component of the arm selection rule is to track the optimal proportion w(ν)
450
+ of arm selections defined in (28), which ensures that we minimize the average sample complexity. For this, TaS [4]
451
+ proposes to compute the optimal sampling proportions at the current mean estimates and track the estimated sampling
452
+ proportions. However, this is computationally expensive and requires solving K equations using the bisection method
453
+ in each round. To circumvent this, we propose a simple sampling mechanism focusing on sampling from the set of
454
+ under-sampled arms at each instant. In doing so, the sampling strategy is able to converge to the optimal sampling
455
+ proportions w(ν) asymptotically. Next, we describe the sampling rule that combines these two components.
456
+ Under-explored Arms. At any time t, the sampling rule defines a set of under-explored arms as
457
+ Ut ≜
458
+
459
+ i ∈ [K] : Tt(i) ≤
460
+ ����
461
+ t/K
462
+ ��
463
+ ,
464
+ (30)
465
+ where we have defined Tt(i) ≜ �t
466
+ s=1 1{As = i} as the counter for the number of times arm i ∈ [K] is chosen up to
467
+ time t. In case the set of under-explored arms is non-empty, indicating that some of the arms are under-explored, the
468
+ arm selection strategy selects the arm that is sampled the least. Otherwise, the arm selection rule leverages the MLEs
469
+ of the arm means to compute an empirical estimate of Γ(ν, w) defined in Lemma 2. Based on this, the goal is to select
470
+ the next arm in a way that maximizes the estimate. We show in Lemma 10 (Appendix E) that this is equivalent to
471
+ sampling from the set of under-sampled arms.
472
+ Transport cost-based Estimation of Allocation.
473
+ We provide a few measures that are used to delineate the arm
474
+ selection rule. Define Pt,i as the distribution of arm i ∈ [K] when the mean takes a value equal to the MLE µt(i).
475
+ Furthermore, for any arm i ∈ [K], define the interval It,i ≜ [µt(i), µt(atop
476
+ t )], which specifies the interval for minimiza-
477
+ tion in the empirical problem complexity defined in 31 next. Based on these, we define the minimum transportation
478
+ cost [11], as the minimum weighted combination of divergence measures dU and dL defined in (9) and (10) of the top
479
+ arm atop
480
+ t
481
+ and any other arm i ̸= atop
482
+ t
483
+ as follows.
484
+ Γt(w) ≜
485
+ min
486
+ i∈[K]\{atop
487
+ t } min
488
+ x∈It,i
489
+
490
+ watop
491
+ t dU(Pt,atop
492
+ t , x) + widL(Pt,i, x)
493
+
494
+ .
495
+ (31)
496
+ 9
497
+
498
+ Γt(w) in (31) specifies the minimum cost of transporting the current estimated bandit instance νt ≜ [Pt,1, · · · , Pt,K]
499
+ to an alternate bandit instance for which the best arm is not atop
500
+ t . At any time t, let us denote the allocation obtained if
501
+ the arm i ∈ [K] is selected in the next round by wt(i) ≜ [wt,1(i), · · · , wt,K(i)], where we have defined
502
+ wt,j(i) ≜
503
+ 1
504
+ t + 1
505
+
506
+ Tt(j) + 1{j = i}
507
+
508
+ ,
509
+ ∀j ∈ [K] .
510
+ (32)
511
+ Based on the equivalent form of the problem complexity in Lemma 2, the goal of the sampling strategy is to maximize
512
+ the lowest information measure Γt(w). This ensures that we sample the under-sampled arms in each round and move
513
+ closer toward the optimal sampling proportion. To this end, let us define the arm with the lowest information measure
514
+ as
515
+ amin
516
+ t
517
+
518
+ arg min
519
+ i∈[K]\{atop
520
+ t }
521
+ min
522
+ x∈It,i
523
+ �Tt(atop
524
+ t )
525
+ t
526
+ dU(Pt,atop
527
+ t , x) + Tt(i)
528
+ t
529
+ dL(Pt,i, x)
530
+
531
+ .
532
+ (33)
533
+ In (33), amin
534
+ t
535
+ denotes the arm that minimizes the estimate of the problem complexity at time t. We note that to
536
+ increase the lowest information measure, we should select either the current best arm atop
537
+ t
538
+ or the arm with the lowest
539
+ information measure amin
540
+ t
541
+ . Based on the above definitions, the arm selection for TCB is carried out as follows.
542
+ At+1 ≜
543
+
544
+
545
+
546
+
547
+
548
+
549
+
550
+ arg min
551
+ i∈Ut
552
+ Tt(i),
553
+ if Ut ̸= ∅
554
+ amin
555
+ t
556
+ ,
557
+ if Γt(wt(amin
558
+ t
559
+ )) > Γt(wt(atop
560
+ t )) and Ut = ∅
561
+ atop
562
+ t ,
563
+ if Γt(wt(amin
564
+ t
565
+ )) < Γt(wt(atop
566
+ t )) and Ut = ∅
567
+ .
568
+ (34)
569
+ The complete procedure is presented in Algorithm 1.
570
+ Algorithm 1: Transportation cost balancing (TCB)
571
+ 1 Initialize: t = 0, Ut = [K], µt(i) = 0 ∀ i ∈ [K], Tt(i) = 0 ∀ i ∈ [K], Λ(atop
572
+ t , ach
573
+ t ) = ∞, βt(δ) = 0
574
+ 2 while Λ(atop
575
+ t , ach
576
+ t ) ≤ βt(δ) do
577
+ 3
578
+ t ← t + 1
579
+ 4
580
+ Select an arm at specified by (34) and obtain reward Xt
581
+ 5
582
+ Update µt,at and Tt(at) using (19)
583
+ 6
584
+ atop
585
+ t
586
+ ← arg max
587
+ i∈[K]
588
+ µt(i)
589
+ 7
590
+ Compute amin
591
+ t
592
+ using (33)
593
+ 8
594
+ For every i ∈ [K], compute wt(i) using (32)
595
+ 9
596
+ Compute Γt(wt(amin
597
+ t
598
+ )) and Γt(wt(atop
599
+ t )) using (31)
600
+ 10
601
+ Compute Λt(atop
602
+ t , i) for every i ∈ [K] \ {a1
603
+ t}
604
+ 11
605
+ ach
606
+ t ←
607
+ arg min
608
+ i∈[K]\{atop
609
+ t
610
+ }
611
+ Λt(atop
612
+ t , i)
613
+ 12
614
+ Update βt(δ) using (24)
615
+ 13 Output: Top arm atop
616
+ t
617
+ 10
618
+
619
+ Improved Transportation Cost Balancing (ITCB).
620
+ A recent study by [12] shows that an additional exploration
621
+ penalty based on the number of times that each arm is chosen, improves the empirical performance of top-two al-
622
+ gorithms, albeit achieving the same asymptotic optimality guarantee. Specifically, [12] proposes an additive penalty
623
+ log(Tt(i)) to the GLLRs for each arm i ∈ [K] \ {atop
624
+ t } to promote further exploration of under-explored arms. Mo-
625
+ tivated by this observation, we also devise a modified sampling rule that achieves the same optimality guarantee as
626
+ TCB, with improved empirical performance. To formalize the modified sampling rule, we begin by defining the lowest
627
+ penalized information measure as:
628
+ Φt(w) ≜
629
+ min
630
+ i∈[K]\{atop
631
+ t }
632
+
633
+ min
634
+ x∈It,i
635
+
636
+ watop
637
+ t dU(Pt,atop
638
+ t , x) + widL(Pt,i, x)
639
+
640
+ + log((t + 1)wi)
641
+ t + 1
642
+
643
+ ,
644
+ (35)
645
+ for any w ∈ ∆K. Furthermore, let us define the arm having the lowest penalized information measure as
646
+ bmin
647
+ t
648
+
649
+ arg min
650
+ i∈[K]\{atop
651
+ t }
652
+
653
+ min
654
+ x∈It,i
655
+
656
+ Tt(atop
657
+ t )
658
+ t
659
+ dU(Pt,atop
660
+ t , x) + Tt(i)
661
+ t
662
+ dL(Pt,i, x)
663
+
664
+ + log(Tt(i))
665
+ t
666
+
667
+ ,
668
+ (36)
669
+ Based on this definition, the modified sampling rule in ITCB is specified next.
670
+ At+1 ≜
671
+
672
+
673
+
674
+
675
+
676
+
677
+
678
+ arg min
679
+ i∈Ut
680
+ Tt(i),
681
+ if Ut ̸= ∅
682
+ bmin
683
+ t
684
+ ,
685
+ if Φt(wt(bmin
686
+ t
687
+ )) > Φt(wt(atop
688
+ t )) and Ut = ∅
689
+ atop
690
+ t ,
691
+ if Φt(wt(bmin
692
+ t
693
+ )) < Φt(wt(atop
694
+ t )) and Ut = ∅
695
+ .
696
+ (37)
697
+ Note that main difference in the selection rules (34) and (37) lies in the cost function Φt which has an additional
698
+ penalty compared to Γt, that promotes additional exploration. The ITCB sampling rule follows the same principle as
699
+ TCB, with the difference of a penalized cost function.
700
+ 4
701
+ Performance Guarantees
702
+ This section provides the main results pertaining to the performance of TCB and ITCB algorithms. There are two key
703
+ results that we are interested in proving. First, we want to show that the TCB and ITCB algorithms satisfy the δ−PAC
704
+ guarantee on the decision confidence. Next, we show that the average sample complexities of these algorithms match
705
+ the known information-theoretic lower bound asymptotically. To this end, we will prove a few properties of TCB and
706
+ ITCB, which will collectively establish asymptotic optimality in terms of the average sample complexity. We start by
707
+ stating the guarantee on the probability of error and characterizing βt(δ) such that the algorithms are δ−PAC.
708
+ Theorem 1 (δ−PAC). The stopping rule in (24) with the choice of the threshold
709
+ βt(δ) ≜ log t1+α(K − 1)
710
+ δ
711
+ + log
712
+
713
+ 1 + 1
714
+ α
715
+
716
+ ,
717
+ (38)
718
+ along with any arm selection strategy and the decision rule ˆAτ ≜ atop
719
+ τ
720
+ is δ−PAC for any α > 0.
721
+ Proof. See Appendix B.
722
+
723
+ Next, we state the results related to the asymptotic optimality of TCB and ITCB in terms of the average sample com-
724
+ plexity. We begin by establishing a few properties of the problem complexity that are useful for characterizing the
725
+ 11
726
+
727
+ sample complexity. Specifically, the form of the problem complexity Γ(ν) in Lemma 2 is instrumental in charac-
728
+ terizing the key properties of Γ(ν) and establishing an upper bound on the average sample complexity of TCB and
729
+ ITCB. The following lemma characterizes these properties, which include the continuity of the problem complexity in
730
+ terms of the bandit instance ν ∈ M in the metric space (M, DTV) and the characterization of an optimal allocation
731
+ of samples that maximizes the problem complexity.
732
+ Lemma 3 (Properties of Γ(ν)). The problem complexity Γ(ν) has the following properties:
733
+ 1. Functions dU(·, ·) and dL(·, ·) are strictly convex in their second arguments.
734
+ 2. Problem complexity Γ : M �→ R and the optimal allocation w : M �→ ∆K are continuous functions on the
735
+ metric space (M, DTV). Furthermore, an optimal sampling proportion is given by the unique allocation that
736
+ satisfies:
737
+ Γi(ν, w) = Γj(ν, w) ,
738
+ ∀i, j ̸= a⋆ ,
739
+ (39)
740
+ where, for any i ∈ [K] \ {a⋆}, we have defined
741
+ Γi(ν, w) ≜
742
+ inf
743
+ ¯P∈M:m(¯Pi)≥m(¯Pa⋆)
744
+
745
+ wa⋆DKL(Pa⋆∥¯Pa⋆) + wiDKL(Pi∥¯Pi)
746
+
747
+ .
748
+ (40)
749
+ Proof. See Appendix C.2.
750
+
751
+ The continuity of Γ has been previously established by [13] in the metric space (M, W1). However, the continuity
752
+ was established under the assumption that for any P ∈ P(Ω), the boundedness assumption EP[f(|X|)] < B holds
753
+ for any convex and differentiable function f. The key difference in the proof of Lemma 3 with that of [13, Lemma
754
+ 4] is that we do not impose the boundedness assumption. Rather, we leverage the properties of the Jensen-Shanon
755
+ divergence (details in Appendix C.2) to establish the continuity property of the problem complexity. Next, we state
756
+ two key properties of the TCB and ITCB arm selection strategies used for characterizing an upper bound on the average
757
+ sample complexity that coincides with the universal lower bound. First, we show that the explicit exploration phase
758
+ ensures that each arm i ∈ [K] is sampled sufficiently often, such that the MLEs of the mean values converge to the
759
+ true means. Let us define the time instant N ϵ
760
+ ν as
761
+ N ϵ
762
+ ν ≜ inf
763
+
764
+ t ∈ N : |µs(i) − µ(i)| < ϵ, ∀i ∈ [K], ∀s ≥ t
765
+
766
+ .
767
+ (41)
768
+ The stochastic time N ϵ
769
+ ν marks the convergence of the MLEs to the respective ground truths for every arm i ∈ [K]. In
770
+ the following result, we will show that the arm selection strategies ensure that N ϵ
771
+ ν has a finite average value.
772
+ Theorem 2 (Convergence in mean). Under the TCB and ITCB sampling strategies we have Eν[N ϵ
773
+ ν] < +∞.
774
+ Proof. See Appendix D.
775
+
776
+ Leveraging the continuity property of the problem complexity proved in Lemma 3, next, we establish the convergence
777
+ in the sampling proportions due to the TCB and ITCB sampling rules to that of the optimal proportions. This is a
778
+ key contribution of the paper, which helps establish the asymptotic optimality of the algorithms, compared to the
779
+ β−optimality achieved by top-two algorithms.
780
+ 12
781
+
782
+ Theorem 3 (Convergence in sampling proportions). If the TCB arm selection rule in (34) is allowed to continue
783
+ sampling without stopping, for any ϵ > 0, there exists a stochastic time instant N ϵ
784
+ w such that
785
+ ����
786
+ Tt(i)
787
+ t
788
+ − wi(ν)
789
+ ���� < ϵ ,
790
+ ∀i ∈ [K], ∀t ≥ N ϵ
791
+ w .
792
+ (42)
793
+ Furthermore, Eν[N ϵ
794
+ w] < +∞.
795
+ Proof. See Appendix E.
796
+
797
+ Theorem 4 (Convergence in sampling proportions). If the ITCB arm selection rule in (37) is allowed to continue
798
+ sampling without stopping, for any ϵ > 0, there exists a stochastic time instant N ϵ
799
+ w such that
800
+ ����
801
+ Tt(i)
802
+ t
803
+ − wi(ν)
804
+ ���� < ϵ ,
805
+ ∀i ∈ [K], ∀t ≥ N ϵ
806
+ w .
807
+ (43)
808
+ Furthermore, Eν[N ϵ
809
+ w] < +∞.
810
+ Proof. See Appendix E.
811
+
812
+ Finally, leveraging Theorems 2 and 3 (or 4), we characterize an upper-bound on the average sample complexity of the
813
+ TCB and ITCB algorithms.
814
+ Theorem 5. The TCB and ITCB algorithms, comprising the arm selection rules in (34) and (37) and the stopping rule
815
+ in (24), satisfy the following upper-bound on the average sample complexity.
816
+ lim sup
817
+ δ→0
818
+ Eν[τ]
819
+ log(1/δ) ≤ 1 + α
820
+ Γ(ν) ,
821
+ (44)
822
+ for any α > 0.
823
+ Proof. See Appendix F.
824
+
825
+ The upper bound in Theorem 5 matches the information-theoretic lower bound on the average sample complexity
826
+ provided by [4] up to any α > 0. This establishes the asymptotic optimality of the TCB and ITCB algorithms.
827
+ 5
828
+ Numerical Experiments
829
+ Convergence in allocation.
830
+ First, we empirically establish the convergence of the TCB and ITCB sampling rules on
831
+ several Gaussian and Bernoulli bandit instances. These bandit instances are summarized in Table 1. More specifically,
832
+ we have chosen (ν1, ν3) from [4] and (ν2, ν4, ν6) from [10]. We have also included ν5 as a setting with identical
833
+ arm means. We plot the maximum deviation from the optimal allocation maxi∈[K] |Tt(i)/t − wi(ν)| over time in
834
+ Figure 2 for TCB and Figure 3 for ITCB. Both these figures confirm the convergence in allocation for the TCB and
835
+ ITCB selection rules to the optimal allocation.
836
+ 13
837
+
838
+ Distribution
839
+ ν
840
+ w(ν)
841
+ Bernoulli
842
+ ν1 = [0.3, 0.21, 0.2, 0.19, 0.18]
843
+ [0.3359, 0.2515, 0.1766, 0.1324, 0.1036]
844
+ Bernoulli
845
+ ν2 = [0.5, 0.4, 0.3, 0.2, 0.1]
846
+ [0.4514, 0.4483, 0.0628, 0.0248, 0.0127]
847
+ Bernoulli
848
+ ν3 = [0.5, 0.45, 0.43, 0.4]
849
+ [0.4188, 0.3882, 0.1360, 0.0569]
850
+ Gaussian
851
+ ν4 = [0.5, 0.25, 0, −0.25, −0.5]
852
+ [0.4513, 0.4441, 0.0639, 0.0263, 0.0144]
853
+ Gaussian
854
+ ν5 = [1.2, 1, 1, 1, 1]
855
+ [0.3337, 0.1666, 0.1666, 0.1666, 0.1666]
856
+ Gaussian
857
+ ν6 = [−1.9, −0.6, −0.5, −0.4, −0.3,
858
+ −0.1, −0., 0.1, 0.4, 1.8]
859
+ [0.2814, 0.1986, 0.1097, 0.0939, 0.0815,
860
+ 0.0634, 0.0566, 0.0509, 0.0461, 0.0177]
861
+ Table 1
862
+ 100
863
+ 200
864
+ 300
865
+ 400
866
+ 500
867
+ 600
868
+ 700
869
+ 0
870
+ 0.05
871
+ 0.1
872
+ 0.15
873
+ 0.2
874
+ Figure 2: Convergence in allocation for TCB
875
+ 100
876
+ 200
877
+ 300
878
+ 400
879
+ 500
880
+ 600
881
+ 700
882
+ 0
883
+ 0.05
884
+ 0.1
885
+ 0.15
886
+ 0.2
887
+ 0.25
888
+ Figure 3: Convergence in allocation for ITCB
889
+ Comparison to the state of the art.
890
+ We compare the TCB and ITCB algorithms against the existing strategies for
891
+ BAI. Specifically, we perform our experiments based on two common reward distributions, Bernoulli bandits and
892
+ Gaussian bandits. All the experiments are averaged over 2000 independent Monte Carlo trials. For the experiments,
893
+ we compare the TCB and ITCB arm selection rules with four state-of-the-art top-two algorithms for BAI: T3C [11],
894
+ TT-SPRT [7], TS-TCI [12] and EB-TCI [12]. TT-SPRT and EB-TCI use the empirical best arm as the leader. TT-
895
+ SPRT uses the arm with the closest GLLR statistic to the empirical best arm as the challenger, and EB-TCI includes
896
+ an additional exploration penalty to the GLLR statistic to determine the challenger. Distinct from TT-SPRT and EB-
897
+ TCI, T3C and TS-TCI use Thompson sampling from the posterior distribution to identify the leader. T3C selects the
898
+ challenger to be the arm having the closest GLLR statistic to the leader, while TS-TCI uses a penalized GLLR statistic
899
+ to promote exploration.
900
+ Bernoulli bandit.
901
+ For this experiment, we use a Bernoulli bandit with mean values [0.8, 0.5, 0.3, 0.29, 0.06], and set
902
+ δ ≜ 10−8. Figure 4 shows the performance of the TCB and ITCB arm selection rules compared to the state-of-the-art.
903
+ We observe that the TCB and ITCB arm selection strategies in (34) and (37) are agnostic to the tuning parameter β.
904
+ Furthermore, the ITCB outperforms all other strategies for the bandit instance for most values of β. Specifically, the
905
+ 14
906
+
907
+ 0.1
908
+ 0.2
909
+ 0.3
910
+ 0.4
911
+ 0.5
912
+ 0.6
913
+ 0.7
914
+ 0.8
915
+ 0.9
916
+ 200
917
+ 400
918
+ 600
919
+ 800
920
+ 1000
921
+ 1200
922
+ 1400
923
+ TCB
924
+ EB-TCI
925
+ T3C
926
+ ITCB
927
+ TS-TCI
928
+ TT-SPRT
929
+ Figure 4: Bernoulli, δ = 10−8
930
+ performance of ITCB matches that of TS-TCI and EB-TCI at β ≈ 0.4.
931
+ Gaussian bandit.
932
+ For the next experiment, we take a Gaussian bandit instance with mean values given by [1.2, 1, 1, 1, 1]
933
+ and variance σ = 1. Figure 5 compares the TCB and ITCB algorithms against state-of-the-art BAI algorithms for var-
934
+ ious values of the tuning parameter β. We set δ ≜ 10−8 for this experiment. We observe that the ITCB algorithm
935
+ outperforms other algorithms in most regimes of β, and the performances of TS-TCI and EB-TCI match that of ITCB
936
+ in the range 0.3 ≤ β ≤ 0.4.
937
+ 6
938
+ Conclusions
939
+ We have investigated the problem of fixed-confidence best-arm identification (BAI) in stochastic multi-arm bandits
940
+ (MABs). The bandit instance is assumed to be drawn from the family of distributions parameterized by their mean
941
+ value. We have designed the transport cost balancing (TCB) algorithm, in which the key decision is finding the optimal
942
+ allocation of the sampling resources among different arms. This extends the existing strategies that aim to allocate
943
+ a β fraction of the resources to the best arm and achieve β−optimality with β remaining a tuning parameter. In the
944
+ proposed TCB algorithm, the optimal value of β is also estimated, rendering the algorithm independent of β. In
945
+ TCB, instead of reserving a β fraction of samples for the best arm, we have devised a mechanism for tracking the
946
+ optimal sampling proportion by sampling the under-sampled arms at each instant. As a result, we have established
947
+ that the proposed TCB algorithm is asymptotically optimal. We have also extended the TCB algorithm by including
948
+ an additional exploration penalty based on the number of times each arm is chosen. This algorithm, referred to as
949
+ improved TCB (ITCB), is also shown to achieve asymptotic optimality and improved empirical performance compared
950
+ to TCB.
951
+ 15
952
+
953
+ 0.1
954
+ 0.2
955
+ 0.3
956
+ 0.4
957
+ 0.5
958
+ 0.6
959
+ 0.7
960
+ 0.8
961
+ 0.9
962
+ 0.5
963
+ 1
964
+ 1.5
965
+ 2
966
+ 2.5
967
+ 3
968
+ 3.5
969
+ 104
970
+ TCB
971
+ EB-TCI
972
+ T3C
973
+ ITCB
974
+ TS-TCI
975
+ TT-SPRT
976
+ Figure 5: Gaussian, δ = 10−8
977
+ A
978
+ Proof of Lemma 1
979
+ Under each hypothesis Hi, for i ∈ [K], we solve the following optimization problem:
980
+ Pi
981
+ t(µ) ≜
982
+
983
+
984
+
985
+
986
+
987
+
988
+
989
+ max
990
+ µ∈RK
991
+ K
992
+
993
+ i=1
994
+
995
+ s∈[t]:As=i
996
+ log πi(Xs | µi)
997
+ s.t.
998
+ µi ≥ max
999
+ j̸=i µj
1000
+ .
1001
+ (45)
1002
+ Let us define the augmented Lagrangian corresponding to the optimization problem in (45) as
1003
+ Li
1004
+ t(µ, u) ≜
1005
+
1006
+ i∈[K]
1007
+
1008
+ s∈[t]:As=i
1009
+ log πi(Xs | µi) +
1010
+
1011
+ j̸=i
1012
+ uj [µj − µi] .
1013
+ (46)
1014
+ Furthermore, denote the first derivative of the likelihood function by π′
1015
+ i(x | µi) ≜ ∂πi(x | µi)
1016
+ ∂µi
1017
+ . Using the Karush Kuhn
1018
+ Tucker (KKT) first order necessary conditions, any solution to (45) for all i ∈ [K]
1019
+ ∂Li
1020
+ t(µ, u)
1021
+ ∂µi
1022
+ =
1023
+
1024
+ s∈[t]:As=i
1025
+ π′
1026
+ i(Xs | µi)
1027
+ πi(X | µi) −
1028
+
1029
+ j̸=i
1030
+ uj = 0 ,
1031
+ (47)
1032
+ and for all j ̸= i
1033
+ ∂Li
1034
+ t(µ, u)
1035
+ ∂µj
1036
+ =
1037
+
1038
+ s∈[t]:As=j
1039
+ π′
1040
+ j(Xs | µj)
1041
+ πj(Xs | µj) + uj = 0 ,
1042
+ (48)
1043
+ uj (µj − µi) = 0 ,
1044
+ (49)
1045
+ uj ≥ 0 .
1046
+ (50)
1047
+ 16
1048
+
1049
+ Let us denote an optimal solution to (45) by ρt(i) ≜ [ρt,1(i), · · · , ρt,K(i)]. It can be readily verified that a solution to
1050
+ (47)-(50) is given by ρt(i) such that for every j ∈ [K],
1051
+ ρt,j(i) ≜
1052
+
1053
+ µt(j) ,
1054
+ if j ∈ ¯Rt(i)
1055
+ ˜µt(i) ,
1056
+ otherwise
1057
+ ,
1058
+ (51)
1059
+ where ¯Rt(i) ≜ [K] \ Rt(i), and we have defined ˜µt(i) as a solution to:
1060
+
1061
+ ∂µ
1062
+
1063
+ � �
1064
+ j∈Rt(i)
1065
+
1066
+ s∈[t]:As=j
1067
+ log πj(Xs | µ)
1068
+
1069
+ � = 0 .
1070
+ (52)
1071
+ Lemma 1 can be readily obtained by plugging the maximizers of the mean values ρt(i) under any hypothesis i ∈ [K]
1072
+ into the GLLR defined in (17).
1073
+ B
1074
+ Proof of Theorem 1
1075
+ The probability of an incorrect decision can be bounded as follows.
1076
+ Pν (τ < +∞, ˆaτ ̸= a⋆) = Pν
1077
+
1078
+ ∃t ∈ N : µt(atop
1079
+ t ) > µt(a⋆), Λt(atop
1080
+ t , ach
1081
+ t ) > βt(δ)
1082
+
1083
+ (53)
1084
+ ≤ Pν
1085
+
1086
+ ∃t ∈ N, i ̸= a⋆ : µt(i) ≥ max
1087
+ j̸=i µt(j), Λt(i, a⋆) > βt(δ)
1088
+
1089
+ (54)
1090
+
1091
+
1092
+ t∈N
1093
+
1094
+ i∈[K]\{a⋆}
1095
+
1096
+
1097
+ Λt(i, a⋆) > βt(δ)
1098
+
1099
+ (55)
1100
+ =
1101
+
1102
+ t∈N
1103
+
1104
+ i∈[K]\{a⋆}
1105
+
1106
+
1107
+
1108
+
1109
+ a∈Rt(a⋆)
1110
+
1111
+ X∈X a
1112
+ t
1113
+ log πa(X | µt(a))
1114
+ πa(X | ˜µt(a⋆)) ≥ βt(δ)
1115
+
1116
+
1117
+ (56)
1118
+
1119
+
1120
+ t∈N
1121
+
1122
+ i∈[K]\{a⋆}
1123
+
1124
+
1125
+
1126
+
1127
+
1128
+
1129
+
1130
+
1131
+
1132
+
1133
+ a∈[K]
1134
+
1135
+ X∈X a
1136
+ t
1137
+ log πa(X | µt(a))
1138
+ πa(X | µ(a))
1139
+
1140
+ ��
1141
+
1142
+ ≜Λ0
1143
+ t (µt∥µ)
1144
+ ≥ βt(δ)
1145
+
1146
+
1147
+
1148
+
1149
+
1150
+
1151
+
1152
+
1153
+ ,
1154
+ (57)
1155
+ where (55) follows from union bound and (57) follows from the fact that ˜µt(a⋆) is the maximizer of the likelihood
1156
+ function under the hypothesis Ha⋆, and µ(a⋆) > maxi̸=a⋆ µ(i) by definition. Let us denote the measure induced by
1157
+ the interaction of the BAI algorithm with the bandit instance parameterized by the current ML estimate µt by Pt. We
1158
+ have
1159
+ Pν (τ < +∞, ˆaτ ̸= a⋆)
1160
+ (57)
1161
+
1162
+
1163
+ t∈N
1164
+
1165
+ i∈[K]\{a⋆}
1166
+
1167
+
1168
+ 1{Λ0
1169
+ t(µt∥µ) ≥ βt(δ)}
1170
+
1171
+ (58)
1172
+ =
1173
+
1174
+ t∈N
1175
+
1176
+ i∈[K]\{a⋆}
1177
+
1178
+ (Λ0
1179
+ t (µt∥µ)≥βt(δ))
1180
+ dPν(Xt)
1181
+ (59)
1182
+ =
1183
+
1184
+ t∈N
1185
+
1186
+ i∈[K]\{a⋆}
1187
+
1188
+ (Λ0
1189
+ t (µt∥µ)≥βt(δ))
1190
+ dPν(Xt)
1191
+ dPt(Xt) dPt(Xt)
1192
+ (60)
1193
+ =
1194
+
1195
+ t∈N
1196
+
1197
+ i∈[K]\{a⋆}
1198
+
1199
+ (Λ0
1200
+ t (µt∥µ)≥βt(δ))
1201
+ exp
1202
+
1203
+ −Λ0
1204
+ t(µt∥µ)
1205
+
1206
+ dPt(Xt)
1207
+ (61)
1208
+ 17
1209
+
1210
+
1211
+
1212
+ t∈N
1213
+
1214
+ i∈[K]\{a⋆}
1215
+ e−βt(δ)Pt
1216
+
1217
+ Λ0
1218
+ t(µt∥µ) ≥ βt(δ)
1219
+
1220
+ (62)
1221
+ ≤ (K − 1)
1222
+
1223
+ t∈N
1224
+ e−βt(δ) ,
1225
+ (63)
1226
+ where (61) is obtained from the fact that Λ0
1227
+ t(µt∥µ) = log dPt(Xt)
1228
+ dPν(Xt), and (63) follows from the fact that Pt(Λ0
1229
+ t(µt∥µ)) ≤ 1.
1230
+ Finally, by choosing
1231
+ βt(δ) ≜ log C(K − 1)t1+α
1232
+ δ
1233
+ ,
1234
+ (64)
1235
+ and setting C ≜ 1 + α−1, we obtain
1236
+ P (τ < +∞, ˆaτ ̸= a⋆) ≤ δ .
1237
+ (65)
1238
+ C
1239
+ Problem Complexity
1240
+ C.1
1241
+ Proof of Lemma 2
1242
+ Recall that corresponding to a bandit instance ν ∈ M with the best arm a⋆, the set of alternate bandit instances is
1243
+ defined as
1244
+ alt(a⋆) ≜
1245
+
1246
+ ¯ν ∈ M : m(¯Pa⋆) ≤ max
1247
+ i̸=a⋆ m(¯Pi)
1248
+
1249
+ .
1250
+ (66)
1251
+ It can be readily verified that the set of alternate bandit instances can be equivalently stated as
1252
+ alt(a⋆) =
1253
+
1254
+ i̸=a⋆
1255
+
1256
+ ¯ν ∈ M : m(¯Pi) ≥ m(¯Pa⋆)
1257
+
1258
+ .
1259
+ (67)
1260
+ Using (67), the problem complexity can be simplified as follows:
1261
+ Γ(ν) = sup
1262
+ w∈∆K
1263
+ inf
1264
+ ¯ν∈alt(a⋆)
1265
+
1266
+ i∈[K]
1267
+ wiDKL(Pi∥¯Pi)
1268
+ (68)
1269
+ = sup
1270
+ w∈∆K min
1271
+ i̸=a⋆
1272
+ inf
1273
+ ¯ν∈M:m(¯Pi)≥m(¯Pa⋆)
1274
+
1275
+ wa⋆DKL(Pa⋆∥¯Pa⋆) + wiDKL(Pi∥¯Pi)
1276
+
1277
+ .
1278
+ (69)
1279
+ Let us define
1280
+ Γi(ν, w) ≜
1281
+ inf
1282
+ ¯ν∈M:m(¯Pi)≥m(¯Pa⋆)
1283
+
1284
+ wa⋆DKL(Pa⋆∥¯Pa⋆) + wiDKL(Pi∥¯Pi)
1285
+
1286
+ .
1287
+ (70)
1288
+ It can be readily verified that
1289
+ Γ(ν, w) ≜ min
1290
+ i̸=a⋆ Γi(ν, w) .
1291
+ (71)
1292
+ Note that Γi(ν, w) can be further simplified as:
1293
+ Γi(ν, w) = inf
1294
+ x∈R
1295
+
1296
+ wa⋆
1297
+ inf
1298
+ ¯P∈P(Ω):m(¯P)≤x DKL(Pa⋆∥¯P) + wi
1299
+ inf
1300
+ ¯P∈P(Ω):m(¯P)≥x DKL(Pi∥¯P)
1301
+
1302
+ (72)
1303
+ = inf
1304
+ x∈R
1305
+
1306
+ wa⋆dU(Pa⋆, x) + widL(Pi, x)
1307
+
1308
+ .
1309
+ (73)
1310
+ 18
1311
+
1312
+ Note that dU is non-increasing in x and dL is non-decreasing in x. Thus, when x < µ(i), we have dU(Pa⋆, x) >
1313
+ dU(Pa⋆, µ(i)), and dL(Pi, x) > dL(Pi, µ(i)). This implies that the optimizer x⋆
1314
+ i of (73) should satisfy x⋆
1315
+ i ≥ µ(i).
1316
+ Using a similar argument, we can show that x⋆
1317
+ i ≤ µ(a⋆). Hence, (73) can be rewritten as:
1318
+ Γi(ν, w) =
1319
+ inf
1320
+ x∈[µ(i),µ(a⋆)]
1321
+
1322
+ wa⋆dU(Pa⋆, x) + widL(Pi, x)
1323
+
1324
+ .
1325
+ (74)
1326
+ Finally, the problem complexity can be equivalently expressed as:
1327
+ Γ(ν) = sup
1328
+ w∈∆K min
1329
+ i̸=a⋆
1330
+ inf
1331
+ x∈[µ(i),µ(a⋆)]
1332
+
1333
+ wa⋆dU(Pa⋆, x) + widL(Pi, x)
1334
+
1335
+ .
1336
+ (75)
1337
+ C.2
1338
+ Proof of Lemma 3
1339
+ 1. First, we will prove that dU and dL are strictly convex in x. For any x ∈ R and y ∈ R, and for any λ ∈ [0, 1], let
1340
+ us define
1341
+ z ≜ λx + (1 − λ)y .
1342
+ (76)
1343
+ Furthermore, define
1344
+ ηx ≜
1345
+ arg inf
1346
+ η∈P(Ω):m(η)≤x
1347
+ DKL(Pa⋆∥η) ,
1348
+ ηy ≜
1349
+ arg inf
1350
+ η∈P(Ω):m(η)≤y
1351
+ DKL(Pa⋆∥η) ,
1352
+ and
1353
+ ηz ≜
1354
+ arg inf
1355
+ η∈P(Ω):m(η)≤z
1356
+ DKL(Pa⋆∥η) .
1357
+ (77)
1358
+ Furthermore, define κz ≜ ληx + (1 − λ)ηy. Note that
1359
+ m(κz) = λm(ηx) + (1 − λ)m(ηy)
1360
+ (78)
1361
+ ≤ λx + (1 − λ)y
1362
+ (79)
1363
+ (76)
1364
+ = z .
1365
+ (80)
1366
+ Now,
1367
+ dU(Pa⋆, z) = DKL(Pa⋆∥ηz)
1368
+ (81)
1369
+ ≤ DKL(Pa⋆∥κz)
1370
+ (82)
1371
+ < λDKL(Pa⋆∥ηx) + (1 − λ)DKL(Pa⋆∥ηy)
1372
+ (83)
1373
+ = λdU(Pa⋆, x) + (1 − λ)dL(Pa⋆, y) ,
1374
+ (84)
1375
+ where (82) is a result of (80), and (83) is a result of the strict convexity of KL divergence in both arguments.
1376
+ Thus, dU is strictly convex in x. Using a similar argument, we can prove that dL is also strictly convex in x.
1377
+ Thus, gi : M × R �→ R, defined as
1378
+ gi(ν, x) ≜ wa⋆dU(Pa⋆, x) + widL(Pi, x) ,
1379
+ (85)
1380
+ is strictly convex in its second argument. Thus, gi has a unique minimum in [µ(i), µ(a⋆)].
1381
+ 19
1382
+
1383
+ 2. For establishing the continuity of Γ : M �→ R and w : M �→ ∆K, we will leverage the following two lemmas,
1384
+ which provide the sufficient conditions for continuity.
1385
+ Lemma 4 (Berge’s maximum theorem [18]). Suppose g is a continuous function on S × Θ and D : Θ �→ S is
1386
+ a compact-valued continuous correspondence on Θ. Let
1387
+ g⋆(θ) ≜ max
1388
+ x∈D(θ) g(x, θ)
1389
+ and
1390
+ D⋆(θ) ≜ arg max
1391
+ x∈D(θ)
1392
+ g(x, θ) .
1393
+ (86)
1394
+ Then, g⋆ is a continuous function on Θ, and D⋆ is a compact-valued upper hemicontinuous correspondence on
1395
+ Θ.
1396
+ Lemma 5 ( [19]). Let us denote the generalized Jensen-Shannon (JS) divergence between two measures P1 and
1397
+ P2 with weight α ∈ (0, 1) by
1398
+ JSα(P1∥P2) ≜ αDKL(P1∥¯Pα) + (1 − α)DKL(P2∥¯Pα) ,
1399
+ (87)
1400
+ where we have defined
1401
+ ¯Pα ≜ αP1 + (1 − α)P2 .
1402
+ (88)
1403
+ Then, JSα is upper-bounded as
1404
+ JSα(P1∥P2) ≤ 1 .
1405
+ (89)
1406
+ Now, we show that Γ(ν) and w(ν) is continuous in ν. For this, let us define the correspondence D : M �→ ∆K
1407
+ such that for any ν ∈ M, D(ν) ≜ ∆K. Clearly, for any ν ∈ M, D(ν) is a compact set, and hence D is a
1408
+ compact-valued constant correspondence. Finally, we need to show that for each i ∈ [K] \ {a⋆}, Γi(ν, w) is
1409
+ continuous in ν and w, where we have defined Γi(ν, w) in (74). First, note that Γi is lower semicontinuous in ν
1410
+ due to the lower semicontinuity of KL divergence in both arguments [20]. Next, we will leverage [21, Theorem
1411
+ 5.43], which provides a sufficient condition for the global continuity of convex functions.
1412
+ Lemma 6 ( [21]). For a convex function f : X �→ R on an open convex subset of a topological vector space,
1413
+ the following statements are equivalent.
1414
+ (a) f is bounded above on a neighborhood of some point in X.
1415
+ (b) f is upper semicontinuous on X.
1416
+ Note that Γi is convex in its first argument, since KL divergence is a convex function. Let us denote the interior
1417
+ of the set of distributions M by int(M). For any η ∈ int(M), there exists a neighborhood Nr(η) ⊂ int(M),
1418
+ where we have defined
1419
+ Nr(η) ≜
1420
+
1421
+ λ ∈ int(M) : DTV(η∥λ) < r
1422
+
1423
+ .
1424
+ (90)
1425
+ Furthermore, for any ν ∈ Nr(η) and w ∈ ∆K, let us define the distribution
1426
+ κa⋆,i ≜ wa⋆Pa⋆ + wiPi
1427
+ wa⋆ + wi
1428
+ .
1429
+ (91)
1430
+ 20
1431
+
1432
+ Expanding Γi, we obtain
1433
+ Γi(ν, w) =
1434
+ inf
1435
+ ¯ν∈M:m(¯Pa⋆)≤m(¯Pi)
1436
+
1437
+ wa⋆DKL(Pa⋆∥¯Pa⋆) + wiDKL(Pi∥¯Pi)
1438
+
1439
+ (92)
1440
+ ≤ wa⋆DKL(Pa⋆∥κa⋆,i) + wiDKL(Pi∥κa⋆,i)
1441
+ (93)
1442
+ = (wa⋆ + wi)
1443
+
1444
+ wa⋆
1445
+ wa⋆ + wi
1446
+ DKL(Pa⋆∥κa⋆,i) +
1447
+ wi
1448
+ wa⋆ + wi
1449
+ DKL(Pi∥κa⋆,i)
1450
+
1451
+ (94)
1452
+ = (wa⋆ + wi)JS
1453
+ wa⋆
1454
+ wa⋆ +wi (Pa⋆∥Pi)
1455
+ (95)
1456
+ ≤ 1 ,
1457
+ (96)
1458
+ where (96) is a result of Lemma 5. Thus, leveraging Lemma 6, we obtain that Γi(ν, w) is upper semicontinuous
1459
+ in ν, which proves that Γi(ν, w) is continuous in its first argument in M. Furthermore, Γi(ν, w) is linear in
1460
+ the second argument, and hence, it is continuous. This shows that Γi and the correspondence D satisfies the
1461
+ conditions in Lemma 4, and we obtain that Γi(ν, w) is continuous in ν and w is upper hemicontinuous in ν.
1462
+ Finally, following the same line of arguments as [10, Proposition 7], we can show that for a given ν ∈ M, w is
1463
+ the unique allocation satisfying
1464
+ Γi(ν, w) = Γj(ν, w) ,
1465
+ for all
1466
+ i, j ̸= a⋆ .
1467
+ (97)
1468
+ This shows that w is continuous in ν.
1469
+ D
1470
+ Proof of Theorem 2
1471
+ Recall the definition of the stochastic time N ϵ
1472
+ ν, defined as
1473
+ N ϵ
1474
+ ν ≜ inf
1475
+
1476
+ t ∈ N : |µs(i) − µ(i)| < ϵ, ∀i ∈ [K], ∀s ≥ t
1477
+
1478
+ .
1479
+ (98)
1480
+ In order to show that Eν[N ϵ
1481
+ ν] < +∞, we leverage a concentration inequality for ML estimators, which hold under the
1482
+ assumptions provided in Section 2.
1483
+ Lemma 7 ( [22]). Consider a sequence of i.i.d. random variables {Xi : i ∈ [t]} with mean µ and distributed
1484
+ according to P. Let us denote the MLE of µ up to time t by µt. Under the Assumptions 1 − 7 in Section 2, for any
1485
+ ε ∈ R+ we have
1486
+ P (|µt − µ| > ε) ≤ 2 exp
1487
+
1488
+
1489
+ tε2
1490
+ 2cc′σ2
1491
+
1492
+ .
1493
+ (99)
1494
+ Next, we show that as an artifact of our explicit exploration phase, we ensure the convergence of the ML estimates of
1495
+ each arm to their corresponding true values. Note that for any t ∈ N, the explicit exploration phase ensures that for
1496
+ every i ∈ [K], Tt(i) ≥
1497
+
1498
+ t/K − 1, which can be shown following the same steps as [7, Theorem 4]. Thus, for any
1499
+ t ∈ N, we have:
1500
+ Pν(N ϵ
1501
+ ν > t) =
1502
+
1503
+
1504
+ s=t+1
1505
+ Pν(N ϵ
1506
+ ν = s)
1507
+ (100)
1508
+ 21
1509
+
1510
+ =
1511
+
1512
+
1513
+ s=t
1514
+
1515
+
1516
+ ∃i ∈ [K] : |µs(i) − µ(i)| > ϵ, and ∀u > s, ∀i ∈ [K] : |µu(i) − µ(i)| ≤ ϵ
1517
+
1518
+ (101)
1519
+
1520
+
1521
+
1522
+ s=t
1523
+
1524
+
1525
+ ∃i ∈ [K] : |µs(i) − µ(i)| > ϵ
1526
+
1527
+ (102)
1528
+
1529
+
1530
+ i∈[K]
1531
+
1532
+
1533
+ s=t
1534
+
1535
+
1536
+ |µs(i) − µ(i)| > ϵ
1537
+
1538
+ (103)
1539
+ =
1540
+
1541
+ i∈[K]
1542
+
1543
+
1544
+ s=t
1545
+
1546
+
1547
+ |µs(i) − µ(i)| > ϵ, Ts(i) >
1548
+ � s
1549
+ K − 1
1550
+
1551
+ +
1552
+
1553
+ i∈[K]
1554
+
1555
+
1556
+ s=t
1557
+
1558
+
1559
+ |µs(i) − µ(i)| > ϵ, Ts(i) ≤
1560
+ � s
1561
+ K − 1
1562
+
1563
+
1564
+ ��
1565
+
1566
+ =0
1567
+ (104)
1568
+ =
1569
+
1570
+ i∈[K]
1571
+
1572
+
1573
+ s=t
1574
+
1575
+
1576
+ ℓ=√
1577
+ s/K−1
1578
+
1579
+
1580
+ |µs(i) − µ(i)| > ϵ, Ts(i) = ℓ
1581
+
1582
+ (105)
1583
+ ≤ 2
1584
+
1585
+ i∈[K]
1586
+
1587
+
1588
+ s=t
1589
+
1590
+
1591
+ ℓ=√
1592
+ s/K−1
1593
+ exp
1594
+
1595
+
1596
+ ℓϵ2
1597
+ 2cc′σ2
1598
+
1599
+ (106)
1600
+ ≤ 2
1601
+
1602
+ i∈[K]
1603
+
1604
+
1605
+ s=t
1606
+ � ∞
1607
+
1608
+ s/K−2
1609
+ exp
1610
+
1611
+ − xϵ2
1612
+ 2cc′σ2
1613
+
1614
+ dx
1615
+ (107)
1616
+ = 2
1617
+
1618
+ i∈[K]
1619
+
1620
+
1621
+ s=t
1622
+ exp
1623
+
1624
+
1625
+ ϵ2
1626
+ 2cc′σ2 (
1627
+
1628
+ s/K − 2)
1629
+
1630
+ (108)
1631
+ ≤ 2K exp
1632
+ � ϵ2
1633
+ cc′σ2
1634
+ � � ∞
1635
+ t−1
1636
+ exp
1637
+
1638
+
1639
+ ϵ2
1640
+ 2cc′σ2
1641
+ � u
1642
+ K
1643
+
1644
+ du
1645
+ (109)
1646
+ = 8Kcc′σ2
1647
+ ϵ2
1648
+ exp
1649
+ � ϵ2
1650
+ cc′σ2
1651
+
1652
+ · exp
1653
+
1654
+ − ϵ2
1655
+ cc′σ2
1656
+
1657
+ t − 1
1658
+ K
1659
+
1660
+
1661
+ ��
1662
+
1663
+ ≜Bt
1664
+ ,
1665
+ (110)
1666
+ where (106) is obtained from Lemma 7. Finally, we have
1667
+ Eν[N ϵ
1668
+ ν] =
1669
+
1670
+ t∈N
1671
+ Pν(N ϵ
1672
+ ν > t)
1673
+ (111)
1674
+
1675
+
1676
+ t∈N
1677
+ Bt
1678
+ (112)
1679
+ < 16(Kcc′σ2)2
1680
+ ϵ4
1681
+ exp
1682
+ � ϵ2
1683
+ cc′σ2
1684
+
1685
+ (113)
1686
+ < +∞ .
1687
+ (114)
1688
+ E
1689
+ Proof of Theorems 3 and 4
1690
+ Let us define the set of over-sampled arms as:
1691
+
1692
+ t ≜
1693
+
1694
+ i ∈ [K] : Tt(i)
1695
+ t
1696
+ > wi(ν) + ϵ
1697
+
1698
+ .
1699
+ (115)
1700
+ 22
1701
+
1702
+ Furthermore, we define the set of under-sampled arms as:
1703
+
1704
+ t ≜
1705
+
1706
+ i ∈ [K] : Tt(i)
1707
+ t
1708
+ < wi(ν) + ϵ
1709
+ 2
1710
+
1711
+ .
1712
+ (116)
1713
+ The convergence in allocation for the proposed algorithm is shown in two key steps. First, we prove that if any
1714
+ sampling strategy always samples from the set of under-sampled arms, then the sampling strategy converges to the
1715
+ optimal allocation w(ν). This step is common in the proof for both Theorem 3 and Theorem 4. In the next step, we
1716
+ show that the proposed sampling strategies always sample from the set of under-sampled arms. We show the first step
1717
+ through Lemma 8 and Lemma 9, which we provide next. Essentially, Lemma 8 shows that if the sampling strategy
1718
+ always samples from the set of under-sampled arms, then, after some time, the set of over-sampled arms becomes
1719
+ empty. Lemma 9 then shows that when the set of over-sampled arms is empty, eventually the allocation for each
1720
+ arm converges to the optimal allocation. The key distinction in the proofs of Theorem 3 and Theorem 4 arises in
1721
+ the next step. In Lemma 10, we show that the TCB arm selection rule stated in (34) always samples from the set of
1722
+ under-sampled arms. In Lemma 11, we show that the ITCB arm selection rule provided in (37) always samples from
1723
+ the set of under-sampled arms. Before stating Lemma 8, let us define the sampling proportion γt ≜ [γt,1, · · · , γt,K]
1724
+ computed at the current MLE µt as
1725
+ γt ≜ arg sup
1726
+ w∈∆K
1727
+ inf
1728
+ ¯ν∈alt(a⋆)
1729
+
1730
+ i∈[K]
1731
+ wiDKL(Pt,i∥¯Pi) .
1732
+ (117)
1733
+ Lemma 8. There exists a stochastic time N ϵ ∈ N such that for all t > N ϵ, Oϵ
1734
+ t = ∅, and E[N ϵ] < +∞, if the
1735
+ sampling strategy satisfies
1736
+ 1
1737
+ t+1Tt(at+1) < γt,at+1 + ζ for any ζ ∈ [0, ϵ
1738
+ 4] and for any t > M, where M is a stochastic
1739
+ time satisfying Eν[M] < +∞.
1740
+ Proof. Let us define the time instant M ϵ
1741
+ 1 such that for all t > M ϵ
1742
+ 1 and for al i ∈ [K], |γt,i −wi(ν)| < ϵ/8. Leveraging
1743
+ the continuity of Γ in Lemma 3 and the convergence of the MLE in Theorem 2, we obtain that E[M ϵ
1744
+ 1] < +∞.
1745
+ Furthermore, define M ϵ
1746
+ 2 ≜ ⌈(8/ϵ) − 1⌉, and M ϵ ≜ max{M, M ϵ
1747
+ 1, M ϵ
1748
+ 2}. We have the following two cases:
1749
+ 1. Oϵ
1750
+ M ϵ = ∅: In this case, we will use induction on t to show that for all t > M ϵ, Oϵ
1751
+ t = ∅. First, by our assumption,
1752
+ for t = M ϵ, Oϵ
1753
+ M ϵ = ∅. Next, assume the inductive hypothesis that for some t > M ϵ, Oϵ
1754
+ t = ∅. Then,
1755
+ Tt+1(at+1)
1756
+ t + 1
1757
+ = Tt(at+1) + 1
1758
+ t + 1
1759
+ (118)
1760
+ < γt,at+1 +
1761
+ 1
1762
+ t + 1 + ζ
1763
+ (119)
1764
+ ≤ wat+1(ν) + ϵ
1765
+ 8 +
1766
+ 1
1767
+ t + 1 + ζ
1768
+ (120)
1769
+ ≤ wat+1(ν) + ϵ
1770
+ 2 ,
1771
+ (121)
1772
+ where (119) holds since the sampling strategy satisfies
1773
+ 1
1774
+ t+1Tt(at+1) < γt,at+1 + ζ, and (121) is obtained using
1775
+ the definition of Mϵ. Hence, Oϵ
1776
+ t+1 = ∅ and it concludes the proof.
1777
+ 2. |Oϵ
1778
+ M ϵ| ≥ 1: In this case, following the same steps as (119)-(121), we can show that for all t > M ϵ, any i ∈ Pϵ
1779
+ t
1780
+ is not included in Oϵ
1781
+ t. Furthermore, for any t > M ϵ and for any j ∈ Oϵ
1782
+ t, let us define Lϵ
1783
+ j as the time that j
1784
+ leaves Oϵ
1785
+ t, i.e., for all t ∈ {M ϵ, · · · , Lϵ
1786
+ j − 1}, j ∈ Oϵ
1787
+ t. Next, defining Lϵ ≜ maxj∈[K] Lϵ
1788
+ j, for all t > Lϵ, we
1789
+ obtain that |Oϵ
1790
+ t| = 0. Finally, defining N ϵ ≜ max{M ϵ, Lϵ}, we obtain that for all t > N ϵ, Oϵ
1791
+ t = ∅.
1792
+ 23
1793
+
1794
+
1795
+ Lemma 9. For all t > N
1796
+ ϵ
1797
+ K , the allocation for every arm i ∈ [K] satisfies
1798
+ ����
1799
+ Tt(i)
1800
+ t
1801
+ − wi(ν)
1802
+ ���� ≤ ϵ .
1803
+ (122)
1804
+ Proof. We will prove (122) by contradiction. Assume that there exists j ∈ [K] such that 1
1805
+ t Tt(i) < wj(ν) − ϵ. For all
1806
+ t > N
1807
+ ϵ
1808
+ K , leveraging Lemma 8, we have
1809
+
1810
+ i∈[K]
1811
+ Tt(i)
1812
+ t
1813
+ =
1814
+
1815
+ i̸=j
1816
+ Tt(i)
1817
+ t
1818
+ + Tt(j)
1819
+ t
1820
+ (123)
1821
+
1822
+
1823
+ i̸=j
1824
+
1825
+ wi(ν) + ϵ
1826
+ K
1827
+
1828
+ + wj(ν) − ϵ
1829
+ (124)
1830
+ = 1 − ϵ
1831
+ K ,
1832
+ (125)
1833
+ which is a contradiction. Thus, (122) holds for all t > N
1834
+ ϵ
1835
+ K .
1836
+
1837
+ Next, we show that our proposed sampling strategy always samples from the set of under-sampled arms, which is
1838
+ specified in Lemma 10. Let us define the minimum sub-optimality gap
1839
+ ∆min ≜
1840
+ min
1841
+ i∈[K]\{a⋆} µ(a⋆) − µ(i) .
1842
+ (126)
1843
+ Lemma 10. For all t > N ∆min/4
1844
+ ν
1845
+ , the TCB sampling rule provided in (34) satisfies
1846
+ Tt(at+1)
1847
+ t + 1
1848
+ ≤ γt,at+1 .
1849
+ (127)
1850
+ Proof. Note that by Theorem 2, for all t > N ∆min/4
1851
+ ν
1852
+ , the proposed sampling rule satisfies that atop
1853
+ t
1854
+ = a⋆. Hence,
1855
+ according to our sampling strategy, for any t > N ∆min/4
1856
+ ν
1857
+ , there could be the two following cases.
1858
+ 1. at+1 = a⋆: Γt(w) is a minimum of linear functions, and hence, it is a concave function [23]. Furthermore, w
1859
+ belongs to a compact space ∆K, and hence Γt(w) has a unique extremum. By our definition, the extremum is γt.
1860
+ Let us assume that
1861
+ 1
1862
+ t+1Tt(a⋆) > γt,a⋆. Note that by the definition of amin
1863
+ t
1864
+ , this implies that 1
1865
+ t Tt(amin
1866
+ t
1867
+ ) < γt,amin
1868
+ t
1869
+ .
1870
+ To show this, let us assume that 1
1871
+ t Tt(amin
1872
+ t
1873
+ ) ≥ γt,amin
1874
+ t
1875
+ . We have
1876
+ min
1877
+ x∈It,amin
1878
+ t
1879
+ �Tt(a⋆)
1880
+ t
1881
+ dU(Pt,a⋆, x) + Tt(amin
1882
+ t
1883
+ )
1884
+ t
1885
+ dL(Pt,amin
1886
+ t
1887
+ , x)
1888
+
1889
+
1890
+ min
1891
+ x∈It,amin
1892
+ t
1893
+
1894
+ γt,a⋆dU(Pt,a⋆, x) + Tt(amin
1895
+ t
1896
+ )
1897
+ t
1898
+ dL(Pt,amin
1899
+ t
1900
+ , x)
1901
+
1902
+ (128)
1903
+
1904
+ min
1905
+ x∈It,amin
1906
+ t
1907
+
1908
+ γt,a⋆dU(Pt,a⋆, x) + γt,amin
1909
+ t
1910
+ dL(Pt,amin
1911
+ t
1912
+ , x)
1913
+
1914
+ (129)
1915
+ = Γt(γt) ,
1916
+ (130)
1917
+ where (128) and (129) hold due to the fact that Γt is an increasing function in each of its arguments, keeping the
1918
+ other argument fixed [10, Lemma 2]. It can be readily verified that (130) is a contradiction, since we obtain that
1919
+ Γt(pt) ≥ Γt(γt), where we have defined pt ≜ 1
1920
+ t [Tt(1), · · · , Tt(K)], and γt is the unique maximizer. Thus,
1921
+ we have 1
1922
+ t Tt(amin
1923
+ t
1924
+ ) < γt,amin
1925
+ t
1926
+ , if
1927
+ 1
1928
+ t+1Tt(a⋆) > γt,a⋆.
1929
+ 24
1930
+
1931
+ <latexit sha1_base64="fpqVGdaNC
1932
+ LNfBQUPF9G+F5mVd2o=">AB/HicbVDNS8MwHE3n15xf1R29BIfgabQiuP
1933
+ Ai8cJ7gPWUtI03cKSpiSpUMr8V7x4UMSrf4g3/xvTrQfdfBDyeO/3Iy8vTBl
1934
+ V2nG+rdrG5tb2Tn23sbd/cHhkH58MlMgkJn0smJCjECnCaEL6mpGRqkiIeM
1935
+ DMPZbekPH4lUVCQPOk+Jz9EkoTHFSBspsJteKFikcm4ub4I4R4EO7JbTdhaA
1936
+ 68StSAtU6AX2lxcJnHGSaMyQUmPXSbVfIKkpZmTe8DJFUoRnaELGhiaIE+UX
1937
+ i/BzeG6UCMZCmpNouFB/bxSIqzKfmeRIT9WqV4r/eNMx2/oEmaZLg5UNx
1938
+ qAWsGwCRlQSrFluCMKSmqwQT5FEWJu+GqYEd/XL62Rw2Xav2+79Vavbqeqog
1939
+ 1NwBi6AC25AF9yBHugDHLwDF7Bm/VkvVjv1sdytGZVO03wB9bnD04hlSo=<
1940
+ /latexit>�t
1941
+ <latexit sha1_base64="VF+Mqh/36VY3qC2g1UdIR4vSXbQ=">AB/nicb
1942
+ VDLSsNAFJ3UV62vqLhyEyxC3ZRERLsuHFZwT6giWEynbRDJ5Mwc6OUPBX3LhQxK3f4c6/cdJmoa0HBg7n3Ms9c4KEMwW2/W2UVlbX1jfKm5Wt7Z3dPXP/o
1943
+ KPiVBLaJjGPZS/AinImaBsYcNpLJMVRwGk3GF/nfveBSsVicQeThHoRHgoWMoJBS75EYRkGYPU59qOF7VwGWZ75Ztev2DNYycQpSRQVavnlDmKSRlQA4
1944
+ VipvmMn4GVYAiOcTituqmiCyRgPaV9TgSOqvGwWf2qdamVghbHUT4A1U39vZDhSahIFejIPqxa9XPzP6cQNryMiSQFKsj8UJhyC2Ir78IaMEkJ8IkmEims
1945
+ 1pkhCUmoBur6BKcxS8vk853bmsO7cX1WajqKOMjtEJqiEHXaEmukEt1EYEZegZvaI348l4Md6Nj/loySh2DtEfGJ8/UrCVrw=</latexit>wt(a?)
1946
+ <latexit sha1_base64="gtDB3biwmSXuCHjfW9pAp/CkTOA=">ACAXicb
1947
+ VBNS8NAEN34WetX1IvgJViEeimJiPZY8OKxgv2AJobNdtMu3WzC7kQpoV78K148KOLVf+HNf+OmzUFbHw83pthZl6QcKbAtr+NpeWV1bX10kZ5c2t7Z9fc2
1948
+ 2+rOJWEtkjMY9kNsKcCdoCBpx2E0lxFHDaCUZXud+5p1KxWNzCOKFehAeChYxg0JvHroRhmEQZg8TH6rYh7vMjZiYnPpmxa7ZU1iLxClIBRVo+uaX249JG
1949
+ lEBhGOleo6dgJdhCYxwOim7qaIJiM8oD1NBY6o8rLpBxPrRCt9K4ylLgHWVP09keFIqXEU6M78XjXv5eJ/Xi+FsO5lTCQpUEFmi8KUWxBbeRxWn0lKgI81wU
1950
+ QyfatFhlhiAjq0sg7BmX95kbTPas5Fzbk5rzTqRwldISOURU56BI10DVqohYi6BE9o1f0ZjwZL8a78TFrXTKmQP0B8bnD+IXlyI=</latexit>
1951
+ wt(amin
1952
+ t
1953
+ )
1954
+ <latexit sha1_base64="f+MLVCWDv8ZseCYBY/jKPKjm8yY=">AB8Xicb
1955
+ VDLSgMxFL1TX7W+qi7dBIvgqsyIaJcFNy4r2Ae2Q8mkd9rQTGZIMkId+hduXCji1r9x59+YtrPQ1gOBwzn3knNPkAiujet+O4W19Y3NreJ2aWd3b/+gfHjU0
1956
+ nGqGDZLGLVCahGwSU2DTcCO4lCGgUC28H4Zua3H1FpHst7M0nQj+hQ8pAzaqz0IuoGQVh9jTtlytu1Z2DrBIvJxXI0eiXv3qDmKURSsME1bruYnxM6oMZ
1957
+ wKnpV6qMaFsTIfYtVTSCLWfzRNPyZlVBiSMlX3SkLn6eyOjkdaTKLCTs4R62ZuJ/3nd1IQ1P+MySQ1KtvgoTAUxMZmdTwZcITNiYglitushI2oszYkq2B
1958
+ G/5FXSuqh6V1Xv7rJSr+V1FOETuEcPLiGOtxCA5rAQMIzvMKbo50X5935WIwWnHznGP7A+fwB/zmRGg=</latexit>z
1959
+ <latexit sha1_base64="tI2iBiz4zoH0aSCPYGCswSw8/s=">AB+nicb
1960
+ VDLSsNAFL3xWesr1aWbwSK4KomIdlw47KCfUATy2Q6aYdOJmFmotTYT3HjQhG3fok7/8ZJm4W2Hhg4nHMv98wJEs6Udpxva2V1bX1js7RV3t7Z3du3KwdtF
1961
+ aeS0BaJeSy7AVaUM0FbmlOu4mkOAo47QTjq9zv3FOpWCxu9ShfoSHgoWMYG2kvl3xIqxHQZg9Tu+8RLKI9u2qU3NmQMvELUgVCjT79pc3iEkaUaEJx0r1X
1962
+ CfRfoalZoTadlLFU0wGeMh7RkqcESVn82iT9GJUQYojKV5QqOZ+nsjw5FSkygwk3lQtejl4n9eL9Vh3c+YSFJNBZkfClOdIzyHtCASUo0nxiCiWQmKyIjL
1963
+ DHRpq2yKcFd/PIyaZ/V3Iuae3NebdSLOkpwBMdwCi5cQgOuoQktIPAz/AKb9aT9WK9Wx/z0RWr2DmEP7A+fwDuW5Ro</latexit>
1964
+ z0
1965
+ <latexit sha1_base64="CmTGzDdATyqUYUAM9jw+5F5N1ks=">AB8nicb
1966
+ VBNS8NAEN3Ur1q/qh69LBbBU0lEtMeCF48V7AeksUy23bpZhN2J0oJ/RlePCji1V/jzX/jts1BWx8MPN6bYWZemEh0HW/ncLa+sbmVnG7tLO7t39QPjxqm
1967
+ TjVjDdZLGPdCcFwKRvokDJO4nmEIWSt8PxzcxvP3JtRKzucZLwIKhEgPBAK3kP/UyeOgaBD3tlStu1Z2DrhIvJxWSo9Erf3X7MUsjrpBJMb3ASDQKJv
1968
+ m01E0NT4CNYch9SxVE3ATZ/OQpPbNKnw5ibUshnau/JzKIjJlEoe2MAEdm2ZuJ/3l+ioNakAmVpMgVWywapJiTGf/07QnKGcWAJMC3srZSPQwNCmVLIheM
1969
+ svr5LWRdW7qnp3l5V6LY+jSE7IKTknHrkmdXJLGqRJGInJM3klbw46L86787FoLTj5zDH5A+fzB7tkYc=</latexit>wa?
1970
+ <latexit sha1_base64="RDNIXlyJ
1971
+ DlxvuSHrV4Z4q2gYM=">AB9XicbVBNSwMxEM3Wr1q/qh69BIvgqeyKaI
1972
+ 8FLx4r2A9ot0s2zbahSXZJZi1l6f/w4kERr/4Xb/4b03YP2vpg4PHeDPzwk
1973
+ RwA67RQ2Nre2d4q7pb39g8Oj8vFJy8SpqxJYxHrTkgME1yxJnAQrJNoRm
1974
+ QoWDsc3839hPThsfqEaYJ8yUZKh5xSsBK/UmQkQD6WU9yNZsF5YpbdRfA68
1975
+ TLSQXlaATlr94gpqlkCqgxnQ9NwE/Ixo4FWxW6qWGJYSOyZB1LVEMuNni6
1976
+ tn+MIqAxzF2pYCvFB/T2REGjOVoe2UBEZm1ZuL/3ndFKan3GVpMAUXS6KUo
1977
+ EhxvMI8IBrRkFMLSFUc3srpiOiCQUbVMmG4K2+vE5aV1Xvpuo9XFfqtTyOIj
1978
+ pD5+gSegW1dE9aqAmokijZ/SK3pyJ8+K8Ox/L1oKTz5yiP3A+fwBCFZL6</
1979
+ latexit>wamin
1980
+ t
1981
+ Figure 6: Positions of z and z′ assuming
1982
+ 1
1983
+ t+1Tt(a⋆) > γt,a⋆
1984
+ Next, we will prove that
1985
+ 1
1986
+ t+1Tt(a⋆) ≤ γt,a⋆ by contradiction. We proceed with our assumption that
1987
+ 1
1988
+ t+1Tt(a⋆) >
1989
+ γt,a⋆, and define the points z and z′ such that for any λ1, λ2 ∈ (0, 1),
1990
+ z ≜ λ1γt + (1 − λ1)wt(a⋆) ,
1991
+ (131)
1992
+ and wt(amin
1993
+ t
1994
+ ) ≜ λ2z′ + (1 − λ2)wt(a⋆) .
1995
+ (132)
1996
+ For a geometric representation of the relative position of these points, we refer to Figure 6. Owing to the
1997
+ concavity of Γt, we have
1998
+ Γt(z) ≥ λ1Γt(γt) + (1 − λ1)Γt(wt(a⋆))
1999
+ (133)
2000
+ ≥ Γt(wt(a⋆)) .
2001
+ (134)
2002
+ Note that as a result of the TCB sampling rule,we have
2003
+ Γt(wt(a⋆)) > Γt(wt(amin
2004
+ t
2005
+ )) .
2006
+ (135)
2007
+ Accordingly, let us define
2008
+ ϵt ≜ Γt(wt(a⋆)) − Γt(wt(amin
2009
+ t
2010
+ )) .
2011
+ (136)
2012
+ Furthermore, for any w ∈ ∆K, let ∇Γt(w) denote the sub-gradient of the function Γt at w. Owing to the
2013
+ concavity of Γt, we have
2014
+ Γt(z′) ≥ Γt(z) − ⟨∇Γt(z), z′ − z⟩
2015
+ (137)
2016
+ ≥ Γt(z) − ∥∇Γt(z)∥ ∥z′ − z∥
2017
+ (138)
2018
+ (134)
2019
+
2020
+ Γt(wt(a⋆)) − ∥∇Γt(z)∥ ∥z′ − z∥
2021
+ (139)
2022
+ (136)
2023
+ =
2024
+ Γt(wt(amin
2025
+ t
2026
+ )) + ϵt − ∥∇Γt(z)∥ ∥z′ − z∥ ,
2027
+ (140)
2028
+ where (138) is obtained using the Cauchy-Schwarz inequality. Furthermore, leveraging the concavity of Γt, we
2029
+ have
2030
+ Γt(wt(amin
2031
+ t
2032
+ )) ≥ λ2Γt(z′) + (1 − λ2)Γt(wt(a⋆))
2033
+ (141)
2034
+ 25
2035
+
2036
+ (140)
2037
+
2038
+ λ2
2039
+
2040
+ Γt(wt(amin
2041
+ t
2042
+ )) + ϵt − ∥∇Γt(z)∥ ∥z′ − z∥
2043
+
2044
+ + (1 − λ2)Γt(wt(a⋆)) ,
2045
+ (142)
2046
+ which implies that
2047
+ Γt(wt(amin
2048
+ t
2049
+ )) ≥ Γt(wt(a⋆)) −
2050
+ λ2
2051
+ 1 − λ2
2052
+ (∥∇Γt(z)∥ ∥z′ − z∥ − ϵt) .
2053
+ (143)
2054
+ Let us set λ2 ≜ O(ϵ2
2055
+ t). Hence, (143) can be rewritten as
2056
+ Γt(wt(amin
2057
+ t
2058
+ )) ≥ Γt(wt(a⋆)) + O(ϵ2
2059
+ t)
2060
+ (144)
2061
+ (136)
2062
+ =
2063
+ Γt(wt(amin
2064
+ t
2065
+ )) + ϵt + O(ϵ2
2066
+ t) ,
2067
+ (145)
2068
+ which is a contradiction. This shows that when at+1 = a⋆, we have
2069
+ 1
2070
+ t+1Tt(at+1) ≤ γt,at+1.
2071
+ 2. at+1 = amin
2072
+ t
2073
+ : Let us assume that
2074
+ 1
2075
+ t+1Tt(amin
2076
+ t
2077
+ ) > γt,amin
2078
+ t
2079
+ . Furthermore, by our sampling strategy, we have
2080
+ Γt(wt(a⋆)) < Γt(wt(amin
2081
+ t
2082
+ )) .
2083
+ (146)
2084
+ Following similar arguments as the case when at+1 = a⋆, leveraging the concavity of Γt, we can arrive at a
2085
+ contradiction. Thus, in this case, when at+1 = amin
2086
+ t
2087
+ , we have
2088
+ 1
2089
+ t+1Tt(at+1) ≤ γt,at+1.
2090
+
2091
+ Lemma 11. For any ζ ∈ R+, there exists a stochastic time M ζ
2092
+ w such that Eν[M ζ
2093
+ w] < +∞, and for all t > M ζ
2094
+ w, the
2095
+ ITCB sampling rule provided in (37) satisfies
2096
+ Tt(at+1)
2097
+ t + 1
2098
+ ≤ γt,at+1 + ζ .
2099
+ (147)
2100
+ Proof. Let us recall that
2101
+ bmin
2102
+ t
2103
+
2104
+ arg min
2105
+ i∈[K]\{atop
2106
+ t }
2107
+
2108
+ min
2109
+ x∈It,i
2110
+ �Tt(atop
2111
+ t )
2112
+ t
2113
+ dU(Pt,atop
2114
+ t , x) + Tt(i)
2115
+ t
2116
+ dL(Pt,i, x)
2117
+
2118
+ + log(Tt(i))
2119
+ t
2120
+
2121
+ .
2122
+ (148)
2123
+ Note that for all t > N ∆min/4
2124
+ ν
2125
+ , we have atop
2126
+ t
2127
+ = a⋆. Furthermore, for all t > ⌈
2128
+ 1
2129
+ (Kϵ2)⌉ and for all i ∈ [K], we almost
2130
+ surely have
2131
+ log Tt(i)
2132
+ t
2133
+ ≤ log(
2134
+
2135
+ t/K − 1)
2136
+ t
2137
+ (149)
2138
+ ≤ log(
2139
+
2140
+ t/K) + 1
2141
+ t
2142
+ (150)
2143
+
2144
+
2145
+ t/K
2146
+ t
2147
+ (151)
2148
+ ≤ ϵ ,
2149
+ (152)
2150
+ where (149) is a result of the fact that Tt(i) ≥
2151
+
2152
+ t/K − 1 for all i ∈ [K] [7, Theorem 4], (151) holds due to
2153
+ the fact that log(1 + x) ≤ x, and (152) is obtained from the fact that t > ⌈1/(Kϵ2)⌉.
2154
+ Let us define M ϵ
2155
+ 3 ≜
2156
+ max{N ∆min/4
2157
+ ν
2158
+ , 1/(Kϵ2)⌉}. For a sufficiently small ϵ ∈ R+, for any t > M ϵ
2159
+ 3, we almost surely have
2160
+ bmin
2161
+ t
2162
+ =
2163
+ arg min
2164
+ i∈[K]\{a⋆}
2165
+
2166
+ min
2167
+ x∈It,i
2168
+ �Tt(a⋆)
2169
+ t
2170
+ dU(Pt,a⋆, x) + Tt(i)
2171
+ i
2172
+ dL(Pt,i, x)
2173
+
2174
+ + ϵ
2175
+
2176
+ (153)
2177
+ = amin
2178
+ t
2179
+ .
2180
+ (154)
2181
+ We have the following two cases.
2182
+ 26
2183
+
2184
+ 1. at+1 = a⋆ : Let us assume that
2185
+ 1
2186
+ t+1Tt(a⋆) > γt,a⋆ + ζ. Due to the ITCB sampling strategy in (37), for all
2187
+ t > M ϵ
2188
+ 3, we have
2189
+ Γt(wt(a⋆)) + log(Tt(amin
2190
+ t
2191
+ ))
2192
+ t + 1
2193
+ ≥ Γt(wt(amin
2194
+ t
2195
+ )) + log(Tt(amin
2196
+ t
2197
+ ) + 1)
2198
+ t + 1
2199
+ ,
2200
+ (155)
2201
+ or, equivalently
2202
+ Γt(wt(a⋆)) − Γt(wt(amin
2203
+ t
2204
+ )) ≥
2205
+ 1
2206
+ t + 1 log
2207
+
2208
+ 1 +
2209
+ 1
2210
+ Tt(amin
2211
+ t
2212
+ )
2213
+
2214
+ .
2215
+ (156)
2216
+ This implies that
2217
+ Γt(wt(a⋆)) − Γt(wt(amin
2218
+ t
2219
+ )) > 0 .
2220
+ (157)
2221
+ Following the same argument as Lemma 10, (157) implies that
2222
+ 1
2223
+ t+1Tt(a⋆) ≤ γt,a⋆ + ζ for any ζ ≥ 0.
2224
+ 2. at+1 = amin
2225
+ t
2226
+ : Let us assume that Tt(amin
2227
+ t
2228
+ )/(t+1) > γt,amin
2229
+ t
2230
+ +ζ. We will show that this is a contradiction, if the
2231
+ condition in the ITCB sampling strategy in (37) holds. Specifically, according to the ITCB sampling strategy,
2232
+ we have
2233
+ Γt(wt(amin
2234
+ t
2235
+ )) − Γt(wt(a⋆)) ≥ −
2236
+ 1
2237
+ t + 1 · log
2238
+
2239
+ 1 +
2240
+ 1
2241
+ Tt(amin
2242
+ t
2243
+ )
2244
+
2245
+
2246
+ ��
2247
+
2248
+ ≜ϵt
2249
+ .
2250
+ (158)
2251
+ We may have the following two cases.
2252
+ • Γt(wt(amin
2253
+ t
2254
+ )) − Γt(wt(a⋆)) > 0: In this case, following the same line of arguments as in Lemma 10 we
2255
+ obtain that Tt(amin
2256
+ t
2257
+ )/(t + 1) ≤ γt,amin
2258
+ t
2259
+ + ζ for any ζ ≥ 0.
2260
+ • Γt(wt(amin
2261
+ t
2262
+ )) ∈ [Γt(wt(a⋆))−ϵt/(t+1), Γt(wt(a⋆))]: Let us define the vector ei ≜ [e1(i), · · · , eK(i)]⊤,
2263
+ where, for any j ∈ [K] we have defined
2264
+ ej(i) ≜
2265
+
2266
+
2267
+
2268
+
2269
+
2270
+
2271
+
2272
+ 1,
2273
+ if j = a⋆
2274
+ −1,
2275
+ if j = i
2276
+ 0,
2277
+ otherwise
2278
+ .
2279
+ (159)
2280
+ Leveraging the concavity of Γt, we have
2281
+ Γt(wt(a⋆)) ≥ Γt(wt(amin
2282
+ t
2283
+ )) −
2284
+
2285
+ ∇Γt(wt(a⋆)), wt(amin
2286
+ t
2287
+ ) − wt(a⋆)
2288
+
2289
+
2290
+ ��
2291
+
2292
+ <0
2293
+ ,
2294
+ (160)
2295
+ which implies that
2296
+ Γt(wt(a⋆)) − Γt(wt(amin
2297
+ t
2298
+ )) ≥
2299
+ ���
2300
+ ∇Γt(wt(a⋆)), wt(a⋆) − wt(amin
2301
+ t
2302
+ )
2303
+ ���
2304
+ (161)
2305
+ =
2306
+ 1
2307
+ t + 1 ·
2308
+ ���
2309
+
2310
+ ∇Γt(wt(a⋆)), eamin
2311
+ t
2312
+ ���� .
2313
+ (162)
2314
+ Combining (158) and (162), we obtain
2315
+ ϵt ≥
2316
+ ���
2317
+
2318
+ ∇Γt(wt(a⋆)), eamin
2319
+ t
2320
+ ���� .
2321
+ (163)
2322
+ 27
2323
+
2324
+ Next, for any i ∈ [K] \ {a⋆}, let us define the set
2325
+ Mζ(i) ≜
2326
+
2327
+ w ∈ ∆K : |γt,i − wi| > ζ , |⟨∇Γt(w), ei⟩| > 0
2328
+
2329
+ .
2330
+ (164)
2331
+ It can be readily verified that wt(a⋆) ∈ Mζ(amin
2332
+ t
2333
+ ). Thus, from (163), we obtain that
2334
+ ϵt ≥
2335
+ inf
2336
+ w∈Mζ(amin
2337
+ t
2338
+ )
2339
+ ���
2340
+
2341
+ ∇Γt(w), eamin
2342
+ t
2343
+ ���� ,
2344
+ (165)
2345
+ where we have used the convention that inf{∅} = +∞. (165) can be further lower-bounded as
2346
+ ϵt ≥
2347
+ min
2348
+ i∈[K]\{a⋆}
2349
+ inf
2350
+ w∈Mζ(i) |⟨∇Γt(w), ei⟩| .
2351
+ (166)
2352
+ Furthermore, define the instant M ϵ
2353
+ 4 ≜ max{⌈8K/ϵ2, 3K/(3 − 2
2354
+
2355
+ 2)⌉}. For all t > M ϵ
2356
+ 4, we have
2357
+ ϵt ≤
2358
+ 1
2359
+ Tt(amin
2360
+ t
2361
+ )
2362
+ (167)
2363
+
2364
+ 1
2365
+
2366
+ t/K − 1
2367
+ (168)
2368
+
2369
+
2370
+ 2K
2371
+ t
2372
+ (169)
2373
+ ≤ ϵ
2374
+ 2 ,
2375
+ (170)
2376
+ where (167) is obtained from the fact that log(1 + x) ≤ x, (168) follows from the property of forced
2377
+ exploration that Tt(i) ≥
2378
+
2379
+ t/K − 1 for all i ∈ [K] [7, Theorem 4], and (169) and (170) follow from the
2380
+ fact that t > M ϵ
2381
+ 4. Furthermore, setting
2382
+ ϵ = ϵ(ζ) ≜
2383
+ min
2384
+ i∈[K]\{a⋆}
2385
+ inf
2386
+ w∈Mζ(i) |⟨∇Γt(w), ei⟩| ,
2387
+ (171)
2388
+ it can be readily verified that (163) is a contradiction. This imples that for all t > M ϵ(ζ)
2389
+ 4
2390
+ , assuming
2391
+ that
2392
+ 1
2393
+ t+1Tt(amin
2394
+ t
2395
+ ) > γt,amin
2396
+ t
2397
+ , the ITCB sampling condition (158) does not hold, and hence at+1 ̸= amin
2398
+ t
2399
+ .
2400
+ Finally, defining M ζ
2401
+ w ≜ max{M ϵ
2402
+ 3, M ϵ(ζ)
2403
+ 4
2404
+ }, it satisfies
2405
+ 1
2406
+ t+1Tt(amin
2407
+ t
2408
+ ) ≤ γt,amin
2409
+ t
2410
+ + ζ for any ζ ∈ R+.
2411
+
2412
+ F
2413
+ Proof of Theorem 5
2414
+ The upper bound on the average sample complexity is obtained by leveraging the convergence of the empirical
2415
+ problem complexity Γt( 1
2416
+ t Tt) as a result of our sampling strategy, to the true value Γ(ν), where we have defined
2417
+ Tt ≜ [Tt(1), · · · , Tt(K)]. This is stated in Lemma 12. Next, Lemma 13 states the relationship between the GLLR
2418
+ Λt(atop
2419
+ t , ach
2420
+ t ) and the empirical problem complexity Γt( 1
2421
+ t Tt). Finally, leveraging Lemma 12 and Lemma 13, we ob-
2422
+ tain an upper bound on the average sample complexity as a result of the TCB and ITCB sampling rules (34) and (37),
2423
+ and the stopping rule (24).
2424
+ Lemma 12. Under TCB and ITCB, for any ϵ ∈ R+, there exists Nϵ such that for all t ≥ Nϵ, we have
2425
+ ����Γ(ν) − Γt
2426
+ �1
2427
+ t Tt
2428
+ ����� ≤ ϵ ,
2429
+ (172)
2430
+ and Eν[Nϵ] < +∞.
2431
+ 28
2432
+
2433
+ Proof. For any ϵ′ > 0, let us define the time N ϵ′
2434
+ 1 ≜ max{N ϵ′
2435
+ ν , N ϵ′
2436
+ w}. For all t > N ϵ′
2437
+ 1 , we have:
2438
+ 1. µt(i) ∈ [µ(i) − ϵ′, µ(i) + ϵ′] for every arm i ∈ [K].
2439
+ 2.
2440
+ 1
2441
+ t Tt(i) ∈ [wi(ν) − ϵ′, wi(ν) + ϵ′] for every arm i ∈ [K].
2442
+ 3. Let νt ≜ [Pt,1, · · · , Pt,K] denote the bandit instance characterized by the mean values m(νt) = [µt,1, · · · , µt,K].
2443
+ As a result of the continuity of Γ(ν, w) in its first argument established in Lemma 3, for all t > N ϵ′
2444
+ 1 , there exists
2445
+ ϵ′′ such that we have |Γ(ν, w) − Γ(νt, w)| < ϵ′′.
2446
+ Thus, for all t > N ϵ′
2447
+ 1 , we have
2448
+ Γt(T/t) = min
2449
+ i̸=a⋆ min
2450
+ x∈It,i
2451
+ �Tt(a⋆)
2452
+ t
2453
+ dU(Pt,a⋆, x) + Tt(i)
2454
+ t
2455
+ dL(Pt,i, x)
2456
+
2457
+ (173)
2458
+ ≤ min
2459
+ i̸=a⋆ min
2460
+ x∈It,i
2461
+
2462
+ (wa⋆(ν) + ϵ′) dU(Pt,a⋆, x) + Tt(i)
2463
+ t
2464
+ dL(Pt,i, x)
2465
+
2466
+ (174)
2467
+ ≤ min
2468
+ i̸=a⋆ min
2469
+ x∈It,i {(wa⋆(ν) + ϵ′dU(Pt,a⋆, x)) + (wi(ν) + ϵ′) dL(Pt,i, x)}
2470
+ (175)
2471
+ = Γ(νt, w(ν)) + O(ϵ′)
2472
+ (176)
2473
+ ≤ Γ(ν) + ϵ′′ + O(ϵ′)
2474
+
2475
+ ��
2476
+
2477
+ ≜ ϵ
2478
+ ,
2479
+ (177)
2480
+ where (173) follows from the fact that atop
2481
+ t
2482
+ = a⋆ for all t > N ϵ′
2483
+ 1 , (174) and (175) follow from the fact that Γi(ν, w)
2484
+ is an increasing function in each coordinate wi, keeping the other coordinates fixed [10, Lemma 2], and (177) follows
2485
+ from the fact that t > N ϵ′
2486
+ 1 . Following similar steps as (173)-(177), we can show that
2487
+ Γt
2488
+ �1
2489
+ t Tt
2490
+
2491
+ ≥ Γ(ν) − ϵ .
2492
+ (178)
2493
+ The proof is completed by setting Nϵ ≜ N ϵ′
2494
+ 1 .
2495
+
2496
+ Lemma 13. Under the TCB and ITCB sampling rules, there exists a stochastic time N ϵ
2497
+ 2 such that for all t > N ϵ
2498
+ 2, the
2499
+ GLLR statistic satisfies
2500
+ 1
2501
+ t Λt(atop
2502
+ t , ach
2503
+ t ) ≥ Γt
2504
+ �1
2505
+ t Tt
2506
+
2507
+ − ϵ ,
2508
+ (179)
2509
+ and Eν[N ϵ
2510
+ 2] < +∞.
2511
+ Proof. We use the notion of r-quick convergence, which we define below.
2512
+ Definition 2 (r-quick convergence [24]). Consider the sequence of i.i.d. zero-mean random variables {Zt : t ∈ N}.
2513
+ Let ¯Zt ≜ 1
2514
+ t
2515
+ �t
2516
+ s=1 Zt denote the empirical mean. Furthermore, for any ϵ ∈ R+ define
2517
+ Tϵ ≜ sup
2518
+
2519
+ t ∈ N : | ¯Zt| > ϵ
2520
+
2521
+ .
2522
+ (180)
2523
+ Then, {Zt : t ∈ N} converges r-quickly for r > 0, if E[T r
2524
+ ϵ ] < +∞.
2525
+ We leverage r-quick convergence for r = 1 to establish the convergence of the normalized GLLR statistic to the
2526
+ corresponding KL divergence measure. For this, we first state the necessary and sufficient condition for r-quick
2527
+ convergence to hold.
2528
+ 29
2529
+
2530
+ Lemma 14 (Corollary 4, [24]). The i.i.d. sequence {Zt : t ∈ N} converges r-quickly if and only if E[|Zt|r+1] < +∞.
2531
+ In our setting, for any arm i ∈ Rt(ach
2532
+ t ) and any s ∈ [t] such that As = i, let us set
2533
+ Zs ≜ log πi(Xs | µt(i))
2534
+ πi(Xs | ˜µt(ach
2535
+ t )) − DKL(Pt,i∥˜Pt,ach
2536
+ t ) ,
2537
+ (181)
2538
+ where ˜Pt,ach
2539
+ t denotes the distribution of the arm ach
2540
+ t when the mean value is equal to ˜µt(ach
2541
+ t ). Furthermore, leveraging
2542
+ Assumption 6, we have
2543
+ Eν[|Zs|2] < +∞ .
2544
+ (182)
2545
+ Hence, using 1-quick convergence, we obtain that Eν[N ϵ
2546
+ KL] < +∞, where we have defined
2547
+ N ϵ
2548
+ KL ≜ sup
2549
+
2550
+
2551
+ �t ∈ N :
2552
+ ������
2553
+ 1
2554
+ Tt(i)
2555
+
2556
+ s∈[t]:As=i
2557
+ log πi(Xs | µt(i))
2558
+ πi(Xs | ˜µt(ach
2559
+ t )) − DKL
2560
+
2561
+ Pt,i∥˜Pt,ach
2562
+ t
2563
+
2564
+ ������
2565
+ > ϵ
2566
+
2567
+
2568
+ � .
2569
+ (183)
2570
+ Thus, for any t > N ϵ
2571
+ KL, we have
2572
+ 1
2573
+ t Λt(atop
2574
+ t , ach
2575
+ t ) ≥ 1
2576
+ t
2577
+
2578
+ i∈Rt(ach
2579
+ t )
2580
+ Tt(i)
2581
+
2582
+ DKL(Pt,i∥˜Pt,ach
2583
+ t ) − ϵ
2584
+
2585
+ (184)
2586
+ = 1
2587
+ t
2588
+
2589
+
2590
+
2591
+ i∈Rt(ach
2592
+ t )
2593
+ Tt(i)DKL(Pt,i∥˜Pt,ach
2594
+ t ) − Tt(i)ϵ
2595
+
2596
+
2597
+ (185)
2598
+
2599
+
2600
+ i∈Rt(ach
2601
+ t )
2602
+ Tt(i)
2603
+ t
2604
+ DKL(Pt,i∥˜Pt,ach
2605
+ t ) − ϵ .
2606
+ (186)
2607
+ Furthermore, for any ϵ ∈ (0, ∆min/4) define the time instant N ϵ
2608
+ 2 ≜ max{N ϵ
2609
+ KL, N ϵ
2610
+ ν}. Thus, for any t > N ϵ
2611
+ 2 and for
2612
+ any i ∈ Rt(ach
2613
+ t ), we have
2614
+ 1
2615
+ t Λt(atop
2616
+ t , ach
2617
+ t ) ≥ Tt(a⋆)
2618
+ t
2619
+ DKL(Pt,a⋆∥˜Pt,ach
2620
+ t ) + Tt(i)
2621
+ t
2622
+ DKL(Pt,i∥˜Pt,ach
2623
+ t ) − ϵ
2624
+ (187)
2625
+
2626
+ min
2627
+ x∈[µt(ach
2628
+ t ),µt(a⋆)]
2629
+ �Tt(a⋆)
2630
+ t
2631
+ dU(Pt,a⋆, x) + Tt(i)
2632
+ t
2633
+ dL(Pt,i, x)
2634
+
2635
+ − ϵ
2636
+ (188)
2637
+ = min
2638
+ i̸=a⋆
2639
+ min
2640
+ x∈[µt(i),µt(a⋆)]
2641
+ �Tt(a⋆)
2642
+ t
2643
+ dU(Pt,a⋆, x) + Tt(i)
2644
+ t
2645
+ dL(Pt,i, x)
2646
+
2647
+ − ϵ
2648
+ (189)
2649
+ = Γt
2650
+ �1
2651
+ t T
2652
+
2653
+ − ϵ ,
2654
+ (190)
2655
+ where (187) holds since a⋆ ∈ Rt(ach
2656
+ t ) for any t > N ϵ
2657
+ 2 and (188) holds since µt(ach
2658
+ t ) < µt(i) for any i ∈ Rt(ach
2659
+ t ).
2660
+ Finally, it can readily verified that N ϵ
2661
+ 2 < N ϵ
2662
+ KL + N ϵ
2663
+ ν, and hence, Eν[N ϵ
2664
+ 2] < +∞.
2665
+
2666
+ Next, in order to prove Theorem 5, let us define the time instant N ϵ
2667
+ 3 ≜ max{Nϵ, N ϵ
2668
+ 2}. Expanding the time instant just
2669
+ before stopping, we have
2670
+ τ − 1 = (τ − 1)1{τ−1≤N ϵ
2671
+ 3} + (τ − 1)1{τ−1>N ϵ
2672
+ 3}
2673
+ (191)
2674
+ ≤ N ϵ
2675
+ 3 + (τ − 1)1{τ−1>N ϵ
2676
+ 3} .
2677
+ (192)
2678
+ 30
2679
+
2680
+ Leveraging Lemma 12 and Lemma 13, along with the fact that at τ − 1, Λτ−1(atop
2681
+ τ−1, ach
2682
+ τ−1) ≤ βτ−1(δ), if τ − 1 > N ϵ
2683
+ 3
2684
+ we have
2685
+ Γ(ν) − 2ϵ ≤ Γτ−1
2686
+
2687
+ 1
2688
+ τ − 1Tτ−1
2689
+
2690
+ − ϵ ≤ Λτ−1(atop
2691
+ τ−1, ach
2692
+ τ−1)
2693
+ τ − 1
2694
+ ≤ βτ−1(δ)
2695
+ τ − 1
2696
+ .
2697
+ (193)
2698
+ Subsequently, following the same steps as [7, Theorem 8], we obtain
2699
+ lim
2700
+ δ→0
2701
+ E[τ]
2702
+ log(1/δ) ≤
2703
+ 1 + α
2704
+ Γ(ν) − 2ϵ .
2705
+ (194)
2706
+ Finally, taking infimum with respect to ϵ in (194), we obtain the desired result.
2707
+ References
2708
+ [1] S. Bubeck, R. Munos, and G. Stoltz, “Pure exploration in multi-armed bandits problems,” in Proc. International
2709
+ Conference on Algorithmic Learning Theory, Porto, Portugal, October 2009.
2710
+ [2] V. Gabillon, M. Ghavamzadeh, and A. Lazaric, “Best arm identification: A unified approach to fixed budget and
2711
+ fixed confidence,” in Proc. Advances in Neural Information Processing Systems, Lake Tahoe, NV, December
2712
+ 2012.
2713
+ [3] S. Kalyanakrishnan, A. Tewari, P. Auer, and P. Stone, “PAC subset selection in stochastic multi-armed bandits,”
2714
+ in Proc. International Conference on Machine Learning, Madison, WI, June 2012.
2715
+ [4] A. Garivier and E. Kaufmann, “Optimal best arm identification with fixed confidence,” in Proc. Conference on
2716
+ Learning Theory, New York, NY, June 2016.
2717
+ [5] L. Xu, J. Honda, and M. Sugiyama, “A fully adaptive algorithm for pure exploration in linear bandits,” in Proc.
2718
+ International Conference on Artificial Intelligence and Statistics, Lanzarote, Canary Islands, April 2018.
2719
+ [6] K. Jamieson, M. Malloy, R. Nowak, and S. Bubeck, “lil’ UCB : An optimal exploration algorithm for multi-
2720
+ armed bandits,” in Proc. Conference on Learning Theory, Barcelona, Spain, June 2014.
2721
+ [7] A. Mukherjee and A. Tajer,
2722
+ “SPRT-based efficient best arm identification in stochastic bandits,”
2723
+ arXiv
2724
+ 2207.11158, 2022.
2725
+ [8] M. Hoffman, B. Shahriari, and N. Freitas, “On correlation and budget constraints in model-based bandit op-
2726
+ timization with application to automatic machine learning,”
2727
+ in Proc. International Conference on Artificial
2728
+ Intelligence and Statistics, Reykjavik, Iceland, April 2014.
2729
+ [9] J. Katz-Samuels, L. Jain, Z. Karnin, and K. G. Jamieson, “An empirical process approach to the union bound:
2730
+ Practical algorithms for combinatorial and linear bandits,” in Proc. Advances in Neural Information Processing
2731
+ Systems, Virtual, December 2020.
2732
+ [10] Daniel Russo, “Simple bayesian algorithms for best-arm identification,” Operations Research, vol. 68, no. 6, pp.
2733
+ 1625–1647, April 2020.
2734
+ 31
2735
+
2736
+ [11] X. Shang, R. de Heide, P. Menard, E. Kaufmann, and M. Valko, “Fixed-confidence guarantees for Bayesian
2737
+ best-arm identification,” in Proc. International Conference on Artificial Intelligence and Statistics, Sicily, Italy,
2738
+ August 2020.
2739
+ [12] M. Jourdan, R. Degenne, D. Baudry, R. de Heide, and E. Kaufmann, “Top two algorithms revisited,” in Proc.
2740
+ Advances in Neural Information Processing Systems, New Orleans, LA, December 2022.
2741
+ [13] S. Agrawal, S. Juneja, and P. Glynn, “Optimal δ-correct best-arm selection for heavy-tailed distributions,” in
2742
+ Proc. International Conference on Algorithmic Learning Theory, San Diego, CA, February 2020.
2743
+ [14] Y. Jedra and A. Proutiere, “Optimal best-arm identification in linear bandits,” in Proc. Advances in Neural
2744
+ Information Processing Systems, Virtual, December 2020.
2745
+ [15] A. Mukherjee and A. Tajer, “SPRT-based best arm identification in stochastic bandits,” in International Sympo-
2746
+ sium on Information Theory, Helsinki, Finland, June 2022.
2747
+ [16] C. Qin, D. Klabjan, and D. Russo, “Improving the expected improvement algorithm,” in Proc. Advances in
2748
+ Neural Information Processing Systems, Long Beach, CA, December 2017.
2749
+ [17] E. Kaufmann and W. M. Koolen, “Mixture martingales revisited with applications to sequential tests and confi-
2750
+ dence intervals,” Journal of Machine Learning Research, vol. 22, no. 246, pp. 1–44, 2021.
2751
+ [18] R. K. Sundaram et al., A First Course in Optimization Theory, Cambridge university press, Cambridge, UK,
2752
+ 1996.
2753
+ [19] J. Lin, “Divergence measures based on the Shannon entropy,” IEEE Transactions on Information Theory, vol.
2754
+ 37, no. 1, pp. 145–151, January 1991.
2755
+ [20] E. Posner, “Random coding strategies for minimum entropy,” IEEE Transactions on Information Theory, vol.
2756
+ 21, no. 4, pp. 388–391, July 1975.
2757
+ [21] C. D. Aliprantis and K. C. Border, Infinite Dimensional Analysis: a Hitchhiker’s Guide, Springer-Verlag, 3rd
2758
+ edition, 2006.
2759
+ [22] Y. Miao, “Concentration inequality of maximum likelihood estimator,” Applied Mathematics Letters, vol. 23,
2760
+ no. 10, pp. 1305–1309, 2010.
2761
+ [23] S. P. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, Cambridge, UK, 2004.
2762
+ [24] Y. S. Chow and H. Teicher, Probability Theory Independence, Interchangeability, Martingales, Springer, 1978.
2763
+ 32
2764
+
CNE2T4oBgHgl3EQfRwe0/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9E0T4oBgHgl3EQfRAC9/content/tmp_files/2301.02202v1.pdf.txt ADDED
@@ -0,0 +1,2249 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02202v1 [math.AC] 5 Jan 2023
2
+ ON THE EQUALITY OF TEST IDEALS
3
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
4
+ Abstract. We provide a natural criterion which implies equality of the finitistic test ideal
5
+ and test ideal in local rings of prime characteristic. Most notably, we show that the criterion
6
+ is met by every local weakly F-regular ring whose anti-canonical algebra is Noetherian on
7
+ the punctured spectrum.
8
+ 1. Introduction
9
+ Let R be a Noetherian ring of prime characteristic p > 0 and let R◦ be the set of elements
10
+ which avoid all minimal primes of R. Let I ⊆ R be an ideal of R and denote by I[pe] the
11
+ expansion of I along the eth iterate of the Frobenius endomorphism. The tight closure of
12
+ I is the ideal I∗ consisting of elements x ∈ R such that there exists an element c ∈ R◦
13
+ with the property that cxpe ∈ I[pe] for all e ≫ 0. Unlike integral closure of ideals, the tight
14
+ closure of an ideal does not commute with localization, [BM10]. Brenner’s and Monsky’s
15
+ counterexample to the localization problem leaves open the intriguing problem if the property
16
+ of tight closure being a trivial operation on ideals commutes with localization.
17
+ Continue to let R be a Noetherian ring of prime characteristic p > 0. The ring R is
18
+ called weakly F-regular if every ideal is tight closed, that is I = I∗ for every ideal I.1 A
19
+ ring is called F-regular if every localization of R is weakly F-regular. Let F e
20
+ ∗R denote the
21
+ restriction of scalars of R along the eth iterate Frobenius endomorphism F e : R → R. We
22
+ say that R is strongly F-regular if for each nonzero element c ∈ R there exists e ∈ N such
23
+ that the R-linear map R → F e
24
+ ∗R defined by 1 �→ F e
25
+ ∗c is pure. Every strongly F-regular ring
26
+ is weakly F-regular and the property of being strongly F-regular passes to localization. It
27
+ is conjectured that all three notions of F-regularity agree.
28
+ Conjecture 1.1 (The weak implies strong conjecture). If R is an excellent weakly F-regular
29
+ ring of prime characteristic p > 0 then R is strongly F-regular.
30
+ Williams proved Conjecture 1.1 for the class of 3-dimensional rings, [Wil95]. Every ex-
31
+ cellent 4-dimensional F-regular ring of prime characteristic p > 5 is strongly F-regular by
32
+ pairing [AP22, Corollary 4.4] with [BMP+20, Corollary K]. The purpose of this article is to
33
+ extend the results of [AP22] to rings of arbitrary dimension. In particular, if the results of
34
+ the prime characteristic minimal model program in dimension 3 established in [BMP+20]
35
+ are valid in all dimensions, then the classes of excellent F-regular and excellent strongly
36
+ F-regular rings are equivalent.
37
+ Polstra was supported in part by NSF Grant DMS #2101890 and by a grant from the Simons Foundation,
38
+ Grant Number 814268, MSRI.
39
+ 1An important property of tight closure theory is that every regular ring is weakly F-regular (and therefore
40
+ also F-regular).
41
+ 1
42
+
43
+ 2
44
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
45
+ A prime characteristic ring R is weakly F-regular if and only if Rm is weakly F-regular
46
+ for every maximal ideal m ∈ Spec(R). Moreover, an excellent local ring is weakly F-regular
47
+ if and only if its completion is weakly F-regular. We therefore restrict our attention to the
48
+ class of weakly F-regular local rings which admit a canonical module. Every local weakly
49
+ F-regular ring is a normal domain and therefore has divisor class group cl(R).
50
+ Theorem A. Let (R, m, k) be an excellent normal domain of prime characteristic p > 0, of
51
+ Krull dimension d, and I ⊆ R an anti-canonical ideal.2 Suppose that there exists an m ∈ N
52
+ such that I(m) is principal when localized at a each height 2 prime3 and for each 1 ≤ j ≤ d−2
53
+ there exists an ideal aj of height d − j + 1 such that
54
+ ape
55
+ j Hj
56
+ m
57
+
58
+ R
59
+ I(mpe)
60
+
61
+ = 0
62
+ for every e ∈ N. If R is weakly F-regular then R is strongly F-regular.
63
+ Remark 1.2. The Matlis dual of the local cohomology module Hj
64
+ m(R/I(mpe)) is the com-
65
+ pletion of Extd−j
66
+ R (R/I(mpe), J), a module which is not supported in codimension d − j if
67
+ j ≤ d − 2. Hence Hj
68
+ m(R/I(mpe)) is annihilated by an ideal of height d − j + 1. The criterion
69
+ of Theorem A is therefore reasonable as it is natural to anticipate that the annihilators of
70
+ Hj
71
+ m(R/I(mpe)) are of linear comparisons as e → ∞.
72
+ Remark 1.3. Let (R, m, k) be as in Theorem A and assume that R is Cohen-Macaulay.
73
+ Suppose that ER(k) is an injective hull of the residue field. Let 0∗
74
+ ER(k) and 0∗fg
75
+ ER(k) denote
76
+ the tight closure and finitisitic tight closure respectively of the 0-submodule of ER(k), see
77
+ Section 3 for definitions. Then 0∗fg
78
+ ER(k) = 0∗
79
+ ER(k) under the hypotheses of Theorem A, see The-
80
+ orem 4.10. Therefore the test ideal and big test ideal of R agree by [HH90, Proposition 8.23]
81
+ and [AE03, Theorem 3.2], c.f. [LS01, Theorem 7.1 and Theorem 7.2]. By definition, the test
82
+ ideal of R is the unit ideal if and only if R is weakly F-regular and the big test ideal of R is
83
+ the unit ideal if and only if R is strongly F-regular. Therefore Theorem A is a consequence
84
+ of Theorem 4.10.
85
+ Conjecture 1.1 is valid for rings R which are standard graded over a field, [LS99].
86
+ It
87
+ would be interesting to know if such rings satisfy the hypotheses of Theorem A. Without the
88
+ standard graded assumption, most established cases of Conjecture 1.1 require an assumption
89
+ on R that is akin to being Gorenstein. Hochster and Huneke proved Conjecture 1.1 for the
90
+ class of Gorenstein rings, [HH94]. Building upon Williams’ proof of Conjecture 1.1 for the
91
+ class of 3-dimensional rings, [Wil95], MacCrimmon proved the weak implies strong conjecture
92
+ for rings which are Q-Gorenstein on the punctured spectrum, [Mac96]. Singh announced that
93
+ Conjecture 1.1 is valid for rings whose anti-canonical algebra4 is Noetherian. Singh’s result
94
+ was never published, but has since been recaptured by others, [CEMS18].
95
+ 2An ideal I ⊆ R is an anti-canonical ideal if it represents the inverse of the canonical divisor in the class
96
+ group of R. Equivalently, there exists a canonical ideal J ⊆ R, with components disjoint from that of I, so
97
+ that I ∩ J is a principal ideal.
98
+ 3Every normal F-pure ring admits an m ≥ 1 with this property, see [Har98, Section 4].
99
+ 4Suppose that R is a normal domain and I ⊆ R is an anti-canonical ideal. The anti-canonical algebra of R
100
+ is the symbolic Rees algebra R ⊕ I ⊕ I(2) ⊕ · · · , an algebra unique up to R-algebra isomorphism.
101
+
102
+ ON THE EQUALITY OF TEST IDEALS
103
+ 3
104
+ Singularities of prime characteristic rings are related to KLT singularities of the complex
105
+ minimal model program through the process of reduction to prime characteristic, [HW02,
106
+ Tak04]. Theorems of the complex minimal model program establish that if R is essentially
107
+ of finite type over C with at worst KLT singularities, then the symbolic Rees algebras
108
+ associated to ideals of pure height 1 are Noetherian. It is therefore natural to expect the
109
+ same in strongly F-regular rings and that the hypotheses of Singh’s Theorem are vacuous.
110
+ Conjecture 1.4. If R is an excellent strongly F-regular ring of prime characteristic p > 0
111
+ and I ⊆ R an ideal of pure height 1. Then the symbolic Rees algebra of I is Noetherian.
112
+ Progress around Conjecture 1.4 is quite limited. An elementary and (mostly) algebraic
113
+ proof of Conjecture 1.4 for the class of 2-dimensional F-regular rings can be derived from
114
+ [Pol22, Corollary 3.2]. Recent progress progress of the minimal model program establishes
115
+ Conjecture 1.4 for the class of 3-dimensional F-regular rings, see [BMP+20, Corollary K]
116
+ and [AP22, Proof of Corollary 4.5] for necessary details.
117
+ In light of Conjecture 1.4, it would be desirable to remove the assumption that the anti-
118
+ canonical algebra of R is Noetherian in Singh’s Theorem and replace it with the milder
119
+ hypothesis that the anti-canonical algebra is assumed to be Noetherian at non-closed points
120
+ of Spec(R). Such a step puts forth a much needed inductive program to establish Conjec-
121
+ ture 1.4, or at the very least establish that the class of F-regular and strongly F-regular
122
+ rings agree. This is what we accomplish and is the main contribution of this article.
123
+ Theorem B. Let (R, m, k) be an excellent weakly F-regular ring of prime characteristic
124
+ p > 0, of Krull dimension d, and I ⊆ R an anti-canonical ideal. Suppose that the anti-
125
+ canonical algebra of R is Noetherian on the punctured spectrum. There exists m ∈ N so that
126
+ I(m) is principal when localized at each height 2 prime and for each 1 ≤ j ≤ d−2 there exists
127
+ an ideal aj of height d − j + 1 such that
128
+ ape
129
+ j Hj
130
+ m
131
+
132
+ R
133
+ I(mpe)
134
+
135
+ = 0
136
+ for every e ∈ N. In particular, the ring R is strongly F-regular by Theorem A.
137
+ 2. Annihilators of Local Cohomology
138
+ This section is devoted to proving Theorem B. Let (R, m, k) be an excellent local normal
139
+ domain of Krull dimension d ≥ 3 and I ⊆ R an ideal of pure height 1. Let W = R \
140
+
141
+ P ∈min(I) P and for each n ∈ N let I(n) = InRW ∩ R denote the nth symbolic power of
142
+ the ideal I. To study the annihilators of Hi
143
+ m(R/I(n)) we will approximate the ideals I(n) by
144
+ ideals of the form (y1, . . . , yh)n where h is “small,” y1, . . . , yh ∈ I, and J denotes the integral
145
+ closure of an ideal J ⊆ R.
146
+ Let J ⊆ R be an ideal and n ∈ N. There are short exact sequences
147
+ 0 → Jn−1
148
+ Jn
149
+ → R
150
+ Jn →
151
+ R
152
+ Jn−1 → 0,
153
+ and so there are exact sequences of local cohomology modules
154
+ Hi
155
+ m
156
+ �Jn−1
157
+ Jn
158
+
159
+ → Hi
160
+ m
161
+ � R
162
+ Jn
163
+
164
+ → Hi
165
+ m
166
+ � R
167
+ Jn−1
168
+
169
+ .
170
+
171
+ 4
172
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
173
+ Our aim is to establish uniform annihilators of the local cohomology modules Hi
174
+ m(Jn−1/Jn)
175
+ that are independent of n. For the sake of convenience, we adopt the following notation:
176
+ • R[Jt] = �
177
+ n≥0 Jntn is the Rees algebra of J;
178
+ • R[Jt, t−1] = �
179
+ n∈N Jntn is the extended Rees algebra of J, i.e. R[Jt, t−1] agrees with
180
+ the Rees algebra R[Jt] in positive degree and contains copies of R in negative degree;
181
+ • R is the integral closure of the Rees algebra R[Jt] in R[t]; R is N-graded and the
182
+ nth graded piece of R is Jn;
183
+ • R[t−1] is the integral closure of the extended Rees algebra R[Jt, t−1] in R[t, t−1]. If
184
+ n ≥ 0 then the nth graded piece of R[t−1] is Jn. The algebra R[t−1] contains copies
185
+ of R in negative degrees.
186
+ If x ∈ R then xHi
187
+ m(Jn−1/Jn) = 0 for all n ∈ N if and only if
188
+ xHi
189
+ m(R[t−1]/(t−1R[t−1]) = 0.
190
+ The Faltings Annihilator Theorem, later generalized by Brodmann, provides a criterion to
191
+ establish such annihilation properties.
192
+ Theorem 2.1 ([BS13, Theorem 9.5.1]). Let S be a Noetherian ring which is the homomor-
193
+ phic image of a regular ring, M a finitely generated S-module, and let a, b ⊆ R be ideals.
194
+ Then
195
+ min{i ∈ N |̸ ∃C : aCHi
196
+ b(M) = 0} = min{depth(MP) + height((b + P)/P) | P ̸∈ V (a)}.
197
+ Our first step towards proving Theorem B is the following lemma.
198
+ Lemma 2.2. Let (R, m, k) be an excellent local Cohen-Macaulay normal domain of Krull
199
+ dimension d and J ⊆ R an ideal generated by at most h elements. Suppose that the associated
200
+ graded algebra �
201
+ n≥0 Jn/Jn+1 ⊗R Rx is Cohen-Macaulay. Then there exists a constant C so
202
+ that
203
+ xCHi
204
+ m(Jn/Jn+1) = 0
205
+ for every 0 ≤ i ≤ d − h − 1 and n ∈ N.
206
+ Proof. Let S = R[t−1] and G = S/t−1S. The lemma is equivalent to the assertion that there
207
+ exists a constant C so that xCHi
208
+ mS(G) = 0 for every 1 ≤ i ≤ d − h − 1. By Theorem 2.1, it
209
+ suffices to show that if P ∈ Spec(S) \ V (xS) then
210
+ depth(GP) + height
211
+ �mS + P
212
+ P
213
+
214
+ ≥ d − h.
215
+ If P ̸∈ V (xS) then GP is Cohen-Macaulay. Therefore
216
+ depth(GP) = dim(GP) = heightS(P) − 1.
217
+ Then, because S is catenary,
218
+ depth(GP) + height
219
+ �mS + P
220
+ P
221
+
222
+ = heightS(P) − 1 + dim(S/P) − dim(S/mS + P)
223
+ = heightS(P) − 1 + d + 1 − heightS(P) − dim(S/mS + P)
224
+ = d − dim(S/mS + P).
225
+
226
+ ON THE EQUALITY OF TEST IDEALS
227
+ 5
228
+ Recall that S is the integral closure of R[t−1] in R[t, t−1]. It follows that S/mS is a finite
229
+ extension of the fiber cone of J, an R/m-algebra of Krull dimension at most h. Therefore
230
+ dim(S/mS + P) ≤ dim(S/mS) = h
231
+ and so depth(GP) + height
232
+
233
+ mS+P
234
+ P
235
+
236
+ ≥ d − h as needed.
237
+
238
+ Remark 2.3. If we are only interested in annihilation properties of H1
239
+ m(Jn/Jn+1), then
240
+ many of the assumptions of Lemma 2.2 are not necessary. One only needs to assume that
241
+ R is an excellent normal domain and J is generated by at most d − 2 elements to conclude
242
+ that there exists a constant C so that mC annihilates H1
243
+ m(Jn/Jn+1) for every n ∈ N. Indeed,
244
+ height(mS + P/P) ≥ 1 for all P ∈ Spec(S) \ V (mS). Thus, to show
245
+ depth(GP) + height(mS + P/P) ≥ 2
246
+ for every P ∈ Spec(S) \ V (mS), it suffices to show that height(mS + P/P) ≥ 2 whenever
247
+ depth(GP) = 0. If depth(GP) = 0 then P ∈ Spec(S) is an associated prime of t−1S. The
248
+ ring S is normal and t−1 is a nonzerodivisor. Therefore every associated prime of t−1S is
249
+ minimal and so dim(GP) = 0. One can now proceed as in the proof of Lemma 2.2 to show
250
+ that height(mS + P/P) ≥ 2.
251
+ Corollary 2.4. Let (R, m, k) be an excellent local Cohen-Macaulay normal domain of Krull
252
+ dimension d and J ⊆ R an ideal generated by at most h elements. Suppose that the ring
253
+ � Jn/Jn+1 ⊗R Rx is Cohen-Macaulay. Then there exists a constant C so that
254
+ xCnHi
255
+ m(R/Jn) = 0
256
+ for every 0 ≤ i ≤ d − h − 1 and n ∈ N.
257
+ Proof. For every i ≥ 0 and for every n ∈ N there are exact sequences of local cohomology
258
+ modules
259
+ Hi
260
+ m(Jn/Jn+1) → Hi
261
+ m(R/Jn+1) → Hi
262
+ m(R/Jn).
263
+ By Lemma 2.2, if i ≤ d − h − 1, then there exists a constant C so that xC annihilates the
264
+ left most module of the above exact sequences for all n ≥ 0. By induction, xCn annihilates
265
+ Hi
266
+ m(R/Jn) for every n ∈ N.
267
+
268
+ Remark 2.5. As in the proof of Lemma 2.2, if we are only interested in annihilation prop-
269
+ erties of H1
270
+ m(R/Jn), then we only need to assume that R is an excellent local normal domain
271
+ and J is generated by at most d − 2 elements.
272
+ Lemma 2.6. Let (R, m, k) be an excellent Noetherian local normal domain with infinite
273
+ residue field, I ⊆ R an ideal, P1, . . . , Pt ∈ Spec(R) a finite collection of non-comparable
274
+ prime ideals, and W = R \
275
+ �t
276
+ i=1 Pi. Suppose that ℓRPi(IRPi) ≤ h for every 1 ≤ i ≤ t. Then
277
+ there exist elements y1, . . . , yh ∈ I and x ∈ W with the following properties:
278
+ (1) (y1, . . . , yh)RW ⊆ IRW is a reduction of IRW;
279
+ (2) xnIn ⊆ (y1, . . ., yh)n for all n ∈ N.
280
+ Proof. Recall the following: Suppose (S, n, ℓ) is a local ring and J ⊆ I are ideals. Then J is
281
+ reduction of I if and only if S[Jt] ⊗S ℓ → S[It] ⊗S ℓ is finite, see [SH06, Proposition 8.2.4].
282
+
283
+ 6
284
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
285
+ In particular, if J′ ⊆ I is an ideal such that J′ ≡ J + nI and J is a reduction of I then J′ is
286
+ a reduction of I.
287
+ To prove the lemma start by choosing elements y1,i, . . . , yh,i ∈ I so that (y1,i, . . . , yh,i)RPi
288
+ forms a reduction of the ideal IRPi. Choose elements rj ∈ Pj \ �
289
+ i̸=j Pi and set yi = � rjyj,i.
290
+ Then (y1, . . . , yh)RPi forms a reduction of IRPi for each 1 ≤ i ≤ t by the above discussion.
291
+ Therefore (y1, . . ., yh)Rw forms a reduction of IRW by [SH06, Propositions 8.1.1.].
292
+ Let J = (y1, . . . , yh). Then JRW = IRW and so there exists an element x ∈ W such
293
+ that xI ⊆ J, in particular xI ⊆ J. Raising the containment to the nth power we find that
294
+ xnIn ⊆ Jn for every n ∈ N. We claim that xnIn ⊆ Jn. Let r ∈ In, then there exists a t ∈ N
295
+ and an equation
296
+ rt + a1rt−1 + · · · + at−1r + at = 0
297
+ such that aj ∈ Inj for each 1 ≤ j ≤ t. Multiplying by xnt we find that there is an equation
298
+ (xnr)t + xna1(xnr)t−1 + · · · xn(t−1)at−1 + xntat = 0.
299
+ The elements xnjaj belong to Jnj and therefore xnr ∈ Jn = Jn.
300
+
301
+ Theorem 2.7. Let (R, m, k) be an excellent local Cohen-Macaulay normal domain of Krull
302
+ dimension d ≥ 3 and I ⊆ R an ideal of pure height 1 with the following properties:
303
+ • InRP = I(n)RP for every P ∈ Spec(R) \ {m} and every n ∈ N;
304
+ • If P ∈ Spec(R) \ {m} and G = R[t−1]/t−1R[t−1] is the associated graded ring of I
305
+ then GP is Cohen-Macaulay.
306
+ Then there exists a system of parameters x1, x2, . . . , xd such that for every 3 ≤ t ≤ d;
307
+ (xn
308
+ 1, . . ., xn
309
+ t )Hj
310
+ m(R/I(n)) = 0
311
+ for every 0 ≤ j ≤ d − (t − 1) and n ∈ N.
312
+ Proof. The ideal I is locally principal at its height 1 components because R is normal.
313
+ Therefore In ⊆ I(n). Our assumptions inform us that I(n)/In is 0-dimensional for every
314
+ integer n. Therefore for every integer i ≥ 1
315
+ Hi
316
+ m(R/In) ∼= Hi
317
+ m(R/I(n)).
318
+ Start by choosing x1 ∈ I. Then clearly xn
319
+ 1 ∈ In and therefore xn
320
+ 1 annihilates Hi
321
+ m(R/In) for
322
+ all integers i and n. If W1 is the complement of the union of the minimal primes of x1R then
323
+ IRW1 is a principal ideal. By Lemma 2.6 there exists an element y ∈ I and x ∈ W1 so that
324
+ xnIn ⊆ ynR for every n ∈ N. There are short exact sequences
325
+ 0 → In
326
+ ynR →
327
+ R
328
+ ynR → R
329
+ In → 0
330
+ and so Hj
331
+ m(R/In) ∼= Hj+1
332
+ m
333
+ (In/ynR) if j ≤ d−3 and there is an injective map Hd−2
334
+ m
335
+ (R/In) →
336
+ Hd−1
337
+ m
338
+ (In/ynR). Therefore xn annihilates Hj
339
+ m(R/In) for every j ≤ d − 2 and we take x2 = x.
340
+ If W2 is the complement of the union of the minimal primes of (x1, x2) then IRW2 has
341
+ analytic spread at most 1, see [CHS10, Proof of Theorem 1.5]. The ring RW2 is normal, every
342
+ principal ideal in a normal ring is integrally closed, and therefore IRW2 is a principal ideal.
343
+ We therefore proceed as before to find an element x3 so that xn
344
+ 3 annihilates Hj
345
+ m(R/In) for
346
+ every j ≤ d − 2 as needed.
347
+
348
+ ON THE EQUALITY OF TEST IDEALS
349
+ 7
350
+ Inductively, suppose that we have found parameter elements x1, . . ., xi, with i ≥ 3, so that
351
+ if 3 ≤ t ≤ i then
352
+ (xn
353
+ 1, . . . , xn
354
+ t )Hj
355
+ m(R/In) = 0
356
+ for every 0 ≤ j ≤ d − (t − 1). It is important that t ≥ 3 in the inductive step of the proof. If
357
+ t = 2 then it is not the case that (xn
358
+ 1, xn
359
+ 2) annihilates Hj
360
+ m(R/In) for every 0 ≤ j ≤ d−(2−1) =
361
+ d − 1. Indeed, the annihilator of the top local cohomology module Hd−1
362
+ m
363
+ (R/In) is the height
364
+ 1 ideal I(n) and (xn
365
+ 1, xn
366
+ 2) ̸⊆ I(n). If i = d then we are done. Suppose that i ≤ d − 1. Our aim
367
+ is to find a parameter element xi+1 so that
368
+ xn
369
+ i+1Hj
370
+ m(R/In) = 0
371
+ for every j ≤ d − i.
372
+ Let W be the complement of the union of the minimal primes of the parameter ideal
373
+ (x1, . . . , xi). Then InRW = I(n)RW for all integers n and so the localization of IRW at
374
+ a maximal ideal of RW is an ideal of analytic spread at most i − 1, see [CHS10, Proof of
375
+ Theorem 1.5]. By Lemma 2.6 there exists elements y1, . . . , yi−1 ∈ I and x′
376
+ i+1 ∈ W so that
377
+ (1) (y1, . . . , yi−1)RW ⊆ IRW is a reduction of IRW;
378
+ (2) (x′
379
+ i+1)nIn ⊆ (y1, . . . , yi−1)n for all n ∈ N.
380
+ Let J = (y1, . . ., yi−1) and consider the short exact sequences
381
+ 0 → In
382
+ Jn → R
383
+ Jn → R
384
+ In → 0.
385
+ The element (x′
386
+ i+1)n annihilates the left-most module in the above short exact sequence and
387
+ there are exact sequences of local cohomology modules
388
+ Hj
389
+ m
390
+ � R
391
+ Jn
392
+
393
+ → Hj
394
+ m
395
+ � R
396
+ In
397
+
398
+ → Hj+1
399
+ m
400
+ � In
401
+ Jn
402
+
403
+ .
404
+ The element (x′
405
+ i+1)n annihilates the right-most module. By our hypothesis that the asso-
406
+ ciated graded ring of I is Cohen-Macaulay on the punctured spectrum of R, Corollary 2.4
407
+ implies that there exists a constant C so that (x′
408
+ i+1)Cn annihilates Hj
409
+ m(R/Jn) for every
410
+ j ≤ d − (i − 1) − 1 = d − i. Therefore (x′
411
+ i+1)C(n+1) annihilates Hj
412
+ m(R/In) for every j ≤ d − i.
413
+ Therefore xi+1 = (x′
414
+ i+1)2C has the desired annihilation properties.
415
+
416
+ Theorem B is a consequence of the following theorem.
417
+ Corollary 2.8. Let (R, m, k) be an excellent local Cohen-Macaulay normal domain of prime
418
+ characteristic p > 0 and Krull dimension d ≥ 3. Suppose that R is a splinter on the punc-
419
+ tured spectrum of R and that the anti-canonical algebra of R is Noetherian on the punctured
420
+ spectrum. Then there exists an ideal I ⊆ R of pure height 1 and parameters x1, . . . , xd with
421
+ the following properties:
422
+ (1) I ∼= ω(−m)
423
+ R
424
+ for some m ≥ 1;
425
+ (2) For each 1 ≤ j ≤ d − 2, the ideal aj := (x1, . . ., xd−j+1) is such that
426
+ a[pe]
427
+ j
428
+ Hj
429
+ m(R/I(pe)) = 0
430
+ for each e ∈ N.
431
+
432
+ 8
433
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
434
+ Proof. Start by choosing an ideal I ⊆ R of pure height 1 so that I ∼= ω(−1)
435
+ R
436
+ is an anti-canonical
437
+ ideal.
438
+ We are assuming that the anti-canonical algebra is Noetherian on the punctured
439
+ spectrum. Therefore if P ∈ Spec(R) \ {m} then there exists an integer m such that the
440
+ Symbolic Rees algebra of I(m)RP is standard graded. The set of prime ideals ∪ Ass(R/I(m)n)
441
+ is a finite set by [Bro79], see also [HS15]. By prime avoidance there exists an s ∈ R\P which
442
+ is contained in each non-minimal member of ∪ Ass(R/I(m)n). Then I(m)nRs = I(mn)Rs for
443
+ every n ∈ N. The space Spec(R\{m} is quasi-compact. Therefore there exists finitely many
444
+ open sets D(s1), . . . , D(St) covering Spec(R \ {m} and integers mi, 1 ≤ i ≤ s, so that for all
445
+ n ∈ N I(mi)nRsi = I(min)Rsi. If m is a common multiple of m1, . . . , ms and then the Symbolic
446
+ Rees algebra of I(m) is standard graded on the punctured spectrum, i.e. I(m)nRP = I(mn)RP
447
+ for all n ∈ N and P ∈ Spec(R) \ {m}. We replace I by I(m). By Theorem 2.7, it suffices to
448
+ show that R is Cohen-Macaulay and that if G = GrI(R) is the associated graded ring of I
449
+ then GP is a Cohen-Macaulay algebra for all P ∈ Spec(R) \ {m}.
450
+ For each non-maximal prime P the localized ring RP is strongly F-regular by [CEMS18,
451
+ Corollary 5.9], see also [Wat94, Theorem 0.1]. Therefore the localized (symbolic) Rees alge-
452
+ bras R[It] ⊗ RP are Cohen-Macaulay for all P ∈ Spec(R) \ {m}, see [CEMS18, Lemma 6.1].
453
+ We may now conclude that GP is a Cohen-Macaulay algebra for all P ∈ Spec(R) \ {m} by
454
+ [Hun82, Proposition 1.1].
455
+
456
+ 3. Tight closure, local cohomology, and local cohomology bounds
457
+ 3.1. Tight closure. Let R be a ring of prime characteristic p > 0 and let R◦ be the
458
+ complement of the union of the minimal primes of R. The eth Frobenius functor, or the
459
+ eth Peskine-Szpiro functor, is the functor F e : Mod(R) → Mod(R) obtained by extending
460
+ scalars along the eth iterate of the Frobenius endomorphism. If N ⊆ M are R-modules and
461
+ m ∈ M, then m is in the tight closure of N relative to M if there exists a c ∈ R◦ such that
462
+ for all e ≫ 0 the element m is in the kernel of the following composition of maps:
463
+ M → M/N → F e(M/N) ·c−→ F e(M/N).
464
+ In particular, if we consider an inclusion of R-modules of the form I ⊆ R then F e(R/I) ∼=
465
+ R/I[pe] where I[pe] = (rpe | r ∈ I), and an element r ∈ R is in the tight closure of I relative
466
+ to R if there exists a c ∈ R◦ such that crpe ∈ I[pe] for all e ≫ 0. The tight closure of the
467
+ module N relative to the module M is denoted N∗
468
+ M. In the case that M = R and N = I is
469
+ an ideal then we denote the tight closure of I relative to R as I∗. We say that N is tightly
470
+ closed in M if N = N∗
471
+ M. If an ideal is tightly closed in R then we simply say that the ideal
472
+ is tightly closed. The finitistic tight closure of N ⊆ M is denoted N∗fg
473
+ M
474
+ and is the union of
475
+ (N ∩ M′)∗
476
+ M′ where M′ runs over all finitely generated submodules of M.
477
+ The notions of weak F-regularity and strong F-regularity can be compared by studying
478
+ the finitistic tight closure and tight closure of the zero submodule of the injective hull of a
479
+ local ring by [HH90, Proposition 8.23] and [Smi93, Proposition 7.1.2]. Suppose that (R, m, k)
480
+ is complete local and ER(k) is the injective hull of the residue field. The finitistic test ideal
481
+ of R is τfg(R) =
482
+
483
+ I⊆R AnnR(I∗/I) and agrees with AnnR(0∗fg
484
+ ER(k)). The (big) test ideal of R
485
+ is τ(R) = �
486
+ N⊆M∈Mod(R) AnnR(N∗
487
+ M/N) and agrees with AnnR(0∗
488
+ ER(k)). The ring R is weakly
489
+ F-regular if and only if τfg(R) = R and R is strongly F-regular if and only if τ(R) = R.
490
+
491
+ ON THE EQUALITY OF TEST IDEALS
492
+ 9
493
+ Thus to prove the conjectured equivalence of weak and strong F-regularity it is enough to
494
+ show 0∗
495
+ ER(k) = 0∗fg
496
+ ER(k) under hypotheses satisfied by rings which are weakly F-regular.
497
+ To explore the tight closure of the zero submodule of ER(k) we exploit the structure of
498
+ ER(k) as a direct limit of 0-dimensional Gorenstein quotients of R described in [Hoc77].
499
+ Suppose (R, m, k) is a complete local Cohen-Macaulay domain of Krull dimension d and
500
+ J1 ⊊ R a canonical ideal. Let 0 ̸= x1 ∈ J1, x2, . . . , xd ∈ R a parameter sequence, and
501
+ for each t ∈ N let It = (xt−1
502
+ 1
503
+ J1, xt
504
+ 2, . . . , xt
505
+ d). The sequences of ideals {It} form a decreasing
506
+ sequence of irreducible m-primary ideals cofinal with {mt}. Moreover, the direct limit system
507
+ lim
508
+ −→ R/It
509
+ ·x1···xd
510
+ −−−−→ R/It+1 is isomorphic to ER(k). The following lemma uses this description of
511
+ the injective hull of the residue field to describe any potential difference between the modules
512
+ 0∗
513
+ ER(k) and 0∗fg
514
+ ER(k). We refer the reader to the discussion at the beginning of [Abe02, Section 2]
515
+ for details.
516
+ Lemma 3.1. Let (R, m, k) be a complete Cohen-Macaulay local ring of prime characteristic
517
+ p > 0 and of Krull dimension d. Let J1 ⊊ R be a choice of canonical ideal and x1, . . . , xd a
518
+ system of parameters such that x1 ∈ J. Make the following identification of ER(k):
519
+ ER(k) ∼= lim
520
+ −→
521
+
522
+ R
523
+ (xt−1
524
+ 1
525
+ J1, xt
526
+ 2, · · · xt
527
+ d)
528
+ ·x1···xd
529
+ −−−−→
530
+ R
531
+ (xt
532
+ 1J1, xt+1
533
+ 2
534
+ , · · · xt+1
535
+ d
536
+ )
537
+
538
+ If η = [r + (xt−1
539
+ 1
540
+ J1, xt
541
+ 2, · · ·xt
542
+ d)] ∈ ER(k) then
543
+ (1) η ∈ 0∗fg
544
+ ER(k) if and only if there exists a c ∈ R◦ and s ∈ N such that for all e ∈ N
545
+ c(r(x1x2 · · · xd)s)pe ∈ (xs+t−1
546
+ 1
547
+ J1, xs+t
548
+ 2
549
+ , . . . , xs+t
550
+ d
551
+ )[pe];
552
+ (2) η ∈ 0∗
553
+ ER(k) if and only if there exists a c ∈ R◦ such that for all e ∈ N there exists an
554
+ s = s(e) such that
555
+ c(r(x1x2 · · · xd)s)pe ∈ (xs+t−1
556
+ 1
557
+ J1, xs+t
558
+ 2
559
+ , . . . , xs+t
560
+ d
561
+ )[pe].
562
+ 3.2. Local Cohomology Bounds. We will relate the modules 0∗fg
563
+ ER(k) and 0∗
564
+ ER(k) in Lemma 3.1
565
+ through the language of local cohomology bounds. To this end, suppose that M is a module
566
+ over a ring R and x = x1, . . ., xd a sequence of elements. For each j ∈ N let xj = xj
567
+ 1, . . ., xj
568
+ d
569
+ and for each pair of integers j1 ≤ j2 let ˜α•
570
+ M;xi;j1;j2 be the map of Kosul cocomplexes
571
+ 0
572
+ � M
573
+ ·xj1
574
+ i
575
+
576
+ =
577
+
578
+ M
579
+
580
+ ·xj2−j1
581
+ i
582
+
583
+ 0
584
+ 0
585
+ � M
586
+ ·xj2
587
+ i
588
+ � M
589
+ � 0
590
+ Let ˜α•
591
+ M;x;j1;j2 be the following product:
592
+ ˜α•
593
+ M;x;j1;j2 := ˜α•
594
+ R;x1;j1;j2 ⊗ ˜α•
595
+ R;x2;j1;j2 ⊗ · · · ⊗ ˜α•
596
+ R;xd;j1;j2 ⊗ M.
597
+ Then ˜α•
598
+ M;x;j1;j2 is a map of Koszul cocomplexes
599
+ K•(xj1; M)
600
+ ˜α•
601
+ M;x;j1;j2
602
+ −−−−−→ K•(xj2; M).
603
+
604
+ 10
605
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
606
+ Let αi
607
+ M;x;j1;j2 denote the induced map of Koszul cohomologies
608
+ Hi(xj1; M)
609
+ αi
610
+ M;x;j1;j2
611
+ −−−−−→ Hi(xj2; M).
612
+ Then
613
+ lim
614
+ −→
615
+ j1≤j2
616
+
617
+ Hi(xj1; M)
618
+ αi
619
+ M;x;j1;j2
620
+ −−−−−→ Hi(xj2; M)
621
+
622
+ ∼= Hi
623
+ (x)R(M)
624
+ by [BH93, Theorem 3.5.6].
625
+ Denote by αi
626
+ M;x;j;∞ the map
627
+ Hi(xj; M)
628
+ αi
629
+ M;x;j;∞
630
+ −−−−−→ Hi
631
+ (x)A(M).
632
+ Observe that η ∈ Ker(αi
633
+ M;x;j;∞) if and only if there exists some k ≥ 0 such that η ∈
634
+ Ker(αi
635
+ M;x;j;j+k). If η ∈ Ker(αi
636
+ M;x;j;∞) we let
637
+ ǫi
638
+ xj(η) = min{k | η ∈ Ker(αi
639
+ M;x;j;j+k)}.
640
+ Definition 3.2. Let R be a ring, x = x1, . . ., xd a sequence of elements in R, and M an
641
+ R-module. The ith local cohomology bound of M with respect to the sequence of elements
642
+ x is
643
+ lcbi(x; M) = sup{ǫi
644
+ xj(η) | η ∈ Ker(αi
645
+ M;x;j;∞) for some j} ∈ N ∪ {∞}.
646
+ Observe that if M is an R-module and x is a sequence of elements, then lcbi(x; M) = N <
647
+ ∞ simply means that if η ∈ Hi(xj; M) represents the 0-element in the direct limit
648
+ lim
649
+ −→
650
+ j1≤j2
651
+
652
+ Hi(xj1; M)
653
+ αi
654
+ M;x;j1;j2
655
+ −−−−−→ Hi(xj2; M)
656
+
657
+ ∼= Hi
658
+ (x)R(M)
659
+ then αi
660
+ M;x;j;j+N(η) is the 0-element of the Koszul cohomology group Hi(xj+N; M). There-
661
+ fore finite local cohomology bounds correspond to a uniform bound of annihilation of zero
662
+ elements in a choice of direct limit system defining a local cohomology module. It would be
663
+ interesting to understand when local cohomology bounds are finite.
664
+ 3.3. Basic properties of local cohomology bounds. Our study of local cohomology
665
+ bounds begins with two useful observations.
666
+ Lemma 3.3. Let R be a commutative Noetherian ring, M an R-module, and x = x1, . . ., xd
667
+ a sequence of elements, then lcbi(xj; M) ≤ lcbi(x; M). Furthermore, lcbi(x; M) ≤ jm for
668
+ some integers j, m if and only if lcbi(xj; M) ≤ m where xj is the sequence of elements
669
+ xj
670
+ 1, . . . , xj
671
+ d.
672
+ Proof. One only has to observe that αi
673
+ M;xj;k,k+m = αi
674
+ M;x;jk,jk+jm.
675
+
676
+ If x1, . . . , xd is a sequence of elements in a ring R and if x1M = 0 for some R-module M
677
+ then the short exact sequence of Koszul cocomplexes
678
+ 0 → K•(x2, . . . , xd; M)(−1) → K•(x1, x2, . . . , xd; M) → K•(x2, . . . , xd; M) → 0
679
+
680
+ ON THE EQUALITY OF TEST IDEALS
681
+ 11
682
+ is split and therefore Hi(x1, x2, . . . , xd; M) ∼= Hi(x2, . . ., xd; M) ⊕ Hi−1(x2, . . . , xd; M). The
683
+ content of the following lemma is a description of the behavior of the maps αi
684
+ M;x1,x2,...,xd;j,j+k
685
+ with respect to these isomorphisms of Koszul cohomologies.
686
+ Lemma 3.4. Let R be a commutative Noetherian ring, M an R-module, and x1, x2, . . ., xd
687
+ a sequence of elements such that x1M = 0. If i, j, k ∈ N then
688
+ Hi(xj
689
+ 1, xj
690
+ 2, . . . , xj
691
+ d; M) ∼= Hi(xj
692
+ 2, . . . , xj
693
+ d; M) ⊕ Hi−1(xj
694
+ 2, . . . , xj
695
+ d; M)
696
+ and the map αM;x1,x2,...,xd;j,j+k is the direct sum of αi
697
+ M;x2,...,xd;j,j+k and the 0-map.
698
+ Proof. Let (F •, ∂•) be the Koszul cocomplex K•(xj
699
+ 2, . . . , xj
700
+ d; R) and let (G•, δ•) be the Koszul
701
+ cocomplex K•(xj
702
+ 1; R). Let
703
+ (L•, γ•) = K•(xj
704
+ 1, xj
705
+ 2, . . . , xj
706
+ d; R) ∼= K•(xj
707
+ 1; R) ⊗ K•(xj
708
+ 2, . . . , xj
709
+ d; R).
710
+ Then Li ∼= (G0 ⊗ F i) ⊕ (G1 ⊗ F i−1) ∼= F i ⊕ F i−1. We abuse notation and let ·xj
711
+ 1 denote the
712
+ multiplication map on F i. The map γi can be thought of as
713
+ γi =
714
+
715
+ ∂i
716
+ 0
717
+ ±xj
718
+ 1
719
+ ∂i−1
720
+
721
+ : F i ⊕ F i−1 → F i+1 ⊕ F i.
722
+ In particular, if we apply −⊗RM the map ·±xj
723
+ 1⊗M is the 0-map and therefore the ith map of
724
+ the Koszul cocomplex Ki(xj
725
+ 1, xj
726
+ 2, . . ., xj
727
+ d; M) is the direct sum of maps (∂i ⊗M)⊕(∂i−1 ⊗M).
728
+ In particular
729
+ Hi(xj
730
+ 1, xj
731
+ 2, . . . , xj
732
+ d; M) ∼= Hi(xj
733
+ 2, . . ., xj
734
+ d; M) ⊕ Hi−1(xj
735
+ 2, . . . , xj
736
+ d; M).
737
+ To see that αM;x1,x2,...,xd;j,j+k is the direct sum of αi
738
+ M;x2,...,xd;j,j+k and the 0-map is similar to
739
+ above argument but uses the fact that
740
+ ˜α•
741
+ M;x1,x2,...,xd;j;j+k = ˜α•
742
+ R;x2,...,xd;j;j+k ⊗ ˜α•
743
+ R;x1;j;j+k ⊗ M
744
+ and ˜α1
745
+ R;x1;j;j+k ⊗ M = 0.
746
+
747
+ A particularly useful corollary of Lemma 3.4 is the following:
748
+ Corollary 3.5. Let R be a commutative Noetherian ring and M an R-module. Suppose
749
+ x1, . . . , xd is a sequence of elements, 1 ≤ i ≤ d, and (x1, . . . , xd−i)M = 0. If j, k ∈ N then
750
+ αℓ
751
+ M;x1,...,xd;j,j+k : Hℓ(xj
752
+ 1, . . . , xj
753
+ d; M) → Hℓ(xj+k
754
+ 1
755
+ , . . ., xj+k
756
+ d
757
+ ; M)
758
+ is the 0-map for all ℓ ≥ i + 1. In particular, lcbℓ(x1, . . . , xd; M) = 1 for all ℓ ≥ i + 1.
759
+ Proof. By multiple applications of Lemma 3.4 it is enough to observe that
760
+ Hℓ(xj
761
+ d−i+1, . . . , xj
762
+ d; M) = 0.
763
+ This is clearly the case since xj
764
+ d−i+1, . . . , xj
765
+ d is a list of i elements and we are examining an
766
+ ℓ ≥ i + 1 Koszul cohomology of M with respect to this sequence.
767
+
768
+
769
+ 12
770
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
771
+ Suppose 0 → M1 → M2 → M3 → 0 is a short exact sequence of R-modules. The next two
772
+ properties of local cohomology bounds we record allow us to compare the local cohomology
773
+ bounds of the modules appearing in the short exact sequence. Proposition 3.6 allows us to
774
+ effectively compare the local cohomology bounds of two of the terms in the sequence provided
775
+ a subset of the elements in the sequence of elements defining Koszul cohomology annihilates
776
+ the third. Proposition 3.7 compares the the local cohomology bounds of two of the terms in
777
+ the short exact whenever the sequence of elements defining Koszul cohomology is a regular
778
+ sequence on the third module.
779
+ Proposition 3.6. Let (R, m, k) be a local ring and
780
+ 0 → M1 → M2 → M3 → 0
781
+ a short exact sequence of finitely generated R-modules. Let x = x1, . . . , xd be a sequence of
782
+ elements of R.
783
+ (1) If (x1, . . ., xd−j)M1 = 0 then for all ℓ ≥ j + 1
784
+ lcbℓ(x; M2) ≤ lcbℓ(x; M3) + 1.
785
+ (2) If (x1, . . ., xd−j)M2 = 0 then for all ℓ ≥ j + 1
786
+ lcbℓ(x; M3) ≤ lcbℓ+1(x; M1) + 1.
787
+ (3) If (x1, . . ., xd−j)M3 = 0 then for all ℓ ≥ j + 1
788
+ lcbℓ(x; M1) ≤ lcbℓ(x; M2) + 1.
789
+ Proof. For each integer j ∈ N let xj denote the sequence of elements xj
790
+ 1, xj
791
+ 2, . . ., xj
792
+ d. For (1)
793
+ we consider the following commutative diagram, whose middle row is exact:
794
+ Hℓ(xj; M2)
795
+ Hℓ(xj; M3)
796
+ Hℓ(xj+k; M1)
797
+ Hℓ(xj+k; M2)
798
+ Hℓ(xj+k; M3)
799
+ Hℓ(xj+k+1; M1)
800
+ Hℓ(xj+k+1; M2)
801
+ αℓ
802
+ M2;x;j;j+k
803
+ αℓ
804
+ M3;x;j;j+k
805
+ αℓ
806
+ M1;x;j+k;j+k+1
807
+ αℓ
808
+ M2;x;j+k;j+k+1
809
+ By Corollary 3.5 the map αℓ
810
+ M1;x;j+k;j+k+1 is the 0-map for all ℓ ≥ j + 1. A straightforward
811
+ diagram chase of the above diagram, which follows an element η ∈ Ker(αℓ
812
+ M2;x;j;j+k′) for some
813
+ k′, shows that η ∈ Ker(αℓ
814
+ M2;x;j;j+k+1) whenever k ≥ lcbℓ(x; M3). In particular, lcbℓ(x; M2) ≤
815
+ lcbℓ(x; M3) + 1.
816
+ Statements (2) and (3) follow in a similar manner and the details are left to the reader.
817
+
818
+ Proposition 3.7. Let R be a commutative Noetherian ring, 0 → M1 → M2 → M3 → 0 a
819
+ short exact sequence of R-modules, and x = x1, . . . , xd a sequence of elements in R.
820
+ (1) If x is a regular sequence on M1 then lcbi(x; M2) = lcbi(x; M3) for all i ≤ d − 1.
821
+ (2) If x is a regular sequence on M2 then lcbi(x; M3) = lcbi+1(x; M1) for all i ≤ d − 1.
822
+ (3) If x is a regular sequence on M3 then lcbi(x; M1) = lcbi(x; M2) for all i ≤ d.
823
+
824
+ ON THE EQUALITY OF TEST IDEALS
825
+ 13
826
+ Proof. The proofs of the three statements are very similar to one another and we only provide
827
+ the details of (1).
828
+ Proof of (1): For i < d we have Hi(xj; M1) = 0 and therefore if i ≤ d − 2 there are
829
+ commutative diagrams
830
+ Hi(xj; M2)
831
+ Hi(xj; M3)
832
+ Hi(xj+k; M2)
833
+ Hi(xj+k; M3)
834
+
835
+ =
836
+ αi
837
+ M2;x;j;j+k
838
+ αi
839
+ M3;x;j;j+k
840
+
841
+ =
842
+ whose horizontal arrows are isomorphisms. It readily follows that lcbi(x; M2) = lcbi(x; M3)
843
+ whenever i ≤ d−2. Because x is a regular sequence on M1 we have that the maps αd
844
+ M1,x,j,j+k
845
+ are injective. Conside the following commutative diagrams whose rows are exact:
846
+ 0
847
+ Hd−1(xj; M2)
848
+ Hd−1(xj; M3)
849
+ Hd(xj; M1)
850
+ 0
851
+ Hd−1(xj+k; M2)
852
+ Hd−1(xj+k; M3)
853
+ Hd(xj+k; M1)
854
+ πj
855
+ αd−1
856
+ M2;x;j;j+k
857
+ δj
858
+ αd−1
859
+ M3;x;j;j+k
860
+ αd
861
+ M1;x;j;j+k
862
+ πj+k
863
+ δj+k
864
+ If η ∈ Ker(αd−1
865
+ M2;x;j,j+k) then πj(η) ∈ Ker(αd−1
866
+ M3;x;j,j+k). The maps πj+k are injective. Therefore
867
+ αd−1
868
+ M2;x;j,j+k(η) = 0 whenever k ≥ lcbd−1(x; M3) and hence lcbd−1(x; M2) ≤ lcbd−1(x; M3).
869
+ To show that lcbd−1(x; M2) ≥ lcbd−1(x; M3) consider an element η ∈ Ker(αd−1
870
+ M3;x;j;j+k). Then
871
+ δj(η) ∈ Ker(αd
872
+ M1;x;j;j+k). But the maps αd
873
+ M1;x;j;j+k are injective and therefore δj(η) = 0. In
874
+ particular, η = πj(η′) for some η′ ∈ Hd−1(xj; M2). The maps πj+k are all injective. Therefore
875
+ η′ ∈ Ker(αd−1
876
+ M1;x;j;j+k) and it follows that αd−1
877
+ M2;x;j;j+k(η) = 0 whenever k ≥ lcbd−1(x; M2).
878
+ Therefore lcbd−1(x; M2) ≥ lcbd−1(x; M3) and hence lcbd−1(x; M2) = lcbd−1(x; M3).
879
+ This
880
+ completes the proof of (1).
881
+
882
+ 4. Equality of test ideals
883
+ Theorem A is a consequence of Theorem 4.2 and Theorem 4.9. Theorem 4.2 is an explicit
884
+ relationship between local cohomology bounds and equality of test ideals.
885
+ Theorem 4.9,
886
+ when paired with Proposition 4.8, provides the needed local cohomology bounds described
887
+ in Theorem 4.9 whenever we are able to linearly compare the annihilators of Hi
888
+ m(R/I(n)) as
889
+ n → ∞ and I ∼= ω(−m)
890
+ R
891
+ is a multiple of an anti-canonical ideal.
892
+ 4.1. Local Cohomology bounds and equality of test ideals. The content of the fol-
893
+ lowing lemma can be pieced together by work of the first author in [Abe02]. We refer the
894
+ reader to [PT18, Lemma 6.7] for a direct presentation of the lemma.5
895
+ Lemma 4.1. Suppose that (R, m, k) is a Cohen-Macaulay local normal domain of dimension
896
+ d, and J ⊆ R an ideal of pure height 1. Let x1, . . . , xd ∈ R be a system of parameters for R,
897
+ assume that x1 ∈ J, and fix e ∈ N.
898
+ 5In [PT18, Lemma 6.7] there is an assumption that R is complete. But observe that since R → �R is faithfully
899
+ flat the claims of the lemma can be checked after completion.
900
+
901
+ 14
902
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
903
+ (1) If x2J ⊆ a2R for some a2 ∈ J, then for any non-negative integers N2, . . . , Nd with
904
+ N2 ≥ 2, we have that
905
+ ((J(pe), xN2pe
906
+ 2
907
+ , xN3pe
908
+ 3
909
+ , . . . , xNdpe
910
+ d
911
+ ) : x(N2−1)pe
912
+ 2
913
+ )
914
+ =
915
+ ((J[pe], xN2pe
916
+ 2
917
+ , xN3pe
918
+ 3
919
+ , . . ., xNdpe
920
+ d
921
+ ) : x(N2−1)pe
922
+ 2
923
+ )
924
+ =
925
+ ((J[pe], x2pe
926
+ 2 , xN3pe
927
+ 3
928
+ , . . . , xNdpe
929
+ d
930
+ ) : xpe
931
+ 2 ).
932
+ (2) Suppose xm
933
+ 3 J(m) ⊆ a3R ⊆ J(m) for some n ∈ N, then for any non-negative integers
934
+ N2, . . . , Nd with N3 ≥ 2, we have that
935
+ ((J(pe), xN2pe
936
+ 2
937
+ , xN3pe
938
+ 3
939
+ . . . , xNdpe
940
+ d
941
+ ) : x(N3−1)pe
942
+ 3
943
+ )
944
+
945
+ ((J(pe), xN2pe
946
+ 2
947
+ , x2pe
948
+ 3 , . . . , xNdpe
949
+ d
950
+ ) : xm
951
+ 1 xpe
952
+ 3 ).
953
+ Theorem 4.2. Let (R, m, k) be a local normal Cohen-Macaulay domain of Krull dimension
954
+ d and of prime characteristic p > 0. Assume that R has a test element. Let J1 ⊆ R be a
955
+ choice of canonical ideal. Suppose x1, . . ., xd is a system of parameters of R, x1 ∈ J1, and
956
+ suppose that the following conditions are met:
957
+ • There exists element a2 ∈ J1 and a3 ∈ J(m)
958
+ 1
959
+ such that x2J1 ⊆ a2R and xm
960
+ 3 J(m)
961
+ 1
962
+ ⊆ a3R;6
963
+ • For each e ∈ N there exists an integer ℓ such that
964
+ lcbd−1(xℓ
965
+ 2, xℓ
966
+ 3, x4, . . . , xd; R/J(mpe+1)
967
+ 1
968
+ ) ≤ pe + 1.
969
+ Then 0∗fg
970
+ ER(k) = 0∗
971
+ ER(k).
972
+ Proof. Identify ER(k) as
973
+ ER(k) ∼= lim
974
+ −→
975
+
976
+ R
977
+ (xt−1
978
+ 1
979
+ J1, xt
980
+ 2, . . . , xt
981
+ d)
982
+ ·x1x2···xd
983
+ −−−−−→
984
+ R
985
+ (xt
986
+ 1J1, xt+1
987
+ 2
988
+ , . . . , xt+1
989
+ d
990
+ )
991
+
992
+ .
993
+ Suppose that η = [r + (xt−1
994
+ 1
995
+ J1, xt
996
+ 2, . . . , xt
997
+ d)] ∈ 0∗
998
+ ER(k). Equivalently, there exists a c ∈ R◦ such
999
+ that for all e ∈ N
1000
+ 0 = cηpe = [crpe + (xt−1
1001
+ 1
1002
+ J1, xt
1003
+ 2, . . . , xt
1004
+ d)] ∈ F e(ER(k)) ∼= lim
1005
+ −→
1006
+
1007
+ R
1008
+ (xt−1
1009
+ 1
1010
+ J1, xt
1011
+ 2, . . ., xt
1012
+ d)[pe]
1013
+
1014
+ .
1015
+ Let J = xt−1
1016
+ 1
1017
+ J1 and consider the local cohomology module
1018
+ Hd−1
1019
+ m
1020
+ � R
1021
+ J[pe]
1022
+
1023
+ = lim
1024
+ −→
1025
+
1026
+ R
1027
+ J[pe] + (xt
1028
+ 2, . . . , xt
1029
+ d)
1030
+ ·x2···xd
1031
+ −−−−→
1032
+ R
1033
+ J[pe] + (xt+1
1034
+ 2
1035
+ , . . . , xt+1
1036
+ d
1037
+ )
1038
+
1039
+ .
1040
+ Claim 4.3. Let
1041
+ αpe = [rpe + (xtpe
1042
+ 2 , . . . , xtpe
1043
+ d )] ∈ Hd−1
1044
+ m
1045
+ � R
1046
+ J[pe]
1047
+
1048
+ ,
1049
+ then cαpe = [crpe + (xt
1050
+ 2, . . . , xt
1051
+ d)[pe]] is the 0-element of Hd−1
1052
+ m
1053
+ (R/J[pe]).
1054
+ 6This property is automatic if RP is Q-Gorenstein for each height 2 prime ideal P ∈ Spec(R). Recall that a
1055
+ local normal Cohen-Macaulay domain R with canonical ideal J ⊆ R is Q-Gorenstein if there exists a m ≥ 1
1056
+ such that J(m) is a principal ideal.
1057
+
1058
+ ON THE EQUALITY OF TEST IDEALS
1059
+ 15
1060
+ Proof of Claim. The element [crpe + (xt−1
1061
+ 1
1062
+ J1, xt
1063
+ 2, . . . , xt
1064
+ d)] is the 0-element of
1065
+ lim
1066
+ −→
1067
+
1068
+ R
1069
+ (xt−1
1070
+ 1
1071
+ J1, xt
1072
+ 2, . . ., xt
1073
+ d)[pe]
1074
+
1075
+ .
1076
+ Therefore there exists an s ∈ N such that
1077
+ crpe(x1x2 · · · xd)spe ∈ (xt+s−1
1078
+ 1
1079
+ J1, xt+s
1080
+ 2
1081
+ , . . ., xt+s
1082
+ d
1083
+ )[pe] = (x(t+s−1)pe
1084
+ 1
1085
+ J[pe]
1086
+ 1
1087
+ , x(t+s)pe
1088
+ 2
1089
+ , . . . , x(t+s)pe
1090
+ d
1091
+ ).
1092
+ So there exists an element j1 ∈ J[pe]
1093
+ 1
1094
+ such that
1095
+ crpe(x1x2 · · · xd)spe − x(t+s−1)pe
1096
+ 1
1097
+ j1 ∈ (x(t+2)pe
1098
+ 2
1099
+ , . . . , x(t+s)pe
1100
+ d
1101
+ ).
1102
+ The sequence x1, x2, . . . , xd is a regular sequence and so
1103
+ crpe(x2 · · · xd)spe − x(t−1)pe
1104
+ 1
1105
+ j1 ∈ (x(t+s)pe
1106
+ 2
1107
+ , . . . , x(t+s)pe
1108
+ d
1109
+ ).
1110
+ Hence
1111
+ crpe(x2 · · · xd)spe ∈ (x(t−1)pe
1112
+ 1
1113
+ J[pe]
1114
+ 1
1115
+ , x(t+s)pe
1116
+ 2
1117
+ , . . . , x(t+s)pe
1118
+ d
1119
+ ) = (J[pe], x(t+s)pe
1120
+ 2
1121
+ , . . . , x(t+s)pe
1122
+ d
1123
+ ),
1124
+ which proves the claim.
1125
+
1126
+ Choose e0 ∈ N≥1 so that pe ≥ mpe−e0 + 1 for all e ≫ 0. If e ≫ 0 then
1127
+ J[pe] ⊆ J(pe) ⊆ J(mpe−e0+1).
1128
+ Fix e ≫ 0 and consider the local cohomology module
1129
+ Hd−1
1130
+ m
1131
+
1132
+ R
1133
+ J(mpe−e0+1)
1134
+
1135
+ ∼= lim
1136
+ −→
1137
+
1138
+ R
1139
+ (J(mpe−e0+1), xt
1140
+ 2, . . ., xt
1141
+ d)
1142
+
1143
+ .
1144
+ Let ˜αpe denote the image of αpe in Hd−1
1145
+ m
1146
+ (R/J(mpe−e0+1)) induced by the projection R/J[pe] →
1147
+ R/J(mpe−e0+1). By Claim 4.3
1148
+ 0 = c˜αpe = [crpe +(xtpe
1149
+ 2 , . . ., xtpe
1150
+ d )] ∈ Hd−1
1151
+ m
1152
+
1153
+ R
1154
+ J(mpe−e0+1)
1155
+
1156
+ ∼= lim
1157
+ −→
1158
+
1159
+ R
1160
+ J(mpe−e0+1) + (xt
1161
+ 2, . . . , xt
1162
+ d)
1163
+
1164
+ .
1165
+ There are short exact sequences
1166
+ 0 →
1167
+ R
1168
+ J(mpe−e0+1)
1169
+ 1
1170
+ ·x(t−1)(mpe−e0 +1)
1171
+ 1
1172
+ −−−−−−−−−−→
1173
+ R
1174
+ J(mpe−e0+1) →
1175
+ R
1176
+ x(t−1)(mpe−e0 +1)
1177
+ 1
1178
+ R
1179
+ → 0.
1180
+ Let ℓ be a choice of integer, which depends on e − e0, as in the statement of the theo-
1181
+ rem. The sequence xℓ
1182
+ 2, xℓ
1183
+ 3, x4, . . . , xd is a regular sequence on R/x(t−1)(mpe−e0 +1)
1184
+ 1
1185
+ R. By (3) of
1186
+ Proposition 3.7 we have that
1187
+ lcbd−1(xℓ
1188
+ 2, xℓ
1189
+ 3, x4, . . . , xd; R/J(mpe−e0+1)
1190
+ 1
1191
+ ) = lcbd−1(xℓ
1192
+ 2, xℓ
1193
+ 3, x4, . . . , xd; R/J(mpe−e0+1)),
1194
+ and so by assumption
1195
+ lcbd−1(xℓ
1196
+ 2, xℓ
1197
+ 3, x4, . . . , xd; R/J(mpe−e0+1)) ≤ pe−e0 + 1 ≤ pe.
1198
+ Recall that
1199
+ 0 = [crpe + (xtpe
1200
+ 2 , . . . , xtpe
1201
+ d )] = [crpe(xt
1202
+ 2xt
1203
+ 3)(ℓ−1)pe + (xtℓpe
1204
+ 2
1205
+ , xtℓpe
1206
+ 3
1207
+ , xtpe
1208
+ 4
1209
+ . . . , xtpe
1210
+ d )]
1211
+
1212
+ 16
1213
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
1214
+ as an element of Hd−1
1215
+ m
1216
+ (R/J(mpe−e0+1)). By Lemma 3.3,
1217
+ lcbd−1(xtℓ
1218
+ 2 , xtℓ
1219
+ 3 , xt
1220
+ 4, . . . , xt
1221
+ d; R/J(mpe−e0+1)) ≤ lcbd−1(xℓ
1222
+ 2, xℓ
1223
+ 3, x4, . . . , xd; R/J(mpe−e0+1)) ≤ pe,
1224
+ so
1225
+ (4.1)
1226
+ c(rxt
1227
+ 4 · · · xt
1228
+ d)pe(xt
1229
+ 2xt
1230
+ 3)ℓpe ∈ (J(mpe−e0+1), xt(ℓ+1)pe
1231
+ 2
1232
+ , xt(ℓ+1)pe
1233
+ 3
1234
+ , x2tpe
1235
+ 4
1236
+ , . . . , x2tpe
1237
+ d
1238
+ ).
1239
+ Notice that xtpe0
1240
+ 1
1241
+ ∈ J(pe0) and so
1242
+ xtpe0
1243
+ 1
1244
+ J(mpe−e0+1) ⊆ xtpe0
1245
+ 1
1246
+ J(pe−e0) ⊆ J(pe).
1247
+ We therefore multiply the containment (4.1) by xtpe0
1248
+ 1
1249
+ and obtain that
1250
+ cxtpe0
1251
+ 1
1252
+ (rxt
1253
+ 4 · · ·xt
1254
+ d)pe(xt
1255
+ 2xt
1256
+ 3)ℓpe ∈ (J(pe), xt(ℓ+1)pe
1257
+ 2
1258
+ , xt(ℓ+1)pe
1259
+ 3
1260
+ , x2tpe
1261
+ 4
1262
+ , . . . , x2tpe
1263
+ d
1264
+ ).
1265
+ Therefore
1266
+ cxtpe0
1267
+ 1
1268
+ (rxt
1269
+ 4 · · · xt
1270
+ d)pe(xt
1271
+ 2)ℓpe ∈ (J(pe), (xt
1272
+ 2)(ℓ+1)pe, (xt
1273
+ 3)(ℓ+1)pe, x2tpe
1274
+ 4
1275
+ , . . . , x2tpe
1276
+ d
1277
+ ) : xtℓpe
1278
+ 3
1279
+ .
1280
+ We utilize the assumption that xm
1281
+ 3 J(m)
1282
+ 1
1283
+ ⊆ a2R ⊆ J(m)
1284
+ 1
1285
+ to conclude that;
1286
+ xm
1287
+ 3 J(m) = xm
1288
+ 3 (xt−1
1289
+ 1
1290
+ J1)(m) = x(t−1)m
1291
+ 1
1292
+ xm
1293
+ 3 J(m)
1294
+ 1
1295
+ ⊆ x(t−1)m
1296
+ 1
1297
+ a2R ⊆ x(t−1)m
1298
+ 1
1299
+ J(m)
1300
+ 1
1301
+ ⊆ J(m).
1302
+ Therefore xtm
1303
+ 3 J(m) ⊆ x(t−1)m
1304
+ 1
1305
+ a2R ⊆ J(m) and we apply (2) of Lemma 4.1 with respect to xt
1306
+ 3
1307
+ and N3 = ℓ + 1 to conclude that
1308
+ cxtpe0
1309
+ 1
1310
+ (rxt
1311
+ 4 · · · xt
1312
+ d)pe(xt
1313
+ 2)ℓpe ∈ (J(pe), (xt
1314
+ 2)(ℓ+1)pe, x2tpe
1315
+ 3
1316
+ , x2tpe
1317
+ 4
1318
+ , . . . , x2tpe
1319
+ d
1320
+ ) : xtm
1321
+ 1 xtpe
1322
+ 3 .
1323
+ Equivalently,
1324
+ cxt(m+pe0)
1325
+ 1
1326
+ (rxt
1327
+ 3xt
1328
+ 4 · · · xt
1329
+ d)pe(xt
1330
+ 2)ℓpe ∈ (J(pe), (xt
1331
+ 2)(ℓ+1)pe, x2tpe
1332
+ 3
1333
+ , x2tpe
1334
+ 4
1335
+ , . . . , x2tpe
1336
+ d
1337
+ ).
1338
+ Similarly, we are able to apply (1) of Lemma 4.1 with respect to the element xt
1339
+ 2 and obtain
1340
+ that
1341
+ cxt(m+pe0 )
1342
+ 1
1343
+ (rxt
1344
+ 2xt
1345
+ 3xt
1346
+ 4 · · · xt
1347
+ d)pe ∈ (J[pe], x2tpe
1348
+ 2
1349
+ , x2tpe
1350
+ 3
1351
+ , x2tpe
1352
+ 4
1353
+ , . . ., x2tpe
1354
+ d
1355
+ ) = (J, x2t
1356
+ 2 , x2t
1357
+ 3 , . . . , x2t
1358
+ d )[pe].
1359
+ The element cxt(m+pe0)
1360
+ 1
1361
+ does not depend on e and therefore
1362
+ rxt
1363
+ 2xt
1364
+ 3xt
1365
+ 4 · · · xt
1366
+ d ∈ (J, x2t
1367
+ 2 , x2t
1368
+ 3 , . . . , x2t
1369
+ d )∗.
1370
+ In particular,
1371
+ η = [r + (xt−1
1372
+ 1
1373
+ J1, xt
1374
+ 2, . . . , xt
1375
+ d)] = [rxt
1376
+ 2xt
1377
+ 3xt
1378
+ 4 + (J, x2t
1379
+ 2 , . . . , x2t
1380
+ d )] ∈ 0∗fg
1381
+ ER(k)
1382
+ as claimed.
1383
+
1384
+
1385
+ ON THE EQUALITY OF TEST IDEALS
1386
+ 17
1387
+ 4.2. S2-ification, higher Ext-modules, and local cohomology. We begin with two
1388
+ lemmas that experts may already be aware of.
1389
+ Lemma 4.4. Let (S, m, k) be a Cohen-Macaulay local domain and M a finitely generated
1390
+ S-module such that ht(AnnS(M)) = h. Then Exth
1391
+ S(M, S) is an (S2)-module over its support.
1392
+ Proof. Let (F•, ∂•) be the minimal free resolution of M, let (−)∗ denote HomS(−, S), and
1393
+ consider the dual complex (F ∗
1394
+ • , ∂∗
1395
+ •). Because ht(AnnS(M)) = h we have that the following
1396
+ complex is exact:
1397
+ 0 → F ∗
1398
+ 0
1399
+ ∂∗
1400
+ 1
1401
+ −→ F ∗
1402
+ 1 → . . . → F ∗
1403
+ h−1
1404
+ ∂∗
1405
+ h
1406
+ −→ F ∗
1407
+ h → Coker(∂∗
1408
+ h) → 0.
1409
+ In particular, depth(Coker(∂∗
1410
+ h)) = d − h. Moreover, there is a short exact sequence
1411
+ 0 → Exth
1412
+ S(M, S) → Coker(∂∗
1413
+ h) → Im(∂∗
1414
+ h+1) → 0.
1415
+ The module Im(∂∗
1416
+ h+1) is torsion-free and therefore has depth at least 1. If d − h ≥ 2 then
1417
+ Exth
1418
+ S(M, S) has depth at least 2. If d−h = 1 then the depth of Exth
1419
+ S(M, S) is 1. If d−h = 0
1420
+ then M is 0-dimensional. Therefore if ht(AnnS(M)) = h then Exth
1421
+ S(M, S) is an (S2)-module
1422
+ over its support.
1423
+
1424
+ Continue to consider the ring S, the module M, and the resolution (F•, ∂•) as above.
1425
+ Suppose further S is a regular local ring and hence every finitely generated S-module has
1426
+ a finite free resolution.
1427
+ Consider the minimal free resolution (G•, δ•) of Exth
1428
+ S(M, S).
1429
+ If
1430
+ depth(M) = d − h is maximal, then Exth
1431
+ S(M, S) = Coker(∂∗
1432
+ h) and therefore (G•, δ•) is the
1433
+ complex
1434
+ 0 → F ∗
1435
+ 0
1436
+ ∂∗
1437
+ 1
1438
+ −→ F ∗
1439
+ 1 → . . . → F ∗
1440
+ h−1
1441
+ ∂∗
1442
+ h
1443
+ −→ F ∗
1444
+ h → 0.
1445
+ In particular, if depth(M) = d − h then Exth
1446
+ S(Exth
1447
+ S(M, S), S) ∼= M. Suppose depth(M) <
1448
+ d − h and let (F ∗
1449
+ • , ∂∗
1450
+ •)tr be the complex obtained by truncating (F ∗
1451
+ • , ∂∗
1452
+ •) at the hth spot.
1453
+ That is (F ∗
1454
+ • , ∂∗
1455
+ •)tr is the minimal free resolution of Coker(∂∗
1456
+ h). Then the natural inclusion
1457
+ Exth
1458
+ S(M, S) ⊆ Coker(∂∗
1459
+ h) lifts to a map of complexes (G•, δ•) → (F ∗
1460
+ • , ∂∗
1461
+ •)tr and therefore there
1462
+ is an induced natural map M → Exth
1463
+ S(Exth
1464
+ S(M, S), S). The map M → Exth
1465
+ S(Exth
1466
+ S(M, S), S)
1467
+ is an isomorphism whenever M is a (maximal) Cohen-Macaulay module over its support.
1468
+ Lemma 4.5. Let (R, m, k) be a complete local normal domain of dimension at least 3 and
1469
+ J ⊆ R a pure height 1 ideal.
1470
+ Suppose (S, n, k) is a regular local ring mapping onto R,
1471
+ R ∼= S/P, and ht(P) = h. Then for every integer i the kernel of the natural map R/Ji →
1472
+ Exth+1
1473
+ S
1474
+ (Exth+1
1475
+ S
1476
+ (R/Ji, S), S) is J(i)/Ji. In particular, for every integer i there is a natural
1477
+ inclusion R/J(i) ⊆ Exth+1
1478
+ S
1479
+ (Exth+1
1480
+ S
1481
+ (R/Ji, S), S). Moreover, the natural inclusion R/J(i) ⊆
1482
+ Exth+1
1483
+ S
1484
+ (Exth+1
1485
+ S
1486
+ (R/Ji, S), S) is an isomorphism whenever localized at prime ideal p ∈ V (J)
1487
+ such that (R/J(i))p is Cohen-Macaulay.
1488
+ Proof. It only remains to show that the kernel of R/Ji → Exth+1
1489
+ S
1490
+ (Exth+1
1491
+ S
1492
+ (R/Ji, S), S) is
1493
+ J(i)/Ji. But this follows from the observation that the map
1494
+ R/Ji → Exth+1
1495
+ S
1496
+ (Exth+1
1497
+ S
1498
+ (R/Ji, S), S)
1499
+ is an isomorphism when localized at any minimal component of J by the discussion proceed-
1500
+ ing the statement of the lemma.
1501
+
1502
+
1503
+ 18
1504
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
1505
+ We record a corollary of Lemma 4.5 for future reference.
1506
+ Corollary 4.6. Let (R, m, k) be a complete local Cohen-Macaulay domain, which is Q-
1507
+ Gorenstein in codimension 2, and J1 ⊊ R a choice of canonical ideal. Let m ∈ N be an
1508
+ integer such that J(m)
1509
+ 1
1510
+ is principal in codimension 2.
1511
+ Suppose (S, n, k) is a regular local
1512
+ ring mapping onto R, R ∼= S/P, and ht(P) = h.
1513
+ Then for every integer i the natural
1514
+ inclusion R/J(mi+1)
1515
+ 1
1516
+ → Exth+1
1517
+ S
1518
+ (Exth+1
1519
+ S
1520
+ (R/Jmi+1
1521
+ 1
1522
+ , S), S) is an isomorphism whenever localized
1523
+ at a prime ideal of R of height 2 or less.
1524
+ Proof. Immediate by Lemma 4.5 since J(mi+1)
1525
+ 1
1526
+ Rp ∼= J1Rp is a canonical ideal whenever p is
1527
+ a prime of R of height 2 or less.
1528
+
1529
+ The next proposition and theorem provide the linear bound of top local cohomology
1530
+ bounds of the family of R-modules
1531
+
1532
+ R/J(mpe+1)
1533
+ 1
1534
+
1535
+ described in Theorem 4.2 whenever there
1536
+ exists an ideal I ⊆ R of pure height 1 and parameters x1, . . . , xd with the following properties:
1537
+ (1) I ∼= ω(−h)
1538
+ R
1539
+ for some h ≥ 1 and I is principal in codimension 2;
1540
+ (2) For each 1 ≤ j ≤ d − 2, the ideal aj := (x1, . . ., xd−j+1) is such that
1541
+ a[pe]
1542
+ j
1543
+ Hj
1544
+ m(R/I(pe)) = 0
1545
+ for each e ∈ N.
1546
+ We first provide a lemma. In the following lemma we let (−)∨ denote the Matlis dual functor.
1547
+ Lemma 4.7. Let (R, m, k) be a local normal Cohen-Macaulay domain of Krull dimension
1548
+ d and Q-Gorenstein in codimension 2. Assume that R has a test element. Let J1 ⊆ R be a
1549
+ choice of canonical ideal and m ∈ N such that J(m)
1550
+ 1
1551
+ is principal in codimension 2. Suppose S
1552
+ is a regular local ring of Krull dimension d + h mapping onto R, R ∼= S/P, and ht(P) = h.
1553
+ Suppose that I1 ⊆ R is an ideal of pure height 1 with components disjoint from those of J1,
1554
+ I1 ∩ J1 = x1R is principal. Then
1555
+ Hj−1
1556
+ m
1557
+ � R
1558
+ I(mi)
1559
+ 1
1560
+
1561
+ ∼=
1562
+
1563
+ Extd+h−j
1564
+ S
1565
+
1566
+ Exth+1
1567
+ S
1568
+
1569
+ R
1570
+ J(mi+1)
1571
+ 1
1572
+ , S
1573
+
1574
+ , S
1575
+ ��∨
1576
+ for all j ≤ d − 2.
1577
+ Proof. There are isomorphisms
1578
+ Exth+1
1579
+ S
1580
+
1581
+ R
1582
+ J(mi+1)
1583
+ 1
1584
+ , S
1585
+
1586
+ ∼= ωR/J(mi+1)
1587
+ 1
1588
+ ∼= Ext1
1589
+ R
1590
+
1591
+ R
1592
+ J(mi+1)
1593
+ 1
1594
+ , J1
1595
+
1596
+ .
1597
+ (4.2)
1598
+ Consider the short exact sequences
1599
+ 0 → J(mi+1)
1600
+ 1
1601
+ → R →
1602
+ R
1603
+ J(mi+1)
1604
+ 1
1605
+ → 0.
1606
+ Then there is a resulting short exact sequence
1607
+ 0 → J1 → HomR(J(mi+1)
1608
+ 1
1609
+ , J1) → Ext1
1610
+ R
1611
+
1612
+ R
1613
+ J(mi+1)
1614
+ 1
1615
+ , J1
1616
+
1617
+ → 0.
1618
+ (4.3)
1619
+
1620
+ ON THE EQUALITY OF TEST IDEALS
1621
+ 19
1622
+ But I1 ∩ J1 is principal, I1 and J1 have disjoint components, therefore J1 ∼= I(mi)
1623
+ 1
1624
+ ∩ J(mi+1)
1625
+ 1
1626
+ and so
1627
+ HomR(J(mi+1)
1628
+ 1
1629
+ , J1) ∼= HomR(J(mi+1)
1630
+ 1
1631
+ , I(mi)
1632
+ 1
1633
+ ∩ J(mi+1)
1634
+ 1
1635
+ ) ∼= I(mi)
1636
+ 1
1637
+ .
1638
+ (4.4)
1639
+ The ideal J1 is a maximal Cohen-Macaulay R-module. By (4.2), (4.3), and (4.4), if j ≤ d−2
1640
+ then
1641
+ Extd+h−j
1642
+ S
1643
+
1644
+ Exth+1
1645
+ S
1646
+
1647
+ R
1648
+ J(mi+1)
1649
+ 1
1650
+ , S
1651
+
1652
+ , S
1653
+
1654
+ ∼= Extd+h−j
1655
+ S
1656
+
1657
+ I(mi)
1658
+ 1
1659
+ , S
1660
+
1661
+ .
1662
+ Consider the short exact sequence
1663
+ 0 → I(mi)
1664
+ 1
1665
+ → R →
1666
+ R
1667
+ I(mi)
1668
+ 1
1669
+ → 0.
1670
+ Then
1671
+ Extd+h−j
1672
+ S
1673
+
1674
+ I(mi)
1675
+ 1
1676
+ , S
1677
+ � ∼= Extd+h−(j−1)
1678
+ S
1679
+ � R
1680
+ I(mi)
1681
+ 1
1682
+ , S
1683
+
1684
+ .
1685
+ An application of Matlis duality now completes the proof as
1686
+
1687
+ Extd+h−(j−1)
1688
+ S
1689
+ � R
1690
+ I(mi)
1691
+ 1
1692
+ , S
1693
+ ��∨
1694
+ ∼= Hj−1
1695
+ m
1696
+ � R
1697
+ I(mi)
1698
+ 1
1699
+
1700
+ .
1701
+
1702
+ Proposition 4.8. Let (R, m, k) be a local normal Cohen-Macaulay domain of Krull dimen-
1703
+ sion d and Q-Gorenstein in codimension 2. Let p > 0 be a natural number. Let J1 ⊆ R be a
1704
+ choice of canonical ideal and m ∈ N such that J(m)
1705
+ 1
1706
+ is principal in codimension 2. Suppose S
1707
+ is a regular local ring mapping onto R, R ∼= S/P, and ht(P) = h. Suppose that I1 ⊆ R is an
1708
+ ideal of pure height 1 with components disjoint from those of J1, I1 ∩ J1 = x1R is principal,
1709
+ and parameters x1, x2 . . . , xd with the property that for each 1 ≤ j ≤ d − 2, the parameter
1710
+ ideal (x2, . . . , xd−j+1) is such that
1711
+ (xpe
1712
+ 2 , . . . , xpe
1713
+ d−j+1)Hj
1714
+ m(R/I(mpe)
1715
+ 1
1716
+ ) = 0
1717
+ for each e ∈ N. Then for all e ∈ N
1718
+ lcbd−1(xd−1
1719
+ 2
1720
+ , xd−1
1721
+ 3
1722
+ , . . ., xd−1
1723
+ d
1724
+ ; Exth+1
1725
+ S
1726
+ (Exth+1
1727
+ S
1728
+ (R/J(mpe+1)
1729
+ 1
1730
+ , S), S)) ≤ pe.
1731
+ Proof. Let (F•, ∂•) be the minimal free S-resolution of Exth+1
1732
+ S
1733
+ (R/J(mpe+1)
1734
+ 1
1735
+ , S). Denote by
1736
+ (−)∗ the functor HomS(−, S) and consider the dualized complex (F ∗
1737
+ • , ∂∗
1738
+ •). For every j ≥ 1
1739
+ there are short exact sequences
1740
+ 0 → Exth+j
1741
+ S
1742
+ (Exth+1
1743
+ S
1744
+ (R/J(mpe+1)
1745
+ 1
1746
+ , S), S) → Coker(∂∗
1747
+ h+j) → Im(∂∗
1748
+ h+j+1) → 0
1749
+ and
1750
+ 0 → Im(∂∗
1751
+ h+j+1) → F ∗
1752
+ h+j+1 → Coker(∂∗
1753
+ h+j+1) → 0.
1754
+ Let Je denote the preimage of J(mpe+1)
1755
+ 1
1756
+ in S, an ideal of height h + 1.
1757
+ The S-module
1758
+ Coker(∂∗
1759
+ h+1) has projective dimension h + 1 and the ideal Je annihilates the submodule
1760
+ Exth+1
1761
+ S
1762
+ (Exth+1
1763
+ S
1764
+ (R/J(mpe+1)
1765
+ 1
1766
+ , S), S). By prime avoidance, and abuse of notation, we may lift
1767
+
1768
+ 20
1769
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
1770
+ x = x2, . . ., xd to elements of S and assume that x is a regular sequence on Coker(∂∗
1771
+ h+1) and
1772
+ the free S-modules F ∗
1773
+ i .
1774
+ The module Exth+1
1775
+ S
1776
+ (R/J(mpe+1)
1777
+ 1
1778
+ , S) is an (S2)-module over its support, see Lemma 4.4. In
1779
+ particular,
1780
+ Exth+d
1781
+ S
1782
+ (Exth+1
1783
+ S
1784
+ (R/J(mpe+1)
1785
+ 1
1786
+ , S), S) = Exth+d−1
1787
+ S
1788
+ (Exth+1
1789
+ S
1790
+ (R/J(mpe+1)
1791
+ 1
1792
+ , S), S) = 0
1793
+ and
1794
+ Coker(∂∗
1795
+ h+d−2) ∼= Exth+d−2
1796
+ S
1797
+ (Exth+1
1798
+ S
1799
+ (R/J(mpe+1)
1800
+ 1
1801
+ , S), S).
1802
+ Consider the short exact sequence
1803
+ 0 → Im(∂∗
1804
+ h+d−2) → F ∗
1805
+ h+d−2 → Exth+d−2
1806
+ S
1807
+ (Exth+1
1808
+ S
1809
+ (R/J(mpe+1)
1810
+ 1
1811
+ , S), S) → 0.
1812
+ By our assumptions and by Lemma 4.7,
1813
+ (xpe
1814
+ 2 , xpe
1815
+ 3 , . . . , xpe
1816
+ d ) Exth+d−2
1817
+ S
1818
+ (Exth+1
1819
+ S
1820
+ (R/J(mpe+1)
1821
+ 1
1822
+ , S), S) = 0
1823
+ for every e ∈ N.
1824
+ By (2) of Proposition 3.7 and (3) of Proposition 3.6 we have that
1825
+ lcb2(x; Im(∂∗
1826
+ h+d−2)) ≤ pe. Next, we consider the short exact sequence
1827
+ 0 → Exth+d−3
1828
+ S
1829
+ (Exth+1
1830
+ S
1831
+ (R/J(mpe+1)
1832
+ 1
1833
+ , S), S) → Coker(∂∗
1834
+ h+d−3) → Im(∂∗
1835
+ h+d−2) → 0.
1836
+ We established lcb2(x; Im(∂∗
1837
+ h+d−2)) ≤ pe. By assumption and Lemma 4.7
1838
+ (xpe
1839
+ 2 , . . . , xpe
1840
+ d−1) Exth+d−3
1841
+ S
1842
+ (Exth+1
1843
+ S
1844
+ (R/J(mpe+1)
1845
+ 1
1846
+ , S), S) = 0
1847
+ for every e ∈ N. By (1) of Proposition 3.6 we have
1848
+ lcb2(x; Coker(∂∗
1849
+ h+d−3)) ≤ pe + pe = 2pe.
1850
+ Next consider the short exact sequence
1851
+ 0 → Im(∂∗
1852
+ h+d−3) → F ∗
1853
+ h+d−3 → Coker(∂∗
1854
+ h+d−3) → 0.
1855
+ By (2) of Proposition 3.7 and knowing that lcb2(x; Coker(∂∗
1856
+ h+d−3)) ≤ 2pe we see that
1857
+ lcb3(x; Im(∂∗
1858
+ h+d−3)) ≤ 2pe.
1859
+ Inductively, we find that
1860
+ lcbj(x; Im(∂∗
1861
+ h+d−j)) ≤ (j − 1)pe
1862
+ and
1863
+ lcbj(x; Coker(∂∗
1864
+ h+d−j−1)) ≤ jpe
1865
+ for each 2 ≤ j ≤ d − 1. In particular,
1866
+ lcbd−1(x; Exth+1
1867
+ S
1868
+ (Exth+1
1869
+ S
1870
+ (R/J(mpe+1)
1871
+ 1
1872
+ , S), S)) ≤ (d − 1)pe.
1873
+ By Lemma 3.3 the parameter sequence xd−1 = xd−1
1874
+ 2
1875
+ , . . . , xd−1
1876
+ d
1877
+ on R/J1 satisfies
1878
+ lcbd−1(xd−1; Exth+1
1879
+ S
1880
+ (Exth+1
1881
+ S
1882
+ (R/J(mpe+1)
1883
+ 1
1884
+ , S), S))) ≤ pe
1885
+ for each e ∈ N.
1886
+
1887
+
1888
+ ON THE EQUALITY OF TEST IDEALS
1889
+ 21
1890
+ Theorem 4.9. Let (R, m, k) be a local normal Cohen-Macaulay domain of Krull dimension
1891
+ d ≥ 4 and Q-Gorenstein in codimension 2. Let p > 0 be a natural number. Let J1 ⊆ R be a
1892
+ choice of canonical ideal and m ∈ N such that J(m)
1893
+ 1
1894
+ is principal in codimension 2. Suppose S
1895
+ is a regular local ring mapping onto R, R ∼= S/P, and ht(P) = h. Suppose that I1 ⊆ R is an
1896
+ ideal of pure height 1 with components disjoint from those of J1, I1 ∩ J1 = x1R is principal,
1897
+ and parameters x1, x2 . . . , xd with the following properties:
1898
+ (1) J1Rx2 and J(m)
1899
+ 1
1900
+ Rx3 are principal in their respective localizations;
1901
+ (2) For every 1 ≤ j ≤ d − 2, the parameter ideal (x1, . . . , xd−j+1) is such that
1902
+ (x2, . . . , xd−j+1)peHj
1903
+ m(R/I(mpe)
1904
+ 1
1905
+ ) = 0
1906
+ for each e ∈ N.
1907
+ Then the following hold:
1908
+ (1) For each e ∈ N there exists ℓ ∈ N such that
1909
+ lcbd−1(xℓ(d−1)
1910
+ 2
1911
+ , xℓ(d−1)
1912
+ 3
1913
+ , xd−1
1914
+ 4
1915
+ , . . . , xd−1
1916
+ d
1917
+ ; R/J(mpe+1)
1918
+ 1
1919
+ ) ≤ pe + 1;
1920
+ (2) For each e ∈ N there exists ℓ ∈ N such that
1921
+ lcbd−1(xℓ(d−1)
1922
+ 2
1923
+ , xℓ(d−1)
1924
+ 3
1925
+ , xd−1
1926
+ 4
1927
+ , . . . , xd−1
1928
+ d
1929
+ ; R/Jmpe+1
1930
+ 1
1931
+ ) ≤ pe + 2.
1932
+ Proof. For each e ∈ N let Ce be the cokernel of
1933
+ R/Jmpe+1 → Exth+1
1934
+ S
1935
+ (Exth+1
1936
+ S
1937
+ (R/Jmpe+1
1938
+ 1
1939
+ , S), S) ∼= Exth+1
1940
+ S
1941
+ (Exth+1
1942
+ S
1943
+ (R/J(mpe+1)
1944
+ 1
1945
+ , S), S)
1946
+ and consider the short exact sequences
1947
+ 0 → R/J(mpe+1)
1948
+ 1
1949
+ → Exth+1
1950
+ S
1951
+ (Exth+1
1952
+ S
1953
+ (R/Jmpe+1
1954
+ 1
1955
+ , S), S) → Ce → 0,
1956
+ see Lemma 4.5 for details.
1957
+ By Lemma 4.5 the module Ce is 0 when either x2 or x3 is inverted. Hence for each e ∈ N
1958
+ there exists an integer ℓ such that (xℓ
1959
+ 2, xℓ
1960
+ 3)Ce = 0. Because d ≥ 4 we have that d −1 ≥ 3 and
1961
+ (3) of Proposition 3.6 implies
1962
+ lcbd−1(xℓ(d−1)
1963
+ 2
1964
+ ,xℓ(d−1)
1965
+ 3
1966
+ , xd−1
1967
+ 4
1968
+ , . . . , xd−1
1969
+ d
1970
+ ; R/J(mpe+1)
1971
+ 1
1972
+ ) ≤
1973
+ lcbd−1(xℓ(d−1)
1974
+ 2
1975
+ , xℓ(d−1)
1976
+ 3
1977
+ , xd−1
1978
+ 4
1979
+ , . . ., xd−1
1980
+ d
1981
+ ; Exth+1
1982
+ S
1983
+ (Exth+1
1984
+ S
1985
+ (R/Jmpe+1
1986
+ 1
1987
+ , S, S)) + 1.
1988
+ Statement (1) follows by Proposition 4.8.
1989
+ To prove (2) let Ke = J(mpe+1)
1990
+ 1
1991
+ /Jmpe+1
1992
+ 1
1993
+ and consider the short exact sequences
1994
+ 0 → Ke → R/Jmpe+1
1995
+ 1
1996
+ → R/J(mpe+1)
1997
+ 1
1998
+ → 0.
1999
+ The module Ke is 0 when either x2 or x3 are inverted. Hence for each e ∈ N there exists an
2000
+ integer ℓ such that (xℓ
2001
+ 2, xℓ
2002
+ 3)Ke = 0. By (1) of Proposition 3.6 we have that
2003
+ lcbd−1(xℓ
2004
+ 2, xℓ
2005
+ 3, x4, . . ., xd; R/Jmpe+1
2006
+ 1
2007
+ ) ≤ lcbd−1(xℓ
2008
+ 2, xℓ
2009
+ 3, x4, . . . , xd; R/J(mpe+1)
2010
+ 1
2011
+ ) + 1 ≤ pe + 2.
2012
+
2013
+ Theorem A is a consequence of the following theorem.
2014
+
2015
+ 22
2016
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
2017
+ Theorem 4.10. Let (R, m, k) be an excellent local Cohen-Macaulay normal domain of prime
2018
+ characteristic p > 0, of Krull dimension d ≥ 4, I1 ⊆ R an anti-canonical ideal, and ER(k)
2019
+ an injective hull of the residue field. Suppose further that there exists an m ∈ N so that I(m)
2020
+ 1
2021
+ is principal in codimension 2 and for each 1 ≤ j ≤ d − 2 there exists an ideal aj of height
2022
+ d − j + 1 such that
2023
+ ape
2024
+ j Hj
2025
+ m
2026
+
2027
+ R
2028
+ I(mpe)
2029
+ 1
2030
+
2031
+ = 0
2032
+ for every e ∈ N. Then 0∗fg
2033
+ ER(k) = 0∗
2034
+ ER(k).
2035
+ Proof. Our strategy is to employ Theorem 4.9 and then Theorem 4.2 to conclude 0∗fg
2036
+ ER(k) =
2037
+ 0∗
2038
+ ER(k). But first, we change the ideals aj, if necessary, so that there are inclusions ad−2 ⊆
2039
+ ad−3 ⊆ · · · ⊆ a1 and so that there exists parameter elements xm
2040
+ 1 , x2, x3 ∈ aj for all 1 ≤ j ≤
2041
+ d − 2 with the property that x1R = I1 ∩ J1 for some canonical ideal J1 and the ideals I1Rx2
2042
+ and I(m)
2043
+ 1
2044
+ Rx3 are principal in their respective localizations.
2045
+ The ideal aj ∩ aj−1 ∩ · · · ∩ a1 has height at least d − j + 1. We can replace the ideal aj
2046
+ with aj ∩ aj−1 ∩ · · · ∩ a1 and may assume that
2047
+ ad−2 ⊆ ad−3 ⊆ · · · ⊆ a1.
2048
+ Start by choosing x1 ∈ I1 a generic generator so that x1R = I1 ∩ J1 and the ideals I1 and
2049
+ J1 have disjoint components. Clearly xmpe
2050
+ 1
2051
+ annihilates Hj
2052
+ m(R/I(mpe)
2053
+ 1
2054
+ ) for every e ∈ N. The
2055
+ ideal I1 is principal in codimension 1, the ideal I(m)
2056
+ 1
2057
+ is principal in codimension 2. Therefore
2058
+ there exists part of a system of parameters x2, x3 of R/x1R so that I1Rx2 and I(m)
2059
+ 1
2060
+ Rx3 are
2061
+ principal in their respective localizations. Moreover, we can replace x2 and x3 by suitable
2062
+ powers and can assume that there exists elements a, b ∈ I1 so that x2I1 ⊆ aR ⊆ I1 and
2063
+ x3I(m)
2064
+ 1
2065
+ ⊆ bR ⊆ I(m)
2066
+ 1
2067
+ . Therefore xmpe
2068
+ 2
2069
+ I(mpe)
2070
+ 1
2071
+ ⊆ ampeR ⊆ I(mpe)
2072
+ 1
2073
+ and xpe
2074
+ 3 I(mpe)
2075
+ 1
2076
+ ⊆ bpeR ⊆ I(mpe)
2077
+ 1
2078
+ .
2079
+ Consider the short exact sequences
2080
+ 0 → I(mpe)
2081
+ 1
2082
+ ampeR →
2083
+ R
2084
+ ampeR →
2085
+ R
2086
+ I(mpe)
2087
+ 1
2088
+ → 0
2089
+ and
2090
+ 0 → I(mpe)
2091
+ 1
2092
+ bmpeR →
2093
+ R
2094
+ bmpeR →
2095
+ R
2096
+ I(mpe)
2097
+ 1
2098
+ → 0.
2099
+ The elements xmpe
2100
+ 2
2101
+ and xpe
2102
+ 3 annihilate I(mpe)
2103
+ 1
2104
+ /ampeR and I(mpe)
2105
+ 1
2106
+ /bmpeR respectively. Exam-
2107
+ ining the resulting long exact sequences of local cohomology informs us that xmpe
2108
+ 2
2109
+ and xpe
2110
+ 3
2111
+ annihilate Hj
2112
+ m(R/I(mpe)
2113
+ 1
2114
+ ) for every 1 ≤ j ≤ d − 2. Replace the element x2 by xm
2115
+ 2 . Then
2116
+ (xpe
2117
+ 2 , xpe
2118
+ 3 ) annihilates Hj
2119
+ m(R/I(mpe)
2120
+ 1
2121
+ ) for every 1 ≤ j ≤ d − 2.
2122
+ For each e ∈ N the ideal
2123
+ ((aj + (xm
2124
+ 1 , x2, x3))4pe is generated by elements which live in either ape
2125
+ j or (xm
2126
+ 1 , x2, x3)[pe] and
2127
+ therefore annihilate Hj
2128
+ m(R/I(mpe)
2129
+ 1
2130
+ ). We replace aj by the ideal (aj + (xm
2131
+ 1 , x2, x3))4.
2132
+ The ideal aj has height at least d − j + 1 and xm
2133
+ 1 , x2, x3 ∈ aj. We can extend xm
2134
+ 1 , x2, x3
2135
+ to a parameter sequence xm
2136
+ 1 , x2, x3, . . . , xd−j+1 in aj ⊆ aj−1 ⊆ · · · ⊆ a1. By Theorem 4.9, for
2137
+
2138
+ ON THE EQUALITY OF TEST IDEALS
2139
+ 23
2140
+ each e ∈ N there exists an ℓ so that
2141
+ lcbd−1(xℓ(d−1)
2142
+ 2
2143
+ , xℓ(d−1)
2144
+ 3
2145
+ , xd−1
2146
+ d
2147
+ , . . . , xd−1
2148
+ d
2149
+ ; R/J(mi+1)
2150
+ 1
2151
+ ) ≤ pe + 1.
2152
+ Therefore 0∗fg
2153
+ ER(k) = 0∗
2154
+ ER(k) by Theorem 4.2.
2155
+
2156
+ References
2157
+ [Abe02]
2158
+ Ian M. Aberbach. Some conditions for the equivalence of weak and strong F-regularity. Comm.
2159
+ Algebra, 30(4):1635–1651, 2002. 9, 13
2160
+ [AE03]
2161
+ Ian M. Aberbach and Florian Enescu. Test ideals and base change problems in tight closure
2162
+ theory. Trans. Amer. Math. Soc., 355(2):619–636, 2003. 2
2163
+ [AP22]
2164
+ Ian Aberbach and Thomas Polstra. Local cohomology bounds and the weak implies strong con-
2165
+ jecture in dimension 4. J. Algebra, 605:37–57, 2022. 1, 3
2166
+ [BH93]
2167
+ Winfried Bruns and J¨urgen Herzog. Cohen-Macaulay rings, volume 39 of Cambridge Studies in
2168
+ Advanced Mathematics. Cambridge University Press, Cambridge, 1993. 10
2169
+ [BM10]
2170
+ Holger Brenner and Paul Monsky. Tight closure does not commute with localization. Ann. of
2171
+ Math. (2), 171(1):571–588, 2010. 1
2172
+ [BMP+20] Bhargav Bhatt, Linquan Ma, Zsolt Patakfalvi, Karl Schwede, Kevin Tucker, Joe Waldron, and
2173
+ Jakub Witaszek. Globally +-regular varieties and the minimal model program for threefolds in
2174
+ mixed characteristic, 2020. 1, 3
2175
+ [Bro79]
2176
+ M. Brodmann. Asymptotic stability of Ass(M/InM). Proc. Amer. Math. Soc., 74(1):16–18, 1979.
2177
+ 8
2178
+ [BS13]
2179
+ M. P. Brodmann and R. Y. Sharp. Local cohomology, volume 136 of Cambridge Studies in Ad-
2180
+ vanced Mathematics. Cambridge University Press, Cambridge, second edition, 2013. An algebraic
2181
+ introduction with geometric applications. 4
2182
+ [CEMS18] Alberto Chiecchio, Florian Enescu, Lance Edward Miller, and Karl Schwede. Test ideals in rings
2183
+ with finitely generated anti-canonical algebras. J. Inst. Math. Jussieu, 17(1):171–206, 2018. 2, 8
2184
+ [CHS10]
2185
+ Steven Dale Cutkosky, J¨urgen Herzog, and Hema Srinivasan. Asymptotic growth of algebras
2186
+ associated to powers of ideals. Math. Proc. Cambridge Philos. Soc., 148(1):55–72, 2010. 6, 7
2187
+ [Har98]
2188
+ Nobuo Hara. Classification of two-dimensional F-regular and F-pure singularities. Adv. Math.,
2189
+ 133(1):33–53, 1998. 2
2190
+ [HH90]
2191
+ Melvin Hochster and Craig Huneke. Tight closure, invariant theory, and the Brian¸con-Skoda
2192
+ theorem. J. Amer. Math. Soc., 3(1):31–116, 1990. 2, 8
2193
+ [HH94]
2194
+ Melvin Hochster and Craig Huneke. Tight closure of parameter ideals and splitting in module-
2195
+ finite extensions. J. Algebraic Geom., 3(4):599–670, 1994. 2
2196
+ [Hoc77]
2197
+ Melvin Hochster. Cyclic purity versus purity in excellent Noetherian rings. Trans. Amer. Math.
2198
+ Soc., 231(2):463–488, 1977. 9
2199
+ [HS15]
2200
+ Craig Huneke and Ilya Smirnov. Prime filtrations of the powers of an ideal. Bull. Lond. Math.
2201
+ Soc., 47(4):585–592, 2015. 8
2202
+ [Hun82]
2203
+ Craig Huneke. On the associated graded ring of an ideal. Illinois J. Math., 26(1):121–137, 1982.
2204
+ 8
2205
+ [HW02]
2206
+ Nobuo Hara and Kei-Ichi Watanabe. F-regular and F-pure rings vs. log terminal and log canonical
2207
+ singularities. J. Algebraic Geom., 11(2):363–392, 2002. 3
2208
+ [LS99]
2209
+ Gennady Lyubeznik and Karen E. Smith. Strong and weak F-regularity are equivalent for graded
2210
+ rings. Amer. J. Math., 121(6):1279–1290, 1999. 2
2211
+ [LS01]
2212
+ Gennady Lyubeznik and Karen E. Smith. On the commutation of the test ideal with localization
2213
+ and completion. Trans. Amer. Math. Soc., 353(8):3149–3180, 2001. 2
2214
+ [Mac96]
2215
+ Brian Cameron Maccrimmon. Strong F-regularity and boundedness questions in tight closure.
2216
+ ProQuest LLC, Ann Arbor, MI, 1996. Thesis (Ph.D.)–University of Michigan. 2
2217
+ [Pol22]
2218
+ Thomas Polstra. A theorem about maximal Cohen-Macaulay modules. Int. Math. Res. Not.
2219
+ IMRN, (3):2086–2094, 2022. 3
2220
+
2221
+ 24
2222
+ IAN ABERBACH, CRAIG HUNEKE, AND THOMAS POLSTRA
2223
+ [PT18]
2224
+ Thomas Polstra and Kevin Tucker. F-signature and Hilbert-Kunz multiplicity: a combined ap-
2225
+ proach and comparison. Algebra Number Theory, 12(1):61–97, 2018. 13
2226
+ [SH06]
2227
+ Irena Swanson and Craig Huneke. Integral closure of ideals, rings, and modules, volume 336
2228
+ of London Mathematical Society Lecture Note Series. Cambridge University Press, Cambridge,
2229
+ 2006. 5, 6
2230
+ [Smi93]
2231
+ Karen Ellen Smith. Tight closure of parameter ideals and F-rationality. ProQuest LLC, Ann
2232
+ Arbor, MI, 1993. Thesis (Ph.D.)–University of Michigan. 8
2233
+ [Tak04]
2234
+ Shunsuke Takagi. An interpretation of multiplier ideals via tight closure. J. Algebraic Geom.,
2235
+ 13(2):393–415, 2004. 3
2236
+ [Wat94]
2237
+ Keiichi Watanabe. Infinite cyclic covers of strongly F-regular rings. In Commutative algebra:
2238
+ syzygies, multiplicities, and birational algebra (South Hadley, MA, 1992), volume 159 of Contemp.
2239
+ Math., pages 423–432. Amer. Math. Soc., Providence, RI, 1994. 8
2240
+ [Wil95]
2241
+ Lori J. Williams. Uniform stability of kernels of Koszul cohomology indexed by the Frobenius
2242
+ endomorphism. J. Algebra, 172(3):721–743, 1995. 1, 2
2243
+ Department of Mathematics, University of Missouri, Columbia, MO 65211, USA
2244
+ Email address: [email protected]
2245
+ Department of Mathematics, University of Virginia, Charlottesville, VA 22903 USA
2246
+ Email address: [email protected]
2247
+ Department of Mathematics, University of Alabama, Tuscaloosa, AL 35401 USA
2248
+ Email address: [email protected]
2249
+
F9E0T4oBgHgl3EQfRAC9/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
HNAyT4oBgHgl3EQfS_eb/content/tmp_files/2301.00097v1.pdf.txt ADDED
@@ -0,0 +1,1490 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00097v1 [math.DG] 31 Dec 2022
2
+ REALIZATIONS OF INNER AUTOMORPHISMS
3
+ OF ORDER FOUR AND FIXED POINTS SUBGROUPS
4
+ BY THEM ON THE CONNECTED COMPACT
5
+ EXCEPTIONAL LIE GROUP 퐸8, PART III
6
+ By
7
+ Toshikazu Miyashita
8
+ Abstract. The compact simply connected Riemannian 4-symmetric spaces were clas-
9
+ sified by J.A. Jiménez according to type of the Lie algebras. As homogeneous mani-
10
+ folds, these spaces are of the form 퐺/퐻, where 퐺 is a connected compact simple Lie
11
+ group with an automorphism ˜훾 of order four on 퐺 and 퐻 is a fixed points subgroup
12
+ 퐺훾 of 퐺. According to the classification by J.A. Jiménez, there exist seven compact
13
+ simply connected Riemannian 4-symmetric spaces 퐺/퐻 in the case where 퐺 is of
14
+ type 퐸8. In the present article, we give the explicit form of automorphisms ˜휔4, ˜휅4 and
15
+ ˜휀4 of order four on 퐸8 induced by the 퐶-linear transformations 휔4, 휅4 and 휀4 of the
16
+ 248-dimensional퐶-vector space 픢8퐶, respectively. Further, we determine the structure
17
+ of these fixed points subgroups (퐸8) 휔4, (퐸8)휅4 and (퐸8) 휀4 of 퐸8. These amount to
18
+ the global realizations of three spaces among seven Riemannian 4-symmetric spaces
19
+ 퐺/퐻 above corresponding to the Lie algebras 픥 = 픰픲(2) ⊕ 푖푹 ⊕ 픢6,푖푹 ⊕ 픰픬(14) and
20
+ 픥 = 픰픲(2) ⊕ 푖푹 ⊕ 픰픬(12), where 픥 = Lie(퐻). With this article, the all realizations
21
+ of inner automorphisms of order four and fixed points subgroups by them have been
22
+ completed in 퐸8.
23
+ 1. Introduction
24
+ Let 퐺 be a Lie group and 퐻 a compact subgroup of 퐺. A homogeneous space 퐺/퐻
25
+ with 퐺-invariant Riemannian metric 푔 is called a Riemannian 4-symmetric space if
26
+ there exists an automorphism ˜훾 of order four on 퐺 such that (퐺훾)0 ⊂ 퐻 ⊂ 퐺훾, where
27
+ 퐺훾 and (퐺훾)0 are the fixed points subgroup of 퐺 by ˜훾 and its identity component,
28
+ respectively.
29
+ Now, for the exceptional compact Lie group of type 퐸8, as in Table below, there exist
30
+ seven cases of the compact simply connected Riemannian 4-symmetric spaces which
31
+ were classified by J.A. Jiménez as mentioned in abstract ([2]). Accordingly, our interest
32
+ is to realize the groupfication for the classification as Lie algebra.
33
+ Our results of groupfication corresponding to the Lie algebra 픥 in Table are given as
34
+ follows.
35
+ 2010 Mathematics Subject Classification.
36
+ 53C30, 53C35, 17B40.
37
+ Key words. 4-symmetric spaces, exceptional Lie groups.
38
+ 1
39
+
40
+ 2
41
+ TOSHIKAZU MIYASHITA
42
+ Case
43
+
44
+ ˜훾
45
+ 퐻 = 퐺훾
46
+ 1
47
+ 픰픬(6) ⊕ 픰픬(10)
48
+ ˜휎′
49
+ 4
50
+ (푆푝푖푛(6) × 푆푝푖푛(10))/풁4
51
+ 2
52
+ 푖푹 ⊕ 픰픲(8)
53
+ ˜푤4
54
+ (푈(1) × 푆푈(8))/풁24
55
+ 3
56
+ 푖푹 ⊕ 픢7
57
+ ˜휐4
58
+ (푈(1) × 퐸7)/풁2
59
+ 4
60
+ 픰픲(2) ⊕ 픰픲(8)
61
+ ˜휇4
62
+ (푆푈(2) × 푆푈(8))/풁4
63
+ 5
64
+ 픰픲(2) ⊕ 푖푹 ⊕ 픢6
65
+ ˜휔4
66
+ (푆푈(2) × 푈(1) × 퐸6)/(풁2 × 풁3)
67
+ 6
68
+ 푖푹 ⊕ 픰픬(14)
69
+ ˜휅4
70
+ (푈(1) × 푆푝푖푛(14))/풁4
71
+ 7
72
+ 픰픲(2) ⊕ 푖푹 ⊕ 픰픬(12)
73
+ ˜휀4
74
+ (푆푈(2) × 푈(1) × 푆푝푖푛(12))/(풁2 × 풁2)
75
+ In [3] and [4], the author has already realized the groupfication for Case 1 and Cases
76
+ 2, 3, 4 in Table, respectively. In the present article, we state the realizations of the group
77
+ 퐻 for Cases 5,6 and Case 7.
78
+ Finally, the author would like to say that the feature of this article is to give elementary
79
+ proofs of the isomorphism of groups by using the homomorphism theorem, and the all
80
+ global realizations have been completed in 퐸8.
81
+ This article is a continuation of [4], hence we start from Section 7. The readers refer
82
+ to [3] for preliminary results and also to [3],[4],[5] or [7] for notations. Note that we
83
+ change the numbering of Case 5 and Case 6 in [3] to the numbering of Case 3 and Case
84
+ 4 in the present article, respectively.
85
+ 7. Case 5. The automorphism ˜휔4 of order four and the group (퐸8)휔4
86
+ In this section (also in Section 8 and Section 9), we use the 248-dimensional퐶-vector
87
+ space 픢8퐶 used in Case 1 ([3]) and the simply connected compact exceptional Lie group
88
+ of type 퐸8 constructed by T. Imai and I. Yokota ([1]).
89
+ We define a 퐶-linear transformation 휔4 of 픢8퐶 by
90
+ 휔4(훷, 푃, 푄, 푟, 푠, 푡) = (휄훷휄−1, −휄푃, −휄푄, 푟, 푠, 푡),
91
+ where 휄 on the right hand side is the 퐶-linear transformation of 픓퐶 defined in [7,
92
+ Definition of Subsection 4.10 (p.131)] (the space 픓퐶, called the Freudenthal 퐶-vector
93
+ space, is defined in [3, Preliminaries (p.94)]). Note that 휔4 is the composition transfor-
94
+ mation of 휄, 휐 ∈ 퐸7 ⊂ 퐸8, where 휐 is the 퐶-linear transformation of 픢8퐶 defined in [7,
95
+ Definition of Subsection 5.7(p.174)]. Moreover since 휄, 휐 are expressed as elements of
96
+ 퐸8 by
97
+ 휄 = exp
98
+ �2휋푖
99
+ 4 ad(훷(0, 0, 0, 3), 0, 0, 0, 0, 0)
100
+
101
+ ,
102
+ 휐 = exp
103
+ �2휋푖
104
+ 4 ad(훷(0, 0, 0, 6), 0, 0, 0, 0, 0)
105
+
106
+ ,
107
+
108
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
109
+ 3
110
+ respectively and together with [훷(0, 0, 0, 3),훷(0, 0, 0, 6)] = 0, we have
111
+ 휔4 = exp
112
+ �2휋푖
113
+ 4 ad(훷(0, 0, 0, 9), 0, 0, 0, 0, 0)
114
+
115
+ .
116
+ Hence it follows from above that 휔4 ∈ 퐸8 and (휔4)4 = 1, (휔4)2 = 휐, so that 휔4 induces
117
+ the inner automorphism ˜휔4 of order four on 퐸8: ˜휔4(훼) = 휔4훼휔4
118
+ −1, 훼 ∈ 퐸8.
119
+ Now, we will study the subgroup (퐸8)휔4 of 퐸8:
120
+ (퐸8)휔4 =
121
+
122
+ 훼 ∈ 퐸8
123
+ �� 휔4훼 = 훼휔4
124
+
125
+ .
126
+ The aim of this section is to determine the structure of the group (퐸8)휔4. Before
127
+ that, we prove the lemma and propositions needed later.
128
+ Lemma 7.1. The Lie algebra (픢8)휔4 of the group (퐸8)휔4 is given by
129
+ (픢8)휔4 =
130
+
131
+ ad(푅) ∈ Der(픢8)
132
+ �� 휔4ad(푅) = ad(푅)휔4, 푅 ∈ 픢8
133
+
134
+ � {푅 ∈ 픢8 | 휔4푅 = 푅}
135
+ = {푅 = (훷, 0, 0, 푟, 푠, −휏푠) | 훷 ∈ (픢7)휄 � 픲(1) ⊕ 픢6, 푟 ∈ 푖푹, 푠 ∈ 퐶} ,
136
+ where (픢7)휄 is the Lie algebra of the group (퐸7)휄 := {훼 ∈ 퐸7 | 휄훼 = 훼휄}.
137
+ In particular, we have dim((픢8)휔4) = (1 + 78) + 1 + 2 = 82.
138
+ Proof. By doing straightforward computation, we can obtain the required results. The
139
+ isomorphism (픢7)휄 � 픲(1) ⊕ 픢6 as Lie algebras follows from [7, Theorem 4.10.2].
140
+
141
+ Proposition 7.2. The group (퐸8)휔4 contains the group (퐸7)휄 which is isomorphic to
142
+ the group (푈(1) × 퐸6)/풁3, 풁3 = {(1, 1), (휔, 휙(휔2)), (휔2, 휙(휔))}: (퐸8)휔4 ⊃ (퐸7)휄 �
143
+ (푈(1) × 퐸6)/풁3, where 휔 = (−1/2) + (
144
+
145
+ 3/2)푖.
146
+ Proof. Immediately, we have (픢7)휄 ⊂ (픢8)휔4 from Lemma 7.1. Moreover since both
147
+ of the groups (퐸8)휔4 and (퐸7)휄 are connected, we have (퐸7)휄 ⊂ (퐸8)휔4. However, we
148
+ will prove it directly. Let 훼 ∈ (퐸7)휄. Note that −1 ∈ 푧(퐸7) (the center of 퐸7), it follows
149
+ that
150
+ 휔4훼(훷, 푃, 푄, 푟, 푠, 푡) = 휔4(훼훷훼−1, 훼푃, 훼푄, 푟, 푠, 푡)
151
+ = (휄훼훷훼−1휄−1, −휄훼푃, −휄훼푄, 푟, 푠, 푡)
152
+ = (훼(휄훷휄−1)훼−1, 훼(−휄푃), 훼(−휄푄), 푟, 푠, 푡)
153
+ = 훼휔4(훷, 푃, 푄, 푟, 푠, 푡), (훷, 푃, 푄, 푟, 푠, 푡) ∈ 픢퐶
154
+ 8 ,
155
+ that is, 휔4훼 = 훼휔4. Hence we have 훼 ∈ (퐸8)휔4, so that the first half is proved.
156
+ As for the proof of the second half, we define a mapping 휑휄 : 푈(1) × 퐸6 → (퐸7)휄 by
157
+ 휑휄(휃, 훽) = 휙(휃)훽,
158
+ wherethemapping 휙 : 푈(1) = {휃 ∈ 퐶 | (휏휃)휃 = 1} → 퐸7 is defined by 휙(휃)(푋,푌, 휉, 휂)
159
+ = (휃−1푋, 휃푌, 휃3휉, 휃−3휂), (푋,푌, 휉, 휂) ∈ 픓퐶.
160
+ Then the mapping 휑휄 induces the required isomorphism (see [7, Theorem 4.10.2] in
161
+ detail).
162
+
163
+
164
+ 4
165
+ TOSHIKAZU MIYASHITA
166
+ Let the special unitary group 푆푈(2) = {퐴 ∈ 푀(2, 퐶) | (휏 푡퐴)퐴 = 퐸, det퐴 = 1} and
167
+ we define an embedding 휙휐 : 푆푈(2) → 퐸8 by
168
+ 휙휐(
169
+ �푎
170
+ −휏푏
171
+
172
+ 휏푎
173
+
174
+ ) =
175
+ ����������
176
+
177
+ 1
178
+ 0
179
+ 0
180
+ 0
181
+ 0
182
+ 0
183
+ 0
184
+ 휏푎1
185
+ 푏1
186
+ 0
187
+ 0
188
+ 0
189
+ 0
190
+ −휏푏1
191
+ 푎1
192
+ 0
193
+ 0
194
+ 0
195
+ 0
196
+ 0
197
+ 0
198
+ (휏푎)푎 − (휏푏)푏
199
+ (휏푎)(휏푏)
200
+ 푎푏
201
+ 0
202
+ 0
203
+ 0
204
+ −2(휏푎)푏
205
+ (휏푎)2
206
+ −푏2
207
+ 0
208
+ 0
209
+ 0
210
+ 2푎(휏푏)
211
+ −(휏푏)2
212
+ 푎2
213
+ ����������
214
+
215
+ .
216
+ Proposition 7.3. [7, Theorem 5.7.4] The group (퐸8)휔4 contains a subgroup
217
+ 휙휐(푆푈(2)) = {휙휐(퐴) ∈ 퐸8 | 퐴 ∈ 푆푈(2)}
218
+ which is isomorphic to the group 푆푈(2) = {퐴 ∈ 푀(2, 퐶) | (휏 푡퐴)퐴 = 퐸, det퐴 = 1}.
219
+ Proof. For 퐴 =
220
+ �푎
221
+ −휏푏
222
+
223
+ 휏푎
224
+
225
+ := exp
226
+ �−푖휈
227
+ −휏휚
228
+
229
+ 푖휈
230
+
231
+ ∈ 푆푈(2), where
232
+ �−푖휈
233
+ −휏휚
234
+
235
+ 푖휈
236
+
237
+ ∈ 픰픲(2),
238
+ we have 휙휐(퐴) = exp(ad(0, 0, 0, 푖휈, 휚, −휏휚)) ∈ (퐸8)휔4 (Lemma 7.1).
239
+
240
+ Note that there are some errata in definition of 휑3(퐴) of [7, Theorem 5.7.4].
241
+ Here we need the following result in the proof of Theorem 7.5 below.
242
+ Theorem 7.4. ([7, Theorem 5.7.6]) The group (퐸8)휐 is isomorphic to the group
243
+ (푆푈(2) × 퐸7)/풁2, 풁2 = {(퐸, 1), (−퐸, −1)}: (퐸8)휐 � (푆푈(2) × 퐸7)/풁2.
244
+ Proof. We define a mapping 휑 : 푆푈(2) × 퐸7 → (퐸8)휐 by
245
+ 휑(퐴, 훿) = 휙휐(퐴)훿.
246
+ Then the mapping 휑 induces the required isomorphism.
247
+
248
+ Now, we determine the structure of the group (퐸8)휔4.
249
+ Theorem 7.5. The group (퐸8)휔4 is isomorphic to the group (푆푈(2) ×푈(1) × 퐸6)/(풁2
250
+ × 풁3), 풁2 = {(퐸, 1, 1), (−퐸, −1, 1)}, 풁3 = {(퐸, 1, 1), (퐸, 휔, 휙(휔2)), (퐸, 휔2, 휙(휔))}:
251
+ (퐸8)휔4 � (푆푈(2) × 푈(1) × 퐸6)/(풁2 × 풁3).
252
+ Proof. We define a mapping 휑휔4 : 푆푈(2) × 푈(1) × 퐸6 → (퐸8)휔4 by
253
+ 휑휔4 (퐴, 휃, 훽) = 휙휐(퐴)휑휄(휃, 훽)(= 휑(퐴, 휑휄(휃, 훽))),
254
+ where 휑 is defined in the proof of Theorem 7.4.
255
+ First, it is clear that 휑휔4 is well-defined from Propositions 7.2, 7.3 and since the
256
+ mapping 휑휔4 is the restriction of the mapping 휑 : 푆푈(2) × 퐸7 → (퐸8)휐, 휑휔4 is a
257
+ homomorphism.
258
+ Next, we will provethat 휑휔4 is surjective. Let 훼 ∈ (퐸8)휔4. From (휔4)2 = 휐, we easily
259
+ see (퐸8)휔4 ⊂ (퐸8)휐. Hence there exist 퐴 ∈ 푆푈(2) and 훿 ∈ 퐸7 such that 훼 = 휑(퐴, 훿)
260
+ (Theorem 7.4). Moreover, from the condition 휔4훼휔4
261
+ −1 = 훼, that is, 휔4휑(퐴, 훿)휔4
262
+ −1 =
263
+ 휑(퐴, 훿), we have 휑(퐴, 휄훿휄−1) = 휑(퐴, 훿). Indeed, note that the formula 휔4훿휔4
264
+ −1 = 휄훿휄−1
265
+
266
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
267
+ 5
268
+ follows from 훿 ∈ 퐸7, so that it follows from 휔4휙휐(퐴)휔4
269
+ −1 = 휙휐(퐴) (Proposition 7.3)
270
+ that
271
+ 휔4휑(퐴, 훿)휔4
272
+ −1 = 휔4(휙휐(퐴)훿)휔4
273
+ −1
274
+ = (휔4휙휐(퐴)휔4
275
+ −1)(휔4훿휔4
276
+ −1)
277
+ = 휙휐(퐴)(휄훿휄−1)
278
+ = 휑(퐴, 휄훿휄−1),
279
+ that is, 휑(퐴, 휄훿휄−1) = 휑(퐴, 훿).
280
+ Thus, since Ker휑 = {(퐸, 1), (−퐸, −1)} (Theorem 7.4), we have the following
281
+ � 퐴 = 퐴
282
+ 휄훿휄−1 = 훿
283
+ or
284
+ � 퐴 = −퐴
285
+ 휄훿휄−1 = −훿.
286
+ In the latter case, this case is impossible because of 퐴 ≠ 푂, where 푂 is the zero matrix.
287
+ In the former case, 훿 ∈ (퐸7)휄 follows from the second condition, so that there exist
288
+ 휃 ∈ 푈(1) and 훽 ∈ 퐸6 such that 훿 = 휑휄(휃, 훽) (Proposition 7.2). Hence there exist
289
+ 퐴 ∈ 푆푈(2), 휃 ∈ 푈(1) and 훽 ∈ 퐸6 such that 훼 = 휑(퐴, 휑휄(휃, 훽)) = 휑휔4 (퐴, 휃, 훽). The
290
+ proof of surjective is completed.
291
+ Finally, we will determine Ker 휑휔4. From the definition of kernel, we have
292
+ Ker 휑휔4 = {(퐴, 휃, 훽) ∈ 푆푈(2) × 푈(1) × 퐸6 | 휑휔4(퐴, 휃, 훽) = 1}
293
+ = {(퐴, 휃, 훽) ∈ 푆푈(2) × 푈(1) × 퐸6 | 휑(퐴, 휑휄(휃, 훽)) = 1}.
294
+ Here, the mapping 휑휔4 is the restriction of the mapping 휑 and together with Ker 휑 =
295
+ {(퐸, 1), (−퐸, −1)} (Theorem 7.4), we will find the elements (퐴, 휃, 훽) ∈ 푆푈(2)×푈(1)×
296
+ 퐸6 satisfying the following
297
+ � 퐴 = 퐸
298
+ 휑휄(휃, 훽) = 1
299
+ or
300
+ � 퐴 = −퐸
301
+ 휑휄(휃, 훽) = −1.
302
+ In the former case, from Ker 휑휄 = {(1, 1), (휔, 휙(휔2)), (휔2, 휙(휔))} (Proposition 7.2),
303
+ we have the following
304
+ 
305
+ 
306
+ 퐴 = 퐸
307
+ 휃 = 1
308
+ 훽 = 1,
309
+ 
310
+ 
311
+ 퐴 = 퐸
312
+ 휃 = 휔
313
+ 훽 = 휙(휔2)
314
+ or
315
+ 
316
+ 
317
+ 퐴 = 퐸
318
+ 휃 = 휔2
319
+ 훽 = 휙(휔).
320
+ In the latter case, the second condition can be rewritten as 휙(−휃)훽 = 1 from −1 =
321
+ 휙(−1). Hence, as in the former case, we have the following
322
+ 
323
+ 
324
+ 퐴 = −퐸
325
+ 휃 = −1
326
+ 훽 = 1,
327
+ 
328
+ 
329
+ 퐴 = −퐸
330
+ 휃 = −휔
331
+ 훽 = 휙(휔2)
332
+ or
333
+ 
334
+ 
335
+ 퐴 = −퐸
336
+ 휃 = −휔2
337
+ 훽 = 휙(휔).
338
+
339
+ 6
340
+ TOSHIKAZU MIYASHITA
341
+ Hence we can obtain
342
+ Ker 휑휔4 =
343
+ � (퐸, 1, 1), (퐸, 휔, 휙(휔2)), (퐸, 휔2, 휙(휔)),
344
+ (−퐸, −1, 1), (−퐸, −휔, 휙(휔2)), (−퐸, −휔2, 휙(휔))
345
+
346
+ = {(퐸, 1, 1), (−퐸, −1, 1)} × {(퐸, 1, 1), (퐸, 휔, 휙(휔2)), (퐸, 휔2, 휙(휔))}
347
+ � 풁2 × 풁3.
348
+ Therefore we have the required isomorphism
349
+ (퐸8)휔4 � (푆푈(2) × 푈(1) × 퐸6)/(풁2 × 풁3)
350
+
351
+ 8. Case 6. The automorphism ˜휅4 of order four and the group (퐸8)휅4
352
+ In this section, our aim is to prove main theorem: (퐸8)휅4 � (푈(1) × 푆푝푖푛(14))/풁4.
353
+ In [5, Theorem 5.10], the author has proved that the group (퐸8퐶)휅3 is isomorphic to
354
+ the group (퐶∗ × 푆푝푖푛(14,퐶))/풁4 using the automorphism ˜휅3 of order three on 퐸8퐶:
355
+ (퐸8퐶)휅3 � (퐶∗ × 푆푝푖푛(14, 퐶))/풁4, where the group (퐸8퐶)휅3 is defined as (퐸8퐶)0
356
+ in [5, Theorem 5.10] and ˜휅3, ˜휅4 are defined later. As in the proof of [5, Theorem
357
+ 5.10], using the automorphism ˜휅4 of order four on 퐸8퐶, we first will prove that the
358
+ group (퐸8퐶)휅4 is isomorphic to the group (퐶∗ × 푆푝푖푛(14, 퐶))/풁4 in Subsection 8.1:
359
+ (퐸8퐶)휅4 � (퐶∗×푆푝푖푛(14, 퐶))/풁4, and using the result above, the structure of the group
360
+ (퐸8)휅4 will be determined in Subsection 8.2. We often will use the results obtained
361
+ and definitions in [5, Section 5.3 ], then note that we change several signs used in [5,
362
+ Section 5.3]. For example, 휅3 in [5, Section 5.3 (p.37)] is changed to 휈3 in this section.
363
+ At the end of the preface of this section, since the content of this section is related to
364
+ the subalgebra 픤0 of the simple graded Lie algebras 픤 of second kind
365
+ 픤 = 픤−2 ⊕ 픤−1 ⊕ 픤0 ⊕ 픤1 ⊕ 픤2, [픤푘, 픤푙] ⊂ 픤푘+푙,
366
+ we will review about that. In a simple graded Lie algebra 픤 of second kind, we know that
367
+ there exists 푍 ∈ 픤0, called a characteristic element, such that each 픤푘 is the 푘-eigenspace
368
+ of ad 푍 : 픤 → 픤, so that
369
+ 픤0 = {푋 ∈ 픤 | (ad 푍)푋 = 0} .
370
+ Here, set ˜훾3 := exp
371
+ �2휋푖
372
+ 3 ad 푍
373
+
374
+ as a inner automorphism of order three on 픤, then we
375
+ have
376
+ 픤0 = {푋 ∈ 픤 | ˜훾3푋 = 푋} =: (픤)훾3.
377
+ Indeed, let 푋 ∈ 픤0. Then it follows from (ad 푍)푋 = 0 that
378
+ ˜훾3푋 =
379
+
380
+ exp
381
+ �2휋푖
382
+ 3 ad 푍
383
+ ��
384
+ 푋 =
385
+ � ∞
386
+
387
+ 푛=0
388
+ 1
389
+ 푛!
390
+ �2휋푖
391
+ 3 ad 푍
392
+ ����
393
+ 푋 = 푋.
394
+
395
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
396
+ 7
397
+ Hence we have 푋 ∈ (픤)훾3. Conversely, let 푋 ∈ (픤)훾3. Then we easily see 푋 ∈ 픤푘 for
398
+ some 푘 ∈ {−2, −1, 0, 1, 2}, so that (ad 푍)푋 = 푘푋 holds. Hence it follows from
399
+ 푋 = ˜훾3푋 =
400
+
401
+ exp
402
+ �2휋푖
403
+ 3 ad 푍
404
+ ��
405
+ 푋 =
406
+ � ∞
407
+
408
+ 푛=0
409
+ 1
410
+ 푛!
411
+ �2휋푖
412
+ 3 ad 푍
413
+ �푛�
414
+
415
+ =
416
+ � ∞
417
+
418
+ 푛=0
419
+ 1
420
+ 푛!
421
+ �2휋푖
422
+ 3 푘
423
+ �푛�
424
+ 푋 =
425
+
426
+ exp
427
+ �2휋푖
428
+ 3 푘
429
+ ��
430
+
431
+ that exp
432
+ �2휋푖
433
+ 3 푘
434
+
435
+ = 1. Thus we have 푘 = 3푛, 푛 ∈ 풁, however since |푘| ≤ 2, we see
436
+ 푘 = 0, that is, 푋 ∈ 픤0. With above, 픤0 = (픤)훾3 is proved. This result will be useful later.
437
+ 8.1. The group (퐸8퐶)휅4
438
+ We define 퐶-linear transformations 휅3 and 휅4 of 픢8퐶 by
439
+ 휅3(훷, 푃, 푄, 푟, 푠, 푡) = (휈3훷휈3
440
+ −1, 휔2휈3푃, 휔휈3푄, 푟, 휔푠, 휔2푡),
441
+ 휅4(훷, 푃, 푄, 푟, 푠, 푡) = (휈4훷휈4
442
+ −1, −푖휈4푃, 푖휈4푄, 푟, −푠, −푡),
443
+ where 휔 = (−1/2) + (
444
+
445
+ 3/2)푖 and 휈3, 휈4 ∈ 퐸7 on the right hand side are defined by
446
+ 휈3(푋,푌, 휉, 휂) = (��
447
+
448
+ 휔2휉1
449
+ 푥3
450
+ 푥2
451
+ 푥3
452
+ 휔휉2
453
+ 휔푥1
454
+ 푥2
455
+ 휔푥1
456
+ 휔휉3
457
+ ��
458
+
459
+ , ��
460
+
461
+ 휔휂1
462
+ 푦3
463
+ 푦2
464
+ 푦3
465
+ 휔2휂2
466
+ 휔2푦1
467
+ 푦2
468
+ 휔2푦1
469
+ 휔2휂3
470
+ ��
471
+
472
+ , 휔2휉, 휔휂),
473
+ 휈4(푋,푌, 휉, 휂) = (��
474
+
475
+ −푖휉1
476
+ 푥3
477
+ 푥2
478
+ 푥3
479
+ 푖휉2
480
+ 푖푥1
481
+ 푥2
482
+ 푖 푥1
483
+ 푖휉3
484
+ ��
485
+
486
+ , ��
487
+
488
+ 푖휂1
489
+ 푦3
490
+ 푦2
491
+ 푦3
492
+ −푖휂2
493
+ −푖푦1
494
+ 푦2
495
+ −푖 푦1
496
+ −푖휂3
497
+ ��
498
+
499
+ , −푖휉,푖휂), (푋,푌, 휉, 휂) ∈ 픓퐶,
500
+ respectively. Then 휅3, 휅4 can be expressed by
501
+ 휅3 = exp
502
+ �2휋푖
503
+ 3 ad 휅
504
+
505
+ , 휅4 = exp
506
+ �2휋푖
507
+ 4 ad 휅
508
+
509
+ ,
510
+ respectively, where 휅 := (훷(−2퐸1 ∨ 퐸1, 0, 0, −1), 0, 0, −1, 0, 0) ∈ 픢8퐶, 퐸1 ∨ 퐸1 :=
511
+ (1/3)(2퐸1 − 퐸2 − 퐸3)∼ ∈ 픢6퐶. Besides, 휈3, 휈4 can be also expressed by
512
+ 휈3 = exp
513
+ �2휋푖
514
+ 3 훷(−2퐸1 ∨ 퐸1, 0, 0, −1)
515
+
516
+ , 휈4 = exp
517
+ �2휋푖
518
+ 4 훷(−2퐸1 ∨ 퐸10, 0, −1)
519
+
520
+ ,
521
+ respectively. Hence it follows from above that 휅3, 휅4 ∈ 퐸8 ⊂ 퐸8퐶 and (휅3)3 = (휅4)4 =
522
+ 1, so that 휅3 induces the inner automorphism ˜휅3 of order three on 퐸8:
523
+ ˜휅3(훼) =
524
+ 휅3훼휅3
525
+ −1, 훼 ∈ 퐸8 and 휅4 induces the inner automorphism ˜휅4 of order four on 퐸8:
526
+ ˜휅4(훼) = 휅4훼휅4
527
+ −1, 훼 ∈ 퐸8, so are on 퐸8퐶.
528
+ Now, we will study the subgroup (퐸8퐶)휅4 of 퐸8퐶:
529
+ (퐸8퐶)휅4 =
530
+
531
+ 훼 ∈ 퐸8퐶 �� 휅4훼 = 훼휅4
532
+
533
+ .
534
+ We prove the following lemma needed in the proof of theorem below.
535
+
536
+ 8
537
+ TOSHIKAZU MIYASHITA
538
+ Lemma 8.1. The Lie algebra (픢8퐶)휅4 of the group (퐸8퐶)휅4 coincides with the Lie algebra
539
+ (픢8퐶)휅3 of the group (퐸8퐶)휅3:(픢8퐶)휅4 = (픢8퐶)휅3.
540
+ Proof. By an argument similar to the proof of 픤0 = (픤)훾3 in the beginning of this
541
+ section, 픤0 = (픤)훾4 := {푋 ∈ 픤 | ˜훾4푋 = 푋} is proved, where ˜훾4 := exp
542
+ �2휋푖
543
+ 4 ad 푍
544
+
545
+ .
546
+ Hence, by replacing 픤 and 훾3, 훾4 with 픢8퐶 and 휅3, 휅4, respectively, we obtain
547
+ (픢8퐶)휅4 = 픤0 = (픢8퐶)휅3,
548
+ where the Lie algebra 픤0 above is the same one obtained in [7, Theorem 5.7].
549
+
550
+ Now, we determine the structure of the group (퐸8퐶)휅4.
551
+ Theorem 8.2. The group (퐸8퐶)휅4 is isomorphic to the group (퐶∗ × 푆푝푖푛(14, 퐶))/풁4,
552
+ 풁4 = {(1, 1), (−1, 휙(−1)), (푖, 휙(−푖)), (−푖, 휙(푖))}: (퐸8퐶)휅4 � (퐶∗ × 푆푝푖푛(14, 퐶))/풁4.
553
+ Proof. First, we will prove that the group (퐸8퐶)휅4 coincides with the group (퐸8퐶)휅3.
554
+ Since 퐸8퐶 is the simply connected complex Lie group type 퐸8, both of the groups
555
+ (퐸8퐶)휅4 and (퐸8퐶)휅3 are connected (([3, Preliminaries Lemma 2.2]) in [6]), moreover
556
+ together with (픢8퐶)휅4 = (픢8퐶)휅3 (Lemma 8.1), we have (퐸8퐶)휅4 = (퐸8퐶)휅3.
557
+ Here, we define a mapping 휑 : 퐶∗ × 푆푝푖푛(14, 퐶) → (퐸8퐶)휅4 by the same mapping
558
+ defined in the proof of [5, Theorem 5.10] as follows:
559
+ 휑(푎, 훽) = 휙(푎)훽,
560
+ where 휙 is defined in [5, Subsection 5.3 (p.45)] and 푆푝푖푛(14, 퐶) is constructed in [5,
561
+ Proposition 5.8.7].
562
+ Therefore, from (퐸8퐶)휅4 = (퐸8퐶)휅3, we have the required isomorphism
563
+ (퐸8퐶)휅4 � (퐶∗ × 푆푝푖푛(14, 퐶))/풁4.
564
+
565
+ 8.2. The group (퐸8)휅4
566
+ In this subsection, as for the construction of 푆푝푖푛(14, 퐶), we will give a briefly
567
+ explain based on [5, Section 5.3], and note that several signs in [5, Section 5.3] are
568
+ changed as mentioned in the beginning of this section. After that, we will construct the
569
+ group 푆푝푖푛(14) in 퐸8 and determine the structure of the group (퐸8)휅4.
570
+ Besides, as for the embedding sequence of the exceptional compact Lie groups:
571
+ 푆푝푖푛(8) ⊂ 퐹4 ⊂ 퐸6 ⊂ 퐸7 ⊂ 퐸8, see [7, Theorems 2.7.1, 3.7.1, 4.7.2, 5.7.3 ] in detail.
572
+ We define 14-dimensional 퐶-vector subspaces (픢8퐶)2, (픢8퐶)−2 of 픢8퐶 by
573
+ (픢8퐶)2 =
574
+
575
+ 푅 ∈ 픢8퐶 | (ad휅)푅 = 2푅
576
+
577
+ =
578
+ 
579
+ 
580
+ 푅 = (훷, 0, 푄, 0, 0, 푡)
581
+ ��������
582
+ 훷 = 훷(0, 0, 휚1퐸1, 0), 휚1 ∈ 퐶,
583
+ 푄 = (휉2퐸2 + 휉3퐸3 + 퐹1(푥1), 휂1퐸1, 0, 휂),
584
+ 휉푘, 휂1, 휂 ∈ 퐶, 푥1 ∈ ℭ퐶,
585
+ 푡 ∈ 퐶
586
+ 
587
+ 
588
+ ,
589
+
590
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
591
+ 9
592
+ (픢8퐶)−2 =
593
+
594
+ 푅 ∈ 픢8퐶 �� (ad휅)푅 = −2푅
595
+
596
+ =
597
+ 
598
+ 
599
+ 푅 = (훷, 푃, 0, 0, 푠, 0)
600
+ ��������
601
+ 훷 = 훷(0, 휐1퐸1, 0, 0), 휐1 ∈ 퐶,
602
+ 푃 = (휉1퐸1, 휂2퐸2 + 휂3퐸3 + 퐹1(푦1), 휉, 0),
603
+ 휉1, 휂푘, 휉 ∈ 퐶, 푦1 ∈ ℭ퐶,
604
+ 푠 ∈ 퐶
605
+ 
606
+ 
607
+ ,
608
+ respectively, where 휅 = (훷(−2퐸1∨퐸1, 0, 0, −1), 0, 0, −1, 0, 0) ∈ 픢8퐶 is used in previous
609
+ subsection .
610
+ We define a 퐶-linear mapping 휁 : 픢8퐶 → 픢8퐶 by
611
+ 휁 (훷, 푃, 푄, 푟, 푠, 푡) = (휁1훷휁1−1, 푖휁1푄, 푖휁1푃, −푟, 푡, 푠),
612
+ where the 퐶-linear transformation 휁1 of 픓퐶 on the right hand side is defined by
613
+ 휁1(푋,푌, 휉, 휂) = (��
614
+
615
+ 푖휂
616
+ 푥3
617
+ 푥2
618
+ 푥3
619
+ 푖휂3
620
+ −푖푦1
621
+ 푥2
622
+ −푖 푦1
623
+ 푖휂2
624
+ ��
625
+
626
+ , ��
627
+
628
+ 푖휉
629
+ 푦3
630
+ 푦2
631
+ 푦3
632
+ 푖휉3
633
+ −푖푥1
634
+ 푦2
635
+ −푖 푥1
636
+ 푖휉2
637
+ ��
638
+
639
+ , 푖휂1, 푖휉1),
640
+ In particular, the restriction of the mapping 휁 to (픢8퐶)−2 induces a mapping (픢8퐶)−2 →
641
+ (픢8퐶)2, so the explicit form of its restriction mapping is given by
642
+ 휁 (훷(0, 휐1퐸1, 0, 0), (휉1퐸1, 휂2퐸2 + 휂3퐸3 + 퐹1(푦1), 휉, 0), 0, 0, 푠, 0)
643
+ = (훷(0, 0, 휐1퐸1, 0), 0, (−휂3퐸2 − 휂2퐸3 + 퐹1(푦1), −휉퐸1, 0, −휉1), 0, 0, 푠).
644
+ Note that the restriction of the mapping 휁 to (픢8퐶)2 is also denoted by the same sign.
645
+ Moreover, we define a 퐶-linear mapping 훿 : (픢8퐶)2 → (픢8퐶)2
646
+ 훿(훷(0, 0, 휚1퐸1, 0), 0, 푄, 0, 0, 푡) = (훷(0, 0, −푡퐸1, 0), 0, 푄, 0, 0, −휚1).
647
+ We denote the composition mapping 훿휁 : (픢8퐶)−2 → (픢8퐶)2 of 휁 and 훿 by 휁훿, then the
648
+ explicit form of the mapping 휁훿 is given by
649
+ 휁훿(훷(0, 휐1퐸1, 0, 0), (휉1퐸1, 휂2퐸2 + 휂3퐸3 + 퐹1(푦1), 휉, 0), 0, 0, 푠, 0)
650
+ = (훷(0, 0, −푠퐸1, 0), 0, (−휂3퐸2 − 휂2퐸3 + 퐹1(푦1), −휉퐸1, 0, −휉1), 0, 0, −휐1),
651
+ in addition, the explicit form of the inverse mapping 휁훿−1 : (픢8퐶)2 → (픢8퐶)−2 is given
652
+ by
653
+ 휁훿−1(훷(0, 0, 휚1퐸1, 0), 0, (휉2퐸2 + 휉3퐸3 + 퐹1(푥1), 휂1퐸1, 0, 휂), 0, 0, 푡)
654
+ = (훷(0, −푡퐸1, 0, 0), (−휂퐸1, −휉3퐸2 − 휉2퐸3 + 퐹1(푥1), −휂1, 0), 0, 0, −휚1, 0).
655
+ Now, we define a subgroup (퐺14)퐶 of 퐸8퐶 by
656
+ (퐺14)퐶 :=
657
+
658
+ 훽 ∈ 퐸8퐶 �� (ad휅)훽 = 훽(ad휅), 휁훿훽푅 = 훽휁훿푅, 푅 ∈ (픢8퐶)−2
659
+
660
+ .
661
+ Then, from [5, Proposition 5.8.7], the group (퐺14)퐶 is isomorphic to the group
662
+ 푆푝푖푛(14, 퐶) as the universal covering group of 푆푂(14, 퐶):
663
+ (퐺14)퐶 � 푆푝푖푛(14, 퐶).
664
+
665
+ 10
666
+ TOSHIKAZU MIYASHITA
667
+ In particular, note that (퐺14)퐶, (픢8퐶)−2 above are denoted by 퐺14, (푉퐶)14 in [5, Propo-
668
+ sition 5.8.7], respectively.
669
+ We prove the following lemma needed below and later.
670
+ Lemma 8.3. The 퐶-linear transformation 휏휆휔 satisfies the formula (ad휅)휏휆휔 = −휏휆휔
671
+ (ad휅) and commutes with the 퐶-linear transformation 휅4:(휏휆휔)휅4 = 휅4(휏휆휔), where
672
+ 휏휆휔 is a composition transformation of 휏 and 휆휔 defined in [3, Preliminaries (p.96)].
673
+ Proof. First, we denote 훷(−2퐸1 ∨ 퐸1, 0, 0, −1) by 훷휅 only in this lemma: 훷휅 :=
674
+ 훷(−2퐸1 ∨ 퐸1, 0, 0, −1). Then, note that 휏휆훷휅 = −훷휅휏휆, it follows that
675
+ (ad휅)휏휆휔(훷, 푃, 푄, 푟, 푠, 푡)
676
+ = ad휅(휏휆훷휆−1휏, 휏휆푄, −휏휆푃, −휏푟, −휏푡, −휏푠)
677
+ = ([훷휅, 휏휆훷휆−1휏],훷휅(휏휆푄) − 휏휆푄, −훷휅(휏휆푃) − 휏휆푃, 0, 2휏푡, −2휏푠)
678
+ = −(휏휆[훷휅,훷]휆−1휏, 휏휆(훷휅푄 + 푄), −휏휆(훷휅푃 − 푃), 0, −2(휏푡), 2(휏푠))
679
+ = −휏휆휔(ad휅)(훷, 푃, 푄, 푟, 푠, 푡), (훷, 푃, 푄, 푟, 푠, 푡) ∈ 픢퐶
680
+ 8 ,
681
+ that is, (ad휅)휏휆휔 = −휏휆휔(ad휅). The first half is proved.
682
+ The second half is easily proved by doing straightforward computation under the
683
+ definitions of 휏휆휔 and 휅4.
684
+
685
+ Here, in order to prove the proposition below , we use the following lemma.
686
+ Lemma 8.4. (1) For 푅 ∈ (픢8퐶)−2, the formula (휏휆휔)휁훿푅 = 휁훿−1(휏휆휔)푅 holds.
687
+ (2) For 훽 ∈ 푆푝푖푛(14, 퐶), 훽 satisfies the formula 휁훿−1훽푅′ = 훽휁훿−1푅′, 푅′ ∈ (픢8퐶)2.
688
+ Proof. (1) Under the definition of 휏휆휔 and the mappings 휁훿, 휁훿−1 mentioned above,
689
+ we do straightforward computation of both sides:
690
+ (휏휆휔)휁훿푅
691
+ = (휏휆휔)휁훿(훷(0, 휐1퐸1, 0, 0), (휉1퐸1, 휂2퐸2 + 휂3퐸3 + 퐹1(푦1), 휉, 0), 0, 0, 푠, 0)
692
+ = 휏휆휔(훷(0, 0, −푠퐸1, 0), 0, (−휂3퐸2 − 휂2퐸3 + 퐹1(푦1), −휉퐸1, 0, −휉1), 0, 0, −휐1)
693
+ = (휏휆훷(0, 0, −푠퐸1, 0)휆−1휏, 휏휆(−휂3퐸2 − 휂2퐸3 + 퐹1(푦1), −휉퐸1, 0, −휉1), 0, 0, 휏휐1, 0)
694
+ = (훷(0, 휏푠퐸1, 0, 0), (−휏휉퐸1, 휏휂3퐸2 + 휏휂2퐸3 − 퐹1(휏푦1), −휏휉1, 0), 0, 0, 휏휐1, 0),
695
+ 휁훿−1(휏휆휔)푅
696
+ = 휁훿−1(휏휆훷(0, 휐1퐸1, 0, 0)휆−1휏, 0, −휏휆(휉1퐸1, 휂2퐸2 + 휂3퐸3 + 퐹1(푦1), 휉, 0), 0, 0, −휏푠)
697
+ = 휁훿−1(훷(0, 0, −휏휐1퐸1, 0), 0, (−휏휂2퐸2 − 휏휂3퐸3 − 퐹1(휏푦1), 휏휉1퐸1, 0, 휏휉), 0, 0, −휏푠)
698
+ = (훷(0, 휏푠퐸1, 0, 0), (−휏휉퐸1, 휏휂3퐸2 + 휏휂2퐸3 − 퐹1(휏푦1), −휏휉1, 0), 0, 0, 휏휐1, 0).
699
+ With above, the required formula is proved.
700
+ (2) Let 푆푝푖푛(14, 퐶) as the group (퐺14)퐶. In the formula 휁훿훽푅 = 훽휁훿푅, 푅 ∈ (픢8퐶)−2,
701
+ the required formula is proved by setting 휁훿푅 = 푅′, 푅′ ∈ (픢8퐶)2.
702
+
703
+
704
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
705
+ 11
706
+ Proposition 8.5. The 퐶-linear transformation 휏휆휔 induces the involutive inner auto-
707
+ morphism of the group 푆푝푖푛(14,퐶): ˜휏휆휔(훽) = (휏휆휔)훽(휆휔휏), 훽 ∈ 푆푝푖푛(14, 퐶).
708
+ Proof. Let 푆푝푖푛(14, 퐶) as the group (퐺14)퐶. We define a mapping 푔 : (퐺14)퐶 →
709
+ (퐺14)퐶 by
710
+ 푔(훽) = (휏휆휔)훽(휆휔휏).
711
+ We will prove 푔(훽) ∈ (퐺14)퐶. First, it follows from the first half of Lemma 8.3 that
712
+ (ad휅)푔(훽) = (ad휅)(휏휆휔)훽(휆휔휏)
713
+ = −(휏휆휔)(ad휅)훽(휆휔휏)
714
+ = −(휏휆휔)훽(ad휅)(휆휔휏)
715
+ = −(휏휆휔)훽(−휆휔휏(ad휅))
716
+ = (휏휆휔)훽(휆휔휏)(ad휅)
717
+ = 푔(훽)(ad휅),
718
+ that is, (ad휅)푔(훽) = 푔(훽)(ad휅).
719
+ Next, as for 휁훿푔(훽)푅 = 푔(훽)휁훿푅, 푅 ∈ (픢8퐶)−2, it follows from Lemma 8.4 (1), (2)
720
+ that
721
+ 휁훿푔(훽)푅 = 휁훿(휏휆휔훽휆휔휏)푅
722
+ ((휏휆휔훽휆휔휏)푅 ∈ (픢8퐶)−2)
723
+ = (휏휆휔)휁훿−1(휏휆휔)(휏휆휔훽휆휔휏푅)
724
+ = 휏휆휔휁훿−1훽휆휔휏푅
725
+ (휆휔휏푅 ∈ (픢8)2)
726
+ = 휏휆휔훽휁훿−1휆휔휏푅
727
+ = 휏휆휔훽휏휆휔휁훿푅
728
+ = (휏휆휔훽휆휔휏)휁훿푅
729
+ = 푔(훽)휁훿푅,
730
+ that is, 휁훿푔(훽)푅 = 푔(훽)휁훿푅, 푅 ∈ (픢8퐶)−2.
731
+ Hence we have 푔(훽) ∈ (퐺14)퐶. The proof of this proposition is completed.
732
+
733
+ From Proposition 8.5, we can define a subgroup (푆푝푖푛(14, 퐶))휏휆휔 of 푆푝푖푛(14, 퐶):
734
+ (푆푝푖푛(14, 퐶))휏휆휔 = {훽 ∈ 푆푝푖푛(14, 퐶) | (휏휆휔)훽 = 훽(휏휆휔)} .
735
+ We prove the following lemma needed in the proof of theorem below .
736
+ Lemma 8.6. The Lie algebra (픰픭픦픫(14, 퐶))휏휆휔 of the group (푆푝푖푛(14, 퐶))휏휆휔 is given
737
+ by
738
+ (픰픭픦픫(14, 퐶))휏휆휔 =
739
+
740
+ 푅 ∈ (픤14)퐶 �� (휏휆휔)푅 = 푅
741
+
742
+
743
+ 12
744
+ TOSHIKAZU MIYASHITA
745
+ =
746
+ 
747
+ 
748
+ 푅 = (훷, 푃, −휏휆푃, 푟, 0, 0)
749
+ �����������������
750
+ 훷 = 훷(퐷 + ˜퐴(푑1)
751
+ +푖(휏1퐸1 + 휏2퐸2 + 휏3퐸3 + 퐹1(푡1))∼, 퐴, −휏퐴, 휈),
752
+ 퐷 ∈ 픰픬(8), 푑1, 푡1 ∈ ℭ,
753
+ 휏푘 ∈ 푹, 휏1 + 휏2 + 휏3 = 0,
754
+ 퐴 = 훼2퐸2 + 훼3퐸3 + 퐹1(푎1) ∈ 픍퐶, 휈 ∈ 푖푹,
755
+ 푃 = (휌2퐸2 + 휌3퐸3 + 퐹1(푝1), 휌1퐸1, 0, 휌) ∈ 픓퐶,
756
+ 푟 ∈ 푖푹,
757
+ 푖휏1 + (2/3)휈 + 2푟 = 0
758
+ 
759
+ 
760
+ .
761
+ where the Lie algebra (픤14)퐶 is defined as 픤14 in [5, Lemma 5.8.3].
762
+ In particular, we have dim((픰픭픦픫(14, 퐶)휏휆휔) = (28+16+2+20+1)+24+1−1 = 91.
763
+ Proof. Let 푅 = (훷(휙, 퐴, 퐵, 휈), 푃, 푄, 푟, 0, 0) ∈ (픤14)퐶, where
764
+ 휙 = 퐷 + ˜퐴1(푑1) + (휏1퐸1 + 휏2퐸2 + 휏3퐸3 + 퐹1(푡1))∼, 퐷 ∈ 픰픬(8, 퐶),
765
+ 푑1, 푡1 ∈ ℭ퐶, 휏푘 ∈ 퐶, 휏1 + 휏2 + 휏3 = 0,
766
+ 퐴 = 훼2퐸2 + 훼3퐸3 + 퐹1(푎1) ∈ 픍퐶, 훼푘 ∈ 퐶, 푎1 ∈ ℭ퐶,
767
+ 퐵 = 훽2퐸2 + 훽3퐸3 + 퐹1(푏1) ∈ 픍퐶, 훽푘 ∈ 퐶, 푏1 ∈ ℭ퐶,
768
+ 휈 ∈ 퐶,
769
+ 푃 = (휌2퐸2 + 휌3퐸3 + 퐹1(푝1), 휌1퐸1, 0, 휌) ∈ 픓퐶, 휌푘, 휌 ∈ 퐶, 푝1 ∈ ℭ퐶,
770
+ 푄 = (휁1퐸1, 휁2퐸2 + 휁3퐸3 + 퐹1(푧1), 휁1퐸1, 휁, 0) ∈ 픓퐶, 휁푘, 휁 ∈ 퐶, 푧1 ∈ ℭ퐶,
771
+ 푟 ∈ 퐶,
772
+ 휏1 + (2/3)휈 + 2푟 = 0.
773
+ Then it follows from
774
+ (휏휆휔)푅 = (휏휆휔)(훷(휙, 퐴, 퐵, 휈), 푃, 푄, 푟, 0, 0, )
775
+ = (휏휆훷(휙, 퐴, 퐵, 휈)휆−1휏, 휏휆푄, −휏휆푃, −휏푟, 0, 0)
776
+ that
777
+ 휏휆훷(휙, 퐴, 퐵, 휈)휆−1휏 = 훷(휙, 퐴, 퐵, 휈), 휏휆푄 = 푃, −휏휆푃 = 푄, −휏푟 = 푟.
778
+ Hence, using the formula 휏휆훷(휙, 퐴, 퐵, 휈)휆−1휏 = 훷(−휏 푡휙휏, −휏��, −휏퐴, −휏휈), the
779
+ required result is obtained.
780
+
781
+ From Lemma 8.6, we have
782
+ (픰픭픦픫(14, 퐶))휏휆휔 ⊂ 픢8 =
783
+
784
+ 푅 = (훷, 푃, −휏휆푃, 푟, 푠, −휏푠)
785
+ ����
786
+ 훷 ∈ 픢7, 푃 ∈ 픓퐶,
787
+ 푟 ∈ 푖푹, 푠 ∈ 퐶
788
+
789
+ .
790
+ Now, we construct the spinor group 푆푝푖푛(14) in 퐸8.
791
+ Theorem 8.7. The group (푆푝푖푛(14, 퐶))휏휆휔 is isomorphic to the group 푆푝푖푛(14) :
792
+ (푆푝푖푛(14, 퐶))휏휆휔 � 푆푝푖푛(14).
793
+
794
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
795
+ 13
796
+ Proof. First, since the group 푆푝푖푛(14, 퐶) is the simply connected Lie group, the group
797
+ (푆푝푖푛(14, 퐶))휏휆휔 is connected (([3, Preliminaries Lemma 2.2]) in [6]). Hence, since
798
+ both of the groups (푆푝푖푛(14, 퐶))휏휆휔 and 퐸8 are connected and (픰픭픦픫(14, 퐶))휏휆휔 ⊂ 픢8,
799
+ we confirm (푆푝푖푛(14, 퐶))휏휆휔 ⊂ 퐸8.
800
+ We define a 14-dimensional 푹-vector space 푉14 by
801
+ 푉14 =
802
+
803
+ 푅 ∈ (픢8퐶)−2
804
+ �� (휏휆휔)휁훿푅 = −푅
805
+
806
+ =
807
+ 
808
+ 
809
+ 푅 = (훷(0, 휐퐸1, 0, 0), (휉퐸1, 휂퐸2 − 휏휂퐸3 + 퐹1(푦), 휏휉, 0), 0, 0, −휏휐, 0)
810
+ ��������
811
+ 휐 ∈ 퐶,
812
+ 휉 ∈ 퐶,
813
+ 휂 ∈ 퐶,
814
+ 푦 ∈ ℭ
815
+ 
816
+ 
817
+ with the norm
818
+ (푅, 푅)휁 = 1
819
+ 30퐵8(휁훿푅, 푅) = 4(휏휐)휐 + (휏휂)휂 + 푦푦 + (휏휉)휉,
820
+ where 퐵8 is the Killing form of 픢8퐶 (as for the Killing form 퐵8, see [7, Theorem 5.3.2]
821
+ in detail). Obviously, the group (푆푝푖푛(14, 퐶))휏휆휔 acts on 푉14.
822
+ Here, let the orthogonal group
823
+ 푂(14) = 푂(푉14) =
824
+
825
+ 훼 ∈ Iso푹(푉14)
826
+ �� (훼푅, 훼푅)휁 = (푅, 푅)휁
827
+
828
+ .
829
+ We consider the restriction 훼
830
+ ��
831
+ 푉14 of 훼 ∈ (푆푝푖푛(14, 퐶))휏휆휔 to 푉14, then we see 훼
832
+ ��
833
+ 푉14∈
834
+ 푂(14) = 푂(푉14). Indeed, the group (푆푝푖푛(14, 퐶))휏휆휔 acts on 푉14, so that we have
835
+
836
+ ��
837
+ 푉14∈ Iso푹(푉14). Moreover, for 푅 ∈ 푉14, it follows that
838
+ (훼
839
+ ��
840
+ 푉14 푅, 훼
841
+ ��
842
+ 푉14 푅)휁 = 1
843
+ 30퐵8(휁훿훼
844
+ ��
845
+ 푉14 푅, 훼
846
+ ��
847
+ 푉14 푅)
848
+ = 1
849
+ 30퐵8(휁훿훼푅, 훼푅)
850
+ = 1
851
+ 30퐵8(훼휁훿푅, 훼푅)
852
+ = 1
853
+ 30퐵8(휁훿푅, 푅)
854
+ = (푅, 푅)휁.
855
+ Hence we can define a homomorphism 휋 : (푆푝푖푛(14, 퐶))휏휆휔 → 푂(14) = 푂(푉14) by
856
+ 휋(훼) = 훼
857
+ ��
858
+ 푉14 .
859
+ Moreover, since the mapping 휋 is continuous and the group (푆푝푖푛(14, 퐶))휏휆휔 is con-
860
+ nected, 휋 induces a homomorphism
861
+ 휋 : (푆푝푖푛(14, 퐶))휏휆휔 → 푆푂(14) = 푆푂(푉14).
862
+ We will determine Ker 휋. First, from the definition of kernel, we have
863
+ Ker 휋 =
864
+
865
+ 훽 ∈ (푆푝푖푛(14, 퐶))휏휆휔 �� 휋(훽) = 1
866
+
867
+ =
868
+
869
+ 훽 ∈ (푆푝푖푛(14, 퐶))휏휆휔 �� 훽
870
+ ��
871
+ 푉14= 1
872
+
873
+ (⊂ 퐸8).
874
+
875
+ 14
876
+ TOSHIKAZU MIYASHITA
877
+ Then let 훽 ∈ Ker 휋. Sinceit follows from (훷(0, −퐸1, 0, 0), 0, 0, 0, 1, 0), 푖(훷(0, 퐸1, 0, 0),
878
+ 0, 0, 0, 1, 0) ∈ 푉14 that
879
+ 훽(훷(0, −퐸1, 0, 0), 0, 0, 0, 1, 0) = (훷(0, −퐸1, 0, 0), 0, 0, 0, 1, 0),
880
+ 훽푖(훷(0, 퐸1, 0, 0), 0, 0, 0, 1, 0) = 푖(훷(0, 퐸1, 0, 0), 0, 0, 0, 1, 0),
881
+ note that 훽 ∈ Iso퐶 (픢8퐶), we have 훽(0, 0, 0, 0, 1, 0) = (0, 0, 0, 0, 1, 0).
882
+ Here, if
883
+ 훽(0, 0, 0, 0, 1, 0) = (0, 0, 0, 0, 1, 0), we have 훽(0, 0, 0, 0, 0, 1) = (0, 0, 0, 0, 0, 1). In-
884
+ deed, it follows from (휏휆휔)훽 = 훽(휏휆휔) that
885
+ (0, 0, 0, 0, 0, 1) = 휏휆휔(0, 0, 0, 0, −1, 0) = −휏휆휔(0, 0, 0, 0, 1, 0)
886
+ = −(휏휆휔)훽(0, 0, 0, 0, 1, 0) = −훽(휏휆휔)(0, 0, 0, 0, 1, 0)
887
+ = −훽(0, 0, 0, 0, 0, −1)
888
+ = 훽(0, 0, 0, 0, 0, 1),
889
+ that is, 훽(0, 0, 0, 0, 0, 1) = (0, 0, 0, 0, 0, 1). Hence we have 훽 ∈ 퐸7 ⊂ (퐸8)(0,0,0,0,0,1)
890
+ ([7, Theorem 5.7.3]).
891
+ Moreover, since it follows from (0, (퐸1, 0, 1, 0), 0, 0, 0, 0), 푖(0, (−퐸1, 0, 1, 0), 0, 0, 0, 0)
892
+ ∈ 푉14 that
893
+ 훽(0, (퐸1, 0, 1, 0), 0, 0, 0, 0) = (0, (퐸1, 0, 1, 0), 0, 0, 0, 0)
894
+ 훽푖(0, (−퐸1, 0, 1, 0), 0, 0, 0, 0) = 푖(0, (−퐸1, 0, 1, 0), 0, 0, 0, 0),
895
+ again note that 훽 ∈ Iso퐶 (픢8퐶), we have 훽(0, (0, 0, 1, 0), 0, 0, 0, 0) = (0, (0, 0, 1, 0), 0, 0,
896
+ 0, 0) and 훽(0, (퐸1, 0, 0, 0), 0, 0, 0, 0) = (0, (퐸1, 0, 0, 0), 0, 0, 0, 0), that is, 훽(0, 0, 1, 0) =
897
+ (0, 0, 1, 0) and 훽퐸1 = 퐸1 in 픓퐶. Hence we have 훽 ∈ 퐸6 ⊂ (퐸7)(0,0,1,0) ([7, Theorem
898
+ 4.7.2]) and 훽 satisfies 훽퐸1 = 퐸1.
899
+ In addition, since (0, (0, 퐸2 − 퐸3, 0, 0), 0, 0, 0, 0), (0, (0, 푖(퐸2 + 퐸3), 0, 0), 0, 0, 0, 0) ∈
900
+ 푉14, 훽 satisfies 훽(퐸2 − 퐸3) = 퐸2 − 퐸3 and 훽(퐸2 + 퐸3) = 퐸2 + 퐸3 in 픍퐶 by an
901
+ argument similar to above, together with 훽퐸1 = 퐸1 above, we have 훽퐸푖 = 퐸푖, 푖 =
902
+ 1, 2, 3, so we have 훽 ∈ 퐹4 ⊂ (퐸6)퐸 ([7, Theorem 3.7.1]), and moreover we see
903
+ 훽 ∈ 푆푝푖푛(8) ⊂ (퐹4)퐸1,퐸2,퐸3 ([7, Theorem 2.7.1]).
904
+ Here, we denote 훽 ∈ 푆푝푖푛(8)
905
+ by 훽 = (훽1, 훽2, 훽3) ∈ 푆푂(8) × 푆푂(8) × 푆푂(8), then since 훽1 satisfies the condition
906
+ 훽1푦 = 푦 for all 푦 ∈ ℭ, we have 훽1 = 1. Hence, from the Principle of triality on 푆푂(8),
907
+ we have the following
908
+ 훽 = (1, 1, 1) = 1
909
+ or
910
+ 훽 = (1, −1, −1) =: 휎.
911
+ Hence we have Ker 휋 ⊂ {1, 휎} and vice versa, so that Ker 휋 = {1, 휎} � 풁2.
912
+ Finally, since the group 푆푂(14) is connected and Ker 휋 is discrete, together with
913
+ dim((픰픭픦픫(14, 퐶)휏휆휔) = 91 = dim(픰픬(14)) (Lemma 8.6), 휋 is surjective. Thus we
914
+ have the isomorphism (푆푝푖푛(14, 퐶))휏휆휔/풁2 � 푆푂(14).
915
+ Therefore the group (푆푝푖푛(14, 퐶))휏휆휔 is isomorphic to the group 푆푝푖푛(14) as the
916
+ universal covering group of 푆푂(14):
917
+ (푆푝푖푛(14, 퐶))휏휆휔 � 푆푝푖푛(14).
918
+
919
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
920
+ 15
921
+
922
+ Let the mapping 휙 : 퐶∗ → 퐸8퐶 defined in [5, Subsection 5.3 (p.45)].
923
+ Then we prove the following lemma needed in the proof of theorem below.
924
+ Lemma 8.8. For 푎 ∈ 퐶∗, the action of 휙(푎) on 픢8퐶 is given by
925
+ 휙(푎)(훷, 푃, 푄, 푟, 푠, 푡) = (휓(푎)훷휓(푎)−1, 푎휓(푎)푃, 푎−1휓(푎)푄, 푟, 푎2푠, 푎−2푡),
926
+ where the action to 픓퐶 of 휓(푎) ∈ 퐸7퐶 on right hand side is defined by
927
+ 휓(푎)(푋,푌, 휉, 휂) = (��
928
+
929
+ 푎휉1
930
+ 푥3
931
+ 푥2
932
+ 푥3
933
+ 푎−1휉2
934
+ 푎−1푥1
935
+ 푥2
936
+ 푎−1푥1
937
+ 푎−1휉3
938
+ ��
939
+
940
+ , ��
941
+
942
+ 푎−1휂1
943
+ 푦3
944
+ 푦2
945
+ 푦3
946
+ 푎휂2
947
+ 푎푦1
948
+ 푦2
949
+ 푎푦1
950
+ 푎휂3
951
+ ��
952
+
953
+ , 푎휉, 푎−1휂).
954
+ Moreover, we have the following formula
955
+ (휏휆휔)휙(푎)(휆휔휏) = 휙((휏푎)−1).
956
+ Proof. As for the first half, its proof is proved in [5, Lemma 5.9]. As for the second
957
+ half, we first have (휏휆)휓(푎)(휆−1휏) = 휓((휏푎)−1). Indeed, it follows that
958
+ (휏휆)휓(푎)(휆−1휏)(푋,푌, 휉, 휂)
959
+ = (휏휆)휓(푎)(−휏푌, 휏푋, −휏휂, 휏휉)
960
+ = (휏휆)(��
961
+
962
+ −푎휏휂1
963
+ −휏푦3
964
+ −휏푦2
965
+ −휏푦3
966
+ −푎−1휏휂2
967
+ −푎−1휏푦1
968
+ −휏푦2
969
+ −푎−1휏푦1
970
+ −푎−1휏휂3
971
+ ��
972
+
973
+ , ��
974
+
975
+ 푎−1휏휉1
976
+ 휏푥3
977
+ 휏푥2
978
+ 휏푥3
979
+ 푎휏휉2
980
+ 푎휏푥1
981
+ 휏푥2
982
+ 푎휏푥1
983
+ 푎휏휉3
984
+ ��
985
+
986
+ , −푎휏휂, 푎−1휏휉)
987
+ = (��
988
+
989
+ (휏푎−1)휉1
990
+ 푥3
991
+ 푥2
992
+ 푥3
993
+ (휏푎)휉2
994
+ (휏푎)푥1
995
+ 푥2
996
+ (휏푎)푥1
997
+ (휏푎)휉3
998
+ ��
999
+
1000
+ , ��
1001
+
1002
+ (휏푎)휂1
1003
+ 푦3
1004
+ 푦2
1005
+ 푦3
1006
+ (휏푎−1)휂2
1007
+ (휏푎−1)푦1
1008
+ 푦2
1009
+ (휏푎−1)푦1
1010
+ (휏푎−1)휂3
1011
+ ��
1012
+
1013
+ , (휏푎−1)휉, (휏푎)휂)
1014
+ = 휓((휏푎)−1).
1015
+ Hence, using 휏휆휔(훷, 푃, 푄, 푟, 푠, 푡) = (휏휆훷휆−1휏, 휏휆푄, −휏휆푃, −휏푟, −휏푡, −휏푠) and the
1016
+ formula (휏휆)휓(푎)(휆−1휏) = 휓((휏푎)−1) shown above, we can obtain the formula
1017
+ (휏휆휔)휙(푎)(휆휔휏) = 휙((휏푎)−1) by doing straightforward computation.
1018
+
1019
+ Now, we determine the structure of the group (퐸8)휅4.
1020
+ Theorem 8.9. The group (퐸8)휅4 is isomorphic to the group (푈(1) ×푆푝푖푛(14))/풁4, 풁4
1021
+ = {(1, 1), (−1, 휙(−1)), (푖, 휙(−푖)), (−푖, 휙(푖))}: (퐸8)휅4 � (푈(1) × 푆푝푖푛(14))/풁4.
1022
+ Proof. Let 푈(1) := {푎 ∈ 퐶 | (휏푎)푎 = 1}(⊂ 퐶∗) and 푆푝푖푛(14)(⊂ 푆푝푖푛(14, 퐶)) as the
1023
+ group (푆푝푖푛(14, 퐶))휏휆휔 (Proposition 8.7). Then we can define a mapping 휑휅4 : 푈(1) ×
1024
+ 푆푝푖푛(14) → (퐸8)휅4 by the restriction of the mapping 휑 : 퐶∗×푆푝푖푛(14, 퐶) → (퐸8퐶)휅4:
1025
+ 휑휅4(푎, 훽) = 휑(푎, 훽) = 휙(푎)훽 (Theorem 8.2).
1026
+ First, we will prove that 휑휅4 is well-defined. It is clear 휙(푎) ∈ (퐸8퐶)휅4, so that
1027
+ we have 휙(푎) ∈ (퐸8)휅4. Indeed, since 푎 satisfies the condition (휏푎)푎 = 1, we have
1028
+ (휏휆휔)휙(푎)(휆휔휏) = 휙(푎) by Lemma 8.8, that is, 휙(푎) ∈ ((퐸8퐶)휅4)휏휆휔, moreover it
1029
+
1030
+ 16
1031
+ TOSHIKAZU MIYASHITA
1032
+ follows from (휏휆휔)휅4 = 휅4(휏휆휔) (Lemma 8.3) and (퐸8퐶)휏휆휔 = 퐸8 ([3, Preliminaries
1033
+ (p.96)]) that
1034
+ 휙(푎) ∈ ((퐸8퐶)휅4)휏휆휔 = ((퐸8퐶)휏휆휔)휅4 = (퐸8)휅4.
1035
+ By an argument similar to above, it follows from Lemma 8.3 that
1036
+ 훽 ∈ 푆푝푖푛(14) = (푆푝푖푛(14, 퐶))휏휆휔 ⊂ ((퐸8퐶)휅4)휏휆휔 = ((퐸8퐶)휏휆휔)휅4 = (퐸8)휅4,
1037
+ that is, 훽 ∈ (퐸8)휅4. Hence 휑휅4 is well-defined. Subsequently, we will prove that 휑휅4 is
1038
+ a homomorphism, however since 휑휅4 is the restriction of the mapping 휑, it is clear.
1039
+ Next, we will prove that 휑휅4 is surjective. Let 훼 ∈ (퐸8)휅4 ⊂ (퐸8퐶)휅4, there exist
1040
+ 푎 ∈ 퐶∗ and 훽 ∈ 푆푝푖푛(14, 퐶) such that 훼 = 휑(푎, 훽) (Theorem 8.2). Moreover, from
1041
+ the condition (휏휆휔)훼(휆휔휏) = 훼, that is, (휏휆휔)휑(푎, 훽)(휆휔휏) = 휑(푎, 훽), we have
1042
+ 휑((휏푎)−1, (휏휆휔)훽(휆휔휏)) = 휑(푎, 훽). Indeed, it follows from Lemma 8.8 that
1043
+ (휏휆휔)휑(푎, 훽)(휆휔휏) = (휏휆휔)휙(푎)훽(휆휔휏)
1044
+ = (휏휆���)휙(푎)(휆휔휏)(휏휆휔)훽(휆휔휏)
1045
+ = 휙((휏푎)−1)(휏휆휔)훽(휆휔휏)
1046
+ = 휑((휏푎)−1, (휏휆휔)훽(휆휔휏))
1047
+ that 휑((휏푎)−1, (휏휆휔)훽(휆휔휏)) = 휑(푎, 훽).
1048
+ Hence, since Ker휑 = {(1, 1), (−1, 휙(−1)), (푖, 휙(−푖)), (−푖, 휙(푖))}, we have the fol-
1049
+ lowing
1050
+ (i)
1051
+ � (휏푎)−1 = 푎
1052
+ (휏휆휔)훽(휆휔휏) = 훽,
1053
+ (ii)
1054
+ � (휏푎)−1 = −푎
1055
+ (휏휆휔)훽(휆휔휏) = 휙(−1)훽,
1056
+ (iii)
1057
+ � (휏푎)−1 = 푖푎
1058
+ (휏휆휔)훽(휆휔휏) = 휙(−푖)훽,
1059
+ (iv)
1060
+ � (휏푎)−1 = −푖푎
1061
+ (휏휆휔)훽(휆휔휏) = 휙(푖)훽.
1062
+ Case (i). From (휏푎)−1 = 푎, we have 푎 ∈ 푈(1) = {푎 ∈ 퐶∗ | (휏푎)푎 = 1}. From
1063
+ (휏휆휔)훽(휆휔휏) = 훽, we have 훽 ∈ 푆푝푖푛(14) (Theorem 8.7). Hence there exist 푎 ∈ 푈(1)
1064
+ and 훽 ∈ 푆푝푖푛(14) such that 훼 = 휑(푎, 훽) = 휑휅4(푎, 훽).
1065
+ Case (ii). From (휏푎)−1 = −푎, we have (휏푎)푎 = −1. However, this case is impossible
1066
+ because of (휏푎)푎 > 0.
1067
+ Case (iii). From (휏푎)−1 = 푖푎, we have (휏푎)푎 = 푖. As in Case (ii), this case is also
1068
+ impossible.
1069
+ Case (iv). From (휏푎)−1 = −푖푎, we have (휏푎)푎 = −푖. As in Case (ii), this case is also
1070
+ impossible.
1071
+ With above, the proof of surjective is completed.
1072
+ Finally, we will determine Ker 휑휅4. Since 휑휅4 is the restriction of the mapping 휑, we
1073
+ have Ker 휑휅4 = Ker 휑, that is, Ker 휑휅4 = {(1, 1), (−1, 휙(−1)), (푖, 휙(−푖)), (−푖, 휙(푖))} �
1074
+ 풁4.
1075
+ Therefore we have the required isomorphism
1076
+ (퐸8)휅4 � (푈(1) × 푆푝푖푛(14))/풁4.
1077
+
1078
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
1079
+ 17
1080
+
1081
+ 9. Case 7. The automorphism ˜휀4 of order four and the group (퐸8) 휀4
1082
+ We define a 퐶-linear transformations 휀4 of 픢8퐶 by
1083
+ 휀4(훷, 푃, 푄, 푟, 푠, 푡) = (휈4훷휈4
1084
+ −1, −휈4푃, −휈4푄, 푟, 푠, 푡),
1085
+ where 휈4 ∈ 퐸7 on the right hand side is the same one as that defined in previous section.
1086
+ Note that 휀4 is the composition mapping of 휈4, 휐 ∈ 퐸7 ⊂ 퐸8, moreover since 휈4, 휐 are
1087
+ expressed as elements of 퐸8 by
1088
+ 휈4 = exp
1089
+ �2휋푖
1090
+ 4 ad(훷(−2퐸1 ∨ 퐸1, 0, 0, −1), 0, 0, 0, 0, 0)
1091
+
1092
+ ,
1093
+ 휐 = exp
1094
+ �2휋푖
1095
+ 4 ad(훷(0, 0, 0, 6), 0, 0, 0, 0, 0)
1096
+
1097
+ ,
1098
+ respectively and together with [훷(−2퐸1 ∨ 퐸1, 0, 0, −1),훷(0, 0, 0, 6)] = 0, we have
1099
+ 휀4 = exp
1100
+ �2휋푖
1101
+ 4 ad(훷(−2퐸1 ∨ 퐸1, 0, 0, 5), 0, 0, 0, 0, 0)
1102
+
1103
+ .
1104
+ Hence it follows from above that 휀4 ∈ 퐸8 and (휀4)4 = 1, so that 휀4 induces the inner
1105
+ automorphism ˜휀4 of order four on 퐸8: ˜휀4(훼) = 휀4훼휀4
1106
+ −1, 훼 ∈ 퐸8.
1107
+ Now, we will study the subgroup (퐸8)휀4 of 퐸8:
1108
+ (퐸8)휀4 =
1109
+
1110
+ 훼 ∈ 퐸8
1111
+ �� 휀4훼 = 훼휀4
1112
+
1113
+ .
1114
+ The aim of this section is to determine the structure of the group (퐸8)휀4. Before that,
1115
+ we make some preparations. First, in order to prove the proposition below, we use the
1116
+ following proposition and theorem.
1117
+ Proposition 9.1. The group (퐸7)휈4 contains a group
1118
+ 휙푈(1) (푈(1)) =
1119
+
1120
+ 휙푈(1) (휃)
1121
+ ��� 휃 ∈ 푈(1)
1122
+
1123
+ which is isomorphic to the group 푈(1) = {휃 ∈ 퐶 | (휏휃)휃 = 1}, where 휙푈(1) is the
1124
+ restriction of the mapping 휑2 defined in [7, Theorem 4.11.13]. For 휃 ∈ 푈(1), the
1125
+ mapping 휙푈(1) (휃) : 픓퐶 → 픓퐶 is given by
1126
+ 휙푈(1) (휃)(푋,푌, 휉, 휂)
1127
+ = 휑2(
1128
+ �휃
1129
+ 0
1130
+ 0
1131
+ 휏휃
1132
+
1133
+ )(��
1134
+
1135
+ 휉1
1136
+ 푥3
1137
+ 푥2
1138
+ 푥3
1139
+ 휉2
1140
+ 푥1
1141
+ 푥2
1142
+ 푥1
1143
+ 휉3
1144
+ ��
1145
+
1146
+ , ��
1147
+
1148
+ 휂1
1149
+ 푦3
1150
+ 푦2
1151
+ 푦3
1152
+ 휂2
1153
+ 푦1
1154
+ 푦2
1155
+ 푦1
1156
+
1157
+ ��
1158
+
1159
+ , 휉, 휂)
1160
+ = (��
1161
+
1162
+ 휃휉1
1163
+ 푥3
1164
+ 푥2
1165
+ 푥3
1166
+ (휏휃)휉2
1167
+ (휏휃)푥1
1168
+ 푥2
1169
+ (휏휃)푥1
1170
+ (휏휃)휉3
1171
+ ��
1172
+
1173
+ , ��
1174
+
1175
+ (휏휃)휂1
1176
+ 푦3
1177
+ 푦2
1178
+ 푦3
1179
+ 휃휂2
1180
+ 휃푦1
1181
+ 푦2
1182
+ 휃푦1
1183
+ 휃휂3
1184
+ ��
1185
+
1186
+ , 휃휉, (휏휃)휂).
1187
+
1188
+ 18
1189
+ TOSHIKAZU MIYASHITA
1190
+ Proof. From the definition of 휙푈(1), it is clear 휙푈(1) ∈ 퐸7.
1191
+ Moreover, since 휈4 is
1192
+ expressed by 휙푈(1) (−푖): 휈4 = 휙푈(1) (−푖), it is also clear 휈4휙푈(1) (휃) = 휙푈(1) (휃)휈4. Hence
1193
+ we have 휙푈(1) (휃) ∈ (퐸7)휈4.
1194
+
1195
+ Theorem 9.2. ([7, Theorem 4.11.15]) The group (퐸7)휎 is isomorphic to the group
1196
+ (푆푈(2) ×푆푝푖푛(12))/풁2, 풁2 = {(퐸, 1), (−퐸, −휎)}: (퐸7)휎 � (푆푈(2) ×푆푝푖푛(12))/풁2.
1197
+ Proof. We define a mapping 휑 : 푆푈(2) × 푆푝푖푛(12) → (퐸7)휎 by
1198
+ 휑(퐴, 훽) = 휑2(퐴)훽,
1199
+ where 휑2 is defined in [7, Theorem 4.11.13].
1200
+ Then the mapping 휑 induces the required isomorphism. As for the 푹-linear trans-
1201
+ formation 휎 of 픓퐶, see [7, Subsection 4.11(p.133)] in detail.
1202
+
1203
+ Proposition 9.3. The group (퐸8)휀4 contains the group (퐸7)휈4 which is isomorphic
1204
+ to the group (푈(1) × 푆푝푖푛(12))/풁2, 풁2 = {(1, 1), (−1, −휎)}: (퐸8)휀4 ⊃ (퐸7)휈4 �
1205
+ (푈(1) × 푆푝푖푛(12))/풁2.
1206
+ Proof. Let 훼 ∈ (퐸7)휈4. Note that −1 ∈ 푧(퐸7) (the center of 퐸7), we have
1207
+ 휀4훼(훷, 푃, 푄, 푟, 푠, 푡) = 휀4(훼훷훼−1, 훼푃, 훼푄, 푟, 푠, 푡)
1208
+ = (휈4훼훷훼−1휈4
1209
+ −1, −휈4훼푃, −휈4훼푄, 푟, 푠, 푡)
1210
+ = (훼(휈4훷휈4
1211
+ −1)훼−1, 훼(−휈4푃), 훼(−휈4푄), 푟, 푠, 푡)
1212
+ = 훼휀4(훷, 푃, 푄, 푟, 푠, 푡), (훷, 푃, 푄, 푟, 푠, 푡) ∈ 픢8퐶,
1213
+ that is, 휀4훼 = 훼휀4. Hence we have 훼 ∈ (퐸8)휀4, so the first half is proved.
1214
+ Next, we will move the proof of the second half. Let 푈(1) = {휃 ∈ 퐶 | (휏휃)휃 = 1}
1215
+ and 푆푝푖푛(12) be constructed in [7, Theorem 4.11.11]. We define a mapping 휑휈4 :
1216
+ 푈(1) × 푆푝푖푛(12) → (퐸7)휈4 by
1217
+ 휑휈4 (휃, 훽) = 휙푈 (1) (휃)훽.
1218
+ Note that 휑휈4 is the restriction of the mapping 휑 : 푆푈(2) × 푆푝푖푛(12) → (퐸7)휎 defined
1219
+ in the proof of Theorem 9.2.
1220
+ First, we will prove that 휑휈4 is well-defined. From Proposition 9.1, we have 휙푈(1) (휃) ∈
1221
+ (퐸7)휈4. Since 휑2(퐴) and 훽 ∈ 푆푝푖푛(12) are commutative, we have 휈4훽 = 훽휈4 because
1222
+ of 휈4 = 휙푈(1) (−푖) = 휑2(diag(−푖, 푖)), that is, 훽 ∈ (퐸7)휈4. Hence 휑휈4 is well-defined.
1223
+ Subsequently, we will prove that 휑휈4 is a homomorphism. However, since the mapping
1224
+ 휑휈4 is the restriction of the mapping 휑, it is clear.
1225
+ Next, we will prove that 휑휈4 is surjective. Let 훼 ∈ (퐸7)휈4. Then it follows from
1226
+ (휈4)2 = (휙푈 (1) (−푖))2 = 휙푈 (1) (−1) = −휎 that 훼 ∈ (퐸7)−휎 = (퐸7)휎. Hence there exist
1227
+ 퐴 ∈ 푆푈(2) and 훽 ∈ 푆푝푖푛(12) such that 훼 = 휑(퐴, 훽) (Theorem 9.2). Moreover from
1228
+ the condition 휈4훼휈4
1229
+ −1 = 훼, that is, 휈4휑(퐴, 훽)휈4
1230
+ −1 = 휑(퐴, 훽), using 휈4 = 휙푈 (1) (−푖) we
1231
+ have 휑(
1232
+ � 푎
1233
+ −푏
1234
+ −푐
1235
+
1236
+
1237
+ , 휈4훽휈4
1238
+ −1) = 휑(
1239
+ �푎
1240
+
1241
+
1242
+
1243
+
1244
+ , 훽) as 퐴 :=
1245
+ �푎
1246
+
1247
+
1248
+
1249
+
1250
+ .
1251
+
1252
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
1253
+ 19
1254
+ Thus, since Ker휑 = {(퐸, 1), (−퐸, −1)}, we have the following
1255
+ 
1256
+ 
1257
+ � 푎
1258
+ −푏
1259
+ −푐
1260
+
1261
+
1262
+ =
1263
+ �푎
1264
+
1265
+
1266
+
1267
+
1268
+ 휈4훽휈4
1269
+ −1 = 훽
1270
+ or
1271
+ 
1272
+ 
1273
+ � 푎
1274
+ −푏
1275
+ −푐
1276
+
1277
+
1278
+ =
1279
+ �−푎
1280
+ −푏
1281
+ −푐
1282
+ −푑
1283
+
1284
+ 휈4훽휈4
1285
+ −1 = −휎훽.
1286
+ In the latter case, from 휈4훽 = 훽휈4, we have 훽 = −휎훽.
1287
+ Hence the latter case is
1288
+ impossible. Indeed, if there exists 훽 ∈ 푆푝푖푛(12) such that 훽 = −휎훽. Then apply 훽−1
1289
+ on both side of 훽 = −휎훽, we have 1 = −휎. This is contradiction.
1290
+ In the former case. From the first condition
1291
+ � 푎
1292
+ −푏
1293
+ −푐
1294
+
1295
+
1296
+ =
1297
+ �푎
1298
+
1299
+
1300
+
1301
+
1302
+ ∈ 푆푈(2), we have
1303
+ 퐴 =
1304
+ �푎
1305
+ 0
1306
+ 0
1307
+ 휏푎
1308
+
1309
+ , (휏푎)푎 = 1, that is, 푎 ∈ 푈(1), and it is trivial that 훽 ∈ 푆푝푖푛(12). Thus
1310
+ there exist 휃 ∈ 푈(1) and 훽 ∈ 푆푝푖푛(12) such that 훼 = 휑(diag(휃, 휏휃), 훽) = 휑휈4 (휃, 훽).
1311
+ With above, the proof of surjective is completed.
1312
+ Finally, we will determine Ker 휑휈4. Since 휑휈4 is restriction of the mapping 휑, we
1313
+ have Ker 휑휈4 = Ker 휑, that is, Ker 휑휈4 = {(1, 1), (−1, −휎)} � 풁2.
1314
+ Therefore we have the required isomorphism
1315
+ (퐸7)휈4 � (푈(1) × 푆푝푖푛(12))/풁2
1316
+
1317
+ Lemma 9.4. (1) The Lie algebra (픢8)휐 of the group (퐸8)휐 is given by
1318
+ (픢8)휐 = {ad(푅) ∈ Der(픢8) | 휐ad(푅) = ad(푅)휐}
1319
+ � {푅 ∈ 픢8 | 휐푅 = 푅}
1320
+ = {푅 = (훷, 0, 0, 푟, 푠, −휏푠) | 훷 ∈ 픢7, 푟 ∈ 푖푹, 푠 ∈ 퐶} .
1321
+ In particular, we have dim((픢8)휐) = 133 + 1 + 2 = 136.
1322
+ (2) The Lie algebra (픢8)휀4 of the group (퐸8)휀4 is given by
1323
+ (픢8)휀4 =
1324
+
1325
+ ad(푅) ∈ Der(픢8)
1326
+ �� 휀4ad(푅) = ad(푅)휀4
1327
+
1328
+
1329
+
1330
+ 푅 ∈ 픢8
1331
+ �� 휀4푅 = 푅
1332
+
1333
+ = {푅 = (훷, 0, 0, 푟, 푠, −휏푠) | 훷 ∈ (픢7)휈4 � 픲(1) ⊕ 픰픬(12), 푟 ∈ 푖푹, 푠 ∈ 퐶} .
1334
+ In particular, we have dim((픢8)휀4) = (1 + 66) + 1 + 2 = 70.
1335
+ Proof. By doing straightforward computation, we can prove this lemma. The Lie-
1336
+ isomorphism (픢7)휈4 � 픲(1) ⊕ 픰픬(12) follows from the group isomorphism (퐸7)휈4 �
1337
+ (푈(1) × 푆푝푖푛(12))/풁2 (Proposition 9.3) .
1338
+
1339
+ Proposition 9.5. The group (퐸8)휀4 contains a subgroup
1340
+ 휙휐(푆푈(2)) = {휙휐(퐴) ∈ 퐸8 | 퐴 ∈ 푆푈(2)}
1341
+ which is isomorphic to the group 푆푈(2) = {퐴 ∈ 푀(2, 퐶) | (휏 푡퐴)퐴 = 퐸, det퐴 = 1},
1342
+ where 휙휐 is defined in Proposition 7.3.
1343
+
1344
+ 20
1345
+ TOSHIKAZU MIYASHITA
1346
+ Proof. For 퐴 =
1347
+ �푎
1348
+ −휏푏
1349
+
1350
+ 휏푎
1351
+
1352
+ := exp
1353
+ �−푖휈
1354
+ −휏휚
1355
+
1356
+ 푖휈
1357
+
1358
+ ∈ 푆푈(2), where
1359
+ �−푖휈
1360
+ −휏휚
1361
+
1362
+ 푖휈
1363
+
1364
+ ∈ 픰픲(2),
1365
+ we have 휙휐(퐴) = exp(ad(0, 0, 0, 푖휈, 휚, −휏휚)) ∈ (퐸8)휀4 (Lemma 9.4 (2)).
1366
+
1367
+ Now, we determine the structure of the group (퐸8)휀4.
1368
+ Theorem 9.6. The group (퐸8)휀4 is isomorphic to the group (푆푈(2)×푈(1)×푆푝푖푛(12))/
1369
+ (풁2 × 풁2), 풁2 = {(퐸, 1, 1), (퐸, −1, −휎)}, 풁2 = {(퐸, 1, 1), (���퐸, 1, −1)}: (퐸8)휀4 �
1370
+ (푆푈(2) × 푈(1) × 푆푝푖푛(12))/(풁2 ×풁2).
1371
+ Proof. We define a mapping 휑휀4 : 푆푈(2) × 푈(1) × 푆푝푖푛(12) → (퐸8)휀4 by
1372
+ 휑휀4 (퐴, 휃, 훽) = 휙휐(퐴)휑휈4 (휃, 훽)(= 휑(퐴, 휑휈4 (휃, 훽))).
1373
+ Note that this mapping is the restriction of the mapping 휑 : 푆푈(2) × 퐸7 → (퐸8)휐
1374
+ defined in the proof of Theorem 7.4.
1375
+ First, we will prove that 휑휀4 is well-defined. However, from Propositions 9.3,9.5, it is
1376
+ clear that 휑휀4 is well-defined. Subsequently, we will prove that 휑휀4 is a homomorphism.
1377
+ Since the mapping 휑휀4 is the restriction of the mapping 휑 and 휑휈4 is a homomorphism
1378
+ (Proposition 9.3), 휑휀4 is a homomorphism.
1379
+ Next, we will prove that 휑휀4 is surjective. Let 훼 ∈ (퐸8)휀4. Then, since the group 퐸8
1380
+ is the simply connected Lie group, both of the groups (퐸8)휀4 and (퐸8)휐 are connected
1381
+ (([3, Preliminaries Lemma 2.2]) in [6]), together with (픢8)휀4 ⊂ (픢8)휐 (Lemma 9.4
1382
+ (1), (2)), we have 훼 ∈ (퐸8)휀4 ⊂ (퐸8)휐. Hence there exist 퐴 ∈ 푆푈(2) and 훿 ∈ 퐸7
1383
+ such that 훼 = 휑(퐴, 훿) (Theorem 7.4). Moreover, from the condition 휀4훼휀4
1384
+ −1 = 훼,
1385
+ that is, 휀4휑(퐴, 훿)휀4
1386
+ −1 = 휑(퐴, 훿), we have 휑(퐴, 휈4훿휈4
1387
+ −1) = 휑(퐴, 훿). Indeed, from
1388
+ 휀4(0, 0, 0, 푖휈, 휚, −휏휚) = (0, 0, 0, 푖휈, 휚, −휏휚) and 휙휐(퐴) = exp(ad(0, 0, 0, 푖휈, 휚, −휏휚)),
1389
+ we have 휀4휙휐(퐴)휀4
1390
+ −1 = 휙휐(퐴) by a computation similar to that in the proof of Theorem
1391
+ 7.5. In addition, 휀4훿휀4
1392
+ −1 = 휈4훿휈4
1393
+ −1 follows from 훿 ∈ 퐸7. Hence it follows from
1394
+ 휀4휑(퐴, 훿)휀4
1395
+ −1 = 휀4(휙휐(퐴)훿)휀4
1396
+ −1
1397
+ = (휀4휙휐(퐴)휀4
1398
+ −1)(휀4훿휀4
1399
+ −1)
1400
+ = 휙휐(퐴)(휈4훿휈4
1401
+ −1)
1402
+ = 휑(퐴, 휈4훿휈4
1403
+ −1)
1404
+ that 휑(퐴, 휈4훿휈4
1405
+ −1) = 휑(퐴, 훿).
1406
+ Thus, since Ker휑 = {(퐸, 1), (−퐸, −1)}, we have the following
1407
+ � 퐴 = 퐴
1408
+ 휈4훿휈4
1409
+ −1 = 훿
1410
+ or
1411
+ � 퐴 = −퐴
1412
+ 휈4훿휈4
1413
+ −1 = −훿.
1414
+ In the latter case, this case is impossible because of 퐴 ≠ 푂, where 푂 is the zero matrix.
1415
+ In the former case, 훿 ∈ (퐸7)휈4 follows from the second condition, so that there exist
1416
+ 휃 ∈ 푈(1) and 훽 ∈ 푆푝푖푛(12) such that 훿 = 휑휈4 (휃, 훽) (Proposition 9.3). Hence there
1417
+
1418
+ REALIZATIONS OF INNER AUTOMORPHISMS OF ORDER FOUR ON 퐸8 PART III
1419
+ 21
1420
+ exist 퐴 ∈ 푆푈(2), 휃 ∈ 푈(1) and 훽 ∈ 푆푝푖푛(12) such that 훼 = 휑(퐴, 휃, 휑휈4 (휃, 훽)) =
1421
+ 휑휀4 (퐴, 휃, 훽). The proof of surjective is completed.
1422
+ Finally, we will determine Ker 휑휀4. From the definition of kernel, we have
1423
+ Ker 휑휀4 = {(퐴, 휃, 훽) ∈ 푆푈(2) × 푈(1) × 푆푝푖푛(12) | 휑휀4 (퐴, 휃, 훽) = 1}
1424
+ = {(퐴, 휃, 훽) ∈ 푆푈(2) × 푈(1) × 푆푝푖푛(12) | 휑(퐴, 휑휈4 (휃, 훽)) = 1}.
1425
+ Here, the mapping 휑휀4 is the restriction of the mapping 휑 and together with Ker 휑 =
1426
+ {(퐸, 1), (−퐸, −1)} (Theorem 7.4), we will find the elements (퐴, 휃, 훽) ∈ 푆푈(2)×푈(1)×
1427
+ 푆푝푖푛(12) satisfying the following
1428
+
1429
+ 퐴 = 퐸
1430
+ 휑휈4 (휃, 훽) = 1
1431
+ or
1432
+
1433
+ 퐴 = −퐸
1434
+ 휑휈4 (휃, 훽) = −1.
1435
+ In the former case, from Ker 휑휈4 = {(1, 1), (−1, −휎)} (Proposition 9.3), we have the
1436
+ following
1437
+ 
1438
+ 
1439
+ 퐴 = 퐸
1440
+ 휃 = 1
1441
+ 훽 = 1
1442
+ or
1443
+ 
1444
+ 
1445
+ 퐴 = 퐸
1446
+ 휃 = −1
1447
+ 훽 = −휎.
1448
+ In the latter case, the second condition can be rewritten as 휑휈4 (휃, −훽) = 1 from
1449
+ −1 ∈ 푧(퐸7), moreover −훽 ∈ 푆푝푖푛(12). Hence, as in the former case, we have the
1450
+ following
1451
+ 
1452
+ 
1453
+ 퐴 = −퐸
1454
+ 휃 = 1
1455
+ 훽 = −1
1456
+ or
1457
+ 
1458
+ 
1459
+ 퐴 = −퐸
1460
+ 휃 = −1
1461
+ 훽 = 휎.
1462
+ Hence we can obtain
1463
+ Ker 휑휀4 = {(퐸, 1, 1), (퐸, −1, −휎), (−퐸, 1, −1), (−퐸, −1, 휎)}
1464
+ = {(퐸, 1, 1), (퐸, −1, −휎)} × {(퐸, 1, 1), (−퐸, 1, −1)}
1465
+ � 풁2 × 풁2.
1466
+ Therefore we have the required isomorphism
1467
+ (퐸8)휀4 � (푆푈(2) × 푈(1) × 푆푝푖푛(12))/(풁2 × 풁2).
1468
+
1469
+ References
1470
+ [1] T. Imai and I. Yokota, Simply connected compact simple Lie group 퐸8(−248) of type 퐸8, J. Math.
1471
+ Kyoto Univ. 21(1981), 741-762.
1472
+ [2] J.A. Jiménez, Riemannian 4-symmetric spaces, Trans. Amer. Math. Soc. 306 (1988), 715-734.
1473
+ [3] T. Miyashita, Realizations of inner automorphisms of order 4 and fixed points subgroups by them
1474
+ on the connected compact exceptional Lie group 퐸8, Part I, Tsukuba J. Math. 41-1(2017), 91-166.
1475
+
1476
+ 22
1477
+ TOSHIKAZU MIYASHITA
1478
+ [4] T. Miyashita, Realizations of inner automorphisms of order four and fixed points subgroups by them
1479
+ on the connected compact exceptional Lie group 퐸8, Part II, Tsukuba J. Math. 43-1(2019), 1-22.
1480
+ [5] T. Miyashita and I. Yokota, 2-graded decompositions of exceptional Lie algebras 픤 and group
1481
+ realizations of 픤푒푣, 픤0, Part III, 퐺 = 퐸8, Japanese J. Math. 26-1(2000), 31-50.
1482
+ [6] Raˇsevskii, P.K., A theorem on the connectedness of a subgroup of a simply connected Lie group
1483
+ commuting with any of its automorphisms, Trans. Moscow Math. Soc, 30 (1974), 3-22.
1484
+ [7] I. Yokota, Exceptional Lie groups, arXiv:math/0902.0431vl[mathDG](2009).
1485
+ 1365-3 Bessho onsen
1486
+ Ueda City
1487
+ Nagano Prefecture 386-1431
1488
+ Japan
1489
+ Email address: [email protected]
1490
+
HNAyT4oBgHgl3EQfS_eb/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
L9FLT4oBgHgl3EQfMi8T/content/tmp_files/2301.12016v1.pdf.txt ADDED
@@ -0,0 +1,2197 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Improved analytical modeling of the non-linear power spectrum in modified gravity
2
+ cosmologies
3
+ Suhani Gupta,∗ Wojciech A. Hellwing, and Maciej Bilicki
4
+ Center for Theoretical Physics, Polish Academy of Sciences, Al. Lotnik´ow 32/46, 02-668 Warsaw, Poland
5
+ (Dated: January 31, 2023)
6
+ Reliable analytical modeling of the non-linear power spectrum (PS) of matter perturbations is
7
+ among the chief pre-requisites for cosmological analyses from the largest sky surveys. This is espe-
8
+ cially true for the models that extend the standard general-relativity paradigm by adding the fifth
9
+ force, where numerical simulations can be prohibitively expensive. Here we present a method for
10
+ building accurate PS models for two modified gravity (MG) variants: namely the Hu-Sawicki f(R),
11
+ and the normal branch of the Dvali-Gabadadze-Porrati (nDGP) braneworld. We start by modifying
12
+ the standard halo model (HM) with respect to the baseline Lambda-Cold-Dark-Matter (ΛCDM)
13
+ scenario, by using the HM components with specific MG extensions. We find that our P(k)HM
14
+ retains 5% accuracy only up to mildly non-linear scales (k ≲ 0.3 h/ Mpc) when compared to PS
15
+ from numerical simulations. At the same time, our HM prescription much more accurately captures
16
+ the ratio Υ(k) = P(k)MG/P(k)ΛCDM up to non-linear scales. We show that using HM-derived Υ(k)
17
+ together with a viable non-linear ΛCDM P(k) prescription (such as halofit), we render a much
18
+ better and more accurate PS predictions in MG. The new approach yields considerably improved
19
+ performance, with modeled P(k)MG being now accurate to within 5% all the way to non-linear scales
20
+ of k ≲ 2.5 − 3 h/ Mpc. The magnitude of deviations from GR as fostered by these MG models is
21
+ typically O(10%) in these regimes. Therefore reaching 5% PS modeling is enough for forecasting
22
+ constraints on modern-era cosmological observables.
23
+ I.
24
+ INTRODUCTION
25
+ The standard model of cosmology, the Lambda-Cold-
26
+ Dark-Matter (ΛCDM), has been remarkably well-tested
27
+ observationally in the last two decades.
28
+ Presently, it
29
+ is our best approximation of the real Universe [1–5].
30
+ The precise observations of the Cosmic Microwave Back-
31
+ ground (CMB) radiation [2, 6], large-scale galaxy cluster-
32
+ ing [4, 7–9], and the abundance of massive galaxy clusters
33
+ [10] among others, form a long list where the standard
34
+ cosmological model predictions are successful.
35
+ So far, the bulk of these ΛCDM observational tests
36
+ concerns the linear regime, the large scales, and/or early
37
+ times. But it is the mildly non-linear and fully non-linear
38
+ density fluctuation regimes where the vast majority of the
39
+ modifications to ΛCDM are expected to deviate signifi-
40
+ cantly from the standard model predictions [11–16]. It
41
+ is also in this regime, stretching usually from hundreds
42
+ down to a few Megaparsecs, where the present and up-
43
+ coming cosmological surveys like desi [17], lsst [18], and
44
+ euclid [19] aim to measure various statistics concerning
45
+ the large-scale structure to a percent level accuracy. As
46
+ a result, with the influx of data from these surveys, the
47
+ level of the statistical errors can get so small that the
48
+ measurements start to be more sensitive to systematic
49
+ effects. If both the new level of accuracy of base-level
50
+ predictions as well as the control of the known system-
51
+ atics will be successfully implemented, these new large-
52
+ scale surveys will yield new unprecedentedly accurate es-
53
+ timates and constraints on cosmological parameters: like
54
+ the DE equation of state, the growth rate of structure,
55
+ ∗ [gupta, hellwing, bilicki]@cft.edu.pl
56
+ or parameters quantifying possible departures from the
57
+ standard General Relativity (GR)-based structure forma-
58
+ tion scenario.
59
+ In this context, one of the most useful and widely used
60
+ theoretical quantities is the power spectrum (PS) of den-
61
+ sity fluctuations, P(k). This statistic generally charac-
62
+ terizes the properties of large-scale structures across vast
63
+ cosmological epochs and scales. Not only it can be used
64
+ as an end-goal model prediction on its own, but it is
65
+ also a basic quantity that is used to model and fore-
66
+ cast a number of other useful LSS observables, includ-
67
+ ing galaxy clustering measures, cluster abundance, weak-
68
+ lensing shear and convergence, the amplitude of the bulk
69
+ peculiar galaxy motions, and many others [1, 4, 18, 20–
70
+ 23].
71
+ Since the PS forms a basis for the predictions of many
72
+ cosmological LSS observational statistics, the accuracy,
73
+ and scales to which we know the input PS limits our
74
+ abilities to forecast the derived observables. Thus, ob-
75
+ taining robust estimates of the PS beyond the linear the-
76
+ ory regime (i.e.
77
+ scales of k > 0.1 h/ Mpc) became of
78
+ paramount importance to modern cosmology, and has
79
+ been a subject of extensive effort in recent years [24–
80
+ 27]. A classical approach is to either directly use the re-
81
+ sults of a number of N-body simulations of LSS evolution
82
+ to predict PS, or use the simulation results for calibra-
83
+ tion of more or less approximate models [24–26, 28, 29].
84
+ Recently, machine-learning-based-emulators are also em-
85
+ ployed for computing non-linear PS [e.g. 27, 30]. This ap-
86
+ proach especially depends on the growing computational
87
+ power.
88
+ In recent years, the progress in modeling the PS has
89
+ been truly significant. The resulting current state-of-the-
90
+ art PS models for ΛCDM are already, or close to, at-
91
+ arXiv:2301.12016v1 [astro-ph.CO] 27 Jan 2023
92
+
93
+ 2
94
+ taining sub-percent accuracy in the non-linear regime, as
95
+ required for the success of the cosmological tests offered
96
+ by the incoming big survey data. However, this amazing
97
+ progress has been mostly limited to the ΛCDM alone.
98
+ When it comes to many interesting extensions and modi-
99
+ fications of the standard model, such as the whole family
100
+ of beyond-GR Modified Gravity (MG) scenarios, the cur-
101
+ rent accuracy, and versatility of PS modeling is still very
102
+ much lacking. The reasons for this are both higher theo-
103
+ retical complications of such models, and their increased
104
+ levels of non-linearity [16, 31–35]. For MG models, N-
105
+ body simulations play an even more important role in
106
+ fully assessing the effect of the fifth force, and are crucial
107
+ for disentangling pure MG effects from the standard GR-
108
+ based scenarios [36–38]. This is connected with the richer
109
+ phenomenology of such models [39–48]. Given the fact
110
+ that the MG simulations are usually many times more
111
+ expensive than the standard ΛCDM case [14, 15], it be-
112
+ comes computationally prohibitive to obtain simulation
113
+ libraries of the same volume and precision for MG, as is
114
+ possible for ΛCDM. However, such libraries are neces-
115
+ sary to be applied to the proven state-of-the-art emulat-
116
+ ing or fitting methods to achieve the same precision, and
117
+ success in modeling MG effects, as we have for the case
118
+ of ΛCDM.
119
+ In this work, we attempt to remedy the deficit of ac-
120
+ curate MG PS modeling. To circumnavigate the prob-
121
+ lem of prohibitively expensive MG simulations, we ex-
122
+ plore a different approach. Instead of trying to model
123
+ the absolute MG PS predictions, we take ΛCDM to al-
124
+ ways be our baseline, and build a semi-analytical model
125
+ for the relative MG effects on the ΛCDM PS. We build
126
+ our model on the basis of a more general Halo Model
127
+ (HM) approach ([49], reviewed by [e.g. 24]). Next, we
128
+ demonstrate how various degrees of modeling freedom
129
+ can be calibrated and constrained already by a relatively
130
+ small library of N-body simulations, to achieve an un-
131
+ precedented level of PS modeling in the MG scenarios
132
+ studied here.
133
+ There are many models that can be considered beyond-
134
+ GR structure formation scenarios. Most of the viable,
135
+ and at the same time cosmologically interesting ones usu-
136
+ ally involve some extra couplings to the metric in the
137
+ Einstein-Hilbert action that manifests themselves as ad-
138
+ ditional degrees of freedom (d.o.f.).
139
+ The propagation
140
+ (gradient) of this d.o.f. induces an additional gravita-
141
+ tional force component, called as the fifth force, which
142
+ acts on top of the Newtonian gravitational force on the
143
+ cosmological scales. However, propagation of a signifi-
144
+ cant fifth force both on small galaxy scales, and in the
145
+ strong field regime is tightly constrained observation-
146
+ ally [50–55]. Thus, only MG models that exhibit some
147
+ kind of a fifth force screening mechanism, which, as the
148
+ name suggests, would screen the fifth force in these ob-
149
+ servationally tested regimes are viable MG candidates
150
+ [41, 46, 56–58].
151
+ The clockwork of MG models and their involved
152
+ screening mechanisms can differ in many ways.
153
+ From
154
+ our point of view, however, we can significantly simplify
155
+ the subject by focusing just on phenomenological effec-
156
+ tive modifications to the density fluctuations PS. As our
157
+ test-case models, we choose variants of two popular MG
158
+ set-ups: namely f(R) [44] and nDGP gravity [59], which
159
+ will serve as a good representative for their whole respec-
160
+ tive families. Further in the text, we offer a more detailed
161
+ description and definitions of these models.
162
+ Most of the works that have considered computing the
163
+ non-linear PS in MG models either rely on simulations
164
+ [31, 32], post-Friedmann (PPF) formalism [33], or per-
165
+ turbation theory focusing on quasi-linear scales [16, 34].
166
+ In Ref.
167
+ [60], the non-linear PS is computed using the
168
+ hmcode [26] for a variety of extensions to the standard
169
+ cosmological model, including f(R) and nDGP. The level
170
+ of this prediction is however significantly limited by a
171
+ number of approximations.
172
+ For example, a simplified
173
+ spherical collapse theoretical formalism is used there to
174
+ estimate DM halo properties. From another perspective,
175
+ mg-halofit was proposed in [61] as an extension of stan-
176
+ dard halofit for f(R) gravity models, but [62] showed
177
+ that the former has limited applicability and accuracy.
178
+ The HM formalism has been used to model non-linear
179
+ MG PS in [34, 35, 63–67], which is mainly based on
180
+ the theoretical spherical collapse model, and is explic-
181
+ itly solved for each MG variant. In our approach, how-
182
+ ever, we rely on the calibration of phenomenological com-
183
+ ponents of HM to N-body simulations.
184
+ An additional
185
+ strength of our approach is that it is general enough to
186
+ be quite straightforwardly extended, not only to a wider
187
+ part of the model parameters space but also, in principle,
188
+ to other modified structure formation models.
189
+ This paper is organized as follows: In Section II, we
190
+ describe the MG models, numerical data sets, and sim-
191
+ ulations.
192
+ In Section III, we elaborate on the HM for-
193
+ malism and describe the empirical halo properties: halo
194
+ mass function (III A), halo bias (III B) and halo density
195
+ profile (III C). In Section IV, we discuss the results ob-
196
+ tained from extending the standard HM predictions to
197
+ the MG models considered in this work (IV A), and from
198
+ our new approach (IV B). In (IV C), we test our approach
199
+ on another suite of MG simulations, and the final Section
200
+ V includes our conclusions, discussion, and future work
201
+ prospects. Details of the Appendices are mentioned in
202
+ the respective sub-sections.
203
+ II.
204
+ MODIFIED GRAVITY MODELS,
205
+ NUMERICAL DATA SETS AND TOOLS
206
+ As our main data for calibration of the non-linear PS
207
+ amplitude, we take the elephant (Extended LEnsing
208
+ PHysics using ANalytic ray Tracing) suite of N-body sim-
209
+ ulations [32]. These simulations provide a good test bed
210
+ to model the impact of f(R) and nDGP physics on for-
211
+ mation of the large-scale structure.
212
+ In f(R), the fifth force is manifested as a result of addi-
213
+ tional degrees of freedom from the interaction between an
214
+
215
+ 3
216
+ auxiliary scalar field (or scalaron) and matter. This addi-
217
+ tional force appears as a non-linear function of the Ricci
218
+ scalar, R in the Einstein-Hilbert action, hence the term
219
+ f(R). We work with the Hu-Sawicki form of f(R) gravity,
220
+ where Chameleon screening screens the fifth force [68]. In
221
+ this screening, the scalaron becomes very massive in the
222
+ high curvature (and high matter density) regimes, and
223
+ the fifth force exponentially decays above the length scale
224
+ determined by the inverse of the mass of the scalaron.
225
+ This length scale is termed the Compton wavelength. As
226
+ a result of this decay, the scalar interaction diminishes
227
+ above the Compton wavelength, and GR is recovered [69].
228
+ In the nDGP model, gravity, unlike other standard
229
+ forces, mediates from 4D brane to 5D Minkowski space-
230
+ time [59, 70]. In this model, the scalar is identified as the
231
+ brane-bending mode which describes the deformation of
232
+ the 4D brane in the 5D bulk spacetime. The brane bend-
233
+ ing mode has a second-order term in the equation of mo-
234
+ tion. On small scales, this term dominates over the linear
235
+ term. As a result, the coupling between the scalar field
236
+ and matter is suppressed, and the solutions for metric
237
+ perturbations approach GR. This is referred to as the
238
+ Vainshtein screening [71].
239
+ In elephant, along with ΛCDM, two f(R) variants
240
+ have been employed, with their free parameter |fR0| (the
241
+ strength of the scalar field today), taken to be 10−6 and
242
+ 10−5 (increasing order of deviation from ΛCDM) dubbed
243
+ as F6 and F5, respectively. For nDGP gravity, we have
244
+ two variants with the model parameter rcH0 = 5 and 1
245
+ (which is the dimensionless crossing-over scale character-
246
+ izing transition from 4D to 5D gravity), marked conse-
247
+ quently as N5 and N1, respectively.
248
+ The simulations were run from zini = 49 to zfin = 0 em-
249
+ ploying the ecosmog code [14, 72, 73], each using 10243
250
+ N-body particles in a cubic box of a size 1024 Mpc/h.
251
+ The mass of a single particle is mp = 7.798×1010 M⊙/h,
252
+ and the comoving force resolution is ε = 15 kpc/h.
253
+ Each set of simulations has five independent realizations,
254
+ evolved from the same set of initial conditions. The cos-
255
+ mological parameters of the fiducial background model
256
+ are given as Ωm= 0.281 (fractional matter density), Ωb
257
+ = 0.046 (fractional baryonic density), ΩΛ = 0.719 (frac-
258
+ tional cosmological constant density), Ων = 0 (relativistic
259
+ species density), h = 0.697 (dimensionless Hubble con-
260
+ stant), ns = 0.971 (primordial spectral index), and σ8 =
261
+ 0.842 (power spectrum normalization). These parame-
262
+ ters apply to background cosmologies in the simulations
263
+ of all the gravity models. For further processing, we take
264
+ simulation snapshots saved at z = 0, 0.3, 0.5 and 1.
265
+ As indicated above, the elephant-suite will be our
266
+ main calibration data set. To test the accuracy of our
267
+ PS modeling and the general quality of extrapolation, we
268
+ also use different N-body data. For these additional tests,
269
+ we take the MG simulations for F5 and N1, described in
270
+ [74].
271
+ These simulations have background cosmological
272
+ parameters different from our parent elephant simula-
273
+ tions, with Ωm = 0.3111, Ωb = 0.049, ΩΛ = 0.6889, Ων
274
+ = 0, h = 0.6766, ns = 0.9665 and σ8 = 0.8245. This
275
+ simulation set is run using mg-cola [13] in a 500 Mpc/h
276
+ box. For each model, we build an ensemble based on five
277
+ independent realizations.
278
+ Linear matter power spectra, P(k)lin, used in this work
279
+ were calculated using a modified version of the camb cos-
280
+ mological code [75], which includes a module implement-
281
+ ing both the f(R) and nDGP models. The simulation
282
+ power spectra, P(k)sim, were computed using powmes
283
+ [76]. In what follows, by P(k) we will be denoting the
284
+ fully non-linear matter power spectrum, unless indicated
285
+ otherwise.
286
+ III.
287
+ HALO MODEL FORMALISM
288
+ As a baseline prediction and our starting point, we
289
+ take the halo model (HM) approach. It has been pro-
290
+ posed as an attempt to analytically model the variance of
291
+ density fluctuations into the non-linear regime using the
292
+ properties and clustering of halos as main input param-
293
+ eters. HM describes the statistics of the density field up
294
+ to the mildly non-linear regimes (i.e. k <
295
+ ∼ 0.5 h/ Mpc).
296
+ Despite its inferior accuracy compared to heavy N-body
297
+ simulations, the HM has been successfully used for mod-
298
+ eling observables and constraining cosmological parame-
299
+ ters [24, 49, 77].
300
+ In HM, the main presumption is that all contributions
301
+ to the cosmic density field variance come from the matter
302
+ collapsed into halos. This allows for moderately accurate
303
+ modeling of the non-linear two-point clustering statistics,
304
+ although HM can be used to compute the density field
305
+ at even higher levels of the n-point hierarchy [78].
306
+ Following HM, the total matter power spectrum
307
+ P(k)HM can be described as a sum of two contributions:
308
+ P(k)HM = P(k)1h + P(k)2h
309
+ (1)
310
+ where P(k)1h models the contribution from the matter
311
+ clustered inside halos (called the one-halo term) and
312
+ P(k)2h is the contribution from clustering of separate ha-
313
+ los (the two-halo term). In practice, the one-halo term
314
+ dominates at small scales (i.e. k >
315
+ ∼ 1h/ Mpc) and sat-
316
+ urates to a constant value at larger scales, where the
317
+ two-halo term becomes the dominant component of the
318
+ power spectrum.
319
+ These contributions are further defined as:
320
+ P(k)1h =
321
+ � ∞
322
+ 0
323
+ dM|˜u(k|M)|2
324
+ �M
325
+ ¯ρ
326
+ �2
327
+ n(M)
328
+ (2)
329
+ and
330
+ P(k)2h = I2
331
+ m(k)P(k)lin
332
+ (3)
333
+ where,
334
+ Im(k) = 1
335
+ ¯ρ
336
+ � ∞
337
+ 0
338
+ dM|˜u(k|M)|Mn(M)b(M)
339
+ (4)
340
+ and Im → 1 for k → 0 in order to match the linear theory
341
+ predictions at large scales. The integrals in Eq. (2) and
342
+
343
+ 4
344
+ Eq. (4) should in principle cover all possible halo mass
345
+ ranges, but in practice, some Mmin and Mmax are intro-
346
+ duced (these mass limits are discussed in more details in
347
+ the next sub-sections).
348
+ Here, ¯ρ corresponds to the mean density of the uni-
349
+ verse, P(k)lin is the linear theory matter power spectrum,
350
+ n(M) is the halo mass function, and b(M) is the linear
351
+ halo bias. The term |˜u(k|M)| is the normalized Fourier
352
+ transform of the internal density profile of a halo of mass
353
+ M, such that ˜u(k → 0, M) → 1. The above HM build-
354
+ ing blocks are intrinsically redshift-dependent functions,
355
+ which, in principle, allows one to obtain HM prediction
356
+ at any redshift for which the integrands are well-defined.
357
+ All the components of the HM can be varied inde-
358
+ pendently from each other, and each specific choice of
359
+ fitting functions, formulae, or tabulated data creates a
360
+ unique realization.
361
+ Thus, HM is a general framework
362
+ under which one can create many different families of
363
+ PS models. Motivated by literature and our own studies
364
+ for each of our cosmological models (i.e. ΛCDM, and all
365
+ MG variants), we find an optimal combination of analytic
366
+ formulae and fitting functions to describe the input prop-
367
+ erties of halo mass function, halo bias, and halo concen-
368
+ trations. Below we provide a more detailed description
369
+ of the particular choices we make. For a quick summary
370
+ and look-up, we refer the reader to Table I which contains
371
+ a concise list and references of all the fitting functions for
372
+ the halo properties used in this work, and for each model.
373
+ A.
374
+ Halo mass function
375
+ The halo mass function (HMF), n(M), quantifies the
376
+ number of halos per unit mass per unit comoving volume.
377
+ The most commonly adopted theoretical formulation of
378
+ the HMF is via the Extended Press–Schechter (EPS) for-
379
+ malism [87, 88], in which HMF is given by:
380
+ n(M) ≡ dn
381
+ dM =
382
+ ρ
383
+ M 2 F(σ)
384
+ ����
385
+ d ln σ
386
+ d ln M
387
+ ����
388
+ (5)
389
+ The halo multiplicity function, F(σ) = νF(ν) denotes
390
+ the fraction of matter collapsed into halos, in a loga-
391
+ rithmic bin around the peak height, ν = δc(z)/σ(M, z).
392
+ Here, δc(z) is the spherical collapse density threshold,
393
+ and σ(M, z) is the linear variance in the density fluctua-
394
+ tion field smoothed using a top-hat filter. This scaling re-
395
+ lation has been modeled extensively in the literature and
396
+ it has been shown to be approximately universal across
397
+ redshifts for ΛCDM [79, 82, 89–91]. In our earlier work
398
+ [80], we have shown that after simple re-scaling, the F(σ)
399
+ in both f(R) and nDGP also exhibits a similar degree of
400
+ universality as in the ΛCDM-case.
401
+ Following our previous study, we will model MG HMF
402
+ as a fractional deviation, ∆MG from the ΛCDM fiducial
403
+ baseline. We have shown that such an approach allows
404
+ for achieving quite a good accuracy (5 − 10%), which
405
+ also holds for different background cosmologies.
406
+ How-
407
+ ever, to obtain such precision, a careful choice of the
408
+ baseline ΛCDM HMF model is paramount.
409
+ Thus, for our baseline ΛCDM, we tested various HMF
410
+ models in the literature (e.g. [79, 82, 89–93]), as these
411
+ functions can in principle be extrapolated to desired halo
412
+ mass ranges. We found that the fitting function proposed
413
+ in Watson et al. 2013 [79, hereafter W13] proved to be
414
+ optimal for HM power-spectrum forecasting. Therefore,
415
+ we used W13 for our ΛCDM HMF computations.
416
+ For completeness, we now recall the essential steps of
417
+ Ref. [80]. Here the target MG HMF is modeled as:
418
+ n(σM)MG = ∆MG(σM) · n(σM)ΛCDM ,
419
+ (6)
420
+ where σM ≡ σ(M) is simply the linear mass variance at
421
+ the Lagrangian top-hat halo mass scale, M.
422
+ For f(R) gravity models, the fractional deviation fit is
423
+ expressed as:
424
+ ∆MG ≡ ∆f(R) = 1 + a exp
425
+
426
+ −(X − b)2
427
+ c2
428
+
429
+ ,
430
+ (7)
431
+ X ≡ ln(σ−1). Here, (a, b, c) are parameters of the fit that
432
+ were calibrated using simulations. They depend on the
433
+ variant of f(R) gravity model under consideration. See
434
+ Table I for the specific values that we use in this work.
435
+ For nDGP gravity models:
436
+ ∆MG ≡ ∆nDGP = p + q arctan (s X + r).
437
+ (8)
438
+ Here, X is the re-scaled mass density variance, X ≡
439
+ ln(�σ−1), �σ = σ/Ξ(z). Again, (p, q, r, s) are the parame-
440
+ ters of the fit, whose values are determined by the variant
441
+ of the nDGP gravity model.
442
+ The resolution of our simulations allowed us to probe
443
+ only intermediate- and large-mass halos to compute the
444
+ HMF. In this mass regime, HMF in MG increases w.r.t.
445
+ ΛCDM, as small-mass halos accrete matter and merge
446
+ faster to form larger structures. However, this enhanced
447
+ structure formation at large halo mass-end is happening
448
+ at the expense of the abundance of smaller halos used
449
+ up in this process [see e.g. 80, 94–96].
450
+ Thus, we can
451
+ expect that there should be a simultaneous decrease in
452
+ the number of small-mass halos in the MG models when
453
+ compared to ΛCDM.
454
+ Equation (8) for nDGP allows the possibility of
455
+ ∆nDGP < 1 for small mass halos. However, our fit for
456
+ ∆f(R) is never below 1. To admit for low-mass halo defi-
457
+ ciency also in the f(R), we impose an artificial decrease
458
+ in f(R) HMF for M < 1011 M⊙/h, when compared to
459
+ ΛCDM results.
460
+ For low halo masses, we assume that
461
+ ∆f(R) is a linear function of ln(σ−1), and is given by:
462
+ ∆f(R) → (m ln(σ−1) + n) × ∆f(R)
463
+ (9)
464
+ We tested for different combinations of the (m, n) pa-
465
+ rameters values. The combination (m, n) = (0.06, 0.99)
466
+ turned-out to be optimal for our both f(R) variants.
467
+ Thus we use these values in this work. A note of caution
468
+
469
+ 5
470
+ TABLE I. Compilation of the fitting functions used in this work for the halo properties in HM build-up, for both ΛCDM and
471
+ MG models.
472
+ Halo properties
473
+ Fitting functions
474
+ Notes
475
+ Halo mass function, HMF
476
+ ΛCDM : Watson et al. 2013 [79]
477
+ f(σ)ΛCDM = A
478
+ ��
479
+ β
480
+ σ
481
+ �α + 1
482
+
483
+ e−γ/σ2
484
+ For MG(=f(R), nDGP),
485
+ A = 0.282, α = 2.163, β = 1.406 and γ = 1.210.
486
+ f(σ)MG = ∆MG × f(σ)ΛCDM
487
+ f(R): Gupta et al. 2022 [80]
488
+ ∆f(R) = 1 + a exp
489
+
490
+ − (X−b)2
491
+ c2
492
+
493
+ Additional cut-off expression at
494
+ For F5: a = 0.230, b = 0.100 and c = 0.360
495
+ low-mass scales for f(R) (Eq. (9))
496
+ For F6: a = 0.152, b = -0.583 and c = 0.375
497
+ X ≡ ln(σ−1)
498
+ nDGP: Gupta et al. 2022 [80]
499
+ ∆nDGP = p + q arctan (s X + r)
500
+ Ξ(z): nDGP force enhancement
501
+ For N1: p = 1.35, q = 0.258, r = 5.12, s = 4.05
502
+ w.r.t. GR [81].
503
+ For F6: p = 1.06, q = 0.0470, r = 11.8, s = 4.19
504
+ X ≡ ln(�σ−1), �σ = σ/Ξ(z)
505
+ Linear halo bias, b(M)
506
+ All models: Sheth et al. 2001 [82]
507
+ b(M) =
508
+ 1
509
+ √aδc(z) (√a(aν2) + √ab(aν2)1−c
510
+ This expression has been proposed
511
+
512
+ (aν2)c
513
+ (aν2)c+b(1−c)(1−c/2) )
514
+ for ΛCDM. We extrapolated
515
+ a = 0.707, b = 0.5 and c = 0.6.
516
+ the relation for MG.
517
+ Concentration-mass relation, c(M)
518
+ ΛCDM: Ludlow et al. 2016 [83]
519
+ c(ν)ΛCDM = c0
520
+
521
+ ν
522
+ ν0
523
+ �−γ1
524
+
525
+ 1 +
526
+
527
+ ν
528
+ ν0
529
+ �1/β�−β(γ2−γ1)
530
+ For MG(=f(R), nDGP),
531
+ c0 = 3.395 × (1 + z)−0.215
532
+ c(M)MG = ∆c(M),MG × c(M)ΛCDM
533
+ β = 0.307 × (1 + z)0.540
534
+ γ1 = 0.628 × (1 + z)−0.047
535
+ γ2 = 0.317 × (1 + z)−0.893
536
+ ν0 = (4.135 − 0.564a−1 − 0.210a−2
537
+ +0.0557a−3 − 0.00348a−4) × D(z)−1
538
+ f(R): Mitchell et al. 2019 [84]
539
+ y(x) = 1
540
+ 2
541
+
542
+ λ
543
+ ωs φ(x′)
544
+
545
+ 1 + erf
546
+
547
+ αx′
548
+
549
+ 2
550
+ ��
551
+ + γ
552
+
553
+ (1 − tanh(ωt[x + ξt]))
554
+ y = log10(∆c(M),f(R))
555
+ x′ = (x − ξs)/ωs
556
+ x = log10(M500/10p2)
557
+ p2 = 1.5 log10
558
+
559
+ ¯
560
+ fR(z)
561
+ 1+z
562
+
563
+ + 21.64 [85]
564
+ λ = 0.55 ± 0.18
565
+ ξs = −0.27 ± 0.09
566
+ For M ≤ 1012M⊙/h,
567
+ ωs = 1.7 ± 0.4
568
+ c(M)f(R),nDGP = c(M)ΛCDM
569
+ α = −6.5 ± 2.4
570
+ γ = −0.07 ± 0.04
571
+ ωt = 1.3 ± 1.0
572
+ ξt = 0.1 ± 0.3
573
+ nDGP: Mitchell et al. 2021 [86]
574
+ ∆c(M),nDGP = [A − Blog10(M200M⊙h−1)](H0rc)−0.71±0.05 + 1
575
+ A = (0.35 ± 0.01)(H0rc)−0.71±0.05
576
+ B = (0.0302 ± 0.0008)(H0rc)−0.71±0.05
577
+ is in place here. There is no clear physical justification
578
+ for our particular choice of both m and n, other than that
579
+ they are providing optimal HM power spectrum predic-
580
+ tions. An interested reader can play around and search
581
+ for a different choice of (m, n). However, the overall im-
582
+ pact of the particular (m, n) choice on the resulting HM
583
+ remains small.
584
+ B.
585
+ Halo bias
586
+ The relation between the clustering amplitude of the
587
+ underlying DM density field and halos is quantified in
588
+ terms of the linear halo bias relation, δh(M) = b(M)δ. In
589
+ the context of power spectra, it is convenient to consider
590
+ the following Fourier-space estimator of the halo bias:
591
+ ˆb(k, M) = Phm(k, M)
592
+ P(k)
593
+ (10)
594
+ Here, Phm(k, M) is the halo-matter cross power spec-
595
+ trum, and P(k) is the matter power spectrum. One can
596
+ find an optimal value of the linear bias by taking a limit,
597
+ or an average of this estimator at the smallest possible
598
+ k’s. We consider such a power-spectrum-based bias es-
599
+ timator to use results from elephant suite for testing
600
+ and finding optimal analytic bias formula for HM.
601
+ For this purpose, we tested various b(M) fitting func-
602
+ tions for ΛCDM [97–99]. Sheth et al. 2001 b(M) [82,
603
+ hereafter S01] gave the best match to the simulations.
604
+ Thus, this will be our choice for the b(M) computations
605
+ in this work.
606
+ In the Appendix A, we show the performance of S01,
607
+ both in capturing the ratio of MG b(M) versus ΛCDM
608
+ (Fig. 5), and the absolute b(M) relation (Fig. 6) . We
609
+ find that S01 gives reasonable predictions in both cases.
610
+ Given that b(M) impacts only the two-halo term, which
611
+ by construction matches the P(k)lin on large scales, the
612
+ choice of b(M) does not impact the HM results to a great
613
+ extent.
614
+
615
+ 6
616
+ C.
617
+ Halo density profile: concentration-mass
618
+ relation
619
+ The scale-free nature of structure formation in CDM
620
+ scenarios results in self-similar density profiles for indi-
621
+ vidual DM halos, which was first pointed out by Navarro,
622
+ Frenk, and White in [100, hereafter NFW]. As a result,
623
+ DM density profiles are re-scaled by a characteristic cen-
624
+ tral density, ρs, and radial scale, rs, (or mass M and
625
+ concentration c(M), respectively). The c(M) relation is
626
+ defined as the ratio of the virial radius, Rv of the halo to
627
+ rs, and determines the density profile of NFW halos.
628
+ To obtain relatively unbiased and good-quality NFW
629
+ fits, the simulated halos need to be well-resolved. The
630
+ convergence of the halo density profile depends on the
631
+ simulation’s force and mass resolution. Thus c(M) can
632
+ be reliably estimated only for a limited halo mass range,
633
+ usually for halo with masses corresponding to at least
634
+ a few × 103 particles [see e.g. 101]. The resolution of
635
+ the elephant suite allow only for probing the c(M ≥
636
+ 1013M⊙/h). Because of this, we need to resort to the
637
+ fitting functions for c(M) here.
638
+ We use relations proposed in [84] and [86] to com-
639
+ pute the c(M) relation in f(R) and nDGP gravity
640
+ models, respectively.
641
+ In these works, direct NFW
642
+ fitting was used to compute the halo density pro-
643
+ files, and functional forms were derived for the ratio
644
+ c(M)MG(=f(R),nDGP)/c(M)ΛCDM (refer to Table I for ex-
645
+ plicit expressions). The MG c(M) can be therefore ob-
646
+ tained as a product of this ratio times the concentration-
647
+ mass relation for ΛCDM, for which we use the form pro-
648
+ posed in [83]. Considering the ratio instead of absolute
649
+ MG c(M) would eliminate the leading-order systematic
650
+ uncertainties coming from the background cosmology.
651
+ The authors in [84] proposed functional form for
652
+ log(c(M)f(R)/c(M)ΛCDM).
653
+ When expressed as a func-
654
+ tion of M500/10p2, this ratio is independent of the back-
655
+ ground scalar field and z. The parameter p2 defined in
656
+ [85], encapsulates these dependencies, and in turn allows
657
+ different variants of f(R) gravity model to be studied in
658
+ a unified way.
659
+ For the case of the nDGP gravity model, in ref. [86],
660
+ the ratio c(M)nDGP/c(M)ΛCDM is fitted as a decreasing
661
+ function of M200.
662
+ This fitting also captures the z de-
663
+ pendence, hence making the ratio only dependent on the
664
+ nDGP parameter, rcH0.
665
+ The halo mass range probed in both Mitchell et al. [84,
666
+ 86] is confined to ≥ 1012 M⊙/h. Therefore, we restrict the
667
+ use of their fitting functions to the calibrated mass range,
668
+ and artificially impose c(M)f(R), nDGP = c(M)ΛCDM for
669
+ M < 1012 M⊙/h.
670
+ IV.
671
+ RESULTS
672
+ In this section, we combine all the HM components to
673
+ give an analytical prediction for matter overdensity PS.
674
+ As a reference case to gauge our results against, we al-
675
+ ways take the PS from elephant simulations. At large
676
+ scales, the linear perturbation theory gives accurate and
677
+ reliable predictions both for ΛCDM and MG PS. Hence,
678
+ we focus here only on the scales corresponding to mildly
679
+ and fully non-linear regimes. In practice, we will be in-
680
+ terested in the performance of our models for k ≥ 0.1
681
+ h/ Mpc.
682
+ A.
683
+ Halo model predictions for modified gravity
684
+ We start by testing the standard set-up for HM, which
685
+ aims to yield a theoretical prediction for the PS am-
686
+ plitude in a given cosmology.
687
+ For ΛCDM alone, this
688
+ approach has at best limited accuracy, since the clas-
689
+ sical HM fails to accurately capture PS already in the
690
+ mildly non-linear regime, i.e.
691
+ k
692
+ >
693
+ ∼ 0.2 − 0.3 h/ Mpc
694
+ [25, 26, 102, 103]. Thus, we do not expect that it will per-
695
+ form better in MG cosmologies, which have even richer
696
+ phenomenology. However, it is still an illustrative exer-
697
+ cise, since we will be using this basic HM set-up to obtain
698
+ much more accurate PS predictions for MG.
699
+ Using the inputs of the HMF, b(M), and c(M) relation
700
+ in their MG versions discussed in the previous section, we
701
+ compute the resultant power spectra for a number of red-
702
+ shifts. For this, we employ Eqs. (2)-(4), integrating from
703
+ Mmin = 1 M⊙/h to Mmax = 1016 M⊙/h. We choose a
704
+ sufficiently broad halo mass range so as to account for the
705
+ maximum possible halo masses that still have an impact
706
+ on the resulting PS.
707
+ For the integral in Eq. (4) to approach unity at large
708
+ scales, the bias needs to attain unity when integrated
709
+ over all the halo masses, i.e.
710
+ 1
711
+ ¯ρ
712
+ � ∞
713
+ 0
714
+ b(M)n(M)dM = 1
715
+ (11)
716
+ In practice, this integral yields a value below unity, even
717
+ when the integration is taken over the maximum possi-
718
+ ble halo mass range. Changing the high mass limit for
719
+ the integration does not impact the results to a great ex-
720
+ tent, because on these scales, halos become exponentially
721
+ rare which makes their contribution to the total power
722
+ negligible. On the other hand, we expect a significant
723
+ contribution from the low-mass regime.
724
+ However, ow-
725
+ ing to resolution limits, the properties of low mass halos
726
+ cannot be properly calibrated using simulations.
727
+ Therefore, to add the contribution of the low-mass ha-
728
+ los to HM computations, we use the correction proposed
729
+ in [104, 105]. This correction adds the contribution of the
730
+ missing halos to the two-halo term, in order to recover
731
+ P(k)lin at large scales.
732
+ The correction term is simply
733
+ yielded by:
734
+ A = 1 − 1
735
+ ¯ρ
736
+ � Mmax
737
+ Mmin
738
+ b(M)n(M)dM,
739
+ (12)
740
+ and it is used as an additive component in the two-halo
741
+
742
+ 7
743
+ term:
744
+ C = A˜u(k|Mmin)
745
+ Mmin
746
+ (13)
747
+ Here, ˜u(k|Mmin) is the normalized Fourier transform of
748
+ the density profile for the lowest resolved mass Mmin.
749
+ Equation (3) is then modified and the resultant two-halo
750
+ term is given by:
751
+ P(k)2h = P(k)lin(Im + C)2
752
+ (14)
753
+ One could instead replace the P(k)2h term with
754
+ P(k)lin, as the former differs from the latter only for
755
+ k ≥ 1 h/ Mpc, where already P(k)1h takes over as the
756
+ dominant contributor.
757
+ However, for completeness, we
758
+ use the full above expression for the two-halo term.
759
+ The results of such direct HM computations for our
760
+ MG models are illustrated in Fig. 1, where we compare
761
+ P(k)HM (solid lines), as well as linear theory P(k)lin (dot-
762
+ ted lines), with the elephant simulations for all our
763
+ models at z = 0. The shaded region corresponds to the
764
+ uncertainty in the elephant results, which is the inverse
765
+ of the square root of the number of statistically indepen-
766
+ dent modes contributing to each k-bin, and the horizontal
767
+ dashed lines correspond to the 5% accuracy regime. The
768
+ performance of HM in these MG models is similar to the
769
+ ΛCDM results and is not much better than the actual
770
+ linear theory. With respect to the simulation prediction,
771
+ P(k)HM gives better than 5% accuracy for k ≤ 0.2 − 0.3
772
+ h/ Mpc, and stays within 10% for k ≤ 0.4 − 0.5 h/ Mpc.
773
+ An interesting exception is the F5 f(R) variant, where
774
+ better than 2% accuracy is kept all the way to k ∼ 0.2
775
+ h/ Mpc.
776
+ In all the models,
777
+ we also encounter an under-
778
+ prediction w.r.t.
779
+ the simulation results for k ≈ 0.5
780
+ h/ Mpc. This is a well-known problem of the HM for-
781
+ malism in ΛCDM [26, 103], and further propagates to
782
+ the MG scenarios (also seen for Galileon models in [65]).
783
+ Similar behavior is observed also for other redshifts that
784
+ our simulations probe, but we do not show them here for
785
+ brevity.
786
+ These results clearly show that the standard HM can-
787
+ not be used in MG, similarly as in ΛCDM, if one is in-
788
+ terested in attaining the accuracy that we expect from
789
+ future LSS surveys.
790
+ However, noticing the above, the
791
+ positive result here is that HM can be actually employed
792
+ to yield predictions for MG power spectra with the same-
793
+ level accuracy as for ΛCDM. This is a somewhat sur-
794
+ prising result because the standard HM does not include
795
+ any room for extra MG physics (like the fifth-force and
796
+ screening).
797
+ Yet it seems that self-consistent modifica-
798
+ tions of HMF, b(M), and c(M) are enough to obtain the
799
+ usual ΛCDM HM-level predictions also for different MG
800
+ cosmologies. This is very encouraging, and as we show
801
+ below this can be used as a strong advantage to build an
802
+ even better and more accurate PS model for MG.
803
+ FIG. 1. Comparison of the power spectrum from halo-model,
804
+ P(k)HM (solid lines) and linear theory, P(k)lin (dotted lines)
805
+ with elephant simulations P(k)sim, for ΛCDM and the vari-
806
+ ants of MG models, as in the legend, for z = 0. The horizontal
807
+ grey dashed lines correspond to 5% accuracy regime.
808
+ B.
809
+ An improved model for MG power spectrum
810
+ In the previous section, we have shown that when HM
811
+ is applied to model the PS amplitude, it offers limited
812
+ accuracy, and is comparable to what can be achieved for
813
+ the standard ΛCDM. In this section, we will demonstrate
814
+ that we can build a much more accurate PS model for
815
+ MG. This can be realized when we apply HM to estimate
816
+ the fractional departure from the ΛCDM baseline, rather
817
+ than trying to predict the absolute amplitude of PS alone.
818
+ Our starting point will be the ratio of the power spec-
819
+ tra:
820
+ Υ(k) ≡ P(k)MG/P(k)ΛCDM .
821
+ (15)
822
+ By modeling this ratio, rather than the MG PS itself, we
823
+ can benefit from a number of properties, namely: (i) the
824
+ dependence on the background cosmological parameters
825
+ (such as Ωm, H0, or σ8) should cancel out from the ra-
826
+ tio to the leading order; and (ii) the scale of significant
827
+ departure from ΛCDM (i.e. from Υ = 1) is naturally
828
+ determined in terms of the ΛCDM baseline, rather than
829
+ some arbitrary non-linear amplitude or scale.
830
+ In Fig. 2, we compare the ratios Υ(k) estimated from
831
+ elephant simulations (solid line), linear theory (dotted
832
+ line), and HM (dashed line), for both f(R) (left pan-
833
+ els), and nDGP (right panels), at z = 0 (top panel)
834
+ and z = 0.5 (bottom panel). Naturally, both the sim-
835
+ ulation and HM results for Υ(k) are expected to match
836
+ the linear theory prediction at large scales for both
837
+ models.
838
+ As we approach smaller scales, the departure
839
+ from linear predictions increases (namely, linear theory
840
+ runs away for f(R) and stays constant for nDGP), and
841
+ trends peculiar to each model emerge.
842
+ This is a well-
843
+ known result, which highlights the fact that these fam-
844
+
845
+ 0.15
846
+ Halo Model .... Linear Theory
847
+ 0.10
848
+ 0.05
849
+ P(k)/P(k)sIM-1
850
+ 0.00
851
+ -0.05
852
+ ΛCDM
853
+ F5
854
+ F6
855
+ -0.10
856
+ N1
857
+ N5
858
+ -0.15
859
+ 10-2
860
+ 10-1
861
+ 100
862
+ k (h/Mpc)8
863
+ FIG. 2. The ratio Υ(k) ≡ P(k)MG/P(k)ΛCDM obtained from linear theory (dotted lines), elephant simulation (solid lines)
864
+ and the halo model (dashed lines), at z = 0 (top panels) and z = 0.5 (bottom panels). The left panels correspond to f(R)
865
+ gravity variants: F5 and F6, and the right panels correspond to nDGP gravity variants: N1 and N5. Shaded regions are the
866
+ propagated errors from P(k)sim.
867
+ ily of MG models usually exhibits an increased degree
868
+ of non-linearity of the density field, owing to both the
869
+ fifth force and their respective screening mechanisms
870
+ [16, 31, 38, 44, 56, 106, 107]. For f(R) gravity models,
871
+ PS approaches ΛCDM on the large-scales, and we see a
872
+ monotonic increase in the ratio with k (although slower
873
+ than what the linear theory would predict). Whereas,
874
+ for nDGP, Υ(k) enhancement is maximum at the inter-
875
+ mediate scales, and this enhancement decreases for large
876
+ k.
877
+ A crucial observation from our study is that HM pre-
878
+ diction agrees qualitatively with the simulations.
879
+ We
880
+ note that the agreement is far from perfect, especially
881
+ around the peak-like features, but the HM captures the
882
+ essential shape and scales of the PS ratios.
883
+ As mentioned in the previous section, one perennial
884
+ problem with the HM has been the ‘transition’ region,
885
+ where both two- and one-halo terms have a similar mag-
886
+ nitude, and both contribute equivalently to the predicted
887
+ signal. In general, the HM under-predicts the strength of
888
+ clustering in this region, with the exact amount depend-
889
+ ing on redshift and cosmology [26]. We also highlight a
890
+ similar problem with the HM-based MG predictions in
891
+ Fig. 1 at k ≈ 0.5 h/ Mpc. These scales are also called the
892
+ ‘quasi-linear’ regime because the evolution of perturba-
893
+ tions at these scales is not exactly governed by linear
894
+ perturbation theory.
895
+ For standard ΛCDM, the inaccuracies of the HM in
896
+ this transition regime are addressed by devising empiri-
897
+ cal fitting functions. One of the earliest, yet successful
898
+ examples was halofit [25], which is motivated by the
899
+ principles of HM, and calibrated using N-body simula-
900
+ tions. It was later improved, in particular by [28] who
901
+ updated its fitting functions from higher resolution sim-
902
+ ulations and ameliorated the modeling for dark energy
903
+ cosmologies. Methods and prescriptions to predict the
904
+ non-linear PS in ΛCDM are numerous, but in this work
905
+ we will use halofit as it is sufficiently accurate for our
906
+ purposes.
907
+ Having seen that the ratio Υ(k) between HM-derived
908
+ PS for MG and ΛCDM correctly captures the simulation
909
+ trends, we propose to use it to obtain the fully non-linear
910
+ PS in MG. This is obtained by multiplying ΥHM with an
911
+ accurate model for the ΛCDM baseline P(k). Therefore,
912
+ we characterize the beyond-ΛCDM PS (P(k)MG) as:
913
+ P(k)MG = Υ(k)HM × P(k)ΛCDM
914
+ (16)
915
+ In this prescription, P(k)ΛCDM is the non-linear ΛCDM
916
+ PS, for which we take the halofit predictions using the
917
+ parameters of a given background cosmology.
918
+ The results of applying our proposed methodology are
919
+
920
+ [F(R)
921
+ nDGP
922
+ Simulation Y(k)sim
923
+ Halo Model Y(k)HM
924
+ F5
925
+ F6
926
+ N1
927
+ N5
928
+ ... Linear Y(k)Linear
929
+ z=0
930
+ z=O
931
+ 1.25
932
+ 1.25
933
+ 1.20]
934
+ 1.20
935
+ P(k)MG/P(k)ACDM
936
+ 1.15
937
+ 1.15
938
+ 1.10]
939
+ [1.10
940
+ 1.05
941
+ 1.05
942
+ 1.00
943
+ 1.00
944
+ 1.40z=0.5
945
+ z=0.5
946
+ 1.40
947
+ II
948
+ 1.32
949
+ 1.32
950
+ (X)人
951
+ 1.24
952
+ 1.24
953
+ 1.16
954
+ 1.16
955
+ 1.08
956
+ 1.08
957
+ 1.00
958
+ 1.00
959
+ 10-1
960
+ 100
961
+ 10-2
962
+ 100
963
+ 10-2
964
+ 10-1
965
+ k (h/Mpc)9
966
+ FIG. 3. Top panel: Matter power spectra obtained from our new approach (P(k)MG from Eq. (16)) for all the MG variants
967
+ considered in this work, at redshifts as indicated in the legends. Bottom panel: Comparison of P(k)MG, derived with our new
968
+ method, with P(k)sim. The shaded region in all the plots corresponds to the uncertainty in the P(k)sim, and the horizontal
969
+ dotted lines shows 5% accuracy regime.
970
+ illustrated in Fig. 3, where we plot P(k)MG obtained
971
+ using HM for Υ(k) multiplied by the halofit ΛCDM-
972
+ baseline. The top panels present the power spectra di-
973
+ rectly: P(k)sim from elephant (dots), and P(k)MG de-
974
+ rived with Eq. (16) (solid lines). In the bottom panels, we
975
+ show departures of thus-obtained P(k)MG from P(k)sim
976
+ treated as reference. These new results, when compared
977
+ with the standard HM predictions from Fig. 1, clearly
978
+ perform much better. The standard HM reaches 5% ac-
979
+ curacy only up to k ≤ 0.2 − 0.3 h/ Mpc. Now, by us-
980
+ ing HM only for predicting Υ(k), and combining it with
981
+ halofit ΛCDM-baseline, we improve the scale at which
982
+ modeling is accurate within 5% by an order of magni-
983
+ tude, reaching up to k ≤ 0.5 − 2.5 h/ Mpc (depending
984
+ on the model and redshift).
985
+ We note that the perfor-
986
+ mance of P(k)MG generally worsens for higher redshifts,
987
+ but still remains significantly improved when compared
988
+ to the standard HM.
989
+ More generally, the accuracy of P(k)MG will depend on
990
+ the user input of baseline P(k)ΛCDM. As already men-
991
+ tioned, other approaches are being developed to further
992
+ improve the limited accuracy of halofit, especially for
993
+ models departing from the flat Planck-based ΛCDM. We
994
+ tested one such alternative way of deriving the non-linear
995
+ ΛCDM PS, that goes into our P(k)MG prediction (16):
996
+ the so-called hmcode [26, 108]. The results, detailed in
997
+ Appendix B, indicate that both halofit and hmcode
998
+ give similar accuracy, however with different trends at
999
+ different scales and redshifts.
1000
+ Given the fact that we have calibrated our MG HM
1001
+ with a limited-resolution elephant simulation suite, it
1002
+ is encouraging that this allowed for already an order-of-
1003
+ magnitude improvement of the scale at which we can ob-
1004
+ tain accurate PS predictions. Obtaining accurate MG PS
1005
+ into the fully non-linear regime at k ≥ 1 h/ Mpc with so
1006
+ straightforward modifications to HM opens up an avenue
1007
+ for even better PS predictions for the MG phenomenol-
1008
+ ogy. Even better PS accuracy could be achieved using
1009
+ possible improvements to HM, better informed about the
1010
+ clustering and properties of small halo mass regime in
1011
+
1012
+ F5
1013
+ 104
1014
+ P(k) (Mpc/h)3
1015
+ 103
1016
+ O=Z
1017
+ 102
1018
+ z=0.3
1019
+ z=0.5
1020
+ 101
1021
+ z=1
1022
+ 0.15
1023
+ 0.10
1024
+ P(k)/P(k)sim-1
1025
+ 0.05
1026
+ 0.00
1027
+ -0.05
1028
+ -0.10
1029
+ -0.15
1030
+ 10-2
1031
+ 10-1
1032
+ 100
1033
+ k (h/Mpc)F6
1034
+ 104
1035
+ P(k) (Mpc/h)3
1036
+ 103
1037
+ O=Z
1038
+ 102
1039
+ z=0.3
1040
+ z=0.5
1041
+ 101
1042
+ z=1
1043
+ 0.15
1044
+ 0.10
1045
+ P(k)/P(k)sim-1
1046
+ 0.05
1047
+ 0.00
1048
+ -0.05
1049
+ -0.10
1050
+ -0.15
1051
+ 10-2
1052
+ 10-1
1053
+ 100
1054
+ k (h/Mpc)N1
1055
+ 104
1056
+ P(k) (Mpc/h)3
1057
+ 103
1058
+ 102
1059
+ Z=0
1060
+ z=0.3
1061
+ 101
1062
+ z=0.5
1063
+ 0.15
1064
+ 0.10
1065
+ P(k)/P(k)sim-1
1066
+ 0.05
1067
+ 0.00
1068
+ -0.05
1069
+ -0.10
1070
+ -0.15
1071
+ 10-2
1072
+ 10-1
1073
+ 100
1074
+ k (h/Mpc)N5
1075
+ 104
1076
+ P(k) (Mpc/h)3
1077
+ 103
1078
+ 102
1079
+ Z=0
1080
+ z=0.3
1081
+ 101
1082
+ z=0.5
1083
+ 0.15
1084
+ 0.10
1085
+ P(k)/P(k)sim-1
1086
+ 0.05
1087
+ 0.00
1088
+ -0.05
1089
+ -0.10
1090
+ -0.15
1091
+ 10-2
1092
+ 10-1
1093
+ 100
1094
+ k (h/Mpc)10
1095
+ FIG. 4. Comparison of our P(k)MG modeling, with simulation results from mg-cola [13, 74], for two MG variants: N1 (left)
1096
+ and F5 (right). The redshifts are as indicated in the legends. Dotted grey lines are the 5% accuracy regime. The shaded region
1097
+ is the simulation error, which is the standard deviation obtained from five realizations at each redshift.
1098
+ MG.
1099
+ C.
1100
+ Testing non-linear P(k)MG beyond ELEPHANT
1101
+ In this subsection, we extend our work beyond the
1102
+ elephant simulations to test the performance of our
1103
+ new approach. For this purpose, we consider different
1104
+ N-body simulation runs for the F5 and N1 models, per-
1105
+ formed using mg-cola [13], and described in [74]. The
1106
+ most important factors for us are that these runs have
1107
+ a different background cosmology than elephant (see
1108
+ Section II), and were run using different codes. Unlike
1109
+ standard N-body approach, these simulations employ the
1110
+ COLA method [109], that can straightforwardly trade
1111
+ accuracy at small-scales in order to gain computational
1112
+ speed without sacrificing accuracy at large scales. On one
1113
+ hand, this approach is much faster than the standard N-
1114
+ body, but the price to pay is the approximations made,
1115
+ which do not allow us to use these suite of simulations
1116
+ as the calibration data. Hence, we use these simulations
1117
+ but only as a test-bed.
1118
+ Here, the HM ingredients were calculated using the
1119
+ same methodology and setup as above, described in Sec-
1120
+ tion III and summarized in Table I. The main difference
1121
+ with respect to Sec. IV B was that different background
1122
+ cosmological parameters were used in the linear power
1123
+ spectra that go into the particular ingredients of the HM
1124
+ build-up, namely HMF, b(M) and c(M). Everything else,
1125
+ including the halo mass integration ranges for the HM
1126
+ components, were the same as before.
1127
+ Using the HM outputs and ΛCDM halofit predic-
1128
+ tions for the background cosmology of this alternative
1129
+ simulation suite, we computed P(k)MG. A comparison
1130
+ of our results with the simulation predictions is in Fig. 4,
1131
+ for both N1 (left plot) and F5 (right plot). Given the
1132
+ small box size of these simulations (L = 500 Mpc/h), we
1133
+ obtain a discrepancy > 5% with the simulation predic-
1134
+ tions on large scales, for k < 0.1 − 0.2 h/ Mpc. Now,
1135
+ contrary to the elephant results, for N1 our new PS
1136
+ model performs better than before. However, for F5 the
1137
+ performance of our approach decreases with increasing
1138
+ redshift.
1139
+ Overall, we see a similar performance of the
1140
+ new P(k)MG in both the simulations that we tested, with
1141
+ 5% accuracy from mildly non-linear to non-linear scales
1142
+ (k ≤ 0.5 − 2.5 h/ Mpc).
1143
+ This test with a different simulation and cosmology re-
1144
+ assures us that our new approach is a valid technique to
1145
+ compute the non-linear PS in these MG scenarios, and
1146
+ can be successfully extended to simulations and cosmolo-
1147
+ gies beyond our original data used for calibration and
1148
+ fitting.
1149
+ V.
1150
+ DISCUSSION AND CONCLUSION
1151
+ In this work, we combined Halo Model (HM) pre-
1152
+ dictions with an accurate ΛCDM baseline for building
1153
+ an analytical framework to compute the non-linear power
1154
+ spectrum (PS) in modified gravity (MG) scenarios, where
1155
+ structure formation differs from that in ΛCDM.
1156
+ For
1157
+ calibration and testing, we used the elephant suite –
1158
+ a set of N-body simulations, which incorporates stan-
1159
+ dard ΛCDM and two MG models:
1160
+ Hu-Sawicki f(R)
1161
+ and the normal branch of the Dvali-Gabadadze-Porrati
1162
+ braneworld (nDGP). HM has been extensively studied
1163
+ for ΛCDM [49, 77], and we further extended it to these
1164
+ MG cosmologies. This formalism is advantageous as a
1165
+ quick and reliable tool to obtain predictions for statistics
1166
+ of density fields well into the regimes, where linear and
1167
+ perturbation theory fails to reproduce simulation results.
1168
+ The HM framework requires the input of three main
1169
+ halo properties: halo mass function (HMF), which quan-
1170
+ tifies the number density of halos; linear halo bias b(M),
1171
+ describing the relation between halos and the underlying
1172
+ DM density field; and the concentration-mass relation
1173
+ c(M), which describes the internal distribution of mass
1174
+ in halos. For the HM framework, we needed to compute
1175
+ these quantities over large range of halo masses, that go
1176
+ much beyond the range of our simulations. As a result,
1177
+ we relied on fitting functions for the halo properties in
1178
+ these MG scenarios (Table I).
1179
+ Using these three inputs, we obtained the HM-based
1180
+ predictions, P(k)HM for these two MG models.
1181
+ We
1182
+
1183
+ 0.15
1184
+ N1
1185
+ 0.10
1186
+ P(k)/P(k)sim-1
1187
+ 0.05
1188
+ 0.00
1189
+ -0.05
1190
+ Z=O
1191
+ z=0.3
1192
+ -0.10
1193
+ Z=0.5
1194
+ Z=1
1195
+ -0.15
1196
+ 10-1
1197
+ 100
1198
+ k (h/Mpc)0.15
1199
+ F5
1200
+ 0.10
1201
+ P(k)/P(k)sim-1
1202
+ 0.05
1203
+ 0.00
1204
+ -0.05
1205
+ O=Z
1206
+ z=0.3
1207
+ -0.10
1208
+ Z=0.5
1209
+ z=1
1210
+ -0.15
1211
+ 10-1
1212
+ 100
1213
+ k (h/Mpc)11
1214
+ showed that P(k)HM is within 5-15% of the simulation re-
1215
+ sults across the k-ranges, from k = 0.01 to k = 1 h/ Mpc.
1216
+ However, MG signatures from these models that quantify
1217
+ deviations from GR are typically in itself a factor of a few
1218
+ dozen per cent. Hence, we cannot use HM predictions in
1219
+ its standard form to complement the expected accuracy
1220
+ from future LSS surveys in order to detect these MG sig-
1221
+ nals.
1222
+ Additionally, similar to the case of ΛCDM, HM
1223
+ also faces the consistent problem of under-prediction of
1224
+ power in the transition regime for both f(R) and nDGP.
1225
+ These scales correspond to k ≈ 0.5 h/ Mpc.
1226
+ To get a better PS model, we further investigated, us-
1227
+ ing HM, the relative ratio Υ(k) = P(k)MG/P(k)ΛCDM,
1228
+ instead of employing the absolute PS amplitudes alone.
1229
+ From this, we obtained new analytical PS by taking a
1230
+ product of Υ(k)HM, with the non-linear prediction for
1231
+ ΛCDM, P(k)ΛCDM (Eq. (16)). For the latter, we used
1232
+ halofit [25, 28], as it has been a successful approach
1233
+ for ΛCDM to circumvent the HM under-prediction of PS
1234
+ in the intermediate scales, and is widely used to ana-
1235
+ lytically compute non-linear ΛCDM PS. One could use
1236
+ other approaches for the input non-linear P(k)ΛCDM to
1237
+ multiply our ratio ΥHM(k) with, and we tested one of
1238
+ them: hmcode [26, 108]. It gave comparable accuracy
1239
+ as halofit for our cosmology.
1240
+ Using this approach, we significantly improved the ac-
1241
+ curacy of PS modeling compared to standard HM predic-
1242
+ tion. For HM, we obtained results within 5% accuracy
1243
+ with the simulation predictions for k ≤ 0.2−0.3 h/ Mpc.
1244
+ With our new approach, we now matched simulations
1245
+ within this accuracy for k between 0.5−2.5 h/ Mpc, with
1246
+ the performance of the method depending on the MG
1247
+ model and redshift.
1248
+ The k-range probed in this work
1249
+ corresponds to the mildly non-linear and the fully non-
1250
+ linear regime: a range of scales crucial to constrain mod-
1251
+ ern era cosmological observables. The sensitivity of these
1252
+ observables to changes in the matter PS will be very im-
1253
+ portant for making powerful observational cosmological
1254
+ tests of the theory of gravity, or dark energy.
1255
+ The main advantage of our approach over using simu-
1256
+ lations is that it is computationally inexpensive. The two
1257
+ main inputs, HM and halofit (or e.g. hmcode) can be
1258
+ flexibly applied to a different background cosmologies,
1259
+ whereas, in simulations, we need to perform a new run
1260
+ for each new set of parameters. HM also gives the flexi-
1261
+ bility of employing different combinations of HMF, b(M)
1262
+ and c(M) that is best suited to probe a particular cos-
1263
+ mology, scale, halo mass range, or redshift.
1264
+ To test the limits and accuracy of our approach, we
1265
+ applied Eq. (16) to another suite of MG N-body simula-
1266
+ tions, run with mg-cola [13, 74]. Using the same fitting
1267
+ functions as described for the elephant simulations, we
1268
+ computed halo properties for the mg-cola cosmology,
1269
+ and in turn P(k)HM, Υ(k)HM and P(k)MG.
1270
+ We com-
1271
+ pared P(k)MG with the P(k)sim results, and obtained
1272
+ similar accuracy as with the original data of elephant.
1273
+ For N1, P(k)MG gives consistency with simulation results
1274
+ within 5% for k between 0.5 − 2.5 h/ Mpc. However, for
1275
+ the case of F5, overall performance of our approach de-
1276
+ creases with z.
1277
+ We need to appreciate that another promising solution
1278
+ for analytical modeling of the MG PS is via the fast and
1279
+ reliable emulation techniques [e.g 30, 110, 111].For MG
1280
+ models, emulators have been proposed in e.g. [112–116].
1281
+ This approach is sophisticated and promising, however,
1282
+ is still in its infancy, and has limitations. For instance,
1283
+ predictions from emulators are confined to the parameter
1284
+ space defined in the starting base grid of the calibrating
1285
+ simulations.
1286
+ In addition, new extensions in emulators
1287
+ (e.g.
1288
+ new degrees of freedom, or additional screening
1289
+ mechanisms in MG models) often requires one to sub-
1290
+ stantially adapt the base grid of simulations used to build
1291
+ the emulator, which can in itself be computationally ex-
1292
+ pensive.
1293
+ On the other hand, HM potentially provides a sim-
1294
+ ple, physically-motivated semi-analytical picture of the
1295
+ clustering of matter. We showed that HM, in its stan-
1296
+ dard form, can be qualitatively used to predict estimates
1297
+ for MG signatures in cosmological observables which re-
1298
+ late to matter perturbations.
1299
+ Furthermore, using HM
1300
+ for modeling the PS ratio Υ(k), and combining it with
1301
+ a high-quality baseline ΛCDM predictions yields signif-
1302
+ icantly better results. This method is advantageous as
1303
+ contrary to MG scenarios, we have much tighter con-
1304
+ straints on ΛCDM physics, and the field of modeling
1305
+ ΛCDM PS is much more sophisticated and advanced [25–
1306
+ 28]. As a result, more precise ΛCDM results will provide
1307
+ MG PS with similarly improved performance. Here we
1308
+ present our results by incorporating the halofit and
1309
+ hmcode predictions for ΛCDM. These results in them-
1310
+ selves give a percent level of accuracy in both quasi-linear
1311
+ and non-linear regimes.
1312
+ In order to further improve HM modeling in the MG
1313
+ variants studied here, we need to probe deeper into the
1314
+ non-linear scales. For this, the behavior of halo density
1315
+ profiles and HMF in both f(R) and nDGP at low halo
1316
+ masses requires deeper investigation, as the full effect of
1317
+ the respective screening mechanisms comes to play in the
1318
+ non-linear regime of gravitational collapse. As mentioned
1319
+ above, the accuracy of c(M) fitting functions for both
1320
+ f(R) and nDGP has not been tested for Mhalo < 1012
1321
+ M⊙/h.
1322
+ Additionally, we also extrapolated our earlier
1323
+ HMF fits for these MG models [80] to small halo mass
1324
+ scales, which are not resolved by our N-body simulations
1325
+ (the limit being Mhalo ≲ 8×1012 M⊙/h). Both c(M) and
1326
+ HMF are important ingredients in modeling the one-halo
1327
+ term, which is the dominant non-linear contributor in the
1328
+ HM approach. Such a study will require a completely
1329
+ new set of high-resolution MG N-body simulations, and
1330
+ we plan it as a future project.
1331
+ We also note that in this work, we focus on modeling
1332
+ only the dark matter PS. At our scales of interest (k be-
1333
+ tween 0.1−2.5 h/ Mpc), PS is not significantly influenced
1334
+ by baryons, as baryonic suppression in PS is of the order
1335
+ of a few percent for k < 1 − 5 h/ Mpc [117–119]. How-
1336
+ ever, [105, 108, 117] have shown that HM provides the
1337
+
1338
+ 12
1339
+ flexibility, which allows it to add additional parameters
1340
+ that can incorporate baryonic effects from hydrodynam-
1341
+ ical simulation. Accounting for such effects in our MG
1342
+ PS modeling is a significant endeavor, and is well beyond
1343
+ the scope of this work.
1344
+ The data used in this work is publicly available from
1345
+ our website1. We provide Υ(k) for a wide range of z,
1346
+ from z = 0 to z = 2 for each MG model considered in
1347
+ this work. A description of the data set is also enclosed
1348
+ in the directory. Also, the data used to make the figures
1349
+ in this article are available on request to the authors.
1350
+ ACKNOWLEDGMENTS
1351
+ We would like to thank Hans A. Winther for kindly
1352
+ providing us with mgcamb version for specific forms of
1353
+ µ(a, k) and γ(a, k) functions implementing our f(R) and
1354
+ nDGP models. The authors also thank Krishna Naidoo
1355
+ for giving his suite of mg-cola simulations that we used
1356
+ as a testbed in our work.
1357
+ We also acknowledge con-
1358
+ structive discussions with Marika Asgari and Alberto
1359
+ Acuto.
1360
+ Matter power spectrum calculations to com-
1361
+ pute linear halo bias have been done using pylians2.
1362
+ This work is supported via the research project “VEr-
1363
+ TIGO” funded by the National Science Center, Poland,
1364
+ under agreement no.
1365
+ 2018/30/E/ST9/00698.
1366
+ We
1367
+ also acknowledge the support from the Polish Na-
1368
+ tional
1369
+ Science
1370
+ Center
1371
+ within
1372
+ research
1373
+ projects
1374
+ no.
1375
+ 2018/31/G/ST9/03388, 2020/39/B/ST9/03494 (WAH &
1376
+ MB), 2020/38/E/ST9/00395 (MB), and the Polish Min-
1377
+ istry of Science and Higher Education (MNiSW) through
1378
+ grant DIR/WK/2018/12.
1379
+ This project also benefited
1380
+ from numerical computations performed at the Interdis-
1381
+ ciplinary Centre for Mathematical and Computational
1382
+ Modeling (ICM), the University of Warsaw under grants
1383
+ no GA67-17 and GB79-7.
1384
+ Appendix A: Comparison of theoretical and
1385
+ simulation halo bias
1386
+ Here we compare the simulation results for the linear
1387
+ halo bias, b(M), with the theoretical predictions from
1388
+ Sheth et al. 2001 [82, hereafter S01]. The formula pro-
1389
+ posed by S01 is given by:
1390
+ b(M) =
1391
+ 1
1392
+ √aδc(z)(√a(aν2) + √ab(aν2)1−c
1393
+
1394
+ (aν2)c
1395
+ (aν2)c + b(1 − c)(1 − c/2),
1396
+ (A1)
1397
+ with the parameters a = 0.707, b = 0.5 and c = 0.6.
1398
+ 1 https://data.cft.edu.pl/UPSILON_PK/UpsilonPk.tar.gz
1399
+ 2 https://pylians3.readthedocs.io/en/master/
1400
+ To apply the S01 expression to our MG variants,
1401
+ we used P(k)lin to compute σ(M, z), and then ν =
1402
+ δc(z)/σ(M, z), specific to each MG model. For that, we
1403
+ used standard ΛCDM spherical collapse based δc values.
1404
+ We stay with the ΛCDM δc baseline since we have found
1405
+ that using slightly different values suggested for either
1406
+ f(R) [120], or for the nDGP model [67] impacts the final
1407
+ HM results by less than a sub-percent.
1408
+ The results of our substitution are shown in Fig. 5,
1409
+ where we plot the bias ratios between MG and ΛCDM,
1410
+ as a function of halo mass, M200. Here, we include the
1411
+ two models most departing from ΛCDM: N1 (left col-
1412
+ umn) and F5 (right column). These variants illustrate
1413
+ the most extreme behavior in b(M) for the two MG mod-
1414
+ els we work with.
1415
+ Points illustrate simulation results
1416
+ (with error bars corresponding to the propagated stan-
1417
+ dard deviation from simulations). For comparison, ratios
1418
+ of S01 predictions for MG and ΛCDM are also shown,
1419
+ but they are extended outside of the M200 ranges probed
1420
+ by our simulations, to show the asymptotic behavior at
1421
+ small and large halo masses. Depending on the redshift
1422
+ and the model, departures in MG b(M) from ΛCDM can
1423
+ reach up to ∼ 10%. Contrary to the HMF, MG-induced
1424
+ increase in the strength of gravity lowers the bias, as a
1425
+ result of enhanced DM clustering. Similar trends have
1426
+ also been reported in [67, 118, 121]. The ratios predicted
1427
+ analytically from the S01 framework do not match the
1428
+ simulation amplitudes exactly, but they still qualitatively
1429
+ capture the trends.
1430
+ Further, in Fig. 6, we plot the b(M) in these MG mod-
1431
+ els as a function of M200. The top panels present ab-
1432
+ solute b(M) values, while the bottom ones include the
1433
+ ratio between S01 predictions and the simulation-based
1434
+ bias. Here, we can clearly see that the analytical model
1435
+ matches the simulation results within 5 − 10%. This af-
1436
+ firms our approach in extending S01 to beyond ΛCDM,
1437
+ for the f(R) and nDGP models we study.
1438
+ As for the HM build-up, we need a bias prescription for
1439
+ a much wider halo mass range than what our simulations
1440
+ cover.
1441
+ This overall consistency between the analytical
1442
+ and simulation results is sufficient for us, and thus we can
1443
+ use the S01 modeling for b(M) also in our MG variants.
1444
+ Appendix B: Comparison of HALOFIT and
1445
+ HMCODE results
1446
+ As discussed in Sec. IV B, for our baseline PS model-
1447
+ ing in MG we multiply the HM-based ratio Υ(k) with
1448
+ halofit PS derived for ΛCDM. Here we test our ap-
1449
+ proach for the case where the ΛCDM PS is obtained
1450
+ from the hmcode [26] instead.
1451
+ Similarly to halofit,
1452
+ hmcode is also built on the principles of HM, incorpo-
1453
+ rating however additional corrections in the standard HM
1454
+ build-up, owing to physical constraints. The parameters
1455
+ of the corrections are based on high-resolution simulated
1456
+ ΛCDM power spectra from the emulator introduced in
1457
+ Ref. [122]. Here we use the latest ‘hmcode-2020’ ver-
1458
+
1459
+ 13
1460
+ FIG. 5. Ratios of halo bias, b(M), between MG and ΛCDM for N1 (left plot), and F5 (right plot), across range of redshifts as
1461
+ indicated in the legends. Solid lines are the analytical results from Sheth et al. 2001 [82], and the respective dots of the same
1462
+ color are from simulations. Error bars illustrate the propagated standard deviation from simulations.
1463
+ FIG. 6. Top panels: Linear halo bias, b(M), as a function of halo mass, M200 for N1 (left column) and F5 (right column).
1464
+ The solid lines correspond to theoretical Sheth et al. 2001 [82, S01] predictions, and the respective dots of the same color
1465
+ are the simulation results obtained using Eq. (10). Error bars correspond to the standard deviation across five realizations of
1466
+ the simulation box. Bottom panels: Ratio between S01 and simulation linear halo bias predictions. Grey dotted lines are 5%
1467
+ accuracy regimes.
1468
+ sion3 [108].
1469
+ We compute P(k)MG by multiplying Υ(k)HM with
1470
+ both halofit and hmcode inputs for P(k)ΛCDM. Then,
1471
+ in Fig. 7, we compare both predictions with the ele-
1472
+ phant simulation results.
1473
+ Here we see a similar per-
1474
+ formance of both the methods, with some exceptions
1475
+ at small scales and high-z, where hmcode occasionally
1476
+ performs better. Interestingly, at z = 0, the halofit
1477
+ framework seems to lead to better results for a range of
1478
+ k-scales. We emphasize however that as our simulations
1479
+ were done for one particular set of cosmological parame-
1480
+ ters, these trends between halofit and hmcode-based
1481
+ predictions could change for other background cosmolo-
1482
+ gies. In any case, as what we provide is the ratio Υ(k)
1483
+ to be multiplied by the ΛCDM PS prediction, one can
1484
+ employ any best-fit P(k)ΛCDM for the latter to possibly
1485
+ improve the final accuracy of P(k)MG.
1486
+ 3 https://github.com/alexander-mead/HMcode
1487
+
1488
+ N1
1489
+ 14
1490
+ TI
1491
+ z=0
1492
+ Sheth et al. 2001
1493
+ TI
1494
+ z=0.3
1495
+ Simulation
1496
+ 12
1497
+ TO
1498
+ z=0.5
1499
+ 10
1500
+ T
1501
+ z=1
1502
+ (M)
1503
+ 8
1504
+ 6
1505
+ 4
1506
+ 2
1507
+ 0
1508
+ b(M)s01/b(M)sIM
1509
+ 0.9
1510
+ 1013
1511
+ 1014
1512
+ 1015
1513
+ M200 (h-1Mo)F5
1514
+ 14
1515
+ TI
1516
+ z=0
1517
+ Sheth et al. 2001
1518
+ TI
1519
+ z=0.3
1520
+ Simulation
1521
+ 12
1522
+ TO
1523
+ z=0.5
1524
+ 10
1525
+ T
1526
+ z=1
1527
+ (M)
1528
+ 8
1529
+ 6
1530
+ 6
1531
+ 4
1532
+ 2
1533
+ 0
1534
+ b(M)s01/b(M)sIM
1535
+ 0.9
1536
+ 1013
1537
+ 1014
1538
+ 1015
1539
+ M200 (h-1Mo)N1
1540
+ F5
1541
+ Z=O
1542
+ z=O
1543
+ 1.050
1544
+ 1.050
1545
+ z=0.3
1546
+ Z=0.3
1547
+ z=0.5
1548
+ Z=0.5
1549
+ [1.025
1550
+ 1.025
1551
+ z=1
1552
+ 1.000
1553
+ 1.000
1554
+ 0.975
1555
+ 0.950
1556
+ 0.925
1557
+ 0.925
1558
+ 0.900
1559
+ 0.900
1560
+ 0.875
1561
+ 0.875
1562
+ Sheth et al. 2001
1563
+ Sheth et al. 2001
1564
+ Simulation
1565
+ Simulation
1566
+ 0.850
1567
+ 0.850
1568
+ 1012
1569
+ 1013
1570
+ 1014
1571
+ 1015
1572
+ 1013
1573
+ 1014
1574
+ 1015
1575
+ 1012
1576
+ M200 (h-1Mo)14
1577
+ FIG. 7. Comparison of P(k)MG obtained from the input of P(k)ΛCDM, HMCODE (solid lines) and P(k)ΛCDM, HALOFIT (dashed
1578
+ lines), with the elephant simulation results, for a range of redshifts as indicated in the legends. The error contours correspond
1579
+ to the uncertainty in the simulation PS results, and the vertical grey dotted line is the 5% accuracy regime.
1580
+ [1] D. J. Eisenstein, I. Zehavi, D. W. Hogg, R. Scoccimarro,
1581
+ M. R. Blanton,
1582
+ and others., ApJL
1583
+ 633, 560 (2005),
1584
+ arXiv:astro-ph/0501171 [astro-ph].
1585
+ [2] P.
1586
+ Collaboration,
1587
+ A&A
1588
+ 641,
1589
+ A6
1590
+ (2020),
1591
+ arXiv:1807.06209 [astro-ph.CO].
1592
+ [3] R. H. Cyburt, B. D. Fields, K. A. Olive,
1593
+ and T.-H.
1594
+ Yeh, Reviews of Modern Physics 88, 015004 (2016),
1595
+ arXiv:1505.01076 [astro-ph.CO].
1596
+ [4] S. Alam, M. Aubert, S. Avila, C. Balland, J. E.
1597
+ Bautista, et al., Phys. Rev. D
1598
+ 103, 083533 (2021),
1599
+ arXiv:2007.08991 [astro-ph.CO].
1600
+ [5] M. Betoule, R. Kessler, J. Guy, J. Mosher, D. Hardin,
1601
+ et al., A&A 568, A22 (2014), arXiv:1401.4064 [astro-
1602
+ ph.CO].
1603
+ [6] G. Hinshaw, D. Larson, E. Komatsu, D. N. Spergel,
1604
+ C.
1605
+ L.
1606
+ Bennett,
1607
+ et
1608
+ al.,
1609
+ ApJS
1610
+ 208,
1611
+ 19
1612
+ (2013),
1613
+ arXiv:1212.5226 [astro-ph.CO].
1614
+ [7] S. Cole, W. J. Percival, J. A. Peacock, P. Norberg, C. M.
1615
+ Baugh, et al., MNRAS
1616
+ 362, 505 (2005), arXiv:astro-
1617
+ ph/0501174 [astro-ph].
1618
+ [8] C. Blake, E. A. Kazin, F. Beutler, T. M. Davis,
1619
+ D. Parkinson, S. Brough, M. Colless, C. Contreras,
1620
+ W. Couch, S. Croom, et al., MNRAS 418, 1707 (2011),
1621
+ arXiv:1108.2635 [astro-ph.CO].
1622
+ [9] A.
1623
+ Pezzotta,
1624
+ S.
1625
+ de
1626
+ la
1627
+ Torre,
1628
+ J.
1629
+ Bel,
1630
+ B.
1631
+ R.
1632
+ Granett, L. Guzzo, et al., A&A
1633
+ 604, A33 (2017),
1634
+ arXiv:1612.05645 [astro-ph.CO].
1635
+ [10] Planck
1636
+ Collaboration,
1637
+ A&A
1638
+ 571,
1639
+ A20
1640
+ (2014),
1641
+ arXiv:1303.5080 [astro-ph.CO].
1642
+ [11] R. Bean and M. Tangmatitham, Phys. Rev. D
1643
+ 81,
1644
+ 083534 (2010), arXiv:1002.4197 [astro-ph.CO].
1645
+ [12] W. A. Hellwing, K. Koyama, B. Bose, and G.-B. Zhao,
1646
+ Phys. Rev. D
1647
+ 96, 023515 (2017), arXiv:1703.03395
1648
+ [astro-ph.CO].
1649
+ [13] H. A. Winther, K. Koyama, M. Manera, B. S. Wright,
1650
+ and G.-B. Zhao, J. Cosmology Astropart. Phys. 2017,
1651
+ 006 (2017), arXiv:1703.00879 [astro-ph.CO].
1652
+ [14] S. Bose, B. Li, A. Barreira, J.-h. He, W. A. Hellwing,
1653
+ et al., J. Cosmology Astropart. Phys. 2017, 050 (2017),
1654
+ arXiv:1611.09375 [astro-ph.CO].
1655
+ [15] A. Barreira, S. Bose,
1656
+ and B. Li, J. Cosmology As-
1657
+ tropart. Phys.
1658
+ 2015, 059 (2015), arXiv:1511.08200
1659
+ [astro-ph.CO].
1660
+ [16] K.
1661
+ Koyama,
1662
+ A.
1663
+ Taruya,
1664
+ and
1665
+ T.
1666
+ Hiramatsu,
1667
+
1668
+ F5
1669
+ P(k)^CDM, HMCODE ---
1670
+ -- P(K)^CDM, HALOFIT
1671
+ 0.10
1672
+ z=0
1673
+ 0.05
1674
+ 0.00
1675
+ 0.10
1676
+ P(k)MG/P(k)sIM-1l
1677
+ 0.05
1678
+ 0.00
1679
+ 0.10
1680
+ 0.05
1681
+ 0.00
1682
+ 0.10
1683
+ 0.05
1684
+ 0.00
1685
+ 10-2
1686
+ 10-1
1687
+ 100
1688
+ k (h/Mpc)F6
1689
+ P(k)^CDM, HMCODE ---
1690
+ - P(K)△CDM, HALOFIT
1691
+ 0.10
1692
+ z=0
1693
+ 0.05
1694
+ 0.00
1695
+ 0.10
1696
+ P(k)MG/P(k)sIM-1l
1697
+ z=0.3
1698
+ 0.05
1699
+ 0.00
1700
+ 0.10
1701
+ Z=0.5
1702
+ 0.05
1703
+ 0.00
1704
+ 0.10
1705
+ 0.05
1706
+ 0.00
1707
+ 10-2
1708
+ 10-1
1709
+ 100
1710
+ k (h/Mpc)N1
1711
+ 0.10
1712
+ P(K)^CDM, HMCODE
1713
+ P(K)^CDM, HALOFIT
1714
+ z=0
1715
+ 0.05
1716
+ 0.00
1717
+ IP(k)MG/P(k)sIM-1I
1718
+ 0.10
1719
+ z=0.3
1720
+ 0.05
1721
+ 0.00
1722
+ 0.10
1723
+ z=0.5
1724
+ 0.05
1725
+ 0.00
1726
+ 10-2
1727
+ 10-1
1728
+ 100
1729
+ k (h/Mpc)N5
1730
+ 0.10
1731
+ P(k)^ACDM, HMCODE -
1732
+ P(K)ACDM, HALOFIT
1733
+ Z=O
1734
+ 0.05
1735
+ 0.00
1736
+ IP(k)MG/P(k)sIM-1I
1737
+ 0.10
1738
+ z=0.3
1739
+ 0.05
1740
+ 0.00
1741
+ 0.10
1742
+ Z=0.5
1743
+ 0.05
1744
+ 0.00
1745
+ 10-2
1746
+ 10-1
1747
+ 100
1748
+ k (h/Mpc)15
1749
+ Phys. Rev. D
1750
+ 79, 123512 (2009), arXiv:0902.0618
1751
+ [astro-ph.CO].
1752
+ [17] DESI Collaboration, arXiv e-prints , arXiv:1611.00036
1753
+ (2016), arXiv:1611.00036 [astro-ph.IM].
1754
+ [18] LSST
1755
+ Science
1756
+ Collaboration,
1757
+ arXiv
1758
+ e-prints
1759
+ ,
1760
+ arXiv:0912.0201 (2009), arXiv:0912.0201 [astro-ph.IM].
1761
+ [19] R. Laureijs, J. Amiaux, S. Arduini, J. L. Augu`eres,
1762
+ J. Brinchmann, et al., arXiv e-prints , arXiv:1110.3193
1763
+ (2011), arXiv:1110.3193 [astro-ph.CO].
1764
+ [20] M.
1765
+ Kilbinger,
1766
+ L.
1767
+ Fu,
1768
+ C.
1769
+ Heymans,
1770
+ F.
1771
+ Simpson,
1772
+ J. Benjamin,
1773
+ et al., MNRAS
1774
+ 430, 2200 (2013),
1775
+ arXiv:1212.3338 [astro-ph.CO].
1776
+ [21] C. Hikage, M. Oguri, T. Hamana, S. More, R. Man-
1777
+ delbaum, et al., PASJ 71, 43 (2019), arXiv:1809.09148
1778
+ [astro-ph.CO].
1779
+ [22] C. To, E. Krause, E. Rozo, H. Wu, D. Gruen, et al.,
1780
+ Phys. Rev. Lett. 126, 141301 (2021), arXiv:2010.01138
1781
+ [astro-ph.CO].
1782
+ [23] R. J. Turner, C. Blake, and R. Ruggeri, MNRAS 518,
1783
+ 2436 (2023), arXiv:2207.03707 [astro-ph.CO].
1784
+ [24] A. Cooray and R. Sheth, Phys. Rep.
1785
+ 372, 1 (2002),
1786
+ arXiv:astro-ph/0206508 [astro-ph].
1787
+ [25] R. E. Smith, J. A. Peacock, A. Jenkins, S. D. M.
1788
+ White, C. S. Frenk, et al., MNRAS 341, 1311 (2003),
1789
+ arXiv:astro-ph/0207664 [astro-ph].
1790
+ [26] A. J. Mead, J. A. Peacock, C. Heymans, S. Joudaki,
1791
+ and A. F. Heavens, MNRAS
1792
+ 454, 1958 (2015),
1793
+ arXiv:1505.07833 [astro-ph.CO].
1794
+ [27] E.
1795
+ Lawrence,
1796
+ K.
1797
+ Heitmann,
1798
+ M.
1799
+ White,
1800
+ D.
1801
+ Hig-
1802
+ don, C. Wagner, et al., ApJL
1803
+ 713, 1322 (2010),
1804
+ arXiv:0912.4490 [astro-ph.CO].
1805
+ [28] R. Takahashi, M. Sato, T. Nishimichi, A. Taruya, and
1806
+ M. Oguri, ApJL
1807
+ 761, 152 (2012), arXiv:1208.2701
1808
+ [astro-ph.CO].
1809
+ [29] R. E. Smith and R. E. Angulo, MNRAS
1810
+ 486, 1448
1811
+ (2019), arXiv:1807.00040 [astro-ph.CO].
1812
+ [30] R. E. Angulo, M. Zennaro, S. Contreras, G. Aric`o,
1813
+ M. Pellejero-Iba˜nez, and J. St¨ucker, MNRAS 507, 5869
1814
+ (2021), arXiv:2004.06245 [astro-ph.CO].
1815
+ [31] H. Oyaizu, M. Lima,
1816
+ and W. Hu, Phys. Rev. D
1817
+ 78,
1818
+ 123524 (2008), arXiv:0807.2462 [astro-ph].
1819
+ [32] S. Alam, A. Aviles, R. Bean, Y.-C. Cai, M. Cautun,
1820
+ et al., J. Cosmology Astropart. Phys. 2021, 050 (2021),
1821
+ arXiv:2011.05771 [astro-ph.CO].
1822
+ [33] W. Hu and I. Sawicki, Phys. Rev. D 76, 104043 (2007),
1823
+ arXiv:0708.1190 [astro-ph].
1824
+ [34] M. Cataneo, L. Lombriser, C. Heymans, A. J. Mead,
1825
+ A. Barreira, S. Bose,
1826
+ and B. Li, MNRAS
1827
+ 488, 2121
1828
+ (2019), arXiv:1812.05594 [astro-ph.CO].
1829
+ [35] C.-Z. Ruan, T.-J. Zhang,
1830
+ and B. Hu, MNRAS
1831
+ 492,
1832
+ 4235 (2020), arXiv:2001.09229 [astro-ph.CO].
1833
+ [36] M. Baldi, F. Villaescusa-Navarro, M. Viel, E. Puch-
1834
+ wein, V. Springel,
1835
+ and L. Moscardini, MNRAS
1836
+ 440,
1837
+ 75 (2014), arXiv:1311.2588 [astro-ph.CO].
1838
+ [37] H. A. Winther, F. Schmidt, A. Barreira, C. Arnold,
1839
+ S.
1840
+ Bose,
1841
+ et
1842
+ al.,
1843
+ MNRAS
1844
+ 454,
1845
+ 4208
1846
+ (2015),
1847
+ arXiv:1506.06384 [astro-ph.CO].
1848
+ [38] E. Puchwein, M. Baldi, and V. Springel, MNRAS 436,
1849
+ 348 (2013), arXiv:1305.2418 [astro-ph.CO].
1850
+ [39] T. Clifton, P. G. Ferreira, A. Padilla,
1851
+ and C. Sko-
1852
+ rdis, Phys. Rep. 513, 1 (2012), arXiv:1106.2476 [astro-
1853
+ ph.CO].
1854
+ [40] T. Baker, D. Psaltis,
1855
+ and C. Skordis, ApJL
1856
+ 802, 63
1857
+ (2015), arXiv:1412.3455 [astro-ph.CO].
1858
+ [41] K. Koyama, Reports on Progress in Physics 79, 046902
1859
+ (2016), arXiv:1504.04623 [astro-ph.CO].
1860
+ [42] S. Nojiri, S. D. Odintsov, and V. K. Oikonomou, Phys.
1861
+ Rept. 692, 1 (2017), arXiv:1705.11098 [gr-qc].
1862
+ [43] P.
1863
+ G.
1864
+ Ferreira,
1865
+ ARA&A
1866
+ 57,
1867
+ 335
1868
+ (2019),
1869
+ arXiv:1902.10503 [astro-ph.CO].
1870
+ [44] T. P. Sotiriou and V. Faraoni, Reviews of Modern
1871
+ Physics 82, 451 (2010), arXiv:0805.1726 [gr-qc].
1872
+ [45] T. Baker, A. Barreira, H. Desmond, P. Ferreira, B. Jain,
1873
+ et al., Reviews of Modern Physics 93, 015003 (2021).
1874
+ [46] K. Koyama, International Journal of Modern Physics D
1875
+ 27, 1848001 (2018).
1876
+ [47] A. Joyce, L. Lombriser,
1877
+ and F. Schmidt, Annual Re-
1878
+ view of Nuclear and Particle Science 66, 95 (2016),
1879
+ arXiv:1601.06133 [astro-ph.CO].
1880
+ [48] P. Bull, Y. Akrami, J. Adamek, T. Baker, E. Bellini,
1881
+ et al., Physics of the Dark Universe 12, 56 (2016),
1882
+ arXiv:1512.05356 [astro-ph.CO].
1883
+ [49] U. Seljak, MNRAS
1884
+ 318, 203 (2000), arXiv:astro-
1885
+ ph/0001493 [astro-ph].
1886
+ [50] C. M. Will, Living Reviews in Relativity 17, 4 (2014),
1887
+ arXiv:1403.7377 [gr-qc].
1888
+ [51] J. H. Taylor and J. M. Weisberg, ApJL 253, 908 (1982).
1889
+ [52] B. P. Abbott, R. Abbott, T. D. Abbott, F. Acernese,
1890
+ K. Ackley, et al., Phys. Rev. Lett. 119, 161101 (2017),
1891
+ arXiv:1710.05832 [gr-qc].
1892
+ [53] B. P. Abbott, R. Abbott, T. D. Abbott, F. Acernese,
1893
+ K. Ackley, C. Adams, T. Adams, P. Addesso, R. X.
1894
+ Adhikari, V. B. Adya, et al., Phys. Rev. Lett.
1895
+ 116,
1896
+ 061102 (2016), arXiv:1602.03837 [gr-qc].
1897
+ [54] Gravity
1898
+ Collaboration,
1899
+ R.
1900
+ Abuter,
1901
+ A.
1902
+ Amorim,
1903
+ M. Baub¨ock, J. P. Berger, H. Bonnet, et al., A&A 636,
1904
+ L5 (2020), arXiv:2004.07187 [astro-ph.GA].
1905
+ [55] I. I. Shapiro, Phys. Rev. Lett. 13, 789 (1964).
1906
+ [56] A. Joyce, B. Jain, J. Khoury,
1907
+ and M. Trodden,
1908
+ Phys. Rep.
1909
+ 568, 1 (2015), arXiv:1407.0059 [astro-
1910
+ ph.CO].
1911
+ [57] P. Brax, Class. Quant. Grav. 30, 214005 (2013).
1912
+ [58] J. Sakstein, International Journal of Modern Physics D
1913
+ 27, 1848008-228 (2018).
1914
+ [59] G. Dvali, G. Gabadadze, and M. Porrati, Physics Let-
1915
+ ters B 485, 208 (2000), arXiv:hep-th/0005016 [hep-th].
1916
+ [60] A. J. Mead, C. Heymans, L. Lombriser, J. A. Peacock,
1917
+ O. I. Steele,
1918
+ and H. A. Winther, MNRAS 459, 1468
1919
+ (2016), arXiv:1602.02154 [astro-ph.CO].
1920
+ [61] G.-B. Zhao, ApJS
1921
+ 211, 23 (2014), arXiv:1312.1291
1922
+ [astro-ph.CO].
1923
+ [62] N. Tessore, H. A. Winther, R. B. Metcalf, P. G. Ferreira,
1924
+ and C. Giocoli, J. Cosmology Astropart. Phys. 2015,
1925
+ 036 (2015), arXiv:1508.04011 [astro-ph.CO].
1926
+ [63] I. Achitouv, M. Baldi, E. Puchwein,
1927
+ and J. Weller,
1928
+ Phys. Rev. D
1929
+ 93, 103522 (2016), arXiv:1511.01494
1930
+ [astro-ph.CO].
1931
+ [64] L. Lombriser, K. Koyama,
1932
+ and B. Li, J. Cosmology
1933
+ Astropart. Phys.
1934
+ 2014, 021 (2014), arXiv:1312.1292
1935
+ [astro-ph.CO].
1936
+ [65] A. Barreira, B. Li, W. A. Hellwing, L. Lombriser,
1937
+ C. M. Baugh,
1938
+ and S. Pascoli, JCAP 04, 029 (2014),
1939
+ arXiv:1401.1497 [astro-ph.CO].
1940
+ [66] A. Barreira, B. Li, W. A. Hellwing, C. M. Baugh, and
1941
+ S. Pascoli, J. Cosmology Astropart. Phys.
1942
+ 2014, 031
1943
+ (2014), arXiv:1408.1084 [astro-ph.CO].
1944
+ [67] F. Schmidt, W. Hu, and M. Lima, Phys. Rev. D 81,
1945
+ 063005 (2010), arXiv:0911.5178 [astro-ph.CO].
1946
+
1947
+ 16
1948
+ [68] W. Hu and I. Sawicki, Phys. Rev. D 76, 064004 (2007),
1949
+ arXiv:0705.1158 [astro-ph].
1950
+ [69] J. Khoury and A. Weltman, Phys. Rev. D 69, 044026
1951
+ (2004), arXiv:astro-ph/0309411 [astro-ph].
1952
+ [70] C. Deffayet, G. Dvali, G. Gabadadze,
1953
+ and A. Vain-
1954
+ shtein, Phys. Rev. D 65, 044026 (2002).
1955
+ [71] A. I. Vainshtein, Physics Letters B 39, 393 (1972).
1956
+ [72] B. Li, G.-B. Zhao, R. Teyssier,
1957
+ and K. Koyama,
1958
+ J. Cosmology Astropart. Phys.
1959
+ 2012, 051 (2012),
1960
+ arXiv:1110.1379 [astro-ph.CO].
1961
+ [73] B. Li, G.-B. Zhao,
1962
+ and K. Koyama, J. Cosmology
1963
+ Astropart. Phys.
1964
+ 2013, 023 (2013), arXiv:1303.0008
1965
+ [astro-ph.CO].
1966
+ [74] K.
1967
+ Naidoo,
1968
+ W.
1969
+ Hellwing,
1970
+ M.
1971
+ Bilicki,
1972
+ N.
1973
+ Libe-
1974
+ skind, S. Pfeifer,
1975
+ and Y. Hoffman, arXiv e-prints
1976
+ , arXiv:2209.14386 (2022), arXiv:2209.14386 [astro-
1977
+ ph.CO].
1978
+ [75] A.
1979
+ Lewis
1980
+ and
1981
+ A.
1982
+ Challinor,
1983
+ “CAMB:
1984
+ Code
1985
+ for
1986
+ Anisotropies in the Microwave Background,”
1987
+ (2011),
1988
+ ascl:1102.026.
1989
+ [76] S. Colombi and D. Novikov, “POWMES: Measuring
1990
+ the Power Spectrum in an N-body Simulation,” As-
1991
+ trophysics Source Code Library, record ascl:1110.017
1992
+ (2011), ascl:1110.017.
1993
+ [77] J. A. Peacock and R. E. Smith, MNRAS
1994
+ 318, 1144
1995
+ (2000), arXiv:astro-ph/0005010 [astro-ph].
1996
+ [78] A. Cooray and W. Hu, ApJL
1997
+ 554, 56 (2001),
1998
+ arXiv:astro-ph/0012087 [astro-ph].
1999
+ [79] W. A. Watson, I. T. Iliev, A. D’Aloisio, A. Knebe, P. R.
2000
+ Shapiro,
2001
+ and G. Yepes, MNRAS
2002
+ 433, 1230 (2013),
2003
+ arXiv:1212.0095 [astro-ph.CO].
2004
+ [80] S. Gupta, W. A. Hellwing, M. Bilicki,
2005
+ and J. E.
2006
+ Garc´ıa-Farieta, Phys. Rev. D 105, 043538 (2022),
2007
+ arXiv:2112.03699 [astro-ph.CO].
2008
+ [81] K. Koyama and F. P. Silva, Phys. Rev. D 75, 084040
2009
+ (2007), arXiv:hep-th/0702169 [hep-th].
2010
+ [82] R. K. Sheth, H. J. Mo, and G. Tormen, MNRAS 323,
2011
+ 1 (2001), arXiv:astro-ph/9907024 [astro-ph].
2012
+ [83] A. D. Ludlow, S. Bose, R. E. Angulo, L. Wang,
2013
+ W. A. Hellwing, et al., MNRAS
2014
+ 460, 1214 (2016),
2015
+ arXiv:1601.02624 [astro-ph.CO].
2016
+ [84] M. A. Mitchell, C. Arnold, J.-h. He,
2017
+ and B. Li,
2018
+ MNRAS
2019
+ 487, 1410 (2019), arXiv:1901.06392 [astro-
2020
+ ph.CO].
2021
+ [85] M. A. Mitchell, J.-h. He, C. Arnold,
2022
+ and B. Li,
2023
+ MNRAS
2024
+ 477, 1133 (2018), arXiv:1802.02165 [astro-
2025
+ ph.CO].
2026
+ [86] M. A. Mitchell, C. Hern´andez-Aguayo, C. Arnold, and
2027
+ B. Li, MNRAS
2028
+ 508, 4140 (2021), arXiv:2106.13815
2029
+ [astro-ph.CO].
2030
+ [87] W. H. Press and P. Schechter, ApJL 187, 425 (1974).
2031
+ [88] J. R. Bond, S. Cole, G. Efstathiou,
2032
+ and N. Kaiser,
2033
+ ApJL 379, 440 (1991).
2034
+ [89] A. Jenkins, C. S. Frenk, S. D. M. White, J. M. Colberg,
2035
+ S. Cole, et al., MNRAS 321, 372 (2001), arXiv:astro-
2036
+ ph/0005260 [astro-ph].
2037
+ [90] M. S. Warren,
2038
+ K. Abazajian,
2039
+ D. E. Holz,
2040
+ and
2041
+ L. Teodoro, ApJL
2042
+ 646, 881 (2006), arXiv:astro-
2043
+ ph/0506395 [astro-ph].
2044
+ [91] G. Despali, C. Giocoli, R. E. Angulo, G. Tormen, R. K.
2045
+ Sheth, G. Baso, and L. Moscardini, MNRAS 456, 2486
2046
+ (2016), arXiv:1507.05627 [astro-ph.CO].
2047
+ [92] J. Tinker, A. V. Kravtsov, A. Klypin, K. Abaza-
2048
+ jian, M. Warren, et al., ApJL
2049
+ 688, 709 (2008),
2050
+ arXiv:0803.2706 [astro-ph].
2051
+ [93] R. E. Angulo, V. Springel, S. D. M. White, A. Jenkins,
2052
+ C. M. Baugh,
2053
+ and C. S. Frenk, MNRAS
2054
+ 426, 2046
2055
+ (2012), arXiv:1203.3216 [astro-ph.CO].
2056
+ [94] W. A. Hellwing and R. Juszkiewicz, Phys. Rev. D 80,
2057
+ 083522 (2009), arXiv:0809.1976 [astro-ph].
2058
+ [95] T. Y. Lam and B. Li, MNRAS
2059
+ 426, 3260 (2012),
2060
+ arXiv:1205.0059 [astro-ph.CO].
2061
+ [96] B. Falck, K. Koyama,
2062
+ and G.-B. Zhao, J. Cosmology
2063
+ Astropart. Phys.
2064
+ 2015, 049 (2015), arXiv:1503.06673
2065
+ [astro-ph.CO].
2066
+ [97] U. Seljak and M. S. Warren, MNRAS 355, 129 (2004),
2067
+ arXiv:astro-ph/0403698 [astro-ph].
2068
+ [98] J. L. Tinker,
2069
+ B. E. Robertson,
2070
+ A. V. Kravtsov,
2071
+ A. Klypin, M. S. Warren, et al., ApJL 724, 878 (2010),
2072
+ arXiv:1001.3162 [astro-ph.CO].
2073
+ [99] J. Comparat, F. Prada, G. Yepes,
2074
+ and A. Klypin,
2075
+ MNRAS
2076
+ 469, 4157 (2017), arXiv:1702.01628 [astro-
2077
+ ph.CO].
2078
+ [100] J. F. Navarro, C. S. Frenk,
2079
+ and S. D. M. White,
2080
+ ApJL 462, 563 (1996), arXiv:astro-ph/9508025 [astro-
2081
+ ph].
2082
+ [101] C. Power, J. F. Navarro, A. Jenkins, C. S. Frenk,
2083
+ S. D. M. White, et al., MNRAS
2084
+ 338, 14 (2003),
2085
+ arXiv:astro-ph/0201544 [astro-ph].
2086
+ [102] J. L. Tinker, D. H. Weinberg, Z. Zheng, and I. Zehavi,
2087
+ ApJL
2088
+ 631, 41 (2005), arXiv:astro-ph/0411777 [astro-
2089
+ ph].
2090
+ [103] A. J. Mead and L. Verde, MNRAS 503, 3095 (2021),
2091
+ arXiv:2011.08858 [astro-ph.CO].
2092
+ [104] F.
2093
+ Schmidt,
2094
+ Phys.
2095
+ Rev.
2096
+ D
2097
+ 93,
2098
+ 063512
2099
+ (2016),
2100
+ arXiv:1511.02231 [astro-ph.CO].
2101
+ [105] A. J. Mead, T. Tr¨oster, C. Heymans, L. Van Waer-
2102
+ beke,
2103
+ and I. G. McCarthy, A&A
2104
+ 641, A130 (2020),
2105
+ arXiv:2005.00009 [astro-ph.CO].
2106
+ [106] F.
2107
+ Schmidt,
2108
+ Phys.
2109
+ Rev.
2110
+ D
2111
+ 80,
2112
+ 123003
2113
+ (2009),
2114
+ arXiv:0910.0235 [astro-ph.CO].
2115
+ [107] B. Li, W. A. Hellwing, K. Koyama, G.-B. Zhao, E. Jen-
2116
+ nings,
2117
+ and C. M. Baugh, MNRAS
2118
+ 428, 743 (2013),
2119
+ arXiv:1206.4317 [astro-ph.CO].
2120
+ [108] A. J. Mead, S. Brieden, T. Tr¨oster, and C. Heymans,
2121
+ MNRAS
2122
+ 502, 1401 (2021), arXiv:2009.01858 [astro-
2123
+ ph.CO].
2124
+ [109] S. Tassev, M. Zaldarriaga,
2125
+ and D. J. Eisenstein,
2126
+ J. Cosmology Astropart. Phys.
2127
+ 2013, 036 (2013),
2128
+ arXiv:1301.0322 [astro-ph.CO].
2129
+ [110] K. Heitmann, D. Higdon, C. Nakhleh,
2130
+ and S. Habib,
2131
+ ApJ
2132
+ 646, L1 (2006), arXiv:astro-ph/0606154 [astro-
2133
+ ph].
2134
+ [111] S. Habib,
2135
+ K. Heitmann,
2136
+ D. Higdon,
2137
+ C. Nakhleh,
2138
+ and B. Williams, Phys. Rev. D
2139
+ 76, 083503 (2007),
2140
+ arXiv:astro-ph/0702348 [astro-ph].
2141
+ [112] N. Ramachandra, G. Valogiannis, M. Ishak, K. Heit-
2142
+ mann, and LSST Dark Energy Science Collaboration,
2143
+ Phys. Rev. D
2144
+ 103, 123525 (2021), arXiv:2010.00596
2145
+ [astro-ph.CO].
2146
+ [113] H. A. Winther,
2147
+ S. Casas,
2148
+ M. Baldi,
2149
+ K. Koyama,
2150
+ B. Li, et al., Phys. Rev. D
2151
+ 100, 123540 (2019),
2152
+ arXiv:1903.08798 [astro-ph.CO].
2153
+ [114] C. Arnold, B. Li, B. Giblin, J. Harnois-D´eraps, and Y.-
2154
+ C. Cai, MNRAS
2155
+ 515, 4161 (2022), arXiv:2109.04984
2156
+ [astro-ph.CO].
2157
+ [115] J. Harnois-D´eraps, C. Hernandez-Aguayo, C. Cuesta-
2158
+ Lazaro,
2159
+ C. Arnold,
2160
+ B. Li,
2161
+ et al., arXiv e-prints
2162
+
2163
+ 17
2164
+ , arXiv:2211.05779 (2022), arXiv:2211.05779 [astro-
2165
+ ph.CO].
2166
+ [116] C.-Z. Ruan, C. Cuesta-Lazaro, A. Eggemeier, B. Li,
2167
+ C. M. Baugh, et al., arXiv e-prints , arXiv:2301.02970
2168
+ (2023), arXiv:2301.02970 [astro-ph.CO].
2169
+ [117] A. Acuto, I. G. McCarthy, J. Kwan, J. Salcido, S. G.
2170
+ Stafford,
2171
+ and A. S. Font, MNRAS 508, 3519 (2021),
2172
+ arXiv:2109.11855 [astro-ph.CO].
2173
+ [118] C. Arnold, P. Fosalba, V. Springel, E. Puchwein, and
2174
+ L. Blot, MNRAS
2175
+ 483, 790 (2019), arXiv:1805.09824
2176
+ [astro-ph.CO].
2177
+ [119] N. E. Chisari, A. J. Mead, S. Joudaki, P. G. Ferreira,
2178
+ A. Schneider, et al., The Open Journal of Astrophysics
2179
+ 2, 4 (2019), arXiv:1905.06082 [astro-ph.CO].
2180
+ [120] M. Kopp, S. A. Appleby, I. Achitouv,
2181
+ and J. Weller,
2182
+ Phys. Rev. D
2183
+ 88, 084015 (2013), arXiv:1306.3233
2184
+ [astro-ph.CO].
2185
+ [121] F. Schmidt,
2186
+ M. Lima,
2187
+ H. Oyaizu,
2188
+ and W. Hu,
2189
+ Phys. Rev. D
2190
+ 79, 083518 (2009), arXiv:0812.0545
2191
+ [astro-ph].
2192
+ [122] K. Heitmann, E. Lawrence, J. Kwan, S. Habib,
2193
+ and
2194
+ D. Higdon, ApJL
2195
+ 780, 111 (2014), arXiv:1304.7849
2196
+ [astro-ph.CO].
2197
+
L9FLT4oBgHgl3EQfMi8T/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
OdE2T4oBgHgl3EQfrAj4/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
S9FKT4oBgHgl3EQfkC7A/content/tmp_files/2301.11848v1.pdf.txt ADDED
@@ -0,0 +1,822 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Combination of Multi-Fidelity Data Sources For Uncertainty Quantification: A
2
+ Lightweight CNN Approach
3
+ Minghan Chu * 1 Weicheng Qian * 2
4
+ Department of Mechanical and Materials Engineering 1 Department of Computer Science 2
5
+ Queen’s University 1 University of Saskatchewwan 2
6
7
+ Abstract
8
+ Reynolds Averaged Navier Stokes (RANS) mod-
9
+ elling is notorious for introducing the model-form
10
+ uncertainty due to the Boussinesq turbulent vis-
11
+ cosity hypothesis. Recently, the eigenspace pertur-
12
+ bation method (EPM) has been developed to esti-
13
+ mate the RANS model-form uncertainty. This ap-
14
+ proach estimates model-form uncertainty through
15
+ injecting perturbations to the predicted Reynolds
16
+ stress tensor. However, there is a need for a reli-
17
+ able machine learning method for estimating the
18
+ perturbed amplitude of the Reynolds stress tensor.
19
+ Machine learning models are often too complex
20
+ and data intensive for this application. We pro-
21
+ pose a lightweight convolutional neural network
22
+ (CNN) approach to learn a correction function for
23
+ RANS from paired-samples of RANS and DNS
24
+ simulation results. The CNN learned RANS cor-
25
+ rection function successfully facilitates the RANS
26
+ uncertainty quantification (UQ), and our findings
27
+ suggest that the lightweight CNN approach is ef-
28
+ fective in combining RANS and DNS simulation
29
+ results to enrich the existing perturbation method
30
+ in estimating the RANS UQ more precisely.
31
+ 1. Introduction
32
+ Turbulent flows are phenomena that manifest over a wide
33
+ range of length and time scales. Such length scales vary
34
+ from micro-meters to kilo-meters. Furthermore these mo-
35
+ tions are coupled across length scales and exhibit strong
36
+ interactions. A similar scenario exists for the range of time
37
+ scales as well. Any numerical simulation of a turbulent
38
+ flow needs to either explicitly resolve or model these ranges
39
+ of motions. There are different approaches to such sim-
40
+ ulations, varying by the ranges of length scales that they
41
+ resolve and those that they model. For example direct nu-
42
+ merical simulation (DNS) computes all the scales of motion,
43
+ while large eddy simulation (LES) computes only the largest
44
+ scales while modelling the smaller length scales of motion
45
+ in the flow. Both DNS and LES methods can yield high
46
+ fidelity results, while also incurring a considerable increase
47
+ in computational cost. Reynolds Averaged Navier Stokes
48
+ (RANS) based simulations use simplified models for all
49
+ scales. Due to this, RANS-based simulations are relatively
50
+ computationally inexpensive and are widely used in industry
51
+ and academia for analyzing turbulent flows. However, most
52
+ RANS models are often inaccurate when predicting com-
53
+ plex flows with Boussinesq turbulent viscosity hypothesis
54
+ (TVH) adopted (Craft et al., 1996). Therefore, a compro-
55
+ mise is to stick with the low-fidelity RANS simulations at
56
+ low computational cost with uncertainties properly quanti-
57
+ fied.
58
+ Uncertainty studies can be roughly classified into two cat-
59
+ egories: 1) aleatory UQ and 2) epistemic UQ. Aleatory
60
+ uncertainties are introduced in the imprecision of a sys-
61
+ tem (Duraisamy et al., 2019). Studies that have focused on
62
+ the aleatory uncertainties replace model parameters with
63
+ random variables (Loeven & Bijl, 2008; Ahlfeld & Mon-
64
+ tomoli, 2017), defined a domain region as a random field
65
+ (Dow & Wang, 2015; Doostan et al., 2016), and quantify
66
+ the irreducible aleatory uncertainties associated with the
67
+ boundary conditions (Pecnik et al., 2011). Epistemic uncer-
68
+ tainties are intrinsic in proposed turbulence models, hence
69
+ known as model-form uncertainty (Duraisamy et al., 2019).
70
+ The model-form uncertainties have often been ignored in
71
+ uncertainty studies, while such uncertainties are at a higher-
72
+ level uncertainty than the aleatory ones (Duraisamy et al.,
73
+ 2017). Less than a decade ago, Iaccarino et al. proposed
74
+ a physics-based eigenspace perturbation approach (Emory
75
+ et al., 2013; Iaccarino et al., 2017) to estimate the model-
76
+ form uncertainty introduced in RANS-based models via
77
+ sequential perturbations to the amplitude (turbulent kinetic
78
+ energy), shape (eigenvalues), and orientation (eigenvectors)
79
+ of the predicted Reynolds stress tensor. The Eigenspace Per-
80
+ turbation Method has been applied with considerable suc-
81
+ cess for Civil engineering applications (Gorl´e et al., 2019),
82
+ Aerospace engineering applications (Mishra et al., 2019b;
83
+ Mishra & Iaccarino, 2017; Mishra et al., 2019a), Robust
84
+ and Reliability Based Designs (Cook et al., 2019; Mishra
85
+ arXiv:2301.11848v1 [physics.flu-dyn] 27 Jan 2023
86
+
87
+ Submission and Formatting Instructions for ICML 2023
88
+ et al., 2020), besides others. However a central shortcoming
89
+ of the Eigenspace Perturbation Method is that it always pre-
90
+ supposes the worst case scenario and thus leads to overly
91
+ conservative uncertainty estimates. A central contribution of
92
+ this investigation is to ensure that the uncertainty estimates
93
+ are sharp and well calibrated.
94
+ Related Works
95
+ Data driven approaches like Machine
96
+ Learning models have found wide application in physics in
97
+ general and turbulence modelling specifically(Duraisamy
98
+ et al., 2019; Ihme et al., 2022; Brunton et al., 2020). Recent
99
+ machine learning models that have specifically focused on
100
+ the estimation of RANS model uncertainty with improved
101
+ accuracy (Xiao et al., 2016; Wu et al., 2016; Xiao et al.,
102
+ 2017; Wang et al., 2017b;a; Wu et al., 2018; Heyse et al.,
103
+ 2021b;a; Zeng et al., 2022) are often complex and demand a
104
+ large size of training data. Complex machine learning mod-
105
+ els not only require additional computational resources in
106
+ training but also become less comprehensive to researchers.
107
+ This hinders the understanding and shrinks the room for
108
+ improvement in the existing theories. In general, machine
109
+ learning models in RANS UQ can be classified into two
110
+ categories: 1) physics-based Bayesian inference and 2) data-
111
+ driven random forest. There are relatively few studies for re-
112
+ ducing the model-form uncertainty using the convolutional
113
+ neural network (CNN) approach. Besides, most studies have
114
+ focused on reducing the model-form uncertainty intrinsic
115
+ to eigenvalues and eigenvectors, except very recently, Chu
116
+ et al. (Chu et al., 2022a) used polynomial regressions to
117
+ quantify the model-form uncertainty in turbulence kinetic
118
+ energy.
119
+ Therefore, the purpose of this paper is to advance the under-
120
+ standing of the performance of CNN approach for reducing
121
+ the model-form uncertainty introduced in turbulence kinetic
122
+ energy in RANS simulations with complex flow features
123
+ such as separation and reattachment. The novelty of this
124
+ work is the presentation of a lightweight CNN to learn cor-
125
+ rection function for RANS simulation from both RANS and
126
+ DNS results. This CNN-based correction function is help-
127
+ ful to the physics-based eigenspace perturbation framework
128
+ (Emory et al., 2013; Iaccarino et al., 2017). Our CNN-based
129
+ correction function method is non-intrusive, meaning that
130
+ no modifications need to be made to the RANS-based turbu-
131
+ lence models.
132
+ 2. Method
133
+ 2.1. Eigenspace Perturbation
134
+ Most RANS models have adopted the Boussinesq turbulent
135
+ viscosity hypothesis (Pope, 2001) that assumes Reynolds
136
+ stresses are proportional to the rate of mean strain:
137
+
138
+ uiuj
139
+
140
+ = 2
141
+ 3kδij − 2vt
142
+
143
+ Sij
144
+
145
+ ,
146
+ (1)
147
+ where k is the turbulence kinetic energy, δij is the Kronecker
148
+ delta, νt is the turbulent viscosity, and
149
+
150
+ Sij
151
+
152
+ is the rate of
153
+ mean strain tensor.
154
+ The model-form uncertainty introduced in RANS modelling
155
+ can be quantified via the eigenspace perturbation approach
156
+ (Emory et al., 2013; Iaccarino et al., 2017), the perturbed
157
+ Reynolds stresses are defined as
158
+
159
+ uiuj
160
+ �∗ = 2k∗
161
+ �1
162
+ 3δij + v∗
163
+ inˆb∗
164
+ nlv∗
165
+ jl
166
+
167
+ ,
168
+ (2)
169
+ where k∗ is the perturbed turbulence kinetic energy, ˆb∗
170
+ kl is
171
+ the perturbed eigenvalue matrix, v∗
172
+ ij is perturbed eigenvector
173
+ matrix.
174
+ k∗ = f ∗(x, y)
175
+ (3)
176
+ A better estimated k∗ can improve UQ. Correction function
177
+ of RANS is often used to correct RANS towards DNS,
178
+ resulting a better estimated k∗.
179
+ 2.2. Correction Function for RANS
180
+ Low-fidelity RANS simulations only focus on the mean
181
+ flow quantities, and hence, are computationally inexpensive.
182
+ In general RANS simulations are capable of generating
183
+ satisfactory results for simple shear flows (Pope, 2001);
184
+ however, RANS simulations are inaccurate in predicting
185
+ complex flow features such as the separation bubble. On
186
+ the other hand, DNS simulations give high-fidelity results
187
+ by resolving all scales of fluid motion, while DNS requires
188
+ tremendous amount of computational resources. Therefore,
189
+ it is beneficial to correct low-fidelity RANS simulations with
190
+ the accuracy of high-fidelity DNS. In the present study, we
191
+ adopt a correction function to correct RANS results towards
192
+ DNS, namely correction function.
193
+ Owing to the importance of RANS model accuracy for en-
194
+ gineering design, reliability, and safety, correction function
195
+ for RANS models has seen a rapid growth of interest in the
196
+ last few years, such as a linear form (Ahlfeld et al., 2016)
197
+ and additive and multiplicative form (Voet et al., 2021).
198
+ For both the RANS and DNS simulation, we can summarize
199
+ their results as the function of the perturbed turbulence
200
+ kinetic energy k:
201
+ k = f(x, y)
202
+ (4)
203
+
204
+ Submission and Formatting Instructions for ICML 2023
205
+ where x and y are coordinates in a two-dimensional compu-
206
+ tational domain, and f is the mapping from every coordinate
207
+ (x, y) to k, embedded in triples (x, y, k) from simulation
208
+ results.
209
+ Without assuming a specific form, the correction function
210
+ for RANS is a mapping between two functions:
211
+ Z : f RANS(x, y) → f DNS(x, y)
212
+ with kDNS = f DNS(x, y) and kRANS = f RANS(x, y), we
213
+ can rewrite Z as a mapping ζ between points that comprises
214
+ f RANS and f DNS
215
+ ζ : (x, y, kRANS) → (x, y, kDNS)
216
+ Consider the model error for RANS and DNS in terms of
217
+ kinetic energy, we have
218
+ pRANS(Kg | x, y) = p(kg = kRANS | x, y)
219
+ pDNS(Kg | x, y) = p(kg = kDNS | x, y)
220
+ where Kg is the unknown ground truth of kinetic energy at
221
+ (x, y).
222
+ Kinetic energy resulted from DNS simulation results pRANS
223
+ can be estimated with kinetic energy from RANS simulation
224
+ pDNS and its correction function g as
225
+ pDNS(Kg | x, y) = g(kRANS, x, y)p(kRANS | x, y)
226
+ Because kDNS = f DNS(x, y) and kRANS = f RANS(x, y),
227
+ at each x,
228
+ we have that kDNS
229
+ x
230
+ =
231
+ f DNS
232
+ x
233
+ (y) and
234
+ kRANS
235
+ x
236
+ =
237
+ f RANS
238
+ x
239
+ (y),
240
+ assuming both f RANS
241
+ x
242
+ and
243
+ f DNS
244
+ x
245
+ are continuous, that is, ∀ϵ
246
+ >
247
+ 0, ∃δ
248
+ >
249
+ 0,
250
+ s.t. ∀|d| < δ,
251
+ ��fx(y + d) − fx(y)
252
+ �� < ϵ. We can approx-
253
+ imate g(kRANS, x, y) with ˆg(kRANS
254
+ x,y,δ ), where kRANS
255
+ x,y,δ
256
+ =
257
+ [kRANS
258
+ x,y0
259
+ , kRANS
260
+ x,y1
261
+ , · · · ]⊤ and y0, y1, · · · ∈ [y − δ, y + δ]. In
262
+ another word, we can learn ˆg with paired (kRANS
263
+ x,y,δ , kDNS
264
+ x,y,δ).
265
+ 2.3. CNN-based Correction Function
266
+ We employed a one-dimensional convolutional neural net-
267
+ work (1D-CNN) to learn the correction function ˆg from
268
+ paired RANS and DNS simulation estimated kinetic en-
269
+ ergy (kRANS
270
+ x,y,δ , kDNS
271
+ x,y,δ). Because our approximated correc-
272
+ tion function ˆg only depends on the neighbor of kRANS
273
+ and coordinates (x, y) are only used to group neighbors of
274
+ kRANS, we grouped simulation data by x and transformed
275
+ (y, k) at x into kRANS
276
+ x,y,δ via a rolling window parameterized
277
+ by window size. Our 1D-CNN has four-layers and in to-
278
+ tal 86 parameters: a single model for all zones at any x to
279
+ correct RANS towards DNS.
280
+ 3. Experiments Setup and Data Sources
281
+ We experimented our lightweight CNN-based approach
282
+ to approximate the correction function for RANS on two
283
+ datasets: the in-house RANS/DNS (Zhang, 2021; Chu et al.,
284
+ 2022a) dataset and the public RANS/DNS dataset (Voet
285
+ et al., 2021). The in-house RANS/DNS dataset (Zhang,
286
+ 2021) was obtained by considering the flow around an
287
+ SD7003 airfoil, with a separation bubble formed on the
288
+ suction side of the airfoil due to the adverse pressure gra-
289
+ dient. The public RANS/DNS dataset (Voet et al., 2021)
290
+ was generated from the two-dimensional channel flow over
291
+ periodically arranged hills. Similar to the flow over the air-
292
+ foil, the flow experiences adverse pressure gradient when
293
+ encountering the curved surface of the hill, which causes
294
+ the formation of a separation bubble behind the hill. The in-
295
+ house DNS dataset (Zhang, 2021) was obtained by consid-
296
+ ering the flow around an SD7003 airfoil, with a separation
297
+ bubble formed on the suction side of the airfoil due to the
298
+ adverse pressure gradient. The public dataset (Voet et al.,
299
+ 2021) was generated from DNS flows over periodically ar-
300
+ ranged hills. Similar to the flow over the airfoil, the flow
301
+ experiences adverse pressure gradient when encountering
302
+ the curved surface of the hill, which results in the formation
303
+ of a separation bubble behind the hill.
304
+ We split x-coordinate grouped pairs of (kRANS
305
+ x,y,δ , kDNS
306
+ x,y,δ) into
307
+ train set and validation set by their group key x.
308
+ For
309
+ both the in-house DNS and the public dataset, we choose
310
+ x at only three positions from the beginning, the mid-
311
+ dle and the end of all paired x values. For the in-house
312
+ dataset, x = 0.4, 0.56, 0.58; for the public dataset, the
313
+ x = 0, 0.046, 0.116, 0.128. For each dataset, we have a
314
+ 80%–20% split as training–testing dataset.
315
+ For both datasets, we validated our trained 1D-CNN
316
+ by comparing the L1 loss of RANS, denoted as
317
+ L1
318
+ c(rans)
319
+ =
320
+ ��CF RANS
321
+ k
322
+ − CF DNS
323
+ k
324
+ �� with the L1 loss
325
+ of 1D-CNN corrected RANS, denoted as L1
326
+ c(pred) =
327
+ ��CF CNN
328
+ k
329
+ − CF DNS
330
+ k
331
+ ��.
332
+ 4. Results
333
+ Our CNN-based correction function is validated at all paired
334
+ x locations, Figures 2 and 3 are four typical x locations for
335
+ each dataset. For both datasets, our CNN-based correction
336
+ function results in RANS results located closer to the DNS
337
+ results at any zone (x). The CNN predicted DNS profiles
338
+ for k shows overall good resemblance to the DNS dataset,
339
+ although an over-prediction exists at the beginning of the ab
340
+ zone. From the Figure 2, the series of CNN predicted DNS
341
+
342
+ Submission and Formatting Instructions for ICML 2023
343
+ Correction Function
344
+ RANSx(y, k) → CorrectedRANSx(y, k)
345
+ RANS
346
+ Simulation
347
+ RANSx(y, k)
348
+ DNS
349
+ Simulation
350
+ DNSx(y, k)
351
+ Training/Validating
352
+ 1D-CNN
353
+ Corrected RANS
354
+ RANSx(y, k)
355
+ Testing
356
+ Sampled Pairs
357
+ (y, k); x
358
+ Figure 1. Data-flow Diagram for Experiments. Blue path is the training/validating path, and the red path is the validation path. Thickness
359
+ of the path indicates the amount of data through the flow.
360
+ profiles in the first row are then smoothed with the moving
361
+ average with a window size of six consecutive estimations.
362
+ Our CNN predicted DNS profiles resemble the ground truth
363
+ DNS despite being trained with only a few pairs of RANS
364
+ and DNS results. From Figure 2, the discrepancy in general
365
+ reduces as the flow proceeds further downstream. From the
366
+ Figure 2, the second row shows the computed L1 error of
367
+ the baseline solution and the CNN predicted DNS. It is clear
368
+ that the L1 error for CNN-based correction function can
369
+ significantly reduce the L1 error in magnitude compared to
370
+ that for the original RANS.
371
+ 5. Discussion
372
+ We proposed a CNN approach to approximate the correction
373
+ function that corrects RANS simulation towards DNS sim-
374
+ ulation. We further examined our method on two datasets:
375
+ 1) one flow being considered is over a SD7003 airfoil at
376
+ 8◦ angle of attack and the Reynolds number based on the
377
+ cord length of Rec = 60000 (Zhang, 2021). A laminar
378
+ separation bubble evolves on the suction side of the airfoil
379
+ whereby the flow undergoes transition to turbulence, 2) an-
380
+ other is generated from the DNS two-dimensional channel
381
+ flow over periodically arranged hills (Voet et al., 2021). The
382
+ flow experiences adverse pressure gradient when encoun-
383
+ tering the curved surface of the hill. It should be noted that
384
+ a separation bubble occurs for both datasets. The RANS
385
+ results deviate from the DNS data in both flow scenarios
386
+ and our CNN-based correction function can significantly
387
+ reduce the L1 error of RANS- from DNS-simulations.
388
+ For both datasets, the CNN-based correction function is
389
+ trained with paired RANS-DNS simulated turbulence ki-
390
+ netic energy using less than 20% positions on the x-axis,
391
+ but the trained correction function is effective for the re-
392
+ maining 80% positions on the x-axis. Furthermore, our
393
+ lightweight CNN model uses the y-axis only for grouping
394
+ RANS-simulated turbulence kinetic energy within a neigh-
395
+ bor. The results of our CNN-based correction function
396
+ suggests that RANS results might be improved by leverag-
397
+ ing information embedded in the positions within a close
398
+ neighbor, which is independent of the absolute coordinates
399
+ (x, y).
400
+ There are relatively few studies for correcting the perturbed
401
+ turbulence kinetic energy. Very recently, the study of Chu
402
+ et al. (Chu et al., 2022a) assessed the effect of polynomial
403
+ regression on the estimation of the perturbed turbulence ki-
404
+ netic energy. Our CNN-based correction method has readily
405
+ implications on practical applications, such as, to be cou-
406
+ pled to the eigenspace perturbation approach of Emory et al.
407
+ (Emory et al., 2013). The eigenspace perturbation approach
408
+ has been implemented within the OpenFOAM framework
409
+ to construct a marker function for the perturbed turbulence
410
+ kinetic energy (Chu et al., 2022a). Our CNN-based correc-
411
+ tion method can be used as a new marker function to predict
412
+ the perturbed turbulence kinetic energy.
413
+ 5.1. Application on UQ for airfoil
414
+ Our CNN-based correction function method can be applied
415
+ to different flow cases to correct RANS towards DNS. In
416
+ this section, the CNN-based correction function is applied to
417
+ the SD7003 airfoil case to predict the perturbed turbulence
418
+ kinetic energy.
419
+ The CNN corrected RANS and ground truth profiles for the
420
+
421
+ Submission and Formatting Instructions for ICML 2023
422
+ 0.06
423
+ 0.08
424
+ 0.10
425
+ 0.00
426
+ 0.05
427
+ 0.10
428
+ 0.15
429
+ 0.20
430
+ CFk
431
+ x/c = 0.17
432
+ dns
433
+ pred
434
+ 0.06
435
+ 0.08
436
+ 0.10
437
+ 0.00
438
+ 0.05
439
+ 0.10
440
+ 0.15
441
+ 0.20
442
+ x/c = 0.25
443
+ dns
444
+ pred
445
+ 0.06
446
+ 0.08
447
+ 0.10
448
+ 0.00
449
+ 0.05
450
+ 0.10
451
+ 0.15
452
+ 0.20
453
+ x/c = 0.32
454
+ dns
455
+ pred
456
+ 0.06
457
+ 0.08
458
+ 0.00
459
+ 0.05
460
+ 0.10
461
+ 0.15
462
+ 0.20
463
+ x/c = 0.44
464
+ dns
465
+ pred
466
+ 0.06
467
+ 0.08
468
+ 0.10
469
+ 10−5
470
+ 10−3
471
+ 10−1
472
+ 101
473
+ L1
474
+ c(CFk)
475
+ L1
476
+ c(rans)
477
+ L1
478
+ c(pred)
479
+ 0.06
480
+ 0.08
481
+ 0.10
482
+ 10−5
483
+ 10−3
484
+ 10−1
485
+ 101
486
+ L1
487
+ c(rans)
488
+ L1
489
+ c(pred)
490
+ 0.06
491
+ 0.08
492
+ 0.10
493
+ 10−5
494
+ 10−3
495
+ 10−1
496
+ 101
497
+ L1
498
+ c(rans)
499
+ L1
500
+ c(pred)
501
+ 0.06
502
+ 0.08
503
+ 10−5
504
+ 10−3
505
+ 10−1
506
+ 101
507
+ L1
508
+ c(rans)
509
+ L1
510
+ c(pred)
511
+ y
512
+ Figure 2. Results for Selig-Donovan 7003 airfoil. First row: CNN corrected DNS (pred) compared with ground truth (dns). Second
513
+ row: Validation of 1D-CNN by comparing L1 loss between L1
514
+ c(rans) and L1
515
+ c(pred).
516
+ 0
517
+ 1
518
+ 2
519
+ 0.00
520
+ 0.05
521
+ 0.10
522
+ 0.15
523
+ 0.20
524
+ CFk
525
+ x/c = 0.0
526
+ dns
527
+ pred
528
+ 0.00
529
+ 0.25
530
+ 0.50
531
+ 0.75
532
+ 0.00
533
+ 0.05
534
+ 0.10
535
+ 0.15
536
+ 0.20
537
+ x/c = 0.046
538
+ dns
539
+ pred
540
+ 0.00
541
+ 0.25
542
+ 0.50
543
+ 0.75
544
+ 0.00
545
+ 0.05
546
+ 0.10
547
+ 0.15
548
+ 0.20
549
+ x/c = 0.116
550
+ dns
551
+ pred
552
+ 0.0
553
+ 0.5
554
+ 1.0
555
+ 0.00
556
+ 0.05
557
+ 0.10
558
+ 0.15
559
+ 0.20
560
+ x/c = 0.128
561
+ dns
562
+ pred
563
+ 0
564
+ 1
565
+ 2
566
+ 10−5
567
+ 10−3
568
+ 10−1
569
+ 101
570
+ L1
571
+ c(CFk)
572
+ L1
573
+ c(rans)
574
+ L1
575
+ c(pred)
576
+ 0.00
577
+ 0.25
578
+ 0.50
579
+ 0.75
580
+ 10−5
581
+ 10−3
582
+ 10−1
583
+ 101
584
+ L1
585
+ c(rans)
586
+ L1
587
+ c(pred)
588
+ 0.00
589
+ 0.25
590
+ 0.50
591
+ 0.75
592
+ 10−5
593
+ 10−3
594
+ 10−1
595
+ 101
596
+ L1
597
+ c(rans)
598
+ L1
599
+ c(pred)
600
+ 0.0
601
+ 0.5
602
+ 1.0
603
+ 10−5
604
+ 10−3
605
+ 10−1
606
+ 101
607
+ L1
608
+ c(rans)
609
+ L1
610
+ c(pred)
611
+ y
612
+ Figure 3. Results for data set from Voet et al. . First row: CNN corrected DNS (pred) compared with ground truth (dns). Second row:
613
+ Validation of 1D-CNN by comparing L1 loss between L1
614
+ c(rans) and L1
615
+ c(pred).
616
+ turbulence kinetic energy normalized with the freestream
617
+ velocity squared, k∗/U 2
618
+ ∞ and k/U 2
619
+ ∞ are shown in Figs. 4
620
+ (a) and (b), respectively. The k∗/U 2
621
+ ∞ and k/U 2
622
+ ∞ profiles are
623
+ equally spaced for the ab and cd zone with x/c = 0.01, and
624
+ a uniform spacing of x/c = 0.02 is used for the ef zone.
625
+ It is clear that the k∗/U 2
626
+ ∞ and k/U 2
627
+ ∞ profiles are more
628
+
629
+ Submission and Formatting Instructions for ICML 2023
630
+ Figure 4. (a) CNN corrected RANS (CNN DNS) (solid-dotted lines) of the normalized perturbed turbulence kinetic energy and (b) ground
631
+ truth (CNN RANS) along the suction side of the SD7003 airfoil (geometry depicted by gray line): from left to right are zone ab, zone cd
632
+ and zone ef. There are 32 positions on the suction side of the airfoil.
633
+ densely packed for the ab and cd zone, within which the
634
+ flow features are complex due to the presence of separation
635
+ and reattachment.
636
+ From Figs. 4 (a) and (b), the CNN corrected DNS profiles
637
+ in general exhibit a similar trend as that for the ground truth
638
+ dataset, as both profiles show a gradual increase in the ab
639
+ and cd zone. Then a reduction of the profile is observed
640
+ further downstream in the ef zone.
641
+ In Fig. 4 (a), CNN corrected RANS profiles in general in-
642
+ crease in magnitude as the flow moves further downstream,
643
+ which is qualitatively similar to the ground truth profiles.
644
+ Further, it should be noted that the CNN corrected RANS
645
+ profiles increase in a somewhat larger magnitude than that
646
+ for the ground truth in the ab zone. The discrepancy is more
647
+ than 50% at the beginning of the ab zone and gradually
648
+ reduces as the flow moves further downstream, which indi-
649
+ cates that a better accuracy of our CNN model is yielded
650
+ further downstream. This behavior becomes more clear for
651
+ the cd and ef zone. In the region where the end of the cd
652
+ zone meets the beginning of the ef zone, the ground truth
653
+ profiles are clustered due to the complex flow feature of
654
+ the reattachment (Chu et al., 2022b), as shown in Figs 4
655
+ (b). This clustering behavior is successfully captured by
656
+ our CNN model, as shown in Fig. 4 (a). In the ef zone,
657
+ our CNN model gives overall accurate predictions for the
658
+ k∗/U 2
659
+ ∞ profiles, i.e., the CNN corrected RANS profiles and
660
+ the ground truth profiles are almost identical.
661
+ 6. Conclusion
662
+ To the best of our knowledge, we are among the first to
663
+ examine the projection from RANS to DNS using the CNN
664
+ approach. Our experiment results suggest that the CNN-
665
+ based correction function corrects the RANS predictions for
666
+ perturbed turbulence kinetic energy towards the in-house
667
+
668
+ Submission and Formatting Instructions for ICML 2023
669
+ DNS data. A projection that can approximate the in-house
670
+ DNS data reasonably well from RANS might exist inde-
671
+ pendent of x. Our methodology can be easily extended to
672
+ analyze flows over different types of airfoils.
673
+ Our findings are subject to following limitations: our CNN
674
+ model was trained with only two datasets. Future work
675
+ may include validation with more datasets using different
676
+ flow cases, e.g., different types of airfoils. In addition, our
677
+ CNN-based correction function will be integrated with the
678
+ eigenspace perturbation framework to result in accurate
679
+ perturbations and hence improved estimation of RANS UQ.
680
+ References
681
+ Ahlfeld, R. and Montomoli, F. A single formulation for
682
+ uncertainty propagation in turbomachinery: Samba pc.
683
+ Journal of Turbomachinery, 139(11):111007, 2017.
684
+ Ahlfeld, R., Laizet, S., Geraci, G., Iaccarino, G., and Mon-
685
+ tomoli, F. Multi-fidelity uncertainty quantification for
686
+ geometric manufacturing errors in turbulent flow. In APS
687
+ Division of Fluid Dynamics Meeting Abstracts, pp. D34–
688
+ 010, 2016.
689
+ Brunton, S. L., Noack, B. R., and Koumoutsakos, P. Ma-
690
+ chine learning for fluid mechanics. Annual Review of
691
+ Fluid Mechanics, 52:477–508, 2020.
692
+ Chu, M., Wu, X., and Rival, D. E. Model-form uncertainty
693
+ quantification of reynolds-averaged navier–stokes model-
694
+ ing of flows over a sd7003 airfoil. Physics of Fluids, 34
695
+ (11):117105, 2022a.
696
+ Chu, M., Wu, X., and Rival, D. E.
697
+ Quantification of
698
+ reynolds-averaged-navier–stokes model-form uncertainty
699
+ in transitional boundary layer and airfoil flows. Physics
700
+ of Fluids, 34(10):107101, 2022b.
701
+ Cook, L. W., Mishra, A., Jarrett, J., Willcox, K., and Iac-
702
+ carino, G. Optimization under turbulence model uncer-
703
+ tainty for aerospace design. Physics of Fluids, 31(10):
704
+ 105111, 2019.
705
+ Craft, T., Launder, B., and Suga, K. Development and
706
+ application of a cubic eddy-viscosity model of turbulence.
707
+ International Journal of Heat and Fluid Flow, 17(2):108–
708
+ 115, 1996.
709
+ Doostan, A., Geraci, G., and Iaccarino, G. A bi-fidelity
710
+ approach for uncertainty quantification of heat transfer in
711
+ a rectangular ribbed channel. In Turbo Expo: Power for
712
+ Land, Sea, and Air, volume 49712, pp. V02CT45A031.
713
+ American Society of Mechanical Engineers, 2016.
714
+ Dow, E. A. and Wang, Q. The implications of tolerance
715
+ optimization on compressor blade design. Journal of
716
+ Turbomachinery, 137(10):101008, 2015.
717
+ Duraisamy, K., Spalart, P. R., and Rumsey, C. L. Status,
718
+ emerging ideas and future directions of turbulence mod-
719
+ eling research in aeronautics. Technical report, 2017.
720
+ Duraisamy, K., Iaccarino, G., and Xiao, H. Turbulence mod-
721
+ eling in the age of data. Annual review of fluid mechanics,
722
+ 51:357–377, 2019.
723
+ Emory, M., Larsson, J., and Iaccarino, G. Modeling of struc-
724
+ tural uncertainties in reynolds-averaged navier-stokes clo-
725
+ sures. Physics of Fluids, 25(11):110822, 2013.
726
+ Gorl´e, C., Zeoli, S., Emory, M., Larsson, J., and Iaccarino,
727
+ G. Epistemic uncertainty quantification for reynolds-
728
+ averaged navier-stokes modeling of separated flows over
729
+ streamlined surfaces. Physics of Fluids, 31(3):035101,
730
+ 2019.
731
+ Heyse, J. F., Mishra, A. A., and Iaccarino, G. Data driven
732
+ physics constrained perturbations for turbulence model
733
+ uncertainty estimation.
734
+ In AAAI Spring Symposium:
735
+ MLPS, 2021a.
736
+ Heyse, J. F., Mishra, A. A., and Iaccarino, G. Estimating
737
+ rans model uncertainty using machine learning. Journal
738
+ of the Global Power and Propulsion Society, 2021(May):
739
+ 1–14, 2021b.
740
+ Iaccarino, G., Mishra, A. A., and Ghili, S. Eigenspace
741
+ perturbations for uncertainty estimation of single-point
742
+ turbulence closures. Physical Review Fluids, 2(2):024605,
743
+ 2017.
744
+ Ihme, M., Chung, W. T., and Mishra, A. A. Combustion
745
+ machine learning: Principles, progress and prospects.
746
+ Progress in Energy and Combustion Science, 91:101010,
747
+ 2022.
748
+ Langley, P. Crafting papers on machine learning. In Langley,
749
+ P. (ed.), Proceedings of the 17th International Conference
750
+ on Machine Learning (ICML 2000), pp. 1207–1216, Stan-
751
+ ford, CA, 2000. Morgan Kaufmann.
752
+ Loeven, A. and Bijl, H.
753
+ Airfoil analysis with un-
754
+ certain geometry using the probabilistic collocation
755
+ method.
756
+ In 49th AIAA/ASME/ASCE/AHS/ASC Struc-
757
+ tures, Structural Dynamics, and Materials Conference,
758
+ 16th AIAA/ASME/AHS Adaptive Structures Conference,
759
+ 10th AIAA Non-Deterministic Approaches Conference,
760
+ 9th AIAA Gossamer Spacecraft Forum, 4th AIAA Multi-
761
+ disciplinary Design Optimization Specialists Conference,
762
+ pp. 2070, 2008.
763
+ Mishra, A. and Iaccarino, G. Rans predictions for high-
764
+ speed flows using enveloping models. arXiv preprint
765
+ arXiv:1704.01699, 2017.
766
+
767
+ Submission and Formatting Instructions for ICML 2023
768
+ Mishra, A. A., Duraisamy, K., and Iaccarino, G. Estimating
769
+ uncertainty in homogeneous turbulence evolution due to
770
+ coarse-graining. Physics of Fluids, 31(2):025106, 2019a.
771
+ Mishra, A. A., Mukhopadhaya, J., Iaccarino, G., and Alonso,
772
+ J. Uncertainty estimation module for turbulence model
773
+ predictions in su2.
774
+ AIAA Journal, 57(3):1066–1077,
775
+ 2019b.
776
+ Mishra, A. A., Mukhopadhaya, J., Alonso, J., and Iaccarino,
777
+ G. Design exploration and optimization under uncertainty.
778
+ Physics of Fluids, 32(8):085106, 2020.
779
+ Pecnik, R., Witteveen, J. A., and Iaccarino, G. Assessment
780
+ of uncertainties in modeling the laminar to turbulent tran-
781
+ sition for heat transfer predictions on a turbine guide vane.
782
+ 2011.
783
+ Pope, S. B. Turbulent flows, 2001.
784
+ Voet, L. J., Ahlfeld, R., Gaymann, A., Laizet, S., and Mon-
785
+ tomoli, F. A hybrid approach combining dns and rans
786
+ simulations to quantify uncertainties in turbulence mod-
787
+ elling. Applied Mathematical Modelling, 89:885–906,
788
+ 2021.
789
+ Wang, J.-X., Wu, J., Ling, J., Iaccarino, G., and Xiao, H. A
790
+ comprehensive physics-informed machine learning frame-
791
+ work for predictive turbulence modeling. arXiv preprint
792
+ arXiv:1701.07102, 2017a.
793
+ Wang, J.-X., Wu, J.-L., and Xiao, H. Physics-informed
794
+ machine learning approach for reconstructing reynolds
795
+ stress modeling discrepancies based on dns data. Physical
796
+ Review Fluids, 2(3):034603, 2017b.
797
+ Wu, J.-L., Wang, J.-X., and Xiao, H. A bayesian calibration–
798
+ prediction method for reducing model-form uncertainties
799
+ with application in rans simulations. Flow, Turbulence
800
+ and Combustion, 97(3):761–786, 2016.
801
+ Wu, J.-L., Xiao, H., and Paterson, E. Physics-informed
802
+ machine learning approach for augmenting turbulence
803
+ models: A comprehensive framework. Physical Review
804
+ Fluids, 3(7):074602, 2018.
805
+ Xiao, H., Wu, J.-L., Wang, J.-X., Sun, R., and Roy, C.
806
+ Quantifying and reducing model-form uncertainties in
807
+ reynolds-averaged navier–stokes simulations: A data-
808
+ driven, physics-informed bayesian approach. Journal
809
+ of Computational Physics, 324:115–136, 2016.
810
+ Xiao, H., Wang, J.-X., and Ghanem, R. G.
811
+ A random
812
+ matrix approach for quantifying model-form uncertainties
813
+ in turbulence modeling. Computer Methods in Applied
814
+ Mechanics and Engineering, 313:941–965, 2017.
815
+ Zeng, F., Zhang, W., Li, J., Zhang, T., and Yan, C. Adap-
816
+ tive model refinement approach for bayesian uncertainty
817
+ quantification in turbulence model. AIAA Journal, pp.
818
+ 1–15, 2022.
819
+ Zhang, H. Turbulent and Non-Turbulent Interfaces in Low
820
+ Mach Number Airfoil Flows. PhD thesis, Queen’s Uni-
821
+ versity (Canada), 2021.
822
+
S9FKT4oBgHgl3EQfkC7A/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
T9E3T4oBgHgl3EQfaQqr/content/tmp_files/2301.04505v1.pdf.txt ADDED
@@ -0,0 +1,2318 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ A Fully Quantum-Mechanical Treatment for Kaolinite
2
+ Sam Shepherd,1 Gareth A. Tribello,1 and David M. Wilkins1, a)
3
+ Centre for Quantum Materials and Technologies, School of Mathematics and Physics, Queen’s University Belfast,
4
+ Belfast BT7 1NN, Northern Ireland, United Kingdom
5
+ (Dated:)
6
+ Neural network potentials for kaolinite minerals have been fitted to data extracted from density functional
7
+ theory calculation that were performed using the revPBE + D3 and revPBE + vdW functionals. These
8
+ potentials have then been used to calculate static and dynamic properties of the mineral. We show that
9
+ revPBE + vdW is better at reproducing the static properties. However, revPBE + D3 does a better job
10
+ of reproducing the experimental IR spectrum. We also consider what happens to these properties when a
11
+ fully-quantum treatment of the nuclei is employed. We find that nuclear quantum effects (NQEs) do not make
12
+ a substantial difference to the static properties. However, when NQEs are included the dynamic properties
13
+ of the material change substantially.
14
+ I.
15
+ INTRODUCTION
16
+ Clay minerals represent some of the most abun-
17
+ dant, yet experimentally frustrating minerals on the
18
+ planet.
19
+ They are employed in a large number of
20
+ applications1 ranging from catalysis2–5 and aqueous con-
21
+ taminant removal6–9, to those involving the modification
22
+ of the clay minerals via intercalation between the clay
23
+ layers10,11.
24
+ Due to the diversity of these applications
25
+ and the range of clay minerals used within them, interest
26
+ in these processes is ongoing and expanding.
27
+ The ex-
28
+ perimental understanding of these processes is however,
29
+ incomplete. Numerous methods have been used to inves-
30
+ tigate clay minerals12–17, but unearthing the properties
31
+ and structures of individual minerals and surface motifs
32
+ remains a difficult task15,18,19.
33
+ One such clay mineral, kaolinite, finds practical use
34
+ in a large number of fields, ranging from applications
35
+ within medicine20,21 and catalysis22 to the creation of
36
+ nano-hybrid devices23. Kaolinite is also an illustrative
37
+ example of the incomplete picture currently available
38
+ experimentally24,25. The small (sub-µm) size and rough-
39
+ ness of the grain surface makes it difficult to deter-
40
+ mine the mineral structure using standard experimental
41
+ methods26.
42
+ To aid experimental understanding, theoretical ap-
43
+ proaches offer us a method to reconcile the difficulties en-
44
+ countered when using experimental techniques. Compu-
45
+ tational techniques have been used to investigate the for-
46
+ mation of kaolinite particles27, ice formation on layer sur-
47
+ faces of kaolinite28 and halloysite nanotube formation29.
48
+ These studies employed classical force fields30–32 that al-
49
+ low one to study processes on long length and time scales.
50
+ These timescales are necessary to enable thorough inves-
51
+ tigation of the vibrational dynamics33 of the system and
52
+ interactions with aqueous interlayer species31. Classical
53
+ force fields are typically fitted to reproduce experimen-
54
+ tal results or to quantum mechanical calculations and
55
+ a)Electronic mail: [email protected]
56
+ hence, may not work well when the system moves to
57
+ parts of phase space that lie outside of the region where
58
+ they are fitted. Other research has thus used electronic
59
+ structure theory to study the mechanisms via which tran-
60
+ sition metals and organic molecules34–36 adsorb on the
61
+ surface and enter the interlayer regions37–42.
62
+ In these
63
+ more-accurate simulations, small system sizes are stud-
64
+ ied over short length scales, which limits available insight
65
+ into processes which occur over longer timescales.
66
+ When studying other materials, researchers have lever-
67
+ aged the power of machine learning43–51. In one such ap-
68
+ plication, an ab-initio method is used to build a database
69
+ of structures and their associated energies and atomic
70
+ forces.
71
+ A less computationally-expensive potential is
72
+ then fitted from this database. One can thus run long
73
+ length and time scale simulations with ab-initio accuracy
74
+ without incurring the additional computational expense
75
+ associated with the reference method. In this paper we
76
+ therefore extend our previous work52 in which we inves-
77
+ tigated how nuclear quantum effects (NQEs) impact the
78
+ structural and dynamical properties of the clay mineral
79
+ kaolinite and pyrophyllite. However, instead of employ-
80
+ ing the classical force field, CLAYFF30,31,33 we use neural
81
+ network potentials53,54 that were trained from ab-initio
82
+ data.
83
+ We use these potentials to perform path integral ab
84
+ initio molecular dynamics55 simulations at the ab-initio
85
+ level and thus study the impact nuclear quantum effects
86
+ have on the system when the electrons are modelled ab-
87
+ initio.
88
+ As we observed in our previous simulations52, nuclear
89
+ quantum effects do not change the static properties of the
90
+ material. However, they have a substantial effect on the
91
+ dynamical properties. The fact that we observe similar
92
+ differences when the electrons are modelled classically
93
+ and when they are modelled using ab initio techniques
94
+ tells us that nuclear quantum effects are important and
95
+ must be included. The discrepancies that we observed
96
+ between the experimental spectra and the spectra that
97
+ was obtained from the classical simulation in our previ-
98
+ ous work is not simply a consequence of an inaccurate
99
+ forcefield. There is important physics missing from the
100
+ arXiv:2301.04505v1 [physics.comp-ph] 11 Jan 2023
101
+
102
+ 2
103
+ model when the nuclei are treated classically.
104
+ The remainder of this paper is laid out as follows. In
105
+ section II we provide some background information on
106
+ the structure of kaolinite and the previous work that has
107
+ been done on this material using ab initio simulation.
108
+ We then describe how the machine learning potentials
109
+ were trained in section III A. We detail how molecular
110
+ dynamics simulations were run and analysed in section
111
+ III B. A comparison of the structural and dynamic prop-
112
+ erties we obtain from our simulations using our machine
113
+ learned potentials when nuclear quantum effects are both
114
+ included and not included is then presented in sections
115
+ IV A and IV B.
116
+ II.
117
+ BACKGROUND
118
+ The complexity involved with the computational mod-
119
+ elling of kaolinite is predominantly due to the layered
120
+ structure of the mineral. As shown in figure 1, Kaolinite
121
+ is a 1:1 type smectite clay, with each individual layer com-
122
+ prised of an octahedral aluminol sheet covalently bonded
123
+ to a tetrahedral silica sheet24,56. These layers are held
124
+ together through hydrogen bonds and dispersion inter-
125
+ actions between the partially positive aluminol surface
126
+ and the partially negative silica surface. In the case of
127
+ 1:1 type clay minerals like kaolinite, these interactions
128
+ are dominated by hydrogen bonding between the termi-
129
+ nal O-H groups of the aluminol layer and the interfacial
130
+ oxygen atoms of the silica layer. Ensuring these interac-
131
+ tions are accounted for when studying clay materials is
132
+ extremely important for the accurate modelling of the
133
+ mineral8,57–59.
134
+ The combination of hydrogen bonding
135
+ and dispersion interactions ensures that any theoretical
136
+ study into kaolinite using ab initio methods is a compu-
137
+ tationally expensive undertaking.
138
+ In spite of this expense, traditional electronic struc-
139
+ ture methods like density functional theory (DFT) have
140
+ been used extensively in the study of kaolinite38,39,41 and
141
+ other clay minerals60,61. These have allowed researchers
142
+ to gain insight into numerous properties of kaolinite,
143
+ mainly regarding the absorption mechanisms41 and vi-
144
+ brational properties12,62–64 of the mineral. These studies
145
+ have been limited in both time and length scale, but have
146
+ shown that the accuracy of the calculations depend quite
147
+ sensitively on the level of theory used when modelling
148
+ the system. Both dispersion corrections57–59 and a full
149
+ quantum mechanical treatment of the nuclei52 are neces-
150
+ sary to reproduce the relevant physics. The necessity of
151
+ including all of the aforementioned physics has hitherto
152
+ limited the ability of researchers to study these minerals
153
+ in greater detail.
154
+ III.
155
+ COMPUTATIONAL METHODS
156
+ A.
157
+ Neural Network Potential Creation
158
+ We used the kaolinite structure from neutron scatter-
159
+ ing experiments24 as a starting point. This structure was
160
+ replicated twice in each direction to create the 2 x 2 x 2
161
+ supercell that is pictured in Fig. 1.
162
+ To create an initial dataset for the training of a ma-
163
+ chine learning potential, we performed a number of both
164
+ canonical (NVT) and constant-stress (NST) ensemble
165
+ molecular dynamics simulations at the density functional
166
+ tight binding65–67 (DFTB) level of theory with the pa-
167
+ rameters of Frenzel et al68. These simulations were per-
168
+ formed using CP2K69. These simulations were all started
169
+ from the structure shown in figure 1 and run a range of
170
+ temperatures (200 K - 400 K). The final dataset that
171
+ was used for training was then assembled using farthest
172
+ point sampling (FPS)70 to select the most diverse con-
173
+ figurations from all available data.
174
+ The total energy and the forces were calculated for
175
+ a subset of the configurations within the database us-
176
+ ing density functional theory (DFT). Two potentials
177
+ were trained, which we will refer to as ClayNN-D3 and
178
+ ClayNN-vdW. The revPBE functional71,72was used when
179
+ calculating reference energies for both potentials. The
180
+ difference was in the way dispersion interactions are in-
181
+ corporated. In particular, Grimme’s D3 corrections73,74
182
+ was used for the ClayNN-D3 potential, while Dion et
183
+ al’s dispersion interactions75 were used for the ClayNN-
184
+ vdW potential.
185
+ These two different dispersion recipes
186
+ were employed because previous work by Tunega et al57
187
+ using the revPBE functional argued that dispersion cor-
188
+ rections must be included if the non-bonded interactions
189
+ within clay minerals are to be reproduced accurately.
190
+ Grimme’s D3 corrections were selected based on the abil-
191
+ ity of revPBE + D3 to accurately model dispersion inter-
192
+ actions within water76. Dion’s corrections were selected
193
+ due to previous work by Crasto de Lima8 who utilized
194
+ the revPBE + vdW functional to study the adsorption
195
+ mechanisms of contaminants onto clay mineral surfaces.
196
+ More recently, Kobayashi et al.77 were able to achieve
197
+ excellent agreement for a wide array of structural, dy-
198
+ namical and mechanical properties of kaolinite by using
199
+ the meta-GGA functional, SCAN without the explicit
200
+ addition of dispersion corrections.
201
+ These findings sug-
202
+ gest that the SCAN functional incorporates dispersion
203
+ interactions correctly. It is still important to use differ-
204
+ ent treatments of dispersion in this work, however, as we
205
+ are using a lower level of theory.
206
+ To train the machine learning potentials we used
207
+ the well-established method based on high-dimensional
208
+ neural networks that was introduced by Behler and
209
+ Parinello54,78. An extensive description of the construc-
210
+ tion, architecture and symmetry functions we used is in-
211
+ cluded in the SI. Initial neural network potentials (NNP)
212
+ were trained using N2P279,80 with a training dataset con-
213
+
214
+ 3
215
+ sisting of 6000 frames. Expansion of these potentials was
216
+ completed using the ‘query by committee’43 procedure,
217
+ which evaluated the total energy and atomic forces pre-
218
+ dicted by the driving NNP using a 10 membered com-
219
+ mittee of similar (but importantly, non-identical) poten-
220
+ tials. If the standard deviation of the committees average
221
+ atomic force prediction was below a set range (20 - 50
222
+ meV/ ˚A) the configuration was well represented within
223
+ the training dataset and would contribute nothing upon
224
+ its addition to said training dataset. In the event of a
225
+ configuration producing a relatively high error (with a
226
+ preset upper limit, to avoid the addition of non-physical
227
+ systems), this configuration was added to the training
228
+ data of the potentials. The energies and forces for this
229
+ configuration were then recomputed using the reference
230
+ method for the potential.
231
+ The
232
+ final
233
+ potentials
234
+ presented
235
+ within
236
+ this
237
+ work
238
+ (ClayNN-D3 and ClayNN-vdW) consist of a total of 7748
239
+ kaolinite configurations sampled from initial DFTB sim-
240
+ ulations and NNP driven NVT and NST simulations. All
241
+ DFT calculations used throughout this work were carried
242
+ out using CP2K interfaced with AiiDA81,82. Example in-
243
+ put files for theses computations can be found within our
244
+ github repository.
245
+ ClayNN-D3 and ClayNN-vdW were validated by com-
246
+ paring the predicted system energy and atomic forces to
247
+ reference values that were computed using revPBE + D3
248
+ and revPBE + vdW calculations in CP2K. Both poten-
249
+ tials were validated using a similar strategy to that of
250
+ Schran et al.44,83, with structural and dynamical proper-
251
+ ties of the system used to validate the potentials as well
252
+ as the predicted and calculated energies and forces. The
253
+ structural properties used included the computed and
254
+ predicted radial distribution functions and the phonon
255
+ density of states (PDOS). The way in which both the
256
+ energies and the forces were used for validation are pre-
257
+ sented within the SI.
258
+ FIG. 1: Experimental structure of kaolinite used within
259
+ this work. Initial structure was obtained from Bish24
260
+ and replicated in all directions to create a 2× 2 supercell
261
+ to serve as a suitable starting point for simulations.
262
+ B.
263
+ Molecular Dynamic Simulations
264
+ To equilibrate the system initial MD simulations in the
265
+ NVT ensemble were run for 500 ps at 300 K prior to a fur-
266
+ ther 500 ps equilibration in the NST ensemble at 300 K.
267
+ The timestep in these simulations was set equal to 0.25 fs.
268
+ Furthermore, in these NST simulations the diagonal ele-
269
+ ments of the stress tensor were set equal to 1 bar and all
270
+ off-diagonal components were set equal to zero. Temper-
271
+ ature was controlled using a Langevin thermostat84 with
272
+ a friction of 1 ps. To obtain sufficient statistics for the
273
+ structural properties of the clay system, a subsequent 1
274
+ ns of NST simulation was performed.
275
+ To study the vibrational dynamics of the system, we
276
+ ran 500 ps simulations at temperatures ranging from 10
277
+ K to 300 K in the NST ensmble. Ten configurations from
278
+ each of these runs were then used as starting points for
279
+ microcanonical (NVE) simulations. Separate estimates
280
+ of the vibrational density of states (VDOS) were cal-
281
+ culated from each of these simulations by finding the
282
+ Fourier transform of the velocity-velocity autocorrelation
283
+ function. The final VDOS results at each temperature
284
+ that we show in the results section are thus averages over
285
+ 10 independent estimates.
286
+ Path integral molecular dynamics (PIMD) was used
287
+ to account for nuclear quantum effects. All simulations
288
+ using PIMD were run using 16 replicas at 300 K. This
289
+ number of replicas is justified as we observed a change
290
+ of less than 0.5 % of the total system energy when the
291
+ number of replicas was increased from 16 to 32.
292
+ When the system was modelled with PIMD it was al-
293
+ lowed to equilibrate for 200 ps in the NVT ensemble. It
294
+ was then subsequently equilibrated for a further 100 ps
295
+ in the NST ensemble.
296
+ Static properties for the kaoli-
297
+ nite system were then obtained from a 100 ps produc-
298
+ tion simulation. The global path integral Langevin equa-
299
+ tion (PILE)85 thermostat with global velocity rescaling
300
+ was employed in all these simulations. When consider-
301
+ ing dynamical properties for the system, we employed
302
+ both thermostatted ring polymer molecular dynamics
303
+ (TRPMD)86,87 and partially adiabatic centroid molec-
304
+ ular dynamics (PACMD)88. We provide input files for
305
+ both of these simulations. We present the results from
306
+ the PACMD simulations in the manuscript as they were
307
+ superior.
308
+ However, information on the results we ob-
309
+ tained with TRPMD are provided in the SI for complete-
310
+ ness.
311
+ All molecular dynamics simulations (both classical and
312
+ path-integral) were performed using LAMMPS89 inter-
313
+ faced with N2P2 and driven by the i-PI90 code. Example
314
+ input files for all simulations are available in our github
315
+ repository.
316
+
317
+ L4
318
+ IV.
319
+ RESULTS AND DISCUSSION
320
+ A.
321
+ Structural Properties
322
+ Table.
323
+ I shows the unit cell parameters for kaolin-
324
+ ite that were obtained from experiments performed at
325
+ 1.5 K24. These parameters are compared with the re-
326
+ sults from our simulations. The first part of the table
327
+ shows the cell parameters that are obtained from geome-
328
+ try and cell optimization calculations. Geometry optimi-
329
+ sations were performed using the reference DFT function-
330
+ als (revPBE + D3 and revPBE + vdW) directly and us-
331
+ ing the fitted neural network potentials (ClayNN-D3 and
332
+ ClayNN-vdW). The δNNP column within Table I shows
333
+ the differences in the cell parameters that are obtained
334
+ when the optimisation is performed using the functional
335
+ directly and when the optimisation is performed using
336
+ the neural network potential. The maximum difference
337
+ between the cell parameters is 0.7% for the ClayNN-D3
338
+ (this difference is in the β parameter) and 1.14% for
339
+ ClayNN-vdW (this difference is in the α parameter) re-
340
+ spectively. There is thus an overall excellent agreement
341
+ between the the reference DFT methods and the NNPs.
342
+ Table I show that the optimisations that were per-
343
+ formed using revPBE + vdW have cell parameters that
344
+ more closely match those in experiment. For revPBE +
345
+ D3 the percentage difference from the experiment are -
346
+ 0.058 ˚A (1.12%), -0.114 ˚A (1.27%) and 0.25◦ (0.28%) for
347
+ A, B and γ respectively. For revPBE + vdW these dif-
348
+ ferences take lower values of 0.041 ˚A (0.79%), 0.078 ˚A
349
+ (0.87%) and 0.09◦ (0.1%). On these parameters, how-
350
+ ever, the agreement is excellent for both functionals.
351
+ More marked differences in the parameters are observed
352
+ for the other cell parameters. The C, α and β param-
353
+ eters for revPBE + D3 differ from experiment by 0.122
354
+ ˚A (1.62%), 2.64◦ (2.79%) and 3.16◦ (2.92%) respectively.
355
+ For revPBE + vdW these differences are 0.048 ˚A (0.65%),
356
+ 0.67◦ (0.74%) and -0.120◦ (0.11%). The differences be-
357
+ tween the two functionals is more marked for these pa-
358
+ rameters because these are the cell directions that are
359
+ more strongly affected by the treatment of dispersion.
360
+ There is a slight underbinding between the hydrogen
361
+ bonded layers when the D3 dispersion correction is used.
362
+ Meanwhile, the vdW correction predicts cell parameters
363
+ that are in line with those obtained using the dispersion
364
+ corrected functionals that were considered by Tunega et
365
+ al.57 However, the strength of the dispersion interaction
366
+ is still underestimated slightly with this correction as the
367
+ layers sit further apart than they would in experiment.
368
+ The second part of Table I shows the values of the cell
369
+ parameters that are obtained from MD and PIMD simu-
370
+ lations that were run using the fitted, neural network po-
371
+ tentials ClayNN-D3 and ClayNN-vdW. These estimates
372
+ of the cell parameters were obtained from NST simula-
373
+ tions of a 2 × 2 supercell.
374
+ Comparing the parameters
375
+ in the right half of the table with those in the left tells
376
+ us that the unit cell size increases with temperature as
377
+ would be expected.
378
+ We have performed simulations with and without
379
+ NQEs using two different treatments for dispersion. The
380
+ molecular dynamics results in table I show that changing
381
+ the way dispersion is modelled has a much larger effect
382
+ on the structure than including an explicit treatment of
383
+ NQEs. We summarise this by calculating the percentage
384
+ cell volume change between classical and path integral
385
+ simulations. The cell volume increased by 7.26% when
386
+ the vdW correction is used in place of the D3 in a classi-
387
+ cal model of the nuclei. By contrast, the cell volume in-
388
+ creased by 0.60% when NQEs are included in the model
389
+ with the vdW correction. The percentage volume change
390
+ when the D3 correction is used was 0.29%, slightly less
391
+ than the vdW value. This result is surprising as individ-
392
+ ual cell parameters when described using ClayNN-D3 are
393
+ more keenly affected by NQEs than ClayNN-vdW. The
394
+ largest increase due to NQEs was calculated as 0.103 ˚A,
395
+ observed for the C cell parameter when using ClayNN-
396
+ D3.
397
+ This value is an order of magnitude larger than
398
+ that observed for the C cell parameter when using vdW
399
+ corrections, which remains the most affected parameter.
400
+ This result is hardly surprising for either potential, as
401
+ the C parameter is the one most acutely affected by dis-
402
+ persion interactions.
403
+ The discrepancy between poten-
404
+ tials we attribute to the less accurate reproduction of
405
+ experimental results by ClayNN-D3. The comparatively
406
+ small effect incurred by including NQEs is perhaps sur-
407
+ prising given how much hydrogen bonding occurs within
408
+ the structure of kaolinite. This observation is however,
409
+ in agreement with our previous simulations with classical
410
+ potentials52, where the percentage cell volume increase
411
+ due to NQEs was 0.63%.
412
+ To investigate whether the discrepancies between the
413
+ experimental and simulated cell parameters can be at-
414
+ tributed to a poor description of the interaction between
415
+ a particular pair of atom types, we calculated radial dis-
416
+ tribution functions (RDFs). Fig .2 shows three of these
417
+ RDFs: gO-H(r), gSi-O(r), and gAl-O(r). RDFs for all other
418
+ atom pairs can be found within the SI.
419
+ Figure 2 also shows average interatomic distances for
420
+ the corresponding pairs of atoms that are obtained from
421
+ experiments24.
422
+ We note the good agreement between
423
+ these experimentally obtained values and the positions
424
+ of the first peak in gO-H(r) and gAl-O(r). By contrast,
425
+ the first peak in the gSi-O(r) sits at a value of r that is
426
+ 2.47% larger than the experimental average bond length.
427
+ The Si-O interaction is thus weaker than it should be
428
+ in our model. This under-binding of Si-O bonds by the
429
+ studied dispersion corrected functionals is consistent with
430
+ findings from Tunega et al57.
431
+ Lastly, figure 2 shows a comparison of the RDF that is
432
+ obtained when the simulation includes nuclear quantum
433
+ effects and when it does not.
434
+ It is clear from the fig-
435
+ ure that including NQEs does not affect the positions of
436
+ the peaks. However, the peaks in gO-H(r) are broadened
437
+ when nuclear quantum effects are included. One would
438
+ expect this RDF to be most impacted by the inclusion of
439
+
440
+ 5
441
+ TABLE I: Unit cell parameters for kaolinite obtained using various means. The left part of the table contains results
442
+ obtained from geometry optimization calculations using the reference DFT functionals (revPBE + D3 and revPBE
443
+ + vdW) and the neural network potentials (ClayNN-D3 and ClayNN-vdW). The right part of the table contains
444
+ results from ClayNN-D3 and ClayNN-vdW driven classical (CL) and PI (NQE) MD calculations in the
445
+ constant-stress (NST) ensemble. The δNQE column in this right part contains the differences between the results
446
+ obtained with and without nuclear quantum effects. The δD3−vdW column contains the differences in the cell
447
+ parameters for the two models of dispersion. This difference was calculated for simulations in which the nuclei were
448
+ treated classically. The experimental values are given in the column labelled EXP and are taken from Bish24.
449
+ Geometry Optimization
450
+ Molecular Dynamics at 300K
451
+ revPBE + D3
452
+ revPBE + vdW
453
+ revPBE + D3
454
+ revPBE + vdW
455
+ Property
456
+ EXP
457
+ DFT
458
+ NNP δNNP
459
+ DFT
460
+ NNP δNNP CLD3 NQED3 δNQE-D3 CLvdW NQEvdW δNQE-vdW δD3-vdW
461
+ A(˚A)
462
+ 5.153
463
+ 5.095
464
+ 5.115
465
+ 0.02
466
+ 5.194
467
+ 5.235 0.039 5.128
468
+ 5.137
469
+ 0.011
470
+ 5.243
471
+ 5.252
472
+ 0.009
473
+ -0.115
474
+ B(˚A)
475
+ 8.942
476
+ 8.828
477
+ 8.818 -0.01 9.020
478
+ 9.059 0.039 8.879
479
+ 8.887
480
+ 0.008
481
+ 9.073
482
+ 9.088
483
+ 0.005
484
+ -0.194
485
+ C(˚A)
486
+ 7.391
487
+ 7.513
488
+ 7.523
489
+ 0.01
490
+ 7.439
491
+ 7.525 0.086 7.773
492
+ 7.876
493
+ 0.103
494
+ 7.586
495
+ 7.605
496
+ 0.019
497
+ 0.187
498
+ α(◦)
499
+ 91.93
500
+ 94.57
501
+ 95.10
502
+ 0.53
503
+ 92.61
504
+ 91.42 -1.19 103.34 106.24
505
+ 2.90
506
+ 91.15
507
+ 91.23
508
+ 0.08
509
+ 12.19
510
+ β(◦)
511
+ 105.05 108.21 108.97 0.76 104.93 104.96 0.03 108.31 107.94
512
+ -0.37
513
+ 104.53
514
+ 104.49
515
+ -0.04
516
+ 3.78
517
+ γ(◦)
518
+ 89.80
519
+ 90.05
520
+ 90.37
521
+ 0.32
522
+ 89.89
523
+ 90.03
524
+ 0.04
525
+ 90.61
526
+ 90.61
527
+ 0.00
528
+ 90.09
529
+ 90.09
530
+ 0.00
531
+ 0.52
532
+ nuclear quantum effects because the atoms involved are
533
+ the lightest. When nuclear quantum effects are included
534
+ the O–H bond weakens and the width of the distribution
535
+ for the lengths of the O-H and hydrogen bonds within the
536
+ interlayer region increases. This result explains our ob-
537
+ servation of cell parameter C being substantially affected
538
+ by NQEs in I, as it is heavily dependent on interactions
539
+ involving O–H groups. By comparison, the other RDFs
540
+ pictured within figure 2 are largely unaffected. Overall
541
+ however, NQEs have a very small effect on the overall
542
+ structure and mainly affect the value of the C parame-
543
+ ter.
544
+ B.
545
+ Vibrational Properties
546
+ We have shown in the previous section that explicit
547
+ treatment of the nuclear quantum has little effect on the
548
+ structural dynamics of these clay systems. Nuclear quan-
549
+ tum effects are much more likely to affect the vibrational
550
+ properties that are acutely affected by subtle changes in
551
+ the strength of the interatomic bonds. In this next sec-
552
+ tion we thus investigate the vibrational spectra of the
553
+ material.
554
+ Classical phonon densities of states (PDOS) were cal-
555
+ culated using revPBE + D3, revPBE + vdW, ClayNN-
556
+ D3 and ClayNN-vdW. PHONOPY91 was used in all these
557
+ calculations with CP2K and the respective NNPs serving
558
+ as external force calculators. Fig. 3 shows the PDOS that
559
+ were obtained from this procedure. Both NN potentials
560
+ produce PDOS that almost exactly match the ab initio
561
+ reference methods within the higher frequency region be-
562
+ tween 3600 to 3800 cm−1. The NNPs thus successfully
563
+ replicate the number and the positions of the vibrational
564
+ O–H modes that are observed with the corresponding
565
+ DFT functional. In the low frequency region (i.e. be-
566
+ low 1200 cm−1) there are larger discrepancies between
567
+ the potentials and the reference DFT methods. This is
568
+ most evident below 800 cm−1. In this region it becomes
569
+ more difficult to distinguish different lattice modes and
570
+ the spectra predicted using the NNPs ‘shift’ away from
571
+ the reference.
572
+ Figure 4 shows the high-frequency region of the clas-
573
+ sical PDOS computed using revPBE + D3 and revPBE
574
+ + vdW in dashed red and dashed blue lines respectively.
575
+ These are presented alongside experimental IR spectra
576
+ obtained at 1.5 K62.
577
+ The complete computed PDOS,
578
+ including the low frequency modes, is available within
579
+ the SI. Neither functional reproduces the experimentally-
580
+ observed O–H stretching vibrations. In experiment there
581
+ are four distinct vibrational modes. The revPBE + D3
582
+ PDOS has only two distinct modes, while the PDOS for
583
+ revPBE + vdW has three.
584
+ We label individual modes within the experimental IR
585
+ within Figure 4 to assign the corresponding theoreti-
586
+ cally obtained modes. Label A points to the inner O–
587
+ H stretching mode around 3620 cm−1. Label B points
588
+ to an anti-phase O–H stretching mode of the interlayer
589
+ O–H groups at 3652 cm−1. Label C points to a higher
590
+ frequency interlayer O–H anti-phase stretching mode at
591
+ 3669 cm−1. Finally, label D points to the in-phase inter-
592
+ layer O–H stretching mode located at 3695 cm−1.
593
+ We consider revPBE + D3 first.
594
+ It can be clearly
595
+ seen that there is excellent reproduction of modes A and
596
+ D. Additionally, we observe a slight shoulder toward the
597
+ lower frequency side of mode D. This shoulder could be
598
+ attributed to mode C; however, we find no presence of
599
+ its lower frequency counterpart at B. Due to the lack of
600
+ any peak that could be assigned as mode B and the poor
601
+ position of this shoulder, we cannot assign with absolute
602
+ confidence this shoulder as mode C.
603
+ The reproduction of the high frequency vibrational
604
+ modes of the experimental IR using revPBE + vdW is
605
+ much different. We find that revPBE + vdW accounts
606
+ much better for modes B and C and reproduces them
607
+ with only slight errors in peak positions. Mode A is en-
608
+
609
+ 6
610
+ 0
611
+ 1
612
+ 2
613
+ 3
614
+ 4
615
+ 5
616
+ 6
617
+ 0
618
+ 5
619
+ 10
620
+ 15
621
+ 20
622
+ 25
623
+ gH−O(r)
624
+ 0
625
+ 1
626
+ 2
627
+ 3
628
+ 4
629
+ 5
630
+ 6
631
+ 0
632
+ 5
633
+ 10
634
+ 15
635
+ 20
636
+ 25
637
+ gH−O(r)
638
+ CL
639
+ NQE
640
+ Experiment
641
+ 0
642
+ 1
643
+ 2
644
+ 3
645
+ 4
646
+ 5
647
+ 6
648
+ 0
649
+ 5
650
+ 10
651
+ 15
652
+ 20
653
+ 25
654
+ gSi−O(r)
655
+ 0
656
+ 1
657
+ 2
658
+ 3
659
+ 4
660
+ 5
661
+ 6
662
+ 0
663
+ 5
664
+ 10
665
+ 15
666
+ 20
667
+ 25
668
+ gSi−O(r)
669
+ 0
670
+ 1
671
+ 2
672
+ 3
673
+ 4
674
+ 5
675
+ 6
676
+ r(˚A)
677
+ 0
678
+ 5
679
+ 10
680
+ 15
681
+ gAl−O(r)
682
+ 0
683
+ 1
684
+ 2
685
+ 3
686
+ 4
687
+ 5
688
+ 6
689
+ r(˚A)
690
+ 0.0
691
+ 2.5
692
+ 5.0
693
+ 7.5
694
+ 10.0
695
+ 12.5
696
+ gAl−O(r)
697
+ 0.8
698
+ 1.0
699
+ 1.2
700
+ 0
701
+ 20
702
+ 1.4
703
+ 1.6
704
+ 1.8
705
+ 0
706
+ 20
707
+ 1.6
708
+ 1.8
709
+ 2.0
710
+ 0
711
+ 10
712
+ 0.8
713
+ 1.0
714
+ 1.2
715
+ 0
716
+ 20
717
+ 1.4
718
+ 1.6
719
+ 1.8
720
+ 0
721
+ 20
722
+ 1.6
723
+ 1.8
724
+ 2.0
725
+ 0
726
+ 10
727
+ FIG. 2: Radial distribution functions (RDFs) for O–H (top), Si–O (middle) and Al–O (bottom) elemental pairs.
728
+ The left and right plots correspond to results obtained using ClayNN-D3 and ClayNN-vdW respectively. The
729
+ dashed blue lines indicate the result obtained using classical molecular dynamics simulations while dashed red lines
730
+ shows the result obtained when NQEs are included by using PIMD. The vertical black lines indicate the interatomic
731
+ distance for the corresponding atom pair that is obtained from experiment. The inserts show a zoomed in view of
732
+ the first peak in the RDF.
733
+ tirely neglected, while mode D could be assigned to the
734
+ highest frequency theoretical peak. Similarly to our as-
735
+ signments for revPBE + D3, the position of the theoret-
736
+ ical peak leaves us hesitant to assign this mode as mode
737
+ D.
738
+ Overall, due mainly to the better replication of the
739
+ more intense vibrational modes at 3620 cm−1 and 3695
740
+ cm−1, we conclude that the classical description of the
741
+ vibrational properties of kaolinite are better described
742
+ through the use of revPBE + D3, and therefore, ClayNN-
743
+
744
+ 7
745
+ 0
746
+ 200
747
+ 400
748
+ 600
749
+ 800
750
+ 1000
751
+ 1200
752
+ 0.0
753
+ 0.2
754
+ 0.4
755
+ 0.6
756
+ 0.8
757
+ 1.0
758
+ 1.2
759
+ revPBE + D3
760
+ ClayNN-D3
761
+ 3600
762
+ 3650
763
+ 3700
764
+ 3750
765
+ 0
766
+ 200
767
+ 400
768
+ 600
769
+ 800
770
+ 1000
771
+ 1200
772
+ 0.0
773
+ 0.2
774
+ 0.4
775
+ 0.6
776
+ 0.8
777
+ 1.0
778
+ 1.2
779
+ revPBE + vdW
780
+ ClayNN-vdW
781
+ 3600
782
+ 3650
783
+ 3700
784
+ 3750
785
+ 0.0
786
+ 0.2
787
+ 0.4
788
+ 0.6
789
+ 0.8
790
+ 1.0
791
+ ω / cm−1
792
+ 0.0
793
+ 0.2
794
+ 0.4
795
+ 0.6
796
+ 0.8
797
+ 1.0
798
+ Relative Intensity
799
+ FIG. 3: Computed phonon densities of states for kaolinite showing the low frequency region (left) and the high
800
+ frequency region (right) for both the reference DFT methods and the trained NNPs that were used within this work.
801
+ The upper panels show revPBE + D3 (solid black line) and ClayNN-D3 (dashed red line) whilst the lower panels
802
+ show revPBE + vdW (solid black line) and ClayNN-vdW (dashed red line). All of the presented spectra have been
803
+ normalised to have unit area.
804
+ D3. This result comes somewhat as a surprise, as one
805
+ would predict that the better reproduction of dispersion
806
+ related structural properties of the system using revPBE
807
+ + vdW would equate to a more accurate replication of
808
+ O–H bond dynamics.
809
+ Our finding that revPBE + D3
810
+ provides a better description than revPBE + vdW when
811
+ considering O–H dynamics is one that is supported by
812
+ previous work76,92.
813
+ Figure 4 indicates that revPBE + D3 does a better job
814
+ of reproducing the experimental IR structure. We there-
815
+ fore used the NN potential that was fitted to the energies
816
+ and forces that were calculated using this functional to
817
+ computed the vibrational density of states (VDOS) at
818
+ temperatures between 10 K and 300 K. Averaged VDOS
819
+ were obtained by performing Fourier transforms of the
820
+ velocity autocorrelation function (VAF). These VAF were
821
+ calculated from 10 individual canonical (NVE) ensem-
822
+ ble simulations that were started from randomly sampled
823
+ frames that were taken from an equilibrated region of the
824
+ corresponding NST trajectories.
825
+ Figure 5 shows some of the VDOS that were obtained
826
+ from our simulations. The full set of results are available
827
+ within the SI. Increasing the temperature broadens the
828
+ peaks in the spectrum. This makes it more difficult to as-
829
+ sign each peak to a specific vibrational mode. However,
830
+ the same problem exists for experiments that are per-
831
+ formed at finite temperature. You would not expect to
832
+ see all the fine structure in the 0 temperature PDOS in a
833
+ 300 K experimental IR spectrum. Indeed, the black line
834
+ in figure 6 shows that the four peaks in the experimental
835
+ IR spectrum (see figure 4) broaden when the temperature
836
+ is increased from 1.5 to 300 K. Importantly, however, you
837
+ can still distinguish between the four peaks in the exper-
838
+ imental spectrum at 300 K. In the theoretical spectra, by
839
+
840
+ 8
841
+ 3600
842
+ 3650
843
+ 3700
844
+ 3750
845
+ ω / cm−1
846
+ 0.0
847
+ 0.2
848
+ 0.4
849
+ 0.6
850
+ 0.8
851
+ 1.0
852
+ 1.2
853
+ Relative Intensity
854
+ A
855
+ B
856
+ C
857
+ D
858
+ revPBE + D3
859
+ revPBE + vdW
860
+ Experimental
861
+ FIG. 4: Computed phonon densities of states for
862
+ kaolinite showing the high frequency region for both
863
+ reference DFT methods. The dashed red line shows the
864
+ result for revPBE + D3, the dashed blue line shows the
865
+ result for revPBE + vdW and the black line shows the
866
+ IR spectra that was obtained from experiments run at
867
+ 1.5 K. All three spectra have been normalised to have
868
+ unit area.
869
+ contrast, all the fine structure at high frequency disap-
870
+ pears and there is thus only one high-frequency peak.
871
+ 0
872
+ 200
873
+ 400
874
+ 600
875
+ 800
876
+ 1000
877
+ 1200
878
+ 0.0
879
+ 0.2
880
+ 0.4
881
+ 0.6
882
+ 0.8
883
+ 1.0
884
+ 3600
885
+ 3800
886
+ 0 K
887
+ 10 K
888
+ 50 K
889
+ 100 K
890
+ 300 K
891
+ 0.0
892
+ 0.2
893
+ 0.4
894
+ 0.6
895
+ 0.8
896
+ 1.0
897
+ ω / cm−1
898
+ 0.0
899
+ 0.2
900
+ 0.4
901
+ 0.6
902
+ 0.8
903
+ 1.0
904
+ Relative Intensity
905
+ FIG. 5: Vibrational densities of states for kaolinite
906
+ showing the low frequency region (left) and the high
907
+ frequency region (right) at a range of different
908
+ temperatures. These densities of states were computed
909
+ using ClayNN-D3. The black line shows the 0 K result,
910
+ which was calculating by finding the PDOS. The blue,
911
+ yellow, orange and red lines are then the results
912
+ obtained at 10 K, 50 K, 100 K and 300 K respectively.
913
+ As discussed in section IV A kaolinite contains many
914
+ light atoms. It is therefore important to consider the role
915
+ of nuclear quantum effects. This holds doubly true for the
916
+ dynamic properties, which are more sensitive to factors
917
+ affecting interatomic interactions. Figure 6 shows what
918
+ happens to the spectrum when nuclear quantum effects
919
+ are included. The blue line in this figure is the classical
920
+ result for revPBE + D3 at 300 K that was shown in red
921
+ in figure 5. Meanwhile, the red line shows the spectrum
922
+ that was obtained from PACMD simulations at 300 K.
923
+ You can clearly see that the peak in the high frequency
924
+ spectrum is red shifted when nuclear quantum effects are
925
+ included in the model. This result reflects the weaken-
926
+ ing of O–H bonds within the system when NQEs are
927
+ included, and agrees with previous work which employed
928
+ the revPBE + D3 functional for aqueous systems92. In
929
+ both that work and ours, there was good agreement
930
+ between the computed and experimentally-obtained IR
931
+ spectra when NQEs were not included.
932
+ However, the
933
+ O–H frequencies were red shifted away from the experi-
934
+ mentally values when NQE were modelled explicitly. As
935
+ such, the good fit between low-level theory and experi-
936
+ ment is fortuitous, as any result which does not account
937
+ for the quantum mechanical nature of the nuclei is inher-
938
+ ently flawed. Therefore, using path integral techniques to
939
+ accurately model the NQEs is essential when performing
940
+ these comparisons with experiment that determine the
941
+ level of theory that is required to describe the electronic
942
+ degrees of freedom accurately.
943
+ V.
944
+ CONCLUSION
945
+ In this work, we have fitted neural network potentials
946
+ for kaolinite using data extracted from single point cal-
947
+ culations that were performed using the revPBE + D3
948
+ and revPBE + vdW functionals. We find that revPBE +
949
+ vdW does an excellent job of reproducing the experimen-
950
+ tally observed static properties of the material. However,
951
+ revPBE + D3 is better at reproducing the IR spectrum.
952
+ We also compared the static and dynamic properties
953
+ that are obtained when a fully-quantum-treatment of nu-
954
+ clei is employed with the results that are obtained from
955
+ classical simulations. We find that NQEs do not have
956
+ a substantial impact on the static properties. However,
957
+ there is a substantial change in the dynamic properties
958
+ when NQEs are included.
959
+ Overall, our work further illustrates the rich physical
960
+ insight that can be obtained by comparing simulation
961
+ and experiment. By employing functionals that use dif-
962
+ ferent levels of theory researchers can extract meaningful
963
+ insight into the physics that matter for a particular sys-
964
+ tem. Furthermore, the advances in machine learning that
965
+ have taken place over the last 15 years now mean that it
966
+ is possible to perform these investigations on chemically-
967
+ complex systems such as kaolinite.
968
+ ACKNOWLEDGEMENTS
969
+ S.S. gratefully acknowledges the support of the North-
970
+ ern Ireland Department for the Economy (NI-DfE). We
971
+ also appreciate the provision of any and all computa-
972
+
973
+ 9
974
+ 0
975
+ 200
976
+ 400
977
+ 600
978
+ 800
979
+ 1000
980
+ 1200
981
+ 0.0
982
+ 0.2
983
+ 0.4
984
+ 0.6
985
+ 0.8
986
+ 1.0
987
+ 3400
988
+ 3500
989
+ 3600
990
+ 3700
991
+ 3800
992
+ Classical MD
993
+ PACMD
994
+ Experimental
995
+ ω / cm−1
996
+ Relative Intensity
997
+ FIG. 6: Vibrational densities of states for kaolinite showing the low frequency region (left) and the high frequency
998
+ region (right). These densities of states were computed at 300 K using ClayNN-D3 and both classical nuclei (blue
999
+ line) and path integrals (red line). Experimental data13 (black line) at this temperature was only recorded for the
1000
+ high frequency region. We highlight the large shift away from the experimentally obtained O–H peak positions
1001
+ within the high frequency domain when we include NQEs.
1002
+ tional resources used throughout the creation of this
1003
+ work.
1004
+ We thank both the UK Materials and Molecu-
1005
+ lar Modelling Hub for computational resources, which
1006
+ is partially funded by EPSRC (EP/P020194/1) and
1007
+ EP/T022213/1), and the Northern Ireland High Perfor-
1008
+ mance Computing (NI-HPC) service funded by EPSRC
1009
+ (EP/T022175).
1010
+ The authors thank Rhys Bunting and
1011
+ Ethan Crawford for helpful comments on the manuscript.
1012
+ 1H. H. Murray, “Overview — clay mineral applications,” Applied
1013
+ Clay Science 5, 379–395 (1991).
1014
+ 2J. M. Adams and R. W. McCabe, “Clay Minerals as Catalysts,”
1015
+ in Developments in Clay Science, Handbook of Clay Science,
1016
+ Vol. 1, edited by F. Bergaya, B. K. G. Theng,
1017
+ and G. Lagaly
1018
+ (Elsevier, 2006) pp. 541–581.
1019
+ 3J.
1020
+ P.
1021
+ Ferris,
1022
+ “Mineral
1023
+ Catalysis
1024
+ and
1025
+ Prebiotic
1026
+ Synthesis:
1027
+ Montmorillonite-Catalyzed Formation of RNA,” Elements 1,
1028
+ 145–149 (2005).
1029
+ 4W. D. Johns, “Clay Mineral Catalysis and Petroleum Genera-
1030
+ tion,” Annual Reviews of Earth Planet Science , 183–198 (1979).
1031
+ 5J. A. Cecilia and C. P. Jim´enez-G´omez, “Catalytic Applications
1032
+ of Clay Minerals and Hydrotalcites,” Catalysts 11, 68 (2021).
1033
+ 6K. G. Bhattacharyya and S. S. Gupta, “Adsorption of a few heavy
1034
+ metals on natural and modified kaolinite and montmorillonite: A
1035
+ review,” Advances in Colloid and Interface Science 140, 114–131
1036
+ (2008).
1037
+ 7M. Struijk, F. Rocha,
1038
+ and C. Detellier, “Novel thio-kaolinite
1039
+ nanohybrid materials and their application as heavy metal adsor-
1040
+ bents in wastewater,” Applied Clay Science 150, 192–201 (2017).
1041
+ 8F. D. Crasto de Lima, R. H. Miwa,
1042
+ and C. R. Miranda, “Re-
1043
+ tention of contaminants Cd and Hg adsorbed and intercalated in
1044
+ aluminosilicate clays: A first principles study,” The Journal of
1045
+ Chemical Physics 147, 174704 (2017).
1046
+ 9Z. Zhang, Q. Zhou, L. Zhuang,
1047
+ and Z. Zhao, “Adsorption of
1048
+ Ca(II) and K(I) on the kaolinite surface:
1049
+ a DFT study with
1050
+ an experimental verification,” Molecular Physics 119, e1896047
1051
+ (2021).
1052
+ 10P. Liu, “Polymer modified clay minerals: A review,” Applied
1053
+ Clay Science 38, 64–76 (2007).
1054
+ 11R. S. Varma, “Clay and clay-supported reagents in organic syn-
1055
+ thesis,” Tetrahedron 58, 1235–1255 (2002).
1056
+ 12J. Madejov´a, W. Gates, and S. Petit, “IR Spectra of Clay Min-
1057
+ erals,” in Developments in Clay Science, Vol. 8 (Elsevier, 2017)
1058
+ pp. 107–149.
1059
+ 13R. Prost, E. Huard, J. Driard,
1060
+ and J. P. Leydecker, “Infared
1061
+ Study of Structural OH in Kaolinite. Dickite, Nacrite and Poorly
1062
+ Crystalline Kaolintie at 5 to 600 K,” Clays and Clay Minerals 37,
1063
+ 464–468 (1989).
1064
+ 14B. Lanson, Clays and Clay Minerals 45, 132–146 (1997).
1065
+ 15B. Pan, X. Yin,
1066
+ and S. Iglauer, “A review on clay wettability:
1067
+ From experimental investigations to molecular dynamics simu-
1068
+ lations,” Advances in Colloid and Interface Science 285, 102266
1069
+ (2020).
1070
+ 16X. Zhou, D. Liu, H. Bu, L. Deng, H. Liu, P. Yuan, P. Du, and
1071
+ H. Song, “XRD-based quantitative analysis of clay minerals using
1072
+ reference intensity ratios, mineral intensity factors, Rietveld, and
1073
+ full pattern summation methods: A critical review,” Solid Earth
1074
+ Sciences 3, 16–29 (2018).
1075
+ 17M. L. Martins, W. P. Gates, L. Michot, E. Ferrage, V. Marry,
1076
+ and H. N. Bordallo, “Neutron scattering, a powerful tool to study
1077
+ clay minerals,” Applied Clay Science Clay Science & Technology
1078
+ (XV International Clay Conference), 96, 22–35 (2014).
1079
+
1080
+ 10
1081
+ 18J.
1082
+ A.
1083
+ Harvey,
1084
+ C.
1085
+ T.
1086
+ Johnston,
1087
+ L.
1088
+ J.
1089
+ Criscenti,
1090
+ and
1091
+ J. A. Greathouse, “Distinguishing between bulk and edge hy-
1092
+ droxyl vibrational properties of 2:1 phyllosilicates via deutera-
1093
+ tion,” Chemical Communications 55, 3453–3456 (2019).
1094
+ 19G. Lagaly, “Characterization of clays by organic compounds,”
1095
+ Clay Minerals 16, 1–21 (1981).
1096
+ 20M. E. Awad, A. L´opez-Galindo, M. Setti, M. M. El-Rahmany,
1097
+ and C. V. Iborra, “Kaolinite in pharmaceutics and biomedicine,”
1098
+ International Journal of Pharmaceutics 533, 34–48 (2017).
1099
+ 21E. Gianni, K. Avgoustakis,
1100
+ and D. Papoulis, “Kaolinite group
1101
+ minerals: Applications in cancer diagnosis and treatment,” Euro-
1102
+ pean Journal of Pharmaceutics and Biopharmaceutics 154, 359–
1103
+ 376 (2020).
1104
+ 22Z. Cao, Q. Wang, and H. Cheng, “Recent advances in kaolinite-
1105
+ based material for photocatalysts,” Chinese Chemical Letters 32,
1106
+ 2617–2628 (2021).
1107
+ 23G. K. Dedzo and C. Detellier, “Functional nanohybrid materials
1108
+ derived from kaolinite,” Applied Clay Science SI Euroclay 2015
1109
+ Part-1, 130, 33–39 (2016).
1110
+ 24D. L. Bish, “Rietveld Refinement of the Kaolinite Structure at
1111
+ 1.5 K,” Clays and Clay Minerals 41, 738–744 (1993).
1112
+ 25C. E. White, J. L. Provis, D. P. Riley, G. J. Kearley, and J. S. J.
1113
+ van Deventer, “What Is the Structure of Kaolinite? Reconciling
1114
+ Theory and Experiment,” The Journal of Physical Chemistry B
1115
+ 113, 6756–6765 (2009).
1116
+ 26X. Yin, V. Gupta, H. Du, X. Wang, and J. D. Miller, “Surface
1117
+ charge and wetting characteristics of layered silicate minerals,”
1118
+ Advances in Colloid and Interface Science Interfaces, Wettability,
1119
+ Surface Forces and Applications: Special Issue in honour of the
1120
+ 65th Birthday of John Ralston, 179-182, 43–50 (2012).
1121
+ 27E. Volkova, A. K. Narayanan Nair, J. Engelbrecht, U. Schwingen-
1122
+ schl¨ogl, S. Sun, and G. Stenchikov, “Molecular Dynamics Mod-
1123
+ eling of Kaolinite Particle Associations,” The Journal of Physical
1124
+ Chemistry C 125, 24126–24136 (2021).
1125
+ 28G. C. Sosso,
1126
+ G. A. Tribello,
1127
+ A. Zen,
1128
+ P. Pedevilla,
1129
+ and
1130
+ A. Michaelides, “Ice formation on kaolinite: Insights from molec-
1131
+ ular dynamics simulations,” The Journal of Chemical Physics
1132
+ 145, 211927 (2016).
1133
+ 29D.
1134
+ A.
1135
+ Prishchenko,
1136
+ E.
1137
+ V.
1138
+ Zenkov,
1139
+ V.
1140
+ V.
1141
+ Mazurenko,
1142
+ R. F. Fakhrullin, Y. M. Lvov,
1143
+ and V. G. Mazurenko, “Molec-
1144
+ ular dynamics of the halloysite nanotubes,” Physical Chemistry
1145
+ Chemical Physics 20, 5841–5849 (2018).
1146
+ 30R. T. Cygan, J.-J. Liang,
1147
+ and A. G. Kalinichev, “Molecular
1148
+ Models of Hydroxide, Oxyhydroxide, and Clay Phases and the
1149
+ Development of a General Force Field,” The Journal of Physical
1150
+ Chemistry B 108, 1255–1266 (2004).
1151
+ 31R. T. Cygan, J. A. Greathouse, and A. G. Kalinichev, “Advances
1152
+ in Clayff Molecular Simulation of Layered and Nanoporous Ma-
1153
+ terials and Their Aqueous Interfaces,” The Journal of Physical
1154
+ Chemistry C 125, 17573–17589 (2021).
1155
+ 32M. Pouvreau, J. A. Greathouse, R. T. Cygan,
1156
+ and A. G.
1157
+ Kalinichev, “Structure of Hydrated Gibbsite and Brucite Edge
1158
+ Surfaces: DFT Results and Further Development of the ClayFF
1159
+ Classical Force Field with Metal–O–H Angle Bending Terms,”
1160
+ The Journal of Physical Chemistry C 121, 14757–14771 (2017).
1161
+ 33J. A. Greathouse, J. S. Durkin, J. P. Larentzos, and R. T. Cy-
1162
+ gan, “Implementation of a Morse potential to model hydroxyl
1163
+ behavior in phyllosilicates,” The Journal of Chemical Physics
1164
+ 130, 134713 (2009).
1165
+ 34L. Liu, F. Min, J. Chen, F. Lu,
1166
+ and L. Shen, “The adsorption
1167
+ of dodecylamine and oleic acid on kaolinite surfaces: Insights
1168
+ from DFT calculation and experimental investigation,” Applied
1169
+ Surface Science 470, 27–35 (2019).
1170
+ 35X. Wang, P. Qian, K. Song, C. Zhang, and J. Dong, “The DFT
1171
+ study of adsorption of 2,4-dinitrotoluene on kaolinite surfaces,”
1172
+ Computational and Theoretical Chemistry 1025, 16–23 (2013).
1173
+ 36B. Ren, F. Min, L. Liu, J. Chen, C. Liu, and K. Lv, “Adsorption
1174
+ of different PAM structural units on kaolinite (0 0 1) surface:
1175
+ Density functional theory study,” Applied Surface Science 504,
1176
+ 144324 (2020).
1177
+ 37J. Chen, F. Min, L. Liu,
1178
+ and C. Liu, “Mechanism research on
1179
+ surface hydration of kaolinite, insights from DFT and MD simu-
1180
+ lations,” Applied Surface Science 476, 6–15 (2019).
1181
+ 38G. Chen, X. Li, L. Zhou, S. Xia, and L. Yu, “Mechanism insights
1182
+ into Hg(II) adsorption on kaolinite(001) surface: A density func-
1183
+ tional study,” Applied Surface Science 488, 494–502 (2019).
1184
+ 39X. Wang, Y. Huang, Z. Pan, Y. Wang, and C. Liu, “Theoretical
1185
+ investigation of lead vapor adsorption on kaolinite surfaces with
1186
+ DFT calculations,” Journal of Hazardous Materials 295, 43–54
1187
+ (2015).
1188
+ 40Q. Wang, X.-P. Kong, B.-H. Zhang, and J. Wang, “Adsorption of
1189
+ Zn(II) on the kaolinite(001) surfaces in aqueous environment: A
1190
+ combined DFT and molecular dynamics study,” Applied Surface
1191
+ Science 414, 405–412 (2017).
1192
+ 41J. Zhao and M.-C. He, “Theoretical study of heavy metal Cd, Cu,
1193
+ Hg, and Ni(II) adsorption on the kaolinite(001) surface,” Applied
1194
+ Surface Science 317, 718–723 (2014).
1195
+ 42M.-C. He, J. Zhao, and S.-X. Wang, “Adsorption and diffusion of
1196
+ Pb(II) on the kaolinite(001) surface: A density-functional theory
1197
+ study,” Applied Clay Science 85, 74–79 (2013).
1198
+ 43C. Schran, F. L. Thiemann, P. Rowe, E. A. M¨uller, O. Marˇs´alek,
1199
+ and A. Michaelides, “Machine learning potentials for complex
1200
+ aqueous systems made simple,” Proceedings of the National
1201
+ Academy of Sciences of the United States of America 118,
1202
+ undefined–undefined (2021).
1203
+ 44C. Schran, F. Brieuc, and D. Marx, “Transferability of machine
1204
+ learning potentials: Protonated water neural network potential
1205
+ applied to the protonated water hexamer,” The Journal of Chem-
1206
+ ical Physics 154, 051101 (2021).
1207
+ 45V. Deringer, M. Caro,
1208
+ and G. Cs´anyi, “Machine Learning In-
1209
+ teratomic Potentials as Emerging Tools for Materials Science,”
1210
+ Advanced Materials 31, 1902765 (2019).
1211
+ 46A. P. Bart´ok, M. C. Payne, R. Kondor, and G. Cs´anyi, “Gaussian
1212
+ Approximation Potentials: The Accuracy of Quantum Mechan-
1213
+ ics, without the Electrons,” Physical Review Letters 104, 136403
1214
+ (2010).
1215
+ 47A. P. Bart´ok and G. Cs´anyi, “Gaussian approximation potentials:
1216
+ A brief tutorial introduction,” International Journal of Quantum
1217
+ Chemistry 115, 1051–1057 (2015).
1218
+ 48S. Chmiela, H. E. Sauceda, K.-R. M¨uller,
1219
+ and A. Tkatchenko,
1220
+ “Towards exact molecular dynamics simulations with machine-
1221
+ learned force fields,” Nature Communications 9, 3887 (2018).
1222
+ 49Y. Zhang, S. Ye, J. Zhang, C. Hu, J. Jiang, and B. Jiang, “Ef-
1223
+ ficient and Accurate Simulations of Vibrational and Electronic
1224
+ Spectra with Symmetry-Preserving Neural Network Models for
1225
+ Tensorial Properties,” The Journal of Physical Chemistry B 124,
1226
+ 7284–7290 (2020).
1227
+ 50V. L. Deringer, A. P. Bart´ok, N. Bernstein, D. M. Wilkins, M. Ce-
1228
+ riotti, and G. Cs´anyi, “Gaussian Process Regression for Materi-
1229
+ als and Molecules,” Chemical Reviews 121, 10073–10141 (2021).
1230
+ 51F. Musil and M. Ceriotti, “Machine Learning at the Atomic
1231
+ Scale,” CHIMIA 73, 972–972 (2019).
1232
+ 52P. K. J. Kurapothula, S. Shepherd,
1233
+ and D. M. Wilkins,
1234
+ “Hydrogen-bonding and nuclear quantum effects in clays,” The
1235
+ Journal of Chemical Physics 156, 084702 (2022).
1236
+ 53J. Behler, “Representing potential energy surfaces by high-
1237
+ dimensional neural network potentials,” Journal of Physics: Con-
1238
+ densed Matter 26, 183001 (2014).
1239
+ 54J. Behler, “Constructing high-dimensional neural network po-
1240
+ tentials: A tutorial review,” International Journal of Quantum
1241
+ Chemistry 115, 1032–1050 (2015).
1242
+ 55M. Parrinello and A. Rahman, “Study of an F center in molten
1243
+ KCl,” The Journal of Chemical Physics 80, 860–867 (1984).
1244
+ 56D. L. Bish and R. B. Von Dreele, “Rietveld Refinement of Non-
1245
+ Hydrogen Atomic Positions in Kaolinite,” Clays and Clay Min-
1246
+ erals 37, 289–296 (1989).
1247
+ 57D. Tunega, T. Buˇcko,
1248
+ and A. Zaoui, “Assessment of ten DFT
1249
+ methods in predicting structures of sheet silicates: Importance
1250
+ of dispersion corrections,” The Journal of Chemical Physics 137,
1251
+ 114105 (2012).
1252
+
1253
+ 11
1254
+ 58A. Zen, L. M. Roch, S. J. Cox, X. L. Hu, S. Sorella, D. Alf`e, and
1255
+ A. Michaelides, “Toward Accurate Adsorption Energetics on Clay
1256
+ Surfaces,” The Journal of Physical Chemistry C 120, 26402–
1257
+ 26413 (2016).
1258
+ 59V. K. Voora, W. A. Al-Saidi, and K. D. Jordan, “Density Func-
1259
+ tional Theory Study of Pyrophyllite and M-Montmorillonites (M
1260
+ = Li, Na, K, Mg, and Ca): Role of Dispersion Interactions,” The
1261
+ Journal of Physical Chemistry A 115, 9695–9703 (2011).
1262
+ 60A. Chatterjee, T. Iwasaki, T. Ebina, and A. Miyamoto, “A DFT
1263
+ study on clay–cation–water interaction in montmorillonite and
1264
+ beidellite,” Computational Materials Science 14, 119–124 (1999).
1265
+ 61T. D. K. Wungu, S. M. Aspera, M. Y. David, H. K. Dipojono,
1266
+ H. Nakanishi, and H. Kasai, “Absorption of Lithium in Montmo-
1267
+ rillonite: A Density Functional Theory (DFT) Study,” Journal
1268
+ of Nanoscience and Nanotechnology 11, 2793–2801 (2011).
1269
+ 62E. Balan, A. M. Saitta, F. Mauri, and G. Calas, “First-principles
1270
+ modeling of the infrared spectrum of kaolinite,” American Min-
1271
+ eralogist 86, 1321–1330 (2001).
1272
+ 63E. Balan, M. Lazzeri, A. M. Saitta, T. Allard, Y. Fuchs,
1273
+ and
1274
+ F. Mauri, “First-principles study of OH-stretching modes in
1275
+ kaolinite, dickite, and nacrite,” American Mineralogist 90, 50–60
1276
+ (2005).
1277
+ 64E. Balan, E. Fritsch, T. Allard, G. Morin, M. Guillaumet, S. De-
1278
+ lattre, M. Blanchard, and G. Calas, “Spectroscopic investigation
1279
+ and theoretical modeling of kaolinite-group minerals and other
1280
+ low-temperature phases | Elsevier Enhanced Reader,” Comptes
1281
+ Rendus Geoscience 343, 177–187 (2011).
1282
+ 65M. Elstner, D. Porezag, G. Jungnickel, J. Elsner, M. Haugk,
1283
+ T. Frauenheim, S. Suhai, and G. Seifert, “Self-consistent-charge
1284
+ density-functional tight-binding method for simulations of com-
1285
+ plex materials properties,” Physical Review B 58, 7260–7268
1286
+ (1998).
1287
+ 66D. Porezag,
1288
+ T. Frauenheim,
1289
+ T. K¨ohler,
1290
+ G. Seifert,
1291
+ and
1292
+ R. Kaschner, “Construction of tight-binding-like potentials on
1293
+ the basis of density-functional theory: Application to carbon,”
1294
+ Physical Review B 51, 12947–12957 (1995).
1295
+ 67G. Seifert, D. Porezag,
1296
+ and T. Frauenheim, “Calculations of
1297
+ molecules, clusters, and solids with a simplified LCAO-DFT-LDA
1298
+ scheme,” International Journal of Quantum Chemistry 58, 185–
1299
+ 192 (1996).
1300
+ 68J. Frenzel, A. F. Oliveira, N. Jardillier, T. Heine, and G. Seifert,
1301
+ “Semirelativistic, selfconsistent charge SlaterKoster tables for
1302
+ densityfunctional based tightbinding (DFTB) for materials sci-
1303
+ ence simulations,” Zeolites 2, 7 (2004–2009).
1304
+ 69T. D. K¨uhne, M. Iannuzzi, M. Del Ben, V. V. Rybkin, P. See-
1305
+ wald, F. Stein, T. Laino, R. Z. Khaliullin, O. Sch¨utt, F. Schiff-
1306
+ mann, D. Golze, J. Wilhelm, S. Chulkov, M. H. Bani-Hashemian,
1307
+ V. Weber, U. Borˇstnik, M. Taillefumier, A. S. Jakobovits, A. Laz-
1308
+ zaro, H. Pabst, T. M¨uller, R. Schade, M. Guidon, S. Ander-
1309
+ matt, N. Holmberg, G. K. Schenter, A. Hehn, A. Bussy, F. Belle-
1310
+ flamme, G. Tabacchi, A. Gl¨oß, M. Lass, I. Bethune, C. J. Mundy,
1311
+ C. Plessl, M. Watkins, J. VandeVondele, M. Krack, and J. Hut-
1312
+ ter, “CP2K: An electronic structure and molecular dynamics soft-
1313
+ ware package - Quickstep: Efficient and accurate electronic struc-
1314
+ ture calculations,” The Journal of Chemical Physics 152, 194103
1315
+ (2020).
1316
+ 70G. Imbalzano, A. Anelli, D. Giofr´e, S. Klees, J. Behler,
1317
+ and
1318
+ M. Ceriotti, “Automatic selection of atomic fingerprints and ref-
1319
+ erence configurations for machine-learning potentials,” The Jour-
1320
+ nal of Chemical Physics 148, 241730 (2018).
1321
+ 71J. P. Perdew, K. Burke, and M. Ernzerhof, “Generalized Gradi-
1322
+ ent Approximation Made Simple,” Physical Review Letters 77,
1323
+ 3865–3868 (1996).
1324
+ 72Y. Zhang and W. Yang, “Comment on “Generalized Gradient
1325
+ Approximation Made Simple”,” Physical Review Letters 80, 890–
1326
+ 890 (1998).
1327
+ 73S. Grimme, J. Antony, S. Ehrlich,
1328
+ and H. Krieg, “A consis-
1329
+ tent and accurate ab initio parametrization of density functional
1330
+ dispersion correction (DFT-D) for the 94 elements H-Pu,” The
1331
+ Journal of Chemical Physics 132, 154104 (2010).
1332
+ 74S. Grimme, S. Ehrlich,
1333
+ and L. Goerigk, “Effect of the damp-
1334
+ ing function in dispersion corrected density functional theory,”
1335
+ Journal of Computational Chemistry 32, 1456–1465 (2011).
1336
+ 75M. Dion, H. Rydberg, E. Schr¨oder, D. C. Langreth,
1337
+ and B. I.
1338
+ Lundqvist, “Van der Waals Density Functional for General Ge-
1339
+ ometries,” Physical Review Letters 92, 246401 (2004).
1340
+ 76T. Ohto, M. Dodia, J. Xu, S. Imoto, F. Tang, F. Zysk, T. D.
1341
+ K¨uhne, Y. Shigeta, M. Bonn, X. Wu, and Y. Nagata, “Accessing
1342
+ the Accuracy of Density Functional Theory through Structure
1343
+ and Dynamics of the Water–Air Interface,” J. Phys. Chem. Lett.
1344
+ 10, 4914–4919 (2019).
1345
+ 77K. Kobayashi, A. Yamaguchi, and M. Okumura, “Machine learn-
1346
+ ing potentials of kaolinite based on the potential energy surfaces
1347
+ of GGA and meta-GGA density functional theory,” Applied Clay
1348
+ Science 228, 106596 (2022).
1349
+ 78J. Behler, “Four Generations of High-Dimensional Neural Net-
1350
+ work Potentials,” Chemical Reviews 121, 10037–10072 (2021).
1351
+ 79A. Singraber,
1352
+ J. Behler,
1353
+ and C. Dellago, “Library-Based
1354
+ LAMMPS Implementation of High-Dimensional Neural Network
1355
+ Potentials,” Journal of Chemical Theory and Computation 15,
1356
+ 1827–1840 (2019).
1357
+ 80A. Singraber, T. Morawietz, J. Behler,
1358
+ and C. Dellago, “Par-
1359
+ allel Multistream Training of High-Dimensional Neural Network
1360
+ Potentials,” Journal of Chemical Theory and Computation 15,
1361
+ 3075–3092 (2019).
1362
+ 81S. P. Huber, S. Zoupanos, M. Uhrin, L. Talirz, L. Kahle,
1363
+ R. H¨auselmann, D. Gresch, T. M¨uller, A. V. Yakutovich, C. W.
1364
+ Andersen, F. F. Ramirez, C. S. Adorf, F. Gargiulo, S. Kumbhar,
1365
+ E. Passaro, C. Johnston, A. Merkys, A. Cepellotti, N. Mounet,
1366
+ N. Marzari, B. Kozinsky,
1367
+ and G. Pizzi, “AiiDA 1.0, a scalable
1368
+ computational infrastructure for automated reproducible work-
1369
+ flows and data provenance,” Scientific Data 7, 300 (2020).
1370
+ 82M. Uhrin, S. P. Huber, J. Yu, N. Marzari, and G. Pizzi, “Work-
1371
+ flows in AiiDA: Engineering a high-throughput, event-based en-
1372
+ gine for robust and modular computational workflows,” Compu-
1373
+ tational Materials Science 187, 110086 (2021).
1374
+ 83C. Schran, J. Behler, and D. Marx, “Automated Fitting of Neural
1375
+ Network Potentials at Coupled Cluster Accuracy: Protonated
1376
+ Water Clusters as Testing Ground,” Journal of Chemical Theory
1377
+ and Computation 16, 88–99 (2020).
1378
+ 84G. Bussi and M. Parrinello, “Accurate sampling using Langevin
1379
+ dynamics,” Phys. Rev. E 75, 056707 (2007).
1380
+ 85M. Ceriotti,
1381
+ M. Parrinello,
1382
+ T. E. Markland,
1383
+ and D. E.
1384
+ Manolopoulos, “Efficient stochastic thermostatting of path in-
1385
+ tegral molecular dynamics,” J. Chem. Phys. 133, 124104 (2010).
1386
+ 86S. Habershon, D. E. Manolopoulos, T. E. Markland, and T. F.
1387
+ Miller, “Ring-Polymer Molecular Dynamics: Quantum Effects in
1388
+ Chemical Dynamics from Classical Trajectories in an Extended
1389
+ Phase Space,” Annu. Rev. Phys. Chem. 64, 387–413 (2013).
1390
+ 87M. Rossi, M. Ceriotti, and D. E. Manolopoulos, “How to remove
1391
+ the spurious resonances from ring polymer molecular dynamics,”
1392
+ J. Chem. Phys. 140, 234116 (2014).
1393
+ 88T. D. Hone, P. J. Rossky, and G. A. Voth, “A comparative study
1394
+ of imaginary time path integral based methods for quantum dy-
1395
+ namics,” J. Chem. Phys. 124, 154103 (2006).
1396
+ 89A. P. Thompson, H. M. Aktulga, R. Berger, D. S. Bolintineanu,
1397
+ W. M. Brown, P. S. Crozier, P. J. in ’t Veld, A. Kohlmeyer, S. G.
1398
+ Moore, T. D. Nguyen, R. Shan, M. J. Stevens, J. Tranchida,
1399
+ C. Trott, and S. J. Plimpton, “LAMMPS - a flexible simulation
1400
+ tool for particle-based materials modeling at the atomic, meso,
1401
+ and continuum scales,” Computer Physics Communications 271,
1402
+ 108171 (2022).
1403
+ 90V. Kapil, M. Rossi, O. Marˇs´alek, R. Petraglia, Y. Litman,
1404
+ T. Spura, B. Cheng, A. Cuzzocrea, R. H. Meißner, D. M. Wilkins,
1405
+ B. A. Helfrecht, P. Juda, S. P. Bienvenue, W. Fang, J. Kessler,
1406
+ I. Poltavsky, S. Vandenbrande, J. Wieme, C. Corminboeuf, T. D.
1407
+ K¨uhne, D. E. Manolopoulos, T. E. Markland, J. O. Richardson,
1408
+ A. Tkatchenko, G. A. Tribello, V. Van Speybroeck, and M. Ce-
1409
+ riotti, “i-PI 2.0: A universal force engine for advanced molecular
1410
+ simulations,” Computer Physics Communications 236, 214–223
1411
+
1412
+ 12
1413
+ (2019).
1414
+ 91A. Togo and I. Tanaka, “First principles phonon calculations in
1415
+ materials science,” Scripta Materialia 108, 1–5 (2015).
1416
+ 92O. Marˇs´alek and T. E. Markland, “Quantum Dynamics and Spec-
1417
+ troscopy of Ab Initio Liquid Water: The Interplay of Nuclear and
1418
+ Electronic Quantum Effects,” The Journal of Physical Chemistry
1419
+ Letters 8, 1545–1551 (2017).
1420
+ 93J. Behler and M. Parrinello, “Generalized Neural-Network Repre-
1421
+ sentation of High-Dimensional Potential-Energy Surfaces,” Phys.
1422
+ Rev. Lett. 98, 146401 (2007).
1423
+ 94J. Behler, “Atom-centered symmetry functions for construct-
1424
+ ing high-dimensional neural network potentials,” J. Chem. Phys.
1425
+ 134, 074106 (2011).
1426
+ 95T. B. Blank and S. D. Brown, “Adaptive, global, extended
1427
+ Kalman filters for training feedforward neural networks,” J.
1428
+ Chemometrics 8, 391–407 (1994).
1429
+ 96R. L. Benson, G. Trenins, and S. C. Althorpe, “Which quantum
1430
+ statistics–classical dynamics method is best for water?” Faraday
1431
+ Discussions 221, 350–366 (2020).
1432
+
1433
+ 13
1434
+ Supplementary Information
1435
+ VI.
1436
+ GITHUB REPOSITORY
1437
+ Exemplary input files are provided for a number of the calculations and simulations performed throughout this
1438
+ work. These are available within our github repository. Efforts have been taken to make these files as ‘general’ as
1439
+ possible, however we recommend anyone wishing to use these models ‘out of the box’ to first familiarise themselves
1440
+ with the I-PI90, LAMMPS89 and N2P279,80 codes.
1441
+ VII.
1442
+ OVERVIEW OF CLAYNN MODEL
1443
+ We first discuss the atomic descriptors that are used to translate the chemical structure of the kaolinite system to
1444
+ a machine learnable input. We then follow this with a brief description of the architecture and training/expansion
1445
+ procedure of the potentials.
1446
+ A.
1447
+ Symmetry Functions
1448
+ The atomic structure of the kaolinite system is translated to a more ‘machine-learnable’ form of input through the
1449
+ use of atom-centered symmetry functions (ACSFs). Three varieties of these functions were used to provide a suitable
1450
+ environmental descriptor for all atomic configurations. These functions are given within the literature93,94 as G2, G3
1451
+ and G9 type symmetry functions respectively. The form of the cutoff function and the symmetry functions are shown
1452
+ here as Eqns 1, 2, 3 and 4 respectively.
1453
+ fc(r) = tanh3(1 − r
1454
+ rc
1455
+ )
1456
+ (1)
1457
+ G2
1458
+ i =
1459
+
1460
+ j̸=i
1461
+ e−η(rij−rs)2fc(rij)
1462
+ (2)
1463
+ G3
1464
+ i = 21−ζ �
1465
+ j̸=i
1466
+ j<k
1467
+ (1 + λ cos θijk)ζe−η[(rij−rs)2+(rik−rs)2+(rjk−rs)2]fc(rij)fc(rik)fc(rjk)
1468
+ (3)
1469
+ G9
1470
+ i = 21−ζ �
1471
+ j̸=i
1472
+ j<k
1473
+ (1 + λ cos θijk)ζe−η[(rij−rs)2+(rik−rs)2]fc(rij)fc(rik)
1474
+ (4)
1475
+ The complete set of symmetry functions we generated is provided within our github repository. We use cutoffs of 8
1476
+ and 12 Bohr when creating the symmetry function set, yielding a ‘fine’ description of atomic environments at short
1477
+ ranges whilst maintaining distinction over longer distances.
1478
+ These functions were produced using an iterative python script (which we provide within our github). In order to
1479
+ adequately lower the number of functions used to a more representative set, we utilised the pruning feature within of
1480
+ N2P2. This procedure calculated all symmetry function values encountered within the training data and removed any
1481
+ functions which didn’t sufficiently contribute to the distinction of atomic environments. The metric used to determine
1482
+ this is the range of values spanned by the symmetry function when considering all the training data. This process
1483
+ results in a final symmetry function set of 511 functions, a further breakdown of these functions is given in Table. II
1484
+ B.
1485
+ Architecture and Training
1486
+ We use a typical architecture for the elemental neural networks by employing a single input layer with the number
1487
+ of nodes determined by the number of symmetry functions for that element. This is then followed by two hidden
1488
+ layers, each with 25 nodes, and a final output layer consisting of a single node.
1489
+
1490
+ 14
1491
+ Function
1492
+ Element G2 G3 G9 Total
1493
+ H
1494
+ 29 11 116
1495
+ 156
1496
+ O
1497
+ 39 14 160
1498
+ 213
1499
+ Al
1500
+ 10
1501
+ 0
1502
+ 52
1503
+ 62
1504
+ Si
1505
+ 15
1506
+ 4
1507
+ 61
1508
+ 80
1509
+ TABLE II: Final Symmetry Functions sets assigned to each element broken down by function type.
1510
+ We provide the reference free atomic energies, system energies, and atomic forces to the neural network potential
1511
+ in atomic units. These can be seen within the respective input files in the github repository. We further sanitize our
1512
+ data by adjusting the energies provided within the training data. This is achieved through the subtraction of the
1513
+ mean system energy of the dataset from the system energy of every configuration.
1514
+ The weights are updated through the use of the Kalman filter95 implemented within N2P2. The training procedure
1515
+ is allowed to run for 25 epochs. After these epochs have completed, we select the most accurate epochs weights,
1516
+ taking care to ensure that the potential has not been overfit to the training data, and use these as the weights for our
1517
+ potential.
1518
+ The expansion and improvement of the potentials is achieved through a procedure named query by committee, a
1519
+ process first employed by Schran et al83. We trained ten other potentials using the same training data but differing
1520
+ randomization seeds. This procedure enables us to distinguish between inaccuracies within the training data and
1521
+ regions of the potential energy surface that are inadequately sampled through analysis of the standard deviation of
1522
+ the committee predictions. This procedure was repeated until adequately good coverage over all required phase spaces
1523
+ was achieved. This procedure was used initially to create a NVT ‘stable’ potential and then repeated for the NST
1524
+ ensemble.
1525
+ C.
1526
+ Validation of ClayNN Potentials
1527
+ We validate the models used throughout by the process of query by committee. We computed the RMSE and
1528
+ standard deviation of the predictions of the committee of potentials. To this end, we randomly sample and recompute
1529
+ 500 frames from both the ClayNN-D3 and ClayNN-vdW driven classical NVT and NST simulations run at 300K.
1530
+ This provides us with a measure of both static and dynamic accuracy of the potentials. These are presented in Fig.
1531
+ 7 and Fig. 8 for ClayNN-D3 and ClayNN-vdW respectively. We split these into frames from both the NVT and
1532
+ NST simulations to provide clearer distinction between the two ensembles and the regions of phase space which they
1533
+ explore. A similar procedure for the quantum mechanical simulations was not completed. This recalculation with the
1534
+ baseline DFT functional would incur the same computational expense as running ab initio path integral molecular
1535
+ dynamics and ultimately defeat the purpose of using MLIPs.
1536
+ As can be seen from both Fig. 7 and Fig. 8, the decrease of accuracy moving from NVT to NST is low. The RMSE
1537
+ increases whilst remaining relatively low for both the predicted energy and forces of the kaolinite system studied
1538
+ using both potentials. This is reasonably sensible, as the change of ensemble from NVT, which ensured a constant cell
1539
+ volume, to the NST ensemble allowed for a much larger region of chemical phase space to be explored. This results
1540
+ in slightly larger errors and standard deviation values across both potentials.
1541
+ We note the relatively large error bars associated with the energetic predictions for both ClayNN-D3 and ClayNN-
1542
+ vdW with NST predictions. We computed the errors as the standard deviation of the committee potentials at 0.36
1543
+ meV/atom (54.64%) and 0.35 meV/atom (62.85%) respectively. We attribute this to the disparity of available system
1544
+ energies within the reference data. The amount of data available equates to N and 3n(N) points respectively where
1545
+ N is the number of frames and n the number of atoms. Ultimately, while the energy predictions are a useful indicator
1546
+ of phase space coverage, they provide a limited understanding into the performance of the potential when driving
1547
+ molecular dynamics. Regardless of this fact, we present the energy predictions of the potentials as a general ‘sign of
1548
+ wellness’ for both NVT and NST simulations at the conditions studied.
1549
+ In contrast to the energy predictions, the force predictions of both potentials remains very accurate throughout
1550
+ both ensembles. We computed a maximum error of 45.54 meV/˚A and 45.27 meV/˚A corresponding to the ClayNN-D3
1551
+ NVT and ClayNN-vdW NST predictions respectively. In addition to this, we report extremely low standard deviation
1552
+ values for both potentials for the sampled trajectory at 9.97 meV/˚A (21.89%)and 10.7 meV/˚A (23.64%) respectively.
1553
+ This corresponds to well covered regions of the phase space under the conditions we study within this work, and
1554
+ allows us to confidently use these potentials as surrogates to DFT level calculations.
1555
+ Overall, we observed that throughout all simulations, the potential was extremely accurate when predicting on
1556
+
1557
+ 15
1558
+ structures with cell parameters similar to those that were prevalent within the training data. As such, the energy
1559
+ and force errors are extremely low throughout these simulations and we observe very few (¡5) symmetry function
1560
+ extrapolation warnings during these simulations. When we consider NST simulations, it is of little surprise that
1561
+ deformations away from the cell parameters that dominate the training data incur an increase in the errors associated
1562
+ with the predicted energy and forces of the system. In order to correct this, a thorough coverage of the phase space
1563
+ accessible to the system when simulating using NST at 300 K would need to be accounted for and shown to the
1564
+ potential. We deem this as unnecessary, as ultimately, we see no statistically significant increase in the errors of the
1565
+ predicted atomic forces when simulated using the NST ensemble. We therefore conclude that both ClayNN-D3 and
1566
+ ClayNN-vdW are suitable for both ensembles in their current form.
1567
+ VIII.
1568
+ KAOLINITE CHARACTERISATION
1569
+ A.
1570
+ Cell Parameters
1571
+ All reported cell parameters were obtained from geometry/cell optimization calculations using the reference DFT
1572
+ functionals or respective NNPs, or obtained as ensemble averages from NST molecular dynamics simulations. DFT
1573
+ cell optimization was completed using the 2 x 2 x 2 kaolinite supercell with CP2K while NNP optimization was
1574
+ completed using LAMMPS. We provide input files for both of these calculations within our github.
1575
+ In addition, we report that during simulations involving the ClayNN-D3 potential with and without NQEs, we
1576
+ observed definite warpings of the cell, with extreme deviations of cell parameter C, α and β at prolonged simulation
1577
+ times (¿ 1 ns). We attribute the revPBE + D3 functional and it’s description of the interlayer interactions, as this was
1578
+ not something we observed when using the ClayNN-vdW potential. When we included NQEs within these simulations,
1579
+ this warping occurred on a shorter timescale (¿ 250 ps), and as a result, we attribute this to the description of the
1580
+ intermolecular interactions between the kaolinite layers. We note that we did not include any portion of the trajectory
1581
+ after this phenomenon was observed within the statistical averages when reporting cell parameters or sampling frames
1582
+ for simulations involving dynamical properties.
1583
+ B.
1584
+ Radial Distribution Functions
1585
+ Figures 9 and 10 show the radial distribution functions for all elemental pairs within kaolinite computed using
1586
+ ClayNN-D3 and ClayNN-vdW respectively. The dashed blue lines represent the classically obtained results while the
1587
+ dashed red lines represent those calculated when we include NQEs. Figure 11 shows the classically obtained RDFs
1588
+ for ClayNN-D3 and ClayNN-vdW as the dashed blue line and dashed red line respectively. The main results from
1589
+ both Figure 9 and 10 have been discussed within the main text. We plot Figure 11 to more clearly compare the
1590
+ differences in modelling provided by the respective functionals. It can be easily seen that both functionals provide a
1591
+ similar description of most interactomic interactions within the system. The largest differences are seen in gH–H(r)
1592
+ and gH–Si(r), which show a substantial difference in the location of the first maxima for both functions of around 0.1
1593
+ - 0.2 ˚A and further differences in the more distant regions of both functions.
1594
+ C.
1595
+ Vibrational Density of States
1596
+ All reported phonon densities of states (PDOS) were obtained through the use of phonopy interfaced with CP2K.
1597
+ The workflow that we followed during this process is available on our github, along with a short configuration file we
1598
+ used to create the final plots. We attribute the differences between the NNP predicted phonon density of states and
1599
+ that computed using DFT as being due to the intrinsic error incurred through the learning procedure.
1600
+ Figure 12 shows the vibrational density of states (VDOS) computed using simulations driven by ClayNN-D3 at a
1601
+ range of temperatures. These temperatures range from 0 K (as in, the PDOS) to 300 K. A number of these were
1602
+ omitted from the figure presented within the main text for clarity. We observe significant degradation of the peak
1603
+ positions due to thermal effects upon an increase in temperature of 50 K. This is most clearly seen within the high
1604
+ frequency region of the VDOS (the right panel), where clear distinction of the two major peaks is sufficiently blurred
1605
+ at 50 K to leave it difficult to assign with confidence.
1606
+ When including NQEs in our study of the dynamical properties of kaolinite, we used both thermostatted ring
1607
+ polymer molecular dynamics86,87 (TRPMD) and partially adiabatic centroid molecular dynamics88 (PACMD). Results
1608
+ obtained using PACMD are presented within the main text. The results obtained using TRPMD suffered from a
1609
+
1610
+ 16
1611
+ well known ‘peak broadening’96 problem and were unsuitable for presentation. Figure 15 shows the differences in
1612
+ vibrational spectrum obtained using PACMD and TRPMD as the red and blue lines respectively.
1613
+ Due to our conclusion that ClayNN-D3, and by extension, revPBE + D3, provided a better description of the
1614
+ vibrational properties of the kaolinite systme, we did not present any results obtained using ClayNN-vdW. Figure 14
1615
+ shows the VDOS computed classically and using PACMD in the blue and red lines respectively. These results were
1616
+ also obtained from simulations performed at 300 K. We note the relatively good agreement in peak position of the
1617
+ classical VDOS obtained using ClayNN-vdW to experimental results (pictured in black within the high frequency
1618
+ region). It is useful to reiterate that this result is entirely fortuitous, as the classically obtained results do not consider
1619
+ the quantum mechanical nature of the nuclei within the system. The agreement with experiment is therefore tainted
1620
+ as a result of this fact. Finally. figure 15 shows the VDOS computed using PACMD and TRPMD as the red and blue
1621
+ lines respectively.
1622
+ IX.
1623
+ MISCELLANEOUS
1624
+ A.
1625
+ Path Integral Bead Convergence
1626
+ To ensure we used a sufficient number of replicas when performing path integral molecular dynamics, we converged
1627
+ the number of beads with respect to the total system energy. We simulated the system in the NVT ensemble using
1628
+ 4, 8, 16 and 32 beads. The difference between 16 and 32 beads was calculated via the difference of the mean total
1629
+ energy, which we compute as 0.02 atomic units. As the total energy was computed as the referential energy within
1630
+ the ClayNN-D3 potential, we add this back to the values before computation of the percentage difference between the
1631
+ values. We present the system energy trajectories for these simulations within Fig 16.
1632
+
1633
+ 17
1634
+ −0.40
1635
+ −0.38
1636
+ −0.36
1637
+ −0.34
1638
+ −0.32
1639
+ −0.30
1640
+ −0.28
1641
+ Reference Value (a.u)
1642
+ −0.40
1643
+ −0.38
1644
+ −0.36
1645
+ −0.34
1646
+ −0.32
1647
+ −0.30
1648
+ −0.28
1649
+ Predicted Value (a.u)
1650
+ RMSE = 0.35847 meV/atom
1651
+ STD = 0.30056 meV/atom
1652
+ Energy Correlation Plot - NvT Subset
1653
+ Reference
1654
+ Prediction
1655
+ −0.38
1656
+ −0.36
1657
+ −0.34
1658
+ −0.32
1659
+ −0.30
1660
+ −0.28
1661
+ −0.26
1662
+ Reference Value (a.u)
1663
+ −0.40
1664
+ −0.38
1665
+ −0.36
1666
+ −0.34
1667
+ −0.32
1668
+ −0.30
1669
+ −0.28
1670
+ −0.26
1671
+ Predicted Value (a.u)
1672
+ RMSE = 0.66553 meV/atom
1673
+ STD = 0.36363 meV/atom
1674
+ Energy Correlation Plot - NsT Subset
1675
+ −4
1676
+ −2
1677
+ 0
1678
+ 2
1679
+ 4
1680
+ Reference Value (eV/˚A)
1681
+ −4
1682
+ −3
1683
+ −2
1684
+ −1
1685
+ 0
1686
+ 1
1687
+ 2
1688
+ 3
1689
+ 4
1690
+ Predicted Value (eV/˚A)
1691
+ RMSE = 45.54496 meV/˚A
1692
+ STD = 9.96860 meV/˚A
1693
+ Force Correlation Plot - NvT Subset
1694
+ −4
1695
+ −2
1696
+ 0
1697
+ 2
1698
+ Reference Value (eV/˚A)
1699
+ −4
1700
+ −3
1701
+ −2
1702
+ −1
1703
+ 0
1704
+ 1
1705
+ 2
1706
+ 3
1707
+ 4
1708
+ Predicted Value (eV/˚A)
1709
+ RMSE = 42.74805 meV/˚A
1710
+ STD = 9.60939 meV/˚A
1711
+ Force Correlation Plot - NsT Subset
1712
+ FIG. 7: Committee validation plots for the revPBE + D3 potential, ClayNN-D3 with red points and black lines
1713
+ indicating the mean committee prediction and standard deviation of the committee prediction respectively, with the
1714
+ blue lines representing the reference value. Upper plots show energy validation for both NVT (left) and NST (right)
1715
+ while lower plots show force validation for both NVT (left) and NST (right).
1716
+
1717
+ 18
1718
+ −0.30 −0.28 −0.26 −0.24 −0.22 −0.20 −0.18
1719
+ Reference Value (a.u)
1720
+ −0.32
1721
+ −0.30
1722
+ −0.28
1723
+ −0.26
1724
+ −0.24
1725
+ −0.22
1726
+ −0.20
1727
+ −0.18
1728
+ Predicted Value (a.u)
1729
+ RMSE = 0.55826 meV/atom
1730
+ STD = 0.24990 meV/atom
1731
+ Energy Correlation Plot - NvT Subset
1732
+ Reference
1733
+ Prediction
1734
+ −0.32
1735
+ −0.30
1736
+ −0.28
1737
+ −0.26
1738
+ −0.24
1739
+ −0.22
1740
+ Reference Value (a.u)
1741
+ −0.32
1742
+ −0.30
1743
+ −0.28
1744
+ −0.26
1745
+ −0.24
1746
+ −0.22
1747
+ Predicted Value (a.u)
1748
+ RMSE = 0.56347 meV/atom
1749
+ STD = 0.35414 meV/atom
1750
+ Energy Correlation Plot - NsT Subset
1751
+ Reference
1752
+ Prediction
1753
+ −4
1754
+ −2
1755
+ 0
1756
+ 2
1757
+ Reference Value (eV/˚A)
1758
+ −4
1759
+ −3
1760
+ −2
1761
+ −1
1762
+ 0
1763
+ 1
1764
+ 2
1765
+ 3
1766
+ Predicted Value (eV/˚A)
1767
+ RMSE = 44.73245 meV/˚A
1768
+ STD = 10.54304 meV/˚A
1769
+ Force Correlation Plot - NvT Subset
1770
+ −4
1771
+ −2
1772
+ 0
1773
+ 2
1774
+ Reference Value (eV/˚A)
1775
+ −4
1776
+ −3
1777
+ −2
1778
+ −1
1779
+ 0
1780
+ 1
1781
+ 2
1782
+ 3
1783
+ Predicted Value (eV/˚A)
1784
+ RMSE = 45.26973 meV/˚A
1785
+ STD = 10.70550 meV/˚A
1786
+ Force Correlation Plot - NsT Subset
1787
+ FIG. 8: Committee validation plots for the revPBE + vdW potential, ClayNN-vdW with red points and black lines
1788
+ indicating the mean committee prediction and standard deviation of the committee prediction respectively, with the
1789
+ blue lines representing the reference value. Upper plots show energy validation for both NVT (left) and NST (right)
1790
+ while lower plots show force validation for both NVT (left) and NST (right).
1791
+
1792
+ 19
1793
+ 0
1794
+ 1
1795
+ 2
1796
+ 3
1797
+ 4
1798
+ 5
1799
+ 6
1800
+ 0.0
1801
+ 0.5
1802
+ 1.0
1803
+ 1.5
1804
+ 2.0
1805
+ gH−H(r)
1806
+ 0
1807
+ 1
1808
+ 2
1809
+ 3
1810
+ 4
1811
+ 5
1812
+ 6
1813
+ 0
1814
+ 5
1815
+ 10
1816
+ 15
1817
+ gO−Al(r)
1818
+ CL
1819
+ NQE
1820
+ 0
1821
+ 1
1822
+ 2
1823
+ 3
1824
+ 4
1825
+ 5
1826
+ 6
1827
+ 0
1828
+ 10
1829
+ 20
1830
+ gH−O(r)
1831
+ 0
1832
+ 1
1833
+ 2
1834
+ 3
1835
+ 4
1836
+ 5
1837
+ 6
1838
+ 0
1839
+ 10
1840
+ 20
1841
+ gO−Si(r)
1842
+ 0
1843
+ 1
1844
+ 2
1845
+ 3
1846
+ 4
1847
+ 5
1848
+ 6
1849
+ 0
1850
+ 2
1851
+ 4
1852
+ 6
1853
+ 8
1854
+ gH−Al(r)
1855
+ 0
1856
+ 1
1857
+ 2
1858
+ 3
1859
+ 4
1860
+ 5
1861
+ 6
1862
+ 0
1863
+ 5
1864
+ 10
1865
+ 15
1866
+ gAl−Al(r)
1867
+ 0
1868
+ 1
1869
+ 2
1870
+ 3
1871
+ 4
1872
+ 5
1873
+ 6
1874
+ 0.0
1875
+ 0.5
1876
+ 1.0
1877
+ 1.5
1878
+ 2.0
1879
+ gH−Si(r)
1880
+ 0
1881
+ 1
1882
+ 2
1883
+ 3
1884
+ 4
1885
+ 5
1886
+ 6
1887
+ 0
1888
+ 2
1889
+ 4
1890
+ 6
1891
+ gAl−Si(r)
1892
+ 0
1893
+ 1
1894
+ 2
1895
+ 3
1896
+ 4
1897
+ 5
1898
+ 6
1899
+ r(˚
1900
+ A)
1901
+ 0
1902
+ 2
1903
+ 4
1904
+ gO−O(r)
1905
+ 0
1906
+ 1
1907
+ 2
1908
+ 3
1909
+ 4
1910
+ 5
1911
+ 6
1912
+ r(˚
1913
+ A)
1914
+ 0
1915
+ 5
1916
+ 10
1917
+ 15
1918
+ gSi−Si(r)
1919
+ FIG. 9: Radial distribution functions (RDFs) for all elemental pairs within the kaolinite system calculated from
1920
+ revPBE + D3 trained neural network driven molecular dynamics. Blue dashed lines show the RDF calculated from
1921
+ classical molecular dynamics while the red dashed lines show the RDF calculated when accounting for quantum
1922
+ effects using PIMD.
1923
+
1924
+ 20
1925
+ 0
1926
+ 1
1927
+ 2
1928
+ 3
1929
+ 4
1930
+ 5
1931
+ 6
1932
+ 0
1933
+ 1
1934
+ 2
1935
+ gH−H(r)
1936
+ 0
1937
+ 1
1938
+ 2
1939
+ 3
1940
+ 4
1941
+ 5
1942
+ 6
1943
+ 0
1944
+ 5
1945
+ 10
1946
+ gO−Al(r)
1947
+ CL
1948
+ NQE
1949
+ 0
1950
+ 1
1951
+ 2
1952
+ 3
1953
+ 4
1954
+ 5
1955
+ 6
1956
+ 0
1957
+ 10
1958
+ 20
1959
+ gH−O(r)
1960
+ 0
1961
+ 1
1962
+ 2
1963
+ 3
1964
+ 4
1965
+ 5
1966
+ 6
1967
+ 0
1968
+ 10
1969
+ 20
1970
+ gO−Si(r)
1971
+ 0
1972
+ 1
1973
+ 2
1974
+ 3
1975
+ 4
1976
+ 5
1977
+ 6
1978
+ 0
1979
+ 2
1980
+ 4
1981
+ 6
1982
+ 8
1983
+ gH−Al(r)
1984
+ 0
1985
+ 1
1986
+ 2
1987
+ 3
1988
+ 4
1989
+ 5
1990
+ 6
1991
+ 0
1992
+ 5
1993
+ 10
1994
+ gAl−Al(r)
1995
+ 0
1996
+ 1
1997
+ 2
1998
+ 3
1999
+ 4
2000
+ 5
2001
+ 6
2002
+ 0
2003
+ 1
2004
+ 2
2005
+ gH−Si(r)
2006
+ 0
2007
+ 1
2008
+ 2
2009
+ 3
2010
+ 4
2011
+ 5
2012
+ 6
2013
+ 0
2014
+ 2
2015
+ 4
2016
+ 6
2017
+ gAl−Si(r)
2018
+ 0
2019
+ 1
2020
+ 2
2021
+ 3
2022
+ 4
2023
+ 5
2024
+ 6
2025
+ r(˚
2026
+ A)
2027
+ 0
2028
+ 1
2029
+ 2
2030
+ 3
2031
+ 4
2032
+ gO−O(r)
2033
+ 0
2034
+ 1
2035
+ 2
2036
+ 3
2037
+ 4
2038
+ 5
2039
+ 6
2040
+ r(˚
2041
+ A)
2042
+ 0
2043
+ 5
2044
+ 10
2045
+ gSi−Si(r)
2046
+ FIG. 10: Radial distribution functions (RDFs) for all elemental pairs within the kaolinite system calculated from
2047
+ revPBE + vdW trained neural network driven molecular dynamics. Blue dashed lines show the RDF calculated
2048
+ from classical molecular dynamics while the red dashed lines show the RDF calculated when accounting for
2049
+ quantum effects using PIMD.
2050
+
2051
+ 21
2052
+ 0
2053
+ 1
2054
+ 2
2055
+ 3
2056
+ 4
2057
+ 5
2058
+ 6
2059
+ 0
2060
+ 1
2061
+ 2
2062
+ gH−H(r)
2063
+ 0
2064
+ 1
2065
+ 2
2066
+ 3
2067
+ 4
2068
+ 5
2069
+ 6
2070
+ 0
2071
+ 5
2072
+ 10
2073
+ 15
2074
+ gO−Al(r)
2075
+ revPBE + D3
2076
+ revPBE + vdW
2077
+ 0
2078
+ 1
2079
+ 2
2080
+ 3
2081
+ 4
2082
+ 5
2083
+ 6
2084
+ 0
2085
+ 10
2086
+ 20
2087
+ gH−O(r)
2088
+ 0
2089
+ 1
2090
+ 2
2091
+ 3
2092
+ 4
2093
+ 5
2094
+ 6
2095
+ 0
2096
+ 10
2097
+ 20
2098
+ gO−Si(r)
2099
+ 0
2100
+ 1
2101
+ 2
2102
+ 3
2103
+ 4
2104
+ 5
2105
+ 6
2106
+ 0
2107
+ 2
2108
+ 4
2109
+ 6
2110
+ 8
2111
+ gH−Al(r)
2112
+ 0
2113
+ 1
2114
+ 2
2115
+ 3
2116
+ 4
2117
+ 5
2118
+ 6
2119
+ 0
2120
+ 5
2121
+ 10
2122
+ 15
2123
+ gAl−Al(r)
2124
+ 0
2125
+ 1
2126
+ 2
2127
+ 3
2128
+ 4
2129
+ 5
2130
+ 6
2131
+ 0
2132
+ 1
2133
+ 2
2134
+ gH−Si(r)
2135
+ 0
2136
+ 1
2137
+ 2
2138
+ 3
2139
+ 4
2140
+ 5
2141
+ 6
2142
+ 0
2143
+ 2
2144
+ 4
2145
+ 6
2146
+ gAl−Si(r)
2147
+ 0
2148
+ 1
2149
+ 2
2150
+ 3
2151
+ 4
2152
+ 5
2153
+ 6
2154
+ r(˚
2155
+ A)
2156
+ 0
2157
+ 2
2158
+ 4
2159
+ gO−O(r)
2160
+ 0
2161
+ 1
2162
+ 2
2163
+ 3
2164
+ 4
2165
+ 5
2166
+ 6
2167
+ r(˚
2168
+ A)
2169
+ 0
2170
+ 5
2171
+ 10
2172
+ 15
2173
+ gSi−Si(r)
2174
+ FIG. 11: Radial distribution functions (RDFs) for all elemental pairs within the kaolinite system calculated using
2175
+ both the revPBE + D3 (blue) and revPBE + vdW (red) functionals. All functionals shown here are obtained from
2176
+ classical molecular dynamics, in order to isolate the effects of different dispersion corrections when simulating the
2177
+ kaolinite system.
2178
+
2179
+ 22
2180
+ 0
2181
+ 200
2182
+ 400
2183
+ 600
2184
+ 800
2185
+ 1000
2186
+ 1200
2187
+ 0.0
2188
+ 0.2
2189
+ 0.4
2190
+ 0.6
2191
+ 0.8
2192
+ 1.0
2193
+ 3500
2194
+ 3600
2195
+ 3700
2196
+ 3800
2197
+ 3900
2198
+ 0 K
2199
+ 10 K
2200
+ 20 K
2201
+ 30 K
2202
+ 40 K
2203
+ 50 K
2204
+ 75K
2205
+ 100 K
2206
+ 300 K
2207
+ 0.0
2208
+ 0.2
2209
+ 0.4
2210
+ 0.6
2211
+ 0.8
2212
+ 1.0
2213
+ ω / cm−1
2214
+ 0.0
2215
+ 0.2
2216
+ 0.4
2217
+ 0.6
2218
+ 0.8
2219
+ 1.0
2220
+ Relative Intensity
2221
+ FIG. 12: Computed VDOS for the various studied temperatures using ClayNN-D3 plotted against the computed
2222
+ PDOS. We present the low frequency (< 1200 cm−1) region and high frequency (> 3500 cm−1) on the left and right
2223
+ of the figure respectively.
2224
+
2225
+ 23
2226
+ 0
2227
+ 200
2228
+ 400
2229
+ 600
2230
+ 800
2231
+ 1000
2232
+ 1200
2233
+ 0.0
2234
+ 0.2
2235
+ 0.4
2236
+ 0.6
2237
+ 0.8
2238
+ 1.0
2239
+ Relative Intensity
2240
+ PACMD
2241
+ TRPMD
2242
+ 3400
2243
+ 3600
2244
+ 3800
2245
+ ω / cm−1
2246
+ FIG. 13: Vibrational density of states computing using ClayNN-D3 within both the TRPMD (blue line) and
2247
+ PACMD (red line) formalism of path integral molecular dynamics.
2248
+ 0
2249
+ 200
2250
+ 400
2251
+ 600
2252
+ 800
2253
+ 1000
2254
+ 1200
2255
+ 0.0
2256
+ 0.2
2257
+ 0.4
2258
+ 0.6
2259
+ 0.8
2260
+ 1.0
2261
+ Relative Intensity
2262
+ 3400
2263
+ 3600
2264
+ 3800
2265
+ ω / cm−1
2266
+ Classical MD
2267
+ PACMD
2268
+ Experimental
2269
+ FIG. 14: Vibrational density of states of kaolinite computed using ClayNN-vdW within both classical mechanics
2270
+ (blue line) and path integrals (red line). We include the experimentally obtained IR spectra of the high frequency
2271
+ region (right panel) to highlight the differences between the computationally obtained result and experiment when
2272
+ using this parameterization of ab initio theory.
2273
+
2274
+ 24
2275
+ 0
2276
+ 200
2277
+ 400
2278
+ 600
2279
+ 800
2280
+ 1000
2281
+ 1200
2282
+ 0.0
2283
+ 0.2
2284
+ 0.4
2285
+ 0.6
2286
+ 0.8
2287
+ 1.0
2288
+ Relative Intensity
2289
+ PACMD
2290
+ TRPMD
2291
+ 3400
2292
+ 3600
2293
+ 3800
2294
+ ω / cm−1
2295
+ FIG. 15: Vibrational density of states computed using ClayNN-vdW within both the TRPMD (blue line) and
2296
+ PACMD (red line) formalism of path integral molecular dynamics.
2297
+ 10000
2298
+ 20000
2299
+ 30000
2300
+ 40000
2301
+ 50000
2302
+ Trajectory Step
2303
+ −0.2
2304
+ −0.1
2305
+ 0.0
2306
+ 0.1
2307
+ 0.2
2308
+ 0.3
2309
+ Predicted Energy
2310
+ 4 replicas
2311
+ 8 replicas
2312
+ 16 replicas
2313
+ 32 replicas
2314
+ FIG. 16: Total system energy of NVT simulations separated based on the number of replicas used within the
2315
+ simulation. We present these as 4 replica (blue lines), 8 replica (green lines), 16 replica (yellow lines) and 32 replica
2316
+ (red lines) simulations. The predicted energy is presented rather than the total energy, as the mean system energy is
2317
+ subtracted prior to training.
2318
+
T9E3T4oBgHgl3EQfaQqr/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
UtE1T4oBgHgl3EQfawTU/content/tmp_files/2301.03166v1.pdf.txt ADDED
@@ -0,0 +1,2215 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Improving Energy Saving of One-sided Matrix
2
+ Decompositions on CPU-GPU Heterogeneous Systems
3
+ Jieyang Chen
4
5
+ University of Alabama at Birmingham
6
+ Birmingham, Alabama, USA
7
+ Xin Liang
8
9
+ University of Kentucky
10
+ Lexington, Kentucky, USA
11
+ Kai Zhao
12
13
+ University of Alabama at Birmingham
14
+ Birmingham, Alabama, USA
15
+ Hadi Zamani Sabzi
16
17
+ University of California, Riverside
18
+ Riverside, California, USA
19
+ Laxmi Bhuyan
20
21
+ University of California, Riverside
22
+ Riverside, California, USA
23
+ Zizhong Chen
24
25
+ University of California, Riverside
26
+ Riverside, California, USA
27
+ Abstract
28
+ One-sided dense matrix decompositions (e.g., Cholesky, LU,
29
+ and QR) are the key components in scientific computing in
30
+ many different fields. Although their design has been highly
31
+ optimized for modern processors, they still consume a con-
32
+ siderable amount of energy. As CPU-GPU heterogeneous
33
+ systems are commonly used for matrix decompositions, in
34
+ this work, we aim to further improve the energy saving of one-
35
+ sided matrix decompositions on CPU-GPU heterogeneous
36
+ systems. We first build an Algorithm-Based Fault Tolerance
37
+ protected overclocking technique (ABFT-OC) to enable us
38
+ to exploit reliable overclocking for key matrix decomposi-
39
+ tion operations. Then, we design an energy-saving matrix
40
+ decomposition framework, Bi-directional Slack Reclamation
41
+ (BSR), that can intelligently combine the capability provided
42
+ by ABFT-OC and DVFS to maximize energy saving and
43
+ maintain performance and reliability. Experiments show that
44
+ BSR is able to save up to 11.7% more energy compared with
45
+ the current best energy saving optimization approach with no
46
+ performance degradation and up to 14.1% 𝐸𝑛𝑒𝑟𝑔𝑦×𝐷𝑒𝑙𝑎𝑦2 re-
47
+ duction. Also, BSR enables the Pareto efficient performance-
48
+ energy trade-off, which is able to provide up to 1.43× perfor-
49
+ mance improvement without costing extra energy.
50
+ CCS Concepts: • Hardware → Power and energy; • Com-
51
+ puter systems organization → Dependable and fault-tolerant
52
+ systems and networks.
53
+ Keywords: GPU, matrix decomposition, energy saving, fault
54
+ tolerance
55
+ Permission to make digital or hard copies of all or part of this work for
56
+ personal or classroom use is granted without fee provided that copies are not
57
+ made or distributed for profit or commercial advantage and that copies bear
58
+ this notice and the full citation on the first page. Copyrights for components
59
+ of this work owned by others than ACM must be honored. Abstracting with
60
+ credit is permitted. To copy otherwise, or republish, to post on servers or to
61
+ redistribute to lists, requires prior specific permission and/or a fee. Request
62
+ permissions from [email protected].
63
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
64
+ © 2023 Association for Computing Machinery.
65
+ ACM ISBN 979-8-4007-0015-6/23/02...$15.00
66
+ https://doi.org/10.1145/3572848.3577496
67
+ 1
68
+ Introduction
69
+ To meet performance requirements for current mission-critical
70
+ scientific computing, millions of computing cores are equipped
71
+ in modern High Performance Computing (HPC) systems con-
72
+ suming tens of megawatts of power [16]. With the increasing
73
+ need for higher performance, it is anticipated that future HPC
74
+ systems will consist of even more computing cores and con-
75
+ sume more power. As HPC systems are achieving higher
76
+ parallelism, how to achieve high performance and energy ef-
77
+ ficiency while ensuring computing reliability has become a
78
+ critical challenge for scientific computing.
79
+ As the type of processor that contributes the most of the
80
+ computing parallelism in many current and future HPC sys-
81
+ tems, Graphics Processing Units (GPUs), equipped with thou-
82
+ sands of low-power cores, offer high computational power
83
+ and energy efficiency. Many applications and libraries have
84
+ been designed and optimized for GPU accelerators [1, 3, 8, 9,
85
+ 13, 25, 34, 36, 42, 43]. Benefiting from the fact that GPUs are
86
+ designed for highly parallelizable computations while CPUs
87
+ are more efficient with serial computations, CPUs and GPUs
88
+ that are linked through fast interconnections [30, 31] are usu-
89
+ ally used together to form heterogeneous systems that can
90
+ efficiently handle a large spectrum of scientific computing
91
+ workloads. Many scientific applications or software begin
92
+ to have an optimized design for CPU-GPU heterogeneous
93
+ systems such as the MAGMA linear algebra library [15].
94
+ One-sided dense matrix decomposition such as Cholesky,
95
+ LU, and QR play a pivotal role in many scientific applica-
96
+ tions. Their state-of-the-art designs for CPU-GPU heteroge-
97
+ neous systems are proposed in [44, 45], and they have been
98
+ highly optimized in the MAGMA library and used as key
99
+ computational kernels by many applications across different
100
+ fields [18, 21, 23, 24, 35, 46, 53].
101
+ Many works have been done to improve the energy effi-
102
+ ciency of linear algebra operations. [7] proposed to use a
103
+ DVFS-based approach to optimize matrix decompositions.
104
+ [2, 51, 52] seek to use reduced core supply voltage to reduce
105
+ the energy consumption of matrix-matrix multiplication op-
106
+ erations. Although much work has been done to improve the
107
+ arXiv:2301.03166v1 [cs.DC] 9 Jan 2023
108
+
109
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
110
+ Jieyang Chen, Xin Liang, Kai Zhao, Hadi Zamani Sabzi, Laxmi Bhuyan, and Zizhong Chen
111
+ energy saving of matrix decomposition on CPU-GPU hetero-
112
+ geneous systems, it is still desirable to further improve their
113
+ energy saving since matrix decompositions as they still con-
114
+ sume a considerable amount of energy. Improving the energy
115
+ saving of matrix decomposition can lead to more energy-
116
+ efficient scientific computing. However, the major challenge,
117
+ as pointed out in [27, 28, 38, 51, 52], is that aggressive energy-
118
+ saving optimizations can weaken the reliability of the system
119
+ and cause performance degradation, which is unacceptable
120
+ for time-sensitive and mission-critical scientific applications.
121
+ In this work, we aim to further improve the energy saving
122
+ of one-sided matrix decompositions on CPU-GPU hetero-
123
+ geneous systems while maintaining performance and reli-
124
+ ability. We first build an Algorithm-Based Fault Tolerance
125
+ protected overclocking technique (ABFT-OC) to enable us
126
+ to exploit reliable overclocking for key matrix decomposi-
127
+ tion operations. Then, we design an energy-saving matrix
128
+ decomposition framework, Bi-directional Slack Reclamation
129
+ (BSR), that can intelligently combine the capability provided
130
+ by ABFT-OC and Dynamic Voltage and Frequency Scaling
131
+ (DVFS) to maximize energy saving and maintain perfor-
132
+ mance and reliability. Also, BSR enables the Pareto efficient
133
+ performance-energy trade-off. Specifically, our contributions
134
+ are listed as follows:
135
+ • We propose the first adaptive algorithm-based fault tol-
136
+ erance protected overclocking technique (ABFT-OC)
137
+ for matrix decompositions on CPU-GPU heterogeneous
138
+ systems. Overclocking with an optimized voltage guard-
139
+ band can enable us to exploit higher clock frequen-
140
+ cies with higher energy efficiency. However, aggressive
141
+ overclocking can decrease system reliability, so we
142
+ propose to couple ABFT with overclocking to enable
143
+ trustable computation. To reduce fault tolerance over-
144
+ head, we further propose a lightweight adaptive-ABFT
145
+ technique that automatically adjusts its fault tolerance
146
+ strength according to the error rate.
147
+ • Next, based on ABFT-OC, we propose a novel slack-
148
+ based energy saving framework - Bi-directional Slack
149
+ Reclamation (BSR), which aims to exploit slack, pro-
150
+ cessor idle time, to save energy and enable flexible
151
+ Pareto efficient performance-energy trade-off. Differ-
152
+ ent from existing works, BSR reclaims slack in both
153
+ directions using both ABFT-OC and DVFS to save
154
+ more energy and enable performance improvement.
155
+ • We implement our BSR on three key one-sided matrix
156
+ decompositions: Cholesky, LU, and QR. We evaluate
157
+ our implementation on a modern CPU-GPU hetero-
158
+ geneous system with Nvidia GPU. Experiments show
159
+ that BSR is able to save up to 11.7% more energy com-
160
+ pared with the current best energy saving optimiza-
161
+ tion approach with no performance degradation and up
162
+ to 14.1% 𝐸𝑛𝑒𝑟𝑔𝑦 × 𝐷𝑒𝑙𝑎𝑦2 reduction. Also, BSR en-
163
+ ables the Pareto efficient performance-energy trade-off,
164
+ which is able to provide up to 1.43× performance im-
165
+ provement without costing extra energy.
166
+ A22
167
+ A12
168
+ A21
169
+ A11
170
+ A'22
171
+ L11
172
+ U11
173
+ L21
174
+ L12
175
+ (a) Blocked algorithm
176
+ PD(k+1)
177
+ Row Panel
178
+ L
179
+ L
180
+ TMU'(k)
181
+ TMU(k)
182
+ On GPU
183
+ On CPU
184
+ Col. Panel
185
+ Tailing
186
+ Matrix
187
+ PU'(k)
188
+ L
189
+ PU(k)
190
+ Row Panel
191
+ Col. Panel
192
+ Sync.
193
+ Sync.
194
+ Slack
195
+ Slack
196
+ OR
197
+
198
+
199
+ (b) State-of-the-art design on CPU-GPU heterogeneous systems
200
+ Figure 1. One iteration of LU decomposition
201
+ (a) Double precision
202
+ (b) Single precision
203
+ Figure 2. Slacks occur when decomposing a 30720 × 30720
204
+ matrix on our heterogeneous system. Block size is optimized
205
+ for performance. Positive values represent slacks on the CPU
206
+ side and negative values represent slacks on the GPU side.
207
+ 2
208
+ Related Works and Problem Statement
209
+ In this section, we first introduce the design of state-of-the-art
210
+ matrix decomposition on CPU-GPU heterogeneous systems
211
+ and we focus on discussing their key computing character-
212
+ istics. Then, we review how existing works leverage such
213
+ computing characteristics to optimize for energy efficiency.
214
+ Finally, we formulate our research problem and challenges.
215
+ 2.1
216
+ State-of-the-art matrix decompositions
217
+ The state-of-the-art matrix decompositions for CPU-GPU het-
218
+ erogeneous systems use the blocked version matrix decom-
219
+ position algorithms. Blocks, logically divided sub-matrices,
220
+ form Panel and Trailing Matrix. The decomposition process
221
+ begins from the up left corner of the matrix and moves to-
222
+ wards the down right corner iteratively. An illustration of one
223
+ iteration of the LU decomposition is shown in Figure 1(a).
224
+ Each iteration includes three major operations: 1 Panel de-
225
+ composition (PD): 𝐿 · 1 × 𝑈 11 ← 𝐴 · 1; 2 Panel update
226
+
227
+ 5000
228
+ (ms)
229
+ 4000
230
+ Slack Length (
231
+ 3000
232
+ 2000
233
+ 1000
234
+ 0
235
+ 1
236
+ 11
237
+ 21
238
+ 31
239
+ 41
240
+ 51
241
+ Iteration
242
+ Cholesky
243
+ LU
244
+ QR100
245
+ Slack Length (ms)
246
+ 0
247
+ -100
248
+ -200
249
+ -300
250
+ -400
251
+ 1 11 21 31 41 51 61 71
252
+ Iteration
253
+ -Cholesky
254
+ 一LU
255
+ QRImproving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems
256
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
257
+ (PU): 𝑈 12 ← (𝐿11)−1 × 𝐴12; and 3 Trailing matrix update
258
+ (TMU): 𝐴′22 ← 𝐴22 −𝐿21 ×𝑈 12. Cholesky, LU, and QR de-
259
+ composition all share similar three operations. On CPU-GPU
260
+ heterogeneous systems, the three operations are assigned to
261
+ different processors based on their characteristics. PD is as-
262
+ signed to the CPUs since it is highly sequential. PU and TMU
263
+ are assigned to the GPUs as they are high parallelizable. As il-
264
+ lustrated in Figure 1(b), to overlap the computation on CPUs
265
+ and GPUs, a look-ahead optimization [26] is used that allows
266
+ the partial PU and TMU to be done first (i.e., PU’ and TMU’),
267
+ so that the PD of the next iteration can be done with the rest
268
+ of PU and TMU concurrently. Depending on the computa-
269
+ tional power of the CPU/GPU and the amount of workload
270
+ assigned during decomposition, those concurrent tasks may
271
+ finish at different times, which leads to idle computing cycles
272
+ on the CPU or GPU. The idle is called slack. Figure 2 show
273
+ how slack length can change during Cholesky, LU, and QR
274
+ decompositions on our test platform.
275
+ 2.2
276
+ Existing slack-based energy saving
277
+ Matrix decompositions have been designed to maximize their
278
+ usage on highly optimized BLAS-3 GPU kernels, so their
279
+ energy efficiency is inherently high, which leaves limited
280
+ room for further optimization. As for now, the most effective
281
+ class of energy-saving optimizations for matrix decomposi-
282
+ tions on CPU-GPU heterogeneous systems is DVFS-based
283
+ approaches, which aim to exploit different energy-saving tech-
284
+ niques when there are slacks.
285
+ TMU’
286
+ TMU
287
+ DtoH
288
+ HtoD
289
+ On GPU
290
+ On CPU
291
+ Slow down CPU
292
+ to reclaim slack
293
+ PD
294
+ (b) Single directional slack reclamation (SR)
295
+ PU'
296
+ PU
297
+ TMU’
298
+ TMU
299
+ DtoH
300
+ HtoD
301
+ On GPU
302
+ On CPU
303
+ Halt: Reduce to
304
+ lowest power state
305
+ PD
306
+ (a) Race-to-Halt (R2H)
307
+ PU'
308
+ PU
309
+ Race: Execute at
310
+ highest perf.
311
+ Figure 3. Existing slack-based energy saving
312
+ There are two main strategies for optimizing energy costs:
313
+ Race-to-Halt (R2H) [22, 37, 39] and Slack Reclamation (SR) [7].
314
+ As shown in Figure 3, the main idea of R2H is to timely re-
315
+ duce clock frequency to the minimum as soon as the tasks
316
+ on the non-critical path finish. The processor maintains its
317
+ minimum clock frequency during the slack to save energy.
318
+ This strategy is usually implemented by the hardware or the
319
+ operating system leveraging their workload monitoring ca-
320
+ pabilities. SR saves energy by slowing down the tasks on
321
+ the non-critical path. The reason this strategy can save en-
322
+ ergy is due to the relation between the dynamic power of
323
+ the processor and its clock frequency 𝑃𝑑𝑦𝑛𝑎𝑚𝑖𝑐 ∝ 𝑓 2.4 [17].
324
+ Theoretically, SR is able to save more energy compared with
325
+ R2H [7]. Since the processor’s clock frequency need to be
326
+ adjusted before the execution of each task and the length of
327
+ slack can change as shown in Figure 2, some form of compu-
328
+ tation pattern prediction is necessary. In the start-of-the-art
329
+ SR [7], the authors propose to predict computation patterns
330
+ leveraging algorithmic knowledge in matrix decompositions.
331
+ 2.3
332
+ Motivation of further improving energy saving
333
+ Despite a lot of research efforts have been made to improve
334
+ the energy saving of matrix decomposition on CPU-GPU
335
+ heterogeneous systems, it is still desirable to further improve
336
+ their energy saving since matrix decompositions are heavily
337
+ used in many scientific applications. Thus improving the
338
+ energy saving of matrix decomposition can lead to more
339
+ energy-efficient scientific computing.
340
+ 2.4
341
+ Challenges of further improving energy saving
342
+ 2.4.1
343
+ Performance degradation. DVFS is designed to en-
344
+ able performance-energy trade-off while maintaining pro-
345
+ cessor reliability. So, existing DVFS-based energy-saving
346
+ techniques can only be applied to tasks on the non-critical
347
+ path to avoid negatively impacting the overall performance.
348
+ This has already been extensively exploited by existing works.
349
+ To save even more energy, the only other choice is to apply
350
+ DVFS-based energy-saving techniques to tasks on the critical
351
+ path, however, this will inevitably lead to performance degra-
352
+ dation to the overall decomposition since modern CPU and
353
+ GPU processors tend to have better energy efficiency when
354
+ running at lower clock frequencies.
355
+ 2.4.2
356
+ Reliability degradation. Other approaches such as
357
+ processor undervolting can also be used to reduce the energy
358
+ cost of computation. Since it works by decreasing the core
359
+ supply voltage while maintaining the same clock frequencies,
360
+ it can save energy without performance degradation. However,
361
+ they can decrease system reliability [2, 51, 52]. Such reliabil-
362
+ ity degradation can be manifested as hard errors (e.g., process
363
+ or system crash) or SDCs (e.g., incorrect calculation, bit-flips
364
+ in memory cells), which can seriously decrease the reliabil-
365
+ ity of matrix decomposition. Although ABFT has been used
366
+ with undervolting in [2, 51] to improve the energy efficiency
367
+ of matrix-matrix multiplications and ensure computing cor-
368
+ rectness, applying existing ABFT techniques can still bring
369
+ considerable performance overhead. This overhead can be
370
+ especially high for matrix decompositions since the iterative
371
+ computing fashion is prone to error propagation, which needs
372
+ the strongest variant of ABFT, full checksum ABFT [4], to
373
+ provide sufficient protection.
374
+ 2.5
375
+ Research questions
376
+ In this work, we try to answer the following research ques-
377
+ tions:
378
+
379
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
380
+ Jieyang Chen, Xin Liang, Kai Zhao, Hadi Zamani Sabzi, Laxmi Bhuyan, and Zizhong Chen
381
+ RQ:1 How to further improve energy saving of matrix de-
382
+ compositions on CPU-GPU heterogeneous system beyond
383
+ the state-of-the-art works?
384
+ RQ:2 How to maximize energy saving for matrix decompo-
385
+ sition while maintaining both performance and reliability at
386
+ the same time?
387
+ RQ:3 How to enable performance-energy trade-off in matrix
388
+ decomposition?
389
+ Hardware
390
+ Profiling
391
+ Enhanced
392
+ Online Slack
393
+ Prediction
394
+ Online
395
+ Profiling
396
+ Matrix Decomposition
397
+ BSR
398
+ ABFT-OC
399
+ History
400
+ Profiling Data
401
+ Slack
402
+ Prediction
403
+ Model
404
+ At Offline
405
+ At Runtime
406
+ Information
407
+ Control
408
+ DVFS
409
+ Figure 4. Overview of our energy-saving matrix decomposi-
410
+ tion framework
411
+ 3
412
+ Design of Energy-Saving Matrix
413
+ Decomposition
414
+ In this work, we propose to build a matrix decomposition
415
+ framework that maximizes energy saving while maintaining
416
+ both performance and reliability at the same time. Figure
417
+ 4 shows the overview of our framework. We first focus on
418
+ enabling reliable computation when overclocking by cou-
419
+ pling ABFT with overclocking - ABFT-OC. To reduce fault
420
+ tolerance overhead, we further propose a lightweight adaptive-
421
+ ABFT technique that automatically adjusts its fault tolerance
422
+ strength according to the error rate. Next, based on ABFT-OC,
423
+ we propose a novel slack-based energy saving optimization
424
+ framework - BSR, which aims to exploit slack, to save en-
425
+ ergy and enable flexible Pareto efficient performance-energy
426
+ trade-off. Different from existing works, BSR reclaims slack
427
+ in both directions using both ABFT-OC and DVFS to save
428
+ more energy and enable performance improvement.
429
+ 3.1
430
+ Adaptive Algorithm-Based Fault Tolerance
431
+ Protected Overclocking (ABFT-OC)
432
+ To design a technique that maximize energy saving for ma-
433
+ trix decompositions, we seek hardware energy optimization
434
+ techniques beyond DVFS. DVFS has been extensively used
435
+ for energy saving by both hardware and applications. It op-
436
+ timizes energy efficiency by lowering the core voltage (𝑉𝑑𝑑)
437
+ with the decrease of clock frequency for reducing energy
438
+ consumption. However, lowering frequency can inevitably
439
+ cause performance degradation. Processor voltage guardband
440
+ optimization largely mitigates this issue by allowing lowering
441
+ of the core voltage without decreasing clock frequency or
442
+ overclocking without violating the hardware power limit.
443
+ 3.1.1
444
+ Voltage guardband optimization for overclocking.
445
+ In this work, we define overclocking as the processor state
446
+ 0.7
447
+ 0.8
448
+ 0.9
449
+ 1
450
+ 1.1
451
+ 1.2
452
+ 1.3
453
+ 2
454
+ 2.5
455
+ 3
456
+ 3.5
457
+ 4
458
+ 4.5
459
+ 5
460
+ 5.5
461
+ 500
462
+ 600
463
+ 700
464
+ 800
465
+ 900
466
+ 1000
467
+ 1100
468
+ 1200
469
+ 1300
470
+ 1400
471
+ 1500
472
+ 1600
473
+ 1700
474
+ 1800
475
+ 1900
476
+ 2000
477
+ 2100
478
+ 2200
479
+ Power Reduction Factor (⍺)
480
+ Energy Efficiency
481
+ (Gflops/Watt)
482
+ Clock Frequency (MHz)
483
+ Default Guardband
484
+ Optimized Guardband
485
+ Power Reduction Factor
486
+ Fault
487
+ Free
488
+ SDC
489
+ 𝑓!"#$%&!%'
490
+ 𝑓(#)*+&,
491
+ Fault Free
492
+ (a) GPU energy efficiency
493
+ (b) GPU SDC error rate
494
+ (c) CPU energy efficiency
495
+ 0
496
+ 20
497
+ 40
498
+ 60
499
+ 80
500
+ 500
501
+ 700
502
+ 900
503
+ 1100
504
+ 1300
505
+ 1500
506
+ 1700
507
+ 1900
508
+ 2100
509
+ Temperature (C)
510
+ Clock Frequency (MHz)
511
+ Default
512
+ Optimized
513
+ (d)
514
+ Maximum
515
+ sustained
516
+ GPU core temperature
517
+ 0
518
+ 20
519
+ 40
520
+ 60
521
+ 80
522
+ 1000
523
+ 1500
524
+ 2000
525
+ 2500
526
+ 3000
527
+ 3500
528
+ 4000
529
+ 4500
530
+ Temperature (C)
531
+ Clock Frequency (MHz)
532
+ Default
533
+ Optimized
534
+ (e)
535
+ Maximum
536
+ sustained
537
+ CPU core temperature
538
+ Figure 5. Profiling results of our testing CPU and GPU
539
+ where it sustains at a higher-than-default clock frequencies.
540
+ Figure 5 (a) shows the achievable overclocking frequency
541
+ range and their energy efficiency of our test GPU at different
542
+ clock frequencies after we apply voltage guardband optimiza-
543
+ tion. Please note unlike previous works that were based on
544
+ Windows-based GPU driver [27, 29, 51] where the core volt-
545
+ age can be directly adjusted and monitored, the Linux-based
546
+ GPU driver does not allow us to directly control and monitor
547
+ the GPU core voltage. Even though we find that optimizing
548
+ the voltage guardband of GPU on Linux is still achievable
549
+ through the clock offset command of the NVML API on
550
+
551
+ 0.7
552
+ (Num. of Errors/sec)
553
+ OD Error
554
+ 1D Error
555
+ 2D Error
556
+ 0.6
557
+ 0.5
558
+ Error Rate
559
+ 0.4
560
+ 0.3
561
+ 0.2
562
+ 0.1
563
+ 0
564
+ 500
565
+ 009
566
+ 700
567
+ 800
568
+ 006
569
+ 1000
570
+ 1200
571
+ 1300
572
+ 1400
573
+ 0
574
+ 1600
575
+ 1700
576
+ 1800
577
+ 1900
578
+ 2000
579
+ 2100
580
+ 2200
581
+ 5
582
+ Clock Frequency5
583
+ 1
584
+ n Factor (α)
585
+ fautoboost
586
+ foverclock
587
+ Energy Efficiency
588
+ 4
589
+ 0.9
590
+ Gflops/Watt)
591
+ Fault Free
592
+ 3
593
+ Fault Free
594
+ Power Reduction
595
+ 0.8
596
+ 2
597
+ 0.7
598
+ 1
599
+ fdef ault.
600
+ 0
601
+ 0.6
602
+ 1000 1500 2000 2500 3000 3500 4000 4500
603
+ Clock Frequency (MHz)
604
+ -Default Guardband
605
+ -Optimized Guardband
606
+ - Power Reduction FactorImproving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems
607
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
608
+ Linux-based GPU driver. We omit the details due to the page
609
+ limit. CPU undervolting can be directly achieved on the Linux
610
+ system. We set the offset of the CPU core voltage using a
611
+ third-party tool intel-undervolt. Figure 5 (c) shows
612
+ the CPU energy efficiency before and after we set the opti-
613
+ mized voltage guardband. Please note unlike our testing GPU,
614
+ our testing CPU can achieve overclocking with the default
615
+ guardband, but an optimized guardband can help us achieve
616
+ higher energy efficiency.
617
+ Finding the optimized guardband is done by gradually low-
618
+ ering specific power settings of CPU/GPU to the point where
619
+ energy efficiency is maximized without process or OS crash.
620
+ The whole process can be done in less than 30 minutes and it
621
+ only needs to be done once during software installation. As
622
+ optimized guardband can be workload-dependent, we specif-
623
+ ically use the workload in matrix decomposition i.e., TMU
624
+ on GPU and PD on CPU to find optimized guardband. Also,
625
+ as shown in Figure 5 (b), we observe that setting to extreme
626
+ high clock frequencies for the GPU can weaken the reliability
627
+ of computation e.g., SDCs. So, we propose to incorporate
628
+ fault tolerance with overclocking by designing ABFT-OC.
629
+ 3.1.2
630
+ Design of ABFT-OC. Reliable computation is the
631
+ foundation of our optimized matrix decomposition. As over-
632
+ clocking achieved through the use of optimized guardband
633
+ can lead to SDCs, we propose to use ABFT [4–6, 10–12, 14,
634
+ 19, 20, 32, 33, 40, 41, 47–50] to handle SDCs during matrix
635
+ decompositions. Since the processor power state is under con-
636
+ trol and the corresponding SDC error rate is known, SDC
637
+ error rate is predictable during matrix decompositions. So
638
+ we propose the first ABFT that can adjust its fault tolerance
639
+ strength and overhead at runtime based on the predicted error
640
+ rate to minimize fault tolerance overhead and ensure correct-
641
+ ness. SDC refers to the kind of error that only causes incorrect
642
+ calculation results without process or system crash. When
643
+ using our optimized guardband, the SDC is caused by insuffi-
644
+ cient core voltage supply when at high clock frequencies. The
645
+ rate of SDC can increase as we increase the clock frequency
646
+ when we apply a optimized guardband at the same time.
647
+ A
648
+ checksum(A)
649
+ A'
650
+ checksum(A')
651
+ OP
652
+ Update checksum
653
+ Encode
654
+ checksum
655
+ Can detect
656
+ and correct
657
+ 0D error
658
+ 0D error
659
+ A
660
+ checksum(A)
661
+ A'
662
+ checksum(A')
663
+ OP
664
+ Update checksum
665
+ Encode
666
+ checksum
667
+ Can detect
668
+ and correct
669
+ 1D error
670
+ 1D error
671
+ checksum(A)
672
+ checksum(A')
673
+ (a) Single-side checksum ABFT
674
+ (b) Full checksum ABFT
675
+ Figure 6. ABFT checksum for detecting and correcting SDCs
676
+ in matrix operations
677
+ Depending on where the hardware fault occurs, it may be
678
+ manifested as different kinds of SDC. For example, calcula-
679
+ tion error is usually caused by faults in the logic part of ALU
680
+ or FPU. Memory storage error is usually caused by faults
681
+ (e.g., bit flips) in the storage cells of DRAM, cache, or regis-
682
+ ters. For matrix operations, matrix elements can be repeatedly
683
+ accessed to obtain final results. If an element whose value
684
+ is corrupted gets repeatedly referenced, it may cause error
685
+ propagation. Depending on the cause of the error and the
686
+ computation pattern (i.e., how data is used/reused) of a matrix
687
+ operation, the error pattern can be different. The degrees of
688
+ error propagation [4] can be classified as: 0D, 1D, and 2D.
689
+ 0D: a single standalone error with no error propagation; 1D:
690
+ an error propagates to entire/part of one row/column; 2D: an
691
+ error propagates beyond one row/column. So, we distinguish
692
+ different degrees of error propagation in Figure 5.
693
+ Table 1. Theoretical estimation on ABFT fault coverage (FC)
694
+ on the TMU operation of the 5𝑡ℎ, 10𝑡ℎ, and 15𝑡ℎ iteration of
695
+ LU decomposition if we apply different clock frequencies.
696
+ Iter.
697
+ ABFT
698
+ 1800MHz
699
+ 1900MHz
700
+ 2000MHz
701
+ 2100MHz
702
+ 2200MHz
703
+ 5𝑡ℎ
704
+ Single
705
+ Fault-free
706
+ Full Coverage
707
+ 99.86%
708
+ 97.51%
709
+ 96.45%
710
+ Full
711
+ Fault-free
712
+ Full Coverage
713
+ Full Coverage
714
+ Full Coverage
715
+ Full Coverage
716
+ 10𝑡ℎ
717
+ Single
718
+ Fault-free
719
+ Full Coverage
720
+ 99.94%
721
+ 98.92%
722
+ 98.46%
723
+ Full
724
+ Fault-free
725
+ Full Coverage
726
+ Full Coverage
727
+ Full Coverage
728
+ Full Coverage
729
+ 15𝑡ℎ
730
+ Single
731
+ Fault-free
732
+ Full Coverage
733
+ 99.98%
734
+ 99.76%
735
+ 99.65%
736
+ Full
737
+ Fault-free
738
+ Full Coverage
739
+ Full Coverage
740
+ Full Coverage
741
+ Full Coverage
742
+ Algorithm 1: Adaptive-ABFT strategy
743
+ 1 Function ABFT-OC():
744
+ In
745
+ :Desired ABFT fault coverage 𝐹𝐶𝑑𝑒𝑠𝑖𝑟𝑒𝑑
746
+ In
747
+ :Desired GPU clock freq. 𝐹𝐺𝑃𝑈
748
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑
749
+ In
750
+ :Default GPU clock freq. 𝐹𝐺𝑃𝑈
751
+ 𝐵𝐴𝑆𝐸
752
+ In
753
+ :Predicted operation execution time 𝑇 ′𝐺𝑃𝑈
754
+ 2
755
+ 𝑆𝑖𝑛𝑔𝑙𝑒𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘 ← 𝐹𝐴𝐿𝑆𝐸
756
+ 3
757
+ 𝐹𝑢𝑙𝑙𝐴𝐵𝐹𝑇𝐶ℎ𝑒���𝑘 ← 𝐹𝐴𝐿𝑆𝐸
758
+ 4
759
+ while (𝜆𝐹𝐺𝑃𝑈
760
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑,0𝐷 > 0 || 𝜆𝐹𝐺𝑃𝑈
761
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑,1𝐷 > 0 ||
762
+ 𝜆𝐹𝐺𝑃𝑈
763
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑,2𝐷 > 0) && !𝑆𝑖𝑛𝑔𝑙𝑒𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘 &&
764
+ !𝐹𝑢𝑙𝑙𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘 do
765
+ 5
766
+ 𝑇𝐺𝑃𝑈
767
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑 = 𝑇 ′𝐺𝑃𝑈 ×
768
+ 𝐹𝐺𝑃𝑈
769
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑
770
+ 𝐹𝐺𝑃𝑈
771
+ 𝐵𝐴𝑆𝐸
772
+ 6
773
+ if 𝐹𝐶𝑠𝑖𝑛𝑔𝑙𝑒 (𝐹𝐺𝑃𝑈
774
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑,𝑇𝐺𝑃𝑈
775
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑) ⩾ 𝐹𝐶𝑑𝑒𝑠𝑖𝑟𝑒𝑑
776
+ then
777
+ 7
778
+ 𝑆𝑖𝑛𝑔𝑙𝑒𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘 = 𝑇𝑅𝑈𝐸
779
+ 8
780
+ else if 𝐹𝐶𝑓 𝑢𝑙𝑙 (𝐹𝐺𝑃𝑈
781
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑,𝑇𝐺𝑃𝑈
782
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑) ⩾ 𝐹𝐶𝑑𝑒𝑠𝑖𝑟𝑒𝑑
783
+ then
784
+ 9
785
+ 𝐹𝑢𝑙𝑙𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘 = 𝑇𝑅𝑈𝐸
786
+ 10
787
+ else
788
+ 11
789
+ 𝐹𝐺𝑃𝑈
790
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 = 𝐹𝐺𝑃𝑈
791
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 − 100𝑀𝐻𝑧
792
+ 12
793
+ end
794
+ 13
795
+ end
796
+ 14 return 𝐹𝐺𝑃𝑈
797
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑, 𝑆𝑖𝑛𝑔𝑙𝑒𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘, 𝐹𝑢𝑙𝑙𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘
798
+ ABFT is based on the idea that if we encode a certain
799
+ amount of matrix information in checksums before a matrix
800
+ operation and apply the same matrix operation to checksums,
801
+
802
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
803
+ Jieyang Chen, Xin Liang, Kai Zhao, Hadi Zamani Sabzi, Laxmi Bhuyan, and Zizhong Chen
804
+ the checksum relation would still hold for the resulting matrix.
805
+ By verifying the checksum relations after the operation, we
806
+ can detect and correct errors in the result matrix. Depend-
807
+ ing on how much information is encoded in checksums, the
808
+ fault tolerance strength is different. As shown in Figure 6,
809
+ there are two commonly schemes for checksum encoding: 1
810
+ Single side checksum encodes matrices along either rows or
811
+ columns. Since it only encodes the matrix in one dimension,
812
+ it brings relative lower overhead. However, it can only effi-
813
+ ciently tolerate 0D error pattern. 2 Full checksum encodes
814
+ matrices along both rows and column at the same time. Since
815
+ it encodes matrices in both dimensions, it brings stronger
816
+ protection i.e., both 0D and 1D error patterns. However, it
817
+ also brings higher fault tolerance overhead.
818
+ Given that the fault tolerance strength is limited, we must
819
+ determine suitable ABFT protection according to the error
820
+ rate and limit the clock frequency range to ensure all errors
821
+ can be detected and corrected with a high probability. Other-
822
+ wise, undetected or uncorrected errors would cause serious
823
+ error propagation later, which requires recovery with high
824
+ overhead. In this work, we find that it is useful to estimate the
825
+ probability that a certain kind of ABFT can detect and correct
826
+ all errors given different error rates at different overclocking
827
+ frequencies. In order to do that, we first define an error rate
828
+ function 𝑅 given clock frequency derived from our profiling
829
+ results in Figure 5: 𝜆𝑓 ,𝐸𝑟𝑟𝑇 𝑦𝑝𝑒 = 𝑅(𝑓 , 𝐸𝑟𝑟𝑇𝑦𝑝𝑒) where 𝜆 is
830
+ the error rate of a certain error type (𝐸𝑟𝑟𝑇𝑦𝑝𝑒). The error type
831
+ can be 0D, 1D, or 2D. 𝑓 is the processor clock frequency.
832
+ Assuming the rate is constant for a given clock frequency, we
833
+ treat the distribution of probability errors that occur during a
834
+ period of time as the Poisson distribution. So, the probability
835
+ of having 𝑘 errors in a certain type during a period of time
836
+ 𝑇 can be estimated using the Poisson distribution function:
837
+ 𝑝 =
838
+ 𝑒−𝜆𝑓 ,𝐸𝑟𝑟𝑇 𝑦𝑝𝑒𝑇 (𝜆𝑓 ,𝐸𝑟𝑟𝑇 𝑦𝑝𝑒𝑇)𝑖
839
+ 𝑖!
840
+ . Both single-side and full check-
841
+ sum encode the matrix for each matrix block individually.
842
+ They cannot tolerate more than one fault strike to a matrix
843
+ block during one error detection interval (i.e., one iteration of
844
+ matrix decomposition). Assuming the matrix is of size 𝑛 with
845
+ matrix block size 𝑏, single-side checksum ABFT can tolerate
846
+ up to 𝑆 = 𝑛
847
+ 𝑏 × 𝑛
848
+ 𝑏 0D errors, as long as two 0D errors do not
849
+ strike the same matrix block within one iteration of matrix
850
+ decomposition. Full checksum ABFT can tolerate up to 𝑆 0D
851
+ and 1D errors combined, as long as two 0D/1D errors do not
852
+ strike the same matrix block within one iteration of matrix de-
853
+ composition. Assuming error occurs randomly and uniformly
854
+ in time and space, we provide the theoretical estimation on
855
+ the probability that ABFT can detect and correct all errors in
856
+ one detection interval (i.e. Fault Coverage (FC)).
857
+ 𝐹𝐶𝑠𝑖𝑛𝑔𝑙𝑒 (𝑓 ,𝑇) =
858
+ � 𝑆
859
+ ∑︁
860
+ 𝑘=0
861
+ 𝑒−𝜆𝑓 ,0𝐷𝑇 (𝜆𝑓 ,0𝐷𝑇)𝑘
862
+ 𝑘!
863
+ 𝑘
864
+
865
+ 𝑖=0
866
+ 𝑆 − 𝑖
867
+ 𝑆
868
+
869
+ 𝑒−𝜆𝑓 ,1𝐷𝑇𝑒−𝜆𝑓 ,2𝐷𝑇
870
+ 𝐹𝐶𝑓 ����𝑙𝑙 (𝑓 ,𝑇) =
871
+ ��
872
+
873
+ 𝑆
874
+ ∑︁
875
+ 𝑘=0
876
+ 𝑆−𝑘
877
+ ∑︁
878
+ 𝑗=0
879
+ 𝑒−𝜆𝑓 ,0𝐷𝑇 (𝜆𝑓 ,0𝐷𝑇)𝑘
880
+ 𝑘!
881
+ 𝑒−𝜆𝑓 ,1𝐷𝑇 (𝜆𝑓 ,1𝐷𝑇)𝑗
882
+ 𝑗!
883
+ 𝑘+𝑗
884
+
885
+ 𝑖=0
886
+ 𝑆 − 𝑖
887
+ 𝑆
888
+ ��
889
+
890
+ 𝑒−𝜆𝑓 ,2𝐷𝑇
891
+ Table 1 show the example estimation results based on dif-
892
+ ferent GPU overclocking frequencies and the execution time
893
+ of the TMU operation in three selected iterations of the LU
894
+ decomposition. We define 𝐹𝐶 > 99.9999% as Full Cover-
895
+ age. Having the capability of fault coverage estimation, we
896
+ propose an adaptive-ABFT scheme. Unlike existing ABFT
897
+ works, which enable ABFT during the entire matrix decompo-
898
+ sition process, our adaptive-ABFT only enables ABFT error
899
+ detection and correction when the error rate is above 0. Al-
900
+ gorithm 1 shows the adaptive-ABFT strategy. We first check
901
+ the error rate function in Line 4. If the rate of any kind of
902
+ error is above zero, we check if applying ABFT can provide
903
+ enough fault coverage (Line 5 - 9). We prioritize single-side
904
+ ABFT over full ABFT to lower fault tolerance overhead. If
905
+ none of the ABFT schemes can provide enough fault cover-
906
+ age, we progressively lower the GPU clock frequency (Line
907
+ 11) until enough fault coverage is provided. Finally, we return
908
+ the adjusted clock frequency together with flags indicating
909
+ if we need to do a single or full ABFT check. Please note
910
+ ABFT-OC would also work for CPU. We exclusively apply it
911
+ to GPU in our algorithm since SDCs only occur to the GPU
912
+ on our test system.
913
+ 3.2
914
+ Bi-directional slack reclamation (BSR)
915
+ TMU’
916
+ TMU
917
+ DtoH
918
+ HtoD
919
+ On GPU
920
+ On CPU
921
+ Slow down CPU using
922
+ DVFS to reclaim slack
923
+ Speed up GPU using
924
+ ABFT-OC to reclaim slack
925
+ Performance
926
+ improvement
927
+ ABFT overhead
928
+ PD
929
+ PU'
930
+ PU
931
+ Figure 7. Bi-directional slack reclamation (BSR)
932
+ The current best energy-saving approach, single directional
933
+ slack reclamation (SR) [7], saves energy by slowing down
934
+ tasks on the non-critical paths via DVFS. This work pro-
935
+ poses a novel Bi-directional slack reclamation (BSR) energy-
936
+ saving technique that reclaims slacks in two directions at
937
+ the same time using both ABFT-OC and DVFS. Specifically,
938
+ BSR reclaims slacks by simultaneously slowing down tasks
939
+ on the non-critical path using DVFS and speeding up tasks on
940
+ the critical path using ABFT-OC. An illustration of BSR is
941
+ shown in Figure 7. Compared with SR, BSR brings three
942
+ major advantages: 1 potential higher energy saving through
943
+ both DVFS and ABFT-OC at the same time; 2 performance
944
+ improvement in addition to energy saving optimization; 3
945
+ enabling performance-energy consumption trade-off.
946
+ 3.2.1
947
+ Enhanced Algorithmic-based Slack Prediction. Slack
948
+ prediction is critical for making correct power status adjust-
949
+ ments so that energy saving can be maximized. As BSR en-
950
+ ables more opportunities for slack reclamation, it is more
951
+ critical for it to make accurate slack predictions. The state-of-
952
+ the-art algorithmic slack prediction was first proposed by [7].
953
+
954
+ Improving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems
955
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
956
+ Table 2. Ratios of time complexity of PD, PU, TMU, transfer
957
+ size, and ABFT-related operations between 𝑘𝑡ℎ and 𝑘 + 1𝑡ℎ
958
+ iteration. 𝑛 and 𝑏 are the total size and the block size of the
959
+ input matrix respectively. PU of Cholesky and QR are omitted
960
+ since they do not affect the slack
961
+ Operation
962
+ Computation
963
+ &
964
+ Checksum
965
+ Update
966
+ Data Transfer
967
+ Checksum Verifi-
968
+ cation
969
+ PD-Cho.
970
+ 1
971
+ 1
972
+ 1
973
+ TMU-Cho.
974
+ (1+𝑘)(1−
975
+ 𝑏
976
+ 𝑛−𝑘𝑏−𝑏 )
977
+ N/A
978
+ 1 −
979
+ 𝑏
980
+ 𝑛−𝑘𝑏−𝑏
981
+ PD-LU
982
+ 1 −
983
+ 6𝑏
984
+ 3𝑛−(3𝑘−1)𝑏
985
+ 1 −
986
+ 1
987
+ 𝑛−𝑘𝑏
988
+ 1 −
989
+ 1
990
+ 𝑛−𝑘𝑏
991
+ PU-LU
992
+ 1 −
993
+ 𝑏
994
+ 𝑛−𝑘𝑏−𝑏
995
+ N/A
996
+ 1 −
997
+ 𝑏
998
+ 𝑛−𝑘𝑏−𝑏
999
+ TMU-LU
1000
+ 1 −
1001
+ 2𝑏
1002
+ 𝑛−𝑘𝑏
1003
+ N/A
1004
+ 1 −
1005
+ 2𝑏
1006
+ 𝑛−𝑘𝑏
1007
+ PD-QR
1008
+ 1 −
1009
+ 𝑏
1010
+ 6𝑛−(6𝑘+1)𝑏
1011
+ 1 −
1012
+ 𝑏
1013
+ 𝑛−𝑘𝑏−𝑏
1014
+ 1 −
1015
+ 𝑏
1016
+ 𝑛−𝑘𝑏−𝑏
1017
+ TMU-QR
1018
+ 1
1019
+
1020
+ 𝑏
1021
+ 𝑛−𝑘𝑏−𝑏
1022
+
1023
+ 𝑏
1024
+ 𝑛−𝑘𝑏+𝑏
1025
+ +
1026
+ 𝑏2
1027
+ (𝑛−𝑘𝑏−𝑏) (𝑛−𝑘𝑏+𝑏)
1028
+ N/A
1029
+ 1
1030
+
1031
+ 𝑏
1032
+ 𝑛−𝑘𝑏−𝑏
1033
+
1034
+ 𝑏
1035
+ 𝑛−𝑘𝑏+𝑏
1036
+ +
1037
+ 𝑏2
1038
+ (𝑛−𝑘𝑏−𝑏) (𝑛−𝑘𝑏+𝑏)
1039
+ It mainly works by profiling the tasks in the 1𝑠𝑡 iteration of
1040
+ decomposition and using the profiled time together with ratios
1041
+ of computational time complexity between 𝑘𝑡ℎ iteration and
1042
+ the 1𝑠𝑡 to predict the execution time of tasks in the 𝑘𝑡ℎ itera-
1043
+ tion of decomposition. By leveraging algorithmic knowledge
1044
+ and profiling results, algorithmic slack prediction can achieve
1045
+ much higher prediction accuracy compared with statistical-
1046
+ learning-based approaches and hardware-based approaches.
1047
+ However, we find that the accuracy of current algorithmic
1048
+ slack prediction highly relies on the profiling accuracy of the
1049
+ 1𝑠𝑡 iteration and the assumption that computational efficiency
1050
+ stays constant across different iterations on a given processor.
1051
+ As the measurement of the 1𝑠𝑡 iteration can be inaccurate
1052
+ (e.g., when it is short) and the computational efficiency of
1053
+ tasks can also change considerably throughout the decomposi-
1054
+ tion process, all these inaccuracies can accumulate and cause
1055
+ large prediction errors in the latter part of the decomposition
1056
+ process, which lead to wrong slack reclamation decisions.
1057
+ In BSR, we propose an enhanced algorithmic-based slack
1058
+ prediction that greatly improves slack prediction accuracy.
1059
+ The enhanced algorithmic-based slack prediction rely on the
1060
+ profiled execution time of the 𝑝 last neighbor iterations to pre-
1061
+ dict the execution time of the current iteration to reduce the
1062
+ negative impacts bring by inaccurate profiling and changes
1063
+ in computational efficiency since tasks in neighbor iterations
1064
+ tend to have similar input sizes and thus similar computa-
1065
+ tional efficiencies. Since a closer neighbor has a more ac-
1066
+ curate estimation of computational efficiency, we apply dif-
1067
+ ferent weights to different profiling results in our enhanced
1068
+ algorithmic-based slack prediction. Specifically, the execution
1069
+ time of a task in 𝑘𝑡ℎ iteration (𝑇
1070
+ ′𝑂𝑃
1071
+ 𝑘
1072
+ ) is predicted as:
1073
+ 𝑇
1074
+ ′𝑂𝑃
1075
+ 𝑘
1076
+ = 𝑤1𝑟𝑂𝑃
1077
+ 𝑘−1,𝑘𝑇𝑂𝑃
1078
+ 𝑘−1 + 𝑤2𝑟𝑂𝑃
1079
+ 𝑘−2,𝑘𝑇𝑂𝑃
1080
+ 𝑘−21 + ... + 𝑤𝑝𝑟𝑂𝑃
1081
+ 𝑘−𝑝,𝑘𝑇𝑂𝑃
1082
+ 𝑘−𝑝
1083
+ where 𝑟𝑂𝑃
1084
+ 𝑗,𝑘 is the ratio of theoretical time complexity of 𝑂𝑃
1085
+ between 𝑗𝑡ℎ and 𝑘𝑡ℎ iteration, which can be calculated based
1086
+ on the algorithm time complexity and relative change of the
1087
+ input sizes of 𝑂𝑃. Table 2 shows the ratios of key components
1088
+ of matrix decompositions. We omit the calculation process
1089
+ due to the page limit.𝑇𝑂𝑃
1090
+ 𝑘−𝑖 is the actual profiled execution time
1091
+ of 𝑂𝑃 of the 𝑖𝑡ℎ last neighbor. 𝑤1 is the weight we applied to
1092
+ the 𝑖𝑡ℎ last neighbor. Through empirical study, we find that
1093
+ 𝑝 = 4 and 𝑤1 = 1
1094
+ 2,𝑤2 = 1
1095
+ 4,𝑤3 = 1
1096
+ 8,𝑤4 = 1
1097
+ 8 can help provide
1098
+ enough prediction accuracy for energy saving. When ABFT
1099
+ is applied, the slack of the 𝑘𝑡ℎ iteration is predicted as:
1100
+ 𝑠𝑙𝑎𝑐𝑘𝑘 = 𝑇
1101
+ ′𝑇𝑀𝑈
1102
+ 𝑘
1103
+ +𝑇
1104
+ ′𝑇𝑀𝑈 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚 𝑢𝑝𝑑𝑎𝑡𝑒
1105
+ 𝑘
1106
+ +𝑇
1107
+ ′𝑇𝑀𝑈 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚 𝑣𝑒𝑟 𝑓
1108
+ 𝑘
1109
+ 𝑇
1110
+ ′𝑃𝑈
1111
+ 𝑘
1112
+ +𝑇
1113
+ ′𝑃𝑈 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚 𝑢𝑝𝑑𝑎𝑡𝑒
1114
+ 𝑘
1115
+ +𝑇
1116
+ ′𝑃𝑈 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚 𝑣𝑒𝑟 𝑓
1117
+ 𝑘
1118
+ −𝑇
1119
+ ′𝑃𝐷
1120
+ 𝑘
1121
+ −𝑇
1122
+ ′𝑃𝐷 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚 𝑢𝑝𝑑𝑎𝑡𝑒
1123
+ 𝑘
1124
+ −𝑇
1125
+ ′𝑃𝐷 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚 𝑣𝑒𝑟 𝑓
1126
+ 𝑘
1127
+ −𝑇
1128
+ ′𝐷𝑎𝑡𝑎 𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟
1129
+ 𝑘
1130
+ −𝑇
1131
+ ′𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟 𝑐ℎ𝑒𝑐𝑘𝑠𝑢𝑚
1132
+ 𝑘
1133
+ 3.2.2
1134
+ Bi-directional slack reclamation strategies. Com-
1135
+ pared with SR, BSR offers more flexibility by reclaiming
1136
+ slacks from both directions, so the fractions of slacks that
1137
+ are reclaimed by the two tasks are adjustable, which in turn
1138
+ controls the performance-energy efficiency trade-off. So, we
1139
+ define reclamation ratio (𝑟) to be the fraction of the slack
1140
+ we try to reclaim by speeding up the task on the critical path
1141
+ and 1 − 𝑟 to be the fraction we try to reclaim by slowing
1142
+ down the task on the non-critical path. Algorithm 2 shows
1143
+ our BSR algorithm that makes decisions at the beginning of
1144
+ each matrix decomposition iteration. The execution time of
1145
+ tasks and slack are predicted in Line 3 - 4 using our enhanced
1146
+ algorithmic-based slack prediction. Given reclamation ratio 𝑟,
1147
+ we calculate the desired execution time of tasks on CPU and
1148
+ GPU in Line 5 - 11. We also consider the overhead of DVFS
1149
+ operations in our calculation to minimize the impact on per-
1150
+ formance. Line 12 - 15 calculate the desired CPU/GPU clock
1151
+ frequencies and limit them within the available frequency
1152
+ range. Line 16 - 17 calculates the projected execution time
1153
+ if we apply the desired frequencies. Note that the projected
1154
+ time may be different from the desired time since desired
1155
+ frequencies could be out of the available range. Finally, we
1156
+ make decisions on whether or not we adjust CPU/GPU clock
1157
+ frequencies in Line 18 - 22. If the projected time suggests
1158
+ that it can make a negative impact on the performance, it
1159
+ will skip frequency adjustment for this iteration i.e., setting
1160
+ AdjustCPU/GPU to FALSE. Note that this does not mean
1161
+ we do not reclaim slack of this iteration. Since we still keep
1162
+ the adjusted CPU/GPU frequencies from the last iteration,
1163
+ the partial of slack can still be reclaimed. This strategy en-
1164
+ sures we reclaim most of the slacks while minimizing perfor-
1165
+ mance impact. Line 23 invokes our adaptive-ABFT strategy
1166
+ for overclocking. Finally, we return the final decisions re-
1167
+ garding CPU/GPU clock frequency adjustments and ABFT
1168
+ protection strength for the current iteration.
1169
+
1170
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
1171
+ Jieyang Chen, Xin Liang, Kai Zhao, Hadi Zamani Sabzi, Laxmi Bhuyan, and Zizhong Chen
1172
+ Algorithm 2: BSR strategy
1173
+ 1 Function BSR():
1174
+ In
1175
+ :reclamation ratio 𝑟
1176
+ In
1177
+ :iteration 𝑘
1178
+ In
1179
+ :GPU DVFS latency 𝐿𝐺𝑃𝑈
1180
+ In
1181
+ :CPU DVFS latency 𝐿𝐶𝑃𝑈
1182
+ In
1183
+ :Desired ABFT fault coverage 𝐹𝐶𝑑𝑒𝑠𝑖𝑟𝑒𝑑
1184
+ 2
1185
+ Apply optimized guardband for both CPU and
1186
+ GPU
1187
+ 3
1188
+ 𝑇 ′𝐶𝑃𝑈 ,𝑇 ′𝐺𝑃𝑈 , 𝑇 ′𝐷𝑎𝑡𝑎𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟 ←
1189
+ EnhancedAlgorithmicPrediction(𝑘)
1190
+ 4
1191
+ 𝑠𝑙𝑎𝑐𝑘𝑘 ←= 𝑇 ′𝐺𝑃𝑈 −𝑇 ′𝐶𝑃𝑈 −𝑇 ′𝐷𝑎𝑡𝑎𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟
1192
+ 5
1193
+ if 𝑠𝑙𝑎𝑐𝑘𝑘 > 0 then
1194
+ 6
1195
+ 𝑇𝐺𝑃𝑈
1196
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ← 𝑇 ′𝐺𝑃𝑈 − (𝑠𝑙𝑎𝑐𝑘𝑘 × 𝑟) − 𝐿𝐺𝑃𝑈
1197
+ 7
1198
+ 𝑇𝐶𝑃𝑈
1199
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ← 𝑇𝐺𝑃𝑈
1200
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 − 𝐿𝐶𝑃𝑈 −𝑇 ′𝐷𝑎𝑡𝑎𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟
1201
+ 8
1202
+ else
1203
+ 9
1204
+ 𝑇𝐶𝑃𝑈
1205
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ← 𝑇 ′𝐶𝑃𝑈 − (𝑠𝑙𝑎𝑐𝑘𝑘 × 𝑟) − 𝐿𝐶𝑃𝑈
1206
+ 10
1207
+ 𝑇𝐺𝑃𝑈
1208
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ← 𝑇𝐶𝑃𝑈
1209
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 − 𝐿𝐺𝑃𝑈 +𝑇 ′𝐷𝑎𝑡𝑎𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟
1210
+ 11
1211
+ end
1212
+ 12
1213
+ 𝐹𝐺𝑃𝑈
1214
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ← 𝑅𝑜𝑢𝑛𝑑𝑢𝑝(𝐹𝐺𝑃𝑈
1215
+ 𝐵𝐴𝑆𝐸 × 𝑇 ′𝐺𝑃𝑈
1216
+ 𝑇𝐺𝑃𝑈
1217
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 , 100𝑀ℎ𝑧)
1218
+ 13
1219
+ 𝐹𝐶𝑃𝑈
1220
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ← 𝑅𝑜𝑢𝑛𝑑𝑢𝑝(𝐹𝐶𝑃𝑈
1221
+ 𝐵𝐴𝑆𝐸 × 𝑇 ′𝐶𝑃𝑈
1222
+ 𝑇𝐶𝑃𝑈
1223
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 , 100𝑀ℎ𝑧)
1224
+ 14
1225
+ 𝐹𝐺𝑃𝑈
1226
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 = 𝐿𝑖𝑚𝑖𝑡𝑇𝑜𝑅𝑎𝑛𝑔𝑒(𝐹𝐺𝑃𝑈
1227
+ 𝑚𝑖𝑛 , 𝐹𝐺𝑃𝑈
1228
+ 𝑚𝑎𝑥 )
1229
+ 15
1230
+ 𝐹𝐶𝑃𝑈
1231
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 = 𝐿𝑖𝑚𝑖𝑡𝑇𝑜𝑅𝑎𝑛𝑔𝑒(𝐹𝐶𝑃𝑈
1232
+ 𝑚𝑖𝑛 , 𝐹𝐶𝑃𝑈
1233
+ 𝑚𝑎𝑥 )
1234
+ 16
1235
+ 𝑇𝐺𝑃𝑈
1236
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑 = 𝑇 ′𝐺𝑃𝑈 ×
1237
+ 𝐹𝐺𝑃𝑈
1238
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑
1239
+ 𝐹𝐺𝑃𝑈
1240
+ 𝐵𝐴𝑆𝐸
1241
+ 17
1242
+ 𝑇𝐶𝑃𝑈
1243
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑 = 𝑇 ′𝐶𝑃𝑈 ×
1244
+ 𝐹𝐶𝑃𝑈
1245
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑
1246
+ 𝐹𝐶𝑃𝑈
1247
+ 𝐵𝐴𝑆𝐸
1248
+ 18
1249
+ 𝑇𝑚𝑎𝑥 = 𝑚𝑎𝑥(𝑇 ′𝐺𝑃𝑈,𝑇 ′𝐶𝑃𝑈 +𝑇 ′𝐷𝑎𝑡𝑎𝑇𝑟𝑎𝑛𝑠𝑓 𝑒𝑟)
1250
+ 19
1251
+ if 𝑇𝐺𝑃𝑈
1252
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑 > 𝑇𝑚𝑎𝑥 then 𝐴𝑑 𝑗𝑢𝑠𝑡𝐺𝑃𝑈 ← 𝐹𝐴𝐿𝑆𝐸;
1253
+ 20
1254
+ else 𝐴𝑑 𝑗𝑢𝑠𝑡𝐺𝑃𝑈 ← 𝑇𝑅𝑈𝐸;
1255
+ 21
1256
+ if 𝑇𝐶𝑃𝑈
1257
+ 𝑝𝑟𝑜 𝑗𝑒𝑐𝑡𝑒𝑑 > 𝑇𝑚𝑎𝑥 then 𝐴𝑑 𝑗𝑢𝑠𝑡𝐶𝑃𝑈 ← 𝐹𝐴𝐿𝑆𝐸;
1258
+ 22
1259
+ else 𝐴𝑑 𝑗𝑢𝑠𝑡𝐶𝑃𝑈 ← 𝑇𝑅𝑈 𝐸;
1260
+ 23
1261
+ 𝐹𝐺𝑃𝑈
1262
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑, 𝑆𝑖𝑛𝑔𝑙𝑒𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘, 𝐹𝑢𝑙𝑙𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘 ←
1263
+ ABFT-OC(𝐹𝐶𝑑𝑒𝑠𝑖𝑟𝑒𝑑, 𝐹𝐺𝑃𝑈
1264
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑, 𝐹𝐺𝑃𝑈
1265
+ 𝐵𝐴𝑆𝐸, 𝑇 ′𝐺𝑃𝑈 )
1266
+ 24 return 𝐴𝑑 𝑗𝑢𝑠𝑡𝐶𝑃𝑈 , 𝐴𝑑 𝑗𝑢𝑠𝑡𝐺𝑃𝑈 , 𝐹𝐶𝑃𝑈
1267
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑 ,𝐹𝐺𝑃𝑈
1268
+ 𝑑𝑒𝑠𝑖𝑟𝑒𝑑,
1269
+ 𝑆𝑖𝑛𝑔𝑙𝑒𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘, 𝐹𝑢𝑙𝑙𝐴𝐵𝐹𝑇𝐶ℎ𝑒𝑐𝑘
1270
+ 3.2.3
1271
+ Theoretical performance improvement and energy
1272
+ saving analysis. Next, we provide a theoretical analysis of
1273
+ performance improvement and energy saving. With losing
1274
+ generality, we assume that the slack on the CPU in the fol-
1275
+ lowing discussion for simplification. The performance im-
1276
+ provement mainly comes from speeding up the tasks on
1277
+ the critical path. So, the performance improvement of iter-
1278
+ ation 𝑘 can be simply calculated as: Δ𝑇 = 𝑇𝑜𝑙𝑑
1279
+ 𝑘
1280
+ − 𝑇 𝑛𝑒𝑤
1281
+ 𝑘
1282
+ =
1283
+ 𝑇𝐺𝑃𝑈
1284
+ 𝑘
1285
+ − (𝑇𝐺𝑃𝑈
1286
+ 𝑘
1287
+ − 𝑠𝑙𝑎𝑐𝑘𝑘 × 𝑟) = 𝑠𝑙𝑎𝑐𝑘𝑘 × 𝑟. This suggests that
1288
+ higher 𝑟 leads to higher performance. As for energy consump-
1289
+ tion, the theoretical amount of energy saving on the CPU
1290
+ when adopting BSR with reclamation ratio 𝑟 in the iteration 𝑘
1291
+ can be estimated as:
1292
+ Δ𝐸𝐶𝑃𝑈
1293
+ 𝑘
1294
+ = Δ𝐸𝐶𝑃𝑈 _𝑑𝑦𝑛𝑎𝑚𝑖𝑐
1295
+ 𝑘
1296
+ + Δ𝐸𝐶𝑃𝑈 _𝑠𝑡𝑎𝑡𝑖𝑐
1297
+ 𝑘
1298
+ Δ𝐸𝐶𝑃𝑈 _𝑑𝑦𝑛𝑎𝑚𝑖𝑐
1299
+ 𝑘
1300
+ = 𝐸𝐶𝑃𝑈 _𝑑𝑦𝑛𝑎𝑚𝑖𝑐_𝑜𝑙𝑑
1301
+ 𝑘
1302
+ − 𝐸𝐶𝑃𝑈 _𝑑𝑦𝑛𝑎𝑚𝑖𝑐_𝑛𝑒𝑤
1303
+ 𝑘
1304
+ =
1305
+ 𝑑𝐶𝑃𝑈 𝑃𝐶𝑃𝑈
1306
+ 𝑡𝑜𝑡𝑎𝑙𝑇𝐶𝑃𝑈
1307
+ 𝑘
1308
+
1309
+ 𝛼𝐶𝑃𝑈
1310
+ � 𝑓 𝐶𝑃𝑈 _𝑛𝑒𝑤
1311
+ 𝑓 𝐶𝑃𝑈 _𝑜𝑙𝑑
1312
+ �2.4
1313
+ 𝑑𝐶𝑃𝑈 𝑃𝐶𝑃𝑈
1314
+ 𝑡𝑜𝑡𝑎𝑙 (𝑇𝐶𝑃𝑈
1315
+ 𝑘
1316
+ + 𝑠𝑙𝑎𝑐𝑘𝑘 (1 − 𝑟)) =
1317
+ 𝑑𝐶𝑃𝑈 𝑃𝐶𝑃𝑈
1318
+ 𝑡𝑜𝑡𝑎𝑙𝑇𝐶𝑃𝑈
1319
+ 𝑘
1320
+
1321
+ 𝛼𝐶𝑃𝑈
1322
+
1323
+ 𝑇𝐶𝑃𝑈
1324
+ 𝑘
1325
+ 𝑇𝐶𝑃𝑈
1326
+ 𝑘
1327
+ + 𝑠𝑙𝑎𝑐𝑘𝑘 (1 − 𝑟)
1328
+ �2.4
1329
+ 𝑑𝐶𝑃𝑈 𝑃𝐶𝑃𝑈
1330
+ 𝑡𝑜𝑡𝑎𝑙
1331
+ (𝑇𝐶𝑃𝑈
1332
+ 𝑘
1333
+ + 𝑠𝑙𝑎𝑐𝑘𝑘 (1 − 𝑟)) =
1334
+
1335
+ 1 − 𝛼𝐶𝑃𝑈
1336
+ (𝑇𝐶𝑃𝑈
1337
+ 𝑘
1338
+ )1.4
1339
+ (𝑇𝐶𝑃𝑈
1340
+ 𝑘
1341
+ + 𝑠𝑙𝑎𝑐𝑘𝑘 × (1 − 𝑟))1.4
1342
+
1343
+ 𝑑𝐶𝑃𝑈 𝑃𝐶𝑃𝑈𝑇𝐶𝑃𝑈
1344
+ 𝑘
1345
+ Δ𝐸𝐶𝑃𝑈 _𝑠𝑡𝑎𝑡𝑖𝑐
1346
+ 𝑘
1347
+ = (𝑇𝐶𝑃𝑈
1348
+ 𝑘
1349
+ − 𝛼𝐶𝑃𝑈 (𝑇𝐶𝑃𝑈
1350
+ 𝑘
1351
+ + 𝑠𝑙𝑎𝑐𝑘𝑘 (1 − 𝑟)))
1352
+ (1 − 𝑑𝐶𝑃𝑈 )𝑃𝐶𝑃𝑈
1353
+ 𝑡𝑜𝑡𝑎𝑙
1354
+ Similarly, we can estimate the energy saving on GPUs as
1355
+ follows:
1356
+ Δ𝐸𝐺𝑃𝑈
1357
+ 𝑘
1358
+ =
1359
+
1360
+ 1 − 𝛼𝐺𝑃𝑈
1361
+ (𝑇𝐺𝑃𝑈
1362
+ 𝑘
1363
+ )1.4
1364
+ (𝑇𝐺𝑃𝑈
1365
+ 𝑘
1366
+ − 𝑠𝑙𝑎𝑐𝑘 × 𝑟)1.4
1367
+
1368
+ 𝑑𝐺𝑃𝑈 𝑃𝐺𝑃𝑈
1369
+ 𝑡𝑜𝑡𝑎𝑙𝑇𝐺𝑃𝑈
1370
+ 𝑘
1371
+ +
1372
+ (𝑇𝐺𝑃𝑈
1373
+ 𝑘
1374
+ − 𝛼𝐺𝑃𝑈 (𝑇𝐺𝑃𝑈
1375
+ 𝑘
1376
+ − 𝑠𝑙𝑎𝑐𝑘𝑘 × 𝑟))(1 − 𝑑𝐺𝑃𝑈 )𝑃𝐺𝑃𝑈
1377
+ 𝑡𝑜𝑡𝑎𝑙
1378
+ Where 𝛼𝐶𝑃𝑈 /𝐺𝑃𝑈 are total power reduction factors when
1379
+ we use optimized guardband of CPU/GPU. We measure that
1380
+ in our hardware profiling work Figure 5. For clock frequen-
1381
+ cies out of the default range, we use constant values of the last
1382
+ measured value to estimate (dashed line). 𝑇𝐶𝑃𝑈 /𝐺𝑃𝑈
1383
+ 𝑘
1384
+ are the
1385
+ original task execution time of CPU/GPU. 𝑃𝐶𝑃𝑈 /𝐺𝑃𝑈
1386
+ 𝑡𝑜𝑡𝑎𝑙
1387
+ are the
1388
+ total power of CPU/GPU at the default guardband and clock
1389
+ frequencies. 𝑑𝐶𝑃𝑈 /𝐺𝑃𝑈 are the ratios of the CPU/GPU dy-
1390
+ namic power in the total power consumption. The change of
1391
+ CPU/GPU dynamic power is estimated using: 𝑃𝑑𝑦𝑛𝑎𝑚𝑖𝑐 ∝ 𝑓 2.4
1392
+ [17]. When the critical path is on the GPU, it is for sure we
1393
+ can save energy on the CPU. However, whether or not we can
1394
+ save energy on the GPU depends on 𝛼𝐺𝑃𝑈 and 𝑟. Assuming
1395
+ power reduction factor 𝛼𝐺𝑃𝑈 is fixed and minimized by apply-
1396
+ ing optimized processor guardband, then the reclamation ratio
1397
+ 𝑟 controls the trade-off between performance improvement
1398
+ and energy consumption. Higher 𝑟 leads to higher perfor-
1399
+ mance but less energy saving, and vice versa. The highest
1400
+ energy saving can be achieved with 𝑟𝑚𝑎𝑥_𝑒𝑛𝑒𝑟𝑔𝑦 = 0 without
1401
+ performance improvement. The max 𝑟 that achieves maxi-
1402
+ mum without impacting energy efficiency is hard to be solved
1403
+ directly. So, we use a numerical approach to solve for 𝑟. By
1404
+ solving Δ𝐸𝐶𝑃𝑈
1405
+ 𝑘
1406
+ + Δ𝐸𝐺𝑃𝑈
1407
+ 𝑘
1408
+ = 0 using Newton’s method, we are
1409
+ able to get estimated solutions. For example, for decomposi-
1410
+ tion with input 30730×30720, the averaged reclamation ratios
1411
+ across all iterations are 0.28 for Cholesky, 0.26 for LU, and
1412
+
1413
+ Improving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems
1414
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
1415
+ 0.31 for QR, which approximately matches our experimental
1416
+ results in Figure 11.
1417
+ 4
1418
+ Experimental Evaluation
1419
+ 4.1
1420
+ Evaluation Methodology
1421
+ We compare BSR with two state-of-the-art energy-saving
1422
+ approaches R2H and SR together with the original design in
1423
+ the MAGMA library.
1424
+ • Original: The original matrix decompositions in the
1425
+ state-of-the-art MAGMA library. We keep the CPU/GPU
1426
+ clock frequency fixed at the default (autoboost dis-
1427
+ abled).
1428
+ • R2H: The original matrix decompositions in the state-
1429
+ of-the-art MAGMA library with CPU/GPU autoboost
1430
+ feature enabled. The processor clock frequency is dy-
1431
+ namically set according to the workload.
1432
+ • SR: The state-of-the-art energy efficient matrix decom-
1433
+ positions using single directional slack reclamation [7].
1434
+ • BSR: Our proposed matrix decomposition with BSR en-
1435
+ ergy efficiency optimization and ABFT-OC. Clock fre-
1436
+ quencies can reach greater ranch where SDCs can occur
1437
+ but are correctable by ABFT.
1438
+ All the above versions are implemented for Cholesky, LU,
1439
+ and QR decomposition for double precision inputs with block
1440
+ size tuned for performance.
1441
+ Table 3. Hardware/System Configuration for Experiments.
1442
+ Processor
1443
+ Intel Core i7-9700K
1444
+ NVIDIA RTX 2080 Ti
1445
+ Base Clock
1446
+ 3.5(↑by0.1)GHz
1447
+ 1.3(↑by 0.1)GHz
1448
+ Overclocking
1449
+ 3.6-4.5(↑by0.1)GHz
1450
+ 1.4-2.2(↑by 0.1)GHz
1451
+ Memory
1452
+ 32 GB RAM
1453
+ 12 GB RAM
1454
+ Default guard-
1455
+ band
1456
+ Vcore offset: 0mV
1457
+ Graphics clock offset: 0
1458
+ Optimized
1459
+ guardband
1460
+ Vcore offset: -150mV
1461
+ Graphics clock offset: +200
1462
+ 0%
1463
+ 10%
1464
+ 20%
1465
+ 30%
1466
+ 40%
1467
+ 50%
1468
+ 2
1469
+ 12
1470
+ 22
1471
+ 32
1472
+ 42
1473
+ 52
1474
+ Slack Prediction Error
1475
+ Iteration
1476
+ Profile First Iteration
1477
+ Online Calibration
1478
+ Figure 8. Slack prediction error of the LU decomposition
1479
+ using different approaches
1480
+ 4.2
1481
+ Experimental Environment
1482
+ All experiments are performed on a power-aware CPU-GPU
1483
+ server. Table 3 lists hardware configuration of the experimen-
1484
+ tal platform and system tools used for adjusting CPU/GPU
1485
+ guardband/clock frequencies and for measuring the energy
1486
+ consumption of CPU and GPU. Limited to the capability of
1487
+ our test platform, we only measure the energy consumption of
1488
+ 1
1489
+ 11
1490
+ 21
1491
+ 31
1492
+ 41
1493
+ 51
1494
+ Decomposition Iteration
1495
+ No FT
1496
+ Single-side ABFT
1497
+ Full ABFT
1498
+ No FT
1499
+ Single-ABFT
1500
+ Full-ABFT
1501
+ Adaptive
1502
+ ABFT
1503
+ Overhead Correct
1504
+ 0%
1505
+ 23.28%
1506
+ 8%
1507
+ 76.11%
1508
+ 12%
1509
+ 100.00%
1510
+ 4%
1511
+ 100.00%
1512
+ Figure 9. Comparing overhead and correctness when differ-
1513
+ ent ABFT scheme is applied in double precision LU decom-
1514
+ position with reclamation ratio 𝑟 = 0.25
1515
+ the CPU package and GPU device. For accurate measurement
1516
+ of energy consumption and stable SDCs error rate at reduced
1517
+ guardband, we adjust the external cooling system to stabilize
1518
+ the CPU/GPU temperature at 45°C and 55°C respectively.
1519
+ From the software perspective, all matrix decomposition ver-
1520
+ sions are built with GCC 7.4.0 and CUDA 11.6 with the
1521
+ highest optimization flags turned on. NVIDIA cuBLAS 11.1
1522
+ and Intel MKL 2020 are used as linear algebra computing ker-
1523
+ nels. MKL is configured to use all CPU cores. The operating
1524
+ system is Ubuntu 18.04.
1525
+ 4.3
1526
+ Evaluation Results
1527
+ 4.3.1
1528
+ Online slack prediction accuracy comparison. Fig-
1529
+ ure 8 shows the relative online prediction error using only the
1530
+ first iteration to predict [7] vs. our enhanced slack prediction
1531
+ approach proposed in this work. We can see both approaches
1532
+ can give less than 10% relative error for the first 2/3 of the
1533
+ iterations. However, since [7] only depends on the profiling
1534
+ result of the first iteration, the error caused by profiling and
1535
+ prediction will accumulate and become significant (about
1536
+ 11.4% on average) as the decomposition progresses. Our en-
1537
+ hanced algorithmic slack prediction uses an online calibration
1538
+ approach to effectively avoid error from accumulating and
1539
+ reducing relative prediction error to around 4% on average.
1540
+ 4.3.2
1541
+ ABFT overhead and correctness comparison. Fig-
1542
+ ure 9 shows the computational overhead and probability of
1543
+ computing correctness when different ABFT schemes are
1544
+ applied. We use double precision LU decomposition with
1545
+ BSR reclamation ratio 𝑟 = 0.25 as an example. The correct-
1546
+ ness is estimated by repeating the decomposition 100,000
1547
+ times and comparing the results. We observe similar results
1548
+ on other types of decompositions. Due to relative short slack
1549
+ in the later part of decomposition, higher GPU clock frequen-
1550
+ cies are needed, which reach degrees of overclocking that
1551
+ can have SDC errors. If we do not apply any fault tolerance,
1552
+ only 23.28% of the overall matrix decomposition tests out-
1553
+ put correct results. If we apply single-side checksum ABFT,
1554
+ it improves the percentage of tests with correct output to
1555
+ 76.11% since 0D errors can be effectively detected and cor-
1556
+ rected. However, 1D error cannot be handled by single-side
1557
+
1558
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
1559
+ Jieyang Chen, Xin Liang, Kai Zhao, Hadi Zamani Sabzi, Laxmi Bhuyan, and Zizhong Chen
1560
+ 0
1561
+ 500
1562
+ 1000
1563
+ 1500
1564
+ 2000
1565
+ 2500
1566
+ 3000
1567
+ CPU
1568
+ GPU
1569
+ CPU
1570
+ GPU
1571
+ CPU
1572
+ GPU
1573
+ CPU
1574
+ GPU
1575
+ CPU
1576
+ GPU
1577
+ CPU
1578
+ GPU
1579
+ CPU
1580
+ GPU
1581
+ CPU
1582
+ GPU
1583
+ CPU
1584
+ GPU
1585
+ Org
1586
+ R2H
1587
+ SR
1588
+ 0
1589
+ 0.05
1590
+ 0.1
1591
+ 0.15
1592
+ 0.2
1593
+ 0.25
1594
+ Time (ms)
1595
+ PD
1596
+ Data Transfer
1597
+ TMU+PU
1598
+ ABFT Overhead
1599
+ Frequency Change Overhead
1600
+ BSR
1601
+ (a) Time breakdown (2𝑛𝑑 iteration)
1602
+ 0
1603
+ 200
1604
+ 400
1605
+ 600
1606
+ 800
1607
+ CPU
1608
+ GPU
1609
+ CPU
1610
+ GPU
1611
+ CPU
1612
+ GPU
1613
+ CPU
1614
+ GPU
1615
+ CPU
1616
+ GPU
1617
+ CPU
1618
+ GPU
1619
+ CPU
1620
+ GPU
1621
+ CPU
1622
+ GPU
1623
+ CPU
1624
+ GPU
1625
+ Org
1626
+ R2H
1627
+ SR
1628
+ 0
1629
+ 0.05
1630
+ 0.1
1631
+ 0.15
1632
+ 0.2
1633
+ 0.25
1634
+ Time (ms)
1635
+ PD
1636
+ Data Transfer
1637
+ TMU+PU
1638
+ ABFT Overhead
1639
+ Frequency Change Overhead
1640
+ BSR
1641
+ (b) Time breakdown (50𝑡ℎ iteration)
1642
+ -100
1643
+ -50
1644
+ 0
1645
+ 50
1646
+ 100
1647
+ CPU
1648
+ GPU
1649
+ CPU
1650
+ GPU
1651
+ CPU
1652
+ GPU
1653
+ CPU
1654
+ GPU
1655
+ CPU
1656
+ GPU
1657
+ CPU
1658
+ GPU
1659
+ CPU
1660
+ GPU
1661
+ CPU
1662
+ GPU
1663
+ CPU
1664
+ GPU
1665
+ Org
1666
+ R2H
1667
+ SR
1668
+ 0
1669
+ 0.05
1670
+ 0.1
1671
+ 0.15
1672
+ 0.2
1673
+ 0.25
1674
+ Energy Saving (J)
1675
+ CPU Energy Saving
1676
+ GPU Energy Saving
1677
+ BSR
1678
+ (c) Energy saving breakdown (2𝑛𝑑 iteration)
1679
+ -25
1680
+ -15
1681
+ -5
1682
+ 5
1683
+ 15
1684
+ 25
1685
+ CPU
1686
+ GPU
1687
+ CPU
1688
+ GPU
1689
+ CPU
1690
+ GPU
1691
+ CPU
1692
+ GPU
1693
+ CPU
1694
+ GPU
1695
+ CPU
1696
+ GPU
1697
+ CPU
1698
+ GPU
1699
+ CPU
1700
+ GPU
1701
+ CPU
1702
+ GPU
1703
+ Org
1704
+ R2H
1705
+ SR
1706
+ 0
1707
+ 0.05
1708
+ 0.1
1709
+ 0.15
1710
+ 0.2
1711
+ 0.25
1712
+ Energy Saving (J)
1713
+ CPU Energy Saving
1714
+ GPU Energy Saving
1715
+ BSR
1716
+ (d) Energy saving breakdown (50𝑡ℎ iteration)
1717
+ Figure 10. Time and energy saving breakdown of the 2𝑛𝑑 and 50𝑡ℎ iteration of the LU decomposition (Input size: 30720 × 30720).
1718
+ Energy saving is compared with the original design. Positive values represent energy saving and negative values represent extra
1719
+ energy costs.
1720
+ 2000
1721
+ 2500
1722
+ 3000
1723
+ 3500
1724
+ 4000
1725
+ 4500
1726
+ 300
1727
+ 350
1728
+ 400
1729
+ 450
1730
+ 500
1731
+ 550
1732
+ Energy Consumption (J)
1733
+ Performance (Gflop/s)
1734
+ Original
1735
+ R2H
1736
+ SR
1737
+ BSR (Ours)
1738
+ 0.05
1739
+ 0.1
1740
+ 0.15
1741
+ 0.2
1742
+ 0
1743
+ 0.25
1744
+ 0.3
1745
+ Max Perf. Improv.: 49.9%
1746
+ Max Energy Sav.: 30.7%
1747
+ (a) Cholesky
1748
+ 4000
1749
+ 5000
1750
+ 6000
1751
+ 7000
1752
+ 8000
1753
+ 300
1754
+ 350
1755
+ 400
1756
+ 450
1757
+ 500
1758
+ 550
1759
+ Energy Consumption (J)
1760
+ Performance (Gflop/s)
1761
+ Original
1762
+ R2H
1763
+ SR
1764
+ BSR (Ours)
1765
+ 0.05
1766
+ 0.1
1767
+ 0.15
1768
+ 0.2
1769
+ 0
1770
+ 0.25
1771
+ Max Perf. Improv.: 40.1%
1772
+ Max Energy Sav.: 28.2%
1773
+ (b) LU
1774
+ 9000
1775
+ 11000
1776
+ 13000
1777
+ 15000
1778
+ 300
1779
+ 350
1780
+ 400
1781
+ 450
1782
+ 500
1783
+ 550
1784
+ Energy Consumption (J)
1785
+ Performance (Gflop/s)
1786
+ Original
1787
+ R2H
1788
+ SR
1789
+ BSR (Ours)
1790
+ 0.05
1791
+ 0.1
1792
+ 0.150.2
1793
+ 0
1794
+ 0.25
1795
+ Max Perf. Improv.: 43.6%
1796
+ 0.3
1797
+ Max Energy Sav.: 28.8%
1798
+ (c) QR
1799
+ Figure 11. Pareto efficient performance-energy consumption trade-off enabled by adjusting the reclamation ratio. Input size:
1800
+ 30720 × 30720 double precision
1801
+ 0%
1802
+ 5%
1803
+ 10%
1804
+ 15%
1805
+ 20%
1806
+ 25%
1807
+ 30%
1808
+ 35%
1809
+ Cholesky
1810
+ LU
1811
+ QR
1812
+ Energy Saving
1813
+ R2H
1814
+ SR
1815
+ BSR (Ours)
1816
+ (a) Energy Saving
1817
+ 0%
1818
+ 5%
1819
+ 10%
1820
+ 15%
1821
+ 20%
1822
+ 25%
1823
+ 30%
1824
+ 35%
1825
+ Cholesky
1826
+ LU
1827
+ QR
1828
+ R2H
1829
+ SR
1830
+ BSR (Ours)
1831
+ Energy × Delay! Saving
1832
+ (b) ED2P Reduction
1833
+ Figure 12. Overall energy saving and ED2P Reduction com-
1834
+ pared with the original design. Input size: 30720 × 30720.
1835
+ 0%
1836
+ 5%
1837
+ 10%
1838
+ 15%
1839
+ 20%
1840
+ 25%
1841
+ 30%
1842
+ 35%
1843
+ 5K
1844
+ 10K
1845
+ 15K
1846
+ 20K
1847
+ 25K
1848
+ 30K
1849
+ Energy Saving
1850
+ Matrix Size (N*N)
1851
+ R2H
1852
+ SR
1853
+ BSR (Ours)
1854
+ Figure 13. Overall energy saving of LU compared with the
1855
+ original design with different input matrix sizes
1856
+ checksum ABFT. When full checksum ABFT is applied, it
1857
+ can ensure all decomposition tests are correct, but it also
1858
+ brings 12% overhead. Our adaptive-ABFT can adaptively
1859
+ apply necessary levels of fault tolerance to ensure high re-
1860
+ liability and low overhead. For example, when we set the
1861
+ reclamation ratio 𝑟 = 0.25, the first 41 iterations are running
1862
+ at fault-free clock frequencies (1700Mhz), so adaptive-ABFT
1863
+ completely disables ABFT for eliminating unnecessary fault
1864
+ tolerance overhead. For 42𝑡ℎ − 49𝑡ℎ iteration, the slacks need
1865
+ to be reduced by BSR using more aggressive overclocking
1866
+ (up to 1900Mhz), so it applies single-side checksum ABFT.
1867
+ Finally, it applies full checksum ABFT after 50𝑡ℎ iteration
1868
+ since higher clock frequencies are used (up to 2200Mhz). So,
1869
+ with adaptive-ABFT, we can still ensure all decomposition
1870
+ tests are correct with only 4% fault tolerance overhead.
1871
+ 4.3.3
1872
+ Per iteration performance and energy comparison.
1873
+ To understand how each of the different approaches affects
1874
+ the performance and energy efficiency of matrix decomposi-
1875
+ tions, we show the profiling results of 2𝑛𝑑 and 50𝑡ℎ iteration
1876
+ of the LU decomposition in terms of time and energy costs
1877
+ breakdown in Figure 10. For the original version, we can see
1878
+ the slack occurs on the CPU side for the 2𝑛𝑑 iteration and
1879
+ GPU side for the 50𝑡ℎ iteration. For clarity, we refer to the
1880
+ case that slack is on the CPU side as C and the case that
1881
+ slack is on the GPU side as G in our following discussion.
1882
+ For R2H, we observe noticeable energy saving in both C and
1883
+
1884
+ Improving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems
1885
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
1886
+ G due to reduced energy consumption on the CPU side and
1887
+ GPU side respectively. For SR, we see slack is fully reclaimed
1888
+ in G , but not fully reclaimed in C due to the limited clock
1889
+ frequency range on the CPU and longer slack length. For
1890
+ BSR, we test different reclamation ratios 𝑟 and mark their
1891
+ values under the bars. We set 𝑟 from 0 to a certain value that
1892
+ leads to maximum achievable performance. This maximum 𝑟
1893
+ is higher for C than G since GPU has greater overclocking
1894
+ capabilities than CPU in our system when we apply optimized
1895
+ guardband. We can see maximum energy saving is achieved
1896
+ when 𝑟 = 0, which is consistent with our previous theoret-
1897
+ ical analysis. Maximum performance 𝑟 = 0.25 for C and
1898
+ G , which are close to our theoretical estimation. When we
1899
+ increase 𝑟, we see an increase in energy consumption for the
1900
+ processor on the critical path due to the increase in clock fre-
1901
+ quency. For C , we observe a slight increase in energy-saving
1902
+ since the slack is long enough for the CPU to always run at
1903
+ the lowest clock frequency, and reducing the total execution
1904
+ time can save more CPU static energy. We also observe a
1905
+ slight decrease in energy saving in G , mainly due to the
1906
+ slight increases in clock frequencies. Even though it can still
1907
+ save energy since 1) the clock frequencies are low; 2) power
1908
+ reduction brings by optimized guardband. Finally, Thanks
1909
+ to ABFT-OC, we can exploit higher overclocking frequen-
1910
+ cies where we can achieve higher performance and energy
1911
+ efficiency in C .
1912
+ 4.3.4
1913
+ Overall energy saving and energy efficiency com-
1914
+ parison. Next, we show the overall energy-saving capability
1915
+ of different approaches in Figure 12(a). We evaluate all three
1916
+ matrix decompositions with an input size of 30720 × 30720.
1917
+ All four versions of each type of matrix decomposition pro-
1918
+ duce a similar performance. To maximize energy saving the
1919
+ reclamation ratio of BSR is set to 0. We can see that compared
1920
+ with the state-of-the-art MAGMA library, our BSR is able
1921
+ to save energy by 30.7% for Cholesky, 28.2% for LU, and
1922
+ 28.8% for QR. That is 1.31 × −1.49× more energy saving
1923
+ compared with the current state-of-the-art SR energy saving
1924
+ approach and 2.03 × −2.20× more energy saving compared
1925
+ with R2H. In addition, we use 𝐸𝑛𝑒𝑟𝑔𝑦 × 𝐷𝑒𝑙𝑎𝑦2 (ED2P) to
1926
+ measure the energy efficiency of matrix decompositions. As
1927
+ shown in Figure 12(b), compared with the original design,
1928
+ our BSR is able to reduce ED2P by 29.3%-31.6%. Compared
1929
+ with R2H, BSR is able to reduce ED2P by 18.6%-20.7%. Fi-
1930
+ nally, compared with SR, BSR is able to reduce ED2P by
1931
+ 10.8%-14.1%.
1932
+ 4.3.5
1933
+ Overall energy saving on different input sizes. In
1934
+ Figure 13, we show the results of applying energy-saving
1935
+ approaches on LU decomposition with different input sizes.
1936
+ Limited by the page space, we only show the results for LU de-
1937
+ composition. Other matrix decompositions behave similarly.
1938
+ We can see our BSR is able to stably save energy consumption
1939
+ across different input matrix sizes ranging from 5120 × 5120
1940
+ and above. Note that it is hard to save energy on smaller ma-
1941
+ trices since they either lead to high fault tolerance overhead
1942
+ or small slacks that are hard to be reclaimed.
1943
+ 4.3.6
1944
+ Overall Pareto efficient performance-energy con-
1945
+ sumption trade-off. Finally, we show the overall Pareto ef-
1946
+ ficient performance-energy consumption trade-off enabled
1947
+ by adjusting the reclamation ratio in BSR. As shown in Fig-
1948
+ ure 11, by adjusting the reclamation ratio to a minimum 0, we
1949
+ achieve max energy saving with similar performance to the
1950
+ original design. In this case, compared with the original de-
1951
+ sign, BSR is able to save energy by 28.2%-30.7%. Compared
1952
+ with R2H, BSR is able to save energy by 17.1%-18.9%. Com-
1953
+ pared with SR, BSR is able to save energy by 9.6%-11.7%.
1954
+ By increasing the reclamation ratio, we are able to adjust the
1955
+ performance or energy consumption of matrix decomposi-
1956
+ tions. For example, with equal or less energy consumption,
1957
+ compared with the original design BSR is enable to improve
1958
+ the performance by 1.38×-1.51×. Also, compared with R2H,
1959
+ BSR is enable to improve the performance by 1.33×-1.43×.
1960
+ In addition, compared with SR, BSR is enable to improve the
1961
+ performance by 1.36×-1.43×. Finally, we see the results of
1962
+ BSR with different reclamation ratios form a Pareto set such
1963
+ that we cannot improve energy saving and performance at the
1964
+ same time without reliability degradation.
1965
+ 5
1966
+ Conclusion
1967
+ In this work, we focused on further improving the energy sav-
1968
+ ing of matrix decompositions on CPU-GPU heterogeneous
1969
+ systems beyond existing state-of-the-art works. To achieve
1970
+ our goal, we first proposed ABFT-OC, a novel overclocking
1971
+ technique that is protected by ABFT to enable reliable com-
1972
+ putation for key operations in matrix decompositions when
1973
+ overclocking. Next, based on ABFT-OC, we proposed BSR,
1974
+ a novel matrix decomposition framework, that aims to maxi-
1975
+ mize energy saving while maintaining performance and relia-
1976
+ bility. We evaluated BSR on three key matrix decomposition
1977
+ algorithms - Cholesky, LU, and QR. Experiments show that
1978
+ BSR is able to save up to 11.7% more energy compared with
1979
+ the current best energy saving optimization approach with no
1980
+ performance degradation and up to 14.1% ED2P reduction.
1981
+ Also, BSR enables the Pareto efficient performance-energy
1982
+ trade-off, which is able to provide up to 1.43× performance
1983
+ improvement without costing extra energy.
1984
+ 6
1985
+ Acknowledgement
1986
+ This work was supported by the U.S. Department of Energy,
1987
+ Office of Science, Office of Advanced Scientific Computing
1988
+ Research, Scientific Discovery through the Advanced Com-
1989
+ puting (SciDAC) program under Award Number DESC0022209.
1990
+ The research was also partly supported by NSF Grant 1907401.
1991
+
1992
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
1993
+ Jieyang Chen, Xin Liang, Kai Zhao, Hadi Zamani Sabzi, Laxmi Bhuyan, and Zizhong Chen
1994
+ References
1995
+ [1] Heiko Burau, Renée Widera, Wolfgang Hönig, Guido Juckeland,
1996
+ Alexander Debus, Thomas Kluge, Ulrich Schramm, Tomas E Cowan,
1997
+ Roland Sauerbrey, and Michael Bussmann. 2010. PIConGPU: a fully
1998
+ relativistic particle-in-cell code for a GPU cluster. IEEE Transactions
1999
+ on Plasma Science 38, 10 (2010), 2831–2839.
2000
+ [2] Aurélien Cavelan, Yves Robert, Hongyang Sun, and Frédéric Vivien.
2001
+ 2015. Voltage overscaling algorithms for energy-efficient workflow
2002
+ computations with timing errors. In Proceedings of the 5th Workshop
2003
+ on Fault Tolerance for HPC at eXtreme Scale. 27–34.
2004
+ [3] Choong-Seock Chang, Seunghoe Ku, and H Weitzner. 2004. Numerical
2005
+ study of neoclassical plasma pedestal in a tokamak geometry. Physics
2006
+ of Plasmas 11, 5 (2004).
2007
+ [4] Jieyang Chen, Hongbo Li, Sihuan Li, Xin Liang, Panruo Wu, Ding-
2008
+ wen Tao, Kaiming Ouyang, Yuanlai Liu, Kai Zhao, Qiang Guan, et al.
2009
+ 2018. Fault tolerant one-sided matrix decompositions on heteroge-
2010
+ neous systems with GPUs. In SC18: International Conference for High
2011
+ Performance Computing, Networking, Storage and Analysis. IEEE,
2012
+ 854–865.
2013
+ [5] Jieyang Chen, Sihuan Li, and Zizhong Chen. 2016. GPU-ABFT: Opti-
2014
+ mizing Algorithm-Based Fault Tolerance for Heterogeneous Systems
2015
+ with GPUs. In Networking, Architecture and Storage (NAS), 2016 In-
2016
+ ternational Conference on.
2017
+ [6] Jieyang Chen, Xin Liang, and Zizhong Chen. 2016. Online Algorithm-
2018
+ Based Fault Tolerance for Cholesky Decomposition on Heterogeneous
2019
+ Systems with GPUs. In 2016 International Parallel and Distributed
2020
+ Processing Symposium (IPDPS).
2021
+ [7] Jieyang Chen, Li Tan, Panruo Wu, Dingwen Tao, Hongbo Li, Xin
2022
+ Liang, Sihuan Li, Rong Ge, Laxmi Bhuyan, and Zizhong Chen. 2016.
2023
+ GreenLA: green linear algebra software for GPU-accelerated hetero-
2024
+ geneous computing. In High Performance Computing, Networking,
2025
+ Storage and Analysis, SC16: International Conference for. IEEE, 667–
2026
+ 677.
2027
+ [8] Jieyang Chen, Lipeng Wan, Xin Liang, Ben Whitney, Qing Liu, David
2028
+ Pugmire, Nicholas Thompson, Jong Youl Choi, Matthew Wolf, Todd
2029
+ Munson, et al. 2021. Accelerating multigrid-based hierarchical scien-
2030
+ tific data refactoring on gpus. In 2021 IEEE International Parallel and
2031
+ Distributed Processing Symposium (IPDPS). IEEE, 859–868.
2032
+ [9] Jieyang Chen, Nan Xiong, Xin Liang, Dingwen Tao, Sihuan Li, Kaim-
2033
+ ing Ouyang, Kai Zhao, Nathan DeBardeleben, Qiang Guan, and
2034
+ Zizhong Chen. 2019. TSM2: optimizing tall-and-skinny matrix-matrix
2035
+ multiplication on GPUs. In Proceedings of the ACM International
2036
+ Conference on Supercomputing. 106–116.
2037
+ [10] Longxiang Chen, Dingwen Tao, Panruo Wu, and Zizhong Chen. [n.d.].
2038
+ Extending Checksum-Based ABFT to Tolerate Soft Errors Online in
2039
+ Iterative Methods. ([n. d.]).
2040
+ [11] Zizhong Chen. 2008. Extending algorithm-based fault tolerance to
2041
+ tolerate fail-stop failures in high performance distributed environments.
2042
+ In 2008 IEEE International Symposium on Parallel and Distributed
2043
+ Processing. IEEE, 1–8.
2044
+ [12] Zizhong Chen. 2009. Optimal real number codes for fault tolerant ma-
2045
+ trix operations. In Proceedings of the Conference on High Performance
2046
+ Computing Networking, Storage and Analysis. 1–10.
2047
+ [13] Sharan Chetlur, Cliff Woolley, Philippe Vandermersch, Jonathan Co-
2048
+ hen, John Tran, Bryan Catanzaro, and Evan Shelhamer. 2014. cudnn:
2049
+ Efficient primitives for deep learning. arXiv preprint arXiv:1410.0759
2050
+ (2014).
2051
+ [14] Teresa Davies and Zizhong Chen. 2013. Correcting soft errors online in
2052
+ LU factorization. In Proceedings of the 22nd international symposium
2053
+ on High-performance parallel and distributed computing.
2054
+ [15] Jack Dongarra, Mark Gates, Azzam Haidar, Jakub Kurzak, Piotr
2055
+ Luszczek, Stanimire Tomov, and Ichitaro Yamazaki. 2014. Accelerating
2056
+ Numerical Dense Linear Algebra Calculations with GPUs. Numerical
2057
+ Computations with GPUs (2014), 1–26.
2058
+ [16] Jack J Dongarra, Hans W Meuer, Erich Strohmaier, et al. 1997. TOP500
2059
+ supercomputer sites. Supercomputer 13 (1997), 89–111.
2060
+ [17] R. Efraim, R. Ginosar, C. Weiser, and A. Mendelson. 2014. Energy
2061
+ aware race to halt: A down to EARtH approach for platform energy
2062
+ management. IEEE Computer Architecture Letters 13, 1 (Jan. 2014),
2063
+ 25–28.
2064
+ [18] Olivier Guyon and Jared Males. 2017. Adaptive optics predictive
2065
+ control with empirical orthogonal functions (EOFs). arXiv preprint
2066
+ arXiv:1707.00570 (2017).
2067
+ [19] Doug Hakkarinen and Zizhong Chen. 2012. Multilevel diskless check-
2068
+ pointing. IEEE Trans. Comput. 62, 4 (2012), 772–783.
2069
+ [20] Doug Hakkarinen, Panruo Wu, and Zizhong Chen. 2014. Fail-stop
2070
+ failure algorithm-based fault tolerance for cholesky decomposition.
2071
+ IEEE Transactions on Parallel and Distributed Systems 26, 5 (2014),
2072
+ 1323–1335.
2073
+ [21] Keliang He, Elizabeth Martin, and Matt Zucker. 2013.
2074
+ Multigrid
2075
+ CHOMP with local smoothing. In 2013 13th IEEE-RAS International
2076
+ Conference on Humanoid Robots (Humanoids). IEEE, 315–322.
2077
+ [22] Tohru Ishihara and Hiroto Yasuura. 1998. Voltage scheduling problem
2078
+ for dynamically variable voltage processors. In Proceedings of the 1998
2079
+ international symposium on Low power electronics and design. ACM,
2080
+ 197–202.
2081
+ [23] Vahid Jalili-Marandi, Zhiyin Zhou, and Venkata Dinavahi. 2012. Large-
2082
+ scale transient stability simulation of electrical power systems on paral-
2083
+ lel GPUs. In 2012 IEEE Power and Energy Society General Meeting.
2084
+ IEEE, 1–11.
2085
+ [24] Wayne Joubert, Deborah Weighill, David Kainer, Sharlee Climer, Amy
2086
+ Justice, Kjiersten Fagnan, and Daniel Jacobson. 2018. Attacking the
2087
+ opioid epidemic: Determining the epistatic and pleiotropic genetic
2088
+ architectures for chronic pain and opioid addiction. In SC18: Inter-
2089
+ national Conference for High Performance Computing, Networking,
2090
+ Storage and Analysis. IEEE, 717–730.
2091
+ [25] S Ku, Choong-Seock Chang, and PH Diamond. 2009. Full-f gyrokinetic
2092
+ particle simulation of centrally heated global ITG turbulence from
2093
+ magnetic axis to edge pedestal top in a realistic tokamak geometry.
2094
+ Nuclear Fusion 49, 11 (2009).
2095
+ [26] Jakub Kurzak and Jack Dongarra. 2006. Implementing linear algebra
2096
+ routines on multi-core processors with pipelining and a look ahead.
2097
+ In International Workshop on Applied Parallel Computing. Springer,
2098
+ 147–156.
2099
+ [27] Jingwen Leng et al. 2016. Guardband management in heterogeneous
2100
+ architectures. Ph.D. Dissertation.
2101
+ [28] Jingwen Leng, Alper Buyuktosunoglu, Ramon Bertran, Pradip Bose,
2102
+ and Vijay Janapa Reddi. 2015. Safe limits on voltage reduction effi-
2103
+ ciency in GPUs: a direct measurement approach. In Microarchitecture
2104
+ (MICRO), 2015 48th Annual IEEE/ACM International Symposium on.
2105
+ IEEE, 294–307.
2106
+ [29] Jingwen Leng, Tayler Hetherington, Ahmed ElTantawy, Syed Gi-
2107
+ lani, Nam Sung Kim, Tor M Aamodt, and Vijay Janapa Reddi.
2108
+ 2013. GPUWattch: Enabling energy optimizations in GPGPUs. ACM
2109
+ SIGARCH Computer Architecture News 41, 3 (2013), 487–498.
2110
+ [30] Ang Li, Shuaiwen Leon Song, Jieyang Chen, Jiajia Li, Xu Liu,
2111
+ Nathan R Tallent, and Kevin J Barker. 2019. Evaluating modern gpu
2112
+ interconnect: Pcie, nvlink, nv-sli, nvswitch and gpudirect. IEEE Trans-
2113
+ actions on Parallel and Distributed Systems 31, 1 (2019), 94–110.
2114
+ [31] Ang Li, Shuaiwen Leon Song, Jieyang Chen, Xu Liu, Nathan Tallent,
2115
+ and Kevin Barker. 2018. Tartan: evaluating modern GPU intercon-
2116
+ nect via a multi-GPU benchmark suite. In 2018 IEEE International
2117
+ Symposium on Workload Characterization (IISWC). IEEE, 191–202.
2118
+ [32] Sihuan Li, Hongbo Li, Xin Liang, Jieyang Chen, Elisabeth Giem, Kaim-
2119
+ ing Ouyang, Kai Zhao, Sheng Di, Franck Cappello, and Zizhong Chen.
2120
+ 2019. Ft-isort: Efficient fault tolerance for introsort. In Proceedings of
2121
+ the International Conference for High Performance Computing, Net-
2122
+ working, Storage and Analysis. 1–17.
2123
+
2124
+ Improving Energy Saving of One-sided Matrix Decompositions on CPU-GPU Heterogeneous Systems
2125
+ PPoPP ’23, February 25-March 1, 2023, Montreal, QC, Canada
2126
+ [33] Xin Liang, Jieyang Chen, Dingwen Tao, Sihuan Li, Panruo Wu, Hongbo
2127
+ Li, Kaiming Ouyang, Yuanlai Liu, Fengguang Song, and Zizhong Chen.
2128
+ 2017. Correcting Soft Errors Online in Fast Fourier Transform. In
2129
+ Proceedings of the International Conference for High Performance
2130
+ Computing, Networking, Storage and Analysis. ACM, 30.
2131
+ [34] Kenneth Moreland, Christopher Sewell, William Usher, Li-ta Lo,
2132
+ Jeremy Meredith, David Pugmire, James Kress, Hendrik Schroots,
2133
+ Kwan-Liu Ma, Hank Childs, et al. 2016. Vtk-m: Accelerating the visu-
2134
+ alization toolkit for massively threaded architectures. IEEE computer
2135
+ graphics and applications 36, 3 (2016), 48–58.
2136
+ [35] Lawrence M Murray, EM Jones, and J Parslow. 2012. On collapsed
2137
+ state-space models and the particle marginal Metropolis-Hastings sam-
2138
+ pler. arXiv. org (2012).
2139
+ [36] Cody Rivera, Jieyang Chen, Nan Xiong, Jing Zhang, Shuaiwen Leon
2140
+ Song, and Dingwen Tao. 2021. Tsm2x: High-performance tall-and-
2141
+ skinny matrix–matrix multiplication on gpus. J. Parallel and Distrib.
2142
+ Comput. 151 (2021), 70–85.
2143
+ [37] Nikzad Babaii Rizvandi, Javid Taheri, and Albert Y Zomaya. 2011.
2144
+ Some observations on optimal frequency selection in DVFS-based
2145
+ energy consumption minimization. J. Parallel and Distrib. Comput. 71,
2146
+ 8 (2011), 1154–1164.
2147
+ [38] Jingweijia Tan, Nilanjan Goswami, Tao Li, and Xin Fu. 2011. Analyz-
2148
+ ing soft-error vulnerability on GPGPU microarchitecture. In Workload
2149
+ Characterization (IISWC), 2011 IEEE International Symposium on.
2150
+ [39] Li Tan and Zizhong Chen. 2015. Slow down or halt: Saving the optimal
2151
+ energy for scalable HPC systems. In Proceedings of the 6th ACM/SPEC
2152
+ International Conference on Performance Engineering. ACM, 241–
2153
+ 244.
2154
+ [40] Dingwen Tao, Sheng Di, Xin Liang, Zizhong Chen, and Franck Cap-
2155
+ pello. 2018. Improving performance of iterative methods by lossy
2156
+ checkponting. In Proceedings of the 27th International Symposium on
2157
+ High-Performance Parallel and Distributed Computing. ACM, 52–65.
2158
+ [41] Dingwen Tao, Shuaiwen Leon Song, Sriram Krishnamoorthy, Panruo
2159
+ Wu, Xin Liang, Eddy Z. Zhang, Darren Kerbyson, and Zizhong Chen.
2160
+ 2016. New-Sum: A Novel Online ABFT Scheme For General Iterative
2161
+ Methods. In Proceedings of the 25th International Symposium on High-
2162
+ Performance Parallel and Distributed Computing.
2163
+ [42] Jiannan Tian, Sheng Di, Kai Zhao, Cody Rivera, Megan Hickman Fulp,
2164
+ Robert Underwood, Sian Jin, Xin Liang, Jon Calhoun, Dingwen Tao,
2165
+ et al. 2020. Cusz: An efficient gpu-based error-bounded lossy compres-
2166
+ sion framework for scientific data. arXiv preprint arXiv:2007.09625
2167
+ (2020).
2168
+ [43] Jiannan Tian, Cody Rivera, Sheng Di, Jieyang Chen, Xin Liang, Ding-
2169
+ wen Tao, and Franck Cappello. 2021. Revisiting huffman coding:
2170
+ Toward extreme performance on modern gpu architectures. In 2021
2171
+ IEEE International Parallel and Distributed Processing Symposium
2172
+ (IPDPS). IEEE, 881–891.
2173
+ [44] Stanimire Tomov, Jack Dongarra, and Marc Baboulin. 2010. Towards
2174
+ dense linear algebra for hybrid GPU accelerated manycore systems.
2175
+ Parallel Comput. 36, 5-6 (June 2010), 232–240. https://doi.org/10.
2176
+ 1016/j.parco.2009.12.005
2177
+ [45] Stanimire Tomov, Rajib Nath, Hatem Ltaief, and Jack Dongarra. 2010.
2178
+ Dense Linear Algebra Solvers for Multicore with GPU Accelerators.
2179
+ In Proc. of the IEEE IPDPS’10. IEEE Computer Society, Atlanta, GA,
2180
+ 1–8. DOI: 10.1109/IPDPSW.2010.5470941.
2181
+ [46] Yash Ukidave, Xiangyu Li, and David Kaeli. 2016. Mystic: Predictive
2182
+ scheduling for gpu based cloud servers using machine learning. In 2016
2183
+ IEEE International Parallel and Distributed Processing Symposium
2184
+ (IPDPS). IEEE, 353–362.
2185
+ [47] Panruo Wu and Zizhong Chen. 2014. FT-ScaLAPACK: Correcting soft
2186
+ errors on-line for ScaLAPACK Cholesky, QR, and LU factorization
2187
+ routines. In Proceedings of the 23rd international symposium on High-
2188
+ performance parallel and distributed computing.
2189
+ [48] Panruo Wu, Nathan DeBardeleben, Qiang Guan, Sean Blanchard,
2190
+ Jieyang Chen, Dingwen Tao, Xin Liang, Kaiming Ouyang, and Zizhong
2191
+ Chen. 2017. Silent Data Corruption Resilient Two-sided Matrix Factor-
2192
+ izations. In Proceedings of the 22nd Principles and Practice of Parallel
2193
+ Programming.
2194
+ [49] Panruo Wu, Qiang Guan, Nathan DeBardeleben, Sean Blanchard, Ding-
2195
+ wen Tao, Xin Liang, Jieyang Chen, and Zizhong Chen. 2016. Towards
2196
+ Practical Algorithm Based Fault Tolerance in Dense Linear Algebra. In
2197
+ Proceedings of the 25th International Symposium on High-Performance
2198
+ Parallel and Distributed Computing.
2199
+ [50] Erlin Yao, Jiutian Zhang, Mingyu Chen, Guangming Tan, and Ninghui
2200
+ Sun. 2015. Detection of soft errors in LU decomposition with par-
2201
+ tial pivoting using algorithm-based fault tolerance. The International
2202
+ Journal of High Performance Computing Applications 29, 4 (2015),
2203
+ 422–436.
2204
+ [51] Hadi Zamani, Yuanlai Liu, Devashree Tripathy, Laxmi Bhuyan, and
2205
+ Zizhong Chen. 2019. GreenMM: energy efficient GPU matrix multipli-
2206
+ cation through undervolting. In Proceedings of the ACM International
2207
+ Conference on Supercomputing. 308–318.
2208
+ [52] Hadi Zamani, Devashree Tripathy, Laxmi Bhuyan, and Zizhong Chen.
2209
+ 2020. SAOU: safe adaptive overclocking and undervolting for energy-
2210
+ efficient GPU computing. In Proceedings of the ACM/IEEE Interna-
2211
+ tional Symposium on Low Power Electronics and Design. 205–210.
2212
+ [53] Tomás Zegard and Glaucio H Paulino. 2013. Toward GPU acceler-
2213
+ ated topology optimization on unstructured meshes. Structural and
2214
+ multidisciplinary optimization 48, 3 (2013), 473–485.
2215
+
UtE1T4oBgHgl3EQfawTU/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
VNE0T4oBgHgl3EQf2wJn/content/tmp_files/2301.02716v1.pdf.txt ADDED
@@ -0,0 +1,1175 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ First-principles Investigation of Electrides Derived from Sodalites
2
+ Byungkyun Kang1 and Qiang Zhu1, ∗
3
+ 1Department of Physics and Astronomy, University of Nevada, Las Vegas, NV 89154, USA
4
+ (Dated: January 10, 2023)
5
+ Recently, the electride materials, with excess anionic electrons confined in their empty space, have
6
+ received a growing attention due to their promising applications in catalysis, nonlinear optics and
7
+ spin-electronics. However, the utilization of electride materials is limited by their thermal instability.
8
+ Here we introduce an alternative way to achieve the localized anionic electron states via the removal
9
+ of high symmetric Wyckoff sites of anions from the existing sodalite compounds. Using four halide
10
+ sodalites as the parental structures, our simulation reveals that the materials after the removal of
11
+ anionic halide sites exhibit typical electride behaviors that are characterized by the existence of
12
+ localized electronic states near the Fermi level. Compared to most previously studied electrides,
13
+ these materials are expected to be more thermally stable due to the complex structural framework
14
+ and thus promising for practical applications.
15
+ Among them, Na4(AlSiO4)3 manifests magnetic
16
+ electronic structure. We demonstrate that this magnetism originates from a highly localized excess
17
+ electron state surrounded by electronpositive alkaline cations. Our results suggest Na4(AlSiO4)3
18
+ could be a promising spintronics component, thus encouraging further experimental study.
19
+ I.
20
+ INTRODUCTION
21
+ Electides represent a unique class of materials in which
22
+ the excess electrons are trapped inside crystal cavities
23
+ and serve as the anions1–5.
24
+ Localization of electrons
25
+ provides the early examples of quantum confinement3.
26
+ These trapped electrons are usually loosely bound and
27
+ float around Fermi level to form unique interstitial energy
28
+ bands6, giving rise to interesting transport and magnetic
29
+ behaviors.
30
+ Therefore, electrides have attracted grow-
31
+ ing attention for various material applications.
32
+ While
33
+ the first crystalline organic electride was made by Dye
34
+ and coworkers in 19837, the use of organic electrides
35
+ for practical applications was limited by their thermal
36
+ instability3.
37
+ In 2003, Hosono and coworkers reported
38
+ the synthesis of the first thermally stable electride based
39
+ on the inorganic mineral mayenite (12CaO·7Al2O3)8.
40
+ The resulting electride Ca6Al7O16 (C12A7:2e−), with
41
+ the excess electrons confined in the zero-dimension (0D)
42
+ cages, exhibit excellent thermal stability and low reac-
43
+ tivity with air, opening a new chapter in electride syn-
44
+ thesis and utilization. The discovery of C12A7:2e− has
45
+ stimulated many new efforts to search for other inor-
46
+ ganic electrides.
47
+ Recently, a number of new electrides
48
+ with electrons confined in different geometries, including
49
+ 2D (Ca2N9, Y2C10), 1D (Y5Si311, Sr5P312, Mn5Si313,
50
+ La8Sr2(SiO4)614), and 0D (YH215), have been increas-
51
+ ingly investigated in experiment. In the mean time, many
52
+ new materials with improved functionality were proposed
53
+ theoretically thanks to the recent advances in computer
54
+ simulation16–26.
55
+ Despite the growing number of reports on identify-
56
+ ing new electride materials, most of them are only sta-
57
+ ble at low temperatures and very sensitive to air and
58
+ moisture. To date, C12A7:2e− remains one of the only
59
+ room-temperature stable electrides from practical appli-
60
+ cation perspective, with the exception of several recent
61
+ reports27–29. Therefore, it is necessary to examine the
62
+ uniqueness of C12A7:2e− from the viewpoint of struc-
63
+ tural stability. The original composition of mayenite can
64
+ be represented as Ca12Al14O33, which is an air-stable
65
+ neutral material at ambient temperature and atmosphere
66
+ with a melting point of 1415 ◦C4. Its crystal structure
67
+ has a cubic body centered unit cell, consisting of four
68
+ positively charged [Ca6Al7O16]+ as the main framework
69
+ with the following Wyckoff sites: Ca (24d), Al1 (16c),
70
+ Al2 (12a), O1 (48e), O2 (16c)30. As shown in Fig. 1a,
71
+ this framework constitutes twelve cages with a free inner
72
+ space of 4-6 ˚A in diameter in the unit cell.
73
+ In addi-
74
+ tion, there exist another type of oxygen atoms (O3) that
75
+ are statistically distributed inside centers of the twelve
76
+ cages, which can be regarded as the partial occupancy of
77
+ the 12b Wyckoff site with a ratio of 1
78
+ 6. Inside the cage,
79
+ each O3 site is collinearly coordinated to two Ca atoms
80
+ with a distance of 2.77 ˚A, which is a bit higher than 2.40
81
+ ˚A in the rocksalt CaO compound.
82
+ The resulting two
83
+ oxygen may be regarded as the counteranion (O2−) to
84
+ the giant framework cation. Due to the long Ca-O dis-
85
+ tance, it is expected that O2− anions are loosely bound
86
+ to the cages8. When the material is thermally treated
87
+ in a reductive atmosphere, part of the loosely bonded
88
+ O2− ions may escape as gaseous O2 from the lattice and
89
+ leave electrons in the cages, considered as the electron
90
+ captured oxygen vacancy, or F-center. With the proper
91
+ reductive condition, all of the loosely bonded O2− anions
92
+ can be removed from the lattice. In this case, the rel-
93
+ atively free electrons play the role of anions and result
94
+ in a high conductivity. In the meantime, the unpaired
95
+ feature of these free electrons also generate nontrivial
96
+ magnetic8 and superconducting properties31. Thanks to
97
+ its excellent stability, C12A7:2e− has been used for am-
98
+ monia synthesis32–34 and as an electron-injection barrier
99
+ material35.
100
+ Inspired by the synthesis of C12A7:2e−, we proceed
101
+ to check the feasibility of designing new electrides from
102
+ the existing minerals sharing structural features similar
103
+ to mayenite that allow the localization of anionic elec-
104
+ trons.
105
+ Clearly, the most important characteristic of a
106
+ arXiv:2301.02716v1 [cond-mat.mtrl-sci] 6 Jan 2023
107
+
108
+ 2
109
+ FIG. 1.
110
+ Two representative porous structures consisting of anions at the center of the cages. (a) mayenite Ca12Al14O33 and
111
+ (b) sodalite Na4(AlSiO4)3Cl. Both structures are featured by the presence of anions (partially) occupying the Wyckoff site
112
+ around the center of cages. The left panels highlight the overall distribution of cages, while the right panels shows the chemical
113
+ environment of each representative cage. In each cage, the coordination environment of the center anion is also displayed by
114
+ the red dash lines. For clarity, only 6 out of 12 cages are shown for the mayenite structure.
115
+ good precursor is the presence of anions occupying the
116
+ high-symmetry Wyckoff site.
117
+ In the entire materials
118
+ database, there exist many compounds meeting such a
119
+ requirement. In this work, we focus on a common type
120
+ of sodalite minerals consisting of the halide anions at
121
+ the high symmetry Wyckoff sites (see Fig. 1b). Simi-
122
+ lar to mayenite, the sodalite has a high melting point of
123
+ 1079 ◦C36. Its crystal structure also contains the porous
124
+ framework with two cages centering around the corner
125
+ and body center.
126
+ The halide anions (X−) occupy the
127
+ cage centers at the 2a Wyckoff site, exhibiting a tetrag-
128
+ onal coordination with the neighboring alkaline metals
129
+ M + (e.g., Na, K). The resulting M-X distance is about
130
+ the same bond length as that in the typical ionic com-
131
+ pound. For instance, the Na-Cl contact in sodalite is 2.76
132
+ ˚A, which is close to 2.79 ˚A in the rocksalt NaCl com-
133
+ pound. Due to the large dimeter size, it is possible to
134
+ form many diffusion pathway if the X anion is removed
135
+ from the M4 tetrahedron to realize the electride state.
136
+ Using these materials as the precursor, we immediately
137
+ found that the so called black sodalite Na4(AlSiO4)3 has
138
+ been found in our recent screening work25. In this work,
139
+ we checked several thermal-stable sodalite compounds
140
+ and derived the likely crystalline electride structures via
141
+ rigorous structural analysis. Based on these structures,
142
+ we further performed a thorough computational investi-
143
+ gation on their electronic and magnetic properties based
144
+ on first-principles calculations. Our results suggest that
145
+ the electrides derived from sodalite are likely to achieve
146
+ similar properties as found in C12A7:2e−. We hope this
147
+ work will encourage more investigations of porous zeo-
148
+ lites as the precursor to synthesize more thermal stable
149
+ electrides in the future.
150
+ II.
151
+ COMPUTATIONAL METHODS
152
+ In this work, we selected four materials for detailed
153
+ study,
154
+ including
155
+ Na4(AlSiO4)3Cl,
156
+ Na4(AlSiO4)3Br,
157
+ Na4(AlGeO4)3I and Na4(GaSiO4)3I. For each of them,
158
+ we first created the new structures by removing the halide
159
+ anions in the unit cell. The structures are subsequently
160
+ relaxed to obtain the optimum cell parameters.
161
+ The
162
+ structural stability was then checked by phonon calcu-
163
+ lation. Whenever the imaginary frequencies were found,
164
+ we followed the largest soft mode to obtain a new struc-
165
+ ture with a subgroup symmetry37.
166
+ We used the projector augmented wave (PAW) method
167
+ with the plane-wave code VASP38–40 to carry out all
168
+ calculations with the framework of density functional
169
+ theory (DFT). The Generalized Gradient Approxima-
170
+ tion (GGA) with Perdew, Burke and Ernzerhof (PBE)
171
+ functional41 was adopted.
172
+ We have used a 3×3×3 Γ-
173
+ centered k-point grid for geometric relaxation of unit
174
+ cell, which contain two formula units.
175
+ The cutoff en-
176
+ ergy for all calculations is 520 eV, and forces are con-
177
+ verged within 0.03 eV/˚A. Using the optimized structure,
178
+ we constructed a 2×2×2 supercell (368 atoms) for the
179
+ F-center defect (with the halide anion vacancy) calcu-
180
+ lation, in which a single Γ point was used for sampling
181
+
182
+ (a) Mayenite
183
+ Space group: I-43d
184
+ Number of cages: 12
185
+ Occupancy ratio: 1/6
186
+ Diameter: ~4-6 nm
187
+ Contacts: 2 collinear cations
188
+ (b) Sodalite
189
+ Space group: P-43n
190
+ Number of cages: 2
191
+ Occupancy ratio: 1
192
+ Diameter: ~10 nm
193
+ Contacts: 4 tetragonal cations3
194
+ FIG. 2.
195
+ The optimized crystal structures of four sodalite materials.
196
+ the Brillouin zone. Phonon bands were calculated using
197
+ the force constants, which were calculated by the finite
198
+ displacement methods using the Phonopy code42.
199
+ III.
200
+ RESULTS AND DISCUSSIONS
201
+ A.
202
+ Pristine Sodalites
203
+ Sodalite is a common structural type for many nature-
204
+ occurring minerals.
205
+ The typical crystal structure pos-
206
+ sesses a cubic symmetry in space group P¯43n (218). As
207
+ shown in Fig. 2, each unit cell contain two formula units.
208
+ According to X-ray diffraction analysis43–45, the min-
209
+ eral Na4(AlSiO4)3Cl is characterized by a β-cage made
210
+ of four-membered (Al, Si)O4 rings on the (100) plane
211
+ linked together in six-membered rings parallel to (100)
212
+ plane.
213
+ This results in a highly symmetric framework
214
+ with just five atoms in the asymmetric unit. Other ma-
215
+ terials, including Na4(AlSiO4)3Br, Na4(AlGeO4)3I and
216
+ Na4(GaSiO4)3I, show the same packing behavior except
217
+ a slight difference in terms of lattice parameters.
218
+ TABLE I. The comparison of cell parameters and band gaps
219
+ for sodalite materials between simulation and experimental
220
+ values.
221
+ System
222
+ Cell Parameters (˚A) Band Gap (eV)
223
+ DFT
224
+ Expt.
225
+ DFT
226
+ Expt.
227
+ Na4(AlSiO4)3Cl
228
+ 8.973
229
+ 8.87646
230
+ 4.69
231
+ 6.147
232
+ Na4(AlSiO4)3Br
233
+ 9.031
234
+ 8.93246
235
+ 4.61
236
+ 5.947
237
+ Na4(AlGeO4)3I
238
+ 9.287
239
+ 9.17448
240
+ 3.39
241
+ Na4(GaSiO4)3I
242
+ 9.198
243
+ 9.07448
244
+ 3.59
245
+ Table I summarizes the calculated lattice parameters,
246
+ which agree well with the experimental reports. Using
247
+ the dispersion corrected calculations with the DFT-D3
248
+ method49, we found that the relaxed lattice parameter of
249
+ Na4(AlSiO4)3Cl is 8.897 ˚A, which is approximately 0.1 ˚A
250
+ smaller than the value with the standard PBE functional.
251
+ This indicates a minor effect of dispersion correction in
252
+ the sodalites. Our results are close to other DFT results
253
+ in which the calculated lattice parameters are 8.72150,
254
+ 8.9151, and 8.78 ˚A52.
255
+ Fig. 3 shows the band structures and density of states
256
+ (DOS) of all four sodalite materials.
257
+ Clearly, none of
258
+ their electronic structures show spin polarization in their
259
+ band structures.
260
+ This means that the electron energy
261
+ levels are not affected by the spin of the electron. In ad-
262
+ dition, all four compounds exhibit direct band gaps at the
263
+ Γ point. The calculated band gaps are also summarized
264
+ in Table I. For Na4(AlSiO4)3Cl, we obtained a gap of 4.69
265
+ eV, similar to other DFT studies (e.g., 4.39 eV53,54 and
266
+ 5.0 eV55). All of these values are smaller than the exper-
267
+ imentally reported 6.1 eV47. This is expected since DFT
268
+ systematically underestimates the energy gap.
269
+ Similar
270
+ trends were also observed in other compounds.
271
+ From the DOS analysis, the computed valence bands
272
+ near Fermi level in all four sodalite structures are very
273
+ flat valence bands, with the contribution of O-p or-
274
+ bitals.
275
+ On the contrary, their conduction bands are
276
+ rather dispersive, which are very similar to that of
277
+ mayenite56. For Na4(AlSiO4)3Cl, its valence band max-
278
+ imum (VBM) consists of large O-p and small Cl-p or-
279
+ bitals, while Na4(AlSiO4)3Br has a VBM comprised of
280
+ large Br and small O orbitals. This is consistent with
281
+ the fact that the Br is more electronegative than Cl.
282
+ For Na4(AlGeO4)3I and Na4(GaSiO4)3I, their highest
283
+ valance bands are mainly comprised of I orbitals and are
284
+ separated from the other valence bands. It can be ex-
285
+ plained by the lowest electronegativity of iodine among
286
+ the halides (I, Br, Cl), which leads to less hybridization
287
+ with O-p and a higher energy level.
288
+
289
+ Na
290
+ Al
291
+ Ga
292
+ Si
293
+ Ge
294
+ C1
295
+ Br
296
+ Na4(A1Si04)3C1
297
+ Na4(A1SiO4)3Br
298
+ Na4(A1Ge04)3I
299
+ Na4(GaSiO4)3I4
300
+ FIG. 3.
301
+ The electronic band structures and atomic projected density of states of (a) Na4(AlSiO4)3Cl, (b) Na4(AlSiO4)3Br,
302
+ (c) Na4(AlGeO4)3I, and (d) Na4(GaSiO4)3I. In each band structure, blue solid lines represent spin up bands and red dashed
303
+ lines represent spin down bands. In the plots of density of states, two different scales of density of states are used: one below
304
+ 3 eV and one above 3 eV.
305
+ B.
306
+ The Structures of Crystalline Electrides
307
+ Prior to investigation of electride, an electron trapped
308
+ at the site of an anion vacancy in ionic crystals is known
309
+ as an F-center in solid state physics. F-center is a point
310
+ defect and its concentration is so small that interaction
311
+ between them is negligible. On the other hand, electrides
312
+ may be regarded as materials having a stoichiometric F-
313
+ center, and the electron concentration in the electride is
314
+ high enough to allow them to interact with each other4.
315
+ In the past, most works attempted to derive the crystal
316
+ structure by directly removing the anions from the par-
317
+ ent crystal57,58. However, such treatment failed to take
318
+ into account the likely structural changes due to complete
319
+ removal of anions (instead of low-concentration point de-
320
+ fects). Therefore, it is important to examine the resulting
321
+ crystalline electride in a more rigorous manner.
322
+ As we discussed earlier, we start by removing the
323
+ halide anions from the parental crystal structures. Since
324
+ Na4(AlSiO4)3Cl and Na4(AlSiO4)3Br share the same
325
+ framework, this lead to three candidate structures for
326
+ further consideration.
327
+ After the structural relaxation,
328
+ we found that there exist notable imaginary frequencies
329
+ in the computed phonon spectrum of Na4(AlSiO4)3 and
330
+ Na4(AlGeO4)3. As shown in the left panel of Fig.
331
+ 4a
332
+ for Na4(AlSiO4)3, the most negative phonon frequency
333
+ is located at the Γ point. Therefore, We derived a new
334
+ structure by displacing atoms along the eigenvector of
335
+ the soft mode (see the middle panel of Fig. 4a) with
336
+ TABLE II. The simulated crystallographic data for three crys-
337
+ talline electrides.
338
+ Na4(AlSiO4)3,
339
+ Space group P23,
340
+ a = 8.98 ˚A
341
+ Atomic coordinates
342
+ Na1
343
+ 4e
344
+ 0.72
345
+ 0.72
346
+ 0.72
347
+ Na2
348
+ 4e
349
+ 0.17
350
+ 0.17
351
+ 0.17
352
+ Al
353
+ 6g
354
+ 0.75
355
+ 0.00
356
+ 0.50
357
+ Si
358
+ 6h
359
+ 0.25
360
+ 0.50
361
+ 0.00
362
+ O1
363
+ 12j
364
+ 0.36
365
+ 0.05
366
+ 0.65
367
+ O2
368
+ 12j
369
+ 0.86
370
+ 0.85
371
+ 0.45
372
+ Na4(AlGeO4)3,
373
+ Space group P23,
374
+ a = 9.28 ˚A
375
+ Atomic coordinates
376
+ Na1
377
+ 4e
378
+ 0.18
379
+ 0.18
380
+ 0.18
381
+ Na2
382
+ 4e
383
+ 0.70
384
+ 0.70
385
+ 0.70
386
+ Al
387
+ 6g
388
+ 0.25
389
+ 0.00
390
+ 0.50
391
+ Ge
392
+ 6h
393
+ 0.75
394
+ 0.50
395
+ 0.00
396
+ O1
397
+ 12j
398
+ 0.65
399
+ 0.93
400
+ 0.65
401
+ O2
402
+ 12j
403
+ 0.85
404
+ 0.85
405
+ 0.43
406
+ Na4(GaSiO4)3,
407
+ Space group P¯43n,
408
+ a = 9.09 ˚A
409
+ Atomic coordinates
410
+ Na
411
+ 8e
412
+ 0.18
413
+ 0.18
414
+ 0.18
415
+ Ga
416
+ 6d
417
+ 0.25
418
+ 0.00
419
+ 0.50
420
+ Si
421
+ 6c
422
+ 0.25
423
+ 0.50
424
+ 0.00
425
+ O
426
+ 24i
427
+ 0.57
428
+ 0.87
429
+ 0.15
430
+ the maximum magnitude of 0.2 ˚A on the Na atoms.
431
+ Then, the new structure was relaxed again. We repeated
432
+ this process until the absolute minimum of the poten-
433
+
434
+ (a)Na4(A1Si04)3Cl
435
+ (b) Na4(A1SiO4)3Br
436
+ 0
437
+ 0.05
438
+ 0.1
439
+ 0
440
+ 0.1
441
+ 0.2
442
+ 81
443
+ N
444
+ 6
445
+ 6
446
+ (eV)
447
+ (eV)
448
+ 4
449
+ 4
450
+ Na
451
+ Al
452
+ NaAl
453
+ 2
454
+ spin up
455
+ 2
456
+ $pin up
457
+ Si
458
+ C1
459
+ Si
460
+ Br
461
+ spin down
462
+ $pin dbwn
463
+ .0
464
+ 0
465
+ 0
466
+ 0
467
+ 2
468
+ -21
469
+ T
470
+ X
471
+ M
472
+ r
473
+ R
474
+ X/M
475
+ RO
476
+ 5
477
+ 10
478
+ X
479
+ M
480
+ R
481
+ X/M
482
+ RO
483
+ 10
484
+ 20
485
+ DOs (eV-l)
486
+ (c)Na4(A1GeO4)3I
487
+ (d) Na4(GaSiO4)3I
488
+ 0
489
+ 0.1
490
+ 0.2
491
+ 0
492
+ 0.2
493
+ 0.4
494
+ 81
495
+ 6
496
+ 6
497
+ (eV)
498
+ 4
499
+ 4
500
+ Na -
501
+ -Al
502
+ Na -
503
+ -Ga
504
+ 2
505
+ E
506
+ 2
507
+ spin up
508
+ Ge
509
+ $pin up
510
+ Si
511
+ -1
512
+ spin down
513
+ -0
514
+ $pin dbwn
515
+ 0
516
+ 0
517
+ 0
518
+ MM
519
+ MM
520
+ 2
521
+ -2层
522
+ X
523
+ M
524
+ R
525
+ X/M
526
+ RO
527
+ 10
528
+ T
529
+ 5
530
+ X
531
+ T
532
+ M
533
+ r
534
+ R
535
+ X/M
536
+ RO
537
+ 5
538
+ 10
539
+ DOS (eV-l)
540
+ DOS (eV-l)5
541
+ FIG. 4.
542
+ The computed phonon spectrum for three different electrides (a) Na4(AlSiO4)3, (b) Na4(AlGeO4)3, and (c)
543
+ Na4(GaSiO4)3. In (a), the left panel shows phonon dispersion curves of relaxed Na4(AlSiO4)3, which has a soft mode shown in
544
+ the middle panel. The right panel shows phonon dispersion curves of relaxed Na4(AlSiO4)3 after applying atomic displacements
545
+ according to the depicted soft mode.
546
+ tial energy surface was reached and no imaginary fre-
547
+ quency phonon occurred. The similar method has been
548
+ used by the authors in a previous study37. After these
549
+ treatments, we obtained new structures with the energy
550
+ drops of 71 and 4 meV per formula unit for Na4(AlSiO4)3
551
+ and Na4(AlGeO4)3, respectively.
552
+ On the other hand,
553
+ Na4(GaSiO4)3 retains the same space group symmetry
554
+ as found in the original sodalite form.
555
+ Due to the soft modes, the original Na (8e) and O
556
+ (24i) sites in space group P¯43n were split into the 4e
557
+ and 12j sites in space group P23. Therefore, the final
558
+ stable structure for these two electrides has a subgroup
559
+ symmetry P23 (195). Table II summarizes the crystal-
560
+ lographic information for all three structures. Compared
561
+ to Table I, one can clearly found that the cell parameters
562
+ nearly remains the same regardless of either the symme-
563
+ try change or atomic removal.
564
+ C.
565
+ Electronic Properties
566
+ Next, we investigated the electronic properties of the
567
+ resulting three crystalline electrides. In particular, the
568
+ Cl removed electride Na4(AlSiO4)3 corresponds to the
569
+ previously investigated black sodalite, in which each pe-
570
+ riodic β-cage contains one Na43+ cluster and its color is
571
+ black due to a metallic band structure59–61. As shown
572
+ in Fig. 5, the three structures manifest electride bands
573
+ inside the gap of the parent sodalite. The partial charge
574
+ density obtained in the energy range −2 < E − EF < 0
575
+ is centered inside the cage after the removal of halide an-
576
+ ions, indicating that the excess electrons are localized at
577
+ the crystal cages and forming the electride bands. There
578
+ are sizable contributions of oxygen orbitals in the charge
579
+ density, giving rise to relatively dispersed electride bands
580
+ in comparison to the valence bands of the parent com-
581
+ pounds. Therefore, the dispersion of the electride bands
582
+ can be attributed to the hybridization between localized
583
+ excess electrons in Na4 tetrahedron and oxygen orbitals.
584
+ Recently, Stoliaroff et al.
585
+ have suggested that high
586
+ concentrations of chlorine vacancies can be created by
587
+ F-center point defects using DFT modeling62.
588
+ It was
589
+ found that ground and excited states of the singly occu-
590
+ pied molecular orbital and the triply degenerate lowest
591
+ unoccupied molecular orbital for the F-center63. It was
592
+ observed that the F-center is an electron trapped at an
593
+ halide anion vacancy in alkali halides64.
594
+ The trapped
595
+ electron is in a set of quantized states similar to a hy-
596
+ drogen atom: the ground state is the atomic 1s state,
597
+ and the first excited state is composed of the 2s and
598
+
599
+ P43n Na4(A1SiO4)3
600
+ P23 Na4(A1SiO4)3
601
+ (a)
602
+ Soft Mode
603
+ 30
604
+ 30
605
+ Frequency (THz)
606
+ Frequency (THz)
607
+ 20
608
+ 20
609
+ 10
610
+ 0
611
+ 0
612
+ r
613
+ X
614
+ M
615
+ R
616
+ X
617
+ X
618
+ X
619
+ M
620
+ R
621
+ M
622
+ R
623
+ M
624
+ R
625
+ P23 Na4(A1GeO4)3
626
+ P43n Na4(GaSiO4)3
627
+ (b)
628
+ (c)
629
+ 30
630
+ 30
631
+ Frequency (THz)
632
+ Frequency (THz)
633
+ 20
634
+ 20
635
+ 10
636
+ 10
637
+ 0E
638
+ ob
639
+ X
640
+ M
641
+ r
642
+ R
643
+ X
644
+ M
645
+ R
646
+ X
647
+ M
648
+ R
649
+ X
650
+ M
651
+ R6
652
+ FIG. 5.
653
+ The electronic band structures and isosurfaces of partial charge density in the range of -2 < E - EF < 0 eV of (a)
654
+ ferromagnetic Na4(AlSiO4)3, (b) antiferromagnetic Na4(AlSiO4)3, (c) Na4(AlGeO4)3, and (d) Na4(GaSiO4)3. In each band
655
+ structure, blue solid lines represent spin up bands and red dashed lines represent spin down bands.
656
+ FIG. 6.
657
+ The computed wavefunctions for pristine Na4(AlSiO4)3Cl, F-center of Cl vacancy in the supercell of Na4(AlSiO4)3Cl,
658
+ and electride states in Na4(AlSiO4)3. F and E denote the F-center and electride state, respectively. In the left panel, the
659
+ magnified views of O-p and O-s wavefunctions are displayed to aid the visual analysis. Three gray lines denote states that are
660
+ triply degenerate. In the right panel, wavefunctions which consist of electride bands are marked by black boxes.
661
+
662
+ (a) FM Na4(A1SiO4)3
663
+ (b) AFM Na4(A1SiO4)3
664
+ 4
665
+ 4
666
+ 2
667
+ (eV)
668
+ (eV)
669
+ E
670
+ EI
671
+ spin|up
672
+ spin |up
673
+ -2
674
+ spindown
675
+ spin down
676
+ .4
677
+ -4
678
+ 0
679
+ X
680
+ M
681
+ R
682
+ X/M
683
+ X
684
+ M
685
+ R
686
+ R
687
+ X/M
688
+ R
689
+ (c) Na4(A1GeO4)3
690
+ (d) Na4(GaSiO4)3
691
+ 2
692
+ 2
693
+ (eV)
694
+ (eV)
695
+ EI
696
+ spin up
697
+ spin up
698
+ spin down
699
+ spin down
700
+ -4
701
+ .4
702
+ 6
703
+ X
704
+ M
705
+ R
706
+ X/M
707
+ R
708
+ M
709
+ I
710
+ R
711
+ X/M
712
+ RC1 Vacancy
713
+ Na4(A1Si04)3
714
+ Na4(A1Si04)3C1
715
+ F-center
716
+ E-s+
717
+ (Si,Al,O)-s,p
718
+ F-p+O-p
719
+ Energy
720
+ E-s+
721
+ (Si,Al,O)-s
722
+ E-p+O-p
723
+ O-s+C1-s
724
+ F-s+(O,Si,C1)-s
725
+ CBM
726
+ F-p+O-s
727
+ E-p+O-s,p
728
+ O-p
729
+ VBM
730
+ E-s+O-p
731
+ F-s+O-s
732
+ C1-p+O-1
733
+ CBM
734
+ E-s+O-s
735
+ F-s+O-p
736
+ O-p
737
+ VBM7
738
+ 2p states65. However, it is shown that hybridization be-
739
+ tween metal and electride orbitals leads to large splitting
740
+ between electride associated states66. Electride associ-
741
+ ated states are split into two when hybridization between
742
+ metal and electride orbitals occurs.
743
+ Otto et al.
744
+ pro-
745
+ posed that the particle-in-a-box state is better described
746
+ as a particle in a box hybridized with framework oxy-
747
+ gen atoms for the black sodalite Na4(AlSiO4)367. In this
748
+ model, the particle is confined to a box defined by the
749
+ oxygen atoms, and the electron density is spread more
750
+ uniformly throughout the structure. These results sug-
751
+ gest that the Cl removed electride can be described by
752
+ periodic F-center and it may keep dual nature of local-
753
+ ized and itinerant electrons. However, all aforementioned
754
+ studies on the black sodalite were based on the dynam-
755
+ ically unstable P¯43n Na4(AlSiO4)3. Thus, we need to
756
+ investigate the co-operative localization and hybridiza-
757
+ tion in the ground state P23 Na4(AlSiO4)3 electride.
758
+ Fig. 6 displays the computed wavefunctions for pristine
759
+ P¯43n Na4(AlSiO4)3Cl, F-center of Cl vacancy in the su-
760
+ percell structure, and crystalline P23 Na4(AlSiO4)3. In
761
+ the pristine structure (see the left panel of Fig.
762
+ 6), it
763
+ shows that the wavefunction of VBM is comprised of O-p
764
+ while the CBM is comprised of [O-s + Cl-s]. The valence
765
+ band right below the VBM is comprised of [Cl-p + O-p],
766
+ in which the wavefunction manifests a spherical shape
767
+ inside of Na4 tetrahedron at the vicinity of Cl. This is a
768
+ typical for an ionic bonding in compound like NaCl.
769
+ As shown in the middle panel of Fig. 6, the introduc-
770
+ tion of Cl vacancy gives rise to the formation of a defect
771
+ F-center. Like the atomic orbital, the F center exhibits a
772
+ set of quantized states similar to a hydrogen atom. The
773
+ first F-center associated state appears between the VBM
774
+ and CBM. In comparison to the spherical [Cl-p + O-p]
775
+ state in the pristine structure, this state is mainly com-
776
+ prised of localized F-s state in the Na4 tetrahedron and
777
+ a few O-p states centered at the O atoms. Around the
778
+ CBM, we observed the hybridization of [F-s + O-p] as
779
+ the first unoccupied state. At the second lowest conduc-
780
+ tion bands, we also found triply degenerate hybridization
781
+ of F-p and O-s, where a spherical wavefunction inside
782
+ Na4 tetrahedron contains an empty region at the center.
783
+ Similar to F-s, the linear combination of F-p also has a
784
+ spherical shape, but it has an inner hollow due to the
785
+ requirement of orthogonality.
786
+ Furthermore, the higher
787
+ energy conduction bands consist of [F-s + (O, Si, Cl)-s]
788
+ and another triply degenerate [F-p + O-p].
789
+ Finally, the crystalline electride states (as shown in the
790
+ right panel of Fig. 6) have qualitatively the same proper-
791
+ ties with F-center. Their electride states exhibit distinct
792
+ local s- or p-like features similar to F-s and F-p. These E-
793
+ s and E-p states also have notable hybridization with the
794
+ surrounding atomic orbitals. Due to the hybridization,
795
+ the band width becomes larger, suggesting a notable ex-
796
+ cess electron hopping through β frames in the crystalline
797
+ electride67.
798
+ D.
799
+ Magnetism of Na4(AlSiO4)3
800
+ Of the three proposed electrides, Na4(AlSiO4)3 man-
801
+ ifests ferromagnetic (FM) electronic structure. Blake et
802
+ al. first showed that the antiferromagnetic (AFM) tran-
803
+ sition is associated with the incompletely doped regions
804
+ of the sample61. But no such transition was observed in
805
+ the fully doped sample. However, a later experiment by
806
+ Heinmaa and Lippmass reported the AFM phase with a
807
+ Neel temperature of TN = 54 K for heavily sodium-doped
808
+ sodalite Na4(AlSiO4)3 via nuclear magnetic resonance
809
+ spectroscopy study68.
810
+ This experiment was also sup-
811
+ ported by following theoretical calculations. Sankey et
812
+ al. reported the magnetic ground state of Na4(AlSiO4)3
813
+ (i.e. fully doped case) by conducting local-spin-density
814
+ approximation (LSDA) simulations67.
815
+ They showed a
816
+ lower energy of AFM ordering was favored over the FM
817
+ ordering. Our calculations also reveal that AFM config-
818
+ uration has a lower energy of 33 meV per formula unit
819
+ than FM configuration. As shown in Fig. 5b, the AFM
820
+ spin ordering opens a gap, which is an indirect gap of
821
+ 0.45 eV from R to X point, which is consistent with the
822
+ previous study on the P¯43n (Na, K)4(AlSiO4)358.
823
+ In this work, we also investigated the origin of mag-
824
+ netization within FM configuration to compare existing
825
+ ferromagnetic electrides Y2C17 and Ca5Ga2N422.
826
+ The
827
+ calculated total energy of spin-polarized Na4(AlSiO4)3 is
828
+ lower by 42 meV per formula unit than the non-spin-
829
+ polarized system.
830
+ The total magnetization moment is
831
+ 0.97 µB per formula unit. These values are between ∼ 15
832
+ meV and 0.38 µB for a weak itinerant ferromagnetic elec-
833
+ tride Y2C17, and 65 meV and 1.25 µB for Ca5Ga2N422.
834
+ Similar to the previous study22, we found that the
835
+ strong magnetization of Na4(AlSiO4)3 is due to excess
836
+ electron localization inside the Na4 tetrahedron.
837
+ As
838
+ shown in Fig. 7a, increasing lattice parameter (length
839
+ of Na4 tetrahedron edges) from 8.98 ˚A (4.51 ˚A) to 9.28
840
+ ˚A (5.71 ˚A) results in less excess electron confinement
841
+ in the larger Na4 tetrahedron making the magnetic mo-
842
+ ments disappear.
843
+ The electron localization can be de-
844
+ termined by the electron localization function (ELF),
845
+ which is a measure of the likelihood of finding an elec-
846
+ tron in the neighborhood space of a reference electron
847
+ located at a given point69. The ELF value is a dimen-
848
+ sionless index.
849
+ ELF = 1 corresponding to perfect lo-
850
+ calization and ELF =
851
+ 1
852
+ 2 corresponding to the electron
853
+ gas. As shown in Fig. 7c, the maximum ELF value at
854
+ the cage center for Na4(AlSiO4)3 is 0.99 when a=8.98
855
+ ˚A, which is higher than 0.94 when a=9.28 ˚A. For the
856
+ reference, the corresponding maximum ELF values are
857
+ 0.85 for Na4(AlGeO4)3, and 0.96 for Na4(GaSiO4)3. The
858
+ trend of ELF values is also consistent with the results on
859
+ the band width. The calculated electride spin up band
860
+ widths are 0.72 eV for Na4(AlSiO4)3 with a=8.98 ˚A),
861
+ 1.19 eV for Na4(AlSiO4)3 with a=9.28 ˚A, 1.39 eV for
862
+ Na4(AlGeO4)3, and 1.20 eV for Na4(GaSiO4)3. Clearly,
863
+ these localizations are strongly associate with the elec-
864
+ tride band widths.
865
+
866
+ 8
867
+ FIG. 7.
868
+ The calculated electronic structures of electrides. (a) The total density of states and wavefunctions of fully occupied
869
+ band at Γ point for Na4(AlSiO4)3 with two different lattice parameters. (b) Atomic (Ge,Si) projected density of states of
870
+ Na4(AlGeO4)3, Na4(AlSiO4)3 (a=8.98 ˚A), and Na4(AlSiO4)3 (a=9.28 ˚A). The spin up density of states are illustrated. The
871
+ bottom panel shows isosurfaces of partial charge density in the range of -2 < E - EF < 0 eV for Na4(AlSiO4)3 (a=8.98 ˚A)
872
+ and Na4(AlGeO4)3. (c) The electron localization functional maps at (100) plane of Na4(AlSiO4)3 (a=8.98 ˚A), Na4(AlSiO4)3
873
+ (a=9.28 ˚A), Na4(AlGeO4)3, and Na4(GaSiO4)3.
874
+ For itinerant ferromagnets, magnetism can be under-
875
+ stood by the Stoner criterion of D(EF)I > 1, where
876
+ D(EF) is density of state at the Fermi level and I is
877
+ the exchange parameter. As shown in Fig. 7a, the sharp
878
+ D(EF) of Na4(AlSiO4)3 (a=8.98 ˚A) suggests the mag-
879
+ netism is raised from the Stoner-type instability.
880
+ We
881
+ showed the sharp D(EF), which associates with the small
882
+ electride band width, is due to localization of excess elec-
883
+ tron. Then, a question is raised for the non-magnetism
884
+ of Na4(AlSiO4)3 and Na4(GaSiO4)3.
885
+ We checked the
886
+ possible magnetism of Na4(AlGeO4)3 with smaller lat-
887
+ tice parameters to try to localize the excess electron
888
+ and increase D(EF). All attempts resulted in non-spin-
889
+ polarized electronic structures. This can be attributed
890
+ to the higher electronegativity of Ge than Si. As shown
891
+ in Fig. 7b, owing to the electronegativity, the Ge’s pro-
892
+ jected DOS (PDOS) in Na4(AlGeO4)3 is greater than
893
+ the Si’s PDOS in Na4(GaSiO4)3 below the Fermi level,
894
+ while there is no notable difference in the Si’s PDOS in
895
+ the two different lattices. The large metal cation’s elec-
896
+ tronegativity leads to increasing hybridization66, which
897
+ results in less localization of excess electrons and a large
898
+ band width. This hinders spin polarization of the excess
899
+ electrons.
900
+ Therefore, there is no magnetism in either
901
+ Na4(AlSiO4)3 or Na4(GaSiO4)3.
902
+ IV.
903
+ SUMMARY AND CONCLUSIONS
904
+ In sum, we present an approach to realize the elec-
905
+ tride material via the crystallographic symmetry analy-
906
+ sis. Inspired by the synthesis of C12A7:2e−, we proposed
907
+ to make potentially stable electrides from thermally sta-
908
+ ble inorganic compounds that possess the high symmetry
909
+ Wyckoff site being occupied by anions. Using the well-
910
+ known halide sodalites as the examples, we found that
911
+ the materials after the removal of anionic halide anions
912
+ exhibit typical electride behaviors that are characterized
913
+ by the existence of localized electronic states near the
914
+ Fermi level. Among them, Na4(AlSiO4)3 manifests anti-
915
+ ferromagnetic electronic structure. We demonstrate that
916
+ this magnetism originate from a highly localized excess
917
+ electron state surrounded by electronpositive alkaline
918
+ cations.
919
+ While some compounds (e.g., Na4(AlSiO4)3)
920
+ have been investigated previously due to interest in F-
921
+ center research57,58,61,67,68, our work provided more rig-
922
+ orous phonon analysis to derive the truly stable ground
923
+ state structures of crystalline electrides.
924
+ Compared to
925
+ most previously studied electrides, these materials are
926
+ derived from the sodalite materials with high melting
927
+ points. Therefore, they are expected to be more ther-
928
+ mally stable due to the complex structural framework.
929
+ Thanks to the improved stability, these predicted ma-
930
+ terials are more amenable for fabrication and practical
931
+ applications. In the present work, we only investigated
932
+ several halide sodalite to demonstrate the proof of con-
933
+ cept. The extension to other sodalite type materials with
934
+ different anions is the subject of future work. In addi-
935
+ tion, our work suggests the connection between porous
936
+ zeolite and electride since the existence of crystalline ze-
937
+ olite can naturally provide the crystal cavity to accom-
938
+ modate the excess electrons.
939
+ While efforts on making
940
+ zeolite electrides have been attempted in the past70,71,
941
+ the extraordinary diversity in zeolite structures72 war-
942
+ rants many opportunities for future exploration.
943
+
944
+ (a)
945
+ (b)
946
+ (c)
947
+ 15
948
+ 0.021
949
+ Na4(A1Si04)3
950
+ Na4(A1SiO4)3
951
+ Ge:Na4(A1GeO4)3
952
+ Si:Na4(A1Si04)3i
953
+ spin up
954
+ 10
955
+ a= 8.98 A
956
+ a= 9.28 A
957
+ 1.0
958
+ 5
959
+ 0
960
+ soa
961
+ 0.01
962
+ DOS
963
+ 5
964
+ 8.98 A
965
+ a=
966
+ Na4(GaSiO4)3
967
+ Na4(A1Ge04)3
968
+ ELI
969
+ 10
970
+ a= 9.28 A
971
+ T
972
+ spin down
973
+ 15
974
+ 0.00+
975
+ -0.5
976
+ 0.0
977
+ 1.0
978
+ 1.5
979
+ -1.5
980
+ -1.0
981
+ 0.5
982
+ -1.0
983
+ -0.5
984
+ 0.0
985
+ 0.5
986
+ E-E, (eV)
987
+ E-Er (eV)
988
+ a: 8.98 A
989
+ a: 9.28 A
990
+ Na4(A1SiO4)3
991
+ Na4(A1GeO4)3
992
+ 0.0
993
+ Na-Na: 4.51 A
994
+ Na-Na: 5.71 A9
995
+ ACKNOWLEDGMENTS
996
+ This research was sponsored by the U.S. Department
997
+ of Energy, Office of Science, Office of Basic Energy Sci-
998
+ ences, Theoretical Condensed Matter Physics program
999
+ and the DOE Established Program to Stimulate Com-
1000
+ petitive Research under Award Number DE-SC0021970.
1001
+ The computing resources are provided by ACCESS (TG-
1002
+ DMR180040) and National Energy Research Scientific
1003
+ Computing Center (NERSC).
1004
1005
+ 1 J. L. Dye, Science 247, 663 (1990).
1006
+ 2 H. Li and S. Mahanti, Phys. Rev. Lett. 93, 216406 (2004).
1007
+ 3 J. L. Dye, Acc. Chem. Res. 42, 1564 (2009).
1008
+ 4 H. Hosono and M. Kitano, Chem. Rev. 121, 3121 (2021).
1009
+ 5 C. Liu, S. A. Nikolaev, W. Ren,
1010
+ and L. A. Burton, J.
1011
+ Mater. Chem. C 8, 10551 (2020).
1012
+ 6 T. Inoshita, S. Saito,
1013
+ and H. Hosono, Small Science 1,
1014
+ 2100020 (2021).
1015
+ 7 A. Ellaboudy, J. L. Dye, and P. B. Smith, J. Am. Chem.
1016
+ Soc. 105, 6490 (1983).
1017
+ 8 S.
1018
+ Matsuishi,
1019
+ Y.
1020
+ Toda,
1021
+ M.
1022
+ Miyakawa,
1023
+ K.
1024
+ Hayashi,
1025
+ T. Kamiya, M. Hirano, I. Tanaka,
1026
+ and H. Hosono, Sci-
1027
+ ence 301, 626 (2003).
1028
+ 9 K. Lee, S. W. Kim, Y. Toda, S. Matsuishi, and H. Hosono,
1029
+ Nature 494, 336 (2013).
1030
+ 10 X. Zhang, Z. Xiao, H. Lei, Y. Toda, S. Matsuishi,
1031
+ T. Kamiya, S. Ueda,
1032
+ and H. Hosono, Chem. Mater. 26,
1033
+ 6638 (2014).
1034
+ 11 Y. Lu, J. Li, T. Tada, Y. Toda, S. Ueda, T. Yokoyama,
1035
+ M. Kitano, and H. Hosono, J. Am. Chem. Soc. 138, 3970
1036
+ (2016).
1037
+ 12 J. Wang, K. Hanzawa, H. Hiramatsu, J. Kim, N. Umezawa,
1038
+ K. Iwanaka, T. Tada, and H. Hosono, J. Am. Chem. Soc.
1039
+ 139, 15668 (2017).
1040
+ 13 Y. Zhang, B. Wang, Z. Xiao, Y. Lu, T. Kamiya, Y. Uwa-
1041
+ toko, H. Kageyama, and H. Hosono, npj Quantum Mater.
1042
+ 2, 45 (2017).
1043
+ 14 Y. Zhang, Z. Xiao, T. Kamiya, and H. Hosono, J. Phys.
1044
+ Chem. Lett. 6, 4966 (2015).
1045
+ 15 H. Mizoguchi, M. Okunaka, M. Kitano, S. Matsuishi,
1046
+ T. Yokoyama,
1047
+ and H. Hosono, Inorg. Chem. 55, 8833
1048
+ (2016).
1049
+ 16 T. Inoshita, S. Jeong, N. Hamada, and H. Hosono, Phys.
1050
+ Rev. X 4, 031023 (2014).
1051
+ 17 T. Inoshita, N. Hamada,
1052
+ and H. Hosono, Phys. Rev. B
1053
+ 92, 201109 (2015).
1054
+ 18 T. Tada, S. Takemoto, S. Matsuishi, and H. Hosono, Inorg.
1055
+ Chem. 53, 10347 (2014).
1056
+ 19 W. Ming, M. Yoon, M.-H. Du, K. Lee, and S. W. Kim, J.
1057
+ Am. Chem. Soc. 138, 15336 (2016).
1058
+ 20 Y. Zhang, H. Wang, Y. Wang, L. Zhang, and Y. Ma, Phys.
1059
+ Rev. X 7, 011017 (2017).
1060
+ 21 L. A. Burton, F. Ricci, W. Chen, G.-M. Rignanese, and
1061
+ G. Hautier, Chem. Mater. 30, 7521 (2018).
1062
+ 22 J. Wang, Q. Zhu, Z. Wang, and H. Hosono, Phys. Rev. B
1063
+ 99, 064104 (2019).
1064
+ 23 S.-C. Zhu, L. Wang, J.-Y. Qu, J.-J. Wang, T. Frolov, X.-Q.
1065
+ Chen, and Q. Zhu, Phys. Rev. Materials 3, 024205 (2019).
1066
+ 24 J. Qu, S. Zhu, W. Zhang, and Q. Zhu, ACS Appl. Mater.
1067
+ Interfaces 11, 5256 (2019).
1068
+ 25 Q. Zhu, T. Frolov,
1069
+ and K. Choudhary, Matter 1, 1293
1070
+ (2019).
1071
+ 26 K. Li, Y. Gong, J. Wang, and H. Hosono, J. Am. Chem.
1072
+ Soc. 143, 8821 (2021).
1073
+ 27 Y. Liu, H. Wei, X. Wang, H. Jiao, and X. Jing, RSC Adv.
1074
+ 12, 28414 (2022).
1075
+ 28 X. Yang, K. Parrish, Y.-L. Li, B. Sa, H. Zhan, and Q. Zhu,
1076
+ Phys. Rev. B 103, 125103 (2021).
1077
+ 29 S. H. Kang, J. Bang, K. Chung, C. N. Nandadasa, G. Han,
1078
+ S. Lee, K. H. Lee, K. Lee, Y. Ma, S. H. Oh, et al., Sci. Adv.
1079
+ 6, eaba7416 (2020).
1080
+ 30 H. Boysen, M. Lerch, A. Stys,
1081
+ and A. Senyshyn, Acta
1082
+ Cryst. B 63, 675 (2007).
1083
+ 31 M. Miyakawa,
1084
+ S. W. Kim,
1085
+ M. Hirano,
1086
+ Y. Kohama,
1087
+ H. Kawaji, T. Atake, H. Ikegami, K. Kono, and H. Hosono,
1088
+ J. Am. Chem. Soc. 129, 7270 (2007).
1089
+ 32 M. Kitano, Y. Inoue, Y. Yamazaki, F. Hayashi, S. Kan-
1090
+ bara, S. Matsuishi, T. Yokoyama, S.-W. Kim, M. Hara,
1091
+ and H. Hosono, Nat. Chem. 4, 934 (2012).
1092
+ 33 N. Kuganathan, H. Hosono, A. L. Shluger,
1093
+ and P. V.
1094
+ Sushko, J. Am. Chem. Soc. 136, 2216 (2014).
1095
+ 34 F. Hayashi, Y. Tomota, M. Kitano, Y. Toda, T. Yokoyama,
1096
+ and H. Hosono, J. Am. Chem. Soc. 136, 11698 (2014).
1097
+ 35 H. Hosono, J. Kim, Y. Toda, T. Kamiya, and S. Watan-
1098
+ abe, Proc. Natl. Acad. Sci. 114, 233 (2017).
1099
+ 36 S. M. Antao and I. Hassan, Can. Mineral. 40, 163 (2002).
1100
+ 37 B. Kang and S. Estreicher, Phys. Rev. B 89, 155409 (2014).
1101
+ 38 P. E. Bl¨ochl, Phys. Rev. B 50, 17953 (1994).
1102
+ 39 G. Kresse and J. Furthm¨uller, Phys. Rev. B 54, 11169
1103
+ (1996).
1104
+ 40 G. Kresse and D. Joubert, Phys. Rev. B 59, 1758 (1999).
1105
+ 41 J. P. Perdew, K. Burke,
1106
+ and M. Ernzerhof, Phys. Rev.
1107
+ Lett. 77, 3865 (1996).
1108
+ 42 A. Togo, F. Oba, and I. Tanaka, Phys. Rev. B 78, 134106
1109
+ (2008).
1110
+ 43 L. Pauling, Z. Kristallogr 74, 213 (1930).
1111
+ 44 R. McMullan, S. Ghose, N. Haga, and V. Schomaker, Acta
1112
+ Cryst. B 52, 616 (1996).
1113
+ 45 I. Hassan, S. M. Antao,
1114
+ and J. B. Parise, Am. Mineral.
1115
+ 89, 359 (2004).
1116
+ 46 N. C. Nielsen, H. Bildsøe, H. J. Jakobsen, and P. Norby,
1117
+ Zeolites 11, 622 (1991).
1118
+ 47 C. Van Doorn, D. Schipper,
1119
+ and P. Bolwijn, J. Elec-
1120
+ trochem. Soc. 119, 85 (1972).
1121
+ 48 G. M. Johnson and M. T. Weller, in Studies in Surface
1122
+ Science and Catalysis, Vol. 105 (Elsevier, 1997) pp. 269–
1123
+ 275.
1124
+ 49 S. Grimme, J. Antony, S. Ehrlich, and H. Krieg, J. Chem.
1125
+ Phys. 132, 154104 (2010).
1126
+ 50 A. M. Mofrad, C. Peixoto, J. Blumeyer, J. Liu, H. K. Hunt,
1127
+ and K. D. Hammond, J. Phys. Chem. C 122, 24765 (2018).
1128
+ 51 K. T. Thomson and R. M. Wentzcovitch, J. Chem. Phys.
1129
+ 108, 8584 (1998).
1130
+ 52 G. Ulian and G. Valdr`e, Minerals 12, 1323 (2022).
1131
+ 53 L. Pan, W. Liu, W. Chen, K. Yan, H. Yang, and J. Yu, J.
1132
+ Mol. Struct. 1106, 59 (2016).
1133
+
1134
+ 10
1135
+ 54 F. Filippone, F. Buda, S. Iarlori, G. Moretti, and P. Porta,
1136
+ J. Phys. Chem. 99, 12883 (1995).
1137
+ 55 N. F. Cano, W. E. Ayta,
1138
+ and S. Watanabe, Solid State
1139
+ Commun. 150, 195 (2010).
1140
+ 56 H. Hosono, Jpn. J. Appl. Phys. 52, 090001 (2013).
1141
+ 57 V. I. Srdanov, G. D. Stucky, E. Lippmaa, and G. Engel-
1142
+ hardt, Phys. Rev. Lett. 80, 2449 (1998).
1143
+ 58 G. K. Madsen, B. B. Iversen, P. Blaha, and K. Schwarz,
1144
+ Phys. Rev. B 64, 195102 (2001).
1145
+ 59 V. Srdanov, K. Haug, H. Metiu, and G. Stucky, J. Phys.
1146
+ Chem. 96, 9039 (1992).
1147
+ 60 J. Smeulders, M. Hefni, A. Klaassen, E. De Boer, U. West-
1148
+ phal, and G. Geismar, Zeolites 7, 347 (1987).
1149
+ 61 N. P. Blake, V. I. Srdanov, G. D. Stucky, and H. Metiu,
1150
+ J. Chem. Phys. 104, 8721 (1996).
1151
+ 62 A. Stoliaroff, R. Schira, F. Blumentritt, E. Fritsch, S. Jo-
1152
+ bic, and C. Latouche, J. Phys. Chem. C 125, 16674 (2021).
1153
+ 63 P. Colinet, A. Gheeraert, A. Curutchet, and T. Le Bahers,
1154
+ J. Phys. Chem. C 124, 8949 (2020).
1155
+ 64 W. C. Holton and H. Blum, Phys. Rev. 125, 89 (1962).
1156
+ 65 T. Koyama and T. Suemoto, Rep. Prog. Phys. 74, 076502
1157
+ (2011).
1158
+ 66 L. M. McRae, R. C. Radomsky, J. T. Pawlik, D. L. Druffel,
1159
+ J. D. Sundberg, M. G. Lanetti, C. L. Donley, K. L. White,
1160
+ and S. C. Warren, J. Am. Chem. Soc. 144, 10862–10869
1161
+ (2022).
1162
+ 67 O. F. Sankey, A. A. Demkov, and T. Lenosky, Phys. Rev.
1163
+ B 57, 15129 (1998).
1164
+ 68 I. Heinmaa, S. Vija, and E. Lippmaa, Chem. Phys. Lett.
1165
+ 327, 131 (2000).
1166
+ 69 A. D. Becke and K. E. Edgecombe, J. Chem. Phys. 92,
1167
+ 5397 (1990).
1168
+ 70 V. Petkov, S. J. L. Billinge, T. Vogt, A. S. Ichimura, and
1169
+ J. L. Dye, Phys. Rev. Lett. 89, 075502 (2002).
1170
+ 71 D. P. Wernette, A. S. Ichimura, S. A. Urbin,
1171
+ and J. L.
1172
+ Dye, Chem. Mater. 15, 1441 (2003).
1173
+ 72 C. Baerlocher and L. McCusker, “Database of zeolite struc-
1174
+ tures,” (2017).
1175
+
VNE0T4oBgHgl3EQf2wJn/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
WtE2T4oBgHgl3EQfDga8/content/tmp_files/2301.03626v1.pdf.txt ADDED
@@ -0,0 +1,1794 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–14 (2015)
2
+ Preprint 11 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ The eROSITA Final Equatorial-Depth Survey (eFEDS) - Splashback
5
+ radius of X-ray galaxy clusters using galaxies from HSC survey
6
+ Divya Rana1★, Surhud More1,2†, Hironao Miyatake2,3,4, Sebastian Grandis5,6, Matthias Klein6,
7
+ Esra Bulbul7, I-Non Chiu8,9,10, Satoshi Miyazaki11, Neta Bahcall12
8
+ 1 Inter University Centre for Astronomy and Astrophysics, Ganeshkhind, Pune 411007, India
9
+ 2 Kavli Institute for the Physics and Mathematics of the Universe (WPI), University of Tokyo, 5-1-5, Kashiwanoha, 2778583, Japan
10
+ 3 Kobayashi-Maskawa Institute for the Origin of Particles and the Universe (KMI), Nagoya University, Nagoya, 464-8602, Japan
11
+ 4 Institute for Advanced Research, Nagoya University, Nagoya 464-8601, Japan
12
+ 5 Institut für Astro- und Teilchenphysik, Universität Innsbruck, Technikerstr. 25/8, 6020 Innsbruck, Austria
13
+ 6 Faculty of Physics, Ludwig-Maximilians-Universität, Scheinerstr. 1, 81679, Munich, Germany
14
+ 7 Max-Planck-Institut für extraterrestrische Physik, Gießenbachstraße 1, D-85748 Garching, Germany
15
+ 8 Department of Physics, National Cheng Kung University, 70101 Tainan, Taiwan
16
+ 9 Department of Astronomy, School of Physics and Astronomy, and Shanghai Key Laboratory for Particle Physics and Cosmology,
17
+ Shanghai Jiao Tong University, Shanghai 200240, China
18
+ 10 Tsung-Dao Lee Institute, Shanghai Jiao Tong University, Shanghai 200240, China
19
+ 11 Subaru Telescope, National Astronomical Observatory of Japan, 650, N Aohoku Place, Hilo, HI 96720 USA
20
+ 12 Department of Astrophysical Sciences, Peyton Hall, 4 Ivy Lane, Princeton University, Princeton, NJ 08544
21
+ Accepted XXX. Received YYY; in original form ZZZ
22
+ ABSTRACT
23
+ We present the splashback radius measurements around the SRG/eROSITA eFEDS X-ray selected galaxy clusters by cross-
24
+ correlating them with HSC S19A photometric galaxies. The X-ray selection is expected to be less affected by systematics
25
+ related to projection that affects optical cluster finder algorithms. We use a nearly volume-limited X-ray cluster sample selected
26
+ in 0.5-2.0 keV band having luminosity 𝐿𝑋 > 1043.5ergs−1h−2 within the redshift 𝑧 < 0.75 and obtain measurements of the
27
+ projected cross-correlation with a signal-to-noise of 17.43. We model our measurements to infer a three-dimensional profile and
28
+ find that the steepest slope is sharper than −3 and associate the location with the splashback radius. We infer the value of the 3D
29
+ splashback radius 𝑟sp = 1.45+0.30
30
+ −0.26 h−1Mpc. We also measure the weak lensing signal of the galaxy clusters and obtain halo mass
31
+ log[𝑀200m/h−1M⊙] = 14.52 ± 0.06 using the HSC-S16A shape catalogue data at the median redshift 𝑧 = 0.46 of our cluster
32
+ sample. We compare our 𝑟sp values with the spherical overdensity boundary 𝑟200m = 1.75 ± 0.08 h−1Mpc based on the halo mass
33
+ which is consistent within 1.2𝜎 with the ΛCDM predictions. Our constraints on the splashback radius, although broad, are the
34
+ best measurements thus far obtained for an X-ray selected galaxy cluster sample.
35
+ Key words: keyword1 – keyword2 – keyword3
36
+ 1 INTRODUCTION
37
+ The gravitational collapse of high-density peaks in the initial matter
38
+ distribution results in the formation of virialized massive dark matter
39
+ halos in the Universe. The most massive of these halos host clusters
40
+ of galaxies that we see today (see Kravtsov & Borgani 2012; Walker
41
+ et al. 2019; Vogelsberger et al. 2020, for a recent review). The matter
42
+ distribution in the dark matter halos is driven by the profile of the
43
+ initial density peak from which it forms. There have been extensive
44
+ theoretical and numerical studies to understand the structure of the
45
+ dark matter halos (e.g. Gunn & Gott 1972; Fillmore & Goldreich
46
+ 1984; Bertschinger 1985; Navarro et al. 1997; Moore et al. 1999).
47
+ Since the seminal study of (Navarro et al. 1997), it has been well
48
+ known that dark matter halos follow self-similar density distribution
49
+ ★ E-mail: [email protected]
50
+ † E-mail: [email protected]
51
+ in their inner regions, known as the Navarro-Frenk-White (NFW)
52
+ profile.
53
+ On the other hand, the outskirts of massive dark matter halos
54
+ have received attention in the last few years and both theoretical and
55
+ observational aspects of it remain a subject of active research. Diemer
56
+ & Kravtsov (2014) showed that the matter distribution at the outskirts
57
+ of stacked dark matter halo profiles differs from extrapolations of the
58
+ NFW profile. In the outskirts of these halos, the density distribution
59
+ shows logarithmic slopes (𝑑 log 𝜌/𝑑 log 𝑟) which are much steeper
60
+ than the asymptotic value of −3 expected from the NFW profile.
61
+ The location of the steepest slope also is dependent upon the mass
62
+ accretion rate of these dark matter halos. Adhikari et al. (2014)
63
+ explicitly showed with a phase space analysis that these locations
64
+ correspond to the position where recently accreted particles reach
65
+ the apocenters of the orbits for the first time.
66
+ The resultant sharp drop in the density profile at this location is
67
+ reminiscent of the last density caustic predicted in the model of sec-
68
+ © 2015 The Authors
69
+ arXiv:2301.03626v1 [astro-ph.CO] 9 Jan 2023
70
+
71
+ 2
72
+ Rana et al.
73
+ ondary infall around a spherically symmetric overdensity (Fillmore
74
+ & Goldreich 1984; Bertschinger 1985; Shi 2016). Adhikari et al.
75
+ (2014) termed this location the "splashback radius" as after reaching
76
+ the apocenters, the particles are expected to splash back in to the
77
+ halo. Subsequently, the splashback radius has been proposed as a
78
+ physical boundary of the dark matter halo and found to be primarily
79
+ dependent on the mass of the halo, its accretion rate and redshift
80
+ (More et al. 2015; Diemer et al. 2017). These results triggered an in-
81
+ terest in various aspects of splashback radius studies in simulations
82
+ (see e.g Mansfield et al. 2017; Okumura et al. 2018; Fong et al.
83
+ 2018; Mansfield & Kravtsov 2020; Sugiura et al. 2020; Xhakaj et al.
84
+ 2020; Diemer 2020; Deason et al. 2021; O’Neil et al. 2022a), for
85
+ different dark matter and dark energy theories (Adhikari et al. 2018;
86
+ Contigiani et al. 2019a; Banerjee et al. 2020) and galaxy evolution
87
+ scenarios in clusters (Dacunha et al. 2022).
88
+ Observational investigations of the splashback radius have fo-
89
+ cussed on galaxy clusters as the density drops at the splashback
90
+ radius are expected to be quite significant due to their higher current
91
+ accretion rates. Secondly on cluster scales it is easier to select iso-
92
+ lated halos than on galaxy and group scales. More et al. (2016) used
93
+ the cross-correlation of the SDSS redMaPPer clusters (Rykoff et al.
94
+ 2014) with SDSS photometric galaxies to present the first detection
95
+ of the splashback radius. They detected a steepening of the projected
96
+ galaxy number density profile as observed by (Diemer & Kravtsov
97
+ 2014) in numerical simulations. However, the inferred location of
98
+ the splashback radius was found to be about 20 percent smaller than
99
+ expected from the dark matter simulations based on ΛCDM model
100
+ (More et al. 2015). The robustness of these results to effects such
101
+ as the miscentering of clusters and to priors were demonstrated in
102
+ Baxter et al. (2017). Busch & White (2017) argued that selection
103
+ effects induced by optical clusters could affect the cross-correlation
104
+ measurements and could therefore be important in understanding the
105
+ origin of this difference. Using clusters selected by a mock redMaP-
106
+ Per algorithm run on a simulation, Sunayama & More (2019) showed
107
+ that these differences could indeed arise from such optical selection
108
+ effects. Such selection effects are quite sensitive to the background
109
+ subtraction scheme employed while running the cluster finding al-
110
+ gorithm. Murata et al. (2020) explored clusters selected with the
111
+ CAMIRA cluster finder (Oguri 2014) using data from the Subaru
112
+ Hyper Suprime-Cam survey (Aihara et al. 2018a) which use a local
113
+ background subtraction scheme. They obtained measurements of the
114
+ splashback radius which were consistent with ΛCDM prediction.
115
+ Such issues related to the projection effects in optically selected
116
+ galaxy clusters can be avoided by using clusters selected using the
117
+ Sunyaev Zeldovich (SZ) effect (Sunyaev & Zeldovich 1970, 1980).
118
+ Zürcher & More (2019) used galaxy clusters selected from the Planck
119
+ SZ survey and cross-correlated them with galaxies detected in the
120
+ Pan-STARRS. Shin et al. (2019) used SZ clusters selected from
121
+ the Atacama Cosmology Telescope (ACT) Polarimeter (Hilton et al.
122
+ 2018) and the South Pole Telescope (SPT, Bleem et al. 2015) SZ
123
+ survey along with galaxy catalog data from the Dark Energy Survey
124
+ (DES, The Dark Energy Survey Collaboration 2005). They use both
125
+ the galaxy number density and weak lensing profiles to obtain the
126
+ constraints on the splashback radius and found the results consistent
127
+ with the ΛCDM predictions, albeit with a larger errorbar which does
128
+ not entirely preclude the initial results from optically selected clus-
129
+ ters. Similarly, Shin et al. (2021) show consistency of the measured
130
+ splashback radius with expectations from ΛCDM using a larger clus-
131
+ ter catalogue with improved precision, yet not with errors that could
132
+ rival those obtained with optical clusters (More et al. 2016; Baxter
133
+ et al. 2017; Chang et al. 2018; Murata et al. 2020). Furthermore,
134
+ studies along the same lines have used galaxy clusters identified us-
135
+ ing the X-rays emitted by the bremsstrahlung emission from ICM
136
+ (Umetsu & Diemer 2017; Contigiani et al. 2019b; Bianconi et al.
137
+ 2021) and found similar results.
138
+ In this study, we use galaxy clusters selected based on their X-
139
+ ray emission and cross-correlate their positions with those of optical
140
+ galaxies (More et al. 2016; Baxter et al. 2017; Chang et al. 2018;
141
+ Murata et al. 2020). Previous studies with X-ray clusters (Umetsu &
142
+ Diemer 2017; Contigiani et al. 2019b; Bianconi et al. 2021) are based
143
+ on either a limited number of galaxy clusters due to the shallower
144
+ depth of the survey or their limited area coverage. Instead, our goal is
145
+ to use the X-ray galaxy clusters from the extended ROentgen Survey
146
+ with an Imaging Telescope Array (eROSITA, Merloni et al. 2012;
147
+ Predehl et al. 2021) on board the SRG mission, a highly sensitive
148
+ space-based X-ray telescope launched in July 2019. The eROSITA
149
+ mission aims to conduct an all sky survey in X-rays which will
150
+ yield a catalog of ∼ 100000 X-ray galaxy clusters by the end of
151
+ four years of operation (Borm et al. 2014). Before observing the
152
+ entire sky, eROSITA first collected data from a smaller equatorial
153
+ field of approximately 140 sq. deg. at its planned depth to test its
154
+ performance. The X-ray galaxy cluster data provided by the eROSITA
155
+ final equatorial depth survey (eFEDS) has been extensively studied
156
+ for cluster cosmology (see for e.g. Sanders et al. 2022; Ramos-Ceja
157
+ et al. 2022; Ghirardini et al. 2022; Chiu et al. 2022b,a; Bulbul et al.
158
+ 2022; Bahar et al. 2022; Klein et al. 2022). As a pilot study we will
159
+ use the eFEDS X-ray galaxy clusters and obtain constraints on the
160
+ location of the splashback radius by measuring the number density
161
+ profiles of galaxies correlated with these clusters.
162
+ Inference of the splashback radius using measurements of the
163
+ galaxy number density profile is possible if galaxies act as test par-
164
+ ticles in the cluster potential and dynamically are distributed similar
165
+ to dark matter particles. Galaxies residing in massive subhaloes are
166
+ expected to be affected by dynamical friction (Chandrasekhar 1943),
167
+ which slows down their motion around the cluster centre and de-
168
+ creases the radius at which they reach their first apocenters. This
169
+ effect on the orbit could potentially bias the measurements of the
170
+ splashback radius and has been seen in simulations (More et al.
171
+ 2016; O’Neil et al. 2022b) and with observational claims (Adhikari
172
+ et al. 2014, cf. More et al. 2016). Dynamical friction can be min-
173
+ imized by using the faintest of galaxies residing in low-mass sub-
174
+ haloes that are affected very little by dynamical friction. The Hyper
175
+ Suprime Cam (HSC) survey provides photometric galaxies down to
176
+ an i-band magnitude of 26 with excellent seeing conditions (Aihara
177
+ et al. 2018a). We use galaxies from the HSC S19A internal data re-
178
+ lease (Aihara et al. 2022) and cross-correlate them with X-ray galaxy
179
+ clusters selected from eFEDS. We constrain the splashback radius
180
+ and compare its magnitude with the commonly used spherical over-
181
+ density boundary 𝑅200m. For halo mass estimates, we use the galaxy
182
+ shape catalogue data from HSC S16A (Mandelbaum et al. 2018a) to
183
+ measure the weak lensing signal around our clusters.
184
+ We describe the different data catalogs we use in Section 2, while
185
+ the measurement and the modelling techniques are described in Sec-
186
+ tion 3. In Section 4 we present the main results and compare them
187
+ with earlier works. We then summarize our findings in Section 5.
188
+ Throughout the work, we use flat ΛCDM cosmological model with
189
+ matter density Ωm = 0.27, baryon density Ωb = 0.049, power law
190
+ index of the initial power spectrum 𝑛s = 0.95, variance of density
191
+ fluctuation 𝜎8 = 0.81, temperature of the cosmic microwave back-
192
+ ground TCMB = 2.726 K and the Hubble parameter ℎ = 0.7 as
193
+ out fiducial cosmological model. The symbol 𝑟 represents the three-
194
+ dimensional while 𝑅 represents the projected two-dimensional radial
195
+ distance from the cluster center. We use the halo mass definition of
196
+ 𝑀200m and corresponding halo boundary 𝑅200m as the radius en-
197
+ MNRAS 000, 1–14 (2015)
198
+
199
+ Splashback radius around X-ray galaxy clusters
200
+ 3
201
+ closing the matter density 200 times the present matter density of the
202
+ universe and the log used is the logarithm at base ten.
203
+ 2 DATA
204
+ 2.1 X-Ray Cluster Catalogue
205
+ The eROSITA (Merloni et al. 2012; Predehl et al. 2021) is a seven
206
+ telescope module capable of detecting X-rays onboard the Russian-
207
+ German Spectrum-Roentgen-Gamma (SRG) satellite (Sunyaev et al.
208
+ 2021) orbiting around the Lagrange point L2. It provides a field of
209
+ view of ≈ 1deg2 with excellent imaging quality. The on-axis energy
210
+ resolution is ≈ 18′′ at 1.48 keV and ≈ 26′′ average angular resolu-
211
+ tion over the full field of view (Predehl et al. 2021). The eROSITA
212
+ final equatorial depth survey (eFEDS) is a small field having an
213
+ area of 140 deg2 with a vignetted corrected average exposure time
214
+ of ∼ 1.3ks carried out at a depth similar to the depth to be achieved
215
+ after eROSITA All-Sky Survey is complete. Thus it works as a per-
216
+ formance verification phase for the whole survey.
217
+ The data for the eFEDS comprises of observations in the energy
218
+ band 0.2-2.3 keV. The data were collected during the first quarter
219
+ of Nov 2019. This data was processed using the eROSITA Standard
220
+ Analysis Software System (eSASS) pipeline for source detections
221
+ (Brunner et al. 2022). The candidate source detection for the X-ray
222
+ clusters provides a detection likelihood Ldet and an extent likelihood
223
+ Lext for each source. In order to select galaxy clusters we apply
224
+ quality cuts of Ldet > 5 and Lext > 6. The values of these thresh-
225
+ olds were calibrated using simulations which demonstrate that these
226
+ cuts tend to give a secure sample with about 80 percent genuine
227
+ clusters (Comparat et al. 2020). The application of the quality cuts
228
+ results in a sample of 542 X-ray galaxy clusters (for more detail,
229
+ see Brunner et al. 2022; Liu et al. 2022). A number of these galaxy
230
+ clusters were optically confirmed using the Multi-Component Match
231
+ filter (MCMF) algorithm (Klein et al. 2018, 2019). The MCMF uses
232
+ galaxies from both HSC S20A and the DESI Legacy Imaging Sur-
233
+ veys (Dey et al. 2019) to provide redshifts estimate 𝑧cl, richness 𝜆cl
234
+ and secondary peak contamination fraction 𝑓cont. The contamina-
235
+ tion fraction provides a quantitative measure for the probability of
236
+ the chance superposition in the optical. As suggested in Klein et al.
237
+ (2022), we use a cut of 𝑓cont < 0.2 which selects an X-ray clus-
238
+ ter sample with minimal contamination as deduced from the optical
239
+ confirmation. In fact due to the luminosity cut we use for selecting
240
+ the X-ray clusters, a vast majority of them (98 out of 109) have a con-
241
+ tamination in the optical confirmation at a level less than 5% (i.e.,
242
+ 𝑓cont < 0.05). The full description of MCMF optimal confirmation
243
+ analysis for our dataset is given in Klein et al. (2022).
244
+ In the current work, we use X-ray cluster data from the pub-
245
+ licly released eFEDS catalogue version 2.1 as described in Klein
246
+ et al. (2022). The catalogue provides the sky position of each of
247
+ the galaxy clusters in the columns RA_CORR, DEC_CORR, the
248
+ redshifts and its associated error in the columns Z_BEST_COMB,
249
+ SIGMA_Z_BEST_COMB, along with the contamination fraction in
250
+ the column F_CONT_BEST_COMB. Similar, we use the columns
251
+ ML_FLUX, ML_FLUX_ERR for the flux and its errors in the 0.5-2.0
252
+ keV band. We select those clusters which have less than 20 percent
253
+ relative error on both the redshift and flux measurements.
254
+ Finally, we also convert the flux values to luminosities 𝐿X =
255
+ 4𝜋𝑑2
256
+ l (𝑧) 𝑓X, where 𝑑l(𝑧) is the luminosity distance at redshift 𝑧 for
257
+ our fiducial cosmological model. We select galaxy clusters that sat-
258
+ isfy a threshold of 𝐿X > 1043.5erg s−1h−2 and have redshift 𝑧 < 0.75
259
+ as shown in Figure 1. The solid red line shows our selection which
260
+ 0.00
261
+ 0.25
262
+ 0.50
263
+ 0.75
264
+ 1.00
265
+ 1.25
266
+ z
267
+ 1041
268
+ 1042
269
+ 1043
270
+ 1044
271
+ LX(erg s−1h−2)
272
+ Figure 1. Sample selection: The above figure represents the scatter plot
273
+ between X-ray luminosity 𝐿𝑋 and redshift 𝑧 for our eFEDS galaxy cluster
274
+ sample using clusters residing in the HSC S19A footprint with 1𝜎 errors in
275
+ the y direction. The solid red line represents a roughly volume-limited sample
276
+ selection at luminosity threshold 𝐿𝑋 > 1043.5erg s−1h−2 within the redshift
277
+ of 𝑧 < 0.75 and providing 109 X-ray galaxy clusters for our analysis (without
278
+ the k-correction). The eROSITA eFEDS field has roughly 90 deg2 masked
279
+ overlapping region with HSC S19A.
280
+ corresponds to 109 X-ray galaxy clusters that we use for our analysis.
281
+ These selection cuts help us to prune out less massive clusters at low
282
+ redshift while giving us a sample that looks approximately volume
283
+ limited. We note that we have not applied any k and 𝑛H corrections
284
+ to keep our sample selection simple, where 𝑛H is the galactic neutral
285
+ hydrogen column density. However, we have also checked by using
286
+ the corrected values for luminosities given by Liu et al. (2022) and
287
+ our sample changes by at most 10 percent.
288
+ We will also use a subsample of 45 X-ray clusters that reside within
289
+ the footprint that encompasses the HSC S16a internal data release.
290
+ This subsample will be used to carry out a weak lensing analysis with
291
+ the help of the first year shape catalog from the HSC survey. In order
292
+ to explore any systematic effects, we use 100 times more random
293
+ points in the same field constructed using the sensitivity map from
294
+ the eFEDS region. We assign redshifts to these randoms by drawing
295
+ with replacement from the parent redshift distribution of our cluster
296
+ sample.
297
+ 2.2 Galaxy Catalogues
298
+ We use a galaxy catalogue from the Subaru Hyper Suprime-Cam
299
+ (HSC) optical imaging survey carried out using the wide-field
300
+ (1.77 deg2) Hyper Suprime-Cam instrument (Komiyama et al. 2018;
301
+ Miyazaki et al. 2018). The Subaru is a 8 meter class telescope situ-
302
+ ated at the summit of Maunakea in Hawai’i where the median seeing
303
+ is close to ∼ 0.6”. The HSC survey collaboration has concluded a
304
+ wide angle imaging survey of 1200 sq. deg. in the 𝑢𝑔𝑟𝑖𝑧𝑦 bands at
305
+ a depth of 𝑖 = 26 under the Subaru Strategic Program (SSP, Aihara
306
+ et al. 2018a).
307
+ We use galaxies from an area ∼ 90 deg2 in the GAMA09H field
308
+ MNRAS 000, 1–14 (2015)
309
+
310
+ 4
311
+ Rana et al.
312
+ from the internal data release S19A of the HSC survey. Following
313
+ Murata et al. (2020), we use fluxes from the forced photometry table,
314
+ and use objects brighter than z-band cmodel magnitude (galactic
315
+ extinction corrected) 𝑚𝑧 < 24.5. We select only those objects that
316
+ have flux errors less than 20 percent and restrict ourselves to sources
317
+ that are extended in the z-band (z_extendedness_value != 0). We
318
+ note that given the redshifts of our clusters, the the 4000Å never
319
+ enters the 𝑧 band, which avoids any non-uniformities in the sample
320
+ selection.
321
+ In order to avoid selecting galaxies from regions which do not
322
+ have sufficient depth, we use galaxies which have been observed in
323
+ a minimum number of exposures in the HSC survey. Such a selec-
324
+ tion is made by using the columns [gr]_inputcount_value≥2
325
+ and [izy]_inputcount_value≥4. We also apply various flags to
326
+ remove galaxies affected by bad pixels and remove duplicates due to
327
+ overlaps in the area processed by the software pipeline. In particular
328
+ we use
329
+ • z_deblend_skipped = False
330
+ • z_cmodel_flag_badcentroid = False
331
+ • z_cmodel_flag = False
332
+ • z_pixelflags_edge = False
333
+ • z_pixelflags_interpolatedcenter = False
334
+ • z_pixelflags_saturatedcenter = False
335
+ • z_pixelflags_crcenter = False
336
+ • z_pixelflags_bad = False
337
+ • z_pixelflags_suspectcenter = False
338
+ • z_pixelflags_clipped = False
339
+ • z_detect_isprimary = True
340
+ • z_sdsscentroid_flag = False
341
+ In addition we also use flags from the mask table in order to reduce
342
+ the impact of bright stars in the HSC survey - the ghost mask, the halo
343
+ mask and the blooming mask as described in Aihara et al. (2022).
344
+ These conditions can be summarized as:
345
+ • z_mask_brightstar_ghost = False
346
+ • z_mask_brightstar_blooming = False
347
+ • z_mask_brightstar_halo = False
348
+ We also infer the halo masses for our cluster sample using weak
349
+ gravitational lensing. For this purpose, we use the shape information
350
+ of galaxies from the incremental data release S16A that includes the
351
+ first year shape catalogue (Aihara et al. 2019). This data release is has
352
+ slightly more data compared to the first public data release (Aihara
353
+ et al. 2018b) of the HSC survey. The entire S16A shape catalog
354
+ spans six different fields - HECTOMAP, GAMA09H, WIDE12H,
355
+ GAMA15H, XMM, and VVDS covering a total area of 136.9 deg2
356
+ and has an effective galaxy number density of 21.5 arcmin−2 with a
357
+ median redshift of 0.8.
358
+ We use data from the GAMA09H field as it overlaps with the
359
+ eFEDS cluster catalogue in terms of sky area. The shape catalogue
360
+ provides the sky positions for galaxies, their estimated shapes and
361
+ their corresponding calibrations. The shapes of galaxies are rep-
362
+ resented by two ellipticities (𝑒1, 𝑒2) = (𝑒 cos 2𝜙, 𝑒 sin 2𝜙) with
363
+ 𝑒 = (𝑎2 − 𝑏2)/(𝑎2 + 𝑏2), where a and b are the semimajor and
364
+ semiminor axis of the galaxies (Bernstein & Jarvis 2002) with 𝜙
365
+ as the position angle of major axis in equatorial coordinate system.
366
+ These shapes are estimated using the re-Gaussianization technique
367
+ (Hirata & Seljak 2003), which has been extensively studied using
368
+ data from the SDSS survey (Mandelbaum et al. 2005; Reyes et al.
369
+ 2012; Mandelbaum et al. 2013).
370
+ The shape catalog also provides additive bias (𝑐1, 𝑐2), multiplica-
371
+ tive bias 𝑚 corrections, the rms value for intrinsic ellipticities 𝑒rms
372
+ and the measurement error 𝜎𝑒 for each galaxy. This additional cal-
373
+ ibration data were obtained by image simulations performed using
374
+ an open-source software package - GALSIM (Rowe et al. 2015) that
375
+ mimic observation conditions for the HSC survey (Mandelbaum et al.
376
+ 2018b). While computing the weak lensing signal, we assign weights
377
+ 𝑤𝑠 to each galaxies using their 𝑒rms and 𝜎𝑒 as 𝑤𝑠 = (𝑒2rms +𝜎2𝑒)−1 as
378
+ is described in more detail in Mandelbaum et al. (2018b). The shape
379
+ catalogue already includes various quality cuts, primary amongst
380
+ which is an i-band magnitude limit of 𝑖 < 24.5 as suggested in Man-
381
+ delbaum et al. (2018a) for studies related to weak lensing cosmology.
382
+ The HSC survey provides full probability distribution function 𝑝(𝑧)
383
+ for each galaxy in the shape catalogue for each of the six different
384
+ methods (Tanaka et al. 2018). We use the 𝑝(𝑧) computed using the
385
+ classical template fitting code - Mizuki (Tanaka 2015) for the weak
386
+ lensing signal measurements along with a selection cut on the 𝑝(𝑧)
387
+ to extract a secured sample of background galaxies as described in
388
+ Section 3.1. We also checked our results using other photometric
389
+ redshift estimation methods and found no significant change in the
390
+ inferred values for the model parameters.
391
+ 3 MEASUREMENTS AND MODELLING
392
+ Here we will describe the methods used for measurements and mod-
393
+ elling of the weak lensing profiles and the cluster galaxy cross-
394
+ correlations for our sample.
395
+ 3.1 Weak Lensing Profile
396
+ The weak gravitational lensing imprints a coherent tangential dis-
397
+ tortion pattern in the shapes of background source galaxies due to
398
+ matter present in and around foreground lens galaxies (see Kilbinger
399
+ 2015; Mandelbaum 2018, for a recent review). These distortions can
400
+ be measured as a function of projected cluster-centric comoving ra-
401
+ dial distance 𝑅 and are related with the projected matter distribution
402
+ in the foreground lens such that
403
+ ¯Σ(𝑅) − ⟨Σ(𝑅)⟩ = Σcrit𝛾𝑡
404
+ (1)
405
+ where the ¯Σ(𝑅) − ⟨Σ(𝑅)⟩ = ΔΣ(𝑅) is known as excess surface
406
+ density (ESD). The quantity ¯Σ(𝑅) =
407
+ ∫ 𝑅
408
+ 0 Σ(𝑅′)2𝜋𝑅′ 𝑑𝑅′/𝜋𝑅2 is the
409
+ average surface matter density within a projected distance 𝑅 while
410
+ ⟨Σ(𝑅)⟩ is the azimuthally averaged surface matter density at the
411
+ same distance. The quantity 𝛾𝑡 denotes the average tangential shear,
412
+ and Σcrit denotes the critical surface density, a geometric factor that
413
+ quantifies the lensing efficiency of a given lens-source pair, such that,
414
+ Σcrit =
415
+ 𝑐2
416
+ 4𝜋𝐺
417
+ 𝐷a(𝑧s)
418
+ (1 + 𝑧l)2𝐷a(𝑧l)𝐷a(𝑧l, 𝑧s) .
419
+ (2)
420
+ Here the quantities 𝐷a(𝑧s), 𝐷a(𝑧l) and 𝐷a(𝑧l, 𝑧s) are the angular
421
+ diameter distances between us and the source at redshift 𝑧s, us and the
422
+ lens at redshift 𝑧l and between a given lens-source pair, respectively.
423
+ The (1 + 𝑧l)2 factor in the denominator is related to our use of
424
+ comoving coordinates (Mandelbaum et al. 2006).
425
+ Following Mandelbaum et al. (2018a), we compute the ESD
426
+ ΔΣ(𝑅𝑖) for our lensing sample using the HSC background source
427
+ galaxies at ten logarithmic cluster centric projected comoving radial
428
+ MNRAS 000, 1–14 (2015)
429
+
430
+ Splashback radius around X-ray galaxy clusters
431
+ 5
432
+ distance bins 𝑅𝑖 ranging from 0.2 to 2 h−1Mpc, such that
433
+ ΔΣ(𝑅𝑖) =
434
+ 1
435
+ 1 + 𝑚
436
+ � �
437
+ ls∈𝑅𝑖 𝑤ls𝑒𝑡,ls⟨Σ−1
438
+ crit⟩−1
439
+ 2R �
440
+ ls∈𝑅𝑖 𝑤ls
441
+
442
+
443
+ 1
444
+ 1 + 𝑚
445
+ � �
446
+ ls∈𝑅𝑖 𝑤ls𝑐𝑡,ls⟨Σ−1
447
+ crit⟩−1
448
+
449
+ ls∈𝑅𝑖 𝑤ls
450
+
451
+ .
452
+ (3)
453
+ Here 𝑒𝑡,ls and 𝑐𝑡,ls are the components of the ellipticities (𝑒1, 𝑒2) and
454
+ additive bias (𝑐1, 𝑐2) in the tangential direction to the line joining
455
+ the lens and the source. The summation is over all the lens-source
456
+ pair ls having separation of 𝑖th radial bin 𝑅𝑖. We also use minimum
457
+ variance weights such that 𝑤ls = 𝑤s⟨Σ−1
458
+ crit⟩2. The quantity ⟨Σ−1
459
+ crit⟩ is
460
+ the average of the inverse surface critical density over the probability
461
+ distribution of source redshift 𝑝(𝑧s) given by
462
+ ⟨Σ−1
463
+ crit⟩ = 4𝜋𝐺(1 + 𝑧l)2
464
+ 𝑐2
465
+ ∫ ∞
466
+ 𝑧l
467
+ 𝐷a(𝑧l)𝐷a(𝑧l, 𝑧s)
468
+ 𝐷a(𝑧s)
469
+ 𝑝(𝑧s)𝑑𝑧s .
470
+ (4)
471
+ The 1 + 𝑚 factor in the denominator of Eq. 3 corresponds to the
472
+ multiplicative bias with 𝑚 = �
473
+ ls∈𝑅𝑖 𝑤ls𝑚s/�
474
+ ls∈𝑅𝑖 𝑤ls and R is the
475
+ shear responsitivity which corrects for the response of ellipticities to
476
+ an applied value of shear and is computed using 𝑒rms (Bernstein &
477
+ Jarvis 2002) as,
478
+ R = 1 −
479
+
480
+ ls∈𝑅𝑖 𝑤ls𝑒2
481
+ rms,ls
482
+
483
+ ls∈𝑅𝑖 𝑤ls
484
+ .
485
+ (5)
486
+ In order to have reduce contamination of the lensing signal by
487
+ foreground galaxies or galaxies correlated with our clusters, we only
488
+ use sources which satisfy
489
+ ∫ ∞
490
+ 𝑧max+𝑧diff
491
+ 𝑝(𝑧s)𝑑𝑧s > 0.99 .
492
+ (6)
493
+ We use 𝑧max = 0.75 as the maximum redshift of our lensing sam-
494
+ ple and 𝑧diff = 0.2 as an additional offset for better selection of
495
+ the background. We also use galaxies with a photo-z quality cut of
496
+ photo_z_risk_best_value < 0.5. Further, we also apply a mul-
497
+ tiplicative bias 𝑚sel related to the selection of galaxies above the
498
+ resolution threshold (𝑅2 ≥ 0.3) which is used to select source galax-
499
+ ies during the construction of the shape catalog (see Mandelbaum
500
+ et al. 2018b). This selection bias is related to the probability density
501
+ 𝑝(𝑅2) at the threshold 𝑅2 = 0.3 such that 𝑚sel = 𝐴𝑝(𝑅2 = 0.3) with
502
+ 𝐴 = 0.00865. The probability 𝑝(𝑅2 = 0.3) is computed using the
503
+ lens-source weights 𝑤ls for individual radial bin 𝑅𝑖.
504
+ We apply the redshift selection cuts on source galaxies to select
505
+ the background galaxy population. Any residual galaxies left in our
506
+ source population that are associated with the cluster could poten-
507
+ tially dilute the weak lensing signal. We can correct for such a dilution
508
+ by multiplying the signal by a boost factor 𝐶(𝑅𝑖) (for example Hirata
509
+ et al. 2004; Mandelbaum et al. 2005; Miyatake et al. 2015) which is
510
+ the ratio between weighted lens-source pair counts to the weighted
511
+ random-source pair counts in a given radial bin 𝑅𝑖 such that,
512
+ 𝐶(𝑅𝑖) =
513
+ 𝑁r
514
+
515
+ ls∈𝑅𝑖 𝑤ls
516
+ 𝑁l
517
+
518
+ rs∈𝑅𝑖 𝑤rs
519
+ .
520
+ (7)
521
+ Here the quantities 𝑁r and 𝑁l are the number of random points and
522
+ lenses in our sample, respectively. The weight 𝑤ls and 𝑤rs correspond
523
+ to lens-source and random-source pairs. We use 100 different random
524
+ realizations in our work such that they have the same number as lenses
525
+ within the same sky coverage, and also satisfy the same star mask,
526
+ and by construction, have the same redshift distribution as our lensing
527
+ sample. We find that the boost parameters are mostly consistent with
528
+ unity demonstrating the utility of our redshift cuts, so we neglect
529
+ them in this study. We refer to Appendix A for more discussion on
530
+ boost parameter measurements for our lensing sample.
531
+ Along with the correction for the dilution of ESD signal using the
532
+ boost parameters, we also check for any systematic bias due to the
533
+ use of photometric redshifts for the source galaxies while computing
534
+ the critical surface density. Following eqn. 5 in Mandelbaum et al.
535
+ (2008), we compute the magnitude of such biases 𝑏(𝑧𝑙) for a lens at
536
+ redshift 𝑧𝑙 using
537
+ ΔΣ
538
+ ΔΣ𝑡 = 1 + 𝑏(𝑧l) =
539
+
540
+ s 𝑤ls⟨Σ−1
541
+ crit,ls⟩−1 �
542
+ Σ𝑡
543
+ crit,ls
544
+ �−1
545
+
546
+ s 𝑤ls
547
+ .
548
+ (8)
549
+ Here the quantities with superscript 𝑡 represent the true values of
550
+ the corresponding quantities and the sum runs over all the source
551
+ galaxies. Ideally the bias needs to be estimated using spectroscopic
552
+ redshifts for a representative subsample of source galaxies. However,
553
+ given the depth of the HSC survey, a reasonably large survey with
554
+ such spectroscopic redshift is not available. Therefore, we use ro-
555
+ bust estimates of photometric redshifts from the COSMOS-30 band
556
+ photometry (Ilbert et al. 2009) and assume it to be a much more
557
+ realistic estimate of the redshifts of our source galaxies. We also in-
558
+ clude weights for each source galaxy 𝑤som that match the colour and
559
+ magnitudes distribution of COSMOS-photoz galaxies to our source
560
+ galaxy sample. These 𝑤som are included in the 𝑤ls while doing the
561
+ computations as done in previous studies (for e.g. Nakajima et al.
562
+ 2012; Miyatake et al. 2019; Murata et al. 2019). We then use eqn.
563
+ 23 from Nakajima et al. (2012) to assign appropriate weights for
564
+ our lenses to compute the average bias for the ESD signal. For our
565
+ sample, we obtain three percent bias on average, which is negligible
566
+ given the statistical uncertainty in the signal measurements.
567
+ We also subtract the ESD signal around random points from the
568
+ signal computed from our lensing sample to correct for any scale
569
+ dependent systematics (for more details refer to Sheldon et al. 2004;
570
+ Mandelbaum et al. 2005; Singh et al. 2017). We compute the ran-
571
+ dom signal by averaging over ESD measurements from 100 different
572
+ realizations of randoms.
573
+ The presence of the same source galaxy at different radial bins
574
+ for different galaxy clusters can give rise to a covariance between
575
+ the ESD measurements in the different radial bins. We quantify this
576
+ covariance by randomly rotating the shapes of our source galaxies
577
+ which washes away the shear signal imparted on them and allows us
578
+ to estimate the covariance due to shape noise. In our study, we utilize
579
+ 200 different random rotations and use the ESD measurements in
580
+ each case to estimate the covariance, as discussed in Appendix B. As
581
+ we model signal upto 1h−1Mpc we expect shapenoise to dominate
582
+ over large scale structure contribution on these length scales. So, we
583
+ use the shape noise covariance for our analysis and infer the halo
584
+ masses for our lensing sample.
585
+ We model the dark matter distribution around clusters as a NFW
586
+ density profile 𝜌nfw(𝑟) at a three-dimensional radius 𝑟.
587
+ 𝜌nfw(𝑟) =
588
+ 𝛿c𝜌m
589
+
590
+ 𝑟
591
+ 𝑟s
592
+ � �
593
+ 1 + 𝑟
594
+ 𝑟s
595
+ �2 ,
596
+ (9)
597
+ 𝛿c = 200
598
+ 3
599
+ 𝑐3
600
+ ln(1 + 𝑐) −
601
+ 𝑐
602
+ 1+𝑐
603
+ .
604
+ (10)
605
+ Here 𝑟s = 𝑟200m/𝑐 is the scale radius of the galo with 𝑟200m as the
606
+ three dimensional radius of a sphere enclosing the average density
607
+ of 200 times the present matter density 𝜌m of the Universe,
608
+ 𝑟200m =
609
+ � 3𝑀200m
610
+ 4𝜋200𝜌m
611
+ �1/3
612
+ .
613
+ (11)
614
+ MNRAS 000, 1–14 (2015)
615
+
616
+ 6
617
+ Rana et al.
618
+ So given the model we just need two parameters Θ = (𝑀200m, 𝑐)
619
+ the halo mass 𝑀200m and the concentration parameter 𝑐 to predict
620
+ the ESD profile ΔΣ(𝑅). In practice, we use the analytical form for
621
+ ΔΣ(𝑅) given by eqn. 136-140 in Schneider (2006) for the case of the
622
+ NFW profile.
623
+ In principle, previous works have also added a point mass contri-
624
+ bution for the baryonic component of the central galaxy of the cluster
625
+ (e.g., Kobayashi et al. 2015). However for the scales of our interest,
626
+ the dark matter contribution is the dominant component. We also do
627
+ not split the dark matter contribution into 1-halo and 2-halo terms (for
628
+ more details, see Hikage et al. 2013; Miyatake et al. 2016) or use an
629
+ off-centering kernel (Johnston et al. 2007) in order to account for the
630
+ possible misidentification of the cluster centre. Given the scales we fit
631
+ and the statistical errors on our mass estimates, none of these effects
632
+ would cause a significant difference to our conclusions. Furthermore
633
+ we also do not carry out a halo occupation distribution (HOD) based
634
+ modelling (e.g., Seljak 2000; Cooray & Sheth 2002; van den Bosch
635
+ et al. 2013) as the quantity of our interest is the average halo mass
636
+ rather than the entire distribution of the halo masses. At the high mass
637
+ end corresponding to our galaxy clusters, the distribution is expected
638
+ to be peaked due to the presence of the exponential tail of the mass
639
+ function. Due to all these reason we limit our modelling to the simple
640
+ NFW profile based modelling scheme as described above. In future,
641
+ we expect the splashback radius measurements using X-ray clusters
642
+ to improve further, which will require a more detailed analysis of the
643
+ weak lensing signal of these galaxy clusters.
644
+ 3.2 Galaxy Number Density
645
+ We follow the method used in More et al. (2016) for the measurement
646
+ of the cluster galaxy cross-correlation measurements. We use the
647
+ Davis-Peebles estimator (Davis & Peebles 1983) to compute the
648
+ projected cross-correlation between our X-ray clusters with the HSC
649
+ photometric galaxies. The projected cross-correlation 𝜉2D(𝑅) at a
650
+ projected comoving radius 𝑅 is given by
651
+ 𝜉2D(𝑅) = 𝐷c𝐷g
652
+ 𝑅c𝐷g
653
+ − 1 ,
654
+ (12)
655
+ where 𝐷c𝐷g are the pair counts between clusters-galaxies and 𝑅c𝐷g
656
+ are the pair counts between cluster randoms-galaxy at a comoving
657
+ projected separation of 𝑅. The number counts for the random points
658
+ are normalized to account for the difference in the number of clusters
659
+ and that of randoms. We measure the signal over nine logarithmically
660
+ spaced comoving projected radial bins from 0.1 to 2.8 h−1Mpc. We
661
+ use 40 times more randoms than the number of galaxy clusters in our
662
+ sample.
663
+ The flux limit of the photometric survey can affect the galaxy distri-
664
+ bution around the galaxy clusters by detecting many fainter galaxies
665
+ around the clusters closer to us and can bias our measurements. To
666
+ remove such biases, we use the photometric galaxies having z-band
667
+ absolute magnitude cut 𝑀𝑧 −5 log ℎ < −19.36, which corresponds to
668
+ an apparent magnitude limit of 𝑚𝑧 = 24.0 at redshift 𝑧 = 0.75 which
669
+ ensures the population of galaxies has similar intrinsic properties
670
+ around each cluster in our sample even though they are at different
671
+ redshifts. We estimate the covariance of our measurements using 20
672
+ jackknife (Miller 1974) regions that have an approximately square
673
+ shape and an area of 5 deg2. The side of the squares corresponds to
674
+ 47 h−1Mpc at the median redshift 𝑧 = 0.46 for our sample and is
675
+ larger than the radial range for signal measurement, justifying our
676
+ choice of jackknife region size. We have shown the corresponding
677
+ covariance in Appendix B.
678
+ We parameterize the density profile with the functional form sug-
679
+ gested by Diemer & Kravtsov (2014) in order to model the cross
680
+ correlation signal as is standard practice in the literature (More et al.
681
+ 2016; Baxter et al. 2017; Chang et al. 2018; Nishizawa et al. 2018;
682
+ Zürcher & More 2019; Shin et al. 2019; Murata et al. 2020; Shin
683
+ et al. 2021). The density profile 𝜉3D(𝑟) consists of an inner Einasto
684
+ profile (Einasto 1965) 𝜌in(𝑟) and an outer powerlaw profile 𝜌out(𝑟)
685
+ connected by a smooth transistion function 𝑓trans(𝑟) at a three di-
686
+ mensional radial distance of 𝑟,
687
+ 𝜉3D(𝑟) = 𝜌in(𝑟) 𝑓trans(𝑟) + 𝜌out(𝑟) ,
688
+ (13)
689
+ 𝜌in(𝑟) = 𝜌s exp
690
+
691
+ − 2
692
+ 𝛼
693
+ �� 𝑟
694
+ 𝑟s
695
+ � 𝛼
696
+ − 1
697
+ ��
698
+ ,
699
+ (14)
700
+ 𝜌out(𝑟) = 𝜌o
701
+ � 𝑟
702
+ 𝑟out
703
+ �−𝑠e
704
+ ,
705
+ (15)
706
+ 𝑓trans(𝑟) =
707
+
708
+ 1 +
709
+ � 𝑟
710
+ 𝑟t
711
+ �𝛽�−𝛾/𝛽
712
+ .
713
+ (16)
714
+ We compute the two-dimensional cross-correlation profile 𝜉2D(𝑅)
715
+ at the projected radius 𝑅 by integrating the three-dimensional profile
716
+ 𝜉3D(𝑟) along the line of sight direction 𝜋,
717
+ 𝜉2D(𝑅) =
718
+ 1
719
+ 𝑅max
720
+ ∫ 𝑅max
721
+ 0
722
+ 𝜉3D
723
+ �√︃
724
+ (𝑅2 + 𝜋2)
725
+
726
+ 𝑑𝜋 .
727
+ (17)
728
+ Following More et al. (2016) we fix the maximum projected length
729
+ of 𝑅max = 40ℎ−1Mpc. Our modelling scheme eqn. 17 comprises
730
+ of nine parameters - 𝜌s, 𝛼, 𝑟s, 𝜌o, 𝑟out, 𝑠e, 𝛽, 𝑟t, 𝛾. As 𝜌o and 𝑟out are
731
+ degenerate with each other, we fix 𝑟out = 1.5ℎ−1Mpc which gives us
732
+ a total of eight parameters Θ = (𝜌s, 𝛼, 𝑟s, 𝜌o, 𝑠e, 𝛽, 𝑟t, 𝛾) modelling
733
+ scheme.
734
+ We use the Bayesian analysis to get the posterior probability for
735
+ our model parameters Θ given the data D with priors 𝑃(𝜃) on the
736
+ parameters as given in Table 1. We use a flat prior on most model
737
+ parameters and Gaussian priors on log 𝛼, log 𝛽 and log 𝛾. The Gaus-
738
+ sian priors for log 𝛼, log 𝛽 and log 𝛾 are similar to those commonly
739
+ used in literature (for eg., More et al. 2016; Shin et al. 2019; Mu-
740
+ rata et al. 2020) for splashback radius studies as they are motivated
741
+ from simulations (Gao et al. 2008; Diemer & Kravtsov 2014) and
742
+ are characteristic of typical cluster scale halos.
743
+ From the Bayes theorem, we can write the posterior 𝑃(Θ|D) as
744
+ 𝑃(Θ|D) ∝ 𝑃(D|Θ)𝑃(Θ) ,
745
+ (18)
746
+ where 𝑃(D|Θ) is the likelihood of the data given model parameters,
747
+ and we are using a Gaussian likelihood given by
748
+ 𝑃(D|Θ) ∝ exp
749
+
750
+ − 𝜒2(Θ)
751
+ 2
752
+
753
+ (19)
754
+ with 𝜒2(Θ) = [D −M(Θ)]𝑇 𝐶−1[D −M(Θ)], D is the data vector
755
+ with M(Θ) as the model prediction vector given the parameter Θ.
756
+ The noise in the covariance matrix can result in a bias when inverted
757
+ to obtain the 𝜒2. We follow eqn. 17 in Hartlap et al. (2007) in
758
+ order to account for this bias. We use the affine invariant Monte
759
+ Carlo Markov Chain (MCMC Goodman & Weare 2010) sampler
760
+ as provided by the python package emcee (Foreman-Mackey et al.
761
+ 2013) to infer the posterior distribution for our model parameters
762
+ given the measurements. In our work, we run separate MCMC to
763
+ infer parameter posteriors for the weak lensing and cross-correlation
764
+ measurements for our cluster sample and the convergence of the
765
+ chains are assured by visual inspections.
766
+ MNRAS 000, 1–14 (2015)
767
+
768
+ Splashback radius around X-ray galaxy clusters
769
+ 7
770
+ Model Parameters
771
+ Parameter
772
+ Prior
773
+ log 𝜌s
774
+ Flat[-3, 5]
775
+ log 𝛼
776
+ Gauss(log(0.2), 0.6)
777
+ log 𝑟s
778
+ Flat[log(0.1), log(5.0)]
779
+ log 𝜌o
780
+ Flat[-1.5, 1.5]
781
+ 𝑠𝑒
782
+ Flat[0.1, 4]
783
+ log 𝑟t
784
+ Flat[log(0.5), log(1.6)]
785
+ log 𝛽
786
+ Gauss(log(6.0), 0.2)
787
+ log 𝛾
788
+ Gauss(log(4.0), 0.2)
789
+ log[𝑀200m/h−1M⊙]
790
+ Flat[12, 16]
791
+ 𝑐
792
+ Flat[0, 20]
793
+ Table 1. Parameter priors: The table provides the prior distributions used for
794
+ running the MCMC chains on our model parameters. The Flat[a, b] denotes
795
+ uniform prior in the interval (a, b), and Gauss(𝜇,𝜎) is the Gaussian priors with
796
+ 𝜇 mean and 𝜎 standard deviation. The parameters log 𝜌s, log 𝛼, log 𝑟s mod-
797
+ els the inner Einasto profile with 𝜌in(𝑟); 𝑠𝑒, log 𝜌o for outer profile 𝜌out(𝑟)
798
+ and log 𝑟t, log 𝛽, log 𝛾 for the transition function 𝑓trans(𝑟) and are used to
799
+ model the galaxy number density profile. The halo mass log[𝑀200m/h−1M⊙]
800
+ and concentration 𝑐 are for the NFW profile-based modelling of the weak
801
+ lensing measurements for halo mass calibrations.
802
+ 4 RESULTS AND DISCUSSIONS
803
+ In this section, we describe our results for the weak lensing and pro-
804
+ jected cluster-galaxy cross-correlation on the X-ray cluster sample.
805
+ The weak lensing measurements allows us to infer the average halo
806
+ mass of our sample, while the cross-correlation analysis will allow
807
+ us to infer the location of the splashback radius in three dimensions.
808
+ We will combine the two to present constraints on 𝑟sp/𝑟200m.
809
+ 4.1 Halo Mass for Galaxy Clusters
810
+ We follow the methodology described in Sec 3.1 and measure the
811
+ weak lensing signal ΔΣ(𝑅) around our X-ray clusters in ten projected
812
+ logarithmically-spaced radial bins from the X-ray cluster centre with
813
+ comoving distances in the range of [0.1, 2.0] h−1Mpc. We then model
814
+ the signals using a simple NFW profile and infer the corresponding
815
+ halo mass 𝑀200m and use it to obtain the spherical overdensity size
816
+ estimate 𝑟200m.
817
+ In the top panel of Figure 2, the blue data points represent our
818
+ measurements ΔΣ and the errors are a result of shape noise. Our
819
+ measurements have a total signal-to-noise of 17.93. The weak lensing
820
+ signal shows the expected behavior and decreases as a function of the
821
+ projected radial distance to the cluster centre. The best fit model is
822
+ shown by the solid red line and corresponds to a reduced chi-squared
823
+ 𝜒2
824
+ red = 5.6/8.02, where the degrees of freedom have been computed
825
+ using eq. 29 in Raveri & Hu (2019). The blue shaded region indicates
826
+ the 68 percent of the model predictions with 𝜒2 closest to the best fit.
827
+ It shows that our model is a good description of our measurements.
828
+ The bottom panel of Figure 2 shows the results of systematic tests
829
+ for our signal measurements. The blue points with errors show the
830
+ cross-component ΔΣ× of the signal. This signal is consistent with
831
+ zero shown as the dashed grey line with a 𝜒2 of 5.26 for 10 degrees of
832
+ freedom and a corresponding p-value of 0.86. The weak gravitational
833
+ lensing is a result of the correlated dark matter distribution around our
834
+ sample of lenses. Therefore, we expect a null signal when we measure
835
+ the same around random points albeit any systematics. Similar to the
836
+ ΔΣ×, we also obtain a null signal ΔΣrand for the random points
837
+ residing in the survey region where the error is computed as the
838
+ 101
839
+ 102
840
+ ∆Σ[hM⊙pc−2]
841
+ SNR = 17.93
842
+ χ2/dof = 5.60/8.02 = 0.70
843
+ Data
844
+ 100
845
+ R[h−1Mpc]
846
+ −20
847
+ 0
848
+ 20
849
+ R · ∆Σ[106M⊙pc−1]
850
+ ∆Σ×
851
+ ∆Σrand
852
+ Figure 2. Weak lensing signals: In the top panel, the blue data points corre-
853
+ spond to our weak lensing measurements with shape noise errors for a nearly
854
+ volume-limited selected X-ray cluster sample (see Figure 1) with signal-to-
855
+ noise given in the bottom right corner. The solid red line denotes the best
856
+ fit model prediction with 𝜒2
857
+ red ≡ 𝜒2/dof value given in the upper right cor-
858
+ ner. The blue-shaded region represents the 68 percentile around the median
859
+ model predictions, and Table 2 presents the constrained model parameter
860
+ values. The bottom panel shows the systematic checks for our weak lensing
861
+ signal ΔΣ measurements. ΔΣ× denotes the cross component of weak lensing
862
+ signal with shape noise errors, and ΔΣrand shows the measurements around the
863
+ random points with errors over mean computed using the random realisations.
864
+ The grey dashed zero line shows the expected null signal.
865
+ scatter from 100 random realizations. These two systematic checks
866
+ show that our signal measurements are robust.
867
+ In Figure 3, the light and dark shaded blue regions show the 68 and
868
+ 95 percent credible regions in the inference of the halo mass and its
869
+ concentration parameter. We obtain 13 percent constraints on the halo
870
+ mass, i.e., log[𝑀200m/h−1M⊙] = 14.52±0.06 and approximately 20
871
+ percent on the concentration parameter 𝑐 = 4.49+0.90
872
+ −0.79. The ΛCDM
873
+ expectation for the concentration at the halo mass of our interest
874
+ computed using the concentration-mass relation by Diemer & Joyce
875
+ (2019) from the package COLOSSUS (Diemer 2018) is equal to 4.83
876
+ which is consistent with our inference. We have also cross-checked
877
+ our measured halo masses with those made using a joint calibration
878
+ of weak lensing and cluster abundance for our X-ray cluster sample
879
+ (Chiu et al. 2022a)1 and found log[𝑀200m/h−1M⊙] = 14.58 , which
880
+ is consistent with our measurements. In principle, the weak lensing
881
+ measured halo mass may be different from the true halo mass due to
882
+ 1 This study uses 𝑀500c as the halo mass definitions and we use an
883
+ concentration-mass relation by Diemer & Joyce (2019) in COLOSSUS to
884
+ convert the masses into the definition used in our work 𝑀200m.
885
+ MNRAS 000, 1–14 (2015)
886
+
887
+ 8
888
+ Rana et al.
889
+ 14.40
890
+ 14.55
891
+ 14.70
892
+ log M200m
893
+ 4
894
+ 6
895
+ 8
896
+ c
897
+ 4
898
+ 6
899
+ 8
900
+ c
901
+ Figure 3. Mass profile fits posteriors: The above contour plot shows the
902
+ degeneracy between our cluster halo mass log 𝑀200m and concentration pa-
903
+ rameter 𝑐, respectively. The light and dark blue shaded contours are 68 and
904
+ 95 confidence levels.
905
+ various projection effects as well as triaxiality of the halo (see e.g.,
906
+ Becker & Kravtsov 2011). In the case of HSC WL of eFEDS clusters,
907
+ this bias consistent with 0, and is known to about 3-6 percent (Grandis
908
+ et al. 2021; Chiu et al. 2022a,b). It is thus negligible compared to our
909
+ statistical mass uncertainty of 13 percent.
910
+ Based on our inferred halo mass 𝑀200m, we derive the corre-
911
+ sponding value of the traditional halo boundary 𝑟200m = 1.75 ±
912
+ 0.08 h−1Mpc. In Section 4.2, we will use this constraint on 𝑟200m
913
+ and compare it to our inferred value of the splashback radius.
914
+ 4.2 Splashback radius of X-ray Clusters
915
+ We follow the methodology described in Section 3.2 to measure the
916
+ cross-correlation signal between our eFEDS X-ray cluster sample
917
+ and the HSC S19A galaxies in nine logarithmically spaced comoving
918
+ projected radial bins in the range [0.1, 2.8] h−1Mpc away from the
919
+ X-ray centre of our clusters. We model these measurements using
920
+ Eq. 17 for the projected cross-correlation profile 𝜉2D(𝑅) and infer
921
+ the radial location for the splashback feature 𝑅sp. We also inferred
922
+ the corresponding three-dimensional cross-correlation profile 𝜉3D(𝑟)
923
+ and the value of the splashback radius 𝑟sp.
924
+ In Figure 4, the blue data points with errors correspond to our mea-
925
+ surements of the cross-correlation signal. The errors were obtained
926
+ using the jackknife technique. The cross-correlation signal 𝜉2D(𝑅)
927
+ is detected with a signal-to-noise ratio of 17.43. As expected the pro-
928
+ jected number of galaxies correlated with the cluster centre decrease
929
+ as we move further away from the cluster centre. The solid red line
930
+ shows the best fit model and corresponds to a reduced chi-square
931
+ 𝜒2
932
+ red = 1.12 and computed using the effective degrees of freedom
933
+ dofeff = 2.71 (see eqn. 29 in Raveri & Hu (2019)). The dark blue
934
+ shaded regions show the 68 percent credible regions which show that
935
+ Parameters
936
+ Constraints
937
+ log 𝜌s∗
938
+ 0.78+0.55
939
+ −0.67
940
+ log 𝛼
941
+ −0.71+0.33
942
+ −0.30
943
+ log 𝑟s∗
944
+ 0.09+0.40
945
+ −0.32
946
+ log 𝜌o∗
947
+ −0.85+0.57
948
+ −0.45
949
+ 𝑠e
950
+ 1.69+0.75
951
+ −0.85
952
+ log 𝑟t
953
+ 0.00+0.08
954
+ −0.08
955
+ log 𝛽
956
+ 0.78+0.06
957
+ −0.06
958
+ log 𝛾
959
+ 0.60+0.06
960
+ −0.06
961
+ 𝑅sp/h−1Mpc
962
+ 1.19+0.30
963
+ −0.22
964
+ 𝑟sp/h−1Mpc
965
+ 1.45+0.30
966
+ −0.26
967
+ 𝑑 log 𝜉3D
968
+ 𝑑 log 𝑟 |𝑟=𝑟sp
969
+ −5.05+0.88
970
+ −0.73
971
+ log[𝑀200m/h−1M⊙]
972
+ 14.52+0.06
973
+ −0.06
974
+ 𝑐
975
+ 4.49+0.90
976
+ −0.79
977
+ 𝑟200m/h−1Mpc
978
+ 1.75+0.08
979
+ −0.08
980
+ 𝜒2
981
+ wl/dofeff
982
+ 5.6/8.02
983
+ 𝜒2sp/dofeff
984
+ 3.03/2.71
985
+ Table 2. Parameter constraints: The table provides the median values for the
986
+ model parameter constraints with errors based on the 16 and 84 percentile of
987
+ the posterior distribution obtained from modelling the measurements for our
988
+ eFEDS X-ray galaxy cluster sample. The first eight rows present the parameter
989
+ constraints for fitting the galaxy number density profiles. The two-dimensional
990
+ 𝑅sp and three-dimensional 𝑟sp splashback radius estimates along with the
991
+ logarithmic slope values at 𝑟sp as given in rows 9-11. Row 12-14 presents
992
+ the parameter values from the weak lensing analysis and the corresponding
993
+ spherical overdensity size 𝑟200m value. The last two rows present the best fit
994
+ 𝜒2 values for the weak lensing 𝜒2
995
+ wl and galaxy density profile 𝜒2sp with the
996
+ associated effective degrees of freedom dofeff (based on eqn. 29 of (Raveri
997
+ & Hu 2019)). The asterisk sign indicates the parameter constraints which
998
+ are sensitive to the choice of the priors. But as we can see from Figure. C1
999
+ log 𝜌s and log 𝑟s are degenerate among each other but do not correlate with
1000
+ the inferred value of the splashback radius. For log 𝜌o see appendix C.
1001
+ the measurements are in reasonable agreement with the expectations
1002
+ from the model. In the top left and right panel, the blue vertical dashed
1003
+ line and the shaded region shows the median of the inferred location
1004
+ for the projected splashback radius 𝑅sp along with the 68 percent
1005
+ credible interval. Furthermore, the orange dotted vertical line with
1006
+ the shaded region shows the inferred value for the boundary of the
1007
+ halo in the traditional sense - 𝑟200m inferred from our weak lensing
1008
+ analysis as described in Section 4.1.
1009
+ The location of the projected splashback radius 𝑅sp was estimated
1010
+ using the minima of the logarithmic slope 𝑑 log 𝜉2D/𝑑 log 𝑅 profile
1011
+ for the model predicted 𝜉2D. The top right panel in Figure 4 shows
1012
+ the 𝑑 log 𝜉2D/𝑑 log 𝑅 profile and the dark blue shaded regions repre-
1013
+ sent the 68 percent credible region around the median. In Table 2 we
1014
+ present the median values for the model parameters and the location
1015
+ of the splashback radius along with errors computed from the 16-th
1016
+ and 84-th percentiles of the corresponding posterior distributions.
1017
+ The corresponding two-dimensional parameter posterior plots show-
1018
+ ing the correlation among different model parameters is presented in
1019
+ Appendix C. In our analysis, we obtain a 25 percent constraint on the
1020
+ 𝑅sp with a median at 1.19 h−1Mpc. The quantity 𝑅sp corresponds to
1021
+ location of the steepest slope of the projected correlation function,
1022
+ and is expected to be at a location which is smaller than the location
1023
+ of the steepest slope in three dimensional distance from the cluster.
1024
+ MNRAS 000, 1–14 (2015)
1025
+
1026
+ Splashback radius around X-ray galaxy clusters
1027
+ 9
1028
+ R[h−1Mpc]
1029
+ 10−3
1030
+ 10−2
1031
+ 10−1
1032
+ 100
1033
+ 101
1034
+ 102
1035
+ ξ2D(R)
1036
+ SNR = 17.43
1037
+ Data
1038
+ χ2/dof = 3.03/2.71 = 1.12
1039
+ Rsp
1040
+ R[h−1Mpc]
1041
+ −6
1042
+ −5
1043
+ −4
1044
+ −3
1045
+ −2
1046
+ −1
1047
+ 0
1048
+ d log ξ2D/d log R
1049
+ 100
1050
+ r[h−1Mpc]
1051
+ 10−2
1052
+ 10−1
1053
+ 100
1054
+ 101
1055
+ 102
1056
+ 103
1057
+ 104
1058
+ ξ3D(r)
1059
+ rsp
1060
+ r200m
1061
+ 100
1062
+ r[h−1Mpc]
1063
+ −6
1064
+ −5
1065
+ −4
1066
+ −3
1067
+ −2
1068
+ −1
1069
+ 0
1070
+ d log ξ3D/d log r
1071
+ Figure 4. Galaxy number density profile: The blue data points in the top left panel show our measurements for cross-correlation 𝜉2D(𝑟) between the eFEDS X-ray
1072
+ galaxy cluster and HSC S19A optical galaxies with signal-to-noise given in the bottom left corner. The solid red line represents our best fit model predictions
1073
+ with 𝜒2
1074
+ red ≡ 𝜒2/dof value given in the top left corner, and the dark blue shaded regions denoted the 68 percentile around the median model predictions. The top
1075
+ right panel shows the inferred logarithmic derivative of model predictions for projected cross-correlation profile 𝜉2D(𝑟). In the top row, The blue dashed vertical
1076
+ line represents the median value for the inferred two-dimensional splashback radius 𝑅sp with a light blue 68 percentile shaded error region around it. Similarly,
1077
+ the bottom row shows the corresponding three-dimensional 𝜉3D(𝑟) profile and the associated logarithmic derivative. In the bottom row, The blue dotted dashed
1078
+ vertical line with a light blue shaded region around it indicates our constraints on the three-dimensional splashback radius 𝑟sp estimates. In all the panels, the
1079
+ orange dotted vertical line with a shaded region shows the weak lensing calibrated three-dimensional spherical overdensity size 𝑟200m using the source galaxies
1080
+ from the HSC S16A shape catalogue. The solid black vertical line is the expectation value for 𝑟sp from ΛCDM prediction (More et al. 2015). We provide the
1081
+ model parameter constraints with the corresponding splashback radius and spherical overdensity sizes in Table 2.
1082
+ MNRAS 000, 1–14 (2015)
1083
+
1084
+ 10
1085
+ Rana et al.
1086
+ 0
1087
+ 1
1088
+ 2
1089
+ 3
1090
+ Rsp[h−1Mpc]
1091
+ 0.0
1092
+ 0.5
1093
+ 1.0
1094
+ 1.5
1095
+ 2.0
1096
+ 0
1097
+ 1
1098
+ 2
1099
+ 3
1100
+ rsp[h−1Mpc]
1101
+ 0.0
1102
+ 0.5
1103
+ 1.0
1104
+ 1.5
1105
+ 2.0
1106
+ r200m
1107
+ −9
1108
+ −7
1109
+ −5
1110
+ −3
1111
+ −1
1112
+ d log ξ3D
1113
+ d log r |r=rsp
1114
+ 0.0
1115
+ 0.1
1116
+ 0.2
1117
+ 0.3
1118
+ 0.4
1119
+ 0.5
1120
+ 0.6
1121
+ Figure 5. Splashback radius posteriors: The plot in the left and middle panels represents the distributions of the two-dimensional 𝑅sp and three-dimensional 𝑟sp
1122
+ splashback radius values. The right panel shows the distribution of the logarithmic slope for the three-dimensional 𝜉3D(𝑟) galaxy number density profile at 𝑟sp.
1123
+ The orange dotted line with a shaded region in each panel shows the weak lensing constraints on the spherical overdensity size 𝑟200m. The solid black vertical
1124
+ line in the right panel denotes the expectation from the standard NFW profile.
1125
+ Therefore, we also infer the three-dimensional splashback radius
1126
+ 𝑟sp for our cluster sample using our model. In Figure 4 the bottom left
1127
+ panel shows the three dimensional cross-correlation profile 𝜉3D(𝑟)
1128
+ inferred from the model fits to the measurements of 𝜉2D(𝑅), while
1129
+ the bottom right panel shows the corresponding logarithmic slope
1130
+ 𝑑 log 𝜉3D/𝑑 log 𝑟. Here, the blue vertical dotted dash line with a light
1131
+ blue shaded region around it represents the location of splashback
1132
+ radius 𝑟sp. From our analysis we obtain 𝑟sp = 1.45 ± 0.30 h−1Mpc.
1133
+ We note that the median values of 𝑟sp and 𝑅sp differ by roughly 20
1134
+ percent as expected in cluster scale halos (see e.g., More et al. 2016).
1135
+ Following Baxter et al. (2017), in Figure 5 we show the posterior
1136
+ distribution of the splashback radius in 2-d (𝑅sp), and 3-d (𝑟sp) along
1137
+ with the slope 𝑑 log 𝜉3D/𝑑 log 𝑟 at the location of 𝑟 = 𝑟sp. The value
1138
+ of the logarithmic slope we obtain −5.05 ± 0.88 is steeper than −3
1139
+ at more than 2𝜎 (see Table 2). The black solid vertical line denotes
1140
+ the logarithmic slope of −3 reached asymptotically on large scales
1141
+ for the NFW halos without the presence of the two-halo term. This
1142
+ shows that the location of the minimum corresponds to the splashback
1143
+ feature for our cluster sample associated with the steepest slope. We
1144
+ note that our slope value is consistent with those obtained in the
1145
+ X-ray study by Contigiani et al. (2019b) and Murata et al. (2020)
1146
+ study using optically selected clusters and also with values seen
1147
+ in the literature (More et al. 2016; Baxter et al. 2017; Umetsu &
1148
+ Diemer 2017; Chang et al. 2018; Zürcher & More 2019; Shin et al.
1149
+ 2019; Bianconi et al. 2021; Shin et al. 2021), especially given the
1150
+ large errors. These difference in the value of slope could possibly
1151
+ arise from the variations in the halo mass accretion rate in different
1152
+ samples, which correlates well with the sharpness in the splashback
1153
+ radius feature (Diemer & Kravtsov 2014) and more investigation will
1154
+ be done in the future works.
1155
+ We compare the values we infer for 𝑟sp with the expectations from
1156
+ ΛCDM model. We estimate the approximate location for𝑟sp using the
1157
+ weak lensing calibrated halo mass estimate 𝑀200m = 1014.52 h−1M⊙
1158
+ at the median redshift of 𝑧 = 0.46 for our sample. We use the 𝑀200m
1159
+ and 𝑧 to computing the peak height 𝜈200m ≡ 𝛿𝑐/𝜎(𝑀200m)/𝐷(𝑧).
1160
+ We then use the 𝜈200m as an input parameter in the fitting re-
1161
+ lations given by eqn. 7 of More et al. (2015) and obtain 𝑟sp =
1162
+ 1.80±0.07 h−1Mpc as the ΛCDM prediction. This estimate is shown
1163
+ by the solid black vertical line in Figure 4, which is consistent with
1164
+ our results within ∼ 1.2𝜎. We further calculated the halo mass acc-
1165
+ retation rate Γ = 5.86 ± 3.78 for our sample using eqn 5 in More
1166
+ et al. (2015). The large error on the Γ value is related to the broader
1167
+ constraints on the splashback feature 𝑟sp.
1168
+ In the current analysis, we only work with a single z-band absolute
1169
+ magnitude cut 𝑀𝑧 − 5 log ℎ < −19.36 which corresponds to an
1170
+ apparent magnitude limit of 𝑚𝑧 = 24.0 at redshift 𝑧 = 0.75. Note that
1171
+ the knee of the Schechter function is brighter in the z-band than in the
1172
+ i-band by about 0.3 magnitudes (Blanton et al. 2001) . Our magnitude
1173
+ cut in the z-band is therefore even fainter compared to the magnitude
1174
+ at the knee of the Schechter function than galaxies used in More et al.
1175
+ (2016) who use an i-band magnitude cut of 𝑀𝑖 − 5 log ℎ < −19.43.
1176
+ Such cuts are thus expected to minimize the effects of dynamical
1177
+ friction (Adhikari et al. 2016). In principle, we could use various
1178
+ magnitude limits to check for the effects of the dynamical friction as
1179
+ commonly done in literature (for, e.g. More et al. 2016; Murata et al.
1180
+ 2019). However, the current sample size yields fairly low signal-
1181
+ to-noise cross-correlations when restricted to brighter samples. In
1182
+ future work, we intend to pursue such measurements.
1183
+ Finally, in Figure 6 we compare our results with those in the lit-
1184
+ erature in the 𝜈200m − 𝑟sp/𝑟200m plane. Given that this relation is
1185
+ fairly independent of redshift (More et al. 2015), this allows for a
1186
+ uniform comparison of results in the literature. The grey dashed line
1187
+ represents the expectations from ΛCDM using the parameterization
1188
+ given by eqn. 7 in More et al. (2015) and calibrated from numerical
1189
+ simulations. Round data points are used to present the constraints
1190
+ from optically selected clusters, triangular data points for those ob-
1191
+ tained using clusters identified using the SZ effect, and square data
1192
+ points for those obtained using X-ray selected clusters. In the leg-
1193
+ end, we have also labelled the name of the data used along with
1194
+ the method used in the corresponding investigation - galaxy number
1195
+ density profile (GP), weak lensing (WL) and stacked luminosity pro-
1196
+ file (LP). The black square point shows our constraint based on the
1197
+ galaxy number density profile around eFEDS X-ray clusters from this
1198
+ work, which yields 𝑟sp/𝑟200m ≈ 0.83 ± 0.17. This results is a 20 per-
1199
+ MNRAS 000, 1–14 (2015)
1200
+
1201
+ Splashback radius around X-ray galaxy clusters
1202
+ 11
1203
+ 2.0
1204
+ 2.5
1205
+ 3.0
1206
+ 3.5
1207
+ 4.0
1208
+ 4.5
1209
+ ν200m
1210
+ 0.5
1211
+ 1.0
1212
+ 1.5
1213
+ 2.0
1214
+ rsp/r200m
1215
+ More+15
1216
+ SDSS; More+16,Baxter+17:GP
1217
+ CLASH; Umetsu+17:WL+SL
1218
+ DES; Chang+18:GP
1219
+ DES; Chang+18:WL
1220
+ Planck; Z¨urcher+19:GP
1221
+ CCCP; Contigiani+19:WL
1222
+ SPT; Shin+19:GP
1223
+ ACT; Shin+19:GP
1224
+ HSC; Murata+20:GP
1225
+ LoCuSS; Bianconi+21:LP
1226
+ ACT; Shin+21:WL
1227
+ ACT; Shin+21:GP
1228
+ eFEDS; This Work:GP
1229
+ Figure 6. Comparison with other studies: In the above figure, we compare our
1230
+ results with the existing works in the literature. The x-axis represents the peak
1231
+ height 𝜈200m and the y-axis represents the ratio between splashback radius 𝑟sp
1232
+ and the spherical overdensity 𝑟200m radius estimates. The round data points
1233
+ show the values computed using the optically selected clusters, the triangular
1234
+ points are for the analysis using SZ selected clusters, and the squared points
1235
+ are for the X-ray selected clusters. In the legends, we label each datapoint
1236
+ using their survey name, reference and the analysis method used - the weak
1237
+ lensing (WL), strong lensing(SL), galaxy number density (GP) or stacked
1238
+ Luminosity profile (LP). The dashed grey line shows the expectation from the
1239
+ ΛCDM cosmology as a function of 𝜈200m computed using the fitting function
1240
+ given by More et al. (2015). The black datapoint with errors represents our
1241
+ results from this study using the eFEDS X-ray clusters and shows marginal
1242
+ consistency (1.2𝜎) with the ΛCDM predictions.
1243
+ cent constraint and yields results consistent ≈ 1.2𝜎 with the ΛCDM
1244
+ prediction. It represents an improvement over the weak-and-strong
1245
+ lensing based study on CLASH X-ray cluster sample by Umetsu &
1246
+ Diemer (2017) which provided a lower limit for 𝑟sp/𝑟200m > 0.89.
1247
+ Similarly, our analysis also puts nearly 25 percent tighter bounds than
1248
+ the one obtained with another weak lensing result using the CCCP
1249
+ X-ray clusters (Contigiani et al. 2019b).
1250
+ We find that our constraints are similar to those obtained by galaxy
1251
+ number density studies using SZ clusters by Zürcher & More (2019);
1252
+ Shin et al. (2019), the weak lensing-based analysis in Shin et al.
1253
+ (2021) using ACT SZ clusters and the stacked luminosity profile
1254
+ results in LoCuSS X-ray clusters (Bianconi et al. 2021). The preci-
1255
+ sion with which we determine the splashback radius is worse when
1256
+ compared to galaxy density profile studies using SZ selected clusters
1257
+ (Shin et al. 2021) or optically selected clusters (More et al. 2016;
1258
+ Baxter et al. 2017; Chang et al. 2018; Murata et al. 2020), albeit the
1259
+ latter are likely affected by systematics related to projection effects.
1260
+ This is expected to get better as our sample size gets larger.
1261
+ 5 CONCLUSIONS
1262
+ The splashback radius which denotes the physical boundary of dark
1263
+ matter halos depends upon the current accretion mass rate. Various
1264
+ studies in the literature have attempted to constrain the location of this
1265
+ radius in observations. In this work, we studied the splashback radius
1266
+ around the eROSITA eFEDS X-ray clusters by cross-correlating them
1267
+ with the optical photometric galaxies. Our use of X-ray selected
1268
+ clusters avoids systematics related to projection effects which have
1269
+ affected the measurement of the splashback radius from optically
1270
+ selected clusters. We select X-ray clusters having luminosities above a
1271
+ threshold 𝐿𝑋 > 1043.5erg s−1h−2 within the redshift 𝑧 < 0.75, which
1272
+ provides us a nearly volume limited sample. Finally, we compared our
1273
+ inferred value of the splashback radius with the standard spherical
1274
+ overdensity radius 𝑟200m calibrated using weak gravitational lensing.
1275
+ We briefly summarize our major findings below :
1276
+ • We measure the stacked weak lensing signal around our clus-
1277
+ ter sample using the background galaxies from HSC S16A shape
1278
+ catalogue data and obtain measurements with a signal-to-noise of
1279
+ 17.93. We then use a simple NFW profile to model the stacked
1280
+ signal and infer a halo mass log[𝑀200m/h−1M⊙] = 14.52 ± 0.06
1281
+ which corresponds to an spherical overdensity size of 𝑟200m =
1282
+ 1.75 ± 0.08 h−1Mpc.
1283
+ • We measure the projected cross-correlation with an signal-to-
1284
+ noise of 17.43 for our X-ray galaxy clusters using the optical galax-
1285
+ ies from HSC S19A data having z-band absolute magnitude cut
1286
+ 𝑀𝑧 −5 log ℎ < −19.36. We model these measurements by projecting
1287
+ the three-dimensional functional form given by Diemer & Kravtsov
1288
+ (2014) to infer the location of the steepest slope and associate it with
1289
+ the splashback radius.
1290
+ • We find the value for the 3D steepest slope to be −5+0.88
1291
+ −0.73,
1292
+ more than 2𝜎 away from the asymptotic −3 value in the case of the
1293
+ standard NFW profile which provides evidence for the presence of a
1294
+ splashback feature.
1295
+ • Our analysis corresponds to ∼ 25 percent constraint on the
1296
+ projected 𝑅sp = 1.19+0.30
1297
+ −0.22 h−1Mpc and ∼ 20 percent constraint on
1298
+ the three dimensional 𝑟sp = 1.45+0.30
1299
+ −0.26 h−1Mpc splashback radius.
1300
+ These values are in the range as expected commonly for the massive
1301
+ halos in numerical simulations (Diemer & Kravtsov 2014; More et al.
1302
+ 2015).
1303
+ • Our constraints on 𝑟sp are broadly comparable to spherical over-
1304
+ density estimates 𝑟200m = 1.75 ± 0.08 h−1Mpc and are marginally
1305
+ consistent (≈ 1.2𝜎) with the expectation from numerical simulation
1306
+ for the weak lensing calibrated halo mass at the median redshift
1307
+ 𝑧 = 0.46 for our cluster sample. The results from our analysis sig-
1308
+ nificantly improve the errors on the splashback radius measurement
1309
+ based on X-ray selected galaxy clusters.
1310
+ • We infer a halo mass accretion rate Γ = 5.86 ± 3.78 with large
1311
+ errors, where the error is dominated by the error on the inferred
1312
+ splashback radius 𝑟sp.
1313
+ In our analysis, we use X-ray centres of the galaxy clusters for the
1314
+ weak lensing and cross-correlation signal measurements. We have
1315
+ checked the dependence of our results on the choice of the centre
1316
+ by using the optically confirmed galaxy as the centre and find that
1317
+ our results are robust to this choice. Given the differences between
1318
+ X-ray and optical centres - 92.6+44.3
1319
+ −35.1kpc (Seppi et al. 2022), we have
1320
+ also explore effects of miscentering on our conclusions. We have re-
1321
+ analyzed both the weak lensing and cross-correlation measurements
1322
+ after removing signals in radial bins below 200 h−1kpc and found no
1323
+ significant change in our results.
1324
+ We also want to point out that in the present analysis, we only
1325
+ MNRAS 000, 1–14 (2015)
1326
+
1327
+ 12
1328
+ Rana et al.
1329
+ use one z-band absolute limit on the S19A optical galaxies for cross-
1330
+ correlation measurements. We choose the faintest possible limit such
1331
+ that we can get less noisy measurements on large scales. In future
1332
+ studies with a larger cluster sample, we would also like to test for
1333
+ possible dynamical friction effects.
1334
+ Our results provide meaningful constraints on the splashback ra-
1335
+ dius of galaxy clusters, although with large statistical errors. How-
1336
+ ever, in the near future, we expect better constraints by using all-sky
1337
+ cluster catalogues from the eRASS (Merloni et al. 2012). The statis-
1338
+ tical precision of these measurements will allow comparisons with
1339
+ expectations from the hydrodynamic simulations like IllustrisTNG
1340
+ (Weinberger et al. 2017; Pillepich et al. 2018) and thorough investi-
1341
+ gations of any differences between the observations and theoretical
1342
+ predictions.
1343
+ ACKNOWLEDGEMENTS
1344
+ We are grateful to Navin Chaurasiya, Amit Kumar, Moun Meenakshi,
1345
+ Preetish K. Mishra, Ayan Mitra, Masahiro Takada and Keiichi
1346
+ Umetsu for discussions and their insightful comments on the earlier
1347
+ version of the manuscript. DR thank the University Grants Com-
1348
+ mission (UGC) of India, for providing financial support as a senior
1349
+ research fellow. We acknowledge the use of the high performance
1350
+ computing facility - Pegasus at IUCAA. This work was supported
1351
+ in part by the World Premier International Research Center Initia-
1352
+ tive (WPI Initiative), MEXT, Japan, and JSPS KAKENHI Grant Nos.
1353
+ 20H01932 and 21H05456. E.B. acknowledges financial support from
1354
+ the European Research Council (ERC) Consolidator Grant under the
1355
+ European Union’s Horizon 2020 research and innovation programme
1356
+ (grant agreement CoG DarkQuest No 101002585).
1357
+ The Hyper Suprime-Cam (HSC) collaboration includes the astro-
1358
+ nomical communities of Japan and Taiwan, and Princeton University.
1359
+ The HSC instrumentation and software were developed by the Na-
1360
+ tional Astronomical Observatory of Japan (NAOJ), the Kavli Institute
1361
+ for the Physics and Mathematics of the Universe (Kavli IPMU), the
1362
+ University of Tokyo, the High Energy Accelerator Research Orga-
1363
+ nization (KEK), the Academia Sinica Institute for Astronomy and
1364
+ Astrophysics in Taiwan (ASIAA), and Princeton University. Fund-
1365
+ ing was contributed by the FIRST program from the Japanese Cab-
1366
+ inet Office, the Ministry of Education, Culture, Sports, Science and
1367
+ Technology (MEXT), the Japan Society for the Promotion of Science
1368
+ (JSPS), Japan Science and Technology Agency (JST), the Toray Sci-
1369
+ ence Foundation, NAOJ, Kavli IPMU, KEK, ASIAA, and Princeton
1370
+ University.
1371
+ This paper is based in part on data collected at the Subaru Tele-
1372
+ scope and retrieved from the HSC data archive system, which is
1373
+ operated by Subaru Telescope and Astronomy Data Center (ADC) at
1374
+ NAOJ. Data analysis was in part carried out with the cooperation of
1375
+ Center for Computational Astrophysics (CfCA), NAOJ.
1376
+ This work is based on data from eROSITA, the soft X-ray instru-
1377
+ ment aboard SRG, a joint Russian-German science mission supported
1378
+ by the Russian Space Agency (Roskosmos), in the interests of the
1379
+ Russian Academy of Sciences represented by its Space Research
1380
+ Institute (IKI), and the Deutsches Zentrum für Luft- und Raum-
1381
+ fahrt (DLR). The SRG spacecraft was built by Lavochkin Associa-
1382
+ tion (NPOL) and its subcontractors, and is operated by NPOL with
1383
+ support from the Max Planck Institute for Extraterrestrial Physics
1384
+ (MPE). The development and construction of the eROSITA X-ray
1385
+ instrument was led by MPE, with contributions from the Dr. Karl
1386
+ Remeis Observatory Bamberg & ECAP (FAU Erlangen-Nuernberg),
1387
+ the University of Hamburg Observatory, the Leibniz Institute for
1388
+ Astrophysics Potsdam (AIP), and the Institute for Astronomy and
1389
+ Astrophysics of the University of Tübingen, with the support of DLR
1390
+ and the Max Planck Society. The Argelander Institute for Astronomy
1391
+ of the University of Bonn and the Ludwig Maximilians Universität
1392
+ Munich also participated in the science preparation for eROSITA.
1393
+ DATA AVAILABILITY
1394
+ This work uses publically available catalogue data accessible through
1395
+ survey websites. The eROSITA eFEDS X-ray cluster catalogue
1396
+ is available at https://erosita.mpe.mpg.de/edr/index.php and Subaru
1397
+ HSC dataset can be found at https://hsc-release.mtk.nao.ac.jp/doc/.
1398
+ The
1399
+ measurements
1400
+ for
1401
+ cross-correlation
1402
+ and
1403
+ weak
1404
+ lens-
1405
+ ing
1406
+ analysis
1407
+ are
1408
+ available
1409
+ on
1410
+ https://github.com/divyarana-
1411
+ cosmo/rsp_efeds_hsc_s19a.
1412
+ REFERENCES
1413
+ Adhikari S., Dalal N., Chamberlain R. T., 2014, J. Cosmology Astropart.
1414
+ Phys., 2014, 019
1415
+ Adhikari S., Dalal N., Clampitt J., 2016, J. Cosmology Astropart. Phys., 2016,
1416
+ 022
1417
+ Adhikari S., Sakstein J., Jain B., Dalal N., Li B., 2018, J. Cosmology As-
1418
+ tropart. Phys., 2018, 033
1419
+ Aihara H., et al., 2018a, PASJ, 70, S4
1420
+ Aihara H., et al., 2018b, PASJ, 70, S8
1421
+ Aihara H., et al., 2019, PASJ, 71, 114
1422
+ Aihara H., et al., 2022, PASJ, 74, 247
1423
+ Bahar Y. E., et al., 2022, A&A, 661, A7
1424
+ Banerjee A., Adhikari S., Dalal N., More S., Kravtsov A., 2020, J. Cosmology
1425
+ Astropart. Phys., 2020, 024
1426
+ Baxter E., et al., 2017, ApJ, 841, 18
1427
+ Becker M. R., Kravtsov A. V., 2011, ApJ, 740, 25
1428
+ Bernstein G. M., Jarvis M., 2002, AJ, 123, 583
1429
+ Bertschinger E., 1985, ApJS, 58, 39
1430
+ Bianconi M., Buscicchio R., Smith G. P., McGee S. L., Haines C. P.,
1431
+ Finoguenov A., Babul A., 2021, ApJ, 911, 136
1432
+ Blanton M. R., et al., 2001, AJ, 121, 2358
1433
+ Bleem L. E., et al., 2015, ApJS, 216, 27
1434
+ Borm K., Reiprich T. H., Mohammed I., Lovisari L., 2014, A&A, 567, A65
1435
+ Brunner H., et al., 2022, A&A, 661, A1
1436
+ Bulbul E., et al., 2022, A&A, 661, A10
1437
+ Busch P., White S. D. M., 2017, MNRAS, 470, 4767
1438
+ Chandrasekhar S., 1943, ApJ, 97, 255
1439
+ Chang C., et al., 2018, ApJ, 864, 83
1440
+ Chiu I.-N., Klein M., Mohr J., Bocquet S., 2022a, arXiv e-prints, p.
1441
+ arXiv:2207.12429
1442
+ Chiu I. N., et al., 2022b, A&A, 661, A11
1443
+ Comparat J., et al., 2020, The Open Journal of Astrophysics, 3, 13
1444
+ Contigiani O., Vardanyan V., Silvestri A., 2019a, Phys. Rev. D, 99, 064030
1445
+ Contigiani O., Hoekstra H., Bahé Y. M., 2019b, MNRAS, 485, 408
1446
+ Cooray A., Sheth R., 2002, Phys. Rep., 372, 1
1447
+ Dacunha T., Belyakov M., Adhikari S., Shin T.-h., Goldstein S., Jain B., 2022,
1448
+ MNRAS, 512, 4378
1449
+ Davis M., Peebles P. J. E., 1983, ApJ, 267, 465
1450
+ Deason A. J., et al., 2021, MNRAS, 500, 4181
1451
+ Dey A., et al., 2019, AJ, 157, 168
1452
+ Diemer B., 2018, ApJS, 239, 35
1453
+ Diemer B., 2020, ApJ, 903, 87
1454
+ Diemer B., Joyce M., 2019, ApJ, 871, 168
1455
+ Diemer B., Kravtsov A. V., 2014, ApJ, 789, 1
1456
+ Diemer B., Mansfield P., Kravtsov A. V., More S., 2017, ApJ, 843, 140
1457
+ Einasto J., 1965, Trudy Astrofizicheskogo Instituta Alma-Ata, 5, 87
1458
+ Fillmore J. A., Goldreich P., 1984, ApJ, 281, 1
1459
+ MNRAS 000, 1–14 (2015)
1460
+
1461
+ Splashback radius around X-ray galaxy clusters
1462
+ 13
1463
+ Fong M., Bowyer R., Whitehead A., Lee B., King L., Applegate D., McCarthy
1464
+ I., 2018, MNRAS, 478, 5366
1465
+ Foreman-Mackey D., Hogg D. W., Lang D., Goodman J., 2013, PASP, 125,
1466
+ 306
1467
+ Gao L., Navarro J. F., Cole S., Frenk C. S., White S. D. M., Springel V.,
1468
+ Jenkins A., Neto A. F., 2008, MNRAS, 387, 536
1469
+ Ghirardini V., et al., 2022, A&A, 661, A12
1470
+ Goodman J., Weare J., 2010, Communications in Applied Mathematics and
1471
+ Computational Science, 5, 65
1472
+ Grandis S., Bocquet S., Mohr J. J., Klein M., Dolag K., 2021, MNRAS, 507,
1473
+ 5671
1474
+ Gunn J. E., Gott J. Richard I., 1972, ApJ, 176, 1
1475
+ Hartlap J., Simon P., Schneider P., 2007, A&A, 464, 399
1476
+ Hikage C., Mandelbaum R., Takada M., Spergel D. N., 2013, MNRAS, 435,
1477
+ 2345
1478
+ Hilton M., et al., 2018, ApJS, 235, 20
1479
+ Hirata C., Seljak U., 2003, MNRAS, 343, 459
1480
+ Hirata C. M., et al., 2004, MNRAS, 353, 529
1481
+ Ilbert O., et al., 2009, ApJ, 690, 1236
1482
+ Johnston D. E., et al., 2007, arXiv e-prints, p. arXiv:0709.1159
1483
+ Kilbinger M., 2015, Reports on Progress in Physics, 78, 086901
1484
+ Klein M., et al., 2018, MNRAS, 474, 3324
1485
+ Klein M., et al., 2019, MNRAS, 488, 739
1486
+ Klein M., et al., 2022, A&A, 661, A4
1487
+ Kobayashi M. I. N., Leauthaud A., More S., Okabe N., Laigle C., Rhodes J.,
1488
+ Takeuchi T. T., 2015, MNRAS, 449, 2128
1489
+ Komiyama Y., et al., 2018, PASJ, 70, S2
1490
+ Kravtsov A. V., Borgani S., 2012, ARA&A, 50, 353
1491
+ Liu A., et al., 2022, A&A, 661, A2
1492
+ Mandelbaum R., 2018, ARA&A, 56, 393
1493
+ Mandelbaum R., et al., 2005, MNRAS, 361, 1287
1494
+ Mandelbaum R., Seljak U., Cool R. J., Blanton M., Hirata C. M., Brinkmann
1495
+ J., 2006, MNRAS, 372, 758
1496
+ Mandelbaum R., et al., 2008, MNRAS, 386, 781
1497
+ Mandelbaum R., Slosar A., Baldauf T., Seljak U., Hirata C. M., Nakajima R.,
1498
+ Reyes R., Smith R. E., 2013, MNRAS, 432, 1544
1499
+ Mandelbaum R., et al., 2018a, PASJ, 70, S25
1500
+ Mandelbaum R., et al., 2018b, MNRAS, 481, 3170
1501
+ Mansfield P., Kravtsov A. V., 2020, MNRAS, 493, 4763
1502
+ Mansfield P., Kravtsov A. V., Diemer B., 2017, ApJ, 841, 34
1503
+ Merloni A., et al., 2012, arXiv e-prints, p. arXiv:1209.3114
1504
+ Miller R. G., 1974, Biometrika, 61, 1
1505
+ Miyatake H., et al., 2015, ApJ, 806, 1
1506
+ Miyatake H., More S., Takada M., Spergel D. N., Mandelbaum R., Rykoff
1507
+ E. S., Rozo E., 2016, Phys. Rev. Lett., 116, 041301
1508
+ Miyatake H., et al., 2019, ApJ, 875, 63
1509
+ Miyazaki S., et al., 2018, PASJ, 70, S1
1510
+ Moore B., Ghigna S., Governato F., Lake G., Quinn T., Stadel J., Tozzi P.,
1511
+ 1999, ApJ, 524, L19
1512
+ More S., Diemer B., Kravtsov A. V., 2015, ApJ, 810, 36
1513
+ More S., et al., 2016, ApJ, 825, 39
1514
+ Murata R., et al., 2019, PASJ, 71, 107
1515
+ Murata R., Sunayama T., Oguri M., More S., Nishizawa A. J., Nishimichi T.,
1516
+ Osato K., 2020, PASJ, 72, 64
1517
+ Nakajima R., Mandelbaum R., Seljak U., Cohn J. D., Reyes R., Cool R., 2012,
1518
+ MNRAS, 420, 3240
1519
+ Navarro J. F., Frenk C. S., White S. D. M., 1997, ApJ, 490, 493
1520
+ Nishizawa A. J., et al., 2018, PASJ, 70, S24
1521
+ O’Neil S., Borrow J., Vogelsberger M., Diemer B., 2022a, MNRAS, 513, 835
1522
+ O’Neil S., Borrow J., Vogelsberger M., Diemer B., 2022b, MNRAS, 513, 835
1523
+ Oguri M., 2014, MNRAS, 444, 147
1524
+ Okumura T., Nishimichi T., Umetsu K., Osato K., 2018, Phys. Rev. D, 98,
1525
+ 023523
1526
+ Pillepich A., et al., 2018, MNRAS, 473, 4077
1527
+ Predehl P., et al., 2021, A&A, 647, A1
1528
+ Ramos-Ceja M. E., et al., 2022, A&A, 661, A14
1529
+ Raveri M., Hu W., 2019, Phys. Rev. D, 99, 043506
1530
+ Reyes R., Mandelbaum R., Gunn J. E., Nakajima R., Seljak U., Hirata C. M.,
1531
+ 2012, MNRAS, 425, 2610
1532
+ Rowe B. T. P., et al., 2015, Astronomy and Computing, 10, 121
1533
+ Rykoff E. S., et al., 2014, ApJ, 785, 104
1534
+ Sanders J. S., et al., 2022, A&A, 661, A36
1535
+ Schneider P., 2006, in Meylan G., Jetzer P., North P., Schneider P., Kochanek
1536
+ C. S., Wambsganss J., eds, Saas-Fee Advanced Course 33: Gravitational
1537
+ Lensing: Strong, Weak and Micro. pp 1–89
1538
+ Seljak U., 2000, MNRAS, 318, 203
1539
+ Seppi R., et al., 2022, arXiv e-prints, p. arXiv:2212.10107
1540
+ Sheldon E. S., et al., 2004, AJ, 127, 2544
1541
+ Shi X., 2016, MNRAS, 459, 3711
1542
+ Shin T., et al., 2019, MNRAS, 487, 2900
1543
+ Shin T., et al., 2021, MNRAS, 507, 5758
1544
+ Singh S., Mandelbaum R., Seljak U., Slosar A., Vazquez Gonzalez J., 2017,
1545
+ MNRAS, 471, 3827
1546
+ Sugiura H., Nishimichi T., Rasera Y., Taruya A., 2020, MNRAS, 493, 2765
1547
+ Sunayama T., More S., 2019, MNRAS, 490, 4945
1548
+ Sunyaev R. A., Zeldovich Y. B., 1970, Ap&SS, 7, 3
1549
+ Sunyaev R. A., Zeldovich Y. B., 1980, MNRAS, 190, 413
1550
+ Sunyaev R., et al., 2021, A&A, 656, A132
1551
+ Tanaka M., 2015, ApJ, 801, 20
1552
+ Tanaka M., et al., 2018, PASJ, 70, S9
1553
+ The Dark Energy Survey Collaboration 2005, arXiv e-prints, pp astro–
1554
+ ph/0510346
1555
+ Umetsu K., Diemer B., 2017, ApJ, 836, 231
1556
+ van den Bosch F. C., More S., Cacciato M., Mo H., Yang X., 2013, MNRAS,
1557
+ 430, 725
1558
+ Vogelsberger M., Marinacci F., Torrey P., Puchwein E., 2020, Nature Reviews
1559
+ Physics, 2, 42
1560
+ Walker S., et al., 2019, Space Sci. Rev., 215, 7
1561
+ Weinberger R., et al., 2017, MNRAS, 465, 3291
1562
+ Xhakaj E., Diemer B., Leauthaud A., Wasserman A., Huang S., Luo Y.,
1563
+ Adhikari S., Singh S., 2020, MNRAS, 499, 3534
1564
+ Zürcher D., More S., 2019, ApJ, 874, 184
1565
+ APPENDIX A: BOOST PARAMETERS
1566
+ As discussed in Section 3.1, we estimate the boost parameters using
1567
+ eqn. 7 to quantify the dilution in the weak lensing signal due to
1568
+ the systematics in the photometric redshift 𝑝(𝑧) distribution in the
1569
+ source galaxies. In Figure A1, the blue data points represent the
1570
+ boost parameters from our weak lensing signal with 1𝜎 error bars
1571
+ from random realizations. We found that they are mostly consistent
1572
+ with the unity line apart from the third datapoint, which differs by
1573
+ more than 2𝜎. We test the impact of the third data point on our
1574
+ inferred halo mass. We reran our signal fitting after removing the
1575
+ third data point and found no significant change in the inferred value
1576
+ of the halo mass.
1577
+ APPENDIX B: COVARIANCES
1578
+ Figure B1 and Figure B2 show the correlation coefficient 𝑟ij for the
1579
+ corresponding covariances of the weak lensing and galaxy density
1580
+ profile measurements. We estimate 𝑟ij from the covariance 𝐶 and
1581
+ given by
1582
+ 𝑟ij =
1583
+ 𝐶ij
1584
+ √︁𝐶ii𝐶jj
1585
+ (B1)
1586
+ where subscript ij represents the ith and jth radial bins. We use
1587
+ the shape noise covariance for the weak lensing profile and area
1588
+ jackknifes to compute covariance for the galaxy number density
1589
+ profile. We describe the details in Sec 3.
1590
+ MNRAS 000, 1–14 (2015)
1591
+
1592
+ 14
1593
+ Rana et al.
1594
+ 100
1595
+ R[h−1Mpc]
1596
+ 0.6
1597
+ 0.7
1598
+ 0.8
1599
+ 0.9
1600
+ 1.0
1601
+ 1.1
1602
+ 1.2
1603
+ 1.3
1604
+ 1.4
1605
+ C(R)
1606
+ Data
1607
+ Figure A1. Boost parameters: The blue data points denotes the boost param-
1608
+ eter 𝐶(𝑅) for our weak lensing measurement ΔΣ and are estimated using
1609
+ eqn. 7 with y errors computed from the scatter in random realizations. The
1610
+ plot shows consistency of boost parameter with grey dashed unity line.
1611
+ 0.12
1612
+ 0.16
1613
+ 0.21
1614
+ 0.29
1615
+ 0.39
1616
+ 0.53
1617
+ 0.71
1618
+ 0.96
1619
+ 1.29
1620
+ 1.74
1621
+ R[h−1Mpc]
1622
+ 0.12
1623
+ 0.16
1624
+ 0.21
1625
+ 0.29
1626
+ 0.39
1627
+ 0.53
1628
+ 0.71
1629
+ 0.96
1630
+ 1.29
1631
+ 1.74
1632
+ R[h−1Mpc]
1633
+ −1.00
1634
+ −0.75
1635
+ −0.50
1636
+ −0.25
1637
+ 0.00
1638
+ 0.25
1639
+ 0.50
1640
+ 0.75
1641
+ 1.00
1642
+ rij
1643
+ Figure B1. Weak lensing profile covariance: The above plot shows the cor-
1644
+ relation coefficient 𝑟ij matrix for the 𝑖th and 𝑗th radial bin of the weak lensing
1645
+ signal measurements ΔΣ given in Sec 3.1 and estimated by shape noise using
1646
+ 200 different random rotations of background source galaxies with x-y axis
1647
+ showing our radial binning for signal measurements.
1648
+ APPENDIX C: DEGENERACIES IN THE MODEL
1649
+ PARAMETERS
1650
+ Figure C1 shows the correlations between the parameters used for
1651
+ modelling the cluster-galaxy cross-correlation measurements. The
1652
+ parametric dependence is given by the function form in eqn. 14, 15
1653
+ and 16. We note that the posterior sample for log 𝜌o pile up at the
1654
+ lower edge of the prior range. We tested our results with broader
1655
+ 0.12
1656
+ 0.18
1657
+ 0.27
1658
+ 0.39
1659
+ 0.58
1660
+ 0.86
1661
+ 1.27
1662
+ 1.88
1663
+ 2.78
1664
+ R[h−1Mpc]
1665
+ 0.12
1666
+ 0.18
1667
+ 0.27
1668
+ 0.39
1669
+ 0.58
1670
+ 0.86
1671
+ 1.27
1672
+ 1.88
1673
+ 2.78
1674
+ R[h−1Mpc]
1675
+ −1.00
1676
+ −0.75
1677
+ −0.50
1678
+ −0.25
1679
+ 0.00
1680
+ 0.25
1681
+ 0.50
1682
+ 0.75
1683
+ 1.00
1684
+ rij
1685
+ Figure B2. Cluster-galaxy cross correlation covariance: The above plot
1686
+ present the correlation coefficient 𝑟ij matrix for the 𝑖th and 𝑗th radial bin
1687
+ of our galaxy number density profile measurements 𝜉2D given in Sec 3.2 and
1688
+ estimated using 20 jackknife region with each having roughly 5 deg2 area.The
1689
+ x and y axis denotes our radial binning for signal measurements.
1690
+ priors and found some values for 𝑅sp to be at the largest radial bins.
1691
+ These values arise from the poor signal measurements at large scales
1692
+ to get a well-constrained outer profile. In such cases, the model tries
1693
+ to fit the whole measurement without the outer profile by using a
1694
+ smaller amplitude log 𝜌o giving rise to a spurious secondary peak in
1695
+ the 𝑅sp posterior.
1696
+ This paper has been typeset from a TEX/LATEX file prepared by the author.
1697
+ MNRAS 000, 1–14 (2015)
1698
+
1699
+ Splashback radius around X-ray galaxy clusters
1700
+ 15
1701
+ −1.6
1702
+ −0.8
1703
+ 0.0
1704
+ 0.8
1705
+ log α
1706
+ −0.8
1707
+ −0.4
1708
+ 0.0
1709
+ 0.4
1710
+ log rs
1711
+ −1.0
1712
+ −0.5
1713
+ 0.0
1714
+ log ρo
1715
+ 0.8
1716
+ 1.6
1717
+ 2.4
1718
+ 3.2
1719
+ se
1720
+ −0.15
1721
+ 0.00
1722
+ 0.15
1723
+ log rt
1724
+ 0.60
1725
+ 0.75
1726
+ 0.90
1727
+ log β
1728
+ 0.45
1729
+ 0.60
1730
+ 0.75
1731
+ log γ
1732
+ 0.6
1733
+ 1.2
1734
+ 1.8
1735
+ 2.4
1736
+ Rsp
1737
+ −0.8
1738
+ 0.0
1739
+ 0.8
1740
+ 1.6
1741
+ 2.4
1742
+ log ρs
1743
+ 0.5
1744
+ 1.0
1745
+ 1.5
1746
+ 2.0
1747
+ 2.5
1748
+ rsp
1749
+ −1.6
1750
+ −0.8
1751
+ 0.0
1752
+ 0.8
1753
+ log α
1754
+ −0.8
1755
+ −0.4
1756
+ 0.0
1757
+ 0.4
1758
+ log rs
1759
+ −1.0
1760
+ −0.5
1761
+ 0.0
1762
+ log ρo
1763
+ 0.8
1764
+ 1.6
1765
+ 2.4
1766
+ 3.2
1767
+ se
1768
+ −0.15
1769
+ 0.00
1770
+ 0.15
1771
+ log rt
1772
+ 0.60
1773
+ 0.75
1774
+ 0.90
1775
+ log β
1776
+ 0.45
1777
+ 0.60
1778
+ 0.75
1779
+ log γ
1780
+ 0.6
1781
+ 1.2
1782
+ 1.8
1783
+ 2.4
1784
+ Rsp
1785
+ 0.5
1786
+ 1.0
1787
+ 1.5
1788
+ 2.0
1789
+ 2.5
1790
+ rsp
1791
+ Figure C1. Splashback parameter posteriors: The above corner plot shows the degeneracies among the model parameters described in Sec 3.2 for the projected
1792
+ cluster-galaxy cross-correlation measurements.
1793
+ MNRAS 000, 1–14 (2015)
1794
+
WtE2T4oBgHgl3EQfDga8/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
X9AyT4oBgHgl3EQf9foH/content/tmp_files/2301.00873v1.pdf.txt ADDED
@@ -0,0 +1,2080 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00873v1 [hep-ph] 2 Jan 2023
2
+ The production cross section of heavy quarks in e−p interaction at the NLO
3
+ approximation
4
+ S. Zarrin, S. Dadfar, and M. Sayahi
5
+ Department of Physics, University of Sistan and Baluchestan, Zahedan, Iran
6
+ We present the production cross section of heavy quarks σc¯c, σb¯b and σt¯t at the next-to-leading
7
+ order in the electron-proton interaction by using the quarks and gluon distribution functions at
8
+ the initial scale Q2
9
+ 0.
10
+ To do this, we use a fitted form of the heavy quark coefficient functions
11
+ for deep-inelastic lepton-hadron scattering to obtain the structure functions of heavy quarks.
12
+ Then, we calculate the reduced cross section of heavy quarks by using the structure functions and
13
+ subsequently present the single differential and the integrated cross section of heavy quarks at the
14
+ center-of-mass energies of √s = 319 GeV , 1.3 T eV and 3.5 T eV in the electron-proton collision.
15
+ The obtained numerical results of the cross section of the charm and beauty quarks are compared
16
+ with the HERA data, which is a combination from the results of the H1 and ZEUS detectors,
17
+ and with the predictions from H1PDF, MSTW2008 and MSRT03. Furthermore, we present the
18
+ production cross section of top quark as a direct prediction from our calculations.
19
+ PACS numbers: 13.60.Hb, 13.85.Lg, 14.65.Dw, 14.65.Fy, 14.65.Ha
20
+ I.
21
+ INTRODUCTION
22
+ The study of the heavy quarks production is one of the
23
+ most important subjects of research at the present and
24
+ future colliders and the test of quantum chromodynamics
25
+ (QCD). These quarks can be generated in the hadron-
26
+ hadron, photon-hadron, electron-positron and lepton-
27
+ hadron interactions.
28
+ The production of heavy quarks
29
+ are studied in two different prescriptions in the frame-
30
+ work of QCD analyses. The first framework (the region
31
+ Q2 = m2
32
+ q) is the so-called variable-flavour number scheme
33
+ (VFNS) [1]. In this scheme, the heavy quarks contribu-
34
+ tions are described by a parton density and treated as a
35
+ massless quark in the hadron. In the ‘massless’ scheme,
36
+ the dominant contribution at the leading order (LO) ap-
37
+ proximation is due to the quark parton model (QPM)
38
+ process and at the next-to-leading order (NLO) approx-
39
+ imation the contributions of the photon-gluon fusion
40
+ (PGF) and QCD Compton processes are also considered.
41
+ In the second framework (the region Q2 ≫ m2
42
+ q), heavy
43
+ quarks are treated as a massive quark and their contri-
44
+ butions are given by the fixed flavour number scheme
45
+ (FFNS)[2, 3]. In this scheme (the ‘massive’ scheme), the
46
+ dominant LO process is the PGF and the NLO diagrams
47
+ are of order α2
48
+ s.
49
+ At HERA, at the LO approximation, the PGF is the
50
+ dominant contribution for the heavy quarks production
51
+ in electron-proton interaction e− + p → q¯q + e− + X.
52
+ In this process, by the interaction of a virtual photon
53
+ emitted by the incoming electron with a gluon from the
54
+ proton, is formed a heavy quark-antiquark pair.
55
+ The
56
+ HERA data show that the production of heavy quarks is
57
+ sensitive to the gluon distribution (which the minimum
58
+ momentum fraction of gluon xg in photoproduction to
59
+ generate a heavy quark pair is arranged such that xtt
60
+ g >
61
+ xbb
62
+ g
63
+ > xcc
64
+ g ) and also is dependent on the mass of these
65
+ quarks. Therefore, the calculations of the heavy quarks
66
+ structure functions are dependent on the squared energy
67
+ scale µ2 [4–8].
68
+ The measurements of the open charm (c) cross section
69
+ in DIS at HERA have mainly been exclusive for D or D∗
70
+ meson production [9–13]. The measurement of the open
71
+ beauty (b) cross section is challenging since b events con-
72
+ tain only a small fraction (typically < 5%) of the total
73
+ cross section.
74
+ The b cross section has been measured
75
+ in DIS (Q2 > 2GeV 2) by ZEUS [14] and in photopro-
76
+ duction (Q2 < 1GeV 2 and 0.1 < y < 0.8) by H1 [15]
77
+ and ZEUS [16], using the transverse momentum distribu-
78
+ tion of muons relative to the b jet in semi-muonic decays.
79
+ Moreover, in Ref. [5], the production of c and b quarks
80
+ in ep interactions has been studied with the ZEUS de-
81
+ tector at HERA for exchanged four-momentum squared
82
+ 5 < Q2 < 1000GeV 2 using an integrated luminosity of
83
+ 354pb−1. Also, measurements of the c and b contribu-
84
+ tions to the inclusive proton structure function F2 have
85
+ been recently presented in deep inelastic scattering (DIS)
86
+ at HERA, using information from the H1 vertex detector,
87
+ for values of the negative square of the four momentum
88
+ of the exchanged boson Q2 > 150GeV 2 and of inelastic-
89
+ ity 0.1 < y < 0.7 [17]. In this region, the inclusive c and
90
+ b cross sections have been found σc¯c = 373 ± 39 ± 47 pb
91
+ and σb¯b = 55.4 ± 8.7 ± 12.0 pb, respectively and the data
92
+ show that a fraction of ∼ 18% (∼ 3%) of DIS events con-
93
+ tain c (b) quark. Furthermore, inclusive c and b cross
94
+ sections have been measured in e−p and e+p neutral
95
+ current collisions at HERA in the kinematic region of
96
+ 5 < Q2 < 2000GeV 2 and 0.0002 < x < 0.05 which x is
97
+ the Bjorken scaling variable. In which the e−p center-
98
+ of-mass energy (CME) is √s = 319GeV , with a proton
99
+ beam energy of Ep = 920GeV and electron beam energy
100
+ of Ee = 27.6GeV [4].
101
+ In high energy processes, the contribution of heavy
102
+ quarks in the proton structure functions will be stud-
103
+ ied in projects such as the Large Hadron electron Col-
104
+ lider (LHeC) and the Future Circular Collider electron-
105
+ hadron (FCC-eh) which operate at high enough ener-
106
+ gies to observe new phenomenon [18–23]. At the LHeC
107
+
108
+ 2
109
+ project, the possibility of colliding an electron beam from
110
+ a new accelerator with the existing LHC proton is inves-
111
+ tigated. In this project, the e−p CME is planned to reach
112
+ √s = 1.3T eV [18, 22]. Beyond the LHeC, the next gener-
113
+ ation ep collider (the FCC-eh project) is an ideal environ-
114
+ ment to increase center-of-mass energy. In the proposed
115
+ FCC-eh program, the distribution of heavy quarks will
116
+ be examined at √s = 3.5T eV [23].
117
+ Recently, the theoretical predictions of inclusive heavy
118
+ quark production have been presented within the VFNS
119
+ scheme at the next-to-next-to-leading order approxima-
120
+ tion (NNLO) [24].
121
+ The predictions for the c and b
122
+ cross sections have been obtained from fits [25] to the
123
+ HERA inclusive F2 data based on CCFM evolution [26].
124
+ Also, the production of heavy quarks in the FFNS ap-
125
+ proach have been predicted according to the LO PGF
126
+ off-shell matrix elements convoluted with the CCFM kT -
127
+ unintegrated gluon density of the proton [25]. In Refs.
128
+ [27–32], the connection between the gluon distribution
129
+ and the structure functions of heavy quarks (c and b)
130
+ has been theoretically shown at small x. Moreover, in
131
+ Refs. [32–34] the authors present the necessary condi-
132
+ tions for predicting the top structure function F t¯t
133
+ 2 with
134
+ respect to the different predictions for the behavior of the
135
+ gluon at low x and high Q2 values. Besides these predic-
136
+ tions, various successful phenomenological methods have
137
+ presented to obtain the c and b structure functions and
138
+ the ratios of Rc¯c and Rb¯b [28, 32, 35]. The importance
139
+ of these studies, along with the t-quark density, can be
140
+ explored at future circular collider energies and may lead
141
+ us to new physics in the future [36, 37].
142
+ At small x, both the H1 and ZEUS detectors have mea-
143
+ sured the charm and beauty components of the proton
144
+ structure function from the measurement of the inclu-
145
+ sive heavy quark cross sections after applying small cor-
146
+ rections to the longitudinal structure function of heavy
147
+ quarks at low and moderate inelasticity. But, in the re-
148
+ gion of high inelasticity, this function may has a signifi-
149
+ cant effect on the heavy quark production cross section.
150
+ The heavy quark deferential cross section is written in
151
+ terms of the heavy quark structure functions as:
152
+ d2σq¯q
153
+ dxdQ2 = 2πα2
154
+ xQ2
155
+
156
+ Y+F q¯q
157
+ 2 (x, Q2) − y2F q¯q
158
+ L (x, Q2)
159
+
160
+ = 2πα2
161
+ xQ2 Y+σq¯q
162
+ r (x, Q2),
163
+ (1)
164
+ where Y+ = 1 + (1 − y)2 and y = Q2/(xs) is the inelas-
165
+ ticity variable in which s and Q2 are the CME squared
166
+ and the photon virtuality, respectively. The heavy quark
167
+ structure functions F q¯q
168
+ 2 (x, Q2) and F q¯q
169
+ L (x, Q2) with re-
170
+ spect to the behavior of the gluon density are given by:
171
+ F q¯q
172
+ k,g(x, Q2, m2
173
+ q) = xe2
174
+ H
175
+ � zmax
176
+ x
177
+ Hk,g(z, ξ)g(x
178
+ z , µ2)dz
179
+ z , (2)
180
+ where µ = (Q2+4m2
181
+ q)1/2 is the default common value for
182
+ the factorization and renormalization scales, zmax = Q2
183
+ µ2
184
+ and ξ =
185
+ Q2
186
+ m2q .
187
+ In general, the heavy quark coefficient
188
+ functions of Hk,g(z, ξ) (with k = 2, L) are expanded in
189
+ αs as follows:
190
+ Hk,g(z, ξ) =
191
+
192
+
193
+ i=1
194
+ �αs(µ2)
195
+
196
+ �i
197
+ H(i)
198
+ k,g(z, ξ),
199
+ k = 2, L,
200
+ (3)
201
+ where the heavy quark coefficient functions at the LO
202
+ and NLO approximations, H(1)
203
+ k,g and H(2)
204
+ k,g, are as follows:
205
+ H(1)
206
+ k,g(z, ξ) = ξ
207
+ πz c(0)
208
+ k,g(η, ξ),
209
+ H(2)
210
+ k,g(z, ξ) = 16πξ
211
+ z
212
+
213
+ c(1)
214
+ k,g(η, ξ) + ¯c(1)
215
+ k,g(η, ξ) ln
216
+ � µ2
217
+ m2q
218
+ ��
219
+ ,
220
+ (4)
221
+ where the coefficient functions c(0)
222
+ k,g(η, ξ) have been given
223
+ in Ref. [3] and the coefficients c(1)
224
+ k,g and ¯c(1)
225
+ k,g are rather
226
+ lengthy, and not published in print and they are only
227
+ available as computer codes [3]. In Ref. [38], the analytic
228
+ form of the heavy quark coefficient functions have been
229
+ presented for deep-inelastic lepton-hadron scattering in
230
+ the kinematical regime Q2 ≫ m2
231
+ q in which Q2 and m2
232
+ q
233
+ stand for the masses squared of the virtual photon and
234
+ heavy quark, respectively.
235
+ This paper is organized as follows. In the next sec-
236
+ tion, the theoretical formalism is presented, including the
237
+ structure functions of heavy quarks. In section III, we
238
+ present a detailed numerical analysis. In the last section,
239
+ we summarize our main conclusions and remarks.
240
+ II.
241
+ THEORETICAL FORMALISM
242
+ In this paper, we use the obtained heavy quark struc-
243
+ ture functions F q¯q
244
+ 2
245
+ and F q¯q
246
+ L
247
+ at the LO and NLO ap-
248
+ proximations in Ref.
249
+ [32].
250
+ These functions have been
251
+ presented by using the heavy quark coefficient functions
252
+ in Ref. [32, 38] obtained by using the presented heavy
253
+ quark coefficient functions (in the kinematical regime
254
+ Q2 ≫ m2
255
+ q) in Ref.
256
+ [38] and a set control coefficients
257
+ which have been obtained by using the heavy quark struc-
258
+ ture functions from HERA [5, 15, 17, 39–43], LHeC [44],
259
+ and other works such as Ref. [45] (for c and b quarks)
260
+ and Ref. [31] (for t quark). Then, we present the inte-
261
+ grated and differential cross sections for heavy quarks in
262
+ DIS and compare our numerical results with HREA data
263
+ [4, 5, 14, 17] and with the results from the MSTW2008
264
+ [46], MSRT03 [47] and H1PDF [48].
265
+ Let us first present a brief summary of our previous
266
+ work. The presented heavy quark coefficient functions in
267
+ Ref. [38] at the regimes of Q2 ≥ m2
268
+ q and Q2 ≤ m2
269
+ q do not
270
+ provide appropriate and acceptable results and the ob-
271
+ tained structure functions by these coefficient functions
272
+ are very ascendant, especially for the charm quark. To
273
+ control this growth, by using HERA data and the re-
274
+ sults from HERA [5, 15, 17, 39–43], LHeC [44], and other
275
+
276
+ 3
277
+ Table (1): The fixed numbers d and e in the control
278
+ coefficients of the heavy quark coefficient functions.
279
+ d
280
+ e
281
+ mc
282
+ 1.007324
283
+ −11.9235 × 10−4
284
+ mb
285
+ 1.003669
286
+ −2.35842 × 10−4
287
+ mt
288
+ 1.000011
289
+ −8.93697 × 10−8
290
+ works such as Ref. [45] (for c and b quarks) and Refs. [31]
291
+ (for t quarks), a series of control coefficients have been
292
+ presented that are only a function of Q2. By multiplying
293
+ these coefficients by the obtained coefficient functions in
294
+ Ref. [38], they have given acceptable results. The gen-
295
+ eral form of these control coefficients is as b − exp(cQ2),
296
+ which d and e are fixed numbers and are shown in Table
297
+ (1) for heavy quarks.
298
+ To solve the Eq. (2), it is necessary to obtain the gluon
299
+ density function, for this aim, we used the DGLAP evo-
300
+ lution equations and the Laplace transform method as
301
+ Ref.
302
+ [49–51] by considering this fact that the Laplace
303
+ transform of the convolution factors is simply the ordi-
304
+ nary product of the Laplace transform of the factors. The
305
+ coupled DGLAP integral-differential equations are as fol-
306
+ lows [52]:
307
+ ∂Fs(x, Q2)
308
+ ∂ ln Q2
309
+ = αs(Q2)
310
+
311
+
312
+ Pqq(x, Q2) ⊗ Fs(x, Q2)
313
+ +2nfPqg(x, Q2) ⊗ G(x, Q2)
314
+
315
+ ,
316
+ (5)
317
+ ∂G(x, Q2)
318
+ ∂ ln Q2
319
+ = αs(Q2)
320
+
321
+
322
+ Pgq(x, Q2) ⊗ Fs(x, Q2)
323
+ +Pgg(x, Q2) ⊗ G(x, Q2)
324
+
325
+ ,
326
+ (6)
327
+ where αs is the running strong coupling constant and
328
+ Pab(x)’s are the Altarelli-Parisi splitting functions.
329
+ In
330
+ the above equations, the symbol ⊗ represents the con-
331
+ volution integral which is defined as f(x) ⊗ h(x) =
332
+ � 1
333
+ x f(y)h(x/y)dy/y.
334
+ To convert Eqs.
335
+ (5) and (6) into
336
+ Laplace space, we inserted the variables x = exp(−v),
337
+ y = exp(−w) and τ(Q2, Q2
338
+ 0) =
339
+ 1
340
+
341
+ � Q2
342
+ Q2
343
+ 0 αs(Q′2)d ln(Q′2)
344
+ into the DGLAP evolution equations.
345
+ By using the
346
+ Laplace transform method, one can turn the convolution
347
+ equations at the LO and NLO approximations from v-
348
+ space into s-space, and then solve them straightforwardly
349
+ in s-space as:
350
+ f (i)(s, Q2) = k(i)
351
+ ff(s, τ)f (i)(s, Q2
352
+ 0) + k(i)
353
+ fg(s, τ)g(i)(s, Q2
354
+ 0),
355
+ (7)
356
+ g(i)(s, Q2) = k(i)
357
+ gf (s, τ)f (i)(s, Q2
358
+ 0) + k(i)
359
+ gg (s, τ)g(i)(s, Q2
360
+ 0),
361
+ (8)
362
+ with i = LO or NLO. The functions of f(s, Q2
363
+ 0) and
364
+ g(s, Q2
365
+ 0) are the singlet and gluon distribution functions
366
+ at initial scale τ = 0 and L[ ˆH(v, τ), v, s] = h(s, τ). In
367
+ Eqs. (7) and (8), the kernels of kij(s, u)’s at LO and NLO
368
+ approximations can be found [51, 53, 54] . Since the ob-
369
+ tained gluon distribution function in the above equation
370
+ (8) is in Laplace space s and its exact solution is not pos-
371
+ sible through analytical techniques, so its inverse Laplace
372
+ transform must be computed numerically [53, 55]. To ob-
373
+ tain the heavy quarks structure functions in terms of the
374
+ distribution functions at the initial scale, we turned Eq.
375
+ (2) to the Laplace space s.
376
+ To this aim, the variable
377
+ z = x/y and transformation x → xe(ln 1/a) (where a is
378
+ larger than one) are used, therefore, Eq. (2) is obtained
379
+ as follows:
380
+ F q¯q
381
+ k,g(xe(ln 1/a), Q2, m2
382
+ q) = e2
383
+ H
384
+ � 1
385
+ x
386
+ G(y, µ2)dy
387
+ y
388
+ ×Ck,g(xe(ln 1/a)
389
+ y
390
+ , ξ),
391
+ k = 2, L,
392
+ (9)
393
+ where G(y, Q2) = yg(y, Q2) and Ck,g(x) = xHk,g(x). By
394
+ using the variables x = exp(−v), y = exp(−w), one can
395
+ rewrite the above equation as:
396
+ ˆF q¯q
397
+ k,g(v − ln 1/a, Q2, m2
398
+ q) = e2
399
+ H
400
+ � v
401
+ 0
402
+ ˆG(w, µ2)
403
+ × ˆCk,g(v − w − ln 1/a, ξ)dw,
404
+ k = 2, L,
405
+ (10)
406
+ Using the Laplace transform method, we could turn the
407
+ above equation from v-space into s-space as follows:
408
+ f q¯q
409
+ k,g(s, Q2, m2
410
+ q) = e2
411
+ Hg(s, µ2)hk,g(s, ξ),
412
+ k = 2, L, (11)
413
+ where hk,g(s, ξ) = L[ ˆC(v − ln 1/a, ξ)], v, s] at the LO ap-
414
+ proximation have been given in Ref. [32]. To obtain the
415
+ heavy quarks components F q¯q
416
+ 2
417
+ and F q¯q
418
+ L
419
+ of the structure
420
+ functions in Laplace space at the LO and NLO approxi-
421
+ mations, the obtained gluon distribution function in Eq.
422
+ (8) are inserted into Eq. (11). But before that, Q2 must
423
+ be replaced by µ2. With these descriptions, one can write
424
+ the structure functions as follows:
425
+ f q¯q
426
+ k,g(s, Q2, m2
427
+ q) = e2
428
+ H
429
+
430
+ jgf(s, µ2)f(s, Q2
431
+ 0)
432
+ +jgg(s, µ2)g(s, Q2
433
+ 0)
434
+
435
+ ,
436
+ k = 2, L,
437
+ (12)
438
+ where
439
+ jgf(s, µ2) = hk,g(s, ξ)kfg(s, τ(µ2, Q2
440
+ 0))/as,
441
+
442
+ 4
443
+ jgg(s, µ2) = hk,g(s, ξ)kgg(s, τ(µ2, Q2
444
+ 0))/as.
445
+ (13)
446
+ Finally, using the Laplace inverse transform, we could
447
+ obtain these structure functions in the usual space x as
448
+ follows;
449
+ F q¯q
450
+ k,g(x, Q2, m2
451
+ q) = e2
452
+ H
453
+
454
+ Jgf(x, µ2) ⊗ Fs(x, Q2
455
+ 0)
456
+ +Jgg(x, µ2) ⊗ G(x, Q2
457
+ 0)
458
+
459
+ ,
460
+ k = 2, L
461
+ (14)
462
+ where Jgf(x, µ2)
463
+ =
464
+ L−1[jgf(s, µ2), s, v]|v=ln(1/x) and
465
+ Jgg(x, µ2) = L−1[jgg(s, µ2), s, v]|v=ln(1/x). It should be
466
+ noted that, to obtain the heavy quarks structure func-
467
+ tions in Eq. (14), it is requires only a knowledge of the
468
+ singlet Fs(x) and gluon G(x) distribution functions at
469
+ the starting value Q2
470
+ 0.
471
+ III.
472
+ NUMERICAL RESULTS
473
+ Now, we present our numerical results of the produc-
474
+ tion cross section of heavy quarks in the e−p interaction
475
+ at the LO and NLO approximations obtained by using
476
+ Eq. (1) and the DGLAP evolution equations. In order
477
+ to present more detailed discussions on our findings, the
478
+ numerical results for the structure functions and the pro-
479
+ duction cross section of heavy quarks are compared with
480
+ HREA data [4, 5, 9, 14, 17, 41–43] and with the results
481
+ from the MSTW2008 [46], MSRT03 [47] and H1PDF
482
+ [48].
483
+ To extract numerical results, we use the pub-
484
+ lished MSTW2008 [46] initial starting functions Fs(x)
485
+ and G(x). It should be said that, we have considered the
486
+ uncertainties due to the running charm, beauty and top
487
+ (t) quark masses mc = 1.29+0.077
488
+ −0.053 GeV , mb = 4.049+0.138
489
+ −0.118
490
+ GeV [6] and mt = 173.5+3.9
491
+ −3.8 GeV [56] where the uncer-
492
+ tainties are obtained through adding the experimental fit,
493
+ model and parameterization uncertainties in quadrature.
494
+ Figures (1) and (2) indicate the numerical results of the
495
+ c quark structure functions (F c¯c
496
+ 2 (x, Q2) and F c¯c
497
+ L (x, Q2))
498
+ at Q2 = 11, 60, 130 and 500 GeV 2 and the b quark
499
+ structure functions (F b¯b
500
+ 2 (x, Q2) and F b¯b
501
+ L (x, Q2)) at Q2 =
502
+ 12, 60, 200 and 650 GeV 2. These results are presented
503
+ at the LO and NLO approximations and compared with
504
+ those presented by ZEUS [41–43] and H1 [9, 13, 17] collid-
505
+ ers and with the results from the MSTW2008 predictions
506
+ [46]. In these figures, since nowhere is presented data on
507
+ the longitudinal structure function of heavy quarks, we
508
+ only compare F c¯c
509
+ 2 (x, Q2) and F b¯b
510
+ 2 (x, Q2) with those pre-
511
+ sented by ZEUS and H1 colliders . As can be seen, our
512
+ numerical results at the NLO approximation are closer
513
+ to the experimental data than the results at the LO ap-
514
+ proximation.
515
+ In figure (3) as a comparison, we show our numerical
516
+ results of the c quark reduced cross section and ZEUS [5]
517
+ data as a function of x. The numerical results of this cross
518
+ section are showed at the LO and NLO approximation
519
+ at Q2 = 6.5, 12, 30, 80, 160 and 600 GeV 2.
520
+ It can be
521
+ concluded that in the low-energy scale, our results are
522
+ very close to ZEUS data and show that the presented
523
+ control coefficients are suitable. We also compare the c
524
+ quark reduced cross section at the NLO approximation in
525
+ Q2 = 5, 12, 60, 200, 650 and 2000 GeV 2 with H1 [4] data
526
+ and with the results from the MSTW2008 predictions
527
+ [46] in figure (4).
528
+ Figure (5) indicates our numerical results of the b
529
+ quark reduced cross section at the LO and NLO approx-
530
+ imations in Q2 = 6.5, 12, 30, 80, 160 and 600 GeV 2 com-
531
+ pared with ZEUS [5] data. Moreover, in figure (6), we
532
+ compare the b quark reduced cross section at the NLO
533
+ approximation with H1 [4] data and with the results from
534
+ the MSTW2008 predictions [46].
535
+ In figure (7), we present the numerical results of the t
536
+ quark reduced cross section at the LO and NLO approxi-
537
+ mations at Q2 = 6.5, 12, 30, 80, 160 and 600 GeV 2. Here,
538
+ we must state that the t quark longitudinal structure
539
+ function at the LO and NLO approximations are very
540
+ small relative to the structure function F t¯t
541
+ 2 (x, Q2), so we
542
+ can almost consider σt¯t
543
+ r equal to F t¯t
544
+ 2 (x, Q2). At the NLO
545
+ approximation in the energy interval 6.5 < Q2 < 600
546
+ GeV 2, the t quark longitudinal structure function is zero.
547
+ In figure (8), it is presented a comparison between the
548
+ reduced cross section of heavy quarks at Q2 = 1000, 5000
549
+ and 10000 GeV 2. In this figure at Q2 = 1000GeV 2 and
550
+ minimum x, the ratios of σb¯b
551
+ r /σc¯c
552
+ r
553
+ and σt¯t
554
+ r /σc¯c
555
+ r
556
+ are ap-
557
+ proximately 0.158 and 0.005, respectively and at Q2 =
558
+ 10000GeV 2 and minimum x, these ratios are approxi-
559
+ mately 0.225 and 0.047, respectively. These results show
560
+ that with the increase of energy, the production cross
561
+ section of t quark grows more than the production cross
562
+ section of b quark.
563
+ In order to assess the significance of the theoretical
564
+ uncertainty at the LO and NLO approximations, we in-
565
+ dicate the Q2 dependence of the single differential cross
566
+ section of heavy quarks dσqq/dQ2 at the LO and NLO ap-
567
+ proximations in figure (9). In this figure, the differential
568
+ cross section of c, b and t quarks are presented at the cen-
569
+ ter of mass energies of √s = 319GeV , √s = 1.3T eV and
570
+ √s = 3.5T eV in e−p interaction at 0.1 < y < 0.7. We
571
+ also show the single differential cross section of the c and
572
+ b quarks as a function of Q2 at the CME of √s = 319GeV
573
+ and 0.02 < y < 0.7 at the NLO approximation in figure
574
+ (10). The data have been given together with their sta-
575
+ tistical and systematic uncertainties (not including the
576
+ error on the integrated luminosity). Moreover, the single
577
+ differential cross sections of c and b quarks as a function
578
+ of x at the CME of √s = 319GeV and 0.02 < y < 0.7 at
579
+ the NLO approximation are presented in figure (11).
580
+ The integrated cross sections are also compared with
581
+ H1 [30] and ZEUS [14] data and with the predictions
582
+ from NLO QCD. The integrated cross sections for c and
583
+ b quarks have been respectively presented 373 ± 39 ± 47
584
+ pb and 55.4 ± 8.7 ± 12.0 pb by the H1 vertex detector
585
+ for values of photon virtuality Q2 > 150GeV 2 and of
586
+
587
+ 5
588
+ inelasticity 0.1 < y < 0.7. Our numerical result of this
589
+ cross section at the LO and NLO approximations for the c
590
+ quark at the e−p CME of √s = 319 GeV and at Q2 > 150
591
+ GeV 2 and inelasticity 0.1 < y < 0.7 are 320 ± 7 pb and
592
+ 332 ± 3 pb, respectively and for the b quark they are
593
+ 32.9 ± 1.2 pb and 36.7 ± 1.0 pb. These results are pre-
594
+ sented in Table (2) and compared with the VFNS pre-
595
+ dictions from MRST03 [47] and the H1PDF 2000 fit [48]
596
+ and with results from the FFNS scheme, which was used
597
+ for the QCD predictions in Ref. [14]. In Ref. [14], the re-
598
+ sults have been obtained by using the parton distribution
599
+ function set CTEQ5F3 [57]. In addition to these results,
600
+ we show the integrated cross sections for c and b quarks
601
+ at the e−p CME of √s = 1.3T eV and √s = 3.5T eV . It
602
+ should be noted that the integrated cross sections for c
603
+ and b quarks at √s = 319GeV at the NLO approxima-
604
+ tion are larger than those at the LO approximation but at
605
+ √s = 1.3T eV and √s = 3.5T eV the results are inverse.
606
+ Furthermore, we obtain and present the integrated cross
607
+ sections for t quark at √s = 1.3T eV and √s = 3.5T eV
608
+ in Table (2) as a prediction from our calculations. This
609
+ cross section at √s = 319GeV for values of photon vir-
610
+ tuality Q2 > 150GeV 2 and of inelasticity 0.1 < y < 0.7
611
+ is zero.
612
+ All of the results clearly show that the extraction
613
+ procedure provides correct behaviors of the structure
614
+ functions and the production cross section of the heavy
615
+ quraks at the LO and NLO approximations. Moreover,
616
+ it should be noted that the NLO corrections are small
617
+ for values of high x , but at low x region these correc-
618
+ tions have many effects on the results especially at low
619
+ Q2.
620
+ Furthermore, they often allow one to reduce the
621
+ uncertainties of the predicted results, as one can see by
622
+ comparing the bands in almost all of the plots presented
623
+ in the figures.
624
+ IV.
625
+ CONCLUSION
626
+ In conclusion, we have presented the production cross
627
+ section of heavy quarks (σc¯c, σb¯b and σt¯t) and the sin-
628
+ gle differential cross sections (dσqq/dQ2 and dσqq/dx) of
629
+ them by utilizing the heavy quarks structure functions
630
+ F q¯q
631
+ 2
632
+ and F q¯q
633
+ L
634
+ obtained by Dokshitzer-Gribov-Lipatov-
635
+ Altarelli-Parisi evolution equations and a suitable fit for
636
+ the heavy quarks coefficient functions at the NLO ap-
637
+ proximation. Indeed, we have shown that the Laplace
638
+ transform method is the suitable and alternative scheme
639
+ to solve the DGLAP evolution equations and Eq. (2).
640
+ It should be noted that, the obtained equations are gen-
641
+ eral and require only a knowledge of the parton distri-
642
+ bution functions Fs(x), G(x) at the starting value Q2
643
+ 0.
644
+ The comparisons have shown that our numerical results
645
+ of the charm and beauty production cross section are in
646
+ agreement with the H1 and ZEUS data well within er-
647
+ rors.
648
+ Also, in this paper, we have compared the pro-
649
+ duction cross sections at the center-of-mass energy of
650
+ √s = 319GeV and at 0.1 < y < 0.7 with the ex-
651
+ 10
652
+ -5
653
+ 10
654
+ -4
655
+ 10
656
+ -3
657
+ 10
658
+ -2
659
+ 10
660
+ -1
661
+ 0.0
662
+ 0.1
663
+ 0.2
664
+ 0.3
665
+ 0.4
666
+ 0.5
667
+ Q
668
+ 2
669
+ =500G
670
+ e
671
+ V
672
+ 2
673
+ F(x,Q
674
+ 2
675
+ )
676
+ x
677
+ 10
678
+ -4
679
+ 10
680
+ -3
681
+ 10
682
+ -2
683
+ 10
684
+ -1
685
+ 0.0
686
+ 0.1
687
+ 0.2
688
+ 0.3
689
+ 0.4
690
+ 0.5
691
+ Q
692
+ 2
693
+ =11G
694
+ e
695
+ V
696
+ 2
697
+ F
698
+ 2
699
+ c c
700
+ (NLO
701
+ )
702
+ F
703
+ L
704
+ c c
705
+ (NLO
706
+ )
707
+ F
708
+ 2
709
+ c c
710
+ (MST
711
+ W-NLO
712
+ )
713
+ H1
714
+ Z
715
+ EUS
716
+ F
717
+ (x,Q
718
+ 2
719
+ )
720
+ x
721
+ 10
722
+ -5
723
+ 10
724
+ -4
725
+ 10
726
+ -3
727
+ 10
728
+ -2
729
+ 10
730
+ -1
731
+ 0.00
732
+ 0.05
733
+ 0.10
734
+ 0.15
735
+ 0.20
736
+ 0.25
737
+ 0.30
738
+ 0.35
739
+ 0.40
740
+ 0.45
741
+ 0.50
742
+ Q
743
+ 2
744
+ =130G
745
+ e
746
+ V
747
+ 2
748
+ F
749
+ (x,Q
750
+ 2
751
+ )
752
+ x
753
+ 10
754
+ -5
755
+ 10
756
+ -4
757
+ 10
758
+ -3
759
+ 10
760
+ -2
761
+ 10
762
+ -1
763
+ 0.0
764
+ 0.1
765
+ 0.2
766
+ 0.3
767
+ 0.4
768
+ 0.5
769
+ Q
770
+ 2
771
+ =60G
772
+ e
773
+ V
774
+ 2
775
+ F
776
+ (x,Q
777
+ 2
778
+ )
779
+ x
780
+ Figure (1): The charm quark structure functions F c¯c
781
+ 2(L)
782
+ compared with data from H1 [9, 13, 17], ZEUS [41–43], and
783
+ MSTW2008 [46] at the NLO approximation.
784
+ perimented results by H1 PDF 2000 and MSRT03 and
785
+ MSTW2008.
786
+ Also, we have obtained the production
787
+ cross sections of heavy quarks at the-center-of mass en-
788
+ ergies of √s = 1.3T eV and √s = 3.5T eV and considered
789
+ the uncertainties due to the running charm, beauty and
790
+ top quark masses. In addition, we have presented the
791
+ production cross section of the quark top at center-of-
792
+ mass energies of √s = 1.3T eV and √s = 3.5T eV .
793
+
794
+ -
795
+ -1
796
+ -1.1
797
+ 1
798
+ [!6
799
+ 10
800
+ -4
801
+ 10
802
+ -3
803
+ 10
804
+ -2
805
+ 10
806
+ -1
807
+ 0.000
808
+ 0.005
809
+ 0.010
810
+ 0.015
811
+ 0.020
812
+ 0.025
813
+ 0.030
814
+ 0.035
815
+ 0.040
816
+ Q
817
+ 2
818
+ =650G
819
+ e
820
+ V
821
+ 2
822
+ F
823
+ (x,Q
824
+ 2
825
+ )
826
+ x
827
+ 10
828
+ -4
829
+ 10
830
+ -3
831
+ 10
832
+ -2
833
+ 10
834
+ -1
835
+ -0.002
836
+ 0.000
837
+ 0.002
838
+ 0.004
839
+ 0.006
840
+ 0.008
841
+ 0.010
842
+ Q
843
+ 2
844
+ =12G
845
+ e
846
+ V
847
+ 2
848
+ F
849
+ 2
850
+ bb
851
+ (NLO
852
+ )
853
+ F
854
+ L
855
+ bb
856
+ (NLO
857
+ )
858
+ F
859
+ 2
860
+ bb
861
+ (MST
862
+ W-NLO
863
+ )
864
+ H1
865
+ F
866
+ (x,Q
867
+ 2
868
+ )
869
+ x
870
+ 10
871
+ -4
872
+ 10
873
+ -3
874
+ 10
875
+ -2
876
+ 10
877
+ -1
878
+ 0.00
879
+ 0.01
880
+ 0.02
881
+ 0.03
882
+ 0.04
883
+ 0.05
884
+ 0.06
885
+ Q
886
+ 2
887
+ =200G
888
+ e
889
+ V
890
+ 2
891
+ F
892
+ (x,Q
893
+ 2
894
+ )
895
+ x
896
+ 10
897
+ -5
898
+ 10
899
+ -4
900
+ 10
901
+ -3
902
+ 10
903
+ -2
904
+ 10
905
+ -1
906
+ 0.000
907
+ 0.005
908
+ 0.010
909
+ 0.015
910
+ 0.020
911
+ 0.025
912
+ 0.030
913
+ Q
914
+ 2
915
+ =60G
916
+ e
917
+ V
918
+ 2
919
+ F
920
+ (x,Q
921
+ 2
922
+ )
923
+ x
924
+ Figure (2): The beauty quark structure functions F b¯b
925
+ 2(L)
926
+ compared with data from H1 [17] and MSTW2008 [46] at
927
+ the NLO approximation.
928
+ 1E-4
929
+ 0.001
930
+ 0.01
931
+ 0.1
932
+ 1
933
+ 0.0
934
+ 0.1
935
+ 0.2
936
+ 0.3
937
+ 0.4
938
+ 0.5
939
+ 0.6
940
+ Q
941
+ 2
942
+ =80G
943
+ e
944
+ V
945
+ 2
946
+ s
947
+ r
948
+ c c
949
+ (x,Q
950
+ 2
951
+ )
952
+ x
953
+ 1E-4
954
+ 0.001
955
+ 0.01
956
+ 0.1
957
+ 1
958
+ 0.0
959
+ 0.1
960
+ 0.2
961
+ 0.3
962
+ 0.4
963
+ 0.5
964
+ 0.6
965
+ Q
966
+ 2
967
+ =600G
968
+ e
969
+ V
970
+ 2
971
+ s
972
+ r
973
+ c c
974
+ (x,Q
975
+ 2
976
+ )
977
+ x
978
+ 1E-4
979
+ 0.001
980
+ 0.01
981
+ 0.1
982
+ 1
983
+ 0.0
984
+ 0.1
985
+ 0.2
986
+ 0.3
987
+ 0.4
988
+ 0.5
989
+ 0.6
990
+ Q
991
+ 2
992
+ =160G
993
+ e
994
+ V
995
+ 2
996
+ s
997
+ r
998
+ c c
999
+ (x,Q
1000
+ 2
1001
+ )
1002
+ x
1003
+ 1E-4
1004
+ 0.001
1005
+ 0.01
1006
+ 0.1
1007
+ 1
1008
+ 0.0
1009
+ 0.1
1010
+ 0.2
1011
+ 0.3
1012
+ 0.4
1013
+ 0.5
1014
+ 0.6
1015
+ Q
1016
+ 2
1017
+ =6.5G
1018
+ e
1019
+ V
1020
+ 2
1021
+ NLO
1022
+ LO
1023
+ Z
1024
+ EUS
1025
+ s
1026
+ r
1027
+ c c
1028
+ (x,Q
1029
+ 2
1030
+ )
1031
+ x
1032
+ 1E-4
1033
+ 0.001
1034
+ 0.01
1035
+ 0.1
1036
+ 1
1037
+ 0.0
1038
+ 0.1
1039
+ 0.2
1040
+ 0.3
1041
+ 0.4
1042
+ 0.5
1043
+ 0.6
1044
+ Q
1045
+ 2
1046
+ =30G
1047
+ e
1048
+ V
1049
+ 2
1050
+ s
1051
+ r
1052
+ c c
1053
+ (x,Q
1054
+ 2
1055
+ )
1056
+ x
1057
+ 1E-4
1058
+ 0.001
1059
+ 0.01
1060
+ 0.1
1061
+ 1
1062
+ 0.0
1063
+ 0.1
1064
+ 0.2
1065
+ 0.3
1066
+ 0.4
1067
+ 0.5
1068
+ 0.6
1069
+ Q
1070
+ 2
1071
+ =12G
1072
+ e
1073
+ V
1074
+ 2
1075
+ s
1076
+ r
1077
+ c c
1078
+ (x,Q
1079
+ 2
1080
+ )
1081
+ x
1082
+ Figure (3): The reduced charm quark cross section as a
1083
+ function of x for six different values of Q2 at the LO and
1084
+ NLO approximations compared with the ZEUS data [5]. The
1085
+ error bars represent the statistical, systematic (not including
1086
+ the error on the integrated luminosity) and extrapolation
1087
+ uncertainties added in quadrature. The shaded areas are the
1088
+ uncertainties due to the running quark mass.
1089
+ 1E
1090
+ -4
1091
+ 0.001
1092
+ 0.01
1093
+ 0.1
1094
+ 0.0
1095
+ 0.1
1096
+ 0.2
1097
+ 0.3
1098
+ 0.4
1099
+ 0.5
1100
+ Q
1101
+ 2
1102
+ =
1103
+ 120G
1104
+ eV
1105
+ 2
1106
+ s
1107
+ r
1108
+ cc
1109
+ (x,Q
1110
+ 2
1111
+ )
1112
+ x
1113
+ 0.001
1114
+ 0.01
1115
+ 0.1
1116
+ Q
1117
+ 2
1118
+ =
1119
+ 300G
1120
+ eV
1121
+ 2
1122
+ x
1123
+ 0.0
1124
+ 0.1
1125
+ 0.2
1126
+ 0.3
1127
+ 0.4
1128
+ 0.5
1129
+ N
1130
+ LO
1131
+ M
1132
+ S
1133
+ T
1134
+ W2008
1135
+ H
1136
+ 1
1137
+ s
1138
+ r
1139
+ cc
1140
+ (x,Q
1141
+ 2
1142
+ )
1143
+ Q
1144
+ 2
1145
+ =
1146
+ 12G
1147
+ eV
1148
+ 2
1149
+ 0.001
1150
+ 0.01
1151
+ 0.1
1152
+ Q
1153
+ 2
1154
+ =
1155
+ 2000G
1156
+ eV
1157
+ 2
1158
+ x
1159
+ Q
1160
+ 2
1161
+ =
1162
+ 60G
1163
+ eV
1164
+ 2
1165
+ Figure (4): The reduced charm quark cross section as a
1166
+ function of x at the NLO approximation compared with the
1167
+ H1 data [4] and the results from the MSTW2008 predictions
1168
+ [46].
1169
+
1170
+ 1
1171
+ -
1172
+ !
1173
+ --r
1174
+ 1
1175
+ 11111
1176
+ 17
1177
+ 10
1178
+ -4
1179
+ 10
1180
+ -3
1181
+ 10
1182
+ -2
1183
+ 10
1184
+ -1
1185
+ 0.00
1186
+ 0.01
1187
+ 0.02
1188
+ 0.03
1189
+ 0.04
1190
+ 0.05
1191
+ 0.06
1192
+ 0.07
1193
+ 0.08
1194
+ Q
1195
+ 2
1196
+ =80G
1197
+ e
1198
+ V
1199
+ 2
1200
+ s
1201
+ r
1202
+ bb
1203
+ (x,Q
1204
+ 2
1205
+ )
1206
+ x
1207
+ 10
1208
+ -4
1209
+ 10
1210
+ -3
1211
+ 10
1212
+ -2
1213
+ 10
1214
+ -1
1215
+ 0.00
1216
+ 0.01
1217
+ 0.02
1218
+ 0.03
1219
+ 0.04
1220
+ 0.05
1221
+ 0.06
1222
+ 0.07
1223
+ 0.08
1224
+ Q
1225
+ 2
1226
+ =600G
1227
+ e
1228
+ V
1229
+ 2
1230
+ s
1231
+ r
1232
+ bb
1233
+ (x,Q
1234
+ 2
1235
+ )
1236
+ x
1237
+ 10
1238
+ -4
1239
+ 10
1240
+ -3
1241
+ 10
1242
+ -2
1243
+ 10
1244
+ -1
1245
+ 0.00
1246
+ 0.01
1247
+ 0.02
1248
+ 0.03
1249
+ 0.04
1250
+ 0.05
1251
+ 0.06
1252
+ 0.07
1253
+ 0.08
1254
+ Q
1255
+ 2
1256
+ =160G
1257
+ e
1258
+ V
1259
+ 2
1260
+ s
1261
+ r
1262
+ bb
1263
+ (x,Q
1264
+ 2
1265
+ )
1266
+ x
1267
+ 10
1268
+ -4
1269
+ 10
1270
+ -3
1271
+ 10
1272
+ -2
1273
+ 10
1274
+ -1
1275
+ 0.000
1276
+ 0.005
1277
+ 0.010
1278
+ 0.015
1279
+ 0.020
1280
+ 0.025
1281
+ 0.030
1282
+ Q
1283
+ 2
1284
+ =6.5G
1285
+ e
1286
+ V
1287
+ 2
1288
+ NLO
1289
+ LO
1290
+ Z
1291
+ EUS
1292
+ s
1293
+ r
1294
+ bb
1295
+ (x,Q
1296
+ 2
1297
+ )
1298
+ x
1299
+ 10
1300
+ -4
1301
+ 10
1302
+ -3
1303
+ 10
1304
+ -2
1305
+ 10
1306
+ -1
1307
+ 0.000
1308
+ 0.005
1309
+ 0.010
1310
+ 0.015
1311
+ 0.020
1312
+ 0.025
1313
+ 0.030
1314
+ Q
1315
+ 2
1316
+ =30G
1317
+ e
1318
+ V
1319
+ 2
1320
+ s
1321
+ r
1322
+ bb
1323
+ (x,Q
1324
+ 2
1325
+ )
1326
+ x
1327
+ 10
1328
+ -4
1329
+ 10
1330
+ -3
1331
+ 10
1332
+ -2
1333
+ 10
1334
+ -1
1335
+ 0.000
1336
+ 0.005
1337
+ 0.010
1338
+ 0.015
1339
+ 0.020
1340
+ 0.025
1341
+ 0.030
1342
+ Q
1343
+ 2
1344
+ =12G
1345
+ e
1346
+ V
1347
+ 2
1348
+ s
1349
+ r
1350
+ bb
1351
+ (x,Q
1352
+ 2
1353
+ )
1354
+ x
1355
+ Figure (5): The reduced beauty quark cross section. For
1356
+ more details, see the caption of figure (3).
1357
+ Q
1358
+ 2
1359
+ =
1360
+ 60G
1361
+ eV
1362
+ 2
1363
+ 0.001
1364
+ 0.01
1365
+ 0.1
1366
+ Q
1367
+ 2
1368
+ =
1369
+ 2000G
1370
+ eV
1371
+ 2
1372
+ x
1373
+ 1E
1374
+ -4
1375
+ 0.001
1376
+ 0.01
1377
+ 0.1
1378
+ 0.000
1379
+ 0.005
1380
+ 0.010
1381
+ 0.015
1382
+ 0.020
1383
+ 0.025
1384
+ 0.030
1385
+ 0.035
1386
+ 0.040
1387
+ Q
1388
+ 2
1389
+ =
1390
+ 200G
1391
+ eV
1392
+ 2
1393
+ s
1394
+ r
1395
+ bb
1396
+ (x,Q
1397
+ 2
1398
+ )
1399
+ x
1400
+ 0.001
1401
+ 0.01
1402
+ 0.1
1403
+ Q
1404
+ 2
1405
+ =
1406
+ 650G
1407
+ eV
1408
+ 2
1409
+ x
1410
+ Q
1411
+ 2
1412
+ =
1413
+ 12G
1414
+ eV
1415
+ 2
1416
+ 0.000
1417
+ 0.005
1418
+ 0.010
1419
+ 0.015
1420
+ 0.020
1421
+ 0.025
1422
+ 0.030
1423
+ N
1424
+ LO
1425
+ M
1426
+ S
1427
+ T
1428
+ W2008
1429
+ H
1430
+ 1
1431
+ s
1432
+ r
1433
+ bb
1434
+ (x,Q
1435
+ 2
1436
+ )
1437
+ Q
1438
+ 2
1439
+ =
1440
+ 5G
1441
+ eV
1442
+ 2
1443
+ Figure (6): The reduced beauty quark cross section as a
1444
+ function of x at the NLO approximation compared with the
1445
+ H1 data [4] and the results from the MSTW2008 predictions
1446
+ [46].
1447
+ 10
1448
+ -8
1449
+ 10
1450
+ -7
1451
+ 10
1452
+ -6
1453
+ 10
1454
+ -5
1455
+ 10
1456
+ -4
1457
+ 10
1458
+ -3
1459
+ 0
1460
+ 5
1461
+ 10
1462
+ 15
1463
+ 20
1464
+ 25
1465
+ 30
1466
+ 35
1467
+ 40
1468
+ Q
1469
+ 2
1470
+ =80G
1471
+ e
1472
+ V
1473
+ 2
1474
+ s
1475
+ r
1476
+ tt
1477
+ (x,Q
1478
+ 2
1479
+ )�10
1480
+ -4
1481
+ x
1482
+ 10
1483
+ -8
1484
+ 10
1485
+ -7
1486
+ 10
1487
+ -6
1488
+ 10
1489
+ -5
1490
+ 10
1491
+ -4
1492
+ 10
1493
+ -3
1494
+ 0
1495
+ 5
1496
+ 10
1497
+ 15
1498
+ 20
1499
+ 25
1500
+ 30
1501
+ 35
1502
+ 40
1503
+ NLO
1504
+ LO
1505
+ s
1506
+ r
1507
+ tt
1508
+ (x,Q
1509
+ 2
1510
+ )�10
1511
+ -4
1512
+ x
1513
+ Q
1514
+ 2
1515
+ =600G
1516
+ e
1517
+ V
1518
+ 2
1519
+ 10
1520
+ -8
1521
+ 10
1522
+ -7
1523
+ 10
1524
+ -6
1525
+ 10
1526
+ -5
1527
+ 10
1528
+ -4
1529
+ 10
1530
+ -3
1531
+ 0
1532
+ 5
1533
+ 10
1534
+ 15
1535
+ 20
1536
+ 25
1537
+ 30
1538
+ 35
1539
+ 40
1540
+ Q
1541
+ 2
1542
+ =160G
1543
+ e
1544
+ V
1545
+ 2
1546
+ s
1547
+ r
1548
+ tt
1549
+ (x,Q
1550
+ 2
1551
+ )�10
1552
+ -4
1553
+ x
1554
+ 10
1555
+ -8
1556
+ 10
1557
+ -7
1558
+ 10
1559
+ -6
1560
+ 10
1561
+ -5
1562
+ 10
1563
+ -4
1564
+ 0
1565
+ 2
1566
+ 4
1567
+ 6
1568
+ 8
1569
+ 10
1570
+ 12
1571
+ Q
1572
+ 2
1573
+ =6.5G
1574
+ e
1575
+ V
1576
+ 2
1577
+ s
1578
+ r
1579
+ tt
1580
+ (x,Q
1581
+ 2
1582
+ )�10
1583
+ -5
1584
+ x
1585
+ 10
1586
+ -8
1587
+ 10
1588
+ -7
1589
+ 10
1590
+ -6
1591
+ 10
1592
+ -5
1593
+ 10
1594
+ -4
1595
+ 0
1596
+ 2
1597
+ 4
1598
+ 6
1599
+ 8
1600
+ 10
1601
+ 12
1602
+ Q
1603
+ 2
1604
+ =30G
1605
+ e
1606
+ V
1607
+ 2
1608
+ s
1609
+ r
1610
+ tt
1611
+ (x,Q
1612
+ 2
1613
+ )�10
1614
+ -5
1615
+ x
1616
+ 10
1617
+ -8
1618
+ 10
1619
+ -7
1620
+ 10
1621
+ -6
1622
+ 10
1623
+ -5
1624
+ 10
1625
+ -4
1626
+ 0
1627
+ 2
1628
+ 4
1629
+ 6
1630
+ 8
1631
+ 10
1632
+ 12
1633
+ Q
1634
+ 2
1635
+ =12G
1636
+ e
1637
+ V
1638
+ 2
1639
+ s
1640
+ r
1641
+ tt
1642
+ (x,Q
1643
+ 2
1644
+ )�10
1645
+ -5
1646
+ x
1647
+ Figure (7): The reduced top quark cross section as a
1648
+ function of x for six different values of Q2 at the LO and
1649
+ NLO approximations.
1650
+ 10
1651
+ -8
1652
+ 10
1653
+ -7
1654
+ 10
1655
+ -6
1656
+ 10
1657
+ -5
1658
+ 10
1659
+ -4
1660
+ 10
1661
+ -3
1662
+ 10
1663
+ -2
1664
+ 10
1665
+ -1
1666
+ 10
1667
+ 0
1668
+ 10
1669
+ -3
1670
+ 10
1671
+ -2
1672
+ 10
1673
+ -1
1674
+ 10
1675
+ 0
1676
+ 10
1677
+ 1
1678
+ 10
1679
+ 2
1680
+ 10
1681
+ 3
1682
+ s
1683
+ r
1684
+ cc
1685
+ (1000G
1686
+ eV
1687
+ 2
1688
+ )
1689
+ s
1690
+ r
1691
+ bb
1692
+ (1000G
1693
+ eV
1694
+ 2
1695
+ )
1696
+ s
1697
+ r
1698
+ tt
1699
+ (1000G
1700
+ eV
1701
+ 2
1702
+ )
1703
+ s
1704
+ r
1705
+ cc
1706
+ (5000G
1707
+ eV
1708
+ 2
1709
+ )
1710
+ s
1711
+ r
1712
+ bb
1713
+ (5000G
1714
+ eV
1715
+ 2
1716
+ )
1717
+ s
1718
+ r
1719
+ tt
1720
+ (5000G
1721
+ eV
1722
+ 2
1723
+ )
1724
+ s
1725
+ r
1726
+ cc
1727
+ (10000G
1728
+ eV
1729
+ 2
1730
+ )
1731
+ s
1732
+ r
1733
+ bb
1734
+ (10000G
1735
+ eV
1736
+ 2
1737
+ )
1738
+ s
1739
+ r
1740
+ tt
1741
+ (10000G
1742
+ eV
1743
+ 2
1744
+ )
1745
+ s
1746
+ r
1747
+ qq
1748
+ (x,Q
1749
+ 2
1750
+ )
1751
+ x
1752
+ Figure (8): A comparison between the reduced cross section
1753
+ of heavy quarks at large values of Q2 at the NLO
1754
+ approximation.
1755
+
1756
+ 11
1757
+ -
1758
+ -
1759
+ -
1760
+ -008
1761
+ Figure (9): The results of the differential cross section of the
1762
+ c, b and t quarks as a function of Q2 at the center-of-mass
1763
+ energies of √s = 319GeV , √s = 1.3T eV and √s = 3.5T eV
1764
+ at the LO and NLO approximations.
1765
+ Figure (10): The results of the differential cross section of
1766
+ the c and b quarks as a function of Q2 at the center-of-mass
1767
+ energy of √s = 319GeV at the LO and NLO approximations
1768
+ compared with ZEUS data [5].
1769
+ Figure (11): The results of the differential cross section of
1770
+ the c and b quarks as a function of x at the center of mass
1771
+ energy of √s = 319GeV at the NLO approximation
1772
+ compared with ZEUS data [5].
1773
+ Table (2): The integrated cross sections of the c, b and
1774
+ t quarks which are integrated over the range Q2 > 150
1775
+ GeV 2 and 0.1 < y < 0.7. Our numerical results for the
1776
+ c and b quark cross sections are compared with the H1
1777
+ [17] and ZEUS [14] data and with the results from
1778
+ H1PDF [48] and MSRT03 [47].
1779
+ √s = 319GeV
1780
+ √s = 1.3TeV
1781
+ √s = 3.5TeV
1782
+ σc¯c (pb)
1783
+ LO
1784
+ 320 ± 7
1785
+ 2147 ± 42
1786
+ 6225 ± 115
1787
+ NLO
1788
+ 332 ± 3
1789
+ 1791 ± 25
1790
+ 4449 ± 71
1791
+ H1
1792
+ 373 ± 39 ± 47
1793
+ − − −
1794
+ − − −
1795
+ H1PDF
1796
+ 455
1797
+ − − −
1798
+ − − −
1799
+ ZEUS
1800
+ 419
1801
+ − − −
1802
+ − − −
1803
+ MRST03 426
1804
+ − − −
1805
+ − − −
1806
+ σb¯b (pb)
1807
+ LO
1808
+ 32.9 ± 1.2
1809
+ 248.4 ± 7.3
1810
+ 751.9 ± 22.9
1811
+ NLO
1812
+ 36.7 ± 1.0
1813
+ 217.2 ± 4.7
1814
+ 560.6 ± 12.9
1815
+ H1
1816
+ 55.4 ± 8.7 ± 12.0 − − −
1817
+ − − −
1818
+ H1PDF
1819
+ 52
1820
+ − − −
1821
+ − − −
1822
+ ZEUS
1823
+ 37
1824
+ − − −
1825
+ − − −
1826
+ MRST03 47
1827
+ − − −
1828
+ − − −
1829
+ σt¯t (fb)
1830
+ LO
1831
+ − − −
1832
+ 4.18 ± 0.56
1833
+ 141.1 ± 11.1
1834
+ NLO
1835
+ − − −
1836
+ 4.78 ± 0.58
1837
+ 143.5 ± 11.5
1838
+
1839
+ 109
1840
+ 108
1841
+ 107
1842
+ 106
1843
+ (qd)xp/op
1844
+ 105
1845
+ 104
1846
+ ZEUS
1847
+ (CC)
1848
+ 103
1849
+ NLO
1850
+ (CC)
1851
+ (bb)
1852
+ 102
1853
+ ZEUS
1854
+ (bb)
1855
+ NLO
1856
+ 101
1857
+ 100
1858
+ 1E-4
1859
+ 0.001
1860
+ 0.01
1861
+ 0.1
1862
+ X104
1863
+ 102
1864
+ LO
1865
+ NLO
1866
+ ZEUS
1867
+ 103
1868
+ 101
1869
+ docc/dQ?(pb/GeV2)
1870
+ dob/dQ2(pb/GeV2)
1871
+ 102
1872
+ 100
1873
+ 101
1874
+ 10-1
1875
+ 100
1876
+ 10-2
1877
+ 10-1
1878
+ 10-2
1879
+ 10-3
1880
+ 101
1881
+ 102
1882
+ 103
1883
+ 101
1884
+ 102
1885
+ 103
1886
+ Q?(GeV2)
1887
+ Q?(GeV2)101
1888
+ 100
1889
+ 10-5
1890
+ (319 GeV)
1891
+ LO
1892
+ NLO
1893
+ (319 GeV)
1894
+ LO
1895
+ (1.3 TeV)
1896
+ 100
1897
+ NLO (1.3 TeV)
1898
+ 10-1
1899
+ 10-6
1900
+ LO
1901
+ (3.5 TeV)
1902
+ NLO (3.5 TeV)
1903
+ 10-1
1904
+ 10-2
1905
+ 10-7
1906
+ dob/dQ2(nb/GeV2)
1907
+ dot/dQ2(nb/GeV2)
1908
+ 10-2
1909
+ 10-3
1910
+ 10-8
1911
+ 10-3
1912
+ 104
1913
+ 10-9
1914
+ 104
1915
+ 10-5
1916
+ 10-10
1917
+ 10-5
1918
+ 106
1919
+ 10-11
1920
+ 10-6
1921
+ 10-7
1922
+ 10-7
1923
+ 10-12
1924
+ 101
1925
+ 102
1926
+ 103
1927
+ 104
1928
+ 101
1929
+ 102
1930
+ 103
1931
+ 104
1932
+ 101
1933
+ 102
1934
+ 103
1935
+ 104
1936
+ 105
1937
+ Q(GeV2)
1938
+ Q?(GeV2)
1939
+ Q?(GeV2)9
1940
+ [1] M.A.G. Aivazis, J.C. Collins, F.I. Olness and W.-K.
1941
+ Tung, Phys. Rev.D 50, 3102 (1994).
1942
+ [2] M. Gluck, E. Hoffmann and E. Reya, Z. Phys. C 13, 119
1943
+ (1982). M. Gluck, R.M. Godbole and E. Reya, Z. Phys.
1944
+ C 38, 441 (1988).
1945
+ [3] E. Laenen, S. Riemersma, J. Smith, and W. L. van Neer-
1946
+ ven, Nucl. Phys. B 392, 162 (1993); B 392, 229 (1993);
1947
+ S. Riemersma, J. Smith, and W. L. van Neerven, Phys.
1948
+ Lett. B 347, 143 (1995).
1949
+ [4] F. D. Aaron et al. (H1 Collaboration), Eur. Phys. J. C
1950
+ 65, 89 (2010).
1951
+ [5] H. Abramowicz et al. (ZEUS Collaboration), JHEP 09,
1952
+ 127 (2014).
1953
+ [6] H. Abramowicz et al. (H1 and ZEUS Collaboration), Eur.
1954
+ Phys. J. C 78, 473 (2018).
1955
+ [7] H. Abramowicz et al. (H1 and ZEUS Collaboration),
1956
+ DESY-12-172, arXiv:1211.1182v2[hep-ex] (2012).
1957
+ [8] H. Abramowicz et al. (ZEUS Collaboration), Eur. Phys.
1958
+ J. C 69, 347 (2010).
1959
+ [9] C. Adloff et al. [H1 Collaboration], Z. Phys. C 72, 593
1960
+ (1996) [hep-ex/9607012].
1961
+ [10] J. Breitweg et al. [ZEUS Collab- oration], Phys. Lett. B
1962
+ 407, 402 (1997) [hep-ex/9706009].
1963
+ [11] C. Adloff et al. [H1 Collaboration], Nucl. Phys. B 545,21
1964
+ (1999) [hep-ex/9812023];
1965
+ [12] J. Breitweg et al. [ZEUS Collab- oration], Eur. Phys. J.
1966
+ C 12, 35 (2000) [hep-ex/9908012].
1967
+ [13] C. Adloff et al. [H1 Collaboration], Phys. Lett. B 528,
1968
+ 199 (2002) [hep-ex/0108039].
1969
+ [14] S. Chekanov et al. [ZEUS Collaboration], Phys. Lett. B
1970
+ 599, 173 (2004).
1971
+ [15] C. Adloff et al. [H1 Collaboration], Phys. Lett. B 467,
1972
+ 156 (1999).
1973
+ [16] J. Breitweg et al. [ZEUS Collaboration], Eur. Phys. J. C
1974
+ 18, 625 (2001); S. Chekanov et al. [ZEUS Collaboration],
1975
+ Phys. Rev. D 70, 012008 (2004).
1976
+ [17] A. Aktas et al. [H1 Collaboration], Eur. Phys. J. C 40,
1977
+ 349 (2005); 45, 23 (2006).
1978
+ [18] LHeC Collaboration and FCC-he Study Group, P. Agos-
1979
+ tini et al., J. Phys. G: Nucl. Part. Phys. 48, 110501(2021).
1980
+ [19] M. Klein, arXiv: 1802.04317[hep-ph] (2018).
1981
+ [20] M. Klein, Ann. Phys. 528, 138 (2016).
1982
+ [21] N. Armesto et al., Phys. Rev. D 100, 074022 (2019).
1983
+ [22] J. Abelleira Fernandez et al. (LHeC Collaboration), J.
1984
+ Phys. G 39, 075001 (2012).
1985
+ [23] A. Abada et al. (FCC Collaboration), Eur. Phys. J. C
1986
+ 79, 474 (2019).
1987
+ [24] R. Thorne, “A Variable Flavour Number Scheme at
1988
+ NNLO,” To appear in the proceed- ings of 13th Interna-
1989
+ tional Workshop on Deep Inelastic Scattering (DIS 2005),
1990
+ Madison, Wisconsin, USA, April 2005. [hep-ph/0506251].
1991
+ [25] M. Hansson and H. Jung,
1992
+ “Status of CCFM: Un-
1993
+ integrated gluon densities,” Proceedings of 11th Interna-
1994
+ tional Workshop on Deep Inelastic Scattering (DIS 2003),
1995
+ St. Petersburg, Russia, April 2003, p 488. Edited by V.T.
1996
+ Kim and L.N. Lipatov. [hep-ph/0309009].
1997
+ [26] M. Ciafaloni, Nucl. Phys. B 296 (1988) 49; S. Catani, F.
1998
+ Fiorani and G. Marchesini, Phys. Lett. B 234 (1990) 339;
1999
+ S. Catani, F. Fiorani and G. Marchesini, Nucl. Phys. B
2000
+ 336 (1990) 18; G. Marchesini, Nucl. Phys. B 445 (1995)
2001
+ 49.
2002
+ [27] N.N. Nikolaev, V.R. Zoller, Phys. At. Nucl. 73 (2010)
2003
+ 672; N.N. Nikolaev, V.R. Zoller, Phys. Lett. B 509 (2001)
2004
+ 283; N.N. Nikolaev, V.R. Zoller, Phys. At. Nucl. 73
2005
+ (2010) 672; R. Fiore, N.N. Nikolaev, V.R. Zoller, JETP
2006
+ Lett. 90 (2009) 319.
2007
+ [28] A.V. Kotikov, A.V. Lipatov, G. Parente, N.P. Zotov, Eur.
2008
+ Phys. J. C 26, 51 (2002).
2009
+ [29] N.Ya. Ivanov, B.A. Kniehl, Eur. Phys. J. C 59, 647
2010
+ (2009); N.Ya. Ivanov, Nucl. Phys. B 814, 142 (2009);
2011
+ [30] I.P. Ivanov, N. Nikolaev, Phys. Rev. D 65, 054004 (2002).
2012
+ [31] G.R. Boroun, B. Rezaei, JETP 115 (7),427 (2012); G.R.
2013
+ Boroun, B. Rezaei, Nucl. Phys. B 857, 143 (2012); G. R.
2014
+ Boroun, Chin. Phys. C 41, 013104 (2017); G. R. Boroun,
2015
+ Phys. Lett. B 741, 197 (2015).
2016
+ [32] S. Zarrin, and S. Dadfar, Phys. Rev. D 106, 094007
2017
+ (2022).
2018
+ [33] G.R. Boroun, Phys. Lett. B 741, 197 (2015).
2019
+ [34] G.R. Boroun, Phys. Lett. B 744, 145 (2015).
2020
+ [35] A.Y. Illarionov, B.A. Kniehl, and A.V Kotikov, Phys.
2021
+ Lett. B 663, 66 (2008).
2022
+ [36] H.
2023
+ Sun,
2024
+ POS(DIS2018)186;
2025
+ H.
2026
+ Sun,
2027
+ arXiv[hep-
2028
+ ph]:1710.06260(2017).
2029
+ [37] Z. Zhang, arXiv[hep-ex]: 1511.05399 (2015).
2030
+ [38] M. Buza, Y. Matiounine, J. Smith, R. Migneron, and W.
2031
+ L. Van Neerven, Nucl. Phys. B472, 611 (1996).
2032
+ [39] C. Adloff et al. (H1 Collaboration), Z. Phys. C 72, 593
2033
+ (1996);
2034
+ [40] S. Aid et al. (H1Collaboration), Z. Phys. C 72, 573
2035
+ (1996).
2036
+ [41] J. Breitweg et al. (ZEUS Collaboration), Eur. Phys. J. C
2037
+ 12, 35 (2000).
2038
+ [42] S. Chekanov et al. (ZEUS Collaboration), Phys. Rev. D
2039
+ 69, 012004 (2004).
2040
+ [43] S. Chekanov et al. (ZEUS Collaboration)JHEP. 07, 074
2041
+ (2007).
2042
+ [44] LHeC Study group, Report No. CERN-OPEN-2012-015;
2043
+ Report No. LHeC-Note-2012-005 GEN.
2044
+ [45] P. Newman, Nucl. Phys. B, Proc. Suppl. 191, 307 (2009);
2045
+ S. J. Brodsky, arXiv:1106.5820; A. Cooper-Sarkar, arXiv:
2046
+ 1310.0662.
2047
+ [46] A. D. Martin, W. J. Stirling, R. S. Thorne, and G. Watt,
2048
+ Eur. Phys. J. C 63, 189 (2009).
2049
+ [47] A.D.Martin,
2050
+ R.G.
2051
+ Roberts,W.J.
2052
+ Stirling
2053
+ and
2054
+ R.S.
2055
+ Thorne, Eur. Phys. J. C 35, 325 (2004) [hep-ph/0308087].
2056
+ [48] C. Adloff et al. [H1 Collaboration], Eur. Phys. J C 30,1
2057
+ (2003) [hep-ex/0304003].
2058
+ [49] M.M. Block, L. Durand, P. Ha, and D.W. McKay, Eur.
2059
+ Phys. J. C 69, 425 (2010).
2060
+ [50] S. Zarrin, S. Dadfar, Phys. Rev. D 105, 094037 (2022).
2061
+ [51] S. Dadfar, S. Zarrin, Eur. Phys. J. C 80, 1 (2020).
2062
+ [52] V. N. Gribov and L. N. Lipatov, Yad. Fiz. 15, 781 (1972)
2063
+ [Sov. J. Nucl. Phys. 15, 438 (1972)]; Yad. Fiz. 15, 1218
2064
+ (1972) [Sov. J. Nucl. Phys. 15, 675 (1972)]; L. N. Lipa-
2065
+ tov, Yad. Fiz. 20, 181 (1974) [Sov. J. Nucl. Phys. 20, 94
2066
+ (1975)]; Y. L. Dokshitzer, Zh. Eksp. Teor. Fiz. 73, 1216
2067
+ (1977) [Sov. Phys. JETP 46, 641 (1977)].
2068
+ [53] M.M. Block, L. Durand, P. Ha, and D.W. McKay, Phys.
2069
+ Rev. D 83, 054009 (2011).
2070
+ [54] H. Khanpour, A. Mirjalili, and S. A. Tehrani, Phys. Rev.
2071
+ C 95, 035201 (2017).
2072
+ [55] M.M. Block, Eur. Phys. J. C 68, 683 (2010).
2073
+
2074
+ 10
2075
+ [56] A. Abulencia, D. Acosta, J. Adelman, T. Affolder, T.
2076
+ Akimoto, M. G. Albrow, D. Ambrose et al., Phys. Rev.
2077
+ D 73, 032003 (2006).
2078
+ [57] H.L. Lai et al. [CTEQ Collaboration], Eur. Phys. J. C
2079
+ 12, 375 (2000).
2080
+
X9AyT4oBgHgl3EQf9foH/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
XNE2T4oBgHgl3EQfYgch/content/tmp_files/2301.03854v1.pdf.txt ADDED
@@ -0,0 +1,871 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Frascati Physics Series Vol. 74 (2022)
2
+ ISBN: 978-88-86409-76-6
3
+ Frontier Objects in Astrophysics and Particle Physics
4
+ September 25- October 1, 2022
5
+ CONSTRAINTS ON DARK MATTER FROM REIONIZATION
6
+ Marco Castellano
7
+ INAF - Osservatorio Astronomico di Roma,
8
+ via di Frascati 33, 00078 Monte Porzio Catone (RM), Italy
9
+ Nicola Menci
10
+ INAF - Osservatorio Astronomico di Roma,
11
+ via di Frascati 33, 00078 Monte Porzio Catone (RM), Italy
12
+ Massimiliano Romanello
13
+ INAF - Osservatorio Astronomico di Roma,
14
+ via di Frascati 33, 00078 Monte Porzio Catone (RM), Italy;
15
+ Dipartimento di Fisica e Astronomia - Alma Mater Studiorum Universit`a di Bologna,
16
+ via Piero Gobetti 93/2, I-40129 Bologna, Italy;
17
+ INAF - Osservatorio di Astrofisica e Scienza dello Spazio di Bologna,
18
+ via Piero Gobetti 93/3, I-40129 Bologna, Italy
19
+ Abstract
20
+ This conference proceedings paper provides a short summary of the constraints pre-
21
+ sented in Menci et al. 2016, 2017 [1, 2] on the mass of thermal WDM candidates,
22
+ and of the results presented in Romanello et al. 2021 [3] on how Reionization sce-
23
+ narios are affected by early galaxy formation in WDM cosmologies. The abundance
24
+ of galaxies in the epoch of reionization (z >6) is dependent on fundamental cosmo-
25
+ logical parameters, most importantly on the properties of dark matter, such that it can
26
+ be used as a powerful cosmological probe. Here we show how the number density of
27
+ primordial galaxies allows to constrain the mass of thermal WDM candidates, and the
28
+ constraints that will be made possible by future JWST observations. We then inves-
29
+ tigate how the Reionization process is affected by early galaxy formation in different
30
+ cosmological scenarios. We use a semi-analytic model with suppressed initial power
31
+ spectra to obtain the UV Luminosity Function in thermal Warm Dark Matter and ster-
32
+ ile neutrino cosmologies. For each cosmology, we find an upper limit to fixed fesc,
33
+ which guarantees the completion of the process at z < 6.7.
34
+ arXiv:2301.03854v1 [astro-ph.CO] 10 Jan 2023
35
+
36
+ 1
37
+ Introduction
38
+ The Epoch of Reionization (EoR) marked a fundamental phase transition in the history
39
+ of the Universe, during which the Intergalactic Medium (IGM) became transparent to
40
+ UV photons. The most recent observations indicate a late-Reionization scenario [4–
41
+ 6], with the end of the EoR at z ≈ 6, but the exact contribution from different ionizing
42
+ sources and the exact timeline and topology of Reionization are still unknown.
43
+ From a theoretical point-of-view, cosmic Reionization depends on non-linear
44
+ and non-local phenomena, in which the physics of galaxy formation couples with the
45
+ physics of gravity and radiation transport. The first process is determined by both
46
+ baryonic physics and poorly known feedback effects, but also by the initial power
47
+ spectrum of density fluctuations: in fact, dark matter produces the potential wells in
48
+ which baryonic perturbation undergo an accelerated growth. Therefore, the study of
49
+ Reionization is strongly related to the comprehension of cosmological framework in
50
+ which cosmic structures form and grow.
51
+ The currently most acknowledged cosmological model is the ΛCDM model. It
52
+ is based on the contribution of the cosmological constant Λ (≈69%) and Cold Dark
53
+ Matter (≈26%) and provides a coherent large-scale description of the Universe with
54
+ respect to the available data. The ΛCDM model postulates the existence of Dark
55
+ Matter in a “cold” version, i.e., composed by Weakly Interacting Massive Particles
56
+ (WIMPs) with mX > 0.1 GeV or condensates of light axions, with mX ≈ 10−5–10−1
57
+ eV.
58
+ However, there are some possible tensions related to observations at galactic and
59
+ sub-galactic scales, of the order of kpc. Furthermore, the lack of detection of CDM
60
+ candidates has suggested the possibility to investigate on alternative cosmological sce-
61
+ narios, based on the existence of Warm Dark Matter particles, with mass of the order
62
+ of keV. While in the ΛCDM model, due to the high mass particles, all the cosmolog-
63
+ ical density perturbations can become gravitationally unstable, in a WDM scenario,
64
+ depending on the value of mX, only perturbations above the kpc scale can collapse,
65
+ producing shallower density profiles and a smaller number of low-mass halos. This,
66
+ in the context of the hierarchical growth of the cosmic structures, implies a reduction
67
+ in the number of faint galaxies and a delay in their formation [1, 7].
68
+ In WDM cosmologies, the simplest approach is to consider particles that behave
69
+ as “thermal relics”, resulting from the freeze-out of DM species initially in thermal
70
+ equilibrium with the early Universe, e.g. [8, 9].
71
+ A possible alternative is offered by sterile neutrinos (SN) or right-handed neutri-
72
+
73
+ nos, which are particles predicted in the context of Standard Model extensions. Since
74
+ they are produced out-of-equilibrium, from the oscillations of active neutrinos, they
75
+ are characterized by a non-thermal power spectrum, which depends both on mass and
76
+ on sin(2θ), where θ is the mixing angle [10].
77
+ In the present paper we first summarise the results presented in Menci et al.
78
+ 2016,2017 [1, 2] where stringent constraints on DM models with suppressed power
79
+ spectra by have been derived by comparing the maximum number density of DM
80
+ halos φ expected at redshift z = 6 to the observed number density φobs of galaxies at
81
+ the same redshift in the HFF. We then summarise the results presented in Romanello
82
+ et al. 2021 [3] on how Reionization scenarios are affected by early galaxy formation in
83
+ WDM cosmologies. We have used the theoretical model by Menci et al. (2018) [11],
84
+ where the collapse history of dark matter halos is modelled through the Extended
85
+ Press-Schechter (EPS) formalism and baryonic processes taking place in each halo
86
+ are included through physically motivated analytical recipes.
87
+ 2
88
+ Method
89
+ 2.1
90
+ Warm Dark Matter thermal relics
91
+ The simplest alternative to CDM is provided by Warm Dark Matter models assuming
92
+ DM to be the result from the freeze-out of particles with mass in the keV range ini-
93
+ tially in thermal equilibrium in the early Universe. In these models, the population of
94
+ low-mass galaxies is characterized by lower abundances and shallower central density
95
+ profiles compared to Cold Dark Matter (CDM) due to the dissipation of small-scale
96
+ density perturbations produced by the free-streaming of the lighter and faster DM par-
97
+ ticles. In this case, the mass of the DM particle completely determines the suppression
98
+ of the density power spectrum compared to the CDM case
99
+ The computation of the halo mass function for the WDM scenario is based on
100
+ the standard procedure described and tested against N-body simulations. The differ-
101
+ ential halo mass function (per unit log M) based on the extended Press & Schechter
102
+ approach [e.g. 12] reads:
103
+ d φ
104
+ d logM = 1
105
+ 6
106
+ ρ
107
+ M f(ν) d log σ2
108
+ d logr .
109
+ (1)
110
+ Here ν ≡ δ2
111
+ c(t)/σ2 depends on the linearly extrapolated density for collapse in the
112
+ spherical model δc = 1.686/D(t) and D(t) is the growth factor of DM perturbations.
113
+ A spherical collapse model for which f(ν) = √2ν/π exp(−ν/2) is assumed.
114
+
115
+ The key quantity entering Eq. 1 is the variance of the linear power spectrum
116
+ P(k) of DM perturbations (in terms of the wave-number k = 2π/r). Its dependence on
117
+ the spatial scale r of perturbations is:
118
+ d log σ2
119
+ d log r = −
120
+ 1
121
+ 2 π2 σ2(r)
122
+ P(1/r)
123
+ r3
124
+ .
125
+ (2)
126
+ In WDM scenarios the spectrum PWDM is suppressed with respect to the CDM
127
+ case PCDM below a characteristic scale depending on the mass mX of the WDM
128
+ particles. In the case of relic thermalized particles, the suppression factor can be
129
+ parametrized as in Bode et al. 2001 [13]:
130
+ TWDM(k) = PWDM(k)
131
+ PCDM(k) =
132
+
133
+ 1 + (α k)2 µ�−10/µ .
134
+ (3)
135
+ where µ = 1.12 and the quantity α is linked to the WDM free-streaming scale:
136
+ α = 0.049
137
+ � ΩX
138
+ 0.25
139
+ �0.11 � mX
140
+ keV
141
+ �−1.11 � h
142
+ 0.7
143
+ �1.22 h−1
144
+ Mpc,
145
+ (4)
146
+ where mX is the WDM particle mass, ΩX is the WDM density parameter (ΩX) and h
147
+ the Hubble constant in units of 100 km/s/Mpc.
148
+ The mass function is computed through Eq. 1 after substituting Eq. 2, with a
149
+ power spectrum P(k) = PWDM(k) determined by the WDM particle mass mX after Eqs.
150
+ 3 and 4. A half-mode wavenumber is defined, as the khm at which the transfer function
151
+ TWDM(k) is equal to 1/2 [13, 14]. Correspondingly, a half-mode mass Mhm can also
152
+ be defined:
153
+ Mhm = 4π
154
+ 3 ρm
155
+
156
+ πϵ(2µ/5 − 1)−1/2µ�3 .
157
+ (5)
158
+ 2.2
159
+ Semi-Analytic Model
160
+ To investigate the interplay between WDM scenarios and reionization history, we use
161
+ the semi-analytic model developed by Menci et al. (2018), to which we refer for fur-
162
+ ther informations [11]. The model retraces the collapse of dark matter halos through a
163
+ Monte Carlo procedure on the basis of the merging history given by EPS formalism,
164
+ at 0 < z < 10 [11]. In this framework, the DM structures formation is determined by
165
+ the power spectrum: the WDM P(k) is computed by the suppression of the CDM one,
166
+ due to the particles free streaming at kpc scale, as described in the previous section.
167
+ Conversely, for sterile neutrino based cosmological scenarios, we refer to Mhm
168
+ from Lovell et al. (2020), obtained comparing CDM and WDM simulations performed
169
+
170
+ within the same cosmic volume and in which the parameterization of the WDM halo
171
+ mass function is given by Rfit [15]:
172
+ Rfit = nWDM
173
+ nCDM
174
+ =
175
+ ������1 +
176
+
177
+ α Mhm
178
+ Mhalo
179
+ ������
180
+ γ
181
+ ,
182
+ (6)
183
+ where nCDM and nWDM are the differential halo mass functions and Mhalo is the halo-
184
+ mass. The numerical value of α, β and γ coefficients changes if we consider central
185
+ (α = 2.3, β = 0.8, γ = −1.0) or satellite halos (α = 4.2, β = 2.5, γ = −0.2) [15].
186
+ We perform our analysis with five different sterile neutrino models, with a mass
187
+ of 7.0 keV, labelled according to the lepton asymmetry number (L6), which is indicated
188
+ in the last part of the name. For example, L6 = 120 is named LA120, L6 = 8 is
189
+ named LA8 and so on. Among them, the models LA9, LA10 and LA11 are based on
190
+ decaying-particles that are compatible with the X-ray 3.55 keV emission line observed
191
+ in galaxy clusters [15].
192
+ The semi-analytic model associates a galactic luminosity to each halo, depend-
193
+ ing on cooling process and merging history. The gas in the halo, initially set to have a
194
+ density given by the universal baryon fraction and to be at the virial temperature, cools
195
+ due to atomic processes and settles into a rotationally supported disk. Then, the cooled
196
+ gas is gradually converted into stars, with a SFR given by:
197
+ ˙M∗ = Mgas
198
+ τ∗ , according to
199
+ the Schmidt-Kennicut law with a gas conversion time scale τ∗ = qτd, proportional
200
+ to the dynamical time scale τd through the free parameter q [11]. Moreover, galaxy
201
+ interactions occurring in the same host halo may induce the sudden conversion of a
202
+ fraction f of cold gas into stars on a short time-scale given by the duration of the in-
203
+ teraction [11]. Feedback phenomena due to supernovae, AGNs and photoionization
204
+ are also included, as described by Menci et al. (2018) [11]. Finally, the luminosity
205
+ produced by the stellar populations is computed by assuming a Salpeter IMF [11]. In
206
+ our analysis, we integrate the rest-frame UV (∼1400 Å) dust-corrected LF between
207
+ the limits Mlim
208
+ UV = [−25, −12], in order to obtain the corresponding luminosity density:
209
+ ρUV =
210
+ � Mlim
211
+ UV
212
+ dMUV
213
+ dN
214
+ dMUV
215
+ RfitLUV,
216
+ (7)
217
+ which is dominated by the contribution of systems with MUV ≥ −20 (see Section 3.2).
218
+ The number density of UV photons that actively participate to hydrogen ioniza-
219
+ tion process is obtained by multiplying for two quantities [16]:
220
+ ˙Nion = fescξionρUV.
221
+ (8)
222
+
223
+ The ionizing photon production efficiency (ξion) is expressed in Hz/erg units and
224
+ it describes how efficiently is possible to get UV ionizing photons from an UV con-
225
+ tinuum radiation field. Finally, the escape fraction fesc converts the intrinsic ionizing
226
+ emissivity ˙Nion,intrinsic = ξionρUV into an effective one. It is defined as the fraction of
227
+ ionizing photons that can escape from the source galaxy instead of being reabsorbed
228
+ inside it and which therefore actively participates in the ionization of the IGM.
229
+ In our study, we model the Reionization history with different values of fesc.
230
+ Fixed escape fraction is useful to broadly characterize the Reionization history, al-
231
+ though a universal value for fesc is highly unrealistic.
232
+ Nevertheless, the investigation of the degenerate quantities fescξion, which drive
233
+ the Reionization process, can yield to interesting upper limits to the escape fraction.
234
+ Once obtained ˙Nion, the equation that accounts for ionization and recombination,
235
+ which regulates the evolution of the hydrogen filling fraction QHII is:
236
+ ˙QHII =
237
+ ˙Nion
238
+ ¯nH
239
+ − QHII
240
+ trec
241
+ ,
242
+ (9)
243
+ where the comoving hydrogen mean density is computed as ¯nH ≈ 2×10−7(Ωbh2/0.022)
244
+ cm−3 and the recombination time-scale is trec ≈ 3.2 Gyr [(1 + z)/7]−3C−1
245
+ HII [17]. We
246
+ consider case B of recombination, in which electrons fallen to the ground level gen-
247
+ erate ionizing photons that are re-absorbed by the optically thick IGM, having no
248
+ consequences on the overall ionization balance. We treat the evolution of the clump-
249
+ ing factor CHII with redshift, due to the effect of UVB generated by Reionization,
250
+ according to, e.g., Haardt et al. 2012 [18]:
251
+ CHII = 1 + 43z−1.71.
252
+ (10)
253
+ After the reconstruction of the Reionization history, we use the redshift evolu-
254
+ tion of the filling fraction to compute the integral:
255
+ τes(z) = cσT ¯nH
256
+ � z
257
+ 0
258
+ QHII(z′)(1 + z′)2 �
259
+ 1 + ηY
260
+ 4X
261
+
262
+ H−1(z′)dz′,
263
+ (11)
264
+ in which helium is singly-ionized (η = 1) at z > 4 and doubly-ionized (η = 2) at z < 4.
265
+ Then, the electron scattering optical depth has been compared with observational con-
266
+ straints on τes obtained, from CMB anisotropy, by Planck and WMAP.
267
+
268
+ Figure 1: Adapted from Menci et al. 2016 [1]: the cumulative mass functions com-
269
+ puted at z = 6 for different values of the WDM particle mass mX from 1 to 3 keV
270
+ (bottom to top). The shaded areas correspond to the observed number density of HFF
271
+ galaxies within 1-σ, 2-σ, and 3-σ confidence levels.
272
+ 3
273
+ Results
274
+ 3.1
275
+ Constraints on thermal WDM from the abundance of high-redshift galaxies
276
+ We compare the halo number densities in WDM cosmologies to the observed number
277
+ density φobs of galaxies derived by integrating the galaxy luminosity function (LF) at
278
+ z = 6 by [19] down to the faintest bin MUV = −12.5. Constraints on DM models are
279
+ simply put by requiring that observed galaxies cannot outnumber their host DM halos
280
+ (φ ≥ φobs). The reference luminosity function has been estimated from objects in the
281
+ Abell 2744 and MACS 0416 cluster fields, selected on the basis of their photometric
282
+ redshift.
283
+ In Fig. 1 we show the cumulative mass function φ(> M) at z = 6 for different
284
+ assumed WDM particle masses. All the mass functions saturate to a maximum number
285
+ density φmX ≈ φ(Mhm). This is compared with the observed number density φobs of
286
+ galaxies with MUV ≤ −12.5. The condition φobs ≤ φmX yields mX ≳ 2.9 keV at 1-
287
+ σ level, mX ≥ 2.4 keV at 2-σ level, and mX ≥ 2.1 keV at 3-σ level. In Fig. 2 we
288
+
289
+ Figure 2: Constraints on the abundance of dark-matter halos derived from the galaxy
290
+ LF at different redshifts (black arrows). The corresponding limits on the mass of
291
+ WDM thermal relics are shown as colored contours. JWST measurements reaching
292
+ z > 9 lensed galaxies down to MUV ≤ −12.5 (red arrows) can significantly strengthen
293
+ currents constraints if no cut-off of the LF will be found.
294
+ show the constraints on the thermal relic WDM particle mass from the abundance
295
+ of galaxies in available observations at z < 7, including the quoted constraint from
296
+ the HFF observations at z ∼ 6, compared to what could be achieved by hypothetical
297
+ JWST observations of strongly lensed galaxies at z > 9 (red arrows). We derive the
298
+ estimate by extrapolating to MUV ≤ −12.5 the UV LF at z = 9 − 16 recently published
299
+ by Harikane et al. 2022 [20]. If JWST will confirm a steep faint-end of the UV LF
300
+ at extremely high-redshifts, thermal relic particles with masses mX < 5 keV will be
301
+ ruled out by galaxy abundance measurements alone.
302
+ 3.2
303
+ The reionization history in WDM scenarios
304
+ Here we investigate the unfolding of the reionization epoch in WDM cosmologies,
305
+ summarising the cited work by Romanello et al. 2021 [3].
306
+
307
+ Relic Particle Mass (keV)
308
+ 0.30
309
+ 1.00
310
+ 2.00
311
+ 4.00
312
+ 6.00
313
+ 8.00
314
+ 10.00
315
+ 3
316
+ log Φ/Mpc
317
+ -2
318
+ 3
319
+ 5
320
+ 10
321
+ 15
322
+ ZFigure 3: Adapted from Romanello et al. 2021 [3]. The multiple panels show the inte-
323
+ grated photons ratio rphot(< MUV
324
+ lim ), where ˙Nion,tot is computed by integrating Equation
325
+ (7) between intrinsic Msup
326
+ UV = −12 and Minf
327
+ UV = −25. We compare with CDM two ther-
328
+ mal WDM cosmologies (WDM3 is an intermediate case between WDM4 and WDM2),
329
+ and three sterile neutrino cosmologies (here LA10 is the only representative scenario
330
+ for radiatively decay Dark Matter, which is compatible with the 3.5 keV emission line
331
+ observed in galaxy clusters).
332
+ In Figure 3 we plot the integrated ionizing photons ratio:
333
+ rphot(< MUV
334
+ lim ) =
335
+ ˙Nion(MUV < Mlim
336
+ UV)
337
+ ˙Nion,tot
338
+ (12)
339
+ in which we compute ˙Nion,tot, using Equation (7) between intrinsic Msup
340
+ UV = −12 and
341
+ Min f
342
+ UV = −25, while the numerator is obtained by varying the upper limit of the integral
343
+ from −24 to −12, including so the photons from progressively dimmer sources, until
344
+ the unity is reached.
345
+ From Figure 3 we can identify two important features, through which we can
346
+ understand the role and the different contribution of faint and bright galaxies during
347
+ EoR. The first is the increasing of the relative contribution of the brightest systems
348
+
349
+ 1.0
350
+ LA8
351
+ CDM
352
+ LA10
353
+ CDM
354
+ Muv<-24
355
+ CDM
356
+ Muv<-22
357
+ Muv<-24
358
+ Muv<-24
359
+ 0.8
360
+ Muv<-20
361
+ Muv<-22
362
+ Muv<=22
363
+ >
364
+ Muv<-18
365
+ Muv<-20
366
+ Muv<-18
367
+ Muv<-18
368
+ Muv<-16
369
+ Muv<-14
370
+ Muv<-16
371
+ Muv<-16
372
+ 0.6
373
+ Muv<-12
374
+ Muv<-14
375
+ Muv<-14
376
+ Muv<-12
377
+ Muv<-12
378
+ 0.4
379
+ 0.2
380
+ 0.0
381
+ 1.0
382
+ LA120
383
+ WDM4
384
+ WDM2
385
+ CDM
386
+ CDM
387
+ CDM
388
+ Muv<-24
389
+ Muv<-24
390
+ Muv<-24
391
+ 0.8
392
+ Muv<-22
393
+ Muv<-22
394
+ Muv<=22
395
+ Muv<-20
396
+ Muv<-20
397
+ >
398
+ Muv<-18
399
+ Muv<-18
400
+ Muv<-18
401
+ Muv<-16
402
+ Muv<-16
403
+ Muv<-16
404
+ 0.6
405
+ Muv<-14
406
+ Muv<-14
407
+ Muv<-14
408
+ Muv<-12
409
+ Muv<-12
410
+ Muv<-12
411
+ 0.4
412
+ 0.2
413
+ 0.0
414
+ 6
415
+ 7
416
+ 6
417
+ 7
418
+ 6
419
+ 7
420
+ 5
421
+ 5
422
+ 8
423
+ 5
424
+ redshiftFigure 4: Adapted from Romanello et al. 2021 [3]. The product ξion fesc required to
425
+ ionize the IGM at z = 6.7, for a set of different cosmologies. The dot size increases
426
+ with Mhm; lighter colours refer to initial condition QHII(z = 10) = 0.2, while darker
427
+ colours are for QHII(z = 9) = 0.0.
428
+ (respectively with intrinsic Msup
429
+ UV < −24, Msup
430
+ UV < −22 and Msup
431
+ UV < −20) with the age
432
+ of universe. In the ΛCDM model, rphot(< −22) passes from 2.8% at z = 8, to 10%
433
+ at z = 6.3. In parallel, for Msup
434
+ UV = −20 we have a raise from 31% at z = 8 to 44% at
435
+ z = 6.3. We can interpret this trend in the light of the hierarchical growth of cosmic
436
+ structures: merging phenomena between galaxies give origin to more massive and
437
+ brighter structures, increasing their overall contribution. However, the role of faint
438
+ galaxies in the Reionization process is still predominant.
439
+ The second issue to be highlighted derives from a comparison between differ-
440
+ ent cosmological scenarios, which reveals that WDM models present a relative ˙Nion
441
+ higher than the CDM ones. Again, the reason resides in the effect of free-streaming,
442
+ which determines a suppression in the number density of the faint-galaxies and so a
443
+ decreasing in their relative contribution for each Msup
444
+ UV . The difference between cos-
445
+ mologies is summarized in the half-mode mass and is not negligible: if we compare
446
+ CDM with LA8 and WDM4, at z = 8 it values ≈ 1–2% , respectively for Msup
447
+ UV = −20
448
+ and −18, but it increases to 8−10% for WDM2 and LA120. Finally, we noted that the
449
+ continue (WDM) and the dashed (CDM) lines in Figure 3 approach each other with
450
+
451
+ 24.25
452
+ 24.20
453
+ 24.15
454
+ 24.10
455
+ 24.05
456
+ 24.00
457
+ 23.95
458
+ WDM2
459
+ WDM3
460
+ WDM4time; for example, at z = 5 the differences between CDM and WDM2-LA120 reduce
461
+ respectively to 4–6%. Again, we can interpret this result by looking at the evolution
462
+ of the UV LFs with z.
463
+ The current analysis is based on intrinsic UV luminosity and it is independent
464
+ from the dust extinction, which is summarized in the escape fraction value: in fact
465
+ fesc appears only as a multiplicative constant, so it simplifies in the ratio between
466
+ ˙Nion. Conversely, if we consider other escape fraction dependencies, we could expect
467
+ a more various behaviour.
468
+ 3.2.1
469
+ Implications on fesc
470
+ The evolution of the filling fraction with cosmic time depends also on the initial con-
471
+ dition for Equation (9). In particular, we choose two extreme possibilities, which are
472
+ motivated both with model available in literature and with an observational point of
473
+ view.
474
+ The first has QHII(z = 10) = 0.2.
475
+ This assumption agrees with the 68%
476
+ credibility interval modelled on the marginalized distribution of the neutral fraction
477
+ (1 − QHII), from the SFR histories and the Planck constraints on τes, from Robertson
478
+ et al. (2015) [26]. Similarly, it is coherent with the range of QHII allowed for the
479
+ model by Bouwens et al. (2015), where Reionization is complete between z = 5.9 and
480
+ z = 6.5 [27]. As a second possibility, we choose QHII(z = 9) = 0.0, which is preferred
481
+ by the two hydrogen neutral fraction measurements performed by Mason et al. (2019)
482
+ and Hoag et al. (2018)[4, 5]. All the others are intermediate cases.
483
+ For each of the two initial conditions we compute the number density of ion-
484
+ izing photons ˙Nion with different combinations of ξion fesc, exploring the effect of the
485
+ parameters degeneracy on the reheating of IGM. Particles free-streaming has conse-
486
+ quences on galaxy formation, determining a lack of faint-galaxies which alters the UV
487
+ LF, with a general reduction in the UV luminosity density in models with a high Mhm.
488
+ Thus, we obtain a delay in the IGM ionizing process, with respect to CDM.
489
+ In Figure 4, we show log(ξion fesc) in CDM, sterile neutrinos and thermal WDM
490
+ cosmologies. Due to the great uncertainty on fesc, we searched for the ξion fesc values
491
+ that ensure the completion of Reionization at z = 6.7. We note that log(ξion fesc) in-
492
+ creases with Mhm: a larger escape fraction and/or UV photons production efficiency
493
+ are needed to complete the Reionization process in WDM scenarios. However, the
494
+ quantity ξion is better constrained than fesc, so we assume from the literature a fidu-
495
+ cial value of log(ξion/(erg−1Hz)) = 25.2 [16, 27], as expected from a low metallicity
496
+
497
+ Figure 5: Adapted from Romanello et al. 2021 [3]. Left: evolution of the filling frac-
498
+ tion QHII, for sterile neutrino and thermal WDM models, with log(ξion/(erg−1Hz)) =
499
+ 25.2. The two upper panels have initial condition QHII(z = 10) = 0.2 and fesc = 0.05.
500
+ The two lower panels are plotted with QHII(z = 9) = 0.0 and fesc = 0.06. The cyan
501
+ shaded region indicates our fiducial late-Reionization redshift interval, 5.8 < z < 6.7.
502
+ The upward triangle labelled Lyα LF includes results by Konno et al. (2014), Konno
503
+ et al. (2017) and Zheng et al. (2017) [21–23]. Right: electron scattering optical
504
+ depth for different models, compared with measurements from Planck and WMAP [6,
505
+ 24, 25].
506
+
507
+ 1.0
508
+ 0.10
509
+ CDM
510
+ LA8
511
+ LA9
512
+ 0.8
513
+ 0.08
514
+ LA10
515
+ CDM
516
+ LA11
517
+ _A8
518
+ LA120
519
+ A9
520
+ 0.6
521
+ 0.06
522
+ WMAP Year 9
523
+ A10
524
+ Planck 2015
525
+ A11
526
+ Planck 2018
527
+ A120
528
+ 0.04
529
+ 0.4
530
+ Mason19
531
+ Q
532
+ Mason18
533
+ *
534
+ Hoag19
535
+ 0.02
536
+ Mesinger15
537
+ 0.2
538
+ Schenker14
539
+ Lyα LF
540
+ 4
541
+ Ouchi17
542
+ 0.00
543
+ 0.0
544
+ 4
545
+ 0
546
+ 2
547
+ 10
548
+ 6
549
+ 8
550
+ 10
551
+ 8
552
+ 7
553
+ 4
554
+ 5
555
+ Z
556
+ 1.0
557
+ 0.10
558
+ CDM
559
+ WDM4
560
+ WDM3
561
+ 0.8
562
+ 0.08
563
+ WDM2
564
+ WMAP Year 9
565
+ Planck 2015
566
+ CDM
567
+ 0.6
568
+ Planck 2018
569
+ 0.06
570
+ XX
571
+ WDM4
572
+ HO
573
+ WDM3
574
+ T
575
+ WDM2
576
+ 0.04
577
+ 0.4
578
+ O
579
+ Mason19
580
+
581
+ Mason18
582
+ Hoag19
583
+ Mesinger15
584
+ 0.02
585
+ 0.2
586
+ Schenker14
587
+ 4
588
+ Lyα LF
589
+ Ouchi17
590
+ 0.00
591
+ 0.0
592
+ 10
593
+ 0
594
+ 2
595
+ 4
596
+ 6
597
+ 10
598
+ 5
599
+ 6
600
+ 8
601
+ 9
602
+ 4
603
+ 7
604
+ N
605
+ Z
606
+ 1.0
607
+ CDM
608
+ 0.10
609
+ CDM
610
+ LA8
611
+ LA8
612
+ LA9
613
+ LA9
614
+ 0.8
615
+ LA10
616
+ LA10
617
+ 0.08
618
+ LA11
619
+ LA11
620
+ LA120
621
+ LA120
622
+ Mason19
623
+ O1
624
+ 0.6
625
+ 0.06
626
+ WMAP Year 9
627
+ +
628
+ Mason18
629
+ IHO
630
+ Planck 2015
631
+ Hoag19
632
+
633
+ Planck 2018
634
+ Mesinger15
635
+ 0.04
636
+ 0.4
637
+ Schenker14
638
+ Lyα LF
639
+ Ouchi17
640
+ 0.02
641
+ 0.2
642
+ 0.00
643
+ 0.05
644
+ 10
645
+ 0
646
+ 8
647
+ 9
648
+ 2
649
+ 9
650
+ 4
651
+ 6
652
+ 7
653
+ 5
654
+ 3
655
+ 4
656
+ 5
657
+ 6
658
+ 8
659
+ NE
660
+ Z
661
+ 1.0
662
+ CDM
663
+ CDM
664
+ 0.10
665
+ WDM4
666
+ WDM4
667
+ WDM3
668
+ WDM3
669
+ 0.8
670
+ WDM2
671
+ 0.08
672
+ WDM2
673
+ Mason19
674
+ O
675
+ WMAP Year 9
676
+ Mason18
677
+ Planck 2015
678
+ Hoag19
679
+
680
+ 0.6
681
+ 0.06
682
+ Planck 2018
683
+ Mesinger15
684
+ T
685
+ Schenker14
686
+ Lyα LF
687
+ 0.4
688
+ 0.04
689
+ Ouchi17
690
+ 0.02
691
+ 0.2
692
+ 0.00
693
+ 0.0
694
+ 10
695
+ 4
696
+ 5
697
+ 6
698
+ 8
699
+ 9
700
+ 7
701
+ 0
702
+ 2
703
+ 3
704
+ 8
705
+ 1
706
+ 5
707
+ Z
708
+ Zsingle-star population. This value is coherent with the Salpeter IMF assumed in the
709
+ semi-analytic model [26]. We did not investigate the variation of ξion with redshift and
710
+ MUV, which we have considered negligible with respect to changes in escape fraction.
711
+ Similarly, we have neglected the variation with galaxy age. These hypotheses allow
712
+ us to set an upper limit to fesc for each different WDM particle and boundary condi-
713
+ tion. In general, models that start from Q = 0 need a higher fesc value to ionize the
714
+ IGM within the same z range. For this reason they are more inclusive and result in a
715
+ weaker constraint to the admitted escape fraction. If fesc > f sup
716
+ esc , Reionization process
717
+ is completed outside the fiducial redshift interval.
718
+ The evolution of the filling fraction QHII in the various cosmological models
719
+ and for different assumptions is summarised in Fig. 5.
720
+ 4
721
+ Conclusions
722
+ In this paper we have first summarised the results presented in Menci et al. 2016, 2017
723
+ [1, 2] putting stringent constraints on DM models with suppressed power spectrs. The
724
+ comparison of the predicted maximum number density of DM halos φ to the observed
725
+ number density φobs provide robust constraints through the simple condition that ob-
726
+ served galaxies cannot outnumber their host DM halos (φ ≥ φobs). Remarkably, these
727
+ constraints are conservative, and independent of the modeling of baryonic physics in
728
+ low-mass galaxies. The mass of WDM thermal relic candidates is constrained to be
729
+ mX ≥ 2.9 keV at 1σ confidence level, and mX ≥ 2.4 keV at 2 − σ level. by have
730
+ been derived by comparing the maximum number density of DM halos φ expected at
731
+ redshift z = 6 to the observed number density φobs of galaxies at the same redshift in
732
+ the HFF.
733
+ We have then summarised the results presented in [3] on how Reionization sce-
734
+ narios are affected by early galaxy formation in WDM cosmologies. We have used the
735
+ semi-analytic model described by Menci et al. (2018) [11], to produce the UV LF in a
736
+ ΛCDM framework. We have tested some ΛWDM cosmologies, in which the contri-
737
+ bution of the faint galaxies is suppressed: in particular, we have focused on five sterile
738
+ neutrino models presented in Lovell et al. (2020) [15]), and three thermal WDM mod-
739
+ els with mX = 2–3–4 keV. In both cases, we have found that a higher Mhm leads to
740
+ a general delay in the Reionization process. In CDM cosmology, merging between
741
+ galaxies determines the rise of the intrinsic MUV < −20 systems relative contribution
742
+ to the ionizing photons budget, from ≈30% to ≈45% between 6.3 < z < 8. In the
743
+ WDM case, the particles free-streaming yields to a shift towards brighter sources and
744
+
745
+ rphot(MUV < −20) undergoes a further 1–10% growth, depending on cosmology; We
746
+ found that in WDM cosmologies a higher fescξion is required, in order to complete the
747
+ Reionization process at the same redshift.
748
+ The most important limits to our analysis are related to observational uncertain-
749
+ ties. We expect significant advances thanks to improved constraints on the UV LF at
750
+ very high-redshift made possible by forthcoming JWST surveys.
751
+ References
752
+ 1.
753
+ Menci, N., Grazian, A., Castellano, M. & Sanchez, N. G. A Stringent Limit on
754
+ the Warm Dark Matter Particle Masses From the Abundance of z= 6 Galaxies in
755
+ the Hubble Frontier Fields. The Astrophysical Journal 825, L1. https://doi.
756
+ org/10.3847/2041-8205/825/1/l1 (June 2016).
757
+ 2.
758
+ Menci, N. et al. Fundamental Physics with the Hubble Frontier Fields: Con-
759
+ straining Dark Matter Models with the Abundance of Extremely Faint and Dis-
760
+ tant Galaxies. The Astrophysical Journal 836, 61. arXiv: 1701.01339 [astro-ph.CO]
761
+ (Feb. 2017).
762
+ 3.
763
+ Romanello, M., Menci, N. & Castellano, M. The Epoch of Reionization in Warm
764
+ Dark Matter Scenarios. Universe 7, 365. arXiv: 2110.05262 [astro-ph.CO]
765
+ (Sept. 2021).
766
+ 4.
767
+ Hoag, A. et al. Constraining the Neutral Fraction of Hydrogen in the IGM at
768
+ Redshift 7.5. The Astrophysical Journal 878, 12. https://doi.org/10.
769
+ 3847/1538-4357/ab1de7 (June 2019).
770
+ 5.
771
+ Mason, C. A. et al. Inferences on the timeline of reionization at z ∼ 8 from
772
+ the KMOS Lens-Amplified Spectroscopic Survey. Monthly Notices of the Royal
773
+ Astronomical Society 485, 3947–3969. issn: 0035-8711. https://doi.org/
774
+ 10.1093/mnras/stz632 (Mar. 2019).
775
+ 6.
776
+ Planck Collaboration. Planck 2018 results - VI. Cosmological parameters. A&A
777
+ 641, A6. https://doi.org/10.1051/0004-6361/201833910 (2020).
778
+ 7.
779
+ Dayal, P., Mesinger, A. & Pacucci, F. Early Galaxy Formation in Warm Dark
780
+ Matter Cosmologies. The Astrophysical Journal 806, 67. https://doi.org/
781
+ 10.1088/0004-637x/806/1/67 (June 2015).
782
+ 8.
783
+ Viel, M., Becker, G. D., Bolton, J. S. & Haehnelt, M. G. Warm dark matter as
784
+ a solution to the small scale crisis: New constraints from high redshift Lyman-α
785
+ forest data. Phys. Rev. D 88, 043502. https://link.aps.org/doi/10.
786
+ 1103/PhysRevD.88.043502 (4 Aug. 2013).
787
+
788
+ 9.
789
+ Corasaniti, P., Agarwal, S., Marsh, D. & Das, S. Constraints on dark matter
790
+ scenarios from measurements of the galaxy luminosity function at high redshifts.
791
+ Physical Review D 95. issn: 2470-0029. http://dx.doi.org/10.1103/
792
+ PhysRevD.95.083512 (Apr. 2017).
793
+ 10.
794
+ Merle, A. keV sterile neutrino Dark Matter 2017. arXiv: 1702.08430 [hep-ph].
795
+ 11.
796
+ Menci, N. et al. Galaxy Formation in Sterile Neutrino Dark Matter Models. The
797
+ Astrophysical Journal 854, 1. arXiv: 1801.03697 [astro-ph.CO] (Feb. 2018).
798
+ 12.
799
+ Bond, J. R., Cole, S., Efstathiou, G. & Kaiser, N. Excursion Set Mass Func-
800
+ tions for Hierarchical Gaussian Fluctuations. The Astrophysical Journal 379,
801
+ 440 (Oct. 1991).
802
+ 13.
803
+ Bode, P., Ostriker, J. P. & Turok, N. Halo Formation in Warm Dark Matter Mod-
804
+ els. The Astrophysical Journal 556, 93–107. https://doi.org/10.1086/
805
+ 321541 (July 2001).
806
+ 14.
807
+ Schneider, A., Smith, R. E., Macci`o, A. V. & Moore, B. Non-linear evolution
808
+ of cosmological structures in warm dark matter models. Monthly Notices of the
809
+ Royal Astronomical Society 424, 684–698. issn: 0035-8711. https://doi.
810
+ org/10.1111/j.1365-2966.2012.21252.x (July 2012).
811
+ 15.
812
+ Lovell, M. R. Toward a General Parameterization of the Warm Dark Matter Halo
813
+ Mass Function. The Astrophysical Journal 897, 147. https://doi.org/10.
814
+ 3847/1538-4357/ab982a (July 2020).
815
+ 16.
816
+ Finkelstein, S. L. et al. Conditions for Reionizing the Universe with a Low
817
+ Galaxy Ionizing Photon Escape Fraction. The Astrophysical Journal 879, 36.
818
+ https://doi.org/10.3847/1538-4357/ab1ea8 (July 2019).
819
+ 17.
820
+ Lapi, A. & Danese, L. Cold or warm? Constraining dark matter with primeval
821
+ galaxies and cosmic reionization after Planck. Journal of Cosmology and As-
822
+ troparticle Physics 2015, 003–003. issn: 1475-7516. http://dx.doi.org/
823
+ 10.1088/1475-7516/2015/09/003 (Sept. 2015).
824
+ 18.
825
+ Haardt, F. & Madau, P. Radiative Transfer in a Clumpy Universe. IV. New Syn-
826
+ thesis Models of the Cosmic UV/X-Ray Background. The Astrophysical Journal
827
+ 746, 125. https://doi.org/10.1088/0004-637x/746/2/125 (Feb. 2012).
828
+ 19.
829
+ Livermore, R. C., Finkelstein, S. L. & Lotz, J. M. Directly Observing the Galax-
830
+ ies Likely Responsible for Reionization. The Astrophysical Journal 835, 113.
831
+ https://doi.org/10.3847/1538-4357/835/2/113 (Jan. 2017).
832
+ 20.
833
+ Harikane, Y. et al. A Comprehensive Study on Galaxies at z˜9-17 Found in the
834
+ Early JWST Data: UV Luminosity Functions and Cosmic Star-Formation His-
835
+ tory at the Pre-Reionization Epoch. arXiv e-prints, arXiv:2208.01612. arXiv:
836
+ 2208.01612 [astro-ph.GA] (Aug. 2022).
837
+
838
+ 21.
839
+ Konno, A. et al. Accelerated Evolution of the Lyα Luminosity Function at z≳
840
+ 7 Revealed by the SUBARU Ultra-Deep Survey for Lyα Emitters at z= 7.3.
841
+ The Astrophysical Journal 797, 16. https://doi.org/10.1088/0004-
842
+ 637x/797/1/16 (Nov. 2014).
843
+ 22.
844
+ Konno, A. et al. SILVERRUSH. IV. Lyα luminosity functions at z = 5.7 and 6.6
845
+ studied with ≈ 1300 Lyα emitters on the 14–21 deg2 sky. Publications of the
846
+ Astronomical Society of Japan 70. S16. issn: 0004-6264. https://doi.org/
847
+ 10.1093/pasj/psx131 (Dec. 2017).
848
+ 23.
849
+ Zheng, Z.-Y. et al. First Results from the Lyman Alpha Galaxies in the Epoch of
850
+ Reionization (LAGER) Survey: Cosmological Reionization at z ∼ 7. The Astro-
851
+ physical Journal 842, L22. https://doi.org/10.3847/2041-8213/aa794f
852
+ (June 2017).
853
+ 24.
854
+ Planck Collaboration. Planck 2015 results - XIII. Cosmological parameters. A&A
855
+ 594, A13. https://doi.org/10.1051/0004-6361/201525830 (2016).
856
+ 25.
857
+ Hinshaw, G. et al. Nine-Year Wilkinson Microwave Anisotropy Probe (WMAP)
858
+ Observations: Cosmological Parameter Results. The Astrophysical Journal Sup-
859
+ plement Series 208, 19. https://doi.org/10.1088/0067-0049/208/2/19
860
+ (Sept. 2013).
861
+ 26.
862
+ Robertson, B. E., Ellis, R. S., Furlanetto, S. R. & Dunlop, J. S. Cosmic Reion-
863
+ ization and Early Star-Forming Galaxies: a Joint Analysis of New Constraints
864
+ from Planck and the Hubble Space Telescope. The Astrophysical Journal 802,
865
+ L19. https://doi.org/10.1088/2041-8205/802/2/l19 (Apr. 2015).
866
+ 27.
867
+ Bouwens, R. J. et al. Reionization After Planck: the Derived Growth of the Cos-
868
+ mic Ionizing Emissivity now Matches the Growth of the Galaxy UV Luminosity
869
+ Density. The Astrophysical Journal 811, 140. https://doi.org/10.1088/
870
+ 0004-637x/811/2/140 (Sept. 2015).
871
+
XNE2T4oBgHgl3EQfYgch/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ZNE5T4oBgHgl3EQfdw-l/content/tmp_files/2301.05614v1.pdf.txt ADDED
@@ -0,0 +1,1108 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Wrapping dynamics and full uptake conditions for nonspherical active nanoparticles
2
+ Ke Xiao∗
3
+ Wenzhou Institute, University of Chinese Academy of Sciences,
4
+ Wenzhou 325016, People’s Republic of China and
5
+ Department of Physics, College of Physical Science and Technology,
6
+ Xiamen University, Xiamen 361005, People’s Republic of China
7
+ Rui Ma and Chen-Xu Wu†
8
+ Fujian Provincial Key Lab for Soft Functional Materials Research,
9
+ Research Institute for Biomimetics and Soft Matter,
10
+ Department of Physics, College of Physical Science and Technology,
11
+ Xiamen University, Xiamen 361005, People’s Republic of China
12
+ (Dated: 16th January, 2023)
13
+ The cellular uptake of self-propelled nanoparticles (NPs) or viruses, usually nonspherical, by cell
14
+ membrane is crucial in may biological processes. In this study, using Onsager variational principle,
15
+ we obtain a general wrapping equation for nonspherical self-propelled nanoparticles. Two analytical
16
+ critical conditions are theoretically derived, one for the continuous full uptake of prolate particles
17
+ and the other for snapthrough full wrapping of oblate particles. They capture considerably well the
18
+ full uptake critical boundaries in the phase diagrams constructed in terms of active force, aspect
19
+ ratio, adhesion energy density, and membrane tension based on numerical calculations. It is found
20
+ that enhancing activity (active force), reducing effective dynamic viscosity, increasing adhesion
21
+ energy density, and decreasing membrane tension, can significantly improve the wrapping efficiency
22
+ for the self-propelled particles. These results elucidate some of the previous specific investigations
23
+ conclusively and may offer novel possibilities for designing an effective active NP-based vehicle for
24
+ controlled drug delivery.
25
+ The lipid bilayer plasma membrane, a physical barrier
26
+ defining organelles of cells and plenty of their surrounding
27
+ environment, plays a crucial role for a spectrum of bio-
28
+ logical processes [1]. Examples range from the transduc-
29
+ tion of biochemical signal and the intake of nutrients [2]
30
+ to budding and fission [3, 4], and endocytosis of viruses,
31
+ pathogens, and particles [5, 6]. The engulfing of a parti-
32
+ cle or virus (pathogen) by a plasma membrane is a widely
33
+ encountered phenomenon in endocytosis processes, in-
34
+ cluding inter- and intracellular transport [7], delivering
35
+ therapeutic agents enveloped by nanoparticles into tu-
36
+ mor cells [8–10], and virus infection [11–13]. Especially,
37
+ cellular uptake, which involves the interaction between
38
+ cell membrane and nanoparticles (NPs) or viruses, is an
39
+ essential step for a wide range of healthy and disease-
40
+ related processes [12].
41
+ Over the past two decades, considerable efforts using
42
+ experiment, theoretical modeling, and numerical sim-
43
+ ulation have been devoted to characterizing how the
44
+ physical parameters, including the particle size [14–20],
45
+ shape [21–23], elastic properties of the particle [24–28],
46
+ ligand/receptor density [29–31], as well as the mechan-
47
+ ical properties of the membrane [32, 33], affect the in-
48
+ vading behaviors. Though the cellular uptake of passive
49
+ particles via endocytic process has been studied exten-
50
+ sively, little work has been done on the active entry of
51
+ self-propelled bacterial pathogens. To name a few exam-
52
+ ples, it has been found that some cytosolic bacteria such
53
+ as Rickettsia rickettsii are able to produce active force to
54
+ facilitate their mobility by forming actin tails [34], and
55
+ Listeria monocytogenes can generate active force to push
56
+ out a tube-like protuberance from the plasma membrane
57
+ by hijacking the actin polymerization-depolymerization
58
+ apparatus of their host [35–39]. How the active force of
59
+ these self-propelled agents affects the engulfing dynamics
60
+ at the cell membrane remains to be elucidated.
61
+ Recently, many model systems by using lipid vesicles to
62
+ encapsulate natural swimmers (Escherichia coli bacteria,
63
+ Bacillus subtilis bacteria, etc.) or artificial microswim-
64
+ mers (synthetic Janus particles) have been developed to
65
+ study the active membrane behaviors in vitro [40–45].
66
+ Such systems are out-of-equilibrium and hence give rise
67
+ to many intriguing behaviors, such as membrane fluctu-
68
+ ations and large deformations [40, 41], shape transfor-
69
+ mations [42–44], and even deformation of lipid vesicles
70
+ into flagellated swimmers [45]. Therefore, in biology, the
71
+ specific interactions between vesicles and bacteria or arti-
72
+ ficial self-propelled particles plays a key role in designing
73
+ active matter systems [46]. Besides, the wrapping dy-
74
+ namics of particles by cell membranes, which is important
75
+ for understanding the cellular uptake, has been carried
76
+ out experimentally, theoretically, and numerically. In the
77
+ limit of low membrane tension and weak reversible ad-
78
+ hesion, Spanke et.
79
+ al. [47] experimentally investigated
80
+ how the spontaneous wrapping dynamics of micron-sized
81
+ particles by giant unilamellar vesicles changes with the
82
+ adhesion energy.
83
+ By combining computer simulations
84
+ and theoretical analysis, the cellular uptake of active
85
+ particles in the absence of membrane tension was stud-
86
+ ied [48], and the deterministic and stochastic uptake dy-
87
+ arXiv:2301.05614v1 [cond-mat.soft] 13 Jan 2023
88
+
89
+ 2
90
+ namics of passive nanoparticles with different geometries
91
+ were also reported [21].
92
+ Understanding such effect of
93
+ forces and membrane properties (adhesion energy den-
94
+ sity and membrane tension) on the dynamics of cellular
95
+ uptake are critical to designing efficient strategies for po-
96
+ tential biomedical applications, including drug/gene de-
97
+ livery [49–51], cell operation and manipulation [52, 53],
98
+ and bioimaging/sensing [8, 54].
99
+ In addition, in reality
100
+ many pathogens and viruses are nonspherical [55], such
101
+ as egg-shaped malaria parasite [56] and cylindrical Liste-
102
+ ria monocytogenes, indicating the significance of probing
103
+ the wrapping dynamics of nonspherical particles for the
104
+ entry of certain pathogens into cells.
105
+ To better understand the cellular uptake dynamics of
106
+ a nonspherical self-propelled nanoparticle by a plasma
107
+ membrane, a detailed and comprehensive investigation
108
+ of how the wrapping time depends on the active force,
109
+ the particle’s aspect ratio, the viscosity, and the mem-
110
+ brane properties (adhesion energy density and membrane
111
+ tension) is needed. Here in this paper, the wrapping dy-
112
+ namics is studied by employing the Onsager variational
113
+ principle [57, 58] for out-of-equilibrium systems. Our re-
114
+ sults show that active force, low effective dynamic vis-
115
+ cosity, strong adhesion force, and small membrane ten-
116
+ sion play a positive role in the wrapping time, indicating
117
+ that it can be manipulated by changing the activity and
118
+ the aspect ratio of the particles, the viscosity, and the
119
+ properties of the membrane such as adhesion energy den-
120
+ sity and membrane tension. The physical insights gained
121
+ from this work could clarify the mechanism of wrapping
122
+ dynamics of nonspherical active nanoparticles.
123
+ We model a self-propelled invader as an axis-symmetric
124
+ ellipsoid (prolate or oblate spheroid) with its principle ro-
125
+ tational axis orthogonal to the flat membrane, as shown
126
+ in Fig. 1, where a and b denote the semi-axes perpendicu-
127
+ Figure 1. (Color online) Schematic depicting wrapping phases
128
+ of an active particle from nonwrapping to partial wrapping
129
+ and to full uptake.
130
+ lar to and along the principle rotational axis, respectively.
131
+ The geometry of the particle is parameterized by the as-
132
+ pect ratio e = b/a, with e > 1 for a prolate ellipsoid,
133
+ and e < 1 for an oblate one. In practice, it is conve-
134
+ nient to write the area element in terms of polar angle:
135
+ dA = 2πa2 sin θ
136
+
137
+ cos2 θ + e2 sin2 θ dθ. To model the up-
138
+ take dynamics of an active particle, we have to write
139
+ down the total free energy of the system. Following the
140
+ classical Canham-Helfrich continuum model [16, 59, 60],
141
+ such an energy is given by
142
+ Etot =
143
+
144
+ Amem
145
+ κ
146
+ 2 (2H)2dA + σ∆A −
147
+
148
+ Aad
149
+ ω dA − fZ,
150
+ (1)
151
+ where the elastic energy of the membrane, the adhesion
152
+ energy between the particle and the membrane, and the
153
+ work done by the active particle are taken into account.
154
+ Here the first term, with κ the bending rigidity and H
155
+ the local mean curvature, denotes the bending energy of
156
+ the membrane
157
+ Ebend =
158
+ � α
159
+ 0
160
+ πκe2 sin θ[2 + (e2 − 1) sin2 θ]2
161
+ [1 + (e2 − 1) sin2 θ]3 ×
162
+
163
+ cos2 θ + e2 sin2 θ dθ,
164
+ (2)
165
+ an integral over the contact area between the membrane
166
+ and the particle.
167
+ The second term of Eq. (1) is con-
168
+ tributed by the surface tension:
169
+ Eten =
170
+ � α
171
+ 0
172
+ 2πσa2 sin θ
173
+
174
+ 1 −
175
+ cos θ
176
+
177
+ cos2 θ + e2 sin2 θ
178
+
179
+ ×
180
+
181
+ cos2 θ + e2 sin2 θ dθ.
182
+ (3)
183
+ The third term of Eq. (1) representing the gain in adhe-
184
+ sive energy, characterized by a negative adhesive energy
185
+ −ω per unit area, can be written as an integral over the
186
+ wrapping area. The last term of Eq. (1) arises from work
187
+ done by the active force f acting on the particle, which
188
+ is calculated as Ef = −fae(1 − cosα).
189
+ As the particle is being engulfed by the membrane,
190
+ it has been found that it is the friction force near the
191
+ membrane-particle contact line with its circumference
192
+ given by L(α) = 2πa sin α that largely dissipates the
193
+ energy [47]. In the limit of low Reynolds number, the
194
+ dissipation function reads
195
+ Φ = πηa3 sin α(cos2 θ + e2 sin2 θ) ˙α2,
196
+ (4)
197
+ where η is the effective dynamic viscosity with a typical
198
+ order of 1 Pa·s. In order to obtain the equation governing
199
+ the wrapping dynamics of the active particle, first of all
200
+ we construct a Rayleighian R = ˙Etot + Φ, with ˙Etot the
201
+ time derivative of the free energy of the system given by
202
+ ˙Etot =
203
+ �κe2
204
+ a2
205
+ [2 + (e2 − 1) sin2 α]2
206
+ [1 + (e2 − 1) sin2 α]3 +
207
+
208
+
209
+ 1 −
210
+ cos α
211
+
212
+ cos2 α + e2 sin2 α
213
+
214
+ − 2ω
215
+
216
+ ×
217
+ πa2 sin α
218
+
219
+ cos2 α + e2 sin2 α ˙α − fae sin α ˙α,
220
+ (5)
221
+
222
+ bi
223
+ a
224
+ a3
225
+ Figure 2. (Color online) The engulfing angle α/π and the wrapping velocity v of an active particle with different aspect ratios
226
+ (a) e = 0.75, (b) e = 1, and (c) e = 1.5, where the bending rigidity, the adhesion energy density, the tension modulus, and the
227
+ effective dynamic viscosity are set as 25 kBT, 0.044 mJ/m2, 0.9 × 10−5 N/m, and 1 Pa · s, respectively.
228
+ and Φ the energy dissipation function.
229
+ Minimizing R
230
+ with respect to ˙α following the Onsager variational prin-
231
+ ciple, i.e., ∂R/∂ ˙α = 0, we obtain the cellular uptake
232
+ dynamics equation
233
+ ˙α =
234
+ 1
235
+ ηa
236
+
237
+ cos2 α + e2 sin2 α
238
+
239
+ ω +
240
+ fe
241
+ 2πa
242
+
243
+ cos2 α + e2 sin2 α
244
+ − κe2
245
+ 2a2
246
+ [2 + (e2 − 1) sin2 α]2
247
+ [1 + (e2 − 1) sin2 α]3
248
+ − σ
249
+
250
+ 1 −
251
+ cos α
252
+
253
+ cos2 α + e2 sin2 α
254
+ ��
255
+ ,
256
+ (6)
257
+ for a nonspherical active particle. For spherical particles
258
+ a = b = R, the above equation reduces to Eq. (2) in
259
+ Ref. [21] if f = 0.
260
+ A detailed theoretical analysis of Eq. (6) shows that
261
+ there exist two types of critical conditions for a full up-
262
+ take to occur. One is governed by ˙α
263
+ ��
264
+ α=π= 0, or
265
+ ω +
266
+ f
267
+ 2πae − 2κ
268
+ a2 e2 − 2σ = 0,
269
+ (7)
270
+ corresponding to a second-order wrapping transition for
271
+ prolate particles and spherical particles. For a spherical
272
+ particle, Eq. (7) reduces to a critical radius Rc = [−f +
273
+
274
+ f 2 + 32π2κ(ω − 2σ)]/[4π(ω − 2σ)] when ω ̸= 2σ. The
275
+ other is given by ˙α
276
+ ��
277
+ α=π/2+B/(2C)= 0 with B = σ/e, and
278
+ C = 1 − e2
279
+ 2e2
280
+
281
+ σ − ω − f
282
+ πa
283
+
284
+ + κ(3e2 + 7)
285
+ 4a2e6
286
+ ,
287
+ leading to a critical condition
288
+ ω +
289
+ f
290
+ 2πa − κ(1 + e2)2
291
+ 2a2e4
292
+ − σ − B2
293
+ 4C = 0,
294
+ (8)
295
+ for a first-order wrapping transition from a partial wrap-
296
+ ping to a full uptake.
297
+ If the surface tension satisfies
298
+ (2e2 − 1)σ ≪ κ(3e2 + 7)/(a2e4) − 2(1 − e2)[ω + f/(πa)],
299
+ the above condition reduces to
300
+ ω +
301
+ f
302
+ 2πa − κ(1 + e2)2
303
+ 2a2e4
304
+ − σ = 0.
305
+ (9)
306
+ To investigate the wrapping dynamics of the active
307
+ particle, we first solve Eq. (6) numerically and analyze
308
+ the evolution of the wrapping angle α/π. For an oblate
309
+ spheroid, the engulfing angle (black curves) as shown in
310
+ Fig. 2(a) exhibits a plateau around α = π/2, indicat-
311
+ ing that there exists a stable partial wrapping state at
312
+ this point.
313
+ This can be reflected by its corresponding
314
+ low wrapping velocity (blue curve) as the oblate parti-
315
+ cle has to cross over an energy barrier before it is fully
316
+ wrapped, corresponding to a first-order wrapping tran-
317
+ sition. Figures 2(b) and 2(c) show the similar wrapping
318
+ behavior with a monotonic increase of wrapping angle to
319
+ a completely wrapped state (α/π = 1) for both the pro-
320
+ late spheroid and the spherical particle. The wrapping
321
+ velocity for the spherical particle shows a significant and
322
+ monotonic drop off after the particle is initially inter-
323
+ nalized at a fast speed, until it slows down and is fully
324
+ wrapped by the fluidic film [see Fig. 2(b)]. While for the
325
+ prolate spheroid, the engulfing speed increases against
326
+ time in the beginning, followed by a dramatic decrease,
327
+ and finally levels off to zero, terminating at a full wrap-
328
+ ping state (α/π = 1) [see Fig. 2(c)].
329
+ To systematically study how the active force and the
330
+ aspect ratio of the particle, the effective dynamic vis-
331
+ cosity, and the membrane properties affect the uptake
332
+ dynamics of the active particle at cell membrane, we nu-
333
+ merically calculate the wrapping time by changing these
334
+ parameter values. Figure 3 shows the wrapping time as
335
+ a function of particle size for different active forces and
336
+ dynamic viscosities. For fixed f and η, the curves of up-
337
+ take time share a similar feature that with the increase of
338
+ the particle size, tup drops very quickly before it bounces
339
+ back mildly.
340
+ Meanwhile, the full wrapping regimes in
341
+ the parameter space are also apparently broadened with
342
+ the increase of the active force and the effective dynamic
343
+ viscosity. Figures 3(a) and 3(b) compare the resulting
344
+ wrapping times of the oblate and the spherical particle
345
+ for different values of active force. For the oblate particle,
346
+ we adjust the length of the symmetry axis a by keeping
347
+
348
+ 1.0
349
+ 1.0
350
+ (b)
351
+ 1.0
352
+ (a)
353
+ 0.20
354
+ 0.30
355
+ c
356
+ 0.16
357
+ α/元
358
+ 0.8
359
+ 0.8
360
+ 0.8
361
+ 0.25
362
+ V
363
+ α/元
364
+ 0.15
365
+ /ms)
366
+ (rad/ms)
367
+ α/元
368
+ 0.12
369
+ (rad/ms)
370
+ 0.6
371
+ 0.20
372
+ 0.6
373
+ 0.6
374
+ (rad/
375
+ 0.15
376
+ e=b/a=1
377
+ 0.10
378
+ e=b/a=1.5
379
+ 0.08
380
+ 0.4F
381
+ 0.4
382
+ 0.4
383
+ e=b/a=0.75
384
+ a=90 nm
385
+ V (
386
+ a=134 nm
387
+ 0.10
388
+ a=108 nm
389
+ 0.05
390
+ 0.2
391
+ 0.2
392
+ 0.2
393
+ 0.04
394
+ 0.05
395
+ 0.0
396
+ 0.00
397
+ 0.0
398
+ 0.00
399
+ 0.0
400
+ 0.00
401
+ 0
402
+ 20
403
+ 40
404
+ 60
405
+ 80
406
+ 20
407
+ 40
408
+ 60
409
+ 80
410
+ 100
411
+ 0
412
+ 20
413
+ 40
414
+ 60
415
+ 80
416
+ 100
417
+ t (ms)
418
+ t (ms)
419
+ t (ms)4
420
+ 100
421
+ 1000
422
+ 20
423
+ 40
424
+ 60
425
+ 80
426
+ 100
427
+ 1000
428
+ 20
429
+ 40
430
+ 60
431
+ 80
432
+ 200
433
+ 400
434
+ 600
435
+ 800 1000
436
+ 20
437
+ 40
438
+ 60
439
+ 80
440
+ 100
441
+ 120
442
+ 100
443
+ 1000
444
+ 20
445
+ 40
446
+ 60
447
+ 80
448
+ 100
449
+ 120
450
+ tup (ms)
451
+ a (nm)
452
+ f=0 pN
453
+ f=1 pN
454
+ f=3 pN
455
+ f=5 pN
456
+ f=8 pN
457
+ f=10 pN
458
+ e=b/a=0.75
459
+ tup (ms)
460
+ a (nm)
461
+ f=0 pN
462
+ f=1 pN
463
+ f=3 pN
464
+ f=5 pN
465
+ f=8 pN
466
+ f=10 pN
467
+ e=b/a=1
468
+ tup (ms)
469
+ a (nm)
470
+ � =0.5 Pa·s
471
+ � =0.75 Pa·s
472
+ � =1 Pa·s
473
+ � =1.25 Pa·s
474
+ � =1.5 Pa·s
475
+ e=b/a=0.75
476
+ (d)
477
+ (c)
478
+ (b)
479
+ tup (ms)
480
+ a (nm)
481
+ � =0.5 Pa⋅s
482
+ � =0.75 Pa⋅s
483
+ � =1 Pa⋅s
484
+ � =1.25 Pa⋅s
485
+ � =1.5 Pa⋅s
486
+ e=b/a=1
487
+ (a)
488
+ Figure 3. (Color online) Wrapping times as functions of parti-
489
+ cle size for (a) oblate particle, and (b) spherical particle with
490
+ different active forces.
491
+ Uptake time as a function of parti-
492
+ cle size for (c) oblate particle, and (d) spherical particle with
493
+ different effective dynamic viscosities. Parameter values (if
494
+ not varied) are fixed at κ = 25 kBT, ω = 0.044 mJ/m2,
495
+ σ = 0.9 × 10−5 N/m, and f = 0 pN, η = 1 Pa · s.
496
+ the aspect ratio unchanged. Both ellipsoid and spher-
497
+ ical particles share a similar behavior that there exists
498
+ a critical particle size beyond which a full uptake oc-
499
+ curs. Interestingly, the calculation results demonstrate
500
+ that particles with larger active forces are uptaken faster
501
+ than those with smaller forces, indicating that particle
502
+ activity facilitates the uptake process. This conclusion is
503
+ in line with the simulation predictions in Ref. [48], where
504
+ the authors claimed that the uptake efficiency can be en-
505
+ hanced with the increase of Péclet number quantifying
506
+ the strength of active force.
507
+ In order to probe how effectively the dynamic viscosity
508
+ affect the wrapping dynamics, we plot the wrapping time
509
+ for an oblate particle and a spherical particle against par-
510
+ ticle size with different effective dynamic viscosities, as
511
+ shown in Figs. 3(c) and 3(d), respectively. It is found
512
+ that decreasing the effective dynamic viscosity η clearly
513
+ decreases the threshold particle size for the occurrence of
514
+ the complete uptake. This is due to the fact that large
515
+ viscosity increases the friction, which correspondingly in-
516
+ hibits the uptake process and hence leads to longer up-
517
+ take time. Therefore, to achieve faster (slower) wrapping
518
+ process, enhancing (weakening) the particle activity and
519
+ reducing (raising) the effective dynamic viscosity might
520
+ be an effective option.
521
+ Pathogens
522
+ and
523
+ viruses
524
+ come
525
+ in
526
+ many
527
+ different
528
+ shapes [55], but the most frequent occurrence is ellip-
529
+ soid. Therefore, here we focus our discussion on ellipsoid
530
+ with its shape characterized by aspect ratio.
531
+ Further-
532
+ more, to gain more insight into the interrelated influence
533
+ of the active force f and the particle aspect ratio e on
534
+ the wrapping time, we construct a phase diagram for the
535
+ wrapping time in the f − e space under the condition
536
+ of fixed particle volume, as shown in Fig. 4.
537
+ On one
538
+ 0.4
539
+ 0.6
540
+ 0.8
541
+ 1.0
542
+ 1.2
543
+ 1.4
544
+ 1.6
545
+ 0
546
+ 2
547
+ 4
548
+ 6
549
+ 8
550
+ 10
551
+ Eq.(7)
552
+ Eq.(9)
553
+ No uptake
554
+ No uptake
555
+ Full uptake
556
+ f (pN)
557
+ e
558
+ 10
559
+ 15
560
+ 20
561
+ 25
562
+ 30
563
+ 35
564
+ 40
565
+ 45
566
+ tup (ms)
567
+ Figure 4. (Color online) A two-dimensional phase diagram on
568
+ the (f −e) plane characterizes the interrelated effects of active
569
+ force and particle aspect ratio on the uptake time of wrap-
570
+ ping process, where the bending rigidity, the adhesion energy
571
+ density, the membrane tension, and the effective dynamic vis-
572
+ cosity are set as 25 kBT, 0.044 mJ/m2, 0.9 × 10−5 N/m, and
573
+ 1 Pa · s, respectively. The volume of the particle is fixed at
574
+ V = 4πea3/3 = 4πR3
575
+ 0/3 with R0 = 100 nm.
576
+ hand, a comparison of the wrapping time between the
577
+ prolate ellipsoidal particle (e > 1) and the spherical par-
578
+ ticle (e = 1) shows that an prolate ellipsoidal particle is
579
+ taken up slower than a spherical one. However, upon de-
580
+ creasing the aspect ratio, the uptake time for the active
581
+ oblate ellipsoidal particles (e < 1) displays a nonmono-
582
+ tonic feature by decreasing to a minimum value first and
583
+ then bouncing back gradually, in stark contrast to the
584
+ monotonic dependence for active prolate particles with
585
+ an aspect ratio of e > 1. On the other hand, Figure 4
586
+ also verifies that enhancing the activity gives rise to the
587
+ wrapping efficiency (with a decrease of tup). Therefore,
588
+ the wrapping efficiency can be regulated by tuning the
589
+ aspect ratio and the activity of particles. To determine
590
+ the boundaries separating the full uptake and no uptake
591
+ regimes, we plotted two boundary curves based on Eq. (7)
592
+ [see the dash curve in Fig. 4] and Eq. (9) [see the dot curve
593
+ in Fig. 4], respectively, which match the numerical cal-
594
+ culations very well. The consistence once again indicates
595
+ that there exist two ways for a nonspherical particle to
596
+ reach full wrapping, i.e. a continuous uptake for prolate
597
+ particles and a snapthrough uptake for oblate particles.
598
+ Such a conclusion is in agreement with the simulations
599
+ done by Khosravanizadeh et. al [61], who demonstrated
600
+ that the oblate ellipsoidal particles exhibit discontinuous
601
+ wrapping phase transition from partial wrapping to full
602
+ wrapping during the uptake process, while the prolate el-
603
+ lipsoidal particles show a continuous wrapping transition
604
+
605
+ 5
606
+ behavior.
607
+ In order to gain more insights into the effects of the
608
+ membrane properties on the wrapping time, we explore
609
+ the wrapping dynamics of an active oblate particle, a pro-
610
+ late ellipsoidal one, and a spherical one with different ad-
611
+ hesion energy densities and membrane tensions, as shown
612
+ in Fig. 5. The colored contour maps of tup on the f − ω
613
+ 0.00
614
+ 0.02
615
+ 0.04
616
+ 0.06
617
+ 0.08
618
+ 0.10
619
+ 0
620
+ 2
621
+ 4
622
+ 6
623
+ 8
624
+ 10
625
+ 0.000
626
+ 0.005
627
+ 0.010
628
+ 0.015
629
+ 0.020
630
+ 0.025
631
+ 0.030
632
+ 0
633
+ 2
634
+ 4
635
+ 6
636
+ 8
637
+ 10
638
+ 0.00
639
+ 0.02
640
+ 0.04
641
+ 0.06
642
+ 0.08
643
+ 0.10
644
+ 0
645
+ 2
646
+ 4
647
+ 6
648
+ 8
649
+ 10
650
+ 0.000
651
+ 0.005
652
+ 0.010
653
+ 0.015
654
+ 0.020
655
+ 0.025
656
+ 0.030
657
+ 0
658
+ 2
659
+ 4
660
+ 6
661
+ 8
662
+ 10
663
+ 0.00
664
+ 0.02
665
+ 0.04
666
+ 0.06
667
+ 0.08
668
+ 0.10
669
+ 0
670
+ 2
671
+ 4
672
+ 6
673
+ 8
674
+ 10
675
+ 0.000
676
+ 0.002
677
+ 0.004
678
+ 0.006
679
+ 0.008
680
+ 0.010
681
+ 0
682
+ 2
683
+ 4
684
+ 6
685
+ 8
686
+ 10
687
+ Full uptake
688
+ Eq.(9)
689
+ e=0.75
690
+ No uptake
691
+ f (pN)
692
+ � (mJ·m
693
+ -2)
694
+ 3
695
+ 11
696
+ 19
697
+ 27
698
+ 35
699
+ 43
700
+ tup (ms)
701
+ Eq.(8)
702
+ e=0.75
703
+ No uptake
704
+ Full uptake
705
+ f (pN)
706
+ � (mN·m
707
+ -1)
708
+ 8
709
+ 18
710
+ 28
711
+ 38
712
+ 48
713
+ 58
714
+ 68
715
+ 78
716
+ tup (ms)
717
+ Eq.(7)
718
+ e=1
719
+ No uptake
720
+ Full uptake
721
+ f (pN)
722
+ � (mJ·m
723
+ -2)
724
+ tup (ms)
725
+ 2
726
+ 12
727
+ 22
728
+ 32
729
+ 42
730
+ 52
731
+ (f)
732
+ (e)
733
+ (d)
734
+ (c)
735
+ (b)
736
+ Eq.(7)
737
+ e=1
738
+ No uptake
739
+ Full uptake
740
+ f (pN)
741
+ � (mN·m
742
+ -1)
743
+ 7
744
+ 17
745
+ 27
746
+ 37
747
+ 47
748
+ 57
749
+ 67
750
+ 77
751
+ tup (ms)
752
+ (a)
753
+ Full uptake
754
+ Eq.(7)
755
+ e=1.5
756
+ No uptake
757
+ f (pN)
758
+ � (mJ·m
759
+ -2)
760
+ 4
761
+ 6
762
+ 8
763
+ 10
764
+ 12
765
+ 14
766
+ 16
767
+ 18
768
+ tup (ms)
769
+ Eq.(7)
770
+ e=1.5
771
+ No uptake
772
+ Full uptake
773
+ f (pN)
774
+ � (mN·m
775
+ -1)
776
+ 11
777
+ 14
778
+ 17
779
+ 20
780
+ 23
781
+ 26
782
+ 29
783
+ tup (ms)
784
+ Figure 5. (Color online) Wrapping time tup as a function of f
785
+ and ω for (a) oblate ellipsoidal, (b) spherical, and (c) prolate
786
+ ellipsoidal particles at equal particle volume. Uptake times
787
+ as a function of active force f and membrane tension σ for
788
+ (d) oblate ellipsoidal, (e) spherical, and (f) prolate ellipsoidal
789
+ particles at equal particle volume. Parameter values (if not
790
+ varied) are fixed at κ = 25 kBT, ω = 0.044 mJ/m2, σ =
791
+ 0.9 × 10−5 N/m, and η = 1 Pa · s. The volume of the particle
792
+ is fixed at V = 4πea3/3 = 4πR3
793
+ 0/3 with R0 = 100 nm.
794
+ [see Figs. 5(a), 5(b), and 5(c)] and f − σ [see Figs. 5(d),
795
+ 5(e), and 5(f)] planes show that given an aspect ratio and
796
+ a fixed active force, a higher (lower) wrapping efficiency
797
+ can be achieved under a stronger (weaker) adhesion force
798
+ or a lower (higher) membrane tension, i.e. higher adhe-
799
+ sion and looser membrane leads to faster wrapping. Such
800
+ a conclusion can be supported by experimental observa-
801
+ tions [47] reported recently that higher adhesion leads to
802
+ faster wrapping, and simulation results in Ref. [21] that
803
+ the uptake time is strongly decreased for higher adhesion
804
+ and looser membrane. Here it is important to note that
805
+ the boundaries of the full uptake (read lines) can be very
806
+ well captured by the critical conditions Eqs (7), (8) and
807
+ (9) theoretically derived using our model.
808
+ Finally we discuss the influence of the membrane prop-
809
+ erties and the aspect ratio of particle to the wrapping
810
+ process. Figures 6(a) and 6(b) show the two-dimensional
811
+ phase diagrams of wrapping time in the parametric
812
+ planes of ω − e and σ − e.
813
+ What is striking is that,
814
+ for the oblate ellipsoidal particles, the uptake time non-
815
+ monotonically depends on e within the scale of ω or σ,
816
+ in comparison to the monotonic dependence of the pro-
817
+ late ellipsoidal particles. Tuning the particle’s aspect ra-
818
+ tio to an optimal value enables one to obtain a minimal
819
+ 0.4
820
+ 0.6
821
+ 0.8
822
+ 1.0
823
+ 1.2
824
+ 1.4
825
+ 1.6
826
+ 1.8
827
+ 0.04
828
+ 0.06
829
+ 0.08
830
+ 0.10
831
+ 0.6
832
+ 0.8
833
+ 1.0
834
+ 1.2
835
+ 1.4
836
+ 0.000
837
+ 0.003
838
+ 0.006
839
+ 0.009
840
+ 0.012
841
+ No uptake
842
+ No uptake
843
+ Full uptake
844
+ Eq.(7)
845
+ Eq.(9)
846
+ � (mJ·m
847
+ -2)
848
+ e
849
+ 4
850
+ 10
851
+ 16
852
+ 22
853
+ 28
854
+ 34
855
+ 40
856
+ tup (ms)
857
+ Eq.(7)
858
+ Eq.(8)
859
+ Eq.(9)
860
+ (b)
861
+ Full uptake
862
+ No uptake
863
+ No uptake
864
+ � (mN·m
865
+ -1)
866
+ e
867
+ 12
868
+ 17
869
+ 22
870
+ 27
871
+ 32
872
+ 37
873
+ 42
874
+ 47
875
+ tup (ms)
876
+ (a)
877
+ Figure 6.
878
+ (Color online) Two-dimensional wrapping time
879
+ phase diagrams in the projection planes of (a) ω and e and
880
+ (b) σ and e, where the bending rigidity, the adhesion energy
881
+ density, the membrane tension, the active force and the ef-
882
+ fective dynamic viscosity (if not varied) are set as 25 kBT,
883
+ 0.044 mJ/m2, 0.9 × 10−5 N/m, f = 0 pN and 1 Pa · s, respec-
884
+ tively. The volume of the particle is fixed at V = 4πea3/3 =
885
+ 4πR3
886
+ 0/3 with R0 = 100 nm.
887
+ wrapping time. In addition, Figure 6 also confirms that
888
+ the uptake efficiency can be improved (abated) by in-
889
+ creasing (decreasing) the adhesion energy density, and
890
+ reducing (raising) the membrane tension. The dash and
891
+ solid curves based analytical results Eq. (7) and Eq. (8)
892
+ coincide with the boundaries obtained from numerical
893
+ calculations. It has been shown, by providing a stochas-
894
+ tic model to study the kinetics of particle wrapping by a
895
+ vesicle, that increasing the attraction strength between
896
+ the particle and vesicle causes the improvement of uptake
897
+ rate [62]. This is again a result in agreement with our
898
+ present conclusions.
899
+ Consequently, we argue that the wrapping time de-
900
+ creases with the increase of the active force; the higher
901
+ the viscosity, the longer the wrapping time; strong ad-
902
+ hesion and low tension improve the wrapping efficiency.
903
+ The reason stems from that the wrapping process is
904
+ largely controlled by the competition among the three
905
+ types of energy: the elastic energy (consisting of bending
906
+ energy and tension energy), the adhesive energy, and the
907
+ work done by the active force. Reducing wrapping time
908
+ can be realized based on the condition that the adhesion
909
+ energy and the work done by the active force is sufficient
910
+ to overcome the energy barrier, namely, the sum of the
911
+ elastic energy and the viscous dissipation. In the presence
912
+ of active force, the work done by the active force reduces
913
+ the free energy and as a result change the uptake force.
914
+ The positive correlation between active force and uptake
915
+ force gives rise to the positive dependence of wrapping
916
+ time on the active force. According to Eq. (6), the ad-
917
+ hesion energy driving the wrapping process is positively
918
+
919
+ 6
920
+ proportional to the adhesion energy density and nega-
921
+ tively proportional to the membrane tension. As a re-
922
+ sult, increasing the adhesion energy density corresponds
923
+ to increasing the driving force for wrapping, decreasing
924
+ the membrane tension decreases the energy penalty for
925
+ uptake, indicating a decreases of the wrapping time. As
926
+ for the effective dynamic viscosity, an increase of it means
927
+ that the induced energy dissipation requires more adhe-
928
+ sion energy and work done by the active force to com-
929
+ pensate, which leads to an increase of wrapping time.
930
+ In summary, we propose a theoretical model to investi-
931
+ gate the wrapping dynamics of a nonspherical active par-
932
+ ticle by a lipid plasma membrane, by taking into account
933
+ the influence of the active force, the particle shape, the
934
+ effective dynamic viscosity, and the membrane properties
935
+ (including the adhesion energy density and the mem-
936
+ brane tension).
937
+ The wrapping equation for the active
938
+ particle, which quantitatively couples the elastic defor-
939
+ mation of the membrane, the work done by the active
940
+ particle, and the energy dissipation, is derived by using
941
+ Onsager variational principle.
942
+ Two critical conditions,
943
+ one for the continuous full uptake of prolate particles and
944
+ the other for snapthrough full wrapping of oblate parti-
945
+ cles, are obtained theoretically. Our results reveal that
946
+ enhancing activity (active force), reducing effective dy-
947
+ namic viscosity, increasing adhesion energy density, and
948
+ decreasing membrane tension, can significantly improve
949
+ the wrapping efficiency for the self-propelled particles.
950
+ Intriguingly, with an increase of aspect ratio, the wrap-
951
+ ping time for oblate ellipsoidal particles exhibits a non-
952
+ monotonic dependence, in stark contrast to the mono-
953
+ tonic dependence for prolate ellipsoidal particles. There-
954
+ fore, the wrapping time can be manipulated by changing
955
+ the activity and the aspect ratio of the particles, the ef-
956
+ fective dynamic viscosity, and the properties of the mem-
957
+ brane, such as adhesion energy density and membrane
958
+ tension. All these findings may not only shed light on
959
+ the influence of the activity and the aspect ratio of par-
960
+ ticles, the viscosity, and the properties of membrane on
961
+ the dynamic behaviors of wrapping process, but also pro-
962
+ vide guidelines to improve the efficiency of active particle-
963
+ based drug delivery systems.
964
+ ACKNOWLEDGMENTS
965
+ We acknowledge financial support from National
966
+ Natural Science Foundation of China under Grant
967
+ Nos.12147142, 11974292, 12174323, and 1200040838, and
968
+ 111 project B16029.
969
970
971
+ [1] B. Alberts, Molecular Biology of the Cell (Garland Sci-
972
+ ence, New York, 2015), 6th ed.
973
+ [2] F. Frey, F. Ziebert, and U. S. Schwarz, Phys. Rev. E 100,
974
+ 052403 (2019).
975
+ [3] G. V. Meer and H. Sprong, Curr. Opin. Cell Biol. 16,
976
+ 373 (2004).
977
+ [4] J. T. Groves, J. Kuriyan, Nat. Struct. Mol. Biol. 17, 659
978
+ (2010).
979
+ [5] G. Bao and X. R. Bao, Proc. Natl. Acad. Sci. USA 102,
980
+ 9997-9998 (2005).
981
+ [6] S. Zhang, H. Gao, and G. Bao, ACS Nano 9, 8655 (2015).
982
+ [7] S. Behzadi, V. Serpooshan, W. Tao, M. A. Hamaly, M. Y.
983
+ Alkawareek, E. C. Dreaden, D. Brown, A. M. Alkilany,
984
+ O. C. Farokhzad, and M. Mahmoudi, Chem. Soc. Rev.
985
+ 46, 4218-4244 (2017).
986
+ [8] D. Peer, J. M. Karp, S. Hong, O. C. Farokhzad, R.
987
+ Margalit, and R. Langer, Nat. Nanotechnol. 2, 751-760
988
+ (2007).
989
+ [9] W. Rao, H. Wang, J. Han, S. Zhao, J. Dumbleton, P.
990
+ Agarwal, W. Zhang, G. Zhao, J. Yu, D. L. Zynger, X.
991
+ Lu, and X. He, ACS Nano 9, 5725 (2015).
992
+ [10] Y. Min, J. M. Caster, M. J. Eblan, and A. Z. Wang,
993
+ Chem. Rev. 115, 11147 (2015).
994
+ [11] N. Kol, Y. Shi, M. Tsvitov, D. Barlam, R. Z. Shneck, M.
995
+ S. Kay, and I. Rousso, Biophys. J. 92, 1777 (2007).
996
+ [12] R. F. Bruinsma, G. J. L. Wuite, and W. H. Roos, Nat.
997
+ Rev. Phys. 3, 76 (2021).
998
+ [13] C. B. Jackson, M. Farzan, B. Chen, and H. Choe, Nat.
999
+ Rev. Mol. Cell Bio. 23, 3-20 (2022).
1000
+ [14] M. Deserno, and W. M. Gelbart, J. Phys. Chem. B 106,
1001
+ 5543-5552 (2002).
1002
+ [15] M. Deserno, and T. Bickel, Europhysics Letters (EPL)
1003
+ 62, 767-773 (2003).
1004
+ [16] M. Deserno, Phys. Rev. E 69, 031903 (2004).
1005
+ [17] S. Zhang, J. Li, G. Lykotrafitis, G. Bao, and S. Suresh,
1006
+ Adv. Mater. 21, 419-424 (2009).
1007
+ [18] B. D. Chithrani, A. A. Ghazani, and W. C.W. Chan,
1008
+ Nano Lett. 6, 662-668 (2006).
1009
+ [19] J. Agudo-Canalejo and R. Lipowsky, ACS Nano 9, 3704-
1010
+ 3720 (2015).
1011
+ [20] C. Contini, J. W. Hindley, T. J. Macdonald, J. D. Barritt,
1012
+ O. Ces, N. Quirke, Commun. Chem. 3, 130 (2020).
1013
+ [21] Felix Frey, Falko Ziebert, and Ulrich S. Schwarz, Phys.
1014
+ Rev. Lett. 122, 088102 (2019).
1015
+ [22] K. Yang and Y. Ma, Nat. Nanotechnol. 5, 579 (2010).
1016
+ [23] Z. Shen, H. Ye, X. Yi, and Y. Li, ACS Nano 13, 215-228
1017
+ (2019).
1018
+ [24] Xin Yi, Xinghua Shi, and Huajian Gao, Phys. Rev. Lett.
1019
+ 107, 098101 (2011).
1020
+ [25] J. C. Shillcock and R. Lipowsky, Nat. Mater. 4, 225-228
1021
+ (2005).
1022
+ [26] X. Yi and H. Gao, Phys. Rev. E 89, 062712 (2014).
1023
+ [27] A. Verma and F. Stellacci, Small 6, 12-21 (2010).
1024
+ [28] X. Ma, X. Yang, M. Li, J. Cui, P. Zhang, Q. Yu, and J.
1025
+ Hao, Langmuir 37, 11688-11694, (2021).
1026
+ [29] Hongyan Yuan, Ju Li, Gang Bao, and Sulin Zhang, Phys.
1027
+ Rev. Lett. 105, 138101 (2010).
1028
+ [30] Hongyan Yuan and Sulin Zhang, Appl. Phys. Lett. 96,
1029
+ 033704 (2010).
1030
+ [31] T. Wiegand, M. Fratini, F. Frey, K. Yserentant, Y. Liu,
1031
+ E. Weber, K. Galior, J. Ohmes, F. Braun, D.-P. Herten,
1032
+ S. Boulant, U. S. Schwarz, K. Salaita, E. A. Cavalcanti-
1033
+ Adam and J. P. Spatz, Nat. Commun. 11, 32 (2020).
1034
+
1035
+ 7
1036
+ [32] J. Agudo-Canalejo and R. Lipowsky, Nano Letters 15,
1037
+ 7168-7173 (2015).
1038
+ [33] Hendrik T. Spanke, Robert W. Style, Claire François-
1039
+ Martin,
1040
+ Maria Feofilova,
1041
+ Manuel Eisentraut,
1042
+ Holger
1043
+ Kress, Jaime Agudo-Canalejo, and Eric R. Dufresne,
1044
+ Phys. Rev. Lett. 125, 198102 (2020).
1045
+ [34] P. M. Colonne, C. G. Winchell, and D, E. Voth, Front.
1046
+ Cell. Infect. Microbiol. 6, 107 (2016).
1047
+ [35] J. A. Theriot, T. J. Mitchison, L. G. Tilney, and D. A.
1048
+ Portnoy, Nature 357, 257-260 (1992).
1049
+ [36] J. R. Robbins, A. I. Barth, H. Marquis, E. L. de Hostos,
1050
+ W. J. Nelson, and J. A. Theriot, J. Cell Biol. 146, 1333-
1051
+ 1350 (1999).
1052
+ [37] T. Chakraborty, Immunobiology 201, 155-163 (1999).
1053
+ [38] F. E. Ortega, E. F. Koslover, and J. A. Theriot, eLife 8,
1054
+ e40032 (2019).
1055
+ [39] G. C. Dowd, R. Mortuza, M. Bhalla, H. V. Ngo, Y. Li,
1056
+ L. A. Rigano, and K. Ireton, Proc. Natl. Acad. Sci. USA
1057
+ 117, 3789-3796 (2020).
1058
+ [40] H. R. Vutukuri, M. Hoore, C. Abaurrea-Velasco, L. van
1059
+ Buren, A. Dutto, T. Auth, D. A. Fedosov, G. Gompper,
1060
+ and J. Vermant, Nature 586, 52 (2020).
1061
+ [41] S. C. Takatori and A. Sahu, Phys. Rev. Lett. 124, 158102
1062
+ (2020).
1063
+ [42] C. Wang, Y.-K. Guo, W.-D. Tian, and K. Chen, J. Chem.
1064
+ Phys. 150, 044907 (2019).
1065
+ [43] Y. Li and P. R. ten Wolde, Phys. Rev. Lett. 123, 148003
1066
+ (2019).
1067
+ [44] M. S. E. Peterson, A. Baskaran, and M. F. Hagan, Nat.
1068
+ Commun. 12, 7247 (2021).
1069
+ [45] L. Le Nagarda, A. T. Browna, A. Dawsona, V. A. Mar-
1070
+ tineza,W. C. K. Poona, and M. Staykova, Proc. Natl.
1071
+ Acad. Sci. USA 119(34), e2206096119 (2022).
1072
+ [46] A. T. Brownet, I. D. Vladescu, A. Dawson, T. Vissers,
1073
+ J. Schwarz-Linek, J. S. Lintuvuori, and W. C. K. Poon,
1074
+ Soft Matter 12, 131-140 (2016).
1075
+ [47] H. T. Spanke, J. Agudo-Canalejo, D. Tran, R. W. Style,
1076
+ and E. R. Dufresne, Phys. Rev. Research 4, 023080
1077
+ (2022).
1078
+ [48] P. Chen, Z. Xu, G. Zhu, X. Dai, and L.-T. Yan, Phys.
1079
+ Rev. Lett. 124, 198102 (2020).
1080
+ [49] J. Panyam and V. Labhasetwar, Adv. Drug Delivery Rev.
1081
+ 55, 329 (2003).
1082
+ [50] X. Xu, S. Hou, N. Wattanatorn, F. Wang, Q. Yang, C.
1083
+ Zhao, X. Yu, H.-R. Tseng, S. J. Jonas, and P. S. Weiss,
1084
+ ACS Nano 12, 4503 (2018).
1085
+ [51] W. Wang, Z. Wu, X. Lin, T. Si, and Q. He, J. Am. Chem.
1086
+ Soc. 141, 6601 (2019).
1087
+ [52] M. Medina-Sánchez, V. Magdanz, M. Guix, V. M. Fomin,
1088
+ and O. G. Schmidt, Adv. Funct. Mater. 28, 1707228
1089
+ (2018).
1090
+ [53] H. Xie, M. Sun, X. Fan, Z. Lin, W. Chen, L. Wang, L.
1091
+ Dong, and Q. He, Sci. Robot. 4, eaav8006 (2019).
1092
+ [54] R. Weissleder, Science 312, 1168-1171 (2006).
1093
+ [55] C. Hulo, E. De Castro, P. Masson, L. Bougueleret, A.
1094
+ Bairoch, I. Xenarios, and P. Le Mercier, Nucleic Acids
1095
+ Res. 39, D576 (2011).
1096
+ [56] S. Dasgupta, T. Auth, N. S. Gov, T. J. Satchwell, E.
1097
+ Hanssen, E. S. Zuccala, D. T. Riglar, A. M. Toye, T.
1098
+ Betz, J. Baum, and G. Gompper, Biophys. J. 107, 43
1099
+ (2014).
1100
+ [57] L. Onsager, Phys. Rev. 37, 405 (1931).
1101
+ [58] L. Onsager, Phys. Rev. 38, 2265 (1931).
1102
+ [59] W. Helfrich, Z. Naturforsch. C 28, 693 (1973).
1103
+ [60] F. Jülicher and U. Seifert, Phys. Rev. E 49, 4728 (1994).
1104
+ [61] A. Khosravanizadeh, P. Sens, and F. Mohammad-Rafiee,
1105
+ J. R. Soc. Interface 19, 20220462 (2022).
1106
+ [62] S. Mirigian and M. Muthukumar, J. Chem. Phys. 139,
1107
+ 044908 (2013).
1108
+
ZNE5T4oBgHgl3EQfdw-l/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
aNA0T4oBgHgl3EQfF__0/content/tmp_files/2301.02042v1.pdf.txt ADDED
@@ -0,0 +1,933 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.02042v1 [cs.IT] 5 Jan 2023
2
+ 1
3
+ Improved Gilbert-Varshamov bounds for hopping
4
+ cyclic codes and optical orthogonal codes
5
+ Chenyang Zhang, Chong Shangguan, and Gennian Ge
6
+ Abstract
7
+ Hopping cyclic codes (HCCs) are (non-linear) cyclic codes with the additional property that the n cyclic shifts of
8
+ every given codeword are all distinct, where n is the code length. Constant weight binary hopping cyclic codes are also
9
+ known as optical orthogonal codes (OOCs). HCCs and OOCs have various practical applications and have been studied
10
+ extensively over the years.
11
+ The main concern of this paper is to present improved Gilbert-Varshamov type lower bounds for these codes, when
12
+ the minimum distance is bounded below by a linear factor of the code length. For HCCs, we improve the previously best
13
+ known lower bound of Niu, Xing, and Yuan by a linear factor of the code length. For OOCs, we improve the previously
14
+ best known lower bound of Chung, Salehi, and Wei, and Yang and Fuja by a quadratic factor of the code length. As
15
+ by-products, we also provide improved lower bounds for frequency hopping sequences sets and error-correcting weakly
16
+ mutually uncorrelated codes. Our proofs are based on tools from probability theory and graph theory, in particular the
17
+ McDiarmid’s inequality on the concentration of Lipschitz functions and the independence number of locally sparse graphs.
18
+ Keywords. Gilbert-Varshamov bound; non-linear cyclic codes; hopping cyclic codes; optical orthogonal codes;
19
+ frequency hopping sequences sets; error-correcting weakly mutually uncorrelated codes
20
+ I. INTRODUCTION
21
+ Given integers q, n and d, estimating the maximum size of q-ary codes of length n and minimum distance d is a
22
+ fundamental problem in coding theory. The Gilbert–Varshamov bound (GV bound for short) is a classic lower bound
23
+ on the size of codes. For fixed q, n → ∞, and d bounded below by a linear factor of n, improving upon the GV bound
24
+ substantially is a well-known difficult task. In this paper we will present improved GV-type bounds for several classes
25
+ of non-linear cyclic codes.
26
+ To move forward let us begin with some needed definitions. For a positive integer q, let [q] = {0, 1, . . . , q − 1}.
27
+ A vector x ∈ [q]n is denoted by x = (x1, . . . , xn). For two vectors x, y ∈ [q]n, the Hamming distance d(x, y) is the
28
+ number of coordinates where they differ, namely, d(x, y) = |{1 ≤ i ≤ n : xi ̸= yi}|. A code of length n and alphabet
29
+ size q is a subset of [q]n, whose elements are called codewords. The minimum distance d(C) of a code C ⊆ [q]n is
30
+ defined to be d(C) := min{d(x, y) : x, y ∈ C, x ̸= y}. A q-ary code with length n, size M, and minimum distance d
31
+ is denoted as an (n, M, d)q-code.
32
+ Next, let us briefly recall some known GV-type bounds.
33
+ A. GV-type bounds
34
+ a) Generic codes.: For an integer 1 ≤ t ≤ n and a vector x ∈ [q]n, let B(x, t) := {y ∈ [q]n : d(x, y) ≤ t}
35
+ denote the Hamming ball of radius t centered at x. Given a radius t, it can be easily seen that for every x ∈ [q]n, the
36
+ volume of the Hamming ball B(x, t) is independent of x, which satisfies that
37
+ |B(x, t)| =
38
+ t
39
+
40
+ i=0
41
+ �n
42
+ i
43
+
44
+ (q − 1)i =: V olq(n, t).
45
+ This project is supported by the National Key Research and Development Program of China under Grant Nos. 2020YFA0712100 and
46
+ 2018YFA0704703, the National Natural Science Foundation of China under Grant Nos. 11971325, 12231014, and 12101364, the Natural Science
47
+ Foundation of Shandong Province under Grant No. ZR2021QA005, and the Beijing Scholars Program.
48
+ C. Zhang is with the Research Center for Mathematics and Interdisciplinary Sciences, Shandong University, Qingdao 266237, China (e-mail:
49
50
+ C. Shangguan is with the Research Center for Mathematics and Interdisciplinary Sciences, Shandong University, Qingdao 266237, China, and also
51
+ with the Frontiers Science Center for Nonlinear Expectations, Ministry of Education, Qingdao 266237, China (e-mail: [email protected]).
52
+ G. Ge is with the School of Mathematical Sciences, Capital Normal University, Beijing 100048, China (e-mail: [email protected]).
53
+
54
+ 2
55
+ The GV bound, proved independently by Gilbert [7] and Varshamov [22], states that there exist (n, M, d)q-codes
56
+ with
57
+ M ≥
58
+ qn
59
+ V olq(n, d − 1).
60
+ (1)
61
+ For binary codes and d/n ≤ 0.499, Jiang and Vardy [11] improved the lower bound in (1) by a linear factor of n. Based
62
+ on their work, Vu and Wu [23] showed that for every q ≥ 2 and τ ≤ d/n ≤ 1 − 1/q − ǫ, where τ, ǫ are some absolute
63
+ reals, there exist (n, M, d)q-codes with
64
+ M = Ω
65
+
66
+ nqn
67
+ V olq(n, d − 1)
68
+
69
+ .
70
+ (2)
71
+ b) Non-linear cyclic codes.: For every x = (x1, . . . , xn) ∈ [q]n and 0 ≤ i ≤ n − 1, we call the vector
72
+ πi(x) := (xi+1, xi+2, . . . , xi+n)1 the i-th cyclic shift of x. Let C(x) := {πi(x) : 0 ≤ i ≤ n − 1} denote the set
73
+ consisting of all cyclic shifts of x. Note that C(x) is viewed as a multi-set. A code C ⊆ [q]n is said to be a cyclic code
74
+ if for every x ∈ C, C(x) ⊆ C. In the literature, there are a number of works devoting to the constructions of linear
75
+ cyclic codes with minimum distance ranging from a constant to a sublinear function of n, say, O( n
76
+ ln n) (see, e.g. [19,
77
+ Chapter 8]). However, when minimum distance is bounded below by a linear factor of n, understanding whether there
78
+ exist asymptotically good linear cyclic codes is a longstanding open question in coding theory (see [6], [8]).
79
+ For non-linear cyclic codes, the question above has been solved only recently. Haviv, Langberg, Schwartz, and
80
+ Yaakobi [8] proved that for every prime code length, there exist binary cyclic codes asymptotically attaining the GV
81
+ bound. Later, Niu, Xing, and Yuan [16] showed that for every q and n there exist (n, M, d)q-cyclic codes with
82
+ M ≥ qn(1 − n2e− ǫ2(√n−2)
83
+ 2
84
+ )
85
+ V olq(n, d − 1) − 1 .
86
+ (3)
87
+ c) Constant weight codes.: For a vector x ∈ {0, 1}n, the weight wt(x) is defined to be the number of its
88
+ non-zero coordinates, namely, wt(x) = |{1 ≤ i ≤ n : xi ̸= 0}|. A code is said to be a constant weight code, if all
89
+ codewords of it have the same weight. An (n, M, d)2-code with constant weight w is denoted as an (n, M, d; w)-code,
90
+ where we omitted the q = 2 in the subscript. For x ∈ {0, 1}n, wt(x) = w, and 0 ≤ t ≤ 2w, let B(x, t; w) := {y ∈
91
+ {0, 1}n : d(x, y) ≤ t, wt(y) = w} denote the constant weight Hamming ball of radius t centered at x. Given t and w,
92
+ it is known that for every x ∈ {0, 1}n with wt(x) = w, the volume of B(x, t; w) is independent of x, which satisfies
93
+ that
94
+ |B(x, t; w)| =
95
+ ⌊t/2⌋
96
+
97
+ i=0
98
+ �w
99
+ i
100
+ ��n − w
101
+ i
102
+
103
+ =: V ol(n, t; w).
104
+ Levenshtein [14] proved a GV-type bound for constant weight codes, showing that there exist (n, M, d; w)-codes
105
+ with
106
+ M ≥
107
+ �n
108
+ w
109
+
110
+ V ol(n, d − 1; w).
111
+ (4)
112
+ Similarly to the improvement of (2) upon (1), Kim, Liu, and Tran [12] improved (4) by a linear factor of n, showing
113
+ that for τ ≤ d/n ≤ (1 − ǫ)p(1 − p), where τ, ǫ, p are some absolute reals, there exist (n, M, d; pn)-codes with
114
+ M = Ω
115
+
116
+ n
117
+ � n
118
+ pn
119
+
120
+ V ol(n, d − 1; pn)
121
+
122
+ .
123
+ (5)
124
+ d) Constant weight non-linear cyclic codes.: In the literature, there is also a GV-type lower bound for constant
125
+ weight non-linear cyclic codes. More precisely, Chung, Salehi, and Wei [1], [3] and Yang and Fuja [24] implicitly showed
126
+ that there exist (n, M, d; w)-cyclic codes with
127
+ M ≥
128
+ �n
129
+ w
130
+
131
+ − f(n, w, d)
132
+ n · V ol(n, d − 1; w),
133
+ (6)
134
+ where f(n, w, d) is some function of n, w, d (see [1, Theorem 2] and [24, Theorem 3] for details).
135
+ 1Throughout this paper, the addition in the subscripts of x is calculated modulo n.
136
+
137
+ 3
138
+ Given the discussion above, it is natural to ask whether one can improve (3) and (6) by a linear or polynomial
139
+ factor of n, similarly to the improvements of (2) and (5) made upon (1) and (4). This is one of the motivating questions
140
+ of this paper. Note that the method which proves (2) and (5) cannot be applied directly to improve (3) and (6), as one
141
+ has to take into account the property of cyclic codes. Based on some probabilistic and graph theoretic tools and some
142
+ ideas from [11], [12], [16], [23], we will answer the above question in a strong sense in Theorems II.1 and II.2 below.
143
+ The main concern of this paper is to present improved GV-type bounds for two special classes of non-linear cyclic
144
+ codes, namely, hopping cyclic codes and its constant weight counterpart, optical orthogonal codes. As by-products,
145
+ we also provide improved lower bounds for frequency hopping sequences sets and error-correcting weakly mutually
146
+ uncorrelated codes as well.
147
+ Next, we will introduce these codes and our results in the detail.
148
+ II. MAIN RESULTS
149
+ A. Hopping cyclic codes
150
+ Hopping cyclic codes are (non-linear) cyclic codes with the additional property that the n cyclic shifts of every
151
+ given codeword are all distinct. Formally speaking, a code C ⊆ [q]n is called a hopping cyclic code (HCC for short) if
152
+ for every x ∈ C, C(x) ⊆ C, and moreover C(x) consists of n distinct elements. We will call a hopping cyclic code
153
+ C ⊆ [q]n an (n, M, d)q-HCC, if it is itself an (n, M, d)q-code. HCCs were originally designed to construct frequency
154
+ hopping sequences sets (see [4], [16] and Section III-A below), but have found their own interest as an intriguing class
155
+ of codes. The reader is referred to [16] for more background on HCCs.
156
+ For any absolute constant ǫ > 0 and d < (n − 2√n)(1 − 1/q − ǫ), Niu, Xing, and Yuan (see Theorem III.5 in [16])
157
+ showed that there exist (n, M, d)q-HCCs with M bounded below by (3).
158
+ Our first main result improves the above GV-type bound for HCCs (and hence for non-linear cyclic codes) by
159
+ asymptotically a linear factor of n.
160
+ Theorem II.1. For positive integers n, q, d and absolute reals τ, ǫ ∈ (0, 1 − 1/q) satisfying τ ≤ d/n ≤ 1 − 1/q − ǫ,
161
+ there exist (n, M, d)q-HCCs with
162
+ M ≥
163
+ cnqn
164
+ V olq(n, d − 1),
165
+ where c is a positive real depending only on τ, ǫ, q.
166
+ B. Optical orthogonal codes
167
+ Constant weight binary hopping cyclic codes are also known as optical orthogonal codes (OOCs for short). OOCs
168
+ enable a large number of asynchronous users to transmit information efficiently and reliably. They have been widely
169
+ used in various practical scenarios like code-division multiple-access systems and spread spectrum communication. A
170
+ large number of existing papers were devoted to the constructions of OOCs, see for example [1], [2], [9], [13], [17],
171
+ [24].
172
+ We will denote an (n, M, d)2-HCC with constant weight w by an (n, M, d; w)-OOC, where we omitted the q = 2
173
+ in the subscript. Chung, Salehi, and Wei [1], [3] and Yang and Fuja [24] showed that there exist (n, M, d; w)-OOCs
174
+ with M bounded below by (6).
175
+ Our second main result improves the above GV-type bound for OOCs (and hence for constant weight non-linear
176
+ cyclic codes) by asymptotically a quadratic factor of n.
177
+ Theorem II.2. For positive integers n, q, d and absolute reals p ∈ (0, 1), ǫ ∈ (0, 1/10), τ ∈ (0, p(1 − p)) satisfying
178
+ pn ∈ Z, τ ≤ d/n ≤ (1 − ǫ)p(1 − p), there exist (n, M, d; pn)-OOCs with
179
+ M ≥
180
+ cn
181
+ � n
182
+ pn
183
+
184
+ V ol(n, d − 1; pn),
185
+ where c is a positive real depending only on p, ǫ, τ.
186
+
187
+ 4
188
+ C. Sketch of the proofs and comparison with related works
189
+ Since the work of Jiang and Vardy [11], it is now well-known that one can lower-bound the size of a code via
190
+ the lower bound of the independence number of a locally sparse graph defined approximately. Loosely speaking, let
191
+ G be a graph with vertex set [q]n, where two vertices (vectors) x, y ∈ [q]n are connected by an edge if and only if
192
+ d(x, y) ≤ d − 1. Then, an independent set I of G corresponds to an (n, |I|, d)q-code. In fact, there is a one-to-one
193
+ correspondence between independent sets of G and codes in [q]n with minimum distance at least d. Therefore, given
194
+ the minimum distance d, finding a large code in [q]n is equivalent to finding a large independent set in G.
195
+ Since for every x ∈ [q]n, there are exactly V olq(n, d − 1) − 1 vectors y ∈ [q]n \ {x} such that d(x, y) ≤ d − 1,
196
+ every vertex of G is connected to exactly V olq(n, d − 1) − 1 vertices in [q]n. So, one can construct an independent set
197
+ in G of size
198
+ qn
199
+ V olq(n,d−1), or equivalently, an (n,
200
+ qn
201
+ V olq(n,d−1), d)q-code, by greedily picking vertices and throwing their
202
+ neighbors. This gives the GV bound (1).
203
+ Jiang and Vardy [11] showed that the graph G defined above is in fact “locally sparse” (this will be clarified later
204
+ in Section IV-A). Therefore, there is a more economic way than the greedy algorithm to find a large independent set in
205
+ G (see Lemma IV.1 below). This leads to their improvement on the GV bound of generic codes (1) by a linear factor of
206
+ n. Kim, Liu, and Tran [12] used a similar idea in their proof of (5), which improves the GV bound of constant weight
207
+ codes (4) by a linear factor of n.
208
+ The high level idea in the proofs of Theorems II.1 and II.2 will follow the above framework. However, as the codes
209
+ considered in this paper need not only to have large minimum distance but also to be hopping cyclic, the corresponding
210
+ graphs are not as neat as the graph G described above.
211
+ The proofs of Theorems II.1 and II.2 can be summarized as follows:
212
+ Step 1. define an appropriate graph GHCC (resp. GOOC) whose independent sets correspond to HCCs (resp. OOCs);
213
+ Step 2. show that GHCC (resp. GOOC) has sufficiently many vertices;
214
+ Step 3. show that GHCC (resp. GOOC) is in fact locally sparse;
215
+ Step 4. use known lower bound on the independence number of locally sparse graphs to show that GHCC (resp. GOOC)
216
+ has sufficiently large independent sets, and hence there exist sufficiently large HCCs (resp. OOCs).
217
+ Next, we would like to compare our work with some previous papers [11], [12], [16], [23]. On one hand, in
218
+ [11], [12], [23], G and its constant weight counterpart were used to prove improved GV-type bounds for generic codes
219
+ and constant weight codes, respectively. GHCC (resp. GOOC) defined in this paper is quite different from G (resp. its
220
+ constant weight counterpart). To be more precise, for x ∈ [q]n let
221
+ d(x) = min{dH(πi(x), πj(x)) : 0 ≤ i < j ≤ n − 1} = min{dH(x, πi(x)) : 1 ≤ i ≤ n − 1}
222
+ (7)
223
+ denote the minimum distance d(C(x)). By definition, C ⊆ [q]n is an HCC only if for every x ∈ C, d(x) ≥ 1 and
224
+ moreover, C is an (n, M, d)q-HCC only if for every x ∈ C, d(x) ≥ d. Therefore, compared with G whose vertex set
225
+ is [q]n, in the vertex set of GHCC we have to rule out all vectors x with d(x) < d. In fact, the vertex set of GHCC is
226
+ not vectors in [q]n but some well-defined subsets of vectors in [q]n. Hence, to execute Steps 1 and 2, we have to show
227
+ that for many vectors x ∈ [q]n, d(x) is quite large. Similar discussion works for GOOC. The details can be found in
228
+ Sections V and VI below.
229
+ On the other hand, to show that GHCC and GOOC are locally sparse, we will use some well-developed tools that
230
+ were continually improved in [11], [12], [23]. In particular, we will use two upper bounds on the intersection volume
231
+ of Hamming balls, which were proved in [12] to show that G and its constant weight counterpart are locally sparse.
232
+ Lastly, let us compare our work with [16]. Although [16] is not graph theoretic, an important step in their proof of
233
+ (3) was also to show that for qn − o(qn) vectors x ∈ [q]n, d(x) is quite large (see [16, Lemma III.4]). To do so, they
234
+ used some standard concentration inequality for martingales. In this paper, we used the McDiarmid’s inequality instead,
235
+ which makes our proof easier and gives a better control (upper bound) on the lower order term o(qn) (see Remark V.2
236
+ below).
237
+ A summary of previous mentioned GV-type bounds is presented in Table I.
238
+ The rest of this paper is organized as follows. In Section III we will mention two applications of Theorem II.1,
239
+ which gives new lower bounds for frequency hopping sequences sets and error-correcting weakly mutually uncorrelated
240
+ codes. In Section IV we will collect the tools that are used in Steps 1-4. In Section IV-A we will formally define locally
241
+ sparse graphs (this will be used in Step 1) and state a lower bound on its independence number (this will be used in Step
242
+ 4, see Lemma IV.1 below). In Section IV-B we will introduce the McDiarmid’s inequality (this will be used in Step 2,
243
+ see Lemma IV.2 below). In Section IV-C we will state two upper bounds on the intersection volume of Hamming balls
244
+
245
+ 5
246
+ TABLE I: A summary of GV-type bounds
247
+ GV-type lower bounds of M
248
+ Improved GV-type lower bounds of M
249
+ Generic (n, M, d)q-codes
250
+ qn
251
+ V olq(n,d−1) (1) ( see [7], [22])
252
+
253
+
254
+ nqn
255
+ V olq(n,d−1)
256
+
257
+ (2) (see [11], [23])
258
+ Non-linear (n, M, d)q-cyclic codes
259
+ (1−o(1))qn
260
+ V olq(n,d−1) (3) (see [9], [16])
261
+ cnqn
262
+ V olq(n,d−1) Theorem II.1 (this paper)
263
+ Constant weight (n, M, d; pn)-codes
264
+ � n
265
+ pn
266
+
267
+ V ol(n,d−1;pn) (4) ( see [14])
268
+
269
+
270
+ n
271
+ � n
272
+ pn
273
+
274
+ V ol(n,d−1;pn)
275
+
276
+ (5) (see [12])
277
+ Constant weight non-linear (n, M, d; pn)-cyclic codes
278
+ �n
279
+ w
280
+
281
+ −f(n,d,w)
282
+ n·V ol(n,d−1;w) (6) (see [1], [3], [24])
283
+ cn
284
+ � n
285
+ pn
286
+
287
+ V ol(n,d−1;pn) Theorem II.2 (this paper)
288
+ (this will be used in Step 3, see Lemmas IV.3 and IV.4 below). The proofs of Theorems II.1 and II.2 will be presented
289
+ in Sections V and VI respectively. We will conclude this paper in Section VII.
290
+ III. APPLICATIONS OF THE MAIN RESULTS
291
+ A. Frequency hopping sequences
292
+ In this subsection, we will present an application of Theorem II.1 to frequency hopping sequences. We will need
293
+ the following easy lemma.
294
+ Lemma III.1.
295
+ (i) For every x, y ∈ [q]n, x ∈ C(y) if and only if y ∈ C(x); moreover, C(x) = C(y) if and only if
296
+ x ∈ C(y).
297
+ (ii) Let C be an (n, M, d)q-HCC. Then n | M, and C can be partitioned into a pairwise disjoint union of M/n C(x)’s,
298
+ where x ∈ C.
299
+ Proof. Note that (i) follows straightforwardly from the definition of C(x). To prove (ii), it is not hard to check that the
300
+ relation ∼ on the set C defined by x ∼ y if C(x) = C(y) is an equivalence relation. By (i) and the definition of an
301
+ HCC, each equivalent class equals to C(x) for some x ∈ C, and hence consists of n distinct vectors. Therefore, (ii)
302
+ follows from the fact that the equivalent classes given by ∼ form a partition of C.
303
+ Let C be an (n, M, d)q-HCC. Given the lemma above, consider the partition of C formed by the equivalent classes
304
+ given by ∼. If we choose a representative element from each of these equivalent classes, then these representatives
305
+ form a set of frequency hopping sequences (FHSs for short). An FHS set obtained by an (n, M, d)q-HCC in the above
306
+ manner is denoted as an (n, M/n, n − d)q-FHS, which is a set F ⊆ [q]n with |F| = M/n such that
307
+ • for every x ∈ F and 0 < i ≤ n − 1, Hx,x(i) := n − dH(x, πi(x)) ≤ n − d;
308
+ • for every distinct x, y ∈ F and 0 ≤ i ≤ n − 1, Hx,y(i) := n − dH(x, πi(y)) ≤ n − d;
309
+ where Hx,x(i) and Hx,y(i) are known as the auto- and cross-Hamming correlation functions at time delay i (see [4],
310
+ [5], [16]). FHSs were designed for the transmission of radio signals and have been studied extensively. In fact, the work
311
+ of Niu et al. [16] was motivated by the study of FHSs.
312
+ Note that one can also define FHSs directly using the Hamming correlation functions. For the sake of saving space,
313
+ we will not formally state such a definition. It was observed in [4], [16] that the two definitions of FHSs are equivalent,
314
+ since there is a one-to-one correspondence between HCCs and FHSs. Based on such a correspondence and (3), Niu et
315
+ al. (see [16, Corollary III.6]) showed that for any absolute constant ǫ > 0 and λ ≥ n − (n − 2√n)(1 − 1/q − ǫ) there
316
+ exist (n, M, λ)q-FHSs with
317
+ M ≥
318
+ qn(1 − n2e− ǫ2(√n−2)
319
+ 2
320
+ )
321
+ n(V olq(n, n − λ − 1) − 1).
322
+ (8)
323
+ The following result improves (8) by a linear factor of n.
324
+ Proposition III.2. For positive integers n, q, λ and absolute reals τ, ǫ ∈ (0, 1 − 1/q) satisfying 1/q + ǫ ≤ λ/n ≤ 1 − τ,
325
+ there exist (n, M, λ)q-FHSs with
326
+ M ≥
327
+ cqn
328
+ V olq(n, n − λ − 1),
329
+
330
+ 6
331
+ where c is a positive real depending only on τ, ǫ, q.
332
+ Proof. This is an easy consequence of Lemma III.1 (ii), Theorem II.1, and the definition of FHSs.
333
+ B. Error-correcting weakly mutually uncorrelated codes
334
+ For 1 ≤ κ ≤ n, a code C ∈ [q]n is said to be a κ-weakly mutually uncorrelated code (WMUC for short) if for
335
+ all κ ≤ ℓ ≤ n − 1, no proper prefix of length ℓ of a codeword in C appears as a suffix of another codeword in C,
336
+ including itself. Formally speaking, C is a κ-WMUC if for every x, y ∈ C (possibly identical) and every κ ≤ ℓ ≤ n−1,
337
+ (x1, . . . , xℓ) ̸= (yn−ℓ+1, . . . , yn). A WMUC is said to be error-correcting if it has some sufficiently large minimum
338
+ distance.
339
+ WMUCs and error-correcting WMUCs were introduced by Yazdi, Kiah, Gabrys, and Milenkovic [20] as a technique
340
+ that allows random access to encoded DNA strands in DNA-based storage systems. The reader is referred to [20] for
341
+ more background.
342
+ The next result shows that HCCs have the bonus of being also WMUC.
343
+ Proposition III.3. For positive integers n, q, κ and absolute reals τ, ǫ ∈ (0, 1 − 1/q) satisfying 1/q + ǫ ≤ κ/n ≤ 1 − τ
344
+ there exist κ-WMU (n, M, n − κ + 1)q-codes with
345
+ M ≥
346
+ cqn
347
+ V olq(n, n − κ),
348
+ where c is a positive real depending only on τ, ǫ, q.
349
+ Proof. By Theorem II.1, under the assumption of the proposition, there exists an (n, M ′, n − κ + 1)q-HCC C′ ⊆ [q]n
350
+ with M ′ ≥
351
+ cnqn
352
+ V olq(n,n−κ), where c is a positive real depending only on τ, ǫ, q. By Lemma III.1 (ii), C′ can be partitioned
353
+ into a pairwise disjoint union of M ′/n C(x)’s. Just as the proof of Proposition III.2, let C be a subcode of C′ formed
354
+ by picking exactly one codeword from every C(x) in the partition. Then, C is an (n, M, n − κ + 1)q-code with
355
+ M ≥
356
+ cqn
357
+ V olq(n,n−κ).
358
+ It remains to show that C is also κ-WMU. Assume to the contrary that there exist x, y ∈ C (possibly identical)
359
+ such that for some κ ≤ ℓ ≤ n−1, the prefix (x1, . . . , xℓ) is identical to the suffix (yn−ℓ+1, . . . , yn). Note that {x, y} ⊆
360
+ C ⊆ C′. As C is an HCC, πn−ℓ(y) = (yn−ℓ+1, . . . , yn, y1, . . . , yn−ℓ) ∈ C′. As dH(x, πn−ℓ(y)) ≤ n − ℓ ≤ n − κ,
361
+ which is strictly less than the minimum distance of C′, we must have x = πn−ℓ(y). It implies that {x, y} ⊆ C(x) and
362
+ |C ∩ C(x)| ≥ 2, a contradiction.
363
+ IV. COLLECTION OF SOME USEFUL LEMMAS
364
+ In this section, we will collect the tools that are used in this paper.
365
+ A. Locally sparse graphs and their independent sets
366
+ In this subsection, we will introduce locally sparse graphs and a lower bound on their independence number. A
367
+ graph G = (V, E) consists of a vertex set V and an edge set E, where V is a finite set and E is a family of 2-subsets
368
+ of V . Two vertices u, v ∈ V are said to be connected by an edge if {u, v} ∈ E. Two connected vertices are called
369
+ neighbors. The set of neighbors of a vertex u in G is denoted by NG(u). The degree of a vertex u ∈ V in G, denoted
370
+ by degG(u), is the size of its neighborhood, i.e., degG(u) = |NG(u)|. Note that we will omit the subscript G in NG(u)
371
+ and degG(u) when the underlying graph G is clear from the context. The maximum degree of a graph is the maximum
372
+ degree among all of its vertices. For a subset S ⊆ V , the set of edges induced by S consists of all edges with both
373
+ endpoints in S, namely the edges {{u, v} ∈ E : u, v ∈ S}. A graph is called locally sparse if for every vertex, its
374
+ neighborhood induces only a limit number of edges.
375
+ Given a graph G = (V, E), a subset I ⊆ V is called an independent set of G if every two vertices in I are not
376
+ connected. The independence number of G, denoted by α(G), is the size of the maximum independent set of G. Using
377
+ the greedy algorithm mentioned in Section II-C, it is not hard to see that every graph with maximum degree D has an
378
+ independent set of size at least
379
+ |V |
380
+ D+1. Lemma IV.1 below, which is a direct consequence of [18, Corollary 1], presents
381
+ a better lower bound for the independence number of locally sparse graphs.
382
+
383
+ 7
384
+ Lemma IV.1.
385
+ [18, Corollary 1] Let G be a graph on n vertices with maximum degree at most D, where D → ∞ as
386
+ n → ∞. Suppose that for every vertex of G, its neighborhood induces at most D2
387
+ K edges, where 1 ≤ K ≤ D2 + 1. Then
388
+ α(G) ≥ (1 − o(1)) · |V |
389
+ D · ln(min{D, K}),
390
+ where o(1) → 0 as K → ∞.
391
+ B. McDiarmid’s inequality
392
+ We will make use of the powerful McDiarmid’s inequality, which, roughly speaking, states that a Lipschitz function
393
+ of random variables is concentrated around its expectation.
394
+ Lemma IV.2. [15] (McDiarmid’s inequality). Given sets X1, . . . , Xn, let X1, . . . , Xn be independent random variables
395
+ taking values in X1, . . . , Xn respectively. Let f : X1×· · ·×Xn → R be a mapping. If there exist constants c1, . . . , cn ∈ R
396
+ such that for each 1 ≤ i ≤ n,
397
+ sup
398
+ x′
399
+ i∈Xi,x1∈X1,...,xn∈Xn
400
+ |f(x1, . . . , xi, . . . , xn) − f(x1, . . . , x′
401
+ i, . . . , xn)| ≤ ci,
402
+ (i.e., changing the value of the i-th coordinate xi change the absolute value of f by at most ci), then for any t > 0,
403
+ Pr[f(X1, X2, . . . , Xn) − E[f(X1, X2, . . . , Xn)] ≤ −t] ≤ exp
404
+
405
+
406
+ 2t2
407
+ �n
408
+ i=1 c2
409
+ i
410
+
411
+ .
412
+ C. The intersection volume of two Hamming balls
413
+ We will need the following estimation on the intersection volume of two Hamming balls.
414
+ Lemma IV.3.
415
+ [12, Lemma 4.2] For positive integers n, q, d and two absolute reals τ, ǫ ∈ (0, 1 − 1/q) satisfying
416
+ τ ≤ d/n ≤ 1 − 1/q − ǫ, we have that
417
+ V olq(n, d − τn/2)
418
+ V olq(n, d − 1)
419
+ ≤ e−Ωτ,q(1)·n.
420
+ Moreover, for every x, y ∈ [q]n,
421
+ |B(x, d − 1) ∩ B(y, d − 1)|
422
+ V olq(n, d − 1)
423
+ = e−Ωτ,q(1)·d(x,y).
424
+ Similar upper bounds can also be proved for the intersection volume of two constant weight Hamming balls.
425
+ Lemma IV.4.
426
+ [12, Lemma 4.3] Given positive integers n, d, and reals p ∈ (0, 1), ǫ ∈ (0, 1/10), τ ∈ (0, p(1 − p))
427
+ satisfying τ ≤ d/n ≤ (1 − ǫ)p(1 − p). Then
428
+ V ol(n, d − τn/2; pn)
429
+ V ol(n, d − 1; pn)
430
+ ≤ 2e−Ωǫ,τ (1)n.
431
+ Moreover, for every x, y ∈ {0, 1}n with Hamming weight pn,
432
+ |B(x, d − 1; pn) ∩ B(y, d − 1; pn)|
433
+ V ol(n, d − 1; pn)
434
+ = 2e−Ωǫ(1)·(d(x,y)+d(x,y)2/(d−1)).
435
+ V. PROOF OF THEOREM II.1
436
+ Given two reals τ, ǫ ∈ (0, 1 − 1/q), the goal of Theorem II.1 is to show the existence of large (n, M, d)q-HCCs
437
+ whenever τ ≤ d/n ≤ 1 − 1/q − ǫ. The proof of Theorem II.1 will follow the steps outlined in Section II-C. First of
438
+ all, note that an (n, M, d)q-code C is an (n, M, d)q-HCC only if for every x ∈ C, d(x) ≥ d (recall (7)). Therefore, to
439
+ construct large HCCs, we need to show the existence of a large set A ⊆ [q]n such that for each x ∈ A, d(x) ≥ d. Such
440
+ a set A in fact exists, as shown by the next lemma.
441
+ Lemma V.1. Let n, q be positive integers and ǫ ∈ (0, 1 − 1/q) be a real. Let
442
+ A = {x ∈ [q]n : d(x) > n(1 − 1/q − ǫ)}.
443
+
444
+ 8
445
+ Then
446
+ |A| ≥ qn
447
+
448
+ 1 − (n − 1) exp(−ǫ2n
449
+ 2 )
450
+
451
+ .
452
+ Proof. Let X = (X1, . . . , Xn) be a uniformly chosen random element of [q]n. To prove the lemma, it is enough to
453
+ show that
454
+ Pr[d(X) ≤ n(1 − 1/q − ǫ)] ≤ (n − 1) exp(−ǫ2n
455
+ 2 ).
456
+ (9)
457
+ Recall that d(X) = min{d(X, πi(X)) : 1 ≤ i ≤ n − 1}, where πi(X) = (Xi+1, . . . , Xi+n). By the union bound,
458
+ Pr[d(X) ≤ n(1 − 1/q − ǫ)] = Pr[∃ 1 ≤ i ≤ n − 1 s.t. d(X, πi(X)) ≤ n(1 − 1/q − ǫ)]
459
+
460
+ n−1
461
+
462
+ i=1
463
+ Pr[d(X, πi(X)) ≤ n(1 − 1/q − ǫ)].
464
+ According to the discussion above, to prove (9) it suffices to show that for every fixed 1 ≤ i ≤ n − 1,
465
+ Pr[d(X, πi(X)) ≤ n(1 − 1/q − ǫ)] ≤ exp(−ǫ2n
466
+ 2 ).
467
+ Note that choosing X = (X1, . . . , Xn) ∈ [q]n uniformly at random is equivalent to choosing X1, . . . , Xn ∈ [q] uniformly
468
+ and independently at random. Let
469
+ δ : [q] × [q] → {0, 1}
470
+ denote the Kronecker function such that for a, b ∈ [q], δ(a, b) = 1 if a = b and δ(a, b) = 0 if a ̸= b. It is straightforward
471
+ to check by definition that for every x ∈ [q]n,
472
+ d(x, πi(x)) = n −
473
+ n
474
+
475
+ j=1
476
+ δ(xj, xj+i).
477
+ (10)
478
+ We will apply Lemma IV.2 with f(x1, . . . , xn) := d(x, πi(x)). Observe that for every 1 ≤ j ≤ n, changing the
479
+ value of xj could only change the values of δ(xj−i, xj) and δ(xj, xj+i) in the right hand side of (10), which in turn
480
+ changes the absolute value of d(x, πi(x)) and hence f by at most 2. In other words, for every 1 ≤ j ≤ n,
481
+ sup
482
+ x′
483
+ j,x1,...,xn∈[q]
484
+ |f(x1, . . . , xj, . . . , xn) − f(x1, . . . , x′
485
+ j, . . . , xn)| ≤ 2.
486
+ (11)
487
+ Moreover, by the linearity of expectation, it is easy to see that for every 1 ≤ i ≤ n−1 and 1 ≤ j ≤ n, E(δ(Xj, Xj+i)) =
488
+ 1/q, which implies that E[f(X1, . . . , Xn) = n(1 − 1/q). Applying Lemma IV.2 to f, we obtain
489
+ Pr [d(X, πi(X)) − n(1 − 1/q) ≤ −ǫn] ≤ exp(−ǫ2n
490
+ 2 ).
491
+ Plugging the above inequality to the aforementioned union bound proves (9), and hence Lemma V.1.
492
+ Remark V.2. Using a standard concentration inequality for martingales, [16, Lemma III.4] proved a slightly weaker
493
+ result
494
+ |{x ∈ [q]n : d(x) > (n − 2√n)(1 − 1/q − ǫ)}| ≥ qn
495
+
496
+ 1 − n2e− ǫ2(√n−2)
497
+ 2
498
+
499
+ .
500
+ Remark V.3. It is not hard to check by definition that A is an HCC with minimum distance, say 1. Therefore, similarly
501
+ to the proof of Lemma III.1 (ii), one can show that with the equivalence relation ∼, A can be partitioned into a family
502
+ V of equivalent classes such that every equivalent class consists of exactly n distinct vectors of [q]n. It follows by
503
+ Lemma V.1 that
504
+ |V | = |A|
505
+ n ≥ 1
506
+ n · qn
507
+
508
+ 1 − (n − 1) exp(−ǫ2n
509
+ 2 )
510
+
511
+ .
512
+ (12)
513
+ Moreover, by the definition of A we have that for every C(x) ∈ V ,
514
+ d(x) > n(1 − 1/q − ǫ),
515
+ (13)
516
+
517
+ 9
518
+ and for every distinct C(x), C(y) ∈ V ,
519
+ C(x) ∩ C(y) = ∅.
520
+ (14)
521
+ To prove Theorem II.1, we will construct an auxiliary graph on the vertex set V , and then apply Lemma IV.1 to
522
+ this graph, as detailed below.
523
+ Lemma V.4. With the notation of Theorem II.1, fixing some d ∈ [τn, n(1 − 1/q − ǫ)], let GHCC = (V, E) be a graph
524
+ constructed as below, where V is the family of equivalent classes that partition A, and two distinct vertices (or equivalent
525
+ classes) C(x), C(y) ∈ V form an edge in E if and only if
526
+ d(C(x), C(y)) = min{d(xi, yj) : 0 ≤ i, j ≤ n − 1} ≤ d − 1.
527
+ Then the following holds:
528
+ (i) for every independent set I ⊆ V , the set of vectors C := �
529
+ C(x)∈I C(x) forms an (n, n|I|, d)q-HCC;
530
+ (ii) the maximum degree of GHCC is at most D := V olq(n, d − 1);
531
+ (iii) for every vertex of GHCC, its neighborhood induces at most D2
532
+ K edges, where K = eΩτ,q(1)·n.
533
+ Proof. To prove (i), note first that for every C(x) ∈ V , C(x) consists of n distinct vectors, which implies that C is
534
+ indeed an HCC. Moreover, it follows by (14) that |C| = n|I|. Lastly, to prove that d(C) ≥ d, let c1, c2 ∈ C be two
535
+ distinct codewords. On one hand, if {c1, c2} ⊆ C(x) for some C(x) ∈ I ⊆ V , then by (13) we have
536
+ d(c1, c2) ≥ d(x) > n(1 − 1/q − ǫ) ≥ d.
537
+ On the other hand, if c1 ∈ C(x) and c2 ∈ C(y) for distinct C(x), C(y) ∈ I, then as I is an independence set in G,
538
+ we have
539
+ d(c1, c2) ≥ d(C(x), C(y)) ≥ d,
540
+ completing the proof of (i).
541
+ To prove (ii), note that for every C(x) ∈ V ,
542
+ deg(C(x)) = |{C(y) ∈ V \ {C(x)} : d(C(x), C(y)) ≤ d − 1}|
543
+ = |{C(y) ∈ V \ {C(x)} :
544
+ min
545
+ 0≤i≤n−1 d(x, πi(y)) ≤ d − 1}|
546
+ = |{C(y) ∈ V \ {C(x)} : ∃ i ∈ [n] s.t. πi(y) ∈ B(x, d − 1)}|
547
+ ≤ |B(x, d − 1)| = D,
548
+ as needed.
549
+ To prove (iii), fixing a vertex C(x) ∈ V , let Γ denote the subgraph induced by the neighborhood of C(x). Partition
550
+ V (Γ) = S ∪ T , where
551
+ S = {C(y) ∈ V (Γ) : d(C(x), C(y)) ≤ d − τn/2}
552
+ and
553
+ T = {C(y) ∈ V (Γ) : d − τn/2 < d(C(x), C(y)) ≤ d − 1}.
554
+ We have the following claim.
555
+ Claim V.5. There exists some K = eΩτ,q(1)·n such that |S| ≤ D/K, and for every vertex C(y) ∈ T , degΓ(C(y)) ≤
556
+ D/K.
557
+ Given the correctness of the claim, it follows that
558
+ |E(Γ)| = 1
559
+ 2
560
+
561
+  �
562
+ C(y)∈S
563
+ degΓ(C(y)) +
564
+
565
+ C(y)∈T
566
+ degΓ(C(y))
567
+
568
+
569
+ ≤ 1
570
+ 2
571
+
572
+ |S| · D + |T | · D
573
+ K
574
+
575
+ ≤ D2
576
+ K ,
577
+ completing the proof of (iii).
578
+ It remains to prove Claim V.5.
579
+
580
+ 10
581
+ Proof of Claim V.5. To prove the first inequality, observe that
582
+ |S| = |{C(y) ∈ V (Γ) : d(C(x), C(y)) ≤ d − τn/2}|
583
+ = |{C(y) ∈ V (Γ) :
584
+ min
585
+ 0≤i≤n−1 d(x, πi(y)) ≤ d − τn/2}|
586
+ = |{C(y) ∈ V (Γ) : ∃ i ∈ [n] s.t. πi(y) ∈ B(x, d − τn/2)}|
587
+ ≤ |B(x, d − τn/2)| = V olq(n, d − τn/2).
588
+ Therefore,
589
+ |S|
590
+ D ≤ V olq(n, d − τn/2)
591
+ V olq(n, d − 1)
592
+ ≤ e−Ωτ,q(1)·n,
593
+ (15)
594
+ where the last inequality follows by the first equation of Lemma IV.3.
595
+ To prove the second inequality, note that for every C(y) ∈ T , we have
596
+ NΓ(C(y)) = N(C(x)) ∩ N(C(y))
597
+ = {C(v) ∈ V \ {C(x), C(y)} : d(C(v), C(x)) ≤ d − 1, d(C(v), C(y)) ≤ d − 1}
598
+ = {C(v) ∈ V \ {C(x), C(y)} :
599
+ min
600
+ 0≤i≤n−1 d(v, πi(x)) ≤ d − 1,
601
+ min
602
+ 0≤j≤n−1 d(v, πj(y)) ≤ d − 1}
603
+ = {C(v) ∈ V \ {C(x), C(y)} : ∃ 0 ≤ i, j ≤ n − 1 s.t. v ∈ B(πi(x), d − 1) ∩ B(πj(y), d − 1)},
604
+
605
+
606
+ C(v) ∈ V : v ∈
607
+
608
+ 0≤i,j≤n−1
609
+ B(πi(x), d − 1) ∩ B(πj(y), d − 1)
610
+
611
+ ,
612
+ which implies that
613
+ |NΓ(C(y))| ≤
614
+
615
+ 0≤i,j≤n−1
616
+ |B(πi(x), d − 1) ∩ B(πj(y), d − 1)|.
617
+ It thus follows that
618
+ degΓ(C(y))
619
+ D
620
+ =
621
+ |NΓ(C(y))|
622
+ V olq(n, d − 1) ≤
623
+
624
+ 0≤i,j≤n−1 |B(πi(x), d − 1) ∩ B(πj(y), d − 1)|
625
+ V olq(n, d − 1)
626
+ =
627
+
628
+ 0≤i,j≤n−1
629
+ B(πi(x), d − 1) ∩ B(πj(y), d − 1)
630
+ V olq(n, d − 1)
631
+
632
+
633
+ 0≤i,j≤n−1
634
+ e−Ωτ,q(1)·d(πi(x),πj(y))
635
+ ≤ n2 · e−Ωτ,q(1)·n = e−Ωτ,q(1)·n,
636
+ (16)
637
+ where the last two inequalities follows from the second equation of Lemma IV.3 and the assumption that d(πi(x), πj(y)) ≥
638
+ d(C(x), C(y)) ≥ d ≥ τn.
639
+ The claim follows straightforwardly by combining (15) and (16).
640
+ We proceed to present the proof of Theorem II.1.
641
+ Proof of Theorem II.1. Let GHCC = (V, E) be the graph defined in Lemma V.4. Applying Lemma IV.1 in concert with
642
+ (12) and Lemma V.4 (ii), (iii) yields that
643
+ α(GHCC) ≥ (1 − o(1)) · |V |
644
+ D · ln(min{D, K})
645
+ ≥ (1 − o(1)) · qn
646
+ n ·
647
+ 1
648
+ V olq(n, d − 1) · ln(min{V olq(n, d − 1), eΩτ,q(n)})
649
+
650
+ cqn
651
+ V olq(n, d − 1),
652
+ where c is a constant independent of n. Therefore, according to Lemma V.4 (i), there exist (n, M, d)q-HCCs with
653
+ M ≥ n · α(GHCC), completing the proof of the theorem.
654
+
655
+ 11
656
+ VI. PROOF OF THEOREM II.2
657
+ Given reals p ∈ (0, 1), ǫ ∈ (0, 1/10), τ ∈ (0, p(1 − p), the aim of Theorem II.2 is to show the existence of large
658
+ (n, M, d; pn)-OOCs whenever τ ≤ d/n ≤ (1 − ǫ)p(1 − p). For pn ∈ Z+, let
659
+ �[n]
660
+ pn
661
+
662
+ = {x ∈ {0, 1}n : wt(x) = pn}. Note
663
+ that an (n, M, d; pn)-code C is an (n, M, d; pn)-OOC only if for every x ∈ C, d(x) ≥ d. Similarly to the discussion
664
+ at the beginning of Section V, to construct large OOCs we need to show the existence of a large set B ⊆
665
+ �[n]
666
+ pn
667
+
668
+ such
669
+ that for each x ∈ B, d(x) ≥ d. The proof of this result is in the spirit similar to that of Lemma V.1 but technically a
670
+ bit more involved.
671
+ Lemma VI.1. Let ǫ > 0, 0 < p < 1 be reals and n be a positive integer. Let
672
+ B = {x ∈
673
+ �[n]
674
+ pn
675
+
676
+ : d(x) > (1 − ǫ)np(1 − p)}.
677
+ Then
678
+ |B| ≥
679
+ � n
680
+ pn
681
+ � �
682
+ 1 − n3/2 exp
683
+
684
+ − Ωp,ǫ(1) · n
685
+ 2
686
+ ��
687
+ .
688
+ Proof. Let X = (X1, . . . , Xn) ∈ {0, 1}n be a random vector, where X1, . . . , Xn are n independent Bernoulli random
689
+ variables such that for 1 ≤ i ≤ n, Pr[Xi = 1] = p and Pr[Xi = 0] = 1 − p. For the ease of notation, let µ = np(1 − p).
690
+ By the law of conditional probability,
691
+ Pr[d(X) ≤ (1 − ǫ)µ|wt(x) = pn] = Pr[d(X) ≤ (1 − ǫ)µ ∧ wt(x) = pn]
692
+ Pr[wt(x) = pn]
693
+ =
694
+ � n
695
+ pn
696
+
697
+ − |B|
698
+ � n
699
+ pn
700
+
701
+ .
702
+ To prove the lemma, it is enough to show that
703
+ Pr[d(X) ≤ (1 − ǫ)µ|wt(x) = pn] ≤ n3/2 exp
704
+
705
+ − Ωp,ǫ(1) · n
706
+ 2
707
+
708
+ .
709
+ Recall that d(X) = min{1 ≤ i ≤ n − 1 : d(X, πi(X))}, where πi(X) = (Xi+1, . . . , Xi). Then,
710
+ Pr[d(X) ≤ (1 − ǫ)µ|wt(X) = pn]
711
+ = Pr[∃ 1 ≤ i ≤ n − 1 s.t. d(X, πi(X)) ≤ (1 − ǫ)µ|wt(X) = pn]
712
+
713
+ n−1
714
+
715
+ i=1
716
+ Pr[d(X, πi(X)) ≤ (1 − ǫ)µ|wt(X) = pn]
717
+ =
718
+ n−1
719
+
720
+ i=1
721
+ Pr[d(X, πi(X)) ≤ (1 − ǫ)µ ∧ wt(x) = pn]
722
+ Pr[wt(x) = pn]
723
+
724
+ n−1
725
+
726
+ i=1
727
+ Pr[d(X, πi(X)) ≤ (1 − ǫ)µ]
728
+ Pr[wt(X) = pn]
729
+
730
+ �n−1
731
+
732
+ i=1
733
+ Pr[d(X, πi(X)) ≤ (1 − ǫ)µ]
734
+
735
+ ·
736
+
737
+ 2πnp(1 − p) · ℓ(n),
738
+ with ℓ(n) = exp(−
739
+ 1
740
+ 12n+1 +
741
+ 1
742
+ 12pn +
743
+ 1
744
+ 12(1−p)n), where the first inequality follows by the union bound, and the last
745
+ inequality follows from the fact that
746
+ Pr[wt(X) = pn] =
747
+ � n
748
+ pn
749
+
750
+ ppn(1 − p)(1−p)n
751
+ and Stirling’s approximation
752
+ � n
753
+ pn
754
+
755
+ ppn(1 − p)(1−p)n ≥
756
+ 1
757
+
758
+ 2πnp(1 − p)
759
+ · exp(
760
+ 1
761
+ 12n + 1 −
762
+ 1
763
+ 12pn −
764
+ 1
765
+ 12(1 − p)n).
766
+ According to the discussion above, to prove the lemma it suffices to show that for every fixed 1 ≤ i ≤ n − 1,
767
+ Pr[d(X, πi(X)) ≤ (1 − ǫ)µ] ≤ exp(−Ωp,ǫ(1) · n
768
+ 2
769
+ ).
770
+
771
+ 12
772
+ Similarly to the proof of Lemma V.1, we will apply Lemma IV.2 with f(x1, . . . , xn) := d(x, πi(x)) = n−�n
773
+ j=1 δ(xj, xj+i).
774
+ As for every i ̸= j, E[δ(Xi, Xj)] = p2 + (1 − p)2, by the linearity of expectation we have that E[f(X1, X2, . . . , Xn)] =
775
+ 2np(1 − p) = 2µ. Given (11), applying Lemma IV.2 to f yields that
776
+ Pr [d(X, πi(X)) − 2µ ≤ −(1 + ǫ)µ] ≤ exp
777
+
778
+ − (1 + ǫ)2p2(1 − p)2n
779
+ 2
780
+
781
+ = exp
782
+
783
+ − Ωp,ǫ(1) · n
784
+ 2
785
+
786
+ ,
787
+ and then we have arrived at the desired conclusion.
788
+ Similarly to the discussion in Remark V.3, the set B obtained by Lemma VI.1 can be partitioned into a family V
789
+ of pairwise disjoint equivalent classes, where
790
+ |V | = |B|
791
+ n ≥ 1
792
+ n ·
793
+ � n
794
+ pn
795
+ � �
796
+ 1 − n3/2 exp(−Ωp,ǫ(1)n
797
+ 2
798
+ )
799
+
800
+ .
801
+ (17)
802
+ To prove Theorem II.2, we will construct an auxiliary graph on the vertex set V , as detailed below.
803
+ Lemma VI.2. Given d ∈ [τn, (1 − ǫ)np(1 − p)], let GOOC = (V, E) be a graph constructed as below, where V is the
804
+ family of equivalent classes that partition B, and two distinct vertices C(x), C(y) ∈ V are connected if and only if
805
+ d(C(x), C(y)) ≤ d − 1. Then the following holds:
806
+ (i) for every independent set I ⊆ V , the set of vectors C := �
807
+ C(x)∈I C(x) forms an (n, n|I|, d; pn)-OOC;
808
+ (ii) the maximum degree of GOOC is at most D := V ol(n, d − 1; pn);
809
+ (iii) for every vertex of GOOC, its neighborhood induces at most D2
810
+ K edges, where K = eΩτ,ǫ(1)·n.
811
+ As the proof of Lemma VI.2 is very similar to that of Lemma V.4, we will put it in Appendix.
812
+ Next we present the proof of Theorem II.2.
813
+ Proof of Theorem II.2. Let GOOC = (V, E) be the graph defined in Lemma VI.2. Then, applying Lemma IV.1 in concert
814
+ with (17) and Lemma VI.2 (ii), (iii) yields that
815
+ α(GOOC) ≥ (1 − o(1)) · |V |
816
+ D · ln(min{D, K})
817
+ ≥ (1 − o(1)) · 1
818
+ n ·
819
+ � n
820
+ pn
821
+
822
+ ·
823
+ 1
824
+ V ol(n, d − 1; pn) · ln(min{V ol(n, d − 1; pn), eΩτ,ǫ(n)})
825
+
826
+ c
827
+ � n
828
+ pn
829
+
830
+ V ol(n, d − 1; pn),
831
+ where c is a constant independent of n. Therefore, according to Lemma VI.2 (i), there exist (n, M, d; pn)-OOCs with
832
+ M ≥ n · α(GOOC), completing the proof of the theorem.
833
+ VII. CONCLUSIONS
834
+ In this paper we present improved GV-type bounds for hopping cyclic codes and optical orthogonal codes, which in
835
+ turn give improved GV-type bounds for non-linear cyclic codes and non-linear constant weight cyclic codes, respectively.
836
+ Several interesting problems remain open.
837
+ Question VII.1. It is known that for prime power q ≥ 49, there exist a class of codes, called algebraic geometry codes,
838
+ that can significantly improve the GV bound (1) by an exponential power exp(Ω(n)) ( see [10], [21]). Does such an
839
+ improvement hold also for (non-linear) cyclic codes? What about constant weight cyclic codes?
840
+ Question VII.2. All of the results mentioned in this paper are non-constructive. Can we explicitly construct a class of
841
+ asymptotically good (non-linear) cyclic codes? Or more precisely, can we present Zyablov-type bounds for (non-linear)
842
+ cyclic codes? What about constant weight cyclic codes?
843
+ ACKNOWLEDGEMENTS
844
+ The first two authors would like to thank Prof. Yanxun Chang for an inspiring talk on constant weight cyclic codes.
845
+
846
+ 13
847
+ REFERENCES
848
+ [1] F. R. K. Chung, J. A. Salehi, and V. K. Wei, “Optical orthogonal codes: design, analysis, and applications,” IEEE Trans. Inform. Theory,
849
+ vol. 35, no. 3, pp. 595–604, 1989.
850
+ [2] J.-H. Chung and K. Yang, “Asymptotically optimal optical orthogonal codes with new parameters,” IEEE Trans. Inform. Theory, vol. 59, no. 6,
851
+ pp. 3999–4005, 2013.
852
+ [3] Chung, Fan R. K. and Salehi, Jawad A. and Wei, Victor K., “Correction to: “Optical orthogonal codes: design, analysis, and applications” [IEEE
853
+ Trans. Inform. Theory 35 (1989), no. 3, 595–604; MR1022081 (91g:94032)],” IEEE Trans. Inform. Theory, vol. 38, no. 4, p. 1429, 1992.
854
+ [4] C. Ding, R. Fuji-Hara, Y. Fujiwara, M. Jimbo, and M. Mishima, “Sets of frequency hopping sequences: Bounds and optimal constructions,”
855
+ IEEE Trans. Inform. Theory, vol. 55, no. 7, pp. 3297–3304, 2009.
856
+ [5] C. Ding, Y. Yang, and X. Tang, “Optimal sets of frequency hopping sequences from linear cyclic codes,” IEEE Trans. Inform. Theory, vol. 56,
857
+ no. 7, pp. 3605–3612, 2010.
858
+ [6] S. Dougherty, J.-L. Kim, and P. Sol´e, “Open problems in coding theory,” in Noncommutative rings and their applications, ser. Contemp. Math.
859
+ Amer. Math. Soc., Providence, RI, 2015, vol. 634, pp. 79–99.
860
+ [7] E. N. Gilbert, “A comparison of signalling alphabets,” The Bell System Technical Journal, vol. 31, no. 3, pp. 504–522, 1952.
861
+ [8] I. Haviv, M. Langberg, M. Schwartz, and E. Yaakobi, “Non-linear cyclic codes that attain the gilbert-varshamov bound,” in 2017 IEEE
862
+ International Symposium on Information Theory (ISIT), 2017, pp. 586–588.
863
+ [9] Haviv, Ishay and Langberg, Michael and Schwartz, Moshe and Yaakobi, Eitan, “Non-linear cyclic codes that attain the gilbert-varshamov bound,”
864
+ in 2017 IEEE International Symposium on Information Theory (ISIT), 2017, pp. 586–588.
865
+ [10] T. Høholdt, J. van Lint, and G. Pellikaan, Algebraic geometry codes.
866
+ Netherlands: Elsevier, 1998, pp. 871–961.
867
+ [11] T. Jiang and A. Vardy, “Asymptotic improvement of the Gilbert-Varshamov bound on the size of binary codes,” IEEE Trans. Inform. Theory,
868
+ vol. 50, no. 8, pp. 1655–1664, 2004.
869
+ [12] J. Kim, H. Liu, and T. Tran, “Exponential decay of intersection volume with applications on list-decodability and gilbert-varshamov type bound,”
870
+ arXiv preprint arXiv:2112.11274 2021.
871
+ [13] L. Lan, Y. Chang, and L. Wang, “Cyclic constant-weight codes: upper bounds and new optimal constructions,” IEEE Trans. Inform. Theory,
872
+ vol. 62, no. 11, pp. 6328–6341, 2016.
873
+ [14] V. I. Levenshtein, “Upper-bound estimates for fixed-weight codes,” Problemy Peredachi Informatsii, vol. 7, pp. 3–12, 1971.
874
+ [15] C. McDiarmid, On the method of bounded differences, ser. London Mathematical Society Lecture Note Series.
875
+ Cambridge University Press,
876
+ 1989, pp. 148–188.
877
+ [16] X. Niu, C. Xing, and C. Yuan, “Asymptotic Gilbert-Varshamov bound on frequency hopping sequences,” IEEE Trans. Inform. Theory, vol. 66,
878
+ no. 2, pp. 1213–1218, 2020.
879
+ [17] R. Pan and Y. Chang, “Combinatorial constructions for maximum optical orthogonal signature pattern codes,” Discrete Math., vol. 313, no. 24,
880
+ pp. 2918–2931, 2013.
881
+ [18] F. Pirot and E. Hurley, “Colouring locally sparse graphs with the first moment method,” arXiv preprint arXiv:2109.15215v3, 2021.
882
+ [19] R. Roth, Introduction to Coding Theory.
883
+ Cambridge University Press, 2006.
884
+ [20] S. M. H. Tabatabaei Yazdi, H. M. Kiah, R. Gabrys, and O. Milenkovic, “Mutually uncorrelated primers for dna-based data storage,” IEEE Trans.
885
+ Inform. Theory, vol. 64, no. 9, pp. 6283–6296, 2018.
886
+ [21] M. A. Tsfasman, S. G. Vl˘adut¸, and T. Zink, “Modular curves, Shimura curves, and Goppa codes, better than Varshamov-Gilbert bound,” Math.
887
+ Nachr., vol. 109, pp. 21–28, 1982.
888
+ [22] R. Varshamov, “Estimate of the number of signals in error correcting codes,” Doklady Akadamii Nauk, vol. 117, pp. 739–741, 1957.
889
+ [23] V. Vu and L. Wu, “Improving the Gilbert-Varshamov bound for q-ary codes,” IEEE Trans. Inform. Theory, vol. 51, no. 9, pp. 3200–3208, 2005.
890
+ [24] G.-C. Yang and T. Fuja, “Optical orthogonal codes with unequal auto- and cross-correlation constraints,” IEEE Trans. Inform. Theory, vol. 41,
891
+ no. 1, pp. 96–106, 1995.
892
+ VIII. APPENDIX: PROOF OF LEMMA VI.2
893
+ Proof of Lemma VI.2. Note that given the proofs of the first two items of Lemma V.4, Lemma VI.2 (i) and (ii) can be
894
+ proved easily, so we omit both proofs for clarity. To prove (iii), let Γ, S, and T be defined as in the proof of Lemma V.4.
895
+ Then, it suffices to show that Claim V.5 holds also under the setting of Lemma VI.2.
896
+ Claim VIII.1 (restatement of Claim V.5). There exists some K = eΩτ,ǫ,p(1)·n such that |S| ≤ D/K, and for every
897
+ vertex C(y) ∈ T , degΓ(C(y)) ≤ D/K.
898
+ To prove the first part of the claim, note that
899
+ |S|
900
+ D = |{C(y) ∈ V (Γ) : d(C(x), C(y)) ≤ d − τn/2}|
901
+ D
902
+ ≤ V ol(n, d − τn/2; pn)
903
+ V ol(n, d − 1; pn)
904
+ ≤ 2e−Ωτ,ǫ(1)n,
905
+ (18)
906
+ where the first inequality follows from the same technique that proves the first inequality in (15), and the second
907
+ inequality follows by the first equation of Lemma IV.4.
908
+ As for the second part of the claim, using the same strategy that proves (16) one can show that for every C(y) ∈ T ,
909
+
910
+ 14
911
+ degΓ(C(y))
912
+ D
913
+ =
914
+ |NΓ(C(y))|
915
+ V ol(n, d − 1; pn) ≤
916
+
917
+ 0≤i,j≤n−1 |B(πi(x), d − 1) ∩ B(πj(y), d − 1)|
918
+ V ol(n, d − 1; pn)
919
+ =
920
+
921
+ 0≤i,j≤n−1
922
+ B(πi(x), d − 1; pn) ∩ B(πj(y), d − 1)
923
+ V olq(n, d − 1; pn)
924
+
925
+
926
+ 0≤i,j≤n−1
927
+ e−Ωǫ(1)·(d(πi(x),πj(y))+d(πi(x),πj(y))2/(d−1))
928
+ ≤ n2 · e−Ωτ,ǫ,p(1)·n = e−Ωτ,ǫ,p(1)·n,
929
+ (19)
930
+ where the last two inequalities follows from the second equation of Lemma IV.4 and the assumption that d(πi(x), πj(y)) ≥
931
+ d(C(x), C(y)) ≥ d ≥ τn.
932
+ The claim follows straightforwardly by combining (18) and (19).
933
+
aNA0T4oBgHgl3EQfF__0/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
btAyT4oBgHgl3EQf-PpJ/content/tmp_files/2301.00888v1.pdf.txt ADDED
@@ -0,0 +1,1015 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ SAFEMYRIDES: Application of Decentralized Control Edge-Computing to
2
+ Ridesharing Monitoring Services
3
+
4
+ Samaa Elnagar1*, Manoj A. Thomas2, Kweku-Muata Osei-Bryson3
5
+ 1Howard University, 2University Of Sydney, 3Virginia Commonwealth University
6
+
7
+
8
+
9
+
10
+ Abstract
11
+ Edge computing is changing the face of many industries and services. Common edge computing models offload
12
+ computing which is prone to security risks and privacy violation. However, advances in deep learning enabled Internet
13
+ of Things (IoTs) to take decisions and run cognitive tasks locally. This research introduces a decentralized-control
14
+ edge model where most computation and decisions are moved to the IoT level. The model aims at decreasing
15
+ communication to the edge which in return enhances efficiency and decreases latency. The model also avoids data
16
+ transfer which raises security and privacy risks. To examine the model, we developed SAFEMYRIDES, a scene-aware
17
+ ridesharing monitoring system where smart phones are detecting violations at the runtime. Current real-time
18
+ monitoring systems are costly and require continuous network connectivity. The system uses optimized deep learning
19
+ that run locally on IoTs to detect violations in ridesharing and record violation incidences. The system would enhance
20
+ safety and security in ridesharing without violating privacy.
21
+
22
+ Keywords: Decentralized control; Edge Computing; Deep Learning; Internet of Things; Ridesharing; Monitoring, Privacy.
23
+ Highlights
24
+
25
+ A shift is needed towards decentralized control for IoTs to decrease computational costs and maintain privacy.
26
+
27
+ Technologies such as Deep learning for IoTs and decision support could be used to detect ridesharing violations
28
+ locally on smartphones.
29
+
30
+ Monitoring ridesharing sessions is technically and socially challenging.
31
+
32
+ The system doesn’t record the entire ridesharing session, but it only records violation incidents.
33
+
34
+ The system enhances the ridesharing services by ensuring privacy, responsiveness, accuracy, and efficiency.
35
+ 1
36
+ Introduction
37
+ On the one hand edge computing led to huge reduction in communication cost and speedup computation (T. Wang,
38
+ 2020). However, with tens of IoTs trying to connect single edge node, computation bottlenecks and delays are still
39
+ problems. Moreover, edge computing didn’t fully address security and privacy issues (T. Wang, 2020). On the other
40
+ hand, little research has focused on moving and computation and decentralizing decisions to IoTs (Elnagar & Thomas,
41
+ 2020). What inspire decentralized edge-models that smartphones' specifications as the Internet of Things (IoT) are
42
+ continuously enhanced while the cost is fairly decreasing (El Khaddar & Boulmalf, 2017). Moreover, optimized deep
43
+ learning models could run on the limited processing, batteries, and memory of IoTs to provide stand-alone decision-
44
+ making and cognitive tasks (Elnagar & Thomas, 2020). Decentralizing control and federating the computation at the
45
+ IoT level will minimize security, privacy and latency risks that emerge from transferring data to other computation
46
+ nodes (Li & Taeihagh).
47
+ One of the IoT applications that can’t contemplate privacy and decision latency is the ridesharing service where safety
48
+ is a significant concern (Feeney, 2015). Some countries in Europe and developing parts of the world report ridesharing
49
+ to be comparatively unsafe (Chaudhry, El-Amine, & Shakshuki, 2018), which suggests the dire need of imposing
50
+ additional safety measures to protect both the driver and the passenger (Hong, 2017). From the social and governance
51
+ aspects, recording the entire rideshare session violates passengers’ privacy (Anderson, 2016; Z. Lee, Chan, Balaji, &
52
+ Chong, 2016). Technical challenges include storing and processing ridesharing monitoring sessions, and latency in
53
+ detecting violations. Moreover, cellular communication in developing countries, where crime rates are higher, is
54
+ limited (Dillahunt, Kameswaran, Li, & Rosenblat, 2017). In attempts to solve the latency and cloud dependency issues,
55
+ edge computing-based monitoring solutions focused on increasing the transmission bandwidth, optimizing workloads,
56
+ and increasing the number of edge processing nodes (T. Wang, 2020). However, these solutions not only necessitate
57
+ costly special infrastructure but also impose security and privacy risks. In high traffic, the latency issue would be
58
+ doubled due to the increased processing workload dedicated to each edge unit (Meshram, Choudhary, & Velaga, 2020;
59
+ Zhang, Wang, Lu, Liu, & Shi, 2019). Therefore, edge computing-based solutions partially solve the latency issue, but
60
+ the privacy, and network dependency issues are not entirely solved.
61
+ This research proposes a decentralized-control edge model that aims to fill the efficiency, responsiveness, and privacy
62
+ gaps in current edge computing systems by moving most of the computation and decision making to the IoT level.
63
+ With application to ridesharing monitoring, the model minimizes cost represented in network dependency, costly
64
+ infrastructure, or sacrificing latency. So, we introduce a local decentralized scene-aware monitoring system for
65
+ ridesharing services using the driver’s smartphones. To ensure passenger privacy, the system record only violation
66
+ incidences instead of recording the entire rideshare session. The system applies state-of-the-art deep learning
67
+ optimized models to smartphones to detect ridesharing violations. To ensure security, The system encrypts the detected
68
+
69
+ violations before submitting them to ridesharing agents. The implementation of the system exhibits superior detection
70
+ latency among current solutions.
71
+
72
+ So, the broad research problem is shifting the gear towards decentralized edge computing and empowering the decision
73
+ making of IoTs. The narrow research focus is implementing SAFEMYRIDES, a decentralized control to in ridesharing
74
+ monitoring to address the safety concerns in ridesharing sessions.
75
+ SAFEMYRIDES is motivated by the lack of real-time monitoring systems in ridesharing, the high cost (connectivity
76
+ cost, infrastructure cost, and processing cost), and the preach of privacy of the current solutions (continuous
77
+ monitoring of passengers). The system also could be applied in developing countries where high computational
78
+ resources and mobile internet connections are limited.
79
+ In the following sections, we review prior research on ridesharing monitoring. Then, an overview of ridesharing
80
+ violations, followed by the methodology and description of the proposed system. The architecture of the system is
81
+ described and evaluated experimentally and using illustrative scenarios. Finally, future work and limitations are
82
+ provided.
83
+ 2
84
+ Literature Review
85
+ 2.1
86
+ Current Research in Edge Computing
87
+
88
+ Current edge computing research is dedicated to improving media processing and computation latency and accuracy
89
+ on the edge computational units. Video Analytics in Public Safety (VAPS) is one of the most successful edge
90
+ computing applications (Zhang et al., 2019). However, due to the high real-time requirements and communication
91
+ overhead, it is hard to implement VAPS at scale or in developing countries. Long, Cao, Jiang, and Zhang (2017)
92
+ developed a cooperative video processing scheme using an edge computing framework to enable cooperative
93
+ processing on resource-abundant mobile devices for delay-sensitive multimedia IoT tasks. In the research, several
94
+ edge nodes cooperate for enhanced media task preprocessing performance. Yi et al. (2017) presents the LAVEA
95
+ system, an edge computing platform, which offloads computation between clients and edge nodes, and collaborates
96
+ with nearby edge nodes. The research aims to provide low-latency video analytics at places closer to the users to
97
+ minimize the response time.
98
+ (L. Wang, Zhang, Li, Zhong, & Shi, 2019) designed MobileEdge, a three-task offloading system that shares computing
99
+ tasks to nearby on-road computational units. The system target achieving optimal task scheduling for collaborative
100
+ computing. The system used Tensorflow lite (TF lite) that is used in our research. The results show that MobileEdge
101
+ significantly reduces the application response latency. However, on-road computational units exist only in certain
102
+ areas in developed countries, Moreover, collaborative computing with other computational units is prone to serious
103
+ security threats and privacy violations. Simaraly, DeepDecision, a mobile deep learning framework for edge video
104
+ analytics, was developed (Ran, Chen, Zhu, Liu, & Chen, 2018). The framework ties together computationally weak
105
+ front-end devices with more powerful back-end helpers to allow deep learning to choose local or remote execution
106
+ and determine an optimal offload strategy. Yet, the system assumes a well-defined shared computation infrastructure.
107
+ 2.2
108
+ Previous Ridesharing Monitoring Systems
109
+
110
+ Monitoring ridesharing sessions has been a controversial issue. According to Ulrich Beck's concept of risk society
111
+ (Beck, Lash, & Wynne, 1992), surveillance risks mitigate the safety avails offered. Therefore, using monitoring
112
+ systems in ridesharing would enhance safety and consequently increase user satisfaction. Y. S. Lee (2018) conducted
113
+ a study on Lateral Surveillance in Singapore. They found that contrary to the belief that individuals are always
114
+ skeptical about surveillance, the respondents, on average, reported a positive perception of lateral surveillance.
115
+ Previous ridesharing monitoring systems include the Safe-ShareRide system developed by L. Liu, Zhang, Qiao, and
116
+ Shi (2018). The system can detect violations happening in the vehicle by detecting a predefined list of seeking help
117
+ phrases. The system uses speech recognition for verbal help detection. Then, the system starts recording videos and
118
+ analyze them on the nearest computational points. However, depending on the seeking help phrases for violation
119
+ detection is not typical in most cases, especially for passengers under influence.
120
+ Kumar, Mukherjee, and Singh (2017) used smartphones for monitoring roads through sensing the road surface and
121
+ conditions from a moving vehicle using fuzzy logic-based road surface roughness classification. The system collects
122
+ accelerations of users; processes the information and communication them to a central server. Then, a georeferenced
123
+ database is updated based on collected information and visualization on Google® maps. To obtain a broader picture
124
+ of the current status of ridesharing monitoring, Table 1 provides a comparison between previous systems and the
125
+ proposed system in terms of methodology and service quality issues.
126
+
127
+
128
+ Table 1: A Comparison Between Pervious Edge computing Systems and The Proposed System.
129
+ Research
130
+ Methodology
131
+ Computation Level
132
+ Latency
133
+ Privacy
134
+ Efficiency
135
+ Kumar et al. (2017)
136
+ Fuzzy logic-based
137
+ Central Server
138
+ -
139
+ -
140
+ yes
141
+ Ran et al. (2018)
142
+ Mobile
143
+ deep
144
+ learning,
145
+ Local
146
+ or
147
+ remote
148
+ execution
149
+ yes
150
+ -
151
+ yes
152
+ Long et al. (2017), Yi
153
+ et al. (2017), Zhang et
154
+ al. (2019)
155
+ Edge computing
156
+ Nearby edge nodes, or
157
+ Shared IoT
158
+ yes
159
+ -
160
+ -
161
+ L. Liu et al. (2018)
162
+ Speech
163
+ recognition
164
+ for
165
+ verbal
166
+ help
167
+ detection
168
+ At
169
+ IoT
170
+ (speech
171
+ recognition),
172
+ edge
173
+ unit (video)
174
+ yes
175
+ -
176
+ -
177
+ Proposed Approach
178
+ Tensorflow
179
+ lite,
180
+ Optimized
181
+ deep
182
+ learning
183
+ At
184
+ the
185
+ IoT
186
+ (smartphone) level
187
+ yes
188
+ yes
189
+ yes
190
+ 2.3
191
+ Violations in Ridesharing
192
+ According to most ridesharing companies, there is an agreeable code of conduct to be followed by both passengers
193
+ and drivers. A common code of conduct includes (Armant & Brown, 2020; BILL): Avoid sitting next to the driver on
194
+ the passenger seat. Avoiding any physical interaction with the driver. Physical interaction with the driver includes
195
+ violent actions, seductions, and arguments. Moreover, the driver cannot sit next to the passenger in the back seats
196
+ (Macmurdo, 2015). A Driver must wear a seatbelt all the time. The code of conduct also illegalizes the use and hold
197
+ of weapons during ridesharing sessions. In addition, the code of conduct condemns any sexual conduct between the
198
+ driver and passenger (Lyft, 2019). In the design of the ridesharing monitoring system, we trained the system's deep
199
+ learning model to detect these types of violations.
200
+ 3
201
+ Conceptual Framework
202
+ The gap in literature could be summarized that current edge solutions are oriented towards optimizing the computation
203
+ and media processing on the cloud or nearby edge nodes (Cheng, Bao, Zarifis, & Mou, 2019; Z. Lee et al., 2016).
204
+ Also, there is an inclination towards using edge analytics for media processing where multiple edge units are
205
+ collaborating to decrease the latency. On the other hand, solutions that share the computation are inefficient requiring
206
+ costly infrastructure that is hard to be implemented in developing countries and rural areas. In addition sharing
207
+ computation is violating the privacy and security of user’s data (Cheng, Su, Luo & Cai, 2021). Finally, none of the
208
+ edge solutions are trying to move computation locally to the IoT level to decrease network reliance and ensure privacy.
209
+ On the other hand, the ridesharing monitoring issues discussed in the literature section could be summarized as the
210
+ lack of privacy, safety, and late response. These issues have affected customer satisfaction and trust. Most edge
211
+ computing research avoided moving computation to the IoT level because of the limited computational resources of
212
+ IoT. Therefore, ensuring system efficiency in terms of battery, memory, and storage consumption in our research is
213
+ crucial. So, the proposed model aims at enhancing efficiency, (Functionality), privacy, and responsiveness as key
214
+ factors to enhance IoTs applications performance such as ridesharing monitoring services. The description of each
215
+ factor is discussed below:
216
+ Privacy: gauges the degree to which the IoT application protects customer information and only with their consent,
217
+ disseminate it to other business activities (Hizam & Ahmed, 2020). Since mobile devices are accessible to sensitive
218
+ information including biometric features, privacy has been an essential factor in assessing electronic applications
219
+ (Wolfinbarger & Gilly, 2003; Zeithaml, Parasuraman, & Malhotra, 2002). In SAFEMYRIDES, the ridesharing session
220
+ is recorded based on passenger consent and only violation incidence is recorded. Moreover, recorded media (photos
221
+ or videos) will be encrypted before they are saved.
222
+ Efficiency: measures the resources and ease with which a system is accessed and used (Zeithaml et al., 2002). The
223
+ decentralized-control edge approach aims to consume fewer resources in terms of less network communication that
224
+ consume less battery and data transfer cost. The approach also uses DL optimization techniques such as quantization
225
+ and compression of DL networks. Quantization maximize memory savings during the inference process, and
226
+ compression of DL networks decreases the size of the network to few megabytes, makes it efficient to be used in low
227
+
228
+ storage devices (Jacob et al., 2018). Moreover, efficiency will be evaluated by the resources consumed such as
229
+ memory, storage, and battery consumed.
230
+ Responsiveness: is one of the most important service quality dimensions for human-computer-interaction (HCI) (Ho
231
+ & Lee, 2007). Responsiveness is how the system delivers the results of an operation to users in a timely and organized
232
+ manner. Latency is directly correlated with responsiveness, the delayed is the response, the less responsiveness in the
233
+ system. Therefore, the proposed approach will be evaluating the average latency as a measure of Responsiveness.
234
+ Accuracy: there are different definitions of accuracy. In the context of SAFEMYRIDES, accuracy is defined as the
235
+ ability of the system to detect violations correctly out of all violation incidences. The confusion matrix of precision
236
+ and recall is also a principal part of calculating accuracy.
237
+ 4
238
+ Methodology
239
+ In this research, we follow a design science approach (Hevner, March, Park, & Ram, 2004). The decentralized-control
240
+ edge computing approach is considered a model artifact, and the ridesharing monitoring system (SAFEMYRIDES) is
241
+ considered a framework artifact (Peffers, Rothenberger, Tuunanen, & Vaezi, 2012). The framework artifact is
242
+ implemented to show functionality and test performance. The system is evaluated as instantiation using synthetic or
243
+ real-world situations to evaluate the detection accuracy, latency, privacy, and consumed resources. So, the evaluation
244
+ is performed using controlled experiments or the study of the artifact in a controlled environment for qualities. Next,
245
+ an overview of decentralized-control edge computing approach is presented.
246
+ 4.1
247
+ Decentralized Control Edge Model
248
+ Edge computing was built upon the concept of computation offloading where end devices and IoTs perform data
249
+ collection and sensing (Huda & Moh, 2022) as shown in the right side of Fig.1. Complex processing and real time
250
+ analysis are performed on the edge units or on the cloud. However, running machine learning and decision-making
251
+ algorithms on IoTs is now an attainable task fueled by the increase in computational resources are significant decrease
252
+ in computational cost (Mocnej et al., 2021). Complex computation tasks such as deep learning inference could run on
253
+ IoTs with regular consumption of resources. The decentralized control edge model is proposed on the left side of
254
+ fig.1. The model limits the computation on the edge or the cloud side to limit traffic and computational overheads.
255
+
256
+ The model moves most of computation and decision-making to the end device level to allow decentralized control
257
+ (task onloading). The role of edge units and/or cloud platforms in the decentralized-control model is archiving/logging
258
+ events of the IoT. So, IoTs connect edge units or the cloud platforms for saving logs or upgrading the processing of
259
+ tasks. The model not only decreases network traffic between end devices and edge units but also, allow a real-time
260
+ response to IoT sensed events. Thus, this model focuses on IoTs Task Onloading and IoT-edge communication
261
+ reduction. However, since deep learning models are complex and resources exhaustive, deep learning tasks should be
262
+ optimized first before they could be applied to IoTs as discussed in the next sections
263
+
264
+ Fig. 1: Decentralized Control Edge Model
265
+
266
+
267
+ TOOLBOX
268
+ EDGECOMPUTING
269
+ Data Processing
270
+ Buffering Optimization
271
+
272
+ [)
273
+ Basic Analytics
274
+ Cloud Platform
275
+ […]
276
+ Cloud Platform
277
+ Cloud
278
+ Cloud Data
279
+ Cloud Machine
280
+ Functions
281
+ Center
282
+ Learning
283
+ Edg
284
+ c-c-m
285
+ Event Processlng
286
+ Data Cashing
287
+ Decision Malking
288
+ Cloud Media
289
+ Cloud
290
+ Cloud Storage
291
+ Database Server
292
+ Cloud Controller
293
+ Edge
294
+ Manager
295
+ Functions
296
+ Seve Logs,
297
+ Jpgrade Processing
298
+ Upgrade Actlons
299
+ Real time Analytics
300
+ Cloud Media
301
+ Database Server
302
+ Edge
303
+ Process Darta, Events
304
+ Collect Data, Events
305
+ Take Decisions
306
+ Transmit Data
307
+ 1
308
+ Processed
309
+ Processed
310
+ Transmit
311
+ Date
312
+ sehso
313
+ vents
314
+ loTthing car
315
+ loT thing camera loT thing bicycleRoad Device
316
+ T
317
+ loT thing car
318
+ loT thing camera loT thing bicycle Road Device
319
+ 4.2
320
+ Deep Learning Networks Optimization
321
+ DL models are known for their high computational cost and complexity, so they mostly run on servers on the cloud
322
+ (Wu et al., 2018). On the other hand, end devices (e.g., IoTs) and edge devices (e.g., routers) are often battery-powered,
323
+ have limited memory, and processing to store and process data. Applying DL models to IoT is challenging; DLNs
324
+ must be optimized and compressed to fit IoTs limited computational sources. In addition, the optimization of the IoTs
325
+ themselves is also necessary in terms of memory and hardware optimization (Synced, 2017).
326
+ Compression is one of the main optimization techniques that aim to reduce the massive size of DL networks. One of
327
+ the popular compression methods is the Pruning technique that eliminates the connections between neurons to directly
328
+ reduce the feature map width and shrink the network size. Quantization is another optimization technique that aims at
329
+ compacting the number of bits required to store the DLN weights, usually from 64 bit to 8 bits (Han, & Dally, 2015).
330
+ 4.3
331
+ SAFEMYRIDES Design
332
+ The proposed system is an on-site decision support system for monitoring ridesharing vehicles, where the driver's
333
+ smartphone can detect the violation and decides the proper action. We trained a Mobile SSD network to detect
334
+ violation incidences. Then, the trained Mobile SSD is optimized to be deployed to smartphones. The design of the
335
+ proposed system is shown in Fig. 2 and the components of the system are discussed below in detail.
336
+
337
+
338
+ Fig. 2: Decision Support System for Monitoring Ridesharing Vehicles.
339
+ 4.3.1
340
+ Optimized Deep Learning (DL) Model
341
+ Usually, Deep learning models (DLMs) consist of many connected layers resulting in millions of parameters and
342
+ weight. So, running DLMs tends to be a resource-intensive process in terms of energy consumption and memory
343
+ accesses and hardware accelerators. To apply a DLM to IoTs and small devices such as smartphones, DLMs must be
344
+ compressed and quantized. Also, the DLM running on IoTs are read-only means that these compressed models cannot
345
+ be retrained or edited. We used a Mobile Single Shot Detector (Mobile SSD) which is based on a feed-forward
346
+ convolutional network that produces a fixed-size collection of bounding boxes and scores for the presence of object
347
+ class instances in those boxes. SSD is designed to be independent of the base network, and so it can run on top of any
348
+ base network such as VGG, YOLO, MobileNet (W. Liu et al., 2016).
349
+
350
+ The DLM is quantized where parameters are represented in 8 bits instead of 32 bits to accelerate the inference process.
351
+ The DLM will have a post-training quantization which is the most used form of quantization. In this approach,
352
+
353
+ CellularServersunits
354
+ Quantization
355
+ Compression
356
+ OptimizedDLmodel
357
+ Report
358
+ 101010
359
+ 01001
360
+ Encrypt
361
+ EncryptingViolation
362
+ Incidence
363
+ DecisionSupport
364
+ Original Prediction
365
+ Deployed
366
+ System
367
+ 1
368
+ Warn
369
+ Layer
370
+ Monitor
371
+ conv4_x
372
+ conv5_x
373
+ maconv3x
374
+ Ride-sharingVehicle
375
+ MobileNetSingleShotDetectorNetwork
376
+ DriverSmartPhonequantization takes place only after the model has finished training. Moreover, the network is compressed to be 10x
377
+ less in size of the trained network following the method presented by (Singh, Manikandan, & Namboodiri, 2019).
378
+ 4.3.2
379
+ The Ridesharing Smart Phone
380
+ Recently smartphones' specifications are enhancing rapidly at a very reasonable cost. The average processing power
381
+ of most smartphones currently could host an optimized DLM and run inference smoothly. For the system to run
382
+ smoothly, the smartphone should have a minimum RAM (not less than 4GB) and an acceptable resolution camera
383
+ according to TensorFlow Guide1.
384
+ 4.3.3
385
+ Decision Support System (DSS)
386
+ The DSS is built inside the smartphone. It is responsible for acting in case of detected violation. If a violation is
387
+ detected by the Mobile SSD, a warning is voiced to passengers/drivers. If violations continue to be detected, the
388
+ DSS will record the incidence, encrypt it, and save the incidence in a hidden folder in the ridesharing's smartphone.
389
+ Then, the recorded incidence is sent to the ridesharing agent and attached with encrypted media.
390
+ 4.3.4
391
+ Encrypting and Transferring Violation Incidence
392
+ For security, images or videos that document the violation incidences are encrypted and saved in the ridesharing's
393
+ smartphone storage to ensure passenger/driver privacy. In addition, encryption ensures secure transfer to the
394
+ ridesharing agent. Otherwise, violation evidence could be deleted before it is reported to the ridesharing agent. On
395
+ the other hand, encryption will ensure security if the media is shared with nearby road units. So, passengers'
396
+ information will be kept confidential without driver intervention. Moreover, passenger/driver data is secured in case
397
+ the phone is stolen or hijacked.
398
+ 4.3.5
399
+ Transferring Violation Evidence using The Cellular Server Units (CSU)
400
+ After the violation incidence is securely recorded and encrypted, it will be uploaded to the nearest cellular server
401
+ units. In case of no cellular connection, Violation incidences could be uploaded to the nearest on-road units in smart
402
+ cities infrastructure or sent in text messages. CSUs could be the driver cellular network or the networks that exist on
403
+ the roadsides in developed countries. So, mostly CSUs are the nearest access point where the DSS could upload
404
+ incident videos even if no cellular internet is turned off on the phone.
405
+ 4.3.6
406
+ The Ridesharing Vehicle
407
+ Information about the ridesharing vehicle is saved in the ridesharing agent database. If the violation requires legal
408
+ authorities' interventions, the ridesharing vehicle could be found easily. In addition, the ridesharing agent requires
409
+ registered vehicles to have a valid title, proper condition, and valid insurance of the driver.
410
+ 5
411
+ Implementation
412
+ The implementation process is divided into two steps. The first step is the training and testing of the Mobile SSD
413
+ network used in detecting violations. In this step, we collect, annotate, and pre-process relevant ridesharing violation
414
+ samples. Then, after the network is fully trained, it is optimized (compressed and quantized) to be easily embedded in
415
+ IoT(smartphone). The second section is implementing the DSS system that runs locally on the driver's smartphone.
416
+ The DSS act when the Mobile SSD detects violations. The DSS actions include sending warnings, encrypting violation
417
+ incidences, and reporting them to the ridesharing agent. In the following sections, the implementation of each section
418
+ is discussed in detail.
419
+ 5.1
420
+ Implementing the Trained Mobile SSD Network
421
+ 5.1.1
422
+ The Training Dataset
423
+ There is no ready to use dataset that contains images of ridesharing violations incidents. The training and testing
424
+ samples used to train the Mobile SSD model are retrieved from web searches, ridesharing agents' articles, and public
425
+ ridesharing violations videos. The violation images were a collection of the five-standard code of conduct rules such
426
+ as interacting physically with the driver as specified earlier. The images collection was taken during the day and at
427
+ night. We also included normal images where there is no violation.
428
+
429
+ 1 https://www.tensorflow.org/lite/guide
430
+
431
+
432
+ 5.1.2
433
+ Annotation and Preprocessing:
434
+ Images were annotated in three classes: driver, passenger, and violation. Annotation was performed using Roboflow2.
435
+ Dataset was divided into 90% training, 6 % validation, and 4 % testing. Images were annotated and saved in
436
+ TFRECORD format. Every class in the image was surrounded by a bounding box representing a driver (pink box),
437
+ passenger (green box), and violation (purple box), as shown in fig. 3. Noted that all passengers are annotated if the
438
+ image has more than a passenger. Image preprocessing included resizing pictures to 416 x 416, Auto-Orientation, and
439
+ Auto-Adjust of Contrast through contrast stretching (Munteanu & Lazarescu, 1999).
440
+
441
+ Fig. 3: Annotated Training, Validation Images Where Each Class is surrounded with A Bounding Box.
442
+ 5.1.3
443
+ Hardware and Software
444
+ The Training was performed on the cloud Google Collaboraty using Jupiter notebooks. To accelerate the training
445
+ process, we used one GPU. The network was trained using TensorFlow 1 and a Keras version less than 2.0 as
446
+ recommend for custom models training settings3. The ridesharing DSS was created using Android studio 4.1.2 and
447
+ SDK 28. The device used for running and debugging is a Mac-book pro with intel core i5 2.5 GHz processor, 8 GB
448
+ Ram. The build and debug were performed on a Google PIXEL AVD before the system was deployed to a smartphone.
449
+ 5.1.4
450
+ Optimized MobileNet Single Shot Detector Network
451
+ We trained a MobileNet Single Shot Detector (v2) (ssd_mobilenet_v2) that is popular for performing object detection
452
+ tasks on IoT devices. ssd_mobilenet_v2 is optimized for lightweight inference, enabling it to perform well natively on
453
+ compute-constrained mobile and embedded devices. The Mobile SSD is quantized to parameters size of 8 bit.
454
+ Quantization consumes less memory bandwidth. Fetching numbers in the 8-bit format from RAM requires only 25%
455
+ of the bandwidth of the standard 32-bit format. On the other hand, quantizing neural networks results in 2x to 4x
456
+ speedup during inference. We didn't train the network from scratch; rather, we transferred learning from a pre-trained
457
+ model with a COCO dataset. COCO dataset training weights were uploaded to the training network in the form of
458
+ .h5 format. Also, we used the same configuration for MSCOCO Dataset as shown below in table 2.
459
+ Table 2: Trained Network Configuration.
460
+ Parameter
461
+ Value
462
+ The number of layers
463
+ 6
464
+ Minimum network scale
465
+ 0.2
466
+ Max Network scale
467
+ 0.95
468
+ Number of steps
469
+ 100000
470
+ Activation Function
471
+ RELU_6
472
+
473
+ 2 https://app.roboflow.com/
474
+ 3 Model Customization
475
+
476
+ 221%After the network was trained, we ran an inference test, and then we compressed the network and quantized it to 8 bit.
477
+ Then, the trained network was converted into TFLITE format. The 8 bit quantization format is used to run inference
478
+ on IoTs such as smartphone devices. The average time spent per training step is global_step/sec:4.96517.
479
+ So, the entire training session duration lasted 13.7921 hours.
480
+ 5.2
481
+ Implementing the SAFEMYRIDES Decision Support System
482
+ 5.2.1
483
+ Detection Response
484
+ The DSS was developed in Java for Android using Android Studio IDE. The DSS primary interface runs a scene view
485
+ stream of the smartphone camera. The stream is not recorded. Otherwise, the detection runs on the fly using the
486
+ smartphone camera running scene. The system has access to both the front and rear cameras. When a violation is
487
+ detected with confidence level greater than 80 %, the system speaks out "Violation Detected" using the Text to sound
488
+ android library. If another violation is detected, the system saves the current scene into an encrypted image file and
489
+ stores it in a hidden folder in the ridesharing's phone. The average inference time of the system is 28 ms for detecting
490
+ the three classes of (passenger, driver, and violation).
491
+ 5.2.2
492
+ Encrypting Violation Incidences
493
+ For encryption, each violation image is converted into a byte array; then, an XOR operation is applied on each value
494
+ of the byte array using a predefined encryption key (2-bit key). After performing the XOR operation on each byte
495
+ array value, the encrypted image is written to a new image file in a jpeg format. However, the driver won't be able to
496
+ read the encrypted image or decrypt it. Only the ridesharing agent has the predefined key and can decrypt the image.
497
+ The encryption key acts as a password to encrypt and decrypt the violation image.
498
+ 5.2.3
499
+ The Ridesharing Smart Phone
500
+ We ran experiments on two different smartphones with different specifications to monitor the performance of the
501
+ proposed system on different hardware specifications. The first smartphone used during experiments was a Samsung
502
+ s10 + phone running on Android. And the second phone is an LG V30+ also running on Android.
503
+ The system was built upon the starter code offered by android for object detection using TensorFlowLite4. The system
504
+ added the custom trained Mobile SSD network. The code was adjusted to detect the three classes of driver, passenger,
505
+ and violation. We added a text-to-speech module to send violation warnings. In addition, we added the encryption-
506
+ decryption module for securing violation images.
507
+ 5.2.4
508
+ Results
509
+ These are some screenshots from the ridesharing violation application running on a Samsung s10 + phone. The
510
+ application can detect three classes. A detecting bounding box surrounds each detected class. The number on the right
511
+ top of the bounding box is the network confidence score in making this prediction. Examples of detected violations
512
+ by the SAFEMYRIDES are shown in Fig. 4. a, 2. b. The confidence score of the DL network measures how confident
513
+ is the network assigning an object a specific class.
514
+ 6
515
+ Evaluation
516
+ The evaluation will be performed on different levels, as shown in table 3. The evaluation of the trained Mobile SSD
517
+ network will be functional. The network is evaluated before and after it is compressed and quantized. Functional
518
+ evaluation metrics include testing and training accuracy. We also traced the network testing and validation loss. The
519
+ system itself is performed through controlled experiments where evaluation relativeness is absolute (e.g., test if the
520
+ artifact achieves its goal?). Then, another evaluation is performed by conducting a comparison of the artifact
521
+ performance on a different device of different hardware/software specifications (Cleven, Gubler, & Hüner, 2009). The
522
+ stages of evaluation performed are summarized in table 3.
523
+ 6.1
524
+ Evaluating the Trained Mobile SSD Network
525
+ 6.1.1
526
+ Training loss/ Validation Loss
527
+ There are two critical measures to evaluate the Mobile SSD: the training loss and the validation loss. The loss is the
528
+ cost function used while training that needs to be minimized. At the end of every 100 training steps, the network is
529
+
530
+ 4 GitHub Code
531
+
532
+
533
+ evaluated for the loss in training and validation. As long as the loss decreases, that means that the network is trained
534
+ correctly, and it can generalize well (Jancsary, & Rother, 2012). It is expected for the validation loss to be slightly less
535
+ than the training loss. If the gap between training loss and validation loss increases, this indicates network overfitting.
536
+ Across the 100K steps of training iterations, the training loss vs. validation loss is plotted as shown in fig. 4. The
537
+ training and validation loss start high and start decreasing gradually. The gap between the training and validation loss
538
+ is tight. However, at some steps, the validation loss is less than the training loss, which indicates that the validation
539
+ samples are easier to detect than training samples. The iteration with the least loss is selected in step 96800 with a
540
+ validation loss of 1.0199343. Then validation loss starts increasing afterward, which means that the network overfits.
541
+ The MAP (Mean Average Precision) is another metric used in measuring the accuracy of object detecting networks.
542
+ The average precision computes the average precision value for the recall values over 0 to 1 using IoU (Intersection
543
+ over the union) (Henderson & Ferrari, 2016). the MAP was calculated at the end of each 10000 training steps at
544
+ IoU=0.5
545
+ the
546
+ maximum
547
+ MAP
548
+ achieved
549
+ was
550
+ 0.3816
551
+ at
552
+ step
553
+ 55867,
554
+ and
555
+ DetectionBoxes_Recall/AR@10 = 0.4333.
556
+
557
+
558
+
559
+ Fig. 4: a,b a Violation of Sitting Next to The Driver, Interacting Physically with the Driver.
560
+ Table 3: Evaluation Stages with Involved Components and Criteria.
561
+ Artifact
562
+ Evaluation
563
+ Method
564
+ Assessed
565
+ Criteria
566
+ Level of
567
+ Evaluation
568
+ Form of
569
+ Evaluation
570
+ Relativeness
571
+ of Evaluation
572
+ Trained
573
+ Mobile
574
+ SSD
575
+ Reporting
576
+ the
577
+ functional
578
+ performance
579
+ of
580
+ the
581
+ trained network
582
+ Training
583
+ accuracy
584
+ Loss/validation
585
+ accuracy Loss,
586
+ Instantiation
587
+
588
+ Quantitative
589
+ / measured
590
+ Absolute
591
+ Proposed
592
+ System
593
+ Demonstration of
594
+ the performance of the
595
+ artifact with
596
+ several real examples
597
+ Goal,
598
+ Accuracy,
599
+ Latency
600
+ Instantiation
601
+ / Real
602
+ examples
603
+
604
+ Quantitative
605
+ / measured
606
+ Absolute
607
+ Proposed
608
+ System
609
+ Observing
610
+ the
611
+ differences
612
+ between performance
613
+ on different devices
614
+ Comparison between
615
+ accuracy,
616
+ latency
617
+ efficiency
618
+ on
619
+ different devices
620
+ Instantiation
621
+
622
+ Quantitative
623
+ / measured
624
+ Relative
625
+
626
+ Rideshare Detector
627
+ violation 92.43%10:35网M·
628
+ driver82.39%
629
+ violation96.20%R
630
+ m6.1.2
631
+ Training and Validation Accuracy
632
+ We ran an inference test on the trained network before we performed optimization: compression and quantization to
633
+ study the effect of the optimization on accuracy and latency. The full-sized mobile SSD model sized 245 MB with a
634
+ 32-bit inference parameter. The highest training accuracy achieved is 0.94546, and the highest validation accuracy is
635
+ 0.93123. The average time spent by Google Collaboratory for inference testing is 3.56 seconds.
636
+
637
+
638
+ Fig. 5: Training loss Vs. Validation Loss of the Trained Mobile SSD.
639
+ 6.2
640
+ Evaluating the SAFEMYRIDES Decision Support System
641
+
642
+ Firstly, the entire SAFEMYRIDES system was evaluated using a controlled simulated environment where the system
643
+ was applied in a real ridesharing setting. The first experiments were running on the Samsung S10+ phone. The driver/
644
+ passenger performed different violation scenarios such as: interacting physically with the driver, violence, and sitting
645
+ next to the driver. Examples of detected violations are shown in Fig. 6 a, b.
646
+ 6.2.1
647
+ Latency
648
+ The average system Latency is also measuring the system responsiveness that affects service quality and customer
649
+ satisfaction. Latency would be represented by the average system response time to detect a violation. However, the
650
+ response time is affected by the surrounding conditions. For example: the response time to detect a violation in daylight
651
+ is different than the response time at night. After setting the minimum required confidence level to 0.80 (the confidence
652
+ score of the Mobile SSD that the detected incidence is a violation), the average response time to violations detection
653
+ during daylight is 450 ms while at night is 790 ms. However, this average response time is higher to other systems
654
+ used in ridesharing media processing, as shown in table 4 and fig. 6.
655
+ Table 4: A Comparison Between SAFEMYRIDES and Other Proposed Systems.
656
+ Research
657
+ Average Latency
658
+ Media type
659
+ L. Liu et al. (2018)
660
+ 1273ms
661
+ Sound
662
+ L. Wang et al. (2019)
663
+ 8345 ms
664
+ A 60-second video data
665
+ Long et al. (2017)
666
+ 2234 ms.
667
+ Compressed Videos. Latency (model processing time +
668
+ network transmission time).
669
+ Ran et al. (2018)
670
+ 32100 ms.
671
+ video chunk is set as S= 1MB, 15 edge nodes
672
+ SAFEMYRIDES
673
+ 620 ms.
674
+ Scene view stream
675
+
676
+
677
+
678
+ 4.5
679
+ Training loss
680
+ 4.D
681
+ Validation loss
682
+ 3.5
683
+ 3.D
684
+ 25
685
+ 2D
686
+ 15
687
+ LD
688
+ 0
689
+ DOEZ
690
+ G1000
691
+ 81000
692
+ 14000
693
+ Steps
694
+
695
+
696
+
697
+ Fig. 6: Detected Violations using Different Violations: Violence and Physical Interaction.
698
+
699
+ Fig. 7 : Average Latency of the Proposed System Versus Previously Developed Systems.
700
+
701
+ 0
702
+ 500
703
+ 1000
704
+ 1500
705
+ 2000
706
+ 2500
707
+ 3000
708
+ 3500
709
+ 4000
710
+ 4500
711
+ 5000
712
+ Liu et al. (2018)
713
+ (Wang et al. 2019)
714
+ (Long et al. 2017)
715
+ (Ran et al. 2018)
716
+ SAFEMYRIDES
717
+ Average Latency
718
+
719
+ passenger79.30%
720
+ Rideshare Detector
721
+ violation91.60%passenger86.72%
722
+ violation85.76%passenger95.34%
723
+ ideshareDetector
724
+ violation89.28%Ridet
725
+ violation9Z.69%6.2.2
726
+ Efficiency
727
+ In terms of the resources used by the system, the system used 29.09 MB of the phone's internal storage. The average
728
+ size of an encrypted media image is 120kB. Energy consumed of running the system for 15 minutes at a rate of 17 m
729
+ (milliamp), or 79.8 mAH (milliamp hour). Memory used by the system is 104 MB Which means it is consuming less
730
+ than 1% of the smartphone RAM of 8 GB.
731
+ 6.2.3
732
+ The System Accuracy and Confusion Matrix
733
+ In this experiment, we are evaluating the optimized trained network running on the Android S10 plus. The optimized
734
+ network size is 27 MB, almost 10x less than the actual model size, and runs at 8-bit inference parameters. To get an
735
+ in-depth analysis of how the optimized network performed, a confusion matrix was created to analyze the accuracy,
736
+ precision, and recall of the front and rear cameras as in table 5 and table 6. The confusion matrix was built during a
737
+ simulated session during the day, trying 51 different normal and violations poses. The front camera and the rear camera
738
+ were used to detect a violation. The rear cameras of the Samsung S10 plus are 12MP, 12 MP, and 16 MP ultra-wide
739
+ module cameras. The front-facing cameras are 8MP, 10 MP f/1.9 selfie cameras.
740
+ Precision: It tells what fraction of predictions as a positive class were genuinely positive. To calculate precision, use
741
+ the following formula: 𝑻𝑷/(𝑻𝑷 + 𝑭𝑷) or 0.9111 for the rear camera and 0.906 for the front camera according to the
742
+ confusion matrix.
743
+ Recall: also known as Sensitivity, Probability of Detection. It tells what fraction of all positive samples were correctly
744
+ predicted as positive by the classifier. To calculate Recall, use the following formula: 𝑻𝑷/(𝑻𝑷 + 𝑭����) or 0.976 for
745
+ the rear camera and 0.928 for the front camera.
746
+ Accuracy: is the measure of what fraction of violation incidences were correctly detected by the system; the accuracy
747
+ formula is Accuracy = (𝑇𝑃 + 𝑇𝑁)/(𝑃 + 𝑁). Based on the formula, the system's accuracy in detecting correct
748
+ violation incidences is 46/51=0.9019 for the front camera and 0.862.
749
+ Table 5: Confusion Matrix of The Proposed System (Rear Camera).
750
+ True/Detected
751
+ True
752
+ False
753
+ True
754
+ 41 (TP)
755
+ 1 (FN)
756
+ False
757
+ 4 (FP)
758
+ 5 (TN)
759
+ Table 6: Confusion Matrix of the proposed system (Front camera).
760
+ True/Detected
761
+ True
762
+ False
763
+ True
764
+ 39 (TP)
765
+ 3 (FN)
766
+ False
767
+ 4 (FP)
768
+ 5 (TN)
769
+ 6.2.4
770
+ Privacy
771
+ Surveillance systems have raised apprehension about their threat to individuals' privacy rights (Cheung, Venkatesh,
772
+ Paruchuri, Zhao, & Nguyen, 2009). Privacy protection is a core objective in the proposed system through ensuring
773
+ transparency, authorization, and encryption. Transparency means that both the driver and the passenger are aware
774
+ that the ridesharing session is monitored. A warning of "Violation Detected" is declared when the system detects a
775
+ violation. Media surveillance is privacy-intrusive because it allows the observation of certain information that is
776
+ considered privacy intrusive such as a person's identity or characteristics (age, race, gender) (Senior, 2009) . Therefore,
777
+ authorization of users is required to monitor ridesharing sessions. Moreover, negotiation of privacy preference
778
+ (Consortium, 2002) or flexible authorization is offered when users prefer monitoring at night sessions or in remote
779
+ destinations.
780
+ Privacy protection technologies have focused mainly on different visual obfuscation techniques. Encryption of
781
+ violation incidences is applied to protect sensitive personal information from being saved and transferred securely
782
+ (Diffie & Landau, 2010) . In the proposed system, an XOR operation with a (2 bit) encryption key is applied for every
783
+ detected violation incidence and saved in a secured folder in the ridesharing phone. The detected violation incidences
784
+ are only shared with ridesharing agents or official legal authorities.
785
+
786
+ 6.3
787
+ Evaluating SAFEMYRIDES on Different Devices
788
+ In this section, the SAFEMYRIDES is applied to a different device to notice the discrepancy in the system
789
+ performance with different hardware specifications. In the previous section, the system was applied to a Samsung S10
790
+ plus device. In this section, the system will be applied to an LG V30 plus phone to compare and contrast the system's
791
+ performance on different hardware settings.
792
+ LG V30 plus has only two rear cameras (16 MP and 12 MP) and one 5MP front camera compared to three rear cameras
793
+ and two front cameras in the Samsung S 10 plus. The LG V30 Adreno 540 GPU is compared to an Adreno 640 GPU
794
+ in S10+. Also, the S10 + has a Li-Ion 4100 mAh Battery, and 8 GB RAM is compared to Li-Po 3300 mAh and 4 GB
795
+ in LG V30. Table 7 and Fig. 7 compares the performance of SAFEMYRIDES on the two devices in terms of average
796
+ latency, average accuracy, and efficiency (the resources used) for running the system for 15 minutes. The comparison
797
+ is performed using the rear cameras because of higher resolution and night shots adjustment features.
798
+ While the Samsung S10 + achieved higher performance and less latency than The LG V30, the resources consumed
799
+ (battery and RAM were higher). Samsung S10 + has three cameras which consumed more battery power and RAM in
800
+ return. There is almost a 4 % difference in the accuracy between the LG V30 and Samsung S10 + and more than 350
801
+ ms difference in Latency.
802
+ Table 7: Performance Comparison for Applying SAFEMYRIDES on Different Devices.
803
+ Metric/ Device
804
+ LG V30 (Rear Camera)
805
+ Samsung S 10 plus (Rear Camera)
806
+ Accuracy
807
+ 0.8845
808
+ 0.9019
809
+ Latency
810
+ 1297 ms
811
+ 920 ms.
812
+ RAM
813
+ 89 MB
814
+ 104 MB
815
+ Battery Consumption
816
+ 48.7 mAH (milliamp hour)
817
+ 79.8 mAH (milliamp hour).
818
+ Internal Storage
819
+ 29.8 MB
820
+ 28.09 MB
821
+ Average CPU
822
+ 0.72
823
+ 0.64
824
+
825
+
826
+ Fig. 8: Performance Comparison between LG and Samsung using Rear Camera.
827
+
828
+
829
+ Accuracy
830
+ Latency
831
+ FAM
832
+ Baltery Consumption
833
+ Intemal Storage
834
+ 7
835
+ Discussion and Implications
836
+ While most of current edge computing approaches focus on optimizing processing and data transfer on edge units,
837
+ little research focus on empowering IoT to decrease dependency on task offloading. So, we developed a decentralized-
838
+ control edge computing model where computation and decision making are moved to the IoT level. Moving the
839
+ computation to IoT (onsite) will enhance efficiency, responsiveness, accuracy, and privacy issues of many IoT
840
+ applications. The decentralized-control model is fueled by technologies such as TF lite and IoT optimization
841
+ techniques which empower IoTs to run cognitive tasks at humble consumption of resources. As a proof of concept,
842
+ we build a scene-aware ridesharing monitoring system to detect violations at runtime with an average latency of 620
843
+ ms. The system was evaluated technically and functionally using controlled experiments by stimulating different
844
+ violation poses in real ridesharing settings.
845
+ The system was designed to ensure safety and privacy. So, violation incidences are saved in hidden folders in an
846
+ encrypted format with an average file size of 120KB. The system responsiveness (latency) was comapred against
847
+ previously developed systems. The system achieved the least latency and reduced the cost of transferring images for
848
+ processing on edge nodes. Instead, the system detects violations locally on the driver’s smartphone. Given the limited
849
+ number of training samples, the system achieved a 90.1% accuracy rate for detecting 51 different violations poses
850
+ with a 94% sensitivity rate. On the other hand, we can notice the significant difference in average inference time
851
+ (delay) between the full network of 3.56 seconds and the optimized network of 920 ms which gives optimized DL
852
+ networks an additional advantage to be applied for real time response.
853
+ When the system was applied to different devices, a variance in performance was detected which affected the detection
854
+ accuracy and latency. The higher is the resolution of the phone's camera, the better is the accuracy. Moreover, the
855
+ higher is the GPU/CPU, the less is the system latency. In addition, detection using rear cameras is better than front
856
+ cameras. Moreover, we noticed there is not much difference in detection accuracy during the day, but there is a
857
+ difference in detection accuracy at night. In general, the lower detection accuracy at night calls for increasing the
858
+ number of night training samples. Moreover, since most smartphone cameras don’t have night vision, the camera
859
+ ability to balance colors of night images affects detection accuracy. Also, the false-positive rate calls for training the
860
+ network with more regular ridesharing poses. The system is efficient to use in terms of storage (29 MB) and memory
861
+ consumption (less than 1% of active memory (RAM) consumption).
862
+ 8
863
+ Limitations and Future Work
864
+ The implementation of the ridesharing monitoring system was performed as a proof of concept for the decentralized
865
+ control edge computing model. The size of the dataset used was limited. Increasing the training and validation samples
866
+ will positively affect the accuracy and the latency of predictions. In addition, the encryption of violation incidences
867
+ was performed using a simple XOR function. More sophisticated encryption methods using a 128-Bit key are
868
+ preferred. Also, additional privacy preservation mechanisms such as video inpainting and data-hiding schemes will
869
+ add extra confirmation on user privacy (Cheung et al., 2009). Since the system achieved lower accuracy and decreased
870
+ sensitivity in detecting violations during the night, the deep learning network needs to be trained with more night
871
+ samples, where poor light obstructs definite detection of violations.
872
+ Future research on the optimization of camera usage is required in terms of battery consumption as the energy
873
+ consumption of cameras is considered above average, assuming that a ridesharing driver will be using the system for
874
+ hours. Moreover, the system should be deployed in a real setting to address other intangibles quality measures such
875
+ as reliability, understanding, and courtesy.
876
+ Other future work includes implementing the ridesharing monitoring system on other platforms such as IOS and
877
+ Raspberry PI. The system should be tested on different platforms for benchmarking. Benchmarking will help
878
+ determine the minimum required for a smartphone to run the system. While the system used compression and
879
+ quantization techniques such as optimization methods for the Mobile SSD, applying other optimization techniques
880
+ such as pruning might enhance the optimized network accuracy.
881
+ The proposed system is trying to solve the safety and privacy issues related to ridesharing, and it has several
882
+ implications to practice. Firstly, the system allows local ridesharing monitoring on the driver's smartphone, saving the
883
+ cost of an additional device for monitoring. Having the monitoring system running on the same device used in the
884
+ ridesharing will ensure efficiency and privacy. Secondly, the system uses no network communication while detecting
885
+ violations and limits the network communication to reporting the violation incidences to the ridesharing agent.
886
+
887
+ Minimizing network communication ensures privacy, security, and efficiency. So, the system could be used where
888
+ poor network connections exist. Thirdly, encryption of ridesharing incidences ensures privacy and security. So, the
889
+ passenger/driver data are only shared directly with the ridesharing agent in case of detected violation.
890
+ This research contributes to the Information System research by applying the concept of decentralized control where
891
+ an IoT (smartphone) can independently detect violations and make decisions. The research is one of the early attempts
892
+ to apply different optimization methods to deep learning networks to run efficiently on an IoT. The research sheds
893
+ light on the importance of limiting cloud/edge computation and limiting network communications while enhancing
894
+ the decisions making process and analytics of the IoTs.
895
+ 9
896
+ Conclusion
897
+ This research is introducing a decentralized-control edge computing model where computation and decision making
898
+ is moved to the IoT level. The model addresses the efficiency, responsiveness, and privacy issues that current edge
899
+ computing models still contemplate. Although battery powered, IoTs could run cognitive tasks at reasonable
900
+ consumption of resources using different optimization techniques. We applied the model to build a scene-aware
901
+ ridesharing monitoring system to detect violations at runtime. The system uses an optimized deep learning model on
902
+ IoTs that can locally detect violations in ridesharing sessions on the driver's smartphone. The system records violations
903
+ incidents only and saves them in an encrypted format. So, the system addresses the safety issue without violating
904
+ privacy. On the technical level, the decentralized control edge model is reducing communication cost and latency,
905
+ ensure privacy and less prone to data transfer security risks.
906
+ 10
907
+ Declaration of interests
908
+ The authors declare the following financial interests/personal relationships which may be considered as potential
909
+ competing interests. This research was supported in part by 2019 Small Grants Award from Virginia Commonwealth
910
+ School of Business Information Systems Department.
911
+
912
+ 11
913
+ References:
914
+ Anderson, D. N. (2016). Wheels in the head: ridesharing as monitored performance. Surveillance & Society, 14(2),
915
+ 240-258.
916
+ Armant, V., & Brown, K. N. (2020). Fast optimised ridesharing: Objectives, reformulations and driver flexibility.
917
+ Expert Systems with Applications, 141, 112914.
918
+ Beck, U., Lash, S., & Wynne, B. (1992). Risk society: Towards a new modernity (Vol. 17): sage.
919
+ BILL, H. Passenger Protection Act. Retrieved from
920
+ https://www.ncleg.gov/Sessions/2019/Bills/House/PDF/H391v7.pdf
921
+ Chaudhry, B., El-Amine, S., & Shakshuki, E. (2018). Passenger safety in ride-sharing services. Procedia computer
922
+ science, 130, 1044-1050.
923
+ Cheng, X., Bao, Y., Zarifis, A., & Mou, J. (2019). A model of customer trust in sharing economy-driven ride-
924
+ sharing platforms involving psychological contract violation and recovery.
925
+ Cheng, X., Su, L., Luo, X., Benitez, J., & Cai, S. (2021). The good, the bad, and the ugly: impact of analytics and
926
+ artificial intelligence-enabled personal information collection on privacy and participation in ridesharing.
927
+ European Journal of Information Systems, 1-25.
928
+ Cheung, S.-C., Venkatesh, M. V., Paruchuri, J. K., Zhao, J., & Nguyen, T. (2009). Protecting and managing privacy
929
+ information in video surveillance systems. In Protecting Privacy in Video Surveillance (pp. 11-33): Springer.
930
+ Cleven, A., Gubler, P., & Hüner, K. M. (2009). Design alternatives for the evaluation of design science research
931
+ artifacts. Paper presented at the Proceedings of the 4th International Conference on Design Science Research in
932
+ Information Systems and Technology.
933
+ Consortium, W. W. W. (2002). The platform for privacy preferences 1.0 (P3P1. 0) specification.
934
+ Diffie, W., & Landau, S. (2010). Privacy on the line: The politics of wiretapping and encryption: The MIT Press.
935
+ Dillahunt, T. R., Kameswaran, V., Li, L., & Rosenblat, T. (2017). Uncovering the values and constraints of real-
936
+ time ridesharing for low-resource populations. Paper presented at the Proceedings of the 2017 CHI Conference on
937
+ Human Factors in Computing Systems.
938
+ El Khaddar, M. A., & Boulmalf, M. (2017). Smartphone: the ultimate IoT and IoE device. Smartphones from an
939
+ applied research perspective, 137.
940
+ Elnagar, S., & Thomas, M. A. (2020). Federated Deep Learning: A Conceptual Model and Applied Framework for
941
+ Industry 4.0.
942
+
943
+ Feeney, M. (2015). Is ridesharing safe? Cato Institute Policy Analysis(767).
944
+ Han, S., Mao, H., & Dally, W. J. (2015). Deep compression: Compressing deep neural networks with pruning,
945
+ trained quantization and huffman coding. arXiv preprint arXiv:1510.00149.
946
+ Henderson, P., & Ferrari, V. (2016). End-to-end training of object class detectors for mean average precision. Paper
947
+ presented at the Asian Conference on Computer Vision.
948
+ Hevner, A. R., March, S. T., Park, J., & Ram, S. (2004). Design science in information systems research. MIS
949
+ quarterly, 75-105.
950
+ Hizam, S. M., & Ahmed, W. (2020). A conceptual paper on SERVQUAL-framework for assessing quality of
951
+ Internet of Things (IoT) services. arXiv preprint arXiv:2001.01840.
952
+ Ho, C.-I., & Lee, Y.-L. (2007). The development of an e-travel service quality scale. Tourism management, 28(6),
953
+ 1434-1449.
954
+ Hong, S. J. (2017). Assessing economic value of reducing perceived risk in the sharing economy: the case of ride-
955
+ sharing services.
956
+ Huda, S. A., & Moh, S. (2022). Survey on computation offloading in UAV-Enabled mobile edge computing.
957
+ Journal of Network and Computer Applications, 103341.
958
+ Jacob, B., Kligys, S., Chen, B., Zhu, M., Tang, M., Howard, A., . . . Kalenichenko, D. (2018). Quantization and
959
+ training of neural networks for efficient integer-arithmetic-only inference. Paper presented at the Proceedings of
960
+ the IEEE Conference on Computer Vision and Pattern Recognition.
961
+ Jancsary, J., Nowozin, S., & Rother, C. (2012). Loss-specific training of non-parametric image restoration models:
962
+ A new state of the art. Paper presented at the European Conference on Computer Vision.
963
+ Kumar, R., Mukherjee, A., & Singh, V. (2017). Community sensor network for monitoring road roughness using
964
+ smartphones. Journal of Computing in Civil Engineering, 31(3), 04016059.
965
+ Lee, Y. S. (2018). Watching You Watching Me: Lateral Surveillance in Singapore.
966
+ Lee, Z., Chan, T., Balaji, M., & Chong, A. Y.-L. (2016). Technology-mediated sharing economy: Understanding
967
+ user participation in collaborative consumption through the benefit-cost perspective. Paper presented at the
968
+ Proceedings of the 20th Pacific Asia Conference on Information Systems (PACIS).
969
+ Li, Y., & Taeihagh, A. The governance of risks in ridesharing: Lessons learned from Singapore.
970
+ Liu, L., Zhang, X., Qiao, M., & Shi, W. (2018). SafeShareRide: Edge-based attack detection in ridesharing services.
971
+ Paper presented at the 2018 IEEE/ACM Symposium on Edge Computing (SEC).
972
+ Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed, S., Fu, C.-Y., & Berg, A. C. (2016). Ssd: Single shot multibox
973
+ detector. Paper presented at the European conference on computer vision.
974
+ Long, C., Cao, Y., Jiang, T., & Zhang, Q. (2017). Edge computing framework for cooperative video processing in
975
+ multimedia IoT systems. IEEE Transactions on Multimedia, 20(5), 1126-1139.
976
+ Lyft. (2019). Code of Business Conduct and Ethics. Retrieved from https://investor.lyft.com/static-files/8861ea0b-
977
+ 6a32-4414-a909-d8a9618f582f
978
+ Macmurdo, M. (2015). Hold the Phone-Peer-to-Peer Ridesharing Services, Regulation, and Liability. La. L. Rev.,
979
+ 76, 307.
980
+ Meshram, A., Choudhary, P., & Velaga, N. R. (2020). Assessing and modelling perceived safety and comfort of
981
+ women during ridesharing. Transportation research procedia, 48, 2852-2869.
982
+ Mocnej, J., Pekar, A., Seah, W. K., Papcun, P., Kajati, E., Cupkova, D., . . . Zolotova, I. (2021). Quality-enabled
983
+ decentralized IoT architecture with efficient resources utilization. Robotics and Computer-Integrated
984
+ Manufacturing, 67, 102001.
985
+ Munteanu, C., & Lazarescu, V. (1999). Evolutionary contrast stretching and detail enhancement of satellite images.
986
+ Paper presented at the Proc. Mendel.
987
+ Peffers, K., Rothenberger, M., Tuunanen, T., & Vaezi, R. (2012). Design science research evaluation. Paper
988
+ presented at the International Conference on Design Science Research in Information Systems.
989
+ Ran, X., Chen, H., Zhu, X., Liu, Z., & Chen, J. (2018). Deepdecision: A mobile deep learning framework for edge
990
+ video analytics. Paper presented at the IEEE INFOCOM 2018-IEEE Conference on Computer Communications.
991
+ Senior, A. (2009). Privacy protection in a video surveillance system. In Protecting Privacy in Video Surveillance
992
+ (pp. 35-47): Springer.
993
+ Singh, P., Manikandan, R., Matiyali, N., & Namboodiri, V. P. (2019). Multi-layer pruning framework for
994
+ compressing single shot multibox detector. Paper presented at the 2019 IEEE Winter Conference on Applications
995
+ of Computer Vision (WACV).
996
+ Synced. (2017). Deep Learning in Real Time – Inference Acceleration and Continuous Training.
997
+
998
+ Wang, L., Zhang, Q., Li, Y., Zhong, H., & Shi, W. (2019). MobileEdge: Enhancing On-Board Vehicle Computing
999
+ Units Using Mobile Edges for CAVs. Paper presented at the 2019 IEEE 25th International Conference on Parallel
1000
+ and Distributed Systems (ICPADS).
1001
+ Wang, T. (2020). Application of Edge Computing in 5g Communications. Paper presented at the IOP Conference
1002
+ Series: Materials Science and Engineering.
1003
+ Wolfinbarger, M., & Gilly, M. C. (2003). eTailQ: dimensionalizing, measuring and predicting etail quality. Journal
1004
+ of retailing, 79(3), 183-198.
1005
+ Wu, J., Zhang, Y., Bai, H., Zhong, H., Hou, J., Liu, W., . . . Huang, J. (2018). PocketFlow: An Automated
1006
+ Framework for Compressing and Accelerating Deep Neural Networks.
1007
+ Yi, S., Hao, Z., Zhang, Q., Zhang, Q., Shi, W., & Li, Q. (2017). Lavea: Latency-aware video analytics on edge
1008
+ computing platform. Paper presented at the Proceedings of the Second ACM/IEEE Symposium on Edge
1009
+ Computing.
1010
+ Zeithaml, V. A., Parasuraman, A., & Malhotra, A. (2002). Service quality delivery through web sites: a critical
1011
+ review of extant knowledge. Journal of the academy of marketing science, 30(4), 362-375.
1012
+ Zhang, X., Wang, Y., Lu, S., Liu, L., & Shi, W. (2019). Openei: An open framework for edge intelligence. Paper
1013
+ presented at the 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS).
1014
+
1015
+
btAyT4oBgHgl3EQf-PpJ/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
btFPT4oBgHgl3EQfBDTK/content/tmp_files/2301.12984v1.pdf.txt ADDED
@@ -0,0 +1,1066 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ CONTCOMMRTD: A DISTRIBUTED CONTENT-BASED
2
+ MISINFORMATION-AWARE COMMUNITY DETECTION SYSTEM
3
+ FOR REAL-TIME DISASTER REPORTING
4
+ Elena-Simona Apostol1, Ciprian-Octavian Truic˘a1, Adrian Paschke2
5
+ 1University Politehnica of Bucharest, Bucharest, Romania
6
+ 2Fraunhofer Institute for Open Communication Systems, Berlin, Germany
7
8
9
+ ABSTRACT
10
+ Real-time social media data can provide useful information on evolving hazards. Alongside traditional
11
+ methods of disaster detection, the integration of social media data can considerably enhance disaster
12
+ management. In this paper, we investigate the problem of detecting geolocation-content communities
13
+ on Twitter and propose a novel distributed system that provides in near real-time information on
14
+ hazard-related events and their evolution. We show that content-based community analysis leads
15
+ to better and faster dissemination of reports on hazards. Our distributed disaster reporting system
16
+ analyzes the social relationship among worldwide geolocated tweets, and applies topic modeling
17
+ to group tweets by topics. Considering for each tweet the following information: user, timestamp,
18
+ geolocation, retweets, and replies, we create a publisher-subscriber distribution model for topics. We
19
+ use content similarity and the proximity of nodes to create a new model for geolocation-content based
20
+ communities. Users can subscribe to different topics in specific geographical areas or worldwide and
21
+ receive real-time reports regarding these topics. As misinformation can lead to increase damage if
22
+ propagated in hazards related tweets, we propose a new deep learning model to detect fake news.
23
+ The misinformed tweets are then removed from display. We also show empirically the scalability
24
+ capabilities of the proposed system.
25
+ Keywords Distributed System · Spatial-Temporal System · Community Detection · Topic Modeling · Misinformation
26
+ Detection
27
+ 1
28
+ Introduction
29
+ Worldwide, hazards frequently have a dramatic impact on rural and urban societies, or the environment. There are
30
+ different classes of hazards, e.g., natural (geophysical, hydrological, etc.), anthropogenic (chemical, major accident,
31
+ technological, biological, etc.). In recent years many studies have recognized the value of community activity during
32
+ disasters due to hazards [58, 51]. Following these analyses, it was observed that people who are physically nearby a
33
+ location where a hazard occurred tend to produce more disaster-related information on social media [6, 31].
34
+ Alongside traditional methods of hazard detection, e.g., satellite or airborne sensing platforms, topographic data sources,
35
+ Internet of Things, the integration of social media data would considerably enhance disaster management, especially
36
+ in areas with little to no infrastructure, and, therefore, will be of greater importance in the future [49, 45]. Twitter
37
+ is one of the largest social networking platforms, and it has a remarkable capability of continuous retrieval of data
38
+ and content-sharing services [19]. It is also a suitable place where citizens can present their concerns in a real-time
39
+ manner [16].
40
+ Social media has a significant impact on public perception of different hazards and their contingency plans. This is
41
+ why is extremely important not to consider tweets that contain misinformation. Although several papers examined the
42
+ arXiv:2301.12984v1 [cs.SI] 30 Jan 2023
43
+
44
+ negative impact of misinformation spread on Twitter during disasters that can cause mass panic or financial loss [59], in
45
+ the current literature there is no work that mitigates their harm in real time.
46
+ In this study, we attempt to answer a fundamental question: Can the social and geographical disparities of Twitter be
47
+ used to assist citizens and government organizations in informing or disaster management? To answer this question,
48
+ we consider classifying tweets in different disaster-related topics and construct a graph model based on content and
49
+ geolocation. We also recognise the ethical issues caused by the fact that tweets collected from unreliable sources and
50
+ showed to other users may increase the spread of misinformation [56]. Thus, we also apply fake news detection before
51
+ displaying the data to the end user.
52
+ In this paper, we 1) investigate the problem of detecting content-based communities in order to provide valuable
53
+ information on hazard-related events and their evolution, and 2) propose a distributed content-based misinformation-
54
+ aware community detection system for real-time disaster reporting (ContCommRTD). Besides the proposed system, the
55
+ main contributions are:
56
+ 1) We propose a new distributed solution to analyze the social relationship among worldwide geolocated tweets.
57
+ 2) We define a new social network model for detecting geolocation-content based communities and named
58
+ entities.
59
+ 3) We create a meta-knowledge dictionary to collect topic-specific tweets containing hazard-related keywords
60
+ and hashtags.
61
+ 4) We apply topic modeling to discover topics and to classify tweets into different topics. A user can then
62
+ subscribe to one of these topics and receive in real-time all the tweets that discuss the event of interest.
63
+ 5) We propose an efficient distributed publish-subscribe based model using Apache Kafka [18, 23] and Mon-
64
+ goDB [8] that allows real-time collection, storage, and distribution of Twitter posts relevant to the chosen type
65
+ of hazard.
66
+ 6) We propose a new Deep Learning architecture, FN-BERT-TFIDF, to determine if the tweets of interest are
67
+ fake news.
68
+ The rest of this paper is structured as follows: In Section 2, we present the state-of-the-art. In Section 4, we describe the
69
+ proposed system. In Section 5, we present the datasets and analyze our results. Section 6 concludes the paper and hints
70
+ at future research.
71
+ 2
72
+ Related Work
73
+ Real-time disaster detection using data from dynamic social media environments, e.g., Twitter, and considering different
74
+ locations is a challenging task that recently received much attention [21, 22, 34]. [15] propose detecting disaster-related
75
+ topics on Twitter data using an LDA (Latent Dirichlet Allocation) topic model enhanced with a set of seed words from
76
+ older Tweets of the same geographic area. This solution is applicable when there is a single topic of interest, e.g.,
77
+ earthquakes or hurricanes, and similar data is available. Several solutions use in the detection task, not only the textual
78
+ data from tweets but also incorporate images from the posts or satellites [47, 24, 29]. [3] present an unsupervised
79
+ learning solution that detects large-scale hazard-related sub-events in Tweets. The authors use an ontology containing
80
+ crisis management vocabulary to rank the candidate sub-events and then cluster the most important sub-events using
81
+ spectral clustering.
82
+ Geolocation is also important when considering natural hazards analysis using social media data. To the best of our
83
+ knowledge, the current real-time unsupervised disaster detection solutions consider only geotagged tweets [63, 64].
84
+ However, tweets do not necessarily come with geoinformation. Several offline classifier-based disaster detection
85
+ solutions also try to determine the location by searching the tweets’ content for names of cities and countries [33, 52].
86
+ These solutions use corpora of labeled tweets. [33] propose using GeoText to search for names of cities and countries.
87
+ Another solution proposes location mention recognition from labeled crisis-related tweets using BERT (Bidirectional
88
+ Encoder Representations from Transformers [12]) based classification [52].
89
+ In the current literature, different graph-based methods are applied to citizen science-based disaster detection solutions.
90
+ Dou et al. [13] use a semantic graph-based topic detection method to identify fine-grained topics during natural disasters
91
+ in social media. A community detection algorithm, i.e., the algorithm of modularity optimization [9], is also used to
92
+ extract topics that denote the same class of event information. A similar pipeline is also proposed in article [36]: 1) a
93
+ graph generation algorithm is used to transform the text data into a graph of the keywords, 2) a community detection
94
+ algorithm is applied to discover hazard-related topics. Nguyen et al. [38] present a framework for 1) filtering and
95
+ classifying tweets and 2) identifying and summarizing important disaster-related topics. The authors use a graph-based
96
+ ranking algorithm to select and summarize important tweets.
97
+ 2
98
+
99
+ Another issue to consider regarding this research topic is the impact of misinformation. Misinformation (false or
100
+ inaccurate information) and disinformation (intentionally spreading misinformation) in the form of fake news are tools
101
+ used to manipulate public opinion on particular topics, distort public perceptions, and generate social unrest while
102
+ lacking the rigor of traditional journalism [26, 56]. Singh et al. [48] propose content and context aware RNN-based
103
+ solution for fake news detection during natural disasters. Their solution uses the user profile information and the
104
+ temporal and textual features of the analysed events. Pelrine et al. [40] analyze the performance for misinformation
105
+ detection of several transformer language models (e.g., BERT [12], RoBERTa [32], ALBERT [30]) on different datasets.
106
+ Based on their results, these transformers models have very good performance metrics for large-enough datasets.
107
+ However, if we consider smaller datasets, such as the case of disaster-related Twitter datasets (e.g., COAID [10]), the
108
+ performance decreases. Although several studies have analysed the impact of misinformation on different types of
109
+ hazards, e.g., Hurricane [25], COVID-19 [17], none offer a real-time hazard-related event detection solution while
110
+ removing misinformation.
111
+ 3
112
+ Problem definition
113
+ We define an undirected graph G = (V, E, C, L), where V is the set of vertices, E is the set of edges, C is the set that
114
+ stores the textual content of each vertex, and L the set of geolocations for each node. Thus, for our problem, we define
115
+ the social network as n undirected graphs Γ = {Gi = (Vi, Ei, Ci, Li)|u, v ∈ Vi ∧ (u, v) ∈ Ei ∧ cu, cv ∈ Ci ∧ lu, lu ∈
116
+ Li ∧ i = 1, N}, where each two vertices u, v ∈ Vi are linked by through an edge (u, v) ∈ Ei that represents the social
117
+ relationship between them. Thus, Γ is a graph with n disconnected components Gi. The content cu, cv of vertices u, v
118
+ is stored in Ci, while their geolocation lu, lv are stored in Li. We define a social relationship as the linked that occurs
119
+ between these nodes in either of the cases:
120
+ 1) u retweets the content of v,
121
+ 2) u replies to v.
122
+ For each hazard related event, we have a Meta-Knowledge dictionary that contains a list H with the most relevant
123
+ keywords and hashtags. The dictionary is constructed separately. Using H, we collect the data from the social network.
124
+ For each record u, we verify if the location lu is given. If lu is missing, we use Name Entity Recognition (NER) to
125
+ extract any mention of locations and then map the name with its coordinates (geolocation). Using these information
126
+ together with the social relationships, we construct the list of n undirected graphs Γ, i.e., the social graph.
127
+ Algorithm 1 presents the collection and creation of the social graph Γ, which receives as input the list of relevant
128
+ keywords and hashtags for an event H. Lines 1 to 2 initializes the social graph Γ and the disconnected graph Ω used for
129
+ extracting the connected components Gi. Lines 3 to 6 initializes the components of Ω The records are collected into R
130
+ using a Social Network API (Line 7). For each record u ∈ R, we add elements to the V, C, L components of Ω (Lines 8
131
+ to 15). Line 10 applies some preprocessing techniques on the textual content. Lines 12 to 14 determines the coordinates
132
+ based on locations if the geolocation is not provided in the record. The edges are added separately after we have all the
133
+ nodes (Lines 16 to 19). We construct Ω (Line 20), extract the connected components to build Γ (Line 21), and return
134
+ the social graph (Line 22).
135
+ Using the graph structures in Γ, we want to determine communities where there is a high social media activity for
136
+ users’ topics of interest. These communities can contain multiple graphs Gi ∈ Γ that are not directly interconnected.
137
+ To build the communities, first we filter the content of a graph Gi and remove any nodes and their edges that spread
138
+ misinformation. At the end of the misinformation detection process we obtaining Γ′ that contain only the clean
139
+ undirected graphs G′
140
+ i.
141
+ Algorithm 2 presents the misinformation detection algorithm, which receives as input the social graphs Γ and outputs
142
+ the clean graph Γ′. After the clean graph is initialized Γ′ (Line 1), the veracity of all the nodes’ content from a graph
143
+ G ∈ Γ is verified (Lines 2 to 12). If the the content is deemed as Fake, the record is removed form the graph (Lines 4
144
+ to 10. The corresponding graph G′
145
+ i is constructed using the updated V ′, E′, C′, L′ and it is added to Γ′ (Lines 11 to 12).
146
+ When the verification are finished for all the graphs, the algorithm returns the clean graph Γ′.
147
+ With the clean content Γ′, we build the content-based communities. In order to achieve this, we utilize:
148
+ 1) the content similarity between the nodes given the membership level m of the content of a node cu to a topic
149
+ tk, and
150
+ 2) the proximity of nodes to a core point p that defines a geographic area A.
151
+ 3
152
+
153
+ Algorithm 1: SocialGraph - Construct the social graph
154
+ Input
155
+ :the keywords and hashtags list H
156
+ Output :the undirected social graph Γ
157
+ 1 Γ ← ∅
158
+ 2 Ω ← ∅
159
+ 3 V ← ∅
160
+ 4 E ← ∅
161
+ 5 C ← ∅
162
+ 6 L ← ∅
163
+ 7 R ← SocialNetworkAPI(H)
164
+ 8 foreach u ∈ R do
165
+ 9
166
+ V ← V ∪ {u}
167
+ 10
168
+ c′
169
+ u ← Preprocess(cu)
170
+ 11
171
+ C ← C ∪ {c′
172
+ u}
173
+ 12
174
+ if lu = Nil then
175
+ 13
176
+ λ ← NER(cu)
177
+ 14
178
+ lu ← GeoLocation(λ)
179
+ 15
180
+ L ← L ∪ {lu}
181
+ 16 foreach u ∈ V do
182
+ 17
183
+ foreach v ∈ V do
184
+ 18
185
+ if Retweet(u, v) ∨ Reply(u, v) then
186
+ 19
187
+ E ← E ∪ {(u, v)}
188
+ 20 Ω = (V, E, C, L)
189
+ 21 Γ ← ConnectedComponents(Ω)
190
+ 22 return Γ
191
+ Algorithm 2: MisinformationDetection - Content veracity detection
192
+ Input
193
+ :the social graphs Γ
194
+ Output :the clean undirected graph Γ′
195
+ 1 Γ′ ← ∅
196
+ 2 foreach G = (V, E, C, L) ∈ Γ do
197
+ 3
198
+ C′ ← C
199
+ 4
200
+ foreach cu ∈ C do
201
+ 5
202
+ veracity ← DetectV eracity(cu)
203
+ 6
204
+ if veracity = Fake then
205
+ 7
206
+ V ← V \ {u}
207
+ 8
208
+ E ← E \ {(u, v)|(u, v) ∈ E}
209
+ 9
210
+ C′ ← C′ \ {cu}
211
+ 10
212
+ L ← L \ {lu}
213
+ 11
214
+ G′ = (V, E, C′, L)
215
+ 12
216
+ Γ′ = Γ′ ∪ {G}
217
+ 13 return Γ′
218
+ To compute the content similarity, we first use a topic modeling algorithm to extract k topics T within our graphs. Then
219
+ we determine the membership of a node’s content cu to belong to a topic tj ∈ T (j = 1, k) using the cosine similarity
220
+ sim(cu, tj). Given the similarity sim(cu, tj) between a node’s content and a topic, if the similarity is over a given
221
+ threshold εc (sim(cu, tj) ≤ εc) then cu belongs to topic tj. Based on the threshold, the same node’s content can belong
222
+ to multiple topics. Using the topics T and the graph Γ′, we construct the topic graphs Θ.
223
+ Algorithm 3 presents the topic graphs extraction. The algorithm receives as input the the undirected clean graphs Γ′,
224
+ the number of topics k, and the similarity threshold εc. The output is the topic graphs Θ. Line 1 initializes Θ. Lines 2
225
+ to 5 concatenates the contenct of all the graphs G and extract k topics stored in T. We iterate trough each graph and
226
+ each topic to determine the membership of the content of a node to a topic using the similarity and create a topic graph
227
+ G′ which is added to the topic graphs Θ (Lines 6 to 19). At the end of the iteration, the topic graphs Θ are returned
228
+ (Line 20).
229
+ 4
230
+
231
+ Algorithm 3: TopicGraphs - Topic graphs extraction
232
+ Input
233
+ :the undirected clean graphs Γ′
234
+ the number of topics k
235
+ the similarity threshold εc
236
+ Output :the topic graphs Θ
237
+ 1 Θ ← ∅
238
+ 2 D ← ∅
239
+ 3 foreach G = (V, E, C, L) ∈ Γ′ do
240
+ 4
241
+ D ← D ∪ C
242
+ 5 T ← Topics(D, k)
243
+ 6 foreach t ∈ T do
244
+ 7
245
+ V ′ ← ∅
246
+ 8
247
+ E′ ← ∅
248
+ 9
249
+ C′ ← ∅
250
+ 10
251
+ L′ ← ∅
252
+ 11
253
+ foreach G = (V, E, C, L) ∈ Γ′ do
254
+ 12
255
+ foreach cu ∈ C do
256
+ 13
257
+ if sim(cu, t) ≥ εc then
258
+ 14
259
+ V ′ ← V ′ ∪ {u}
260
+ 15
261
+ E′ ← E′ ∪ {(u, v)|(u, v) ∈ E}
262
+ 16
263
+ C′ ← C′ ∪ {cu}
264
+ 17
265
+ L′ ← L′ ∪ {lu}
266
+ 18
267
+ G′ = (V ′, E′, C′, L′)
268
+ 19
269
+ Θ ← Θ ∪ {G′}
270
+ 20 return Θ
271
+ The proximity a node u to a core point p is computed using its geolocation coordinates lu. The intuition behind this
272
+ assumption is based on the fact that nodes that are near each other will fall within the same geographic area A. Each
273
+ geographic area A represents a cluster. The area A is given by a core point p and a radius εl that specifies the cluster’s
274
+ maximum extend. Thus, the proximity of a node u is computed as distance δ(lu, p) between its geolocation lu and
275
+ the core point p. If δ(lu, p) ≤ εl then u ∈ A. The area A and the core point p is determined using a data clustering
276
+ algorithm, e.g., DBSCAN [14]. Using the content similarity and the proximity of nodes, we create geolocation-content
277
+ based communities Σ = (VΣ, EΣ, CΣ, LΣ). Within the same area, there can be multiple communities.
278
+ Algorithm 4 presents the construction of the geolocation-content based communities. The algorithm receives as input
279
+ the topic graph θ ∈ Θ and the proximity threshold εl and outputs the communities Σ. Line 1 initializes Σ. Lines 2 to 5
280
+ extract all the geolocations from θ and determines the areas A for which the radius is equal to εl. We iterate trough each
281
+ graph and each area to construct the communities Σ using the condition δ(lu, p) ≤ εl (Lines 6 to 19). At the end of the
282
+ iteration, the geolocation-content based communities Σ are returned (Line 20).
283
+ Algorithm 5 presents ContCommRTD, the solution to our problem. The algorithm receives as input the the keywords
284
+ and hashtags list H, the number of topics k, the similarity threshold εc, and the proximity threshold εl. Firstly, the
285
+ social graph Γ is build using H and Algorithm 1 (Line 2). Secondly, the graph Γ′ is constructed by removing from
286
+ Γ all the nodes that contain misinformation (Line 3). Thirdly, the topic graphs are extracted (Line 4). Lastly, the
287
+ geolocation-content based communities Σ are determined for each topic graph and returned (Lines 5 to 7).
288
+ 4
289
+ System Description
290
+ The architecture of the proposed system ContCommRTD, which implements Algorithm 5, is presented in Figure 1.
291
+ 4.1
292
+ Twitter Data Collector
293
+ This module is used to fetch Twitter data in real-time, using the Twitter Developer API and it implements Line 7 from
294
+ Algorithm 1. It collects tweets based on the chosen type of hazard, e.g., extreme hydrological hazards associated with
295
+ water-related events. The initial selection is done by searching tweets that contain specific words. For this purpose, we
296
+ created a meta-knowledge dictionary as follows. For each new type of hazard, we add a new entry containing a list of
297
+ 5
298
+
299
+ Algorithm 4: CommunityGraphs - Geolocation-content based communities extraction
300
+ Input
301
+ :the undirected topic graph θ
302
+ the proximity threshold εl
303
+ Output :the communities Σ′ = (VΣ, EΣ, CΣ, LΣ)
304
+ 1 Σ′ ← ∅
305
+ 2 P ← ∅
306
+ 3 foreach (V, E, C, L) ∈ θ do
307
+ 4
308
+ P ← P ∪ L
309
+ 5 A ← Areas(P, εl)
310
+ 6 foreach p ∈ A do
311
+ 7
312
+ V ′ ← ∅
313
+ 8
314
+ E′ ← ∅
315
+ 9
316
+ C′ ← ∅
317
+ 10
318
+ L′ ← ∅
319
+ 11
320
+ foreach (V, E, C, L) ∈ θ do
321
+ 12
322
+ foreach lu ∈ L do
323
+ 13
324
+ if δ(lu, p) ≤ εl then
325
+ 14
326
+ V ′ ← V ′ ∪ {u}
327
+ 15
328
+ E′ ← E′ ∪ {(u, v)|(u, v) ∈ E}
329
+ 16
330
+ C′ ← C′ ∪ {cu}
331
+ 17
332
+ L′ ← L′ ∪ {lu}
333
+ 18
334
+ G′ = (V ′, E′, C′, L′)
335
+ 19
336
+ Σ′ ← Σ′ ∪ {G′}
337
+ 20 return Σ′
338
+ Algorithm 5: ContCommRTD - Geolocation community graphs extraction
339
+ Input
340
+ : the keywords and hashtags list H
341
+ the number of topics k
342
+ the similarity threshold εc
343
+ the proximity threshold εl
344
+ Output :the communities Σ = (VΣ, EΣ, CΣ, LΣ)
345
+ 1 Σ ← ∅
346
+ 2 Γ ← SocialGraph(H)
347
+ 3 Γ′ ← MisinformationDetection(Γ)
348
+ 4 Θ ← TopicGraphes(Γ′, k, εc)
349
+ 5 foreach G = (V, E, C, L) ∈ Θ do
350
+ 6
351
+ Σ ← Σ ∪ CommunityGraphs(G, εl)
352
+ 7 return Σ
353
+ Figure 1: Architecture of ContCommRTD (database colors denote the collections used by each module)
354
+ top-k keywords and hashtags for the chosen hazardous event. To extract the keywords we employ TLATR [55] using
355
+ the following pipeline:
356
+ 6
357
+
358
+ Twitter Data
359
+ Even Aggregator and User Interface
360
+ Collector
361
+ Kafka Cluster
362
+ User Interface
363
+ Zookeper
364
+ Data
365
+ Kafka Broker
366
+ Preprocessing
367
+ Kafka
368
+ /Community Detection &
369
+ Topic 1
370
+ Consumer 1
371
+ Community Graphs
372
+ Misinformation
373
+ Detection
374
+ Kafka
375
+ Topic 2
376
+ Text Analysis &
377
+ Consumer 2
378
+ Topic Graphs
379
+ Kafka
380
+ t2
381
+ tk
382
+ tweets t1
383
+ Kafka
384
+ Producer
385
+ Topic K
386
+ Consumer K1) extract the topics and keywords including hashtags
387
+ 2) label the topics.
388
+ When users searcher for new events, they will select from a list of topics’ labels and the system will automatically load
389
+ all the topic’s keywords and hashtags, which in turn are used to filter the stream of tweets. The collected tweets are
390
+ stored in tweets collection in a NoSQL Document-Oriented Distributed Database Management system, i.e., MongoDB.
391
+ We choose MongoDB, because benchmarks show that this system is fast, reliable, and offers good performances when
392
+ dealing with textual data [53, 54].
393
+ Using these filters, we collect the tweet and its retweets and replies. For a tweet, we store the following information: id,
394
+ language, retweet flag, creation date, user information, geolocation information, and text. For a retweet, we also keep
395
+ the retweeter’s coordinates and location. Each retweet information is also updated in real-time with the original tweet’s
396
+ data. The same information is also kept for replies. We use geolocation as a sharding key to distribute the data between
397
+ different sites and improve querying.
398
+ 4.2
399
+ Data Preprocessing and Geolocation enhancement
400
+ This module implements constructs the social graph Γ implemented by Algorithm 1.
401
+ 4.2.1
402
+ Data Preprocessing.
403
+ We extract the textual content of all the Tweets from the database and apply the following preprocessing steps to extract
404
+ a clean text:
405
+ 1) remove user mentions (terms that start with @), http links, punctuation, double spacing, and numbers from the
406
+ text;
407
+ 2) Transform the text to lowercase;
408
+ 3) Extract terms through tokenization;
409
+ 4) Remove stop words and tokens with a length smaller than 3 characters;
410
+ 5) Extract the stem of the remaining terms using the Porter Stemmer [41] to reduce the number of terms by
411
+ removing inflected and derived words, thus minimizing the vocabulary.
412
+ Using the clean text and the normalized Term Frequency-Inverse Document Frequency TFIDFn, we built the
413
+ document-term matrix W = [wij] needed by the analysis algorithm, where wij = TFIDFn(tij, di, D), tij is a
414
+ term appearing in document di, and D is the entire collection of tweets. We use the scikit-learn [39] TFIDF
415
+ implementation.
416
+ 4.2.2
417
+ Analyzing the Geolocation of Tweets
418
+ We utilize several techniques to obtain the geolocation information of a tweet, retweet, or reply. The most basic
419
+ approach was to get the coordinates of a tweet. For this to work, the user must have the location turned on. There are
420
+ various studies (e.g., [50]) that show that only a relatively small percentage of users use this feature. However, we
421
+ observe that a large majority of the collected hazard-related tweets are either geotagged or contain location information
422
+ in the text, e.g., "Heavy rain in Masjid Al Haram". A tweeter that contains a Place has 4 pairs of coordinates that
423
+ define the area for that Place. If the tweet doesn’t have a geolocation tag either, we apply Named Entity Recognition to
424
+ identify possible locations from the text. Once identified, we use GeoNames [61] to get the coordinates. This is an
425
+ improvement over many existing real-time systems that solely rely on geolocation information embedded within the
426
+ tweet to determine events [63, 64].
427
+ 4.3
428
+ Misinformation Detection
429
+ This module is used to filter and mark any tweets that spread misinformation, i.e., Fake News (FN). This module
430
+ implements Algorithm 2. As the Twitter datasets that contain disaster-related events have usually a limited size, we
431
+ use Transfer Learning techniques to transfer knowledge gained from these larger but more generic Twitter datasets
432
+ to misinformation detection on disaster-related datasets. For the task of misinformation detection, we propose a new
433
+ Deep Learning architecture, FN-BERT-TFIDF (Figure 2a), that receives as input the TF-IDF vector for a tweet as
434
+ well as tweet embedding extracted with BERT. For each input, the model contains one BiLSTM layer, a CNN layer,
435
+ and a MaxPooling layer. We choose a BiLSTM layer because it enables the network to use both previous and future
436
+ elements by looking forward and backward in the words sequence. We use a CNN layer to create new features using
437
+ 7
438
+
439
+ the convolution operation between the text window and every distinct filter. We use a MaxPooling layer to decrease the
440
+ size of the feature channels by grouping elements into fix lengths sequences and choosing only the feature with the
441
+ maximum value. The output of the MaxPooling layers are concatenated and sent as input to the classification layer. To
442
+ test the efficiency of our model, we perform ablation testing and compare the results of the FN-TFIDF-BERT model
443
+ with the results obtained when only TF-IDF, i.e., FN-TFIDF (Figure 2b), or BERT, i.e., FN-BERT (Figure 2c), is used
444
+ as input. After a tweet passes throughout the detection model, its record in MongoDB is updated with a new field that
445
+ encodes its veracity. If a tweet is detected as fake, then it will not be used in the next modules. For implementing the
446
+ Deep Learning models, we use the Keras interface of the TensorFlow [1]. For building the BERT embeddings, we use
447
+ simpletransformers with the HuggingFace [62] BERT model.
448
+ (a) FN-BERT-TFIDF
449
+ (b) FN-TFIDF
450
+ (c) FN-BERT
451
+ Figure 2: Deep Learning Architectures
452
+ 4.4
453
+ Text Analysis and Topic Graphs
454
+ This module implements Algorithm 3 to extract the topic graphs. To Analyze the tweets and determine the context
455
+ regarding the hazard discussed in the text, we use Online Latent Dirichlet Allocation (OLDA) [2]. OLDA is a generative
456
+ statistical model used for topic modeling that groups together terms that are syntactically different but have similar
457
+ meaning and represent the same concepts. The algorithm determines for each tweet a specific topic by calculating the
458
+ similarity between the tweet and all of the topics. Thus, OLDA assigns a tweet to a mixture of topics, i.e., each tweet is
459
+ a combination of one or more topics. The model is built in real-time, as more tweets are added to the database, the
460
+ model is retrained with the new information. We use a 50% threshold (i.e., εc) to determine if a tweet is relevant to a
461
+ topic as a tweet can belong to multiple topics. We use the gensim [43] OLDA implementation.
462
+ 4.5
463
+ Kafka Modules
464
+ The Kafka Producer module takes <tweet, topic> pairs and sends them to the Kafka Consumers. Kafka Cluster is used
465
+ to create an environment that assures the distributed exchange of messages between the Kafka Producer and the Kafka
466
+ Consumers. It contains the Kafka Broker and the Zookeeper service. The job orchestration and cluster topology is done
467
+ by the Zookeeper service, a distributed coordination service for distributed applications [4]. The Kafka Broker’s main
468
+ role is to act as a transition channel. It takes messages in the form of <tweet, topic> pairs and delivers them to the right
469
+ Kafka Consumer. Thus, the receiving of data by the Kafka Consumers is done in parallel in real-time in a non-blocking
470
+ way. Each Kafka Consumer stores messages in their own topic-dependent collections within MongoDB and stores
471
+ <topic, [(tweet_ids, geolocation)]> pairs, i.e., a topic and a list of all the related tweets ids with their geolocation. The
472
+ geolocation is used for sharding.
473
+ 4.6
474
+ Community Graphs and User interface
475
+ This module is used to present in real-time to users one or more topics of interest from one or more hazard related fields
476
+ on Google maps (Figure 3a). Users can choose and subscribe to desired topics (Figure 3b) and can monitor a specific
477
+ area on the map just by searching for it. For each subscribed topic, the user sees on the map a colored pins updated
478
+ automatically in almost real-time. A user can also view the formed communities based on the chosen topics (Figure 3c).
479
+ Each pin represent a community for a specific topic within the social graph. To form these communities, we use
480
+ Algorithm 4 with DBSCAN (Density Based Spatial Clustering of Applications with Noise) [14], a density-based
481
+ 8
482
+
483
+ TF-IDF
484
+ BiLSTM
485
+ CNN
486
+ MaxPooling
487
+ Concatenate
488
+ BERT
489
+ BiLSTM
490
+ CNN
491
+ MaxPooling
492
+ DenseTF-IDF
493
+ BiLSTM
494
+ CNN
495
+ MaxPooling
496
+ DenseBERT
497
+ BiLSTM
498
+ CNN
499
+ MaxPooling
500
+ Dense(a) Google map view
501
+ (b) Subscriptions
502
+ (c) Communities per topic
503
+ Figure 3: User interface
504
+ clustering algorithm. DBSCAN computes the density of points (core points) p around which we form the area A. Thus,
505
+ the clustering algorithm measures density as the number of points within the radius εl of a point from the analyzed
506
+ dataset. It can estimate the connected components of the λ-density level set x : f(x) ≥ λ given n samples from an
507
+ unknown density f [27].
508
+ The user has access to the <topic, tweets> pairs. The topic is extracted from the MongoDB based on the user’s
509
+ subscribed topics. By matching the tweet_ids presented in the tweets and topic collections, we extract all the geographical
510
+ coordinates and group them together using DBSCAN. Thus, the same topic can appear multiple times on the map
511
+ in different geographic locations. For these geographic locations, we present to the user the latest information as the
512
+ tweets are updated in real-time by the Twitter Data Collector module. This component employs strong synchronization,
513
+ in order to retrieve information from the database in near real-time.
514
+ If a user unsubscribes from a topic, then the corresponding pins are removed from the map. We use timestamped
515
+ matching queries to retrieve the relevant information. The pins for the topics that have not beet updated in more than
516
+ 24h are removed automatically from the map. Their topics are kept in tweets collection for retraining and improving
517
+ performance of the OLDA model.
518
+ 4.7
519
+ Design Challenges
520
+ With real-time data stream collection systems, it is important to take into account that the system may be disconnected
521
+ from the service. To mitigate this challenge, we implemented a background process checker that verifies every 30
522
+ seconds that the Twitter Data Collection is working. Also, Twitter is limiting the number of tweets that can be collect in
523
+ an hour. We address this challenge by using filters to select only relevant tweets.
524
+ To build the topic graph, we use OLDA. The reason behind choosing OLDA, instead of LSI or NMF, is that OLDA is
525
+ a probabilistic model while NMF and LSI are a matrix factorization and multivariate analysis techniques. With the
526
+ increase of the volume of collected data, the runtime performance of OLDA can decrease. Thus, we systematically
527
+ start in background a new OLDA training process each hour. When a training process is finished, the new model is
528
+ uploaded in the application and the old one is removed from production and archived. Furthermore, we also use the
529
+ same approach to fine-tune the misinformation model to improve performance. We use the same strategy for building
530
+ the community graph with DBSCAN as we do for constructing the topic graph with OLDA. We use DBSCAN as we
531
+ do not need to know apriori the number of clusters. We use sharding for our database to increase localization, load
532
+ balancing, and querying through geodistribution. For all the collections, we use the geolocation coordinates as the shard
533
+ key. We also use replication to create three member replica sets for each shard. Through this mechanism, we increase
534
+ data availability, add fault and partition tolerance, and eliminate the single point of failure. These design choices are
535
+ also used to seamlessly scale the datasets horizontally.
536
+ 9
537
+
538
+ La Verendry
539
+ Wildlife
540
+ Reserve
541
+ Algonquin
542
+ Manitoulin
543
+ Provincial
544
+ Island
545
+ Park
546
+ SCONSIN
547
+ MICHIGAN
548
+ NEWYOR
549
+ PENNSYLVA
550
+ LLINOIS
551
+ INDIANA
552
+ OHIO
553
+ MARYLAND NE
554
+ WEST
555
+ DELA
556
+ VIRGINIA
557
+ KENTUCKY
558
+ VIRGINIATopic 1
559
+ Topic 2
560
+ Topic 3
561
+ Topic 4
562
+ Topic 55
563
+ Evaluation
564
+ In this section, we present the experimental results of our proposed system, ContCommRTD. We first focus on the
565
+ ablation testing for the misinformation detection models. Secondly, we present two use cases of ContCommRTD for
566
+ the disaster reporting:
567
+ 1) Hydrological Hazards and
568
+ 2) COVID-19 Infection Hazards.
569
+ We conclude this section with ContCommRTD scalability tests.
570
+ 5.1
571
+ Data Collection
572
+ We collect two datasets for the two use cases. First, for the Hydrological Hazards use case we collect 356 483 Tweets
573
+ using the hydrological data dictionary and store them in the distributed MongoDB database. This dataset is also used to
574
+ train the first OLDA model and to evaluate the algorithm’s runtime performance and topic quality for the first. Second,
575
+ for the COVID-19 Infection Hazards we collect 50 230 and present the community detection results. Table 1 presents a
576
+ subset of the used keywords and hashtags for both hydrological and COVID-19 use cases.
577
+ Table 1: Example of filter keywords (subset)
578
+ Keywords
579
+ flood
580
+ flowage, rain, precipitation, floodplain, groundwater, overflow, deluge
581
+ water level, water flow, rainfall, inundation, torrent, groundwater flood
582
+ tsunami, torential, costal flooding, costal storm, river flooding, hurricane, ...
583
+ Hashtags
584
+ flood
585
+ #flood, #precipitation, #rainfall, #deluge, #torrent, #inundation, #rain
586
+ #floods, #waterlevel, #hurricane, #tornado, #torential, #storm, #flowage, ...
587
+ Keywords
588
+ Covid-19
589
+ coronavirus, corona, COVID, COVID-19, pandemic, quarantine, lockdown,
590
+ corona virus, hand sanitizer, infection, wash your hands, mask,
591
+ personal protective equipment, covid quarentined, intensive care ...
592
+ Hashtags
593
+ Covid-19
594
+ #covid, #sarscov2, #corona, #vaccine, #stayhealthy, #stayathome,
595
+ #SARSCoV2 #viruscorona, #quarentined, #quarentinelife, ...
596
+ 5.2
597
+ Evaluation Metrics
598
+ 5.2.1
599
+ Misinformation Detection
600
+ To evaluate the quality of the Deep Learning architectures employed for Misinformation Detection, we use Accuracy,
601
+ Precision, and Recall.
602
+ 5.2.2
603
+ Topic Modeling
604
+ To evaluate the quality of the topic model, we employ perplexity and topic coherence [37]. Perplexity is a measure that
605
+ determines how well a probability model predicts a sample [20]. A low perplexity denotes that the distribution predicts
606
+ correctly the sample. For topic modeling, an algorithm that achieves a low perplexity indicates that it fit the data better.
607
+ Topic Coherence measures the human-interpretability of a topic [35]. We use the CV [44] to measure the coherence of
608
+ our topics. For perplexity, we use gensim’s log_perplexity() implementation, while for CV we use palmetto [44].
609
+ 5.2.3
610
+ Community Detection
611
+ To evaluate the quality of the communities, we employ Davies-Bouldin [11], Calinski-Harabasz [5], and Silhouette [46].
612
+ The Davies-Bouldin score measures the separation between clusters by computing the ratio between within-cluster
613
+ distances and between-cluster distances which determines the average similarity of each cluster with its most similar
614
+ cluster. The Davies-Bouldin score bounded in the range [0, 1], whit a score closer to 0 showing better separation. The
615
+ Calinski-Harabasz score measures how well are the clusters defined by computing the ratio between the within-cluster
616
+ dispersion and the between-cluster dispersion. A higher Calinski-Harabasz shows core shows clusters that are dense
617
+ and well separated. Unfortunately, the Calinski-Harabasz score is not bounded. The Silhouette score is another
618
+ measurement for determining how well are the clusters defined by computing the mean intra-cluster distance and the
619
+ mean nearest-cluster distance. The Silhouette is defined in [−1, 1] range, with scores closer −1 for incorrect clusters,
620
+ scores closer to +1 for highly dense clusters, and scores around 0 for overlapping clusters.
621
+ 10
622
+
623
+ 5.3
624
+ Misinformation Detection
625
+ To test the proposed models, we use two publicly available dataset: Covid-19 dataset [7] and LIAR [60] using 2 labels,
626
+ i.e., fake or real. For the experiments, we use a 70%-30% train-test split with random shuffle, while maintaining the
627
+ the class ratio for the two sets. We use 256 units for the BiLSTM with a dropout of 0.2. For the CNN layer, we use
628
+ 64 filters and a kernel size of 128. We used a 5 000-dimensions TF-IDF vector and the pretrained 1 024-dimension
629
+ BERT transformer from HuggingFace [62], i.e., bert-large-uncased. We observed that FN-BERT-TFIDF outperforms
630
+ the other two models on both dataset (Table 2).
631
+ Table 2: Misinformation ablation results
632
+ Dataset
633
+ Model
634
+ Accuracy
635
+ Precision
636
+ Recall
637
+ F1 Score
638
+ LIAR
639
+ FN-TFIDF
640
+ 56.01 ± 0.33
641
+ 55.81 ± 0.52
642
+ 55.85 ± 0.54
643
+ 55.83 ± 0.53
644
+ FN-BERT
645
+ 58.75 ± 0.44
646
+ 57.97 ± 0.50
647
+ 57.09 ± 0.46
648
+ 57.53 ± 0.48
649
+ FN-BERT-TFIDF
650
+ 60.92 ± 0.59
651
+ 60.65 ± 0.90
652
+ 60.66 ± 0.97
653
+ 60.65 ± 0.93
654
+ LSTM [42]
655
+ ∼58
656
+ N/A
657
+ N/A
658
+ N/A
659
+ Covid-19
660
+ FN-TFIDF
661
+ 81.93 ± 0.37
662
+ 78.48 ± 0.64
663
+ 76.90 ± 0.11
664
+ 77.68 ± 0.19
665
+ FN-BERT
666
+ 86.86 ± 0.07
667
+ 86.86 ± 0.07
668
+ 86.86 ± 0.07
669
+ 86.86 ± 0.07
670
+ FN-BERT-TFIDF
671
+ 87.92 ± 0.04
672
+ 87.91 ± 0.02
673
+ 87.92 ± 0.03
674
+ 87.82 ± 0.02
675
+ VAE + MLP [7]
676
+ N/A
677
+ N/A
678
+ N/A
679
+ 85.98 ± 0.10
680
+ 5.4
681
+ Topic and Communities detection
682
+ When training OLDA, we need to initialize two parameters:
683
+ 1) Alpha the document-topic density (a larger value means that a document contain a lager number of topics), and
684
+ 2) Beta the topic-word density (a larger value means that more words are considered to belong to the same topic).
685
+ We initialize these values to "auto" in order to learn them automatically from the corpus. After training the OLDA
686
+ model 10 times on the initial corpus, we obtain an average runtime of 17min.
687
+ 5.4.1
688
+ Use case 1: Hydrological Hazards.
689
+ We extract 3 topics (Table 3) and evaluate the quality of the model using perplexity, obtaining a score of 7.83 for the
690
+ entire dataset. This score shows that OLDA manages to predict well the data sample from our dataset. Finally, we
691
+ compute the CV score to determine topic coherence and human-interpretability. For the OLDA model train on the initial
692
+ corpus we obtain a CV = 0.48, meaning that the topics are readable by users. The evaluation of the community graphs
693
+ shows a good separation and well-bounded clusters. The scores we obtain are the following: 0.0286 Davies-Bouldin,
694
+ ∼ 3.60e9 Calinski-Harabasz, and 0.9758 Silhouette.
695
+ Table 3: Example of OLDA topics for hydrological hazards
696
+ Topic
697
+ Keywords and importance
698
+ 1
699
+ rain
700
+ wind
701
+ temp
702
+ disaster
703
+ humidity
704
+ weather
705
+ 0.133
706
+ 0.039
707
+ 0.025
708
+ 0.022
709
+ 0.015
710
+ 0.011
711
+ 2
712
+ hurricane
713
+ water
714
+ overflow
715
+ help
716
+ time
717
+ authority
718
+ 0.044
719
+ 0.034
720
+ 0.021
721
+ 0.019
722
+ 0.018
723
+ 0.018
724
+ 3
725
+ thunderstorm
726
+ severe
727
+ warning
728
+ storm
729
+ tornado
730
+ county
731
+ 0.053
732
+ 0.046
733
+ 0.044
734
+ 0.032
735
+ 0.019
736
+ 0.018
737
+ Table 4 presents some examples of tweet-topic distribution.
738
+ 5.4.2
739
+ Use case 2: COVID-19 Infection Hazards.
740
+ As in the first use case, we train an OLDA model to create geolocation-content based communities on COVID-19
741
+ related topics. Figure 4a depicts the communities for three major Coronavirus related topics, while Figure 4b shows the
742
+ word cloud for the "blue" topic from Figure 4a (#1 in Table 5). We extract 3 topics (Table 5) for which we obtain a
743
+ perplexity score of 9.01 and a CV score of 4.8 for the entire dataset. We obtain the following score for the community
744
+ graphs: 0.0197 Davies-Bouldin, ∼ 2.62e9 Calinski-Harabasz, and 0.9853 Silhouette. By evaluating these scores, we
745
+ observe that we obtain well separated and bounded clusters.
746
+ 11
747
+
748
+ Table 4: Example of matching tweets to topics
749
+ Topic
750
+ Tweet
751
+ 1
752
+ 2
753
+ 3
754
+ 4
755
+ 5
756
+ 6
757
+ After a hurricane, a guy found this pittie on
758
+ the roof of a submerged car waiting for help
759
+ 0.02
760
+ 0.02
761
+ 0.02
762
+ 0.02
763
+ 0.90
764
+ 0.021
765
+ Happening now: A 33,000 litres of truck laden
766
+ with diesel was prevented from causing another
767
+ national disaster by Officers and men of Federal
768
+ Fire Service at Ojuelegba bridge. Situation under
769
+ control and normalcy restored.
770
+ 0.0
771
+ 0.0
772
+ 0.0
773
+ 0.96
774
+ 0.0
775
+ 0.0
776
+ (a) Communities
777
+ (b) Word cloud for "blue" community
778
+ Figure 4: COVID-19 Infection Hazards
779
+ Table 5: Example of OLDA topics for COVID-19 hazards
780
+ Topic
781
+ Keywords and importance
782
+ 1
783
+ cases
784
+ home
785
+ intensive
786
+ care
787
+ #coronavirus
788
+ quarantine
789
+ 0.090
790
+ 0.080
791
+ 0.080
792
+ 0.079
793
+ 0.072
794
+ 0.070
795
+ 2
796
+ coronavirus
797
+ covid-19
798
+ hospital
799
+ virus
800
+ wuhan
801
+ chinese
802
+ 0.116
803
+ 0.078
804
+ 0.035
805
+ 0.035
806
+ 0.035
807
+ 0.034
808
+ 3
809
+ #coronavirus
810
+ outbreak
811
+ health
812
+ vaccine
813
+ spread
814
+ died
815
+ 0.198
816
+ 0.119
817
+ 0.090
818
+ 0.080
819
+ 0.072
820
+ 0.069
821
+ 5.5
822
+ Scalability
823
+ To test the scalability of the proposed system, we simulate multiple scenarios that simultaneously use two types of
824
+ processes in a pseudo-distributed environment. The first type of process connects to the MongoDB database, inserts a
825
+ new tweet in the tweets collections, and updates its topic-dependent collection. The second type of process simulates
826
+ multiple clients that count all the tweets present at a given moment for a topic of interest. This set of experiments are
827
+ run on an IBM System x3550 M4 with 64GB of RAM and an Intel(R) Xeon(R) CPU E5-2670 v2 @ 2.50GHz with 40
828
+ cores.
829
+ Table 6 presents the results for 10 executions. For a tiny number of write and read operations, i.e., the number of tweets
830
+ writes ≤ 1 000 and the number of clients reads ≤ 1 000, the system is stable and handles the burst of requests in under a
831
+ second. In this case, the maximum response time of 0.55 seconds is registered for 1 000 write and 1 000 read operations.
832
+ As the number of operations increases, the system handles the request in under 1.5 minutes. We note that the probability
833
+ of receiving a high number of tweets and having a large number of client requests, even during a disaster, is very low.
834
+ 12
835
+
836
+ gas realising europelikely fargate opening
837
+ said
838
+ lookcase milanoyrdon
839
+ n old fast
840
+ like china
841
+ store.
842
+ del
843
+ speaklspy countryTable 6: Runtime in seconds: write vs. read operations
844
+ No. Clients
845
+ 100
846
+ 1 000
847
+ 10 000
848
+ 100 000
849
+ No. Tweets
850
+ 100
851
+ 0.13 ± 0.01
852
+ 0.54 ± 0.01
853
+ 4.49 ± 0.16
854
+ 44.10 ± 0.30
855
+ 1 000
856
+ 0.36 ± 0.01
857
+ 0.55 ± 0.01
858
+ 4.43 ± 0.05
859
+ 43.67 ± 1.21
860
+ 10 000
861
+ 3.45 ± 0.11
862
+ 3.59 ± 0.03
863
+ 4.80 ± 0.02
864
+ 48.05 ± 0.05
865
+ 100 000
866
+ 33.37 ± 0.48
867
+ 34.60 ± 0.07
868
+ 34.83 ± 0.77
869
+ 87.67 ± 1.04
870
+ 6
871
+ Conclusions
872
+ In this paper, we present ContCommRTD, a new distributed system that determines geolocation-content based com-
873
+ munities depending on the topics of interest and user geolocation, and takes into account misinformation on social
874
+ networks. Moreover, we have also shown how our system can be applied to track the evolution of different hazards.
875
+ This is of significant importance, especially for government organizations that can subscribe to topics of interest in a
876
+ specific geographical area or can subscribe to receive information on a topic regardless of the location. Our system also
877
+ provides an interactive graphical interface where a user can select what are the topics of interest. On the user map, the
878
+ notifications within the relevant topics will appear colored. All the notifications that came from the detection of other
879
+ information apart from the chosen topics are displayed in gray color. Furthermore, our approach can be generalized
880
+ for other types of hazards or social events if new terms are added to the dictionary used to collect specific tweets. As
881
+ tweets collected from unreliable or unchecked sources may spread misinformation, we consider detecting these tweets
882
+ and removing them from our active communities. For this task, we propose FN-BERT-TFIDF, a new Deep Learning
883
+ BERT-based model. Moreover, the proposed system scales well as the number of read and write operations increases.
884
+ As future work, we plan to add more information in order to analyze human behaviors during disasters, as follows.
885
+ Between the filtering and preprocessing process, the tweet could undergo a more detailed analysis, such as domain-
886
+ specific rule-based filtering and disambiguation, and text-based sentiment analysis [34, 28, 57].
887
+ References
888
+ [1] Martín Abadi and et al.
889
+ TensorFlow:
890
+ Large-scale machine learning on heterogeneous systems.
891
+ https://www.tensorflow.org/, 2015.
892
+ [2] Loulwah AlSumait, Daniel Barbará, and Carlotta Domeniconi. On-line lda: Adaptive topic models for mining
893
+ text streams with applications to topic detection and tracking. In IEEE International Conference on Data Mining,
894
+ pages 3–12. IEEE, 2008. doi: 10.1109/ICDM.2008.140.
895
+ [3] Chidubem Arachie, Manas Gaur, Sam Anzaroot, William Groves, Ke Zhang, and Alejandro Jaimes. Unsupervised
896
+ detection of sub-events in large scale disasters. In Proceedings of the AAAI Conference on Artificial Intelligence,
897
+ volume 34, pages 354–361, 2020.
898
+ [4] Cyrille Artho and et al. Model-based testing of Apache ZooKeeper: Fundamental API usage and watchers.
899
+ Software Testing, Verification and Reliability, 30(7-8), 2019. doi: 10.1002/stvr.1720.
900
+ [5] T. Calinski and J. Harabasz. A dendrite method for cluster analysis. Communications in Statistics, 3(1):1–27,
901
+ 1974. doi: 10.1080/03610927408827101.
902
+ [6] Guido Cervone and et al. Using twitter for tasking remote-sensing data collection and damage assessment: 2013
903
+ boulder flood case study. International Journal of Remote Sensing, 37(1):100–124, 2015. doi: 10.1080/01431161.
904
+ 2015.1117684.
905
+ [7] Mingxi Cheng and et al. A covid-19 rumor dataset. Frontiers in Psychology, 12:1566, 2021. ISSN 1664-1078.
906
+ doi: 10.3389/fpsyg.2021.644801.
907
+ [8] Kristina Chodorow.
908
+ MongoDB : the definitive guide.
909
+ O’Reilly Media, Sebastopol, Calif, 2010.
910
+ ISBN
911
+ 9781449381561.
912
+ [9] Aaron Clauset, Mark EJ Newman, and Cristopher Moore. Finding community structure in very large networks.
913
+ Physical review E, 70(6):066111, 2004.
914
+ [10] Limeng Cui and Dongwon Lee.
915
+ Coaid:
916
+ Covid-19 healthcare misinformation dataset.
917
+ arXiv preprint
918
+ arXiv:2006.00885, 2020.
919
+ [11] David L. Davies and Donald W. Bouldin. A cluster separation measure. IEEE Transactions on Pattern Analysis
920
+ and Machine Intelligence, PAMI-1(2):224–227, apr 1979. doi: 10.1109/TPAMI.1979.4766909.
921
+ 13
922
+
923
+ [12] Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. Bert: Pre-training of deep bidirectional
924
+ transformers for language understanding. In Conference of the North American Chapter of the Association for
925
+ Computational Linguistics, pages 4171–4186. ACL, 2019. doi: 10.18653/v1/N19-1423.
926
+ [13] Mingxuan Dou, Yandong Wang, Yanyan Gu, Shihai Dong, and Yuejin Deng Mengling Qiao. Disaster damage
927
+ assessment based on fine-grained topics in social media. Computers & Geosciences, 156:104893, 2021. ISSN
928
+ 0098-3004. doi: https://doi.org/10.1016/j.cageo.2021.104893.
929
+ [14] Martin Ester, Hans-Peter Kriegel, Jörg Sander, and Xiaowei Xu. A density-based algorithm for discovering
930
+ clusters a density-based algorithm for discovering clusters in large spatial databases with noise. In International
931
+ Conference on Knowledge Discovery and Data Mining, pages 226–231. AAAI, 1996.
932
+ [15] Cornelia Ferner and et al. Automated seeded latent dirichlet allocation for social media based event detection and
933
+ mapping. Information, 11(8):376, jul 2020. doi: 10.3390/info11080376.
934
+ [16] J. Fohringer, D. Dransch, H. Kreibich, and K. Schröter. Social media as an information source for rapid flood
935
+ inundation mapping. Natural Hazards and Earth System Sciences, 15(12):2725–2738, 2015. doi: 10.5194/
936
+ nhessd-3-4231-2015.
937
+ [17] Amir Masoud Forati and Rina Ghose. Geospatial analysis of misinformation in covid-19 related tweets. Applied
938
+ Geography, 133:102473, 2021.
939
+ [18] Nishant Garg. Apache Kafka. Packt Publishing, 2013. ISBN 1782167935.
940
+ [19] Adrien Guille and Cécile Favre. Event detection, tracking, and visualization in twitter: a mention-anomaly-based
941
+ approach. Social Network Analysis and Mining, 5(1):1–18, 2015. doi: 10.1007/s13278-015-0258-0.
942
+ [20] Pankaj Gupta, Yatin Chaudhary, Thomas Runkler, and Hinrich Schuetze. Neural topic modeling with continual
943
+ lifelong learning. In International Conference on Machine Learning, pages 3907–3917. PMLR, 2020.
944
+ [21] Btool Hamoui, Mourad Mars, and Khaled Almotairi. FloDusTA: Saudi tweets dataset for flood, dust storm,
945
+ and traffic accident events. In Proceedings of the 12th Language Resources and Evaluation Conference, pages
946
+ 1391–1396, Marseille, France, may 2020. European Language Resources Association. URL https://www.
947
+ aclweb.org/anthology/2020.lrec-1.174.
948
+ [22] Aldo Hernandez-Suarez and et al. Using twitter data to monitor natural disaster social dynamics: A recurrent
949
+ neural network approach with word embeddings and kernel density estimation. Sensors, 19(7):1746, apr 2019.
950
+ doi: 10.3390/s19071746.
951
+ [23] Guenter Hesse, Christoph Matthies, and Matthias Uflacker. How fast can we insert? an empirical performance
952
+ evaluation of apache kafka. In 2020 IEEE 26th International Conference on Parallel and Distributed Systems
953
+ (ICPADS), pages 641–648. IEEE, dec 2020. doi: 10.1109/ICPADS51040.2020.00089.
954
+ [24] Xiao Huang, Zhenlong Li, Cuizhen Wang, and Huan Ning. Identifying disaster related social media for rapid
955
+ response: a visual-textual fused CNN architecture. International Journal of Digital Earth, 13(9):1017–1039, jun
956
+ 2019. doi: 10.1080/17538947.2019.1633425.
957
+ [25] Kyle Hunt, Bairong Wang, and Jun Zhuang. Misinformation debunking and cross-platform information sharing
958
+ through twitter during hurricanes harvey and irma: a case study on shelters and id checks. Natural Hazards, 103:
959
+ 861–883, 2020.
960
+ [26] Vlad-Iulian Ilie, Ciprian-Octavian Truic˘a, Elena-Simona Apostol, and Adrian Paschke. Context-aware misin-
961
+ formation detection: A benchmark of deep learning architectures using word embeddings. IEEE Access, 9:
962
+ 162122–162146, 2021. doi: 10.1109/ACCESS.2021.3132502.
963
+ [27] Heinrich Jiang. Density level set estimation on manifolds with dbscan. In International Conference on Machine
964
+ Learning, pages 1684–1693. PMLR, 2017.
965
+ [28] Yi Qiang Jinwen Xu. Analysing information diffusion in natural hazards using retweets - a case study of 2018
966
+ winter storm diego. Annals of GIS, 0(0):1–15, 2021. doi: 10.1080/19475683.2021.1954086.
967
+ [29] Rabiul Islam Jony, Alan Woodley, and Dimitri Perrin. Flood detection in social media images using visual features
968
+ and metadata. In 2019 Digital Image Computing: Techniques and Applications (DICTA), pages 1–8. IEEE, dec
969
+ 2019. doi: 10.1109/DICTA47822.2019.8946007.
970
+ [30] Zhenzhong Lan, Mingda Chen, Sebastian Goodman, Kevin Gimpel, Piyush Sharma, and Radu Soricut. Albert:
971
+ A lite bert for self-supervised learning of language representations. In International Conference on Learning
972
+ Representations, pages 1–17, 2020.
973
+ [31] Zhenlong Li, Cuizhen Wang, Christopher T. Emrich, and Diansheng Guo. A novel approach to leveraging social
974
+ media for rapid flood mapping: a case study of the 2015 south carolina floods. Cartography and Geographic
975
+ Information Science, 45(2):97–110, 2017. doi: 10.1080/15230406.2016.1271356.
976
+ 14
977
+
978
+ [32] Yinhan Liu, Myle Ott, Naman Goyal, Jingfei Du, Mandar Joshi, Danqi Chen, Omer Levy, Mike Lewis, Luke
979
+ Zettlemoyer, and Veselin Stoyanov. Roberta: A robustly optimized bert pretraining approach, 2019.
980
+ [33] Christopher Loynes, Jamal Ouenniche, and Johannes De Smedt. The detection and location estimation of disasters
981
+ using twitter and the identification of non-governmental organisations using crowdsourcing. Annals of Operations
982
+ Research, pages 1–33, jul 2020. doi: 10.1007/s10479-020-03684-8.
983
+ [34] Wojciech Lukasiewicz, Kia Teymourian, and Adrian Paschke. A rule-based system for monitoring of microblog-
984
+ ging disease reports. In The Semantic Web: ESWC 2014 Satellite Events, pages 401–406. Springer, 2014. doi:
985
+ 10.1007/978-3-319-11955-7\_56.
986
+ [35] Wojciech Lukasiewicz, Alexandru Todor, and Adrian Paschke. Human perception of enriched topic models. In
987
+ Business Information Systems, pages 15–29. Springer, 2018. doi: 10.1007/978-3-319-93931-5\_2.
988
+ [36] Tinghuai Ma, YuWei Zhao, Honghao Zhou, Yuan Tian, Abdullah Al-Dhelaan, and Mznah Al-Rodhaan. Natural
989
+ disaster topic extraction in sina microblogging based on graph analysis. Expert systems with applications, 115:
990
+ 346–355, 2019.
991
+ [37] David Newman, Jey Han Lau, Karl Grieser, and Timothy Baldwin. Automatic evaluation of topic coherence.
992
+ In Annual Conference of the North American Chapter of the Association for Computational Linguistics, pages
993
+ 100–108. ACL, 2010.
994
+ [38] Minh-Tien Nguyen, Tri-Thanh Nguyen, Asanobu Kitamoto, and Van-Hau Nguyen. Exploiting social networks as
995
+ a live mass media channel during disasters for reactions. International Journal on Artificial Intelligence Tools, 30
996
+ (05):2150024, 2021.
997
+ [39] Fabian Pedregosa and et al. Scikit-learn: Machine learning in Python. Journal of Machine Learning Research, 12:
998
+ 2825–2830, 2011.
999
+ [40] Kellin Pelrine, Jacob Danovitch, and Reihaneh Rabbany. The surprising performance of simple baselines for
1000
+ misinformation detection. In WWW ’21: The Web Conference 2021, Virtual Event / Ljubljana, Slovenia, April
1001
+ 19-23, 2021, pages 3432–3441. ACM / IW3C2, 2021. doi: 10.1145/3442381.3450111.
1002
+ [41] Martin F. Porter. An algorithm for suffix stripping. Program, 14(3):130–137, 1980.
1003
+ [42] Hannah Rashkin, Eunsol Choi, Jin Yea Jang, Svitlana Volkova, and Yejin Choi. Truth of varying shades: Analyzing
1004
+ language in fake news and political fact-checking. In Proceedings of the 2017 Conference on Empirical Methods
1005
+ in Natural Language Processing, pages 2931–2937. ACL, 2017. doi: 10.18653/v1/D17-1317.
1006
+ [43] Radim ˇReh˚uˇrek and Petr Sojka. Software Framework for Topic Modelling with Large Corpora. In Workshop on
1007
+ New Challenges for NLP Frameworks, pages 45–50. ACL, 2010.
1008
+ [44] Michael Röder, Andreas Both, and Alexander Hinneburg. Exploring the space of topic coherence measures. In
1009
+ ACM International Conference on Web Search and Data, pages 399–408. ACM, 2015. doi: 10.1145/2684822.
1010
+ 2685324.
1011
+ [45] Julian F. Rosser, Didier G. Leibovici, and Mike J Jackson. Rapid flood inundation mapping using social media,
1012
+ remote sensing and topographic data. Natural Hazards, 87(1):103–120, 2017. doi: 10.1007/s11069-017-2755-0.
1013
+ [46] Peter J. Rousseeuw. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of
1014
+ Computational and Applied Mathematics, 20:53–65, 1987. doi: 10.1016/0377-0427(87)90125-7.
1015
+ [47] Naina Said and et al. Natural disasters detection in social media and satellite imagery: a survey. Multimedia Tools
1016
+ and Applications, 78(22):31267–31302, jul 2019. doi: 10.1007/s11042-019-07942-1.
1017
+ [48] Dipak Singh, Shayan Shams, Joohyun Kim, Seung-jong Park, and Seungwon Yang. Fighting for information
1018
+ credibility: An end-to-end framework to identify fake news during natural disasters. In International Conference
1019
+ on Information Systems for Crisis Response and Management, 2020.
1020
+ [49] Luke Smith, Qiuhua Liang, Phil James, and Wen Lin. Assessing the utility of social media as a data source
1021
+ for flood risk management using a real-time modelling framework. Journal of Flood Risk Management, 10(3):
1022
+ 370–380, 2015. doi: 10.1111/jfr3.12154.
1023
+ [50] Luke S. Snyder, Morteza Karimzadeh, Ray Chen, and David S Ebert. City-level geolocation of tweets for real-time
1024
+ visual analytics. In ACM SIGSPATIAL International Workshop on AI for Geographic Knowledge Discovery, pages
1025
+ 85–88. ACM, 2019. doi: 10.1145/3356471.3365243.
1026
+ [51] Eleanor Starkey and et al. Demonstrating the value of community-based (’citizen science’) observations for
1027
+ catchment modelling and characterisation. Journal of Hydrology, 548:801–817, 2017. doi: 10.1016/j.jhydrol.
1028
+ 2017.03.019.
1029
+ 15
1030
+
1031
+ [52] Reem Suwaileh, Muhammad Imran, Tamer Elsayed, and Hassan Sajjad. Are we ready for this disaster? towards
1032
+ location mention recognition from crisis tweets. In Proceedings of the 28th International Conference on Com-
1033
+ putational Linguistics, pages 6252–6263. International Committee on Computational Linguistics, 2020. doi:
1034
+ 10.18653/v1/2020.coling-main.550.
1035
+ [53] Ciprian-Octavian Truic˘a, Elena-Simona Apostol, Jérôme Darmont, and Ira Assent. TextBenDS: a generic
1036
+ textual data benchmark for distributed systems. Information Systems Frontiers, 23(1):81–100, mar 2020. doi:
1037
+ 10.1007/s10796-020-09999-y.
1038
+ [54] Ciprian-Octavian Truic˘a, Elena-Simona Apostol, Jérôme Darmont, and Torben Bach Pedersen. The forgotten
1039
+ document-oriented database management systems: An overview and benchmark of native XML DODBMSes in
1040
+ comparison with JSON DODBMSes. Big Data Research, 25:100205, jul 2021. doi: 10.1016/j.bdr.2021.100205.
1041
+ [55] Ciprian-Octavian Truic˘a and Elena-Simona Apostol. TLATR: Automatic topic labeling using automatic (domain-
1042
+ specific) term recognition. IEEE Access, 9:76624–76641, 2021. doi: 10.1109/ACCESS.2021.3083000.
1043
+ [56] Ciprian-Octavian Truic˘a and Elena-Simona Apostol. MisRoBÆRTa: Transformers versus Misinformation.
1044
+ Mathematics, 10(4):1–25(569), feb 2022. ISSN 2227-7390. doi: 10.3390/math10040569.
1045
+ [57] Ciprian-Octavian Truic˘a, Elena-Simona Apostol, Maria-Luiza S, erban, and Adrian Paschke. Topic-based document-
1046
+ level sentiment analysis using contextual cues.
1047
+ Mathematics, 9(21):1–23(2722), oct 2021.
1048
+ doi: 10.3390/
1049
+ math9212722.
1050
+ [58] Maximilian Walther and Michael Kaisser. Geo-spatial event detection in the twitter stream. In European
1051
+ Conference on Information Retrieval, pages 356–367. Springer, 2013. doi: 10.1007/978-3-642-36973-5\_30.
1052
+ [59] Bairong Wang and Jun Zhuang. Rumor response, debunking response, and decision makings of misinformed
1053
+ twitter users during disasters. Natural Hazards, 93(3):1145–1162, 2018.
1054
+ [60] William Yang Wang. "liar, liar pants on fire": A new benchmark dataset for fake news detection. In Proceedings
1055
+ of the 55th Annual Meeting of the Association for Computational Linguistics (Volume 2: Short Papers), pages
1056
+ 422–426. ACL, 2017. doi: 10.18653/v1/P17-2067.
1057
+ [61] Marc Wick and et al. Geonames. http://www.geonames.org/, 2015.
1058
+ [62] Thomas Wolf and et al. Transformers: State-of-the-art natural language processing. In Conference on Empirical
1059
+ Methods in Natural Language Processing, pages 38–45. ACL, 2020.
1060
+ [63] Chao Zhang and et al. TrioVecEvent: Embedding-Based Online Local Event Detection in Geo-Tagged Tweet
1061
+ Streams. In ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 595–604.
1062
+ ACM, aug 2017. doi: 10.1145/3097983.3098027.
1063
+ [64] Chao Zhang and et al. GeoBurst+: Effective and Real-Time Local Event Detection in Geo-Tagged Tweet Streams.
1064
+ ACM Transactions on Intelligent Systems and Technology, 9(3):1–24, feb 2018. doi: 10.1145/3066166.
1065
+ 16
1066
+
btFPT4oBgHgl3EQfBDTK/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
c9FJT4oBgHgl3EQfRiy-/content/tmp_files/2301.11496v1.pdf.txt ADDED
@@ -0,0 +1,2230 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On Excess Mass Behavior in Gaussian Mixture
2
+ Models with Orlicz-Wasserstein Distances
3
+ Aritra Guha⋆
4
+ Nhat Ho†
5
+ XuanLong Nguyen⋆
6
+ Department of Statistics, University of Michigan⋆
7
+ Department of Statistics and Data Sciences, The University of Texas at Austin†
8
+ January 30, 2023
9
+ Abstract
10
+ Dirichlet Process mixture models (DPMM) in combination with Gaussian kernels
11
+ have been an important modeling tool for numerous data domains arising from
12
+ biological, physical, and social sciences. However, this versatility in applications does
13
+ not extend to strong theoretical guarantees for the underlying parameter estimates,
14
+ for which only a logarithmic rate is achieved. In this work, we (re)introduce and
15
+ investigate a metric, named Orlicz-Wasserstein distance, in the study of the Bayesian
16
+ contraction behavior for the parameters. We show that despite the overall slow
17
+ convergence guarantees for all the parameters, posterior contraction for parameters
18
+ happens at almost polynomial rates in outlier regions of the parameter space. Our
19
+ theoretical results provide new insight in understanding the convergence behavior
20
+ of parameters arising from various settings of hierarchical Bayesian nonparametric
21
+ models. In addition, we provide an algorithm to compute the metric by leveraging
22
+ Sinkhorn divergences and validate our findings through a simulation study.
23
+ 1
24
+ Introduction
25
+ From their origin in the work of Pearson Pearson (1894), mixture models have been widely
26
+ used by statisticians McLachlan & Basford (1988); Lindsay (1995); Mengersen et al. (2011)
27
+ in variety of modern interdisciplinary domains such as medical science Schlattmann (2009),
28
+ bioinformatics Ji et al. (2005), survival analysis Tsodikov et al. (2003), psychometry Gu et al.
29
+ (2018) and image classification Permuter et al. (2006), to name just a few. The heterogeneity
30
+ in data populations and associated quantities of interest has inspired the use of a variety of
31
+ kernels, each with its own advantages and characteristics. Gaussian kernels are particularly
32
+ popular in various inferential problems, especially those related to density estimation and
33
+ clustering analysis Kotz et al. (2001); Bailey et al. (1994.); Roeder & Wasserman (1997); Robert
34
+ (1996); Banfield & Raftery (1993). In addition to the choice of kernels, the Bayesian mixture
35
+ modelers are also guided by the selection of prior distributions for the quantities of interest. In
36
+ particular, Bayesian nonparametric priors (BNP) for mixture models are increasingly embraced,
37
+ thanks to computational ease and the modeling flexibility that these rich priors entail Escobar
38
+ & West (1995); MacEachern (1999).
39
+ On the theoretical front, convergence rates for (Gaussian) mixture models received extensive
40
+ treatments in the Bayesian paradigm Ghosal et al. (2000); Barron et al. (1999); Ghosal &
41
+ van der Vaart (2007). There have been enormous recent progress on both density estimation
42
+ and parameter estimation problems. The density estimation problem under Gaussian mixture
43
+ models with BNP priors was extensively studied by Ghosal & van der Vaart (2001) who
44
+ obtained attractive polynomial rates of contraction relative to the Hellinger distance metric.
45
+ In the parameter estimation problem, the metric of choice is Wasserstein distance, which
46
+ 1
47
+ arXiv:2301.11496v1 [math.ST] 27 Jan 2023
48
+
49
+ proved to be a natural tool to analyze the convergence of mixture parameters Nguyen (2013).
50
+ Moreover, Nguyen (2013) showed that the fast rates for density estimation with BNP Gaussian
51
+ mixtures do not extend themselves to parameter estimation scenarios. Meanwhile, practitioners
52
+ have employed successfully BNP mixture models, which yield useful estimates for model
53
+ parameters that provide meaningful information about the data population’s heterogeneity.
54
+ This state of affairs leaves a gap in the theoretical understanding and the practical usage
55
+ of Bayesian mixture models. In this paper, we aim to bridge this gap by capturing more
56
+ accurately the heterogenenous behavior in the rates of parameter estimation. We proceed to
57
+ describe this in further detail.
58
+ 1.1
59
+ Gaussian Mixture Models
60
+ Consider discrete mixing (probability) measure G = �k
61
+ i=1 piδθi. Here, p = (p1, . . . , pk) is a
62
+ vector of mixing weights, while atoms {θi}k
63
+ i=1 are elements in a given space Θ ⊂ Rd. Here
64
+ k is used to denote the number of components, which can potentially be infinite. Mixing
65
+ measure G is combined with a Gaussian kernel with known covariance matrix Σ, denoted by
66
+ f(·|θ) ∼ N(θ, Σ) (to avoid notational cluttering, we remove Σ from notation in the remainder
67
+ of the paper), with respect to the Lebesgue measure µ to yield a mixture density:
68
+ pG(.) :=
69
+
70
+ f(·|θ)dG(θ) =
71
+ k
72
+
73
+ i=1
74
+ pif(·|θi).
75
+ (1)
76
+ The atoms θi’s are representatives of the underlying subpopulations. Let X1, . . . , Xn be i.i.d.
77
+ samples from a mixture density pG0(x) =
78
+
79
+ f(x|θ)dG0(θ), where G0 = �k0
80
+ i=1 p0
81
+ i δθ0
82
+ i is a true but
83
+ unknown discrete mixing measure with unknown number of support points k0 ∈ N ∪ {∞}. We
84
+ assume in this work that all the masses {p0
85
+ i }k0
86
+ i=1 are strictly positive and the atoms {θ0
87
+ i : i ≤ k0}
88
+ are distinct.
89
+ A Bayesian mixture modeler places a prior distribution Πn on a suitable space (specifically,
90
+ G(Θ) of discrete measures on Θ). The posterior distribution corresponding to Πn, both of
91
+ which may vary with sample size, can be computed as:
92
+ Πn(G ∈ B
93
+ ��X1:n) =
94
+
95
+ B
96
+ �n
97
+ i=1 pG(Xi)dΠn(G)
98
+
99
+ G(Θ)
100
+ �n
101
+ i=1 pG(Xi)dΠn(G).
102
+ (2)
103
+ Dirichlet process Gaussian mixture models: In the absense of the knowledge of the
104
+ number of mixture components k0, the learning of mixture models is carried out by the use of
105
+ Bayesian non-parametric (BNP) priors, leading to the infinite mixture setting. One of the
106
+ most popular such priors is the Dirichlet process prior Antoniak (1974), which uses sample
107
+ draws from a base measure H to define the random components and weights of the mixture
108
+ model, leading to the popular Dirichlet Process Gaussian Mixture Models (DPGMM) Lo
109
+ (1984); Escobar & West (1995). In essence, the Dirichlet process prior places zero probability
110
+ on mixing measures with a finite number of supporting atoms and enables the addition of
111
+ more atoms in the supporting set as the number of data points increase. The DPGMM is
112
+ formulated as follows:
113
+ G
114
+
115
+ DP(α, H),
116
+ θ1, . . . , θn
117
+ i.i.d.
118
+
119
+ G,
120
+ Xi|θi
121
+
122
+ f(Xi|θi),
123
+ ∀i = 1, . . . , n,
124
+ (3)
125
+ 2
126
+
127
+ where DP stands for Dirichlet process, the base measure H is a distribution on Θ, and α > 0
128
+ is a concentration parameter which controls the rate at which new atoms may be considered,
129
+ by varying the tail-behavior of mixture weights. A parametric counterpart of DPGMM is the
130
+ mixture of finite Gaussian mixtures prior (MFM) Miller & Harrison (2018), which places all
131
+ its mass on mixing measures with finite number of supporting atoms. BNP priors other than
132
+ DPGMM may have the effects of pushing the atoms away from each other Xie & Xu (2017) or
133
+ encouraging the weights of mixture to have a polynomial tail behavior De Blasi et al. (2015).
134
+ The popularity of BNP priors may partially have been promoted due to a misconception
135
+ that it ”automatically” determines the number of components in the posterior inference process.
136
+ This issue was highlighted by Miller & Harrison (2014), who demonstrated that Dirichlet
137
+ Process priors overestimate the true number of components, k0, almost surely. Subsequent
138
+ work Guha et al. (2021) has provided post-processing techniques to determine k0 consistently
139
+ with Dirichlet Process priors. Their method depends on the knowledge of the parameter
140
+ contraction rate, with respect to the Euclidean Wasserstein metric, i.e., Wasserstein metric
141
+ with underlying distance metric ℓ2, a rate that is extremely slow for the Gaussian kernels
142
+ Nguyen (2013).
143
+ The inconsistency of estimating k0 arises primarily because Dirichlet priors typically tend
144
+ to create a large number of extraneous components. While some of these components may
145
+ be in the neighborhood of the true supports, others may be outliers and in practice, can be
146
+ easily eliminated from consideration by careful truncation techniques. However, the Euclidean
147
+ Wasserstein distance treats both the scenarios similarly and in turn yields slow convergence
148
+ rates for both sets of extraneous atoms. This calls for alternative metrics for investigating
149
+ parameter estimation rates. In a recent work, Manole & Ho (2022) argued that Wasserstein
150
+ metrics capture only the worst-case uniform rates of parameter estimation and therefore can
151
+ yield extremely slow rates in comparison to the local rates observed in practice, which may
152
+ vary drastically based on the likelihood curvature in the parameter neighborhood. Employing
153
+ alternate distance metrics via the use of Voronoi tessallations, they showed that in the finite
154
+ Gaussian mixture setting with overfitted components (where ∞ > k > k0), even though the
155
+ uniform convergence rates may be slow as k increases, there may still be some atoms which
156
+ enjoy much faster rates of convergence.
157
+ The infinite Gaussian mixture setting is generally more challenging to address, (a) since the
158
+ ”true” atoms are not guaranteed to be well-separated, (b) each true atom may be surrounded
159
+ by potentially infinitely many atoms a posteriori and (c) a posteriori samples can potentially
160
+ have a significant portion of atomic masses attributed to outlier regions of the parameter space.
161
+ We argue in this work that in the infinite Gaussian mixture setting, the rates captured by
162
+ Wasserstein distances for outlier masses are inadequately slow and will demonstrate that with
163
+ the help of a new suitably defined choice of metric this difficulty can be alleviated.
164
+ 1.2
165
+ Contribution
166
+ As a primary contribution of this work we study a generalized class of metrics called Orlicz-
167
+ Wasserstein metrics, in the context of parameter estimation arising in infinite mixture models.
168
+ We show that an in-depth analysis using this metric helps alleviate a number of the concerns
169
+ attributable to the use of Wasserstein distances for quantifying the rates of parameter con-
170
+ vergence arising in infinite Gaussian mixtures. This class of distance metrics generalizes the
171
+ Wasserstein metric relative to the Orlicz norm using a variety of choices of convex functions.
172
+ They encompass a very wide range of distances on the space of probability measures, including
173
+ the Euclidean Wasserstein metrics as a special case. By making appropriate choices of convex
174
+ 3
175
+
176
+ functions we can obtain a fast, almost polynomial contraction rates for atomic masses in
177
+ outlier regions of the parameter space. This is very different from the slow local contraction
178
+ behavior around the true atoms under the standard Wasserstein metric. This helps us establish
179
+ informative and useful finer details about the convergence behavior of parameter estimates
180
+ underlying the usage of Gaussian mixture models in clustering. We believe the usage of
181
+ Orlicz-Wasserstein metrics for parameter estimation in Dirichlet process Gaussian mixture
182
+ models opens a new range of directions for future research that aim for developing statistically
183
+ sound and computationally efficient strategies for posterior sampling with mixture models.
184
+ Organization. The remainder of the paper is organized as follows. Section 2 provides
185
+ necessary backgrounds about posterior contraction of parameters in Gaussian mixture models
186
+ under Wasserstein distances. Section 3.1 introduces Orlicz-Wasserstein distances and some of
187
+ its key properties. Section 3.4 provides computational approximations to calculating Orlicz-
188
+ Wasserstein metrics for two mixing measures. Section 3.2 presents exact lower bounds for the
189
+ Hellinger metric with respect to Orlicz-Wasserstein distances for Gaussian kernels. Section 3.3
190
+ uses the results in Section 3.2 to provide the key results in the paper with regards to contraction
191
+ behavior using Orlicz-Wasserstein metrics. Proofs of results are deferred to the Appendices.
192
+ Notation. For any function g : X → R, we denote �g(ω) as the Fourier transformation of
193
+ function g. Given two densities p, q (with respect to the Lebesgue measure µ), the squared
194
+ Hellinger distance is given by h2(p, q) = (1/2)
195
+
196
+ (
197
+
198
+ p(x) −
199
+
200
+ q(x))2dµ(x). For any metric d
201
+ on Θ, we define the open ball of d-radius ϵ around θ0 ∈ Θ as Bd(ϵ, θ0). Additionally, the
202
+ expression an ≳ bn will be used to denote the inequality up to a constant multiple where
203
+ the value of the constant is independent of n. We also denote an ≍ bn if both an ≳ bn and
204
+ an ≲ bn hold. Furthermore, we denote Ac as the complement of set A for any set A while
205
+ B(x, r) denotes the ball, with respect to the l2 norm, of radius r > 0 centered at x ∈ Rd.
206
+ The expression D(ϵ, P, d) used in the paper denotes the ϵ-packing number of the space P
207
+ relative to the metric d. d is replaced by h to denote the hellinger norm. Finally, we use
208
+ Diam(Θ) = sup{∥θ1 − θ2∥ : θ1, θ2 ∈ Θ} to denote the diameter of a given parameter space Θ
209
+ relative to the l2 norm, ∥ · ∥, for elements in Rd. Regarding the space of mixing measures,
210
+ let Ek := Ek(Θ) and Ok := Ok(Θ) respectively denote the space of all mixing measures with
211
+ exactly and at most k support points, all in Θ. Additionally, denote G := G(Θ) =
212
+
213
+ k∈N+ Ek the
214
+ set of all discrete measures with finite supports on Θ. G(Θ) denotes the space of all discrete
215
+ measures (including those with countably infinite supports) on Θ. Finally, M(Θ) stands for
216
+ the space of all probability measures on Θ.
217
+ 2
218
+ Posterior contraction under Wasserstein distance
219
+ Following the work of Nguyen (2013), Wasserstein distances have been used to explore
220
+ parameter estimation rates of mixture models, embodied through their mixing measures.
221
+ In this section, we outline the basic concepts as follows. Let Θ ⊂ Rd. Moreover, define
222
+ M(Θ) = {P : P is a probability measure on Θ}.
223
+ Definition 2.1. Given µ, ν ∈ M(Θ) and the l2 metric ∥ · ∥ on Rd, the Wasserstein dis-
224
+ tance Villani (2009) of order r seeks a joint measure π ∈ Π minimizing
225
+ Wr(µ, ν) :=
226
+
227
+ inf
228
+ π∈Π
229
+
230
+ Θ×Θ
231
+ ∥θ1 − θ2∥rdπ(θ1, θ2)
232
+ �1/r
233
+ .
234
+ (4)
235
+ 4
236
+
237
+ Here, Π is the set of couplings of µ and ν denoted by Π = {π : γ1
238
+ #π = µ, γ2
239
+ #π = ν}, where γ1,
240
+ γ2 are functions that project onto the first and second coordinates of Θ × Θ respectively.
241
+ In particular, as shown by Nguyen (2013), given two discrete measures G = �k
242
+ i=1 piδθi and
243
+ G′ = �k′
244
+ i=1 p′
245
+ iδθ′
246
+ i, a coupling between p and p′ is a joint distribution q on [1 . . . , k] × [1, . . . , k′],
247
+ which is expressed as a matrix q = (qij)1≤i≤k,1 ≤j≤k′ ∈ [0, 1]k×k′ with marginal probabilities
248
+ �k
249
+ i=1 qij = p′
250
+ j and � j = 1k′qij = pi for any i = 1, 2, . . . , k and j = 1, 2, . . . , k′. We use
251
+ Q(p, p′) to denote the space of all such couplings of p and p′. For any r ≥ 1, the r-th order
252
+ Wasserstein distance between G and G′ is given by
253
+ Wr(G, G′)
254
+ =
255
+ inf
256
+ q∈Q(p,p′)
257
+ ��
258
+ i,j
259
+ qij∥θi − θ′
260
+ j∥r
261
+ �1/r
262
+ .
263
+ (5)
264
+ Heinrich & Kahn (2018) show that with Gaussian kernels, the minimax rate for estimation
265
+ is dependent on the number of extra components and goes down as the number of potential
266
+ components increases, meaning it gets harder to accurately cluster the observations as we
267
+ have more and more extra components. The Gaussian kernel being smooth fits in as many
268
+ components as possible without changing the mixture density and therefore achieves a very
269
+ slow parameter contraction rate. With potentially infinitely many extra components (while
270
+ using Dirichlet Process priors), rates are even slower. In fact, Nguyen (2013) shows that for
271
+ DPGMM with posterior distribution Πn(·|X1:n), the following holds true.
272
+ Πn
273
+
274
+ G ∈ G(Θ) : W2(G, G0) ≲ (log n)−1/2
275
+ ����X1:n
276
+
277
+ → 1
278
+ (6)
279
+ in pG0-probability. On the other hand, it has been shown that ordinary-smooth kernels need
280
+ only a power of − log(ϵ) components to approximate an infinite component mixing density upto
281
+ ϵ- approximation in Lq distance Nguyen (2013); Gao & van der Vaart (2016). Correspondingly,
282
+ Laplace kernels need a polynomial power of (1/ϵ) many components for the same degree
283
+ of approximation. This combined with (6) suggests that BNP priors use a lot more extra
284
+ components to fit the true mixture distribution than is necessary, especially with Gaussian
285
+ kernel. The extra components can potentially arise from two different sources, (i) multiple
286
+ supporting atoms in the posterior trying to approximate each true atom, (ii) or excessively
287
+ many outlier atoms in the posterior sample. If condition (ii) is true, this may potentially have
288
+ negative consequences for using Gaussian kernels for clustering purposes. From Eq. (6), we
289
+ are only able to conclude that
290
+ Πn
291
+
292
+ G =
293
+
294
+ piδθi :
295
+
296
+ j
297
+ pj1{∥θj−θ0
298
+ i ∥>η ∀i} ≳
299
+ log(n)/η2
300
+ ����X1:n
301
+
302
+ → 1
303
+ (7)
304
+ which states that masses attributed to outlier atoms (those > η distance from any ”true” atom)
305
+ vanish at only a slow logarithmic rate. Clearly, while standard Wasserstein distances are the
306
+ popular choices of metrics, they do not help differentiate between the sources of extra atoms,
307
+ and thereby are not useful while discarding outlier atoms. To facilitate this distinction of
308
+ the source of excess atoms, in this paper we consider a generalisation of standard (Euclidean)
309
+ Wasserstein metrics called Orlicz-Wasserstein distances which allow placement of higher weight
310
+ penalties on outliers and thereby help to identify outlier atoms better. We proceed in the
311
+ following sections to describe this in further detail.
312
+ 5
313
+
314
+ 3
315
+ A generalized metric for contraction of mixing measures
316
+ In existing literature thus far, the rates of parameter estimation have been extensively studied
317
+ with respect to Euclidean Wasserstein distances, in the works of Nguyen (2013); Ho & Nguyen
318
+ (2016b,a); Gao & van der Vaart (2016); Guha et al. (2021). As part of this work, we extend
319
+ such results to the regime of Orlicz-Wassertein metrics which take a more careful consideration
320
+ of the geometry of the parameter space. In that regard, for the sake of completeness, we first
321
+ introduce the reader to the notion of Orlicz norms and spaces as follows.
322
+ 3.1
323
+ Orlicz-Wasserstein distance
324
+ The Orlicz norm is defined as follows Wellner (2017).
325
+ Definition 3.1. Let µ be a σ−finite measure on a space X with metric ∥ · ∥. Assume that
326
+ Φ : [0, ∞) → [0, ∞) be a convex function satisfying:
327
+ (i) Φ(x)
328
+ x
329
+ → ∞,
330
+ as x → ∞,
331
+ (ii) Φ(x)
332
+ x
333
+ → 0,
334
+ as x → 0.
335
+ Then, the Orlicz space is defined as follows:
336
+ LΦ :=
337
+
338
+ f : X → R| ∃ λ ∈ R+ s.t.
339
+
340
+ X
341
+ Φ(∥f(x)∥/λ) dµ(x) ≤ 1
342
+
343
+ .
344
+ (8)
345
+ Moreover, the Orlicz norm corresponding to f ∈ LΦ is given by:
346
+ ∥f∥Φ := inf{λ ∈ R+ :
347
+
348
+ X
349
+ Φ(∥f(x)∥/λ) dµ(x) ≤ 1}.
350
+ (9)
351
+ Without loss of generalisation, we will assume X = Rd, with ∥ · ∥ denoting the standard
352
+ Euclidean metric. Notice that when Φ(x) = xp with p ≥ 1, the Orlicz norm, ∥f∥Φ is the
353
+ same as the Lp-norm. In this sense, the Orlicz norm generalizes the concept of Lp-norm for
354
+ p ≥ 1. Recall that, a coupling between two probability measures ν1 and ν2 on Rd is a joint
355
+ distribution on Rd × Rd with corresponding marginal distributions ν1 and ν2. Corresponding
356
+ to the Orlicz norms, we define the Orlicz-Wasserstein metric which generalizes the Wr-metric
357
+ as follows.
358
+ Definition 3.2. Let ν1, ν2 be probability measures on (Rd, ∥ · ∥). Assume that Φ : [0, ∞) →
359
+ [0, ∞) is a convex function satisfying conditions (i) and (ii) in Definition 3.1. We define the
360
+ Orlicz-Wasserstein distance between ν1 and ν2 as follows:
361
+ WΦ(ν1, ν2) :=
362
+ inf
363
+ ν∈Q(ν1,ν2) inf{λ ∈ R+ :
364
+
365
+ Rd×Rd Φ(∥x − y∥/λ) dν(x, y) ≤ 1},
366
+ (10)
367
+ where Q(ν1, ν2) is the set of all possible couplings of ν1 and ν2.
368
+ Orlicz Wasserstein distances have been briefly introduced in the works of Kell (2017);
369
+ Sturm (2011), however, the utility of the metrics for contraction properties of parameter
370
+ estimation has remained hitherto unexplored. Also, following Lemma 3.1 of Sturm (2011),
371
+ we see under some minor regularity conditions, for every Φ, ν1, ��2, there exists λmin and νopt
372
+ 6
373
+
374
+ such that λmin = WΦ(ν1, ν2) and
375
+
376
+ Rd×Rd Φ(∥x − y∥/λmin) dνopt(x, y) = 1. This combined with
377
+ Fubini’s theorem establishes the equivalence of the definitions in this work and those of Sturm
378
+ (2011); Kell (2017).
379
+ Note that when Φ(x) = xr for r ≥ 1, then WΦ(ν1, ν2) = Wr(ν1, ν2), the usual Wasserstein
380
+ distance of order r between ν1 and ν2.
381
+ The following lemma demonstrates that Orlicz-
382
+ Wasserstein defines a proper metric on (Rd, ∥ · ∥).
383
+ Lemma 3.3. The Orlicz-Wasserstein WΦ is a distance metric on the set of probability
384
+ measures on (Rd, ∥·∥), namely, it is symmetric and satisfies the identity and triangle inequality
385
+ properties.
386
+ The proof of Lemma 3.3 is in Appendix B.1. The notion of Orlicz-Wasserstein distance may
387
+ encompass a stronger notion of metrics than that of the usual Wasserstein distance to compare
388
+ probability measures as evidenced by the following lemma.
389
+ Lemma 3.4. Let ν1, ν2 be probability measures on (Rd, ∥ · ∥). Also assume Φ, Ψ are convex
390
+ functions satisfying conditions (i) and (ii) in Definition 3.1. Suppose that for all x > 0,
391
+ Φ(x) ≤ Ψ(x). Then, we have
392
+ WΦ(ν1, ν2) ≤ WΨ(ν1, ν2).
393
+ The proof of Lemma 3.4 is in Appendix B.2. Note that the supremum of convex functions
394
+ is also a convex function. Therefore, as a corollary to the above lemma we obtain the following
395
+ inequality.
396
+ Corollary 3.1. Let Φ1(·) be a polynomial convex function and Φ2(·) an exponential convex
397
+ function. Ψ is the supremum of Φ1(·) and Φ2(·). Then the following holds, for any G, G′,
398
+ 1 > α > 0.
399
+ WΨ(G, G′)
400
+
401
+ WαΦ1+(1−α)Φ2(G, G′)
402
+ (11)
403
+
404
+ αWΦ1(G, G′) + (1 − α)WΦ2(G, G′)
405
+ An important property of the Wasserstein distances is that if one mixing measure is close
406
+ to another in Wasserstein distance, it provides a way to control the corresponding contraction
407
+ rates of the atoms and the masses associated with them. The following lemma provides a
408
+ similar result for Orlicz-Wasserstein norms.
409
+ Lemma 3.5. Let G0 = �k0
410
+ i=1 p0
411
+ i δθ0
412
+ i , G = �k
413
+ i=1 piδθi be mixing measures such that θj, θ0
414
+ i ∈ Rd
415
+ for all i, j. Assume that Φ : [0, ∞) → [0, ∞) is a convex function satisfying conditions (i) and
416
+ (ii) in Definition 3.1. Then
417
+
418
+ j
419
+ pj1{∥θj−θ0
420
+ i ∥>η for all i} ≤
421
+
422
+ Φ
423
+
424
+ η
425
+ WΦ(G, G0)
426
+ ��−1
427
+ .
428
+ (12)
429
+ Here, k0, k can also take the value ∞.
430
+ The proof of Lemma 3.5 is in Appendix B.5. Lemma 3.5 allows us to identify the amount of
431
+ mass transferred over large distances, when the mass transfer occurs between two measures G
432
+ and G0. Note that the constraint on Φ is very minimal, thereby lending flexibility to the result.
433
+ Since operations like supremums of convex functions or compositions of a convex function
434
+ with a non-decreasing convex function (this is the outer function), also yield convex functions,
435
+ Lemma 3.5 is a standalone result of interest as a generalisation of Bernstein/Hoeffding type
436
+ inequalities for mixing measures.
437
+ 7
438
+
439
+ 3.2
440
+ Lower bound of Hellinger distance based on Orlicz-Wasserstein metric
441
+ In the previous section, we state results to control the cost of mass transfer attributable
442
+ to large transportation distances using Orlicz-Wasserstein distances. This is an important
443
+ result in understanding the contraction behaviors of support points in the outlier regions of
444
+ parameter space. Traditionally, contraction behavior has been extensively studied Ghosal &
445
+ van der Vaart (2001) in the regime of mixture densities pG. The following results help us
446
+ connect our understanding of posterior contraction on space of mixture densities to that of
447
+ mixing measure, relative to that of Orlicz-Wasserstein distances. This is stated as follows in
448
+ the next theorem.
449
+ Theorem 3.2. Let Φ be a convex function satisfying conditions (i) and (ii) in Definition 3.1
450
+ such that Φ(x) ≤ exp(xβ) − 1 for some 16/15 > β > 1. Then, as Θ = [−¯θ, ¯θ]d, for any mixing
451
+ measures G, G′, we have
452
+ WΦ(G, G′) ≲ C
453
+
454
+ ¯θ5/4
455
+ (log(1/h(pG, pG′)))1/8 +
456
+
457
+ 1
458
+ log(1/h(pG, pG′))
459
+ �11/8
460
+ (13)
461
+ +
462
+
463
+ 1
464
+ log(c/h(pG, pG′)(log(1/h(pG, pG′)))d/4)
465
+ �1/2�
466
+ (14)
467
+ for some constant C dependent on the dimension and known covariance matrix.
468
+ The proof of Theorem 3.2 is in Appendix A.1. The key technical novelty of the proof lies in
469
+ the idea of convolving the mixing measures with a mollifier which is exponentially integrable
470
+ while its Fourier transform is smoother than the Gaussian location kernel. This helps to
471
+ smoothly transition the problem of bounding distances on mixing measures to the Fourier
472
+ transform domain of corresponding mixture densities. We make a few comments about the
473
+ above theorem.
474
+ (i) The upper bound on the RHS of equation (13) depends on a power of log-Hellinger
475
+ distance between the corresponding mixture densities. This strengthens the result in Theorem
476
+ 2 of Nguyen (2013), who obtained a (log(1/h))−1/2 upper bound for W2(G, G′). The result in
477
+ Theorem 3.2 is obtained in terms of Orlicz-Wasserstein distances relative to an exponential
478
+ convex function, thus lending it more flexibility.
479
+ (ii) The key object to obtaining this result is to find a suitable mollifier Zδ, which we
480
+ choose as c1
481
+ δ (
482
+
483
+ exp(−itx/δ) exp(−t4)dt)2 with c being the constant of proportionality for the
484
+ proof of Theorem 3.2. However, we believe a more refined choice of mollifier can yield sharper
485
+ estimates on the RHS of equation (13).
486
+ (iii) The result is obtained with exact computation of the involvement of ¯θ. Therefore, it
487
+ can also be used for posterior contraction rates with sieve priors, although for this work we
488
+ study only compactly supported priors.
489
+ Outline of proof of Theorem 3.2:
490
+ Here, we provide a proof strategy for Theorem 3.2,
491
+ which relies on the following triangle inequality with Orlicz-Wasserstein distance between G
492
+ and G′:
493
+ WΦ(G, G′) ≤ WΦ(G, G ∗ Zδ,d) + WΦ(G′, G′ ∗ Zδ,d) + WΦ(G ∗ Zδ,d, G′ ∗ Zδ,d),
494
+ (15)
495
+ where Zδ,d(x1, . . . , xd) := �d
496
+ i=1 ζδ(xi) and ζδ(x) := c1
497
+ δ (
498
+
499
+ exp(−itx/δ) exp(−t4)dt)2, with c
500
+ being the constant of proportionality. To control both WΦ(G, G ∗ Zδ,d) and WΦ(G′, G′ ∗ Zδ,d),
501
+ we use the following lemma:
502
+ 8
503
+
504
+ Lemma 3.6. Assume that ν2 = ν1 ∗ Zδ,d where ν1 is a given probability measure on (Rd, ∥ · ∥).
505
+ Furthermore, suppose that Φ(x) ≤ exp(xα) − 1 for some 1 < α < 4/3. Then, there exists
506
+ universal constant Cα depending only on α such that
507
+ WΦ(ν1, ν2) ≤ Cαδ.
508
+ The proof of Lemma 3.6 is in Appendix B.3. For the final term WΦ(G ∗ Zδ,d, G′ ∗ Zδ,d), we can
509
+ upper bound it using the following result:
510
+ Lemma 3.7. Let ν1, ν2 be probability measures on (Rd, ∥ · ∥) and let Φ be a convex function
511
+ satisfying conditions (i) and (ii) in Definition 3.1. Then, we obtain that
512
+ WΦ(ν1, ν2)
513
+ ≤ 2 inf{λ ∈ R+ :
514
+ (16)
515
+
516
+ Rd Φ(∥x∥/λ) d|ν1(x) − ν2(x)| ≤ 1}.
517
+ The proof of Lemma 3.7 is in Appendix B.4. Using triangle inequality and Lemmas 3.6 and 3.7,
518
+ we obtain
519
+ WΦ(G, G′) ≾ δ + inf{λ ∈ R+ :
520
+
521
+ Rd Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1}.
522
+ We then decompose the integral with respect to Rd into two integrals: one with respect to
523
+ ∥x∥ ≤ M and one with respect to ∥x∥ > M, and after some algebraic manipulations, we have
524
+ inf
525
+
526
+ λ ∈ R+ :
527
+
528
+ Rd Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1
529
+
530
+
531
+ M
532
+ log(C/(h(pG, pG0) exp(α2dδ−4)Md/2)) +
533
+ (d¯θ)5/4
534
+ log(3/2)M1/4 + δ5/4
535
+ M1/4 ,
536
+ for any M > 0 where C is some universal constant. Collecting these results leads to
537
+ WΦ(G, G′) ≾ inf
538
+ δ,M
539
+
540
+ δ +
541
+ M
542
+ log(C/(h(pG, pG0) exp(α2dδ−4)Md/2)) +
543
+ (d¯θ)5/4
544
+ log(3/2)M1/4 + δ5/4
545
+ M1/4
546
+
547
+ .
548
+ Solving the minimization problem, we obtain the conclusion of Theorem 3.2.
549
+ In the next section, we use Theorem 3.2 to establish posterior contraction bounds of
550
+ parameter estimating in Dirichet Process Gaussian mixtures.
551
+ 3.3
552
+ Posterior contraction with Orlicz Wasserstein distances
553
+ On the parametric estimation front, Nguyen (2013); Guha et al. (2021); Ohn & Lin (2020)
554
+ establish logarithmic rates for estimating mixing measures in Dirichlet Process Gaussian
555
+ mixtures. While Nguyen (2013) establishes an approximately log(n)−1/2 rate of contraction
556
+ relative to the W2 metric, more recently, Ohn & Lin (2020) establish minimax type ≈ log(n)
557
+ rates relative to the W1 metric. Putting the results in context with Lemma 3.5, both those
558
+ results imply, �
559
+ j pj1∥θj−θ0
560
+ i ∥>η for all i ≈ log(n), meaning the mass of posterior sample atoms
561
+ in the region of parameter space not populated by atoms of the true (data-generating) mixing
562
+ measure decays logarithmically. This puts the use of DPGMMs for clustering in a negative
563
+ light.
564
+ 9
565
+
566
+ In this section, we show that a much stronger almost polynomial rate can be established
567
+ for this objective, facilitated by the use of Orlicz-Wasserstein metrics.
568
+ To facilitate our
569
+ presentation, we consider the following notation.
570
+ EX η(Θ, r) :=
571
+
572
+ G =
573
+
574
+ piδθi ∈ G(Θn1) :
575
+
576
+ j
577
+ pj1{∥θj−θ0
578
+ i ∥>η for all i} ≥ r
579
+
580
+ .
581
+ (17)
582
+ EX η(Θ, r) here denotes the set of mixing measures which devote at least r probability mass
583
+ to atoms which are away from the atoms of G0 by distance η. To study the contraction of
584
+ mixing measure of DPGMMs, we impose the following assumption on the base distribution H.
585
+ (P.1) The base distribution H is supported on Θ = [−¯θ, ¯θ]d, and absolutely continuous
586
+ with respect to the Lebesgue measure µ on Θ and admits a density function g(·). Also, H is
587
+ approximately uniform, i.e., minθ∈Θ g(θ) >
588
+ c0
589
+ µ(Θ) > 0.
590
+ Let f1(n, d) := (log(n)/(d + 2) − log(log n))−1/8.
591
+ Theorem 3.3. Given the Dirichlet Process Gaussian mixture models (3), if Φ satisfies the
592
+ assumptions in Theorem 3.2, then for any η > 0 the following holds:
593
+ Πn
594
+
595
+ G ∈ G(Θ)
596
+ : WΦ(G, G0) ≥ f1(n, d)
597
+ ���� X1:n
598
+ � P n
599
+ G0
600
+ → 0.
601
+ The proof of Theorem 3.3 is in Appendix A.2. The following result is a simple corollary of
602
+ Theorem 3.3.
603
+ Corollary 3.4. Given all the assumptions in Theorem 3.3,
604
+ Πn
605
+
606
+ G ∈ EX η
607
+
608
+ Θ, 2 exp
609
+
610
+ −η log(n)1/8
611
+ (d + 2)
612
+ �� ���� X1:n
613
+
614
+ PG0
615
+ → 0.
616
+ (18)
617
+ The proof of Corollary 3.4 is in Appendix A.3.
618
+ Remarks: (i) Corollary 3.4 suggests that if η can be chosen sufficiently small so that each
619
+ η-neighborhood contains at most one true atom, Gaussian mixture models can be useful choices
620
+ in clustering as well since outlier atoms vanish at almost polynomial rates.
621
+ (ii) We believe the rate of contraction can be optimized further with a more refined choice
622
+ of Φ(·), however, we make no such attempts in this work. Corollary 3.4 reveals the power of
623
+ Orlicz-Wasserstein distances for Gaussian mixture models. On the other hand, this exponential
624
+ choice of Φ does not improve on the bound for heavy tailed kernels such as Laplace location
625
+ mixtures.
626
+ We show in this section that Orlicz-Wasserstein metrics provide strong theoretical guaran-
627
+ tees for mixing measures. This raises the natural question as to how such a metric can be
628
+ computed for arbitrary choices of Φ. We provide some guidance in that regard in the following
629
+ section.
630
+ 3.4
631
+ Computation of the Orlicz-Wasserstein
632
+ In practice, the Euclidean Wasserstein distance is computed for samples of the respective
633
+ distributions. The exact computation turns out to be a linear programming problem which
634
+ scales to the order of O(n3 log(n)), where n is the combined sample size of the two sampling
635
+ distributions for which the distance is being calculated. Cuturi (2013) shows that using entropic
636
+ 10
637
+
638
+ (a) Standard Wasserstein W1
639
+ (b) Orlicz-Wasserstein with exponential Φ
640
+ Figure 1. Transportation plans. (a) Entropic OT produces more global plans and is unable
641
+ to capture local structure of mass transfers. (b) Entropic Orlicz-Wasserstein penalizes mass
642
+ transfers over large distances
643
+ regularization this can be drastically improved to O(n2) Altschuler et al. (2017); Lin et al.
644
+ (2019, 2022). Further speed-ups and easiness of computation via the use of dual formulation
645
+ of the entropic regularization has been explored by the works of Seguy et al. (2017); Genevay
646
+ et al. (2016); Genevay (2019).
647
+ Here we consider the entropic regularized version of the
648
+ Orlicz-Wasserstein metrics.
649
+ Computational procedure: In that respect, we consider solving the following problem as a
650
+ surrogate to equation (10).
651
+ W λ
652
+ Φ(ν1, ν2)
653
+ := infν∈Q(ν1,ν2) AΦ(ν1, ν2),
654
+ (19)
655
+ P λ
656
+ Φ(ν1, ν2)
657
+ := arg infν∈Q(ν1,ν2) AΦ(ν1, ν2),
658
+ (20)
659
+ where AΦ(ν1, ν2) := inf{η ∈ R+ :
660
+
661
+ Rd×Rd Φ(∥x − y∥/η) dν(x, y) − (1/λ)(H(ν)) ≤ 1} with H(µ)
662
+ used to denote the Shannon entropy of distribution µ. To obtain solutions for equation (19),
663
+ we resort to using outputs from Sinkhorn divergence computations.
664
+ Consider two discrete probability measures, r (with m atoms, {xi}m
665
+ i=1) and c (with n
666
+ atoms, {yi}m
667
+ i=1). Let Mn×m be a distance matrix such that Mij = c(xi, yj) for some cost
668
+ function c(·, ·). Let S(M, λ, r, c) be used to denote the Sinkhorn divergence optimized objective
669
+ function for cost matrix M, regularization parameter λ and d(M, λ, r, c) = ⟨S(M, λ, r, c), M⟩
670
+ be used to denote the transport cost. Algorithm 1 defines a procedure to obtain a regularised
671
+ Orlicz-Wasserstein distance between ν1 = �
672
+ i riδxi and ν2 = �
673
+ i ciδyi in such a scenario by
674
+ iteratively updating the value of Orlicz-Wasserstein distance until convergence. The crucial
675
+ intuition behind Algorithm 1 is that infν∈Q(ν1,ν2)
676
+
677
+ Rd×Rd Φ(∥x−y∥/η) dν(x, y)−(1/λ)(H(ν)) is
678
+ a monotonically non-increasing function of η. Therefore the solution to the Orlicz Wasserstein
679
+ distance can be obtained by a binary search once upper and lower limits are known. This is
680
+ rigorously explained in Proposition C.1 in Appendix C.
681
+ Simulations settings: We provide a demonstration of the utility of using Orlicz-Wassestein
682
+ distances in Figure 1. We consider two mixing densities, ν1 on the y-axis is a 3-mixture of
683
+ univariate normal distributions with means at [3, 4, 5], common σ = 0.3 and mixture weights
684
+ [0.37, 0.3, 0.33]. On the other hand ν2 represented in the x-axis is a 4-mixture of univariate
685
+ Laplace kernels with means at [7, 8, 9, 6], scale parameters [0.3, 0.3, 0.3, 0.1]] and mixture
686
+ weights [0.30, 0.32, 0.32, 0.06]. The left plot of Figure 1 shows the transportation plan for
687
+ output of Sinkhorn mechanism with regularisation parameter 0.01, while the right plot shows
688
+ 11
689
+
690
+ 07
691
+ 10
692
+ 15
693
+ 2507
694
+ 10
695
+ 15
696
+ 25Algorithm 1: Computing Orlicz Wasserstein distances between two discrete proba-
697
+ bility measures
698
+ 1: Input M, λ, r, c, ϵ.
699
+ 2: Output W λ
700
+ Φ(ν1, ν2).
701
+ 3: I = (r > 0); r = r(I); M = M(I, :);
702
+ 4: xupp = max(M)/Φ−1(1),
703
+ xlow = [S(M, λ, r, c) + 1
704
+ 2λ(H(r) + H(c))]/Φ−1(1 + 1
705
+ λ(H(r) + H(c))
706
+ 5: fxupp = S(Φ(M/xupp), λ, r, c),fxlow = S(Φ(M/xlow), λ, r, c).
707
+ 6: while |xlow − xupp| < ϵ not converged do
708
+ 7: xnew = (xlow ∗ fxupp − xupp ∗ fxlow)/(fxupp − fxlow)).
709
+ 8: if xnew < xupp and xnew > xlow do
710
+ 9: fxnew = S(Φ(M/xupp), λ, r, c)
711
+ 10: if fxnew < 1, xupp = xnew, fxupp = fxnew.
712
+ 11: else: xlow = xnew, fxlow = fxnew
713
+ 12: end if
714
+ 13: else xnew = (xlow + xupp)/2. repeat Step 9-12.
715
+ 14: end if
716
+ 15: end while
717
+ 16: return W λ
718
+ Φ(ν1, ν2) := xupp.
719
+ the same for transportation plan obtained via Algorithm 1 with λ = 0.01 (Φ(·) = exp(·/β) − 1,
720
+ β = 1.1). We have the following remarks.
721
+ Remark: The entropic Orlicz-Wasserstein procedure produces sharper transport plans. This
722
+ indicates that it performs a shrinkage procedure on the space of transportation plans. This can
723
+ have potential benefits towards obtaining robust plans and provide a promising direction of
724
+ future research. Additionally, while entropic Euclidean Wasserstein transport plans distribute
725
+ the mass of the outlier atom of ν2 (mean=6, weight= 0.06), its Orlicz-Wasserstein counterpart
726
+ manages to avoid it entirely.
727
+ By penalizing mass transfers over large distances, Orlicz-
728
+ Wasserstein distances are able to restrict attention to localised transportation plans. This in
729
+ turn helps capture the small outlier mass associated with aposteriori DPGMM samples, as
730
+ seen in Section 3.3.
731
+ 4
732
+ Conclusion
733
+ In this work, we discuss the shortcomings of traditional Wasserstein metrics to perform
734
+ clustering with Gaussian mixture models. We re-introduce a novel metric, called Orlicz-
735
+ Wasserstein distances, in the context of estimating parameter convergence rates of hierarchical
736
+ and mixture models and provide sound theoretical justifications of its ability to address the
737
+ concerns associated with traditional Wasserstein distances. We also provide a theoretically
738
+ sound approximate algorithm to compute the distance metric, and also show that convergence
739
+ rates of Orlicz-Wasserstein distances carry over to the approximate distance. Lastly, we
740
+ provide a preliminary simulation study to initiate a discussion on future research with Orlicz-
741
+ Wasserstein distances. Since they allow low/high penalty on mass transfers over large distances,
742
+ depending on the choice of function Φ, this lends flexibility to extending mass transfers over
743
+ local/global regions and consequentially may be used as a device for smoothing/sharpening
744
+ 12
745
+
746
+ standard OT plans. Combined with dimension reduction techniques this can lend usage to a
747
+ number of application domains such as anomaly detection and robust optimal transport.
748
+ Acknowledgements
749
+ We thank Professor Fedor Nazarov and Professor Mark Rudelson for discussions on the paper.
750
+ This research is supported in part by grants NSF CAREER DMS-1351362, NSF CNS-1409303,
751
+ a research gift from Adobe Research and a Margaret and Herman Sokol Faculty Award.
752
+ Nhat Ho acknowledges support from the NSF IFML 2019844 and the NSF AI Institute for
753
+ Foundations of Machine Learning.
754
+ References
755
+ Altschuler, J., Niles-Weed, J., and Rigollet, P. Near-linear time approximation algorithms for
756
+ optimal transport via Sinkhorn iteration. In Advances in Neural Information Processing
757
+ Systems, pp. 1964–1974, 2017. (Cited on page 11.)
758
+ Antoniak, C. Mixtures of dirichlet processes with applications to bayesian nonparametric
759
+ problems. Annals of Statistics, 2(6):1152––1174, 1974. (Cited on page 2.)
760
+ Athey, T. L. and Vogelstein, J. T. Autogmm: Automatic gaussian mixture modeling in python.
761
+ CoRR, abs/1909.02688, 2019. URL http://arxiv.org/abs/1909.02688. (Cited on page 31.)
762
+ Bailey, T. L., Elkan, C., et al. Fitting a mixture model by expectation maximization to discover
763
+ motifs in bipolymers. 1994. (Cited on page 1.)
764
+ Banfield, J. and Raftery, A. Model based gaussian and non-gaussian clustering. Biometrics,
765
+ 49:803–821, 1993. (Cited on page 1.)
766
+ Barron, A., Schervish, M., and Wasserman, L. The consistency of posterior distributions in
767
+ nonparametric problems. Ann. Statist, 27:536–561, 1999. (Cited on page 1.)
768
+ Chakravarti, P., Balakrishnan, S., and Wasserman, L. Gaussian mixture clustering using
769
+ relative tests of fit. arXiv, 2019. URL https://arxiv.org/abs/1910.02566.
770
+ (Cited on
771
+ page 31.)
772
+ Cuturi, M. Sinkhorn distances: Lightspeed computation of optimal transport. In Advances in
773
+ Neural Information Processing Systems, 2013. (Cited on page 10.)
774
+ De Blasi, P., Favaro, S., Lijoi, A., Mena, R. H., Pruenster, I., and Ruggiero, M. Are gibbs-type
775
+ priors the most natural generalization of the dirichlet process?
776
+ IEEE Transactions on
777
+ Pattern Analysis and Machine Intelligence, 37(2):212–229, 2015. (Cited on page 3.)
778
+ Escobar, M. and West, M. Bayesian density estimation and inference using mixtures. Journal
779
+ of the American Statistical Association, 90:577––588, 1995. (Cited on pages 1 and 2.)
780
+ Gao, F. and van der Vaart, A. W. Posterior contraction rates for deconvolution of dirichlet-
781
+ laplace mixtures. Electronic Journal of Statistics, 10:608–627, 2016. (Cited on pages 5 and 6.)
782
+ 13
783
+
784
+ Genevay, A. Entropy-Regularized Optimal Transport for Machine Learning. (R´egularisation
785
+ Entropique du Transport Optimal pour le Machine Learning). PhD thesis, PSL Research
786
+ University, Paris, France, 2019. URL https://tel.archives-ouvertes.fr/tel-02319318.
787
+ (Cited on page 11.)
788
+ Genevay, A., Cuturi, M., Peyr´e, G., and Bach, F. Stochastic Optimization for Large-scale
789
+ Optimal Transport. In NIPS (ed.), NIPS 2016 - Thirtieth Annual Conference on Neural
790
+ Information Processing System, Proc. NIPS 2016, Barcelona, Spain, December 2016. URL
791
+ https://hal.archives-ouvertes.fr/hal-01321664. (Cited on page 11.)
792
+ Ghosal, S. and van der Vaart, A. Entropies and rates of convergence for maximum likelihood
793
+ and bayes estimation for mixtures of normal densities. Ann. Statist., 29:1233–1263, 2001.
794
+ (Cited on pages 1 and 8.)
795
+ Ghosal, S. and van der Vaart, A. Convergence rates of posterior distributions for noniid
796
+ observations. Ann. Statist., 35(1):192–223, 2007. (Cited on page 1.)
797
+ Ghosal, S., Ghosh, J. K., and van der Vaart, A. Convergence rates of posterior distributions.
798
+ Ann. Statist., 28(2):500–531, 2000. (Cited on pages 1, 20, 21, and 22.)
799
+ Goldberger, J. and Roweis, S. Hierarchical clustering of a mixture model. In Saul, L., Weiss,
800
+ Y., and Bottou, L. (eds.), Advances in Neural Information Processing Systems, volume 17.
801
+ MIT Press, 2004. (Cited on page 31.)
802
+ Green, P. and Richardson, S. Modelling heterogeneity with and without the dirichlet process.
803
+ Scandinavian Journal of Statistics, 28:355—-377, 2001. (Cited on page 31.)
804
+ Gu, Y., Liu, J., Xu, G., and Ying, Z. Hypothesis testing of the q-matrix. Psychometrika, pp.
805
+ 515–537, 2018. (Cited on page 1.)
806
+ Guha, A., Ho, N., and Nguyen., X. On posterior contraction of parameters and interpretability
807
+ in bayesian mixture modeling. Bernoulli, pp. 2159–2188, 2021. (Cited on pages 3, 6, 9, and 31.)
808
+ Heinrich, P. and Kahn, J. Strong identifiability and optimal minimax rates for finite mixture
809
+ estimation. The Annals of Statistics, 46(6A):2844 – 2870, 2018. (Cited on page 5.)
810
+ Ho, N. and Nguyen, X. Convergence rates of parameter estimation for some weakly identifiable
811
+ finite mixtures. Annals of Statistics, 44:2726–2755, 2016a. (Cited on page 6.)
812
+ Ho, N. and Nguyen, X. On strong identifiability and convergence rates of parameter estimation
813
+ in finite mixtures. Electronic Journal of Statistics, 10 (1):271–307, 2016b. (Cited on page 6.)
814
+ Ji, Y., Wu, C., Liu, P., Wang, J., and Coombes, K. R. Applications of beta-mixture models in
815
+ bioinformatics. Bioinformatics, 21(9):2118–2122, 02 2005. (Cited on page 1.)
816
+ Jiao, L. et al. Egmm: An evidential version of the gaussian mixture model for clustering.
817
+ Applied Soft Computing, 129, 2022. (Cited on page 31.)
818
+ Kell, M. On interpolation and curvature via wasserstein geodesics. Advances in Calculus of
819
+ Variations, 10(2):125–167, 2017. URL https://doi.org/10.1515/acv-2014-0040. (Cited
820
+ on pages 6 and 7.)
821
+ Kotz, S., Kozubowski, T. J., and Podgorski, K. The Laplace distribution and generalizations.
822
+ Birkh¨auser Boston, Inc., Boston, MA., 2001. (Cited on page 1.)
823
+ 14
824
+
825
+ Lin, T., Ho, N., and Jordan, M. On efficient optimal transport: An analysis of greedy and
826
+ accelerated mirror descent algorithms. In International Conference on Machine Learning,
827
+ pp. 3982–3991, 2019. (Cited on page 11.)
828
+ Lin, T., Ho, N., and Jordan, M. I. On the efficiency of entropic regularized algorithms for
829
+ optimal transport. Journal of Machine Learning Research (JMLR), 23:1–42, 2022. (Cited on
830
+ page 11.)
831
+ Lindsay, B. Mixture models: Theory, Geometry and Applications. NSF-CBMS Regional
832
+ Conference Series in Probability and Statistics, Institute of Mathematical Statistics, Hayward,
833
+ CA, 1995. (Cited on page 1.)
834
+ Lo, A. On a class of bayesian nonparametric estimates : I. density estimates. Annals of
835
+ Statistics, 12(1):351–357, 1984. (Cited on page 2.)
836
+ MacEachern, S. Dependent nonparametric processes. In Proceedings of the Section on Bayesian
837
+ Statistical Science, American Statistical Association, 1999. (Cited on page 1.)
838
+ MacEachern, S. and Muller, P. Estimating mixture of dirichlet process models. Journal of
839
+ Computational and Graphical Statistics, 7:223—-238, 1998. (Cited on page 31.)
840
+ Manole, T. and Ho, N. Refined convergence rates for maximum likelihood estimation under
841
+ finite mixture models. In Proceedings of the 39th International Conference on Machine
842
+ Learning, volume 162 of Proceedings of Machine Learning Research, pp. 14979–15006. PMLR,
843
+ 17–23 Jul 2022. (Cited on page 3.)
844
+ Manole, T. and Khalili, A. Estimating the number of components in finite mixture models via
845
+ the Group-Sort-Fuse procedure. The Annals of Statistics, 49(6):3043 – 3069, 2021. (Cited on
846
+ page 31.)
847
+ McLachlan, G. and Basford, K. Mixture models: Inference and Applications to Clustering.
848
+ Marcel-Dekker, New York, 1988. (Cited on page 1.)
849
+ Mengersen, K. L., Robert, C., and Titterington, M. Mixtures: Estimation and Applications.
850
+ Wiley, 2011. (Cited on page 1.)
851
+ Miller, J. and Harrison, M. Inconsistency of pitman-yor process mixtures for the number of
852
+ components. Journal of Machine Learning Research, 15:3333–3370, 2014. (Cited on pages 3
853
+ and 31.)
854
+ Miller, J. W. and Harrison, M. T. Mixture models with a prior on the number of components.
855
+ Journal of the American Statistical Association, 113, 2018. (Cited on page 3.)
856
+ Nguyen, X. Convergence of latent mixing measures in finite and infinite mixture models.
857
+ Annals of Statistics, 4(1):370–400, 2013. (Cited on pages 2, 3, 4, 5, 6, 8, 9, 22, 28, 29, and 31.)
858
+ Ohn, I. and Lin, L. Optimal bayesian estimation of gaussian mixtures with growing number of
859
+ components. 2020. URL https://arxiv.org/abs/2007.09284. (Cited on page 9.)
860
+ Pearson, K. Contributions to the mathematical theory of evolution. Philosophical Transactions
861
+ of the Royal Society A, 185:71–110, 1894. (Cited on page 1.)
862
+ 15
863
+
864
+ Permuter, H., Francos, J., and Jermyn, I. A study of gaussian mixture models of color and
865
+ texture features for image classification and segmentation. Pattern Recognition, 39(4):
866
+ 695–706, 2006. ISSN 0031-3203. Graph-based Representations. (Cited on page 1.)
867
+ Robert, C. Mixtures of distributions: inference and estimation. In Markov Chain Monte
868
+ Carlo in Practice (W. Gilks, S. Richardson and D. Spiegelhalter, eds.). Chapman and Hall,
869
+ London., 1996. (Cited on page 1.)
870
+ Roeder, K. and Wasserman, L. Practical bayesian density estimation using mixtures of normals.
871
+ J. Amer. Statist. Assoc., 92:894—-902., 1997. (Cited on page 1.)
872
+ Schlattmann, P. Medical Applications of Finite Mixture Models. Springer, 2009. (Cited on
873
+ page 1.)
874
+ Seguy, V., Damodaran, B. B., Flamary, R., Courty, N., Rolet, A., and Blondel, M. Large-scale
875
+ optimal transport and mapping estimation. 2017. URL https://arxiv.org/abs/1711.
876
+ 02283. (Cited on page 11.)
877
+ Stein, E. and Shakarchi, R. Complex Analysis. Princeton University Press, 2010. (Cited on
878
+ page 26.)
879
+ Sturm, K.-T. Generalized orlicz spaces and wasserstein distances for convex-concave scale
880
+ functions. 2011. URL https://arxiv.org/abs/1104.4223. (Cited on pages 6 and 7.)
881
+ Tsodikov, A. D., Ibrahim, J. G., and Yakovlev, A. Y. Estimating cure rates from survival
882
+ data.
883
+ Journal of the American Statistical Association, 98(464):1063–1078, 2003.
884
+ doi:
885
+ 10.1198/01622145030000001007. PMID: 21151838. (Cited on page 1.)
886
+ Villani, C. Topics in Optimal Transportation. American Mathematical Society, 2003. (Cited on
887
+ page 23.)
888
+ Villani, C. Optimal Transport: Old and New. Grundlehren der Mathematischen Wissenschaften
889
+ [Fundamental Principles of Mathemtical Sciences]. Springer, Berlin, 2009. (Cited on pages 4
890
+ and 23.)
891
+ Wellner, J. A. The bennett-orlicz norm. 2017. URL https://arxiv.org/abs/1703.01721.
892
+ (Cited on page 6.)
893
+ Wong, W. H. and Shen, X. Probability inequalities for likelihood ratios and convergences of
894
+ sieves mles. Annals of Statistics, 23:339–362, 1995. (Cited on page 22.)
895
+ Xie, F. and Xu, Y. Bayesian repulsive Gaussian mixture model. arXiv:1703.09061v2 [stat.ME],
896
+ 2017. (Cited on page 3.)
897
+ 16
898
+
899
+ Supplement to “On Excess Mass Behavior in Gaussian
900
+ Mixture Models with Orlicz-Wasserstein Distances”
901
+ In this supplementary material, we present proofs of key results in Appendix A and proofs of
902
+ lemmas in Appendix B. We then provide theoretical guarantee for the algorithm to compute
903
+ the entropic regularized Orlicz-Wasserstein in Appendix C.
904
+ A
905
+ Proofs of key results
906
+ Notation revisited
907
+ For any function g : X → R, we denote �g(ω) as the Fourier transfor-
908
+ mation of function g. Given two densities p, q (with respect to the Lebesgue measure µ), the
909
+ squared Hellinger distance is given by h2(p, q) = (1/2)
910
+
911
+ (
912
+
913
+ p(x) −
914
+
915
+ q(x))2dµ(x). For any
916
+ metric d on Θ, we define the open ball of d-radius ϵ around θ0 ∈ Θ as Bd(ϵ, θ0). Additionally,
917
+ the expression an ≳ bn will be used to denote the inequality up to a constant multiple where
918
+ the value of the constant is independent of n. We also denote an ≍ bn if both an ≳ bn and
919
+ an ≲ bn hold. Furthermore, we denote Ac as the complement of set A for any set A while
920
+ B(x, r) denotes the ball, with respect to the l2 norm, of radius r > 0 centered at x ∈ Rd.
921
+ The expression D(ϵ, P, d) used in the paper denotes the ϵ-packing number of the space P
922
+ relative to the metric d. d is replaced by h to denote the hellinger norm. Finally, we use
923
+ Diam(Θ) = sup{∥θ1 − θ2∥ : θ1, θ2 ∈ Θ} to denote the diameter of a given parameter space Θ
924
+ relative to the l2 norm, ∥ · ∥, for elements in Rd. Regarding the space of mixing measures,
925
+ let Ek := Ek(Θ) and Ok := Ok(Θ) respectively denote the space of all mixing measures with
926
+ exactly and at most k support points, all in Θ. Additionally, denote G := G(Θ) =
927
+
928
+ k∈N+ Ek the
929
+ set of all discrete measures with finite supports on Θ. Moreover, G(Θ) denotes the space of
930
+ all discrete measures (including those with countably infinite supports) on Θ. Finally, M(Θ)
931
+ stands for the space of all probability measures on Θ.
932
+ A.1
933
+ Proof of Theorem 3.2
934
+ We present the proof of Theorem 3.2 for the lower bound of Hellinger distance between mixing
935
+ density functions based on Orlicz-Wasserstein metric between their corresponding mixing
936
+ measures.
937
+ In this proof, we denote a ≲ b to imply that a ≤ C · b for a universal constant C dependent
938
+ on α, d, and ¯θ. Also, f ∗ g will denote the outcome of convolution operation on functions f
939
+ and g. Now, we consider the following density function in R:
940
+ K(x) := c
941
+ �� ∞
942
+ −∞
943
+ exp(−itx) exp(−t4)dt
944
+ �2
945
+ ,
946
+ (21)
947
+ where c is a proportionality constant so that
948
+ � ∞
949
+ −∞ K(x)dx = 1. Lemma B.1 shows that K(·) is
950
+ integrable.
951
+ Moreover, Lemma B.2 shows that the characteristic function ˆK(·), corresponding to K(·)
952
+ satisfies,
953
+ | ˆK(x)| ≲ exp(−(x/2)4).
954
+ The strategy to obtain upper bounds for WΦ(G, G′) is to convolve G with mollifiers, Zδ,d(·),
955
+ of the form Zδ,d(x) = �d
956
+ i=1
957
+ 1
958
+ δ K(xi/δ) for δ > 0, where x = (x1, . . . , xd). In particular, by
959
+ 17
960
+
961
+ triangle inequality and following Lemma 3.3 we can write:
962
+ WΦ(G, G′) ≤ W1(G, G ∗ Zδ,d) + WΦ(G′, G′ ∗ Zδ,d) + WΦ(G ∗ Zδ,d, G′ ∗ Zδ,d).
963
+ For Φ(x) = exp((7/32)x) − 1, following Lemma 3.6 we find that
964
+ WΦ(G, G ∗ Zδ,d) ≤ Cαδ.
965
+ Therefore, we can write
966
+ WΦ(G, G′) ≤ 2Cαδ + WΦ(G ∗ Zδ,d, G′ ∗ Zδ,d).
967
+ For every M > 0, we have
968
+ WΦ(G ∗ Zδ,d, G′ ∗ Zδ,d) ≤ 2 inf{λ ∈ R+ :
969
+
970
+ Rd Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1}
971
+ ≤ 2 inf{λ ∈ R+ : s1 ≤ 1/2 and s2 ≤ 1/2},
972
+ ≤ 2 max{inf{λ ∈ R+ : s1 ≤ 1/2}, inf{λ ∈ R+ : s2 ≤ 1/2}},
973
+ (22)
974
+ with the first inequality following from Lemma 3.7 and the third inequality comes from the
975
+ monotonicity of function Φ. Here, we denote
976
+ s1 =
977
+
978
+ ∥x∥2≤M
979
+ Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx,
980
+ s2 =
981
+
982
+ ∥x∥2>M
983
+ Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx.
984
+ We now proceed to bound T1 = inf{λ ∈ R+ : s1 ≤ 1/2} and T2 = inf{λ ∈ R+ : s2 ≤ 1/2}.
985
+ Bounding for T1:
986
+ Using Holder’s inequality, we obtain
987
+ inf{λ ∈ R+ :
988
+
989
+ ∥x∥2≤M
990
+ Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1/2}
991
+
992
+ inf{λ > 0 :
993
+
994
+ ∥x∥≤M
995
+ exp((∥x∥/λ)β) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 3/2}
996
+
997
+ inf
998
+
999
+ λ > 0 :
1000
+
1001
+
1002
+ ∥x∥≤M
1003
+ exp((M/λ)β)dx
1004
+ �1/2�
1005
+
1006
+ ∥x∥≤M
1007
+ |(G − G′) ∗ Zδ,d(x)|2dx
1008
+ �1/2
1009
+ ≤ 3/2
1010
+
1011
+
1012
+ inf
1013
+
1014
+ λ > 0 :
1015
+ πd/4
1016
+
1017
+ ( d
1018
+ 2 + 1)Γ(d/2)
1019
+ Md/2 exp((M/λ)β)∥(G − G′) ∗ Zδ,d(x)∥2 ≤ 3/2
1020
+
1021
+ =
1022
+ M
1023
+ (log(cd/(∥(G − G′) ∗ ζδ,d∥2Md/2)))1/β .
1024
+ (23)
1025
+ 18
1026
+
1027
+ Since f is Gaussian distribution, we have ˜f(ω) ≥ cf exp(−α �d
1028
+ i=1 ω2
1029
+ i ) for some cf, α > 0.
1030
+ Given that inequality, we find that
1031
+ ∥(G − G′) ∗ Zδ,d∥2
1032
+ 2
1033
+ =
1034
+
1035
+ | �G − �
1036
+ G′|2(ω)| �Kδ,d(ω)|2dω =
1037
+
1038
+ | �f( �G − �
1039
+ G′)|2(ω)| �Kδ,d(ω)|2
1040
+ | �f(ω)|2 dω
1041
+
1042
+ ∥pG − pG′∥2
1043
+ 2 sup
1044
+ ω∈Rd
1045
+ | �Kδ,d(ω)|2
1046
+ | �f(ω)|2
1047
+
1048
+ 4∥f∥∞h2(pG, pG0) sup
1049
+ ω∈Rd
1050
+ � 1
1051
+ c2
1052
+ f
1053
+ ·
1054
+ d
1055
+
1056
+ i=1
1057
+ exp(−δ4|ωi|4) exp(2α|ωi|2)
1058
+
1059
+ .
1060
+ By taking derivatives, we obtain the maximum as
1061
+ sup
1062
+ ωi∈R
1063
+
1064
+ exp(−δ4|ωi|4) exp(2α|ωi|2)
1065
+
1066
+ = exp(α2/δ4).
1067
+ Plugging these results into equation (23) leads to
1068
+ inf{λ ∈ R+ :
1069
+
1070
+ ∥x∥2≤M
1071
+ Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1/2}
1072
+
1073
+ M
1074
+ (log(c/(h(pG, pG0) exp(α2dδ−4)Md/2)))1/β
1075
+ (24)
1076
+ for some universal constant c.
1077
+ Bounding for T2:
1078
+ For any M > 0, we denote
1079
+ k′
1080
+ =
1081
+ inf{λ ∈ R+ : EX∼(G−G′)(Φ(∥X∥5/4/λM1/4) ≤ 1/2},
1082
+ k′′
1083
+ =
1084
+ inf{λ ∈ R+ : EY ∼Zδ,d(Φ(∥Y ∥5/4/λM1/4) ≤ 1/2}.
1085
+ (25)
1086
+ Then, by the convexity of Φ we have
1087
+ inf{λ ∈ R+ : EX∼G−G′,Y ∼Zδ,d(Φ(∥X + Y ∥5/4/λM(1/4)) ≤ 1/2} ≤ 21/4(k′ + k”).
1088
+ The above inequality is because of the following inequalities:
1089
+ EX∼G−G′,Y ∼Zδ,d(Φ(∥X + Y ∥5/4/21/4(k′ + k”)M(1/4))
1090
+
1091
+ EX∼G−G′,Y ∼Zδ,d(Φ(21/4(∥X∥5/4 + ∥Y ∥5/4)/21/4(k′ + k”)M(1/4)))
1092
+ =
1093
+ EX∼G−G′,Y ∼Zδ,d
1094
+
1095
+ Φ
1096
+ ��
1097
+ k′∥X∥5/4 + ∥Y ∥5/4�
1098
+ /(k′ + k”)M(1/4)��
1099
+
1100
+ EX∼G−G′,Y ∼Zδ,d
1101
+
1102
+ Φ
1103
+
1104
+ k′
1105
+ k′ + k”
1106
+
1107
+ ∥X∥5/4
1108
+ k′M(1/4)
1109
+
1110
+ +
1111
+ k”
1112
+ k′ + k”
1113
+
1114
+ ∥Y ∥5/4
1115
+ k”M(1/4)
1116
+ ���
1117
+
1118
+ EX∼G−G′,Y ∼Zδ,d
1119
+ k′
1120
+ k′ + k”Φ
1121
+
1122
+ ∥X∥5/4
1123
+ k′M(1/4)
1124
+
1125
+ +
1126
+ k”
1127
+ k′ + k”Φ
1128
+
1129
+ ∥Y ∥5/4
1130
+ k”M(1/4)
1131
+
1132
+ ≤ 1
1133
+ 2.
1134
+ (26)
1135
+ The first inequality follows from ∥a + b∥P ≤ 2p−1(∥a∥p + ∥b∥p). The second last inequality
1136
+ follows from convexity of Φ and the final inequality follows from equation (25). Therefore, we
1137
+ 19
1138
+
1139
+ obtain that
1140
+ inf{λ ∈ R+ :
1141
+
1142
+ ∥x∥2>M
1143
+ Φ(∥x∥/λ) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1/2}
1144
+
1145
+ inf{λ ∈ R+ :
1146
+
1147
+ ∥x∥2>M
1148
+ Φ(∥x∥5/4/λM(1/4)) · |(G − G′) ∗ Zδ,d(x)|dx ≤ 1/2}
1149
+
1150
+ inf{λ ∈ R+ : EX∼G−G′,Y ∼Zδ,d(Φ(∥X + Y ∥5/4/λM(1/4)) ≤ 1/2}
1151
+
1152
+ inf{λ > 0 :
1153
+
1154
+ Rd
1155
+ exp((∥x∥5/4/λM1/4)β) · |(G − G′)(x)|dx ≤ 3/2}
1156
+ +
1157
+ inf{λ > 0 :
1158
+
1159
+ Rd
1160
+ exp((∥x∥5/4/λM1/4)β) · |Zδ,d(x)|dx ≤ 3/2}
1161
+
1162
+ (d¯θ)5/4
1163
+ M1/4 + Cδ5/4/M 1/4,
1164
+ (27)
1165
+ where C = inf{λ > 0 :
1166
+
1167
+ Rd
1168
+ exp((∥x∥5/4/λ)β) · |K1,d(x)|dx < ∞ as K1,d(x) ∼ O(exp(−|x|4/3))
1169
+ for large |x|, by Lemma B.1. Hence, using these results we get
1170
+ WΦ(G, G′)
1171
+
1172
+ δ + max
1173
+ �(d¯θ)5/4
1174
+ M1/4 + Cδ5/4/M 1/4,
1175
+ M
1176
+ (log(c/(h(pG, pG0) exp(α2dδ−4)Md/2)))1/β
1177
+
1178
+
1179
+ δ + (d¯θ)5/4
1180
+ M1/4 + Cδ5/4/M 1/4 +
1181
+ M
1182
+ (log(c/(h(pG, pG0) exp(α2dδ−4)Md/2)))1/β . (28)
1183
+ Choosing M = (log(1/h(pG, pG0)))1/2 and δ =
1184
+ 2α2
1185
+ log(1/h(pG, pG0)) in equation (28) we obtain,
1186
+ WΦ(G, G′) ≲ (log(1/h(pG, pG0)))−1
1187
+ +
1188
+ (d¯θ)5/4
1189
+ (log(1/h(pG, pG0)))1/8 +
1190
+
1191
+ 1
1192
+ log(1/h(pG, pG0))
1193
+ �11/8
1194
+ +
1195
+
1196
+ 1
1197
+ log(c/h(pG, pG0)(log(1/h(pG, pG0)))d/4)
1198
+ �(1/β)−(1/2)
1199
+ (29)
1200
+ As a consequence, we obtain the conclusion of the theorem.
1201
+ A.2
1202
+ Proof of Theorem 3.3
1203
+ The proof of this result follows by an application of Lemma B.3, B.4 and B.5 in combination
1204
+ with Theorem 2.1 in Ghosal et al. (2000). To facilitate the presentation, we break the proof
1205
+ into several steps.
1206
+ Step 1:
1207
+ First we compute the contraction rate relative to the Hellinger metric, i.e., assume
1208
+ that
1209
+ ¯θd
1210
+ ϵd+2
1211
+ n
1212
+ log
1213
+ � ¯θ
1214
+ ϵn
1215
+
1216
+ = o(n) and nϵ2
1217
+ n → ∞.
1218
+ Then we show that
1219
+ Πn(G ∈ G(Θ) : h(pG, pG0) ≥ Lϵn|X1, . . . , Xn)
1220
+ PG0
1221
+ → 0.
1222
+ (30)
1223
+ 20
1224
+
1225
+ We apply Theorem 7.1 in Ghosal et al. (2000), with ϵ = Lϵn and D(ϵ) = exp
1226
+
1227
+ c1
1228
+
1229
+ ¯θ
1230
+ √λminϵn
1231
+ �d
1232
+ log
1233
+
1234
+ e + 32e¯θ2
1235
+ λminϵ2n
1236
+ ��
1237
+ ,
1238
+ where L ≥ 2 is a large constant to be chosen later and c1 is the constant in equation (49).
1239
+ Lemma B.4 shows the validity of this choice of D(ϵ). Then there exists a test function φn that
1240
+ satisfies
1241
+ P n
1242
+ G0φn
1243
+
1244
+ exp
1245
+
1246
+ c1
1247
+
1248
+ ¯θ
1249
+ √λminϵn
1250
+ �d
1251
+ log
1252
+
1253
+ e + 32e¯θ2
1254
+ λminϵ2n
1255
+ ��
1256
+ × exp(−KnL2ϵ2
1257
+ n)
1258
+ 1
1259
+ 1 − exp(−KnL2ϵ2n),
1260
+ sup
1261
+ G∈G(Θ):h(pG,pG0)≥Lϵn
1262
+ P n
1263
+ G(1 − φn)
1264
+
1265
+ exp(−KnL2ϵ2
1266
+ n).
1267
+ (31)
1268
+ Now, we have
1269
+ EPG0Πn(G ∈ G(Θ) : h(pG, pG0) ≥ Lϵn|X1, . . . , Xn)φn
1270
+ ≤ P n
1271
+ G0φn ≤ 2 exp
1272
+
1273
+ c1
1274
+
1275
+ ¯θ
1276
+ √λminϵn
1277
+ �d
1278
+ log
1279
+
1280
+ e + 32e¯θ2
1281
+ λminϵ2n
1282
+
1283
+ − KnL2ϵ2
1284
+ n
1285
+
1286
+ .(32)
1287
+ Based on computation with the posterior,
1288
+ Πn(G : h(pG, pG0 ≥ ϵn)|X1, . . . , Xn)(1 − φn)
1289
+ =
1290
+
1291
+ G∈G(Θ):h(pG,pG0)≥ϵn
1292
+ �n
1293
+ i=1
1294
+ pG(Xi)
1295
+ pG0(Xi)dΠn(G)(1 − φn)
1296
+
1297
+ G∈G(Θ)
1298
+ �n
1299
+ i=1
1300
+ pG(Xi)
1301
+ pG0(Xi)dΠn(G)
1302
+
1303
+
1304
+ G∈G(Θ):h(pG,pG0)≥ϵn
1305
+ �n
1306
+ i=1
1307
+ pG(Xi)
1308
+ pG0(Xi)dΠn(G)(1 − φn)
1309
+
1310
+ G∈G(Θ):K(pG0,pG)≲ϵ2
1311
+ n,K2(pG0,pG)≲ϵ2
1312
+ n(log(M/ϵn))2
1313
+ �n
1314
+ i=1
1315
+ pG(Xi)
1316
+ pG0(Xi)dΠn(G)
1317
+ ,
1318
+ where M = exp(dλ−1
1319
+ min(5¯θ2
1320
+ 0 + 4¯θ2)), with λmin being the minimum eigenvalue of Σ.
1321
+ Step 1.1:
1322
+ In this step we show that
1323
+
1324
+ G∈G(Θ):K(pG0,pG)≲ϵ2
1325
+ n,K2(pG0,pG)≲ϵ2
1326
+ n(log(M/ϵn))2
1327
+ n
1328
+
1329
+ i=1
1330
+ pG(Xi)
1331
+ pG0(Xi)dΠn(G)
1332
+ ≳ exp(−(1 + C)nλminϵ2
1333
+ n)
1334
+ Γ(γ)(c0γπd/2)D
1335
+ (2Γ(d/2 + 1))D(2D)D−1
1336
+ �√λminϵn
1337
+ 2¯θ
1338
+ �2(D−1)+dD
1339
+ (33)
1340
+ with pn
1341
+ G0 probability → 1,
1342
+ for all C > 0 and ϵn > 0 is sufficiently small, where D = D(√λminϵn, Θ, ∥.∥) ≈
1343
+ � ¯θ
1344
+ ϵn
1345
+ �d
1346
+ stands
1347
+ for the maximal √λminϵn-packing number for Θ under ∥.∥ norm, and Γ(·) is the gamma
1348
+ function. First we show that
1349
+ {G ∈ G(Θ) : W2(G, G0) ≲
1350
+
1351
+ λminϵn}
1352
+ ⊂ {G ∈ G(Θ) : K(pG0, pG) ≲ ϵ2
1353
+ n, K2(pG0, pG) ≲ ϵ2
1354
+ n(log(M/ϵn))2},
1355
+ (34)
1356
+ 21
1357
+
1358
+ for ϵn sufficiently small.
1359
+ Since
1360
+ � (pG0(x))2
1361
+ pG(x)
1362
+ µ(dx) ≤ M by Lemma B.5, it follows by an application of Theorem 5
1363
+ in Wong & Shen (1995) that for ϵn < 1/2(1 − e−1)2,
1364
+ h(pG, pG0) ≲ ϵ2
1365
+ n =⇒ K2(pG0, pG) ≲ ϵ2
1366
+ n(log(M/ϵn))2.
1367
+ Following Example 1 in Nguyen (2013), h2(pG, pG0) ≤ W 2
1368
+ 2 (G, G0)
1369
+ 8λmin
1370
+ for Gaussian location
1371
+ mixtures.
1372
+ Similarly, from Nguyen (2013) it also follows that K(pG, pG0) ≤ W 2
1373
+ 2 (G, G0)
1374
+ 2λmin
1375
+ . Combining
1376
+ the above displays, equation (34) follows.
1377
+ Following Lemma 8.1 in Ghosal et al. (2000), for every C, ϵ, M > 0 and any measure Π on
1378
+ the set {G ∈ G(Θ) : K(pG0, pG) ≲ ϵ2
1379
+ n, K2(pG0, pG) ≲ ϵ2
1380
+ n(log(M/ϵn))2}, we have,
1381
+ P n
1382
+ G0
1383
+ ��
1384
+ n
1385
+
1386
+ i=1
1387
+ pG(Xi)
1388
+ pG0(Xi)dΠn(G) ≤ exp(−(1 + C)nϵ2)
1389
+
1390
+
1391
+ 1
1392
+ C2nϵ2(log(M/ϵ))2 .
1393
+ (35)
1394
+ The result in equation (33) now follows by an application of Lemma B.3 in combination with
1395
+ equations (34) and (35) using the fact that nϵ2
1396
+ n → ∞.
1397
+ Step 1.2:
1398
+ Let the event in (33) be denoted as Tn. Then
1399
+ EPG0 [Πn(G : h(pG, pG0) ≥ Lϵn)|X1, . . . , Xn)(1 − φn)] ≤ PG0(T C
1400
+ n )
1401
+ +
1402
+ PG0(Tn)
1403
+ exp((1 + C)nλminϵ2
1404
+ n)
1405
+ Γ(γ)(c0γπd/2)D
1406
+ (2Γ(d/2+1))D(2D)D−1
1407
+ � √λminϵn
1408
+ 2¯θ
1409
+ �2(D−1)+dD
1410
+ sup
1411
+ G∈G(Θ):h(pG,pG0)≥Lϵn
1412
+ P n
1413
+ G(1 − φn)
1414
+
1415
+ exp((1 + C)nλminϵ2
1416
+ n)
1417
+ Γ(γ)(c0γπd/2)D
1418
+ (2Γ(d/2+1))D(2D)D−1
1419
+ � √λminϵn
1420
+ 2¯θ
1421
+ �2(D−1)+dD exp(−KnL2ϵ2
1422
+ n) + o(1).
1423
+ (36)
1424
+ The final step follows from simple computation similar to that of the Proof of Theorem 2.1
1425
+ in Ghosal et al. (2000) and using the fact that
1426
+ ¯θd
1427
+ ϵd+2
1428
+ n
1429
+ log
1430
+ � ¯θ
1431
+ ϵn
1432
+
1433
+ = o(n). Combining equations (32)
1434
+ and (36) and using the condition
1435
+ ¯θd
1436
+ ϵd+2
1437
+ n
1438
+ log
1439
+ � ¯θ
1440
+ ϵn
1441
+
1442
+ = o(n), it follows that for L large enough
1443
+ Πn(G ∈ G(Θ) : h(pG, pG0) ≥ Lϵn|X1, . . . , Xn)
1444
+ PG0
1445
+ → 0.
1446
+ (37)
1447
+ Step 2:
1448
+ For some sufficiently large L with ϵn = L(log n)n−1/(d+2) satisfies
1449
+ ¯θd
1450
+ ϵd+2
1451
+ n
1452
+ log
1453
+ � ¯θ
1454
+ ϵn
1455
+
1456
+ =
1457
+ o(n). Therefore we get, from the result in Step 1of this proof
1458
+ Πn
1459
+
1460
+ G ∈ G(Θ) : h(pG, pG0) ≥ L(log n)
1461
+ n1/(d+2)
1462
+ ���� X1:n
1463
+ � P n
1464
+ G0
1465
+ → 0.
1466
+ Now, from Theorem 3.2, we have
1467
+ Πn
1468
+
1469
+ G ∈ G(Θ) : WΦ(G, G0) ≥ f1(n, d)
1470
+ ���� X1:n
1471
+ � P n
1472
+ G0
1473
+ → 0,
1474
+ where f1(n, d) := (log(n)/(d + 2) − log(log n))−1/8.
1475
+ 22
1476
+
1477
+ A.3
1478
+ Proof of Corollary 3.4
1479
+ Let G0 = �k0
1480
+ i=1 p0
1481
+ i δθ0
1482
+ i , G = �k
1483
+ j=1 piδθi. Suppose q = (qij)1≤i≤k0,1 ≤j≤k ∈ [0, 1]k0×k is a coupling
1484
+ between p0 = (p0
1485
+ 1, . . . , p0
1486
+ k0) and p = (p1, . . . , pk), with Q(p, p′) represents the space of all such
1487
+ couplings of p0 and p. Using the proof technique similar to Lemma 3.5, we get
1488
+
1489
+ qij exp((∥θ0
1490
+ i − θj∥/k)β)
1491
+
1492
+
1493
+ qij1{∥θ0
1494
+ i −θj∥≥η} exp((η/k)β)
1495
+
1496
+
1497
+ pj1{∥θ0
1498
+ i −θj∥≥η for all i} exp((η/k)β),
1499
+ for all 1 < β < 16/15.
1500
+ We denote K = inf{λ ≥ 0 : � pj1{∥θ0
1501
+ i −θj∥≥η for all i} exp((η/λ)β) ≤ 2}. Then, we find that
1502
+ K ≥ η
1503
+
1504
+ log
1505
+
1506
+ 1
1507
+ � pj1{∥θ0
1508
+ i −θj∥≥η for all i}
1509
+ ��−1/β
1510
+ ,
1511
+ and
1512
+
1513
+ j
1514
+ pj1{∥θj−θ0
1515
+ i ∥>η for all i} ≤ 2 exp
1516
+
1517
+ −η
1518
+ WΦ(G, G0)
1519
+
1520
+ .
1521
+ Putting these results together with Theorem 3.3 leads to
1522
+ Πn
1523
+
1524
+ G ∈ EX η
1525
+
1526
+ �Θ, 2 exp
1527
+
1528
+ �−
1529
+
1530
+ η log(n)1/8
1531
+ (d + 2)
1532
+ �β�
1533
+
1534
+
1535
+
1536
+ ���� X1:n
1537
+
1538
+ PG0
1539
+ → 0
1540
+ in P n
1541
+ G0 probability. Since this result holds for all 1 < β < 16/15, we obtain the conclusion.
1542
+ B
1543
+ Proofs for Lemmas
1544
+ We now present the proofs for all lemmas in Section 3.
1545
+ B.1
1546
+ Proof of Lemma 3.3
1547
+ We need to show the following properties of Orlicz-Wasserstein:
1548
+ (i) WΦ(ν1, ν2) = WΦ(ν2, ν1) for any probability measures ν1, ν2 on (Rd, ∥ · ∥).
1549
+ (ii) WΦ(µ, µ) = 0 for any probability measure µ on (Rd, ∥ · ∥).
1550
+ (iii) WΦ(ν1, ν2) ≤ WΦ(ν1, ν3)+WΦ(ν3, ν2) for any probability measures ν1, ν2, ν3 on (Rd, ∥·∥).
1551
+ (i) follows easily from the fact ∥x − y∥ = is symmetric with respect to x, y ∈ Rd .
1552
+ For (ii) consider the coupling, ν(x, y) = µ(x)1x=y, then it is clear to see that for any k > 0,
1553
+
1554
+ Rd×Rd Φ(∥x − y∥/k) dν(x, y) = 1 and therefore WΦ(µ, µ) = 0.
1555
+ For part (iii), assume that WΦ(ν1, ν3) = k1, WΦ(ν3, ν2) = k2. Then, it is enough to show
1556
+ that there exists a coupling ν of ν1 and ν2 such that
1557
+
1558
+ Rd×Rd Φ(∥x − y∥/(k1 + k2)) dν(x, y) ≤ 1.
1559
+ By results from Villani (2003, 2009), there exists a coupling µ1 of ν1 and ν3 and a coupling
1560
+ µ2 of ν2 and ν3 such that,
1561
+
1562
+ Rd×Rd Φ(∥x − z∥/k1) dµ1(x, z)
1563
+
1564
+ 1
1565
+
1566
+ Rd×Rd Φ(∥z − y∥/k2) dµ2(y, z)
1567
+
1568
+ 1.
1569
+ (38)
1570
+ 23
1571
+
1572
+ Then, by a result in probability theory there exists a probability measure µ on Rd × Rd × Rd
1573
+ such that
1574
+
1575
+ x∈Rd µ(dx, y, z)
1576
+ =
1577
+ µ2(y, z)
1578
+
1579
+ x∈Rd µ(x, dy, z)
1580
+ =
1581
+ µ1(x, z)
1582
+ (39)
1583
+ Define ν(x, y) :=
1584
+
1585
+ z∈Rd µ(x, y, dz). Then, we obtain that
1586
+
1587
+ Rd×Rd Φ(∥x − y∥/(k1 + k2)) dν(x, y)
1588
+ =
1589
+
1590
+ Rd×Rd×Rd Φ(∥x − y∥/(k1 + k2)) dµ(x, y, z)
1591
+
1592
+
1593
+ Rd×Rd×Rd Φ((∥x − z∥ + ∥y − z∥)/(k1 + k2)) dµ(x, y, z)
1594
+
1595
+
1596
+ Rd×Rd×Rd Φ
1597
+
1598
+ k1
1599
+ k1 + k2
1600
+ ∥x − z∥
1601
+ k1
1602
+ +
1603
+ k2
1604
+ k1 + k2
1605
+ ∥y − z∥
1606
+ k2
1607
+
1608
+ dµ(x, y, z)
1609
+
1610
+ k1
1611
+ k1 + k2
1612
+
1613
+ Rd×Rd Φ
1614
+ �∥x − z∥
1615
+ k1
1616
+
1617
+ dµ1(x, z)
1618
+ +
1619
+ k2
1620
+ k1 + k2
1621
+
1622
+ Rd×Rd Φ
1623
+ �∥y − z∥
1624
+ k2
1625
+
1626
+ dµ2(y, z) ≤ 1.
1627
+ The first inequality follows from the triangle inequality property of ∥·∥, while the last inequality
1628
+ follows from the convexity of Φ.
1629
+ B.2
1630
+ Proof of Lemma 3.4
1631
+ Fix a coupling ν of ν1 and ν2. Consider λ satisfying
1632
+
1633
+ Rd×Rd Φ(∥x − y∥/λ) dν(x, y) < ∞,
1634
+
1635
+ Rd×Rd Ψ(∥x − y∥/λ) dν(x, y) < ∞,
1636
+
1637
+ Rd×Rd Φ(∥x − y∥/λ) dν(x, y) ≤
1638
+
1639
+ Rd×Rd Ψ(∥x − y∥/λ) dν(x, y),
1640
+ and thus, we find that
1641
+
1642
+ λ :
1643
+
1644
+ Rd×Rd Ψ(∥x − y∥/λ) dν(x, y) ≤ 1
1645
+
1646
+ (40)
1647
+
1648
+
1649
+ λ :
1650
+
1651
+ Rd×Rd Φ(∥x − y∥/λ) dν(x, y) ≤ 1
1652
+
1653
+ .
1654
+ As a consequence, we obtain the conclusion of Lemma 3.4 since infimum of a set is smaller
1655
+ than the infimum of its subset.
1656
+ 24
1657
+
1658
+ B.3
1659
+ Proof of Lemma 3.6
1660
+ Consider X ∼ ν1 and Y ∼ Zδ,d. Let K be such that
1661
+
1662
+ R
1663
+ exp((7/32)|yi/K|α − (7/16)|yi/δ|4/3)dyi < ∞.
1664
+ Then, we find that
1665
+ inf
1666
+ µ
1667
+ � �
1668
+ Rd×Rd Φ(∥x − y∥/λ) dµ(x, y) : µ ∈ Q(ν1, ν2)
1669
+
1670
+
1671
+ �1
1672
+ δ
1673
+ �d �
1674
+ Rd exp((7/32)∥y∥α/λα)
1675
+ d
1676
+
1677
+ i=1
1678
+ K1(yi/δ)
1679
+ d
1680
+
1681
+ i=1
1682
+ dyi − 1
1683
+
1684
+ d
1685
+
1686
+ i=1
1687
+ �1
1688
+ δ
1689
+ � �
1690
+ R
1691
+ exp((7/32)|yi|α/λα)K1(yi/δ)dyi − 1
1692
+ =
1693
+ d
1694
+
1695
+ i=1
1696
+ �1
1697
+ δ
1698
+ � �
1699
+ R
1700
+ φ(yi)2 exp((7/32)|yi/λ|α − (7/16)|yi/δ|4/3)dyi − 1,
1701
+ where φ(·) is the function in Lemma B.1. The second inequality follows from the fact that
1702
+ ∥x∥p ≤ ∥x∥q when p ≥ q, where ∥ · ∥p is the Lp norm.
1703
+ The final equality follows from
1704
+ Lemma B.1. Now, as |φ(x)| ≤ Cφ for some constant Cφ < ∞, we have following the result in
1705
+ Lemma 3.4,
1706
+ WΦ(ν1, ν2) ≤ Cαδ
1707
+ where
1708
+ Cα = inf
1709
+
1710
+ k > 0 :
1711
+
1712
+ R
1713
+ exp(|y/k|α − |y|4/3)dy − 1 ≤ 1
1714
+ C2
1715
+ φ
1716
+
1717
+ .
1718
+ Note that, Cα as defined above exists because α ≤ 4/3. As a consequence, we obtain the
1719
+ conclusion of the lemma.
1720
+ B.4
1721
+ Proof of Lemma 3.7
1722
+ Consider a coupling, ν between ν1 and ν2 that keeps fixed all the mass shared between ν1 and
1723
+ ν2, and redistributes the remaining mass independently, i.e.,
1724
+ ν(x, y) = (ν1(x)
1725
+
1726
+ ν2(y))1x=y +
1727
+ 1
1728
+ (ν1 − ν2)+(Rd)(ν1(x) − ν2(x))+(ν2(y) − ν1(y))+
1729
+ (41)
1730
+ Let k0 be defined as
1731
+ k0 := inf{k ∈ R+ :
1732
+
1733
+ Rd Φ(∥x∥/k) d|ν1(x) − ν2(x)| ≤ 1}.
1734
+ (42)
1735
+ Then, using ν as defined in the above display we get
1736
+
1737
+ Rd×Rd Φ(∥x − y∥/2k0) dν(x, y)
1738
+ (43)
1739
+ =
1740
+
1741
+ Rd×Rd Φ(∥x − y∥/2k0) ·
1742
+ 1
1743
+ (ν1 − ν2)+(Rd)(ν1(x) − ν2(x))+(ν2(y) − ν1(y))+
1744
+
1745
+
1746
+ Rd×Rd Φ(∥x∥/k0)(ν1(x) − ν2(x))+ ≤ 1
1747
+ 25
1748
+
1749
+ Therefore,
1750
+ WΦ(ν1, ν2) ≤ 2 inf{k ∈ R+ :
1751
+
1752
+ Rd Φ(∥x∥/k) d|ν1(x) − ν2(x)| ≤ 1}.
1753
+ As a consequence, we reach the conclusion of the lemma.
1754
+ Lemma B.1. Let f(x) = exp(−x4), and ˜f(t) = (1/2π)
1755
+ � ∞
1756
+ −∞ exp(−itx)f(x)dx. Then,
1757
+ | ˜f(t)| ≤ φ(t) exp(−7/32|t|4/3),
1758
+ (44)
1759
+ where φ(t) is an absolutely bounded real-valued function.
1760
+ Proof. Consider a rectangle on the complex plane, with vertices at R, −R, R + iζ, −R + iζ
1761
+ respectively. Following Goursat’s Theorem Stein & Shakarchi (2010) for integration along
1762
+ rectangular contours on the complex plane, the contour integral along a closed rectangle is 0.
1763
+ Therefore,
1764
+ � R
1765
+ −R
1766
+ exp(−itx)f(x)dx +
1767
+ � R+iζ
1768
+ R
1769
+ exp(−itx)f(x)dx +
1770
+ � −R
1771
+ −R+iζ
1772
+ exp(−itx)f(x)dx
1773
+ +
1774
+ � −R+iζ
1775
+ R+iζ
1776
+ exp(−itx)f(x)dx = 0.
1777
+ Now,
1778
+ |
1779
+ � R+iζ
1780
+ R
1781
+ exp(−itx)f(x)dx| = |
1782
+ � ζ
1783
+ 0
1784
+ exp(itR − tx)f(R + ix)idx| ≤ C exp(−R4) → 0,
1785
+ as R → ∞. Similarly,
1786
+ |
1787
+ � −R
1788
+ −R+iζ
1789
+ exp(−itx)f(x)dx| → 0,
1790
+ as R → ∞.
1791
+ Therefore,
1792
+ lim
1793
+ R→∞
1794
+ � R+iζ
1795
+ −R+iζ
1796
+ exp(−itx)f(x)dx = lim
1797
+ R→∞
1798
+ � R
1799
+ −R
1800
+ exp(−itx)f(x)dx = 2π ˜f(t).
1801
+ Now,
1802
+ lim
1803
+ R→∞
1804
+ � R
1805
+ −R
1806
+ exp(−itx)f(x)dx = 2π ˜f(t)
1807
+ =
1808
+ lim
1809
+ R→∞
1810
+ � R+iζ
1811
+ −R+iζ
1812
+ exp(−itx)f(x)dx
1813
+ =
1814
+ lim
1815
+ R→∞
1816
+ � R
1817
+ −R
1818
+ exp(it(x + iζ))f(x + iζ)dx.
1819
+ =
1820
+ lim
1821
+ R→∞
1822
+ � R
1823
+ −R
1824
+ exp(−itx − tζ)) exp(−(x + iζ)4)dx.
1825
+ Expanding the above expression,
1826
+ ˜f(t) = (1/2π) limR→∞
1827
+ � R
1828
+ −R exp(−itx − 4ix3ζ + 4ixζ3 − tζ − (x2 − 3ζ2)2 + 8ζ4)dx.
1829
+ 26
1830
+
1831
+ Substituting ζ = 1
1832
+ 4 sign(t)|t|1/3 in the above equationa,
1833
+ | ˜f(t)| ≤ (1/2π) exp(−(7/32)|t|4/3) ·
1834
+ � ∞
1835
+ −∞
1836
+ exp(−(x2 − (1/3)|t|1/2)2)dx.
1837
+ (45)
1838
+ The proof is complete when we note that φ(t) := (1/2π)
1839
+ � ∞
1840
+ −∞ exp(−(x2 − (1/3)|t|1/2)2)dx is an
1841
+ absolutely bounded function.
1842
+ Lemma B.2. Let k(t) = c ˜f(t)2, where ˜f(t) = (1/2π)
1843
+ � ∞
1844
+ −∞ exp(−itx) exp(−x4)dx and c is a
1845
+ constant of proportionality so that
1846
+ � ∞
1847
+ −∞ k(t)dt = 1. Then,
1848
+ |
1849
+ � ∞
1850
+ −∞
1851
+ exp(itx)k(t)dt| ≲ exp(−(x/2)4)
1852
+ (46)
1853
+ Proof. Define f(x) = exp(−x4). Then, by a version of the Fourier inversion theorem,
1854
+ � ∞
1855
+ −∞
1856
+ exp(itx)k(t)dt = f ∗ f(x),
1857
+ where ∗ is the convolution operator. Since convolution of even functions is even, it is enough
1858
+ to show the result for x > 0. Then,
1859
+ f ∗ f(x)
1860
+ =
1861
+ � ∞
1862
+ −∞ exp(−y4) exp(−(y − x)4)dy
1863
+ =
1864
+ � ∞
1865
+ x/2 exp(−y4) exp(−(y − x)4)dy +
1866
+ � x/2
1867
+ −∞ exp(−y4) exp(−(y − x)4)dy
1868
+ ≤ exp(−(x/2)4)
1869
+ � ∞
1870
+ x/2 exp(−(y − x)4)dy + exp(−(x/2)4)
1871
+ � x/2
1872
+ −∞ exp(−y4)dy
1873
+ ≤ 2 exp(−(x/2)4)
1874
+ � ∞
1875
+ −∞ exp(−y4)dy.
1876
+ (47)
1877
+ The result holds with C = 2
1878
+ � ∞
1879
+ −∞ exp(−y4)dy since
1880
+ � ∞
1881
+ −∞ exp(−y4)dy < ∞.
1882
+ B.5
1883
+ Proof of Lemma 3.5
1884
+ Suppose q = (qij)1≤i≤k0,1 ≤j≤k ∈ [0, 1]k0×k is a coupling between p0 = (p0
1885
+ 1, . . . , p0
1886
+ k0) and
1887
+ p = (p1, . . . , pk), with Q(p, p′) representing the space of all such couplings of p and p′. Then,
1888
+ for fixed k we have
1889
+
1890
+ qijΦ(∥θ0
1891
+ i − θj∥/k) ≥
1892
+
1893
+ qij1{∥θ0
1894
+ i −θj∥≥η}Φ(η/k)
1895
+
1896
+
1897
+ pj1{∥θ0
1898
+ i −θj∥≥η for all i}Φ(η/k).
1899
+ Let K = inf{k ≥ 0 : � pj1{∥θ0
1900
+ i −θj∥≥η for all i}Φ(η/k) ≤ 1}. Then,
1901
+ K ≥ η
1902
+
1903
+ Φ−1
1904
+
1905
+ 1
1906
+ � pj1{∥θ0
1907
+ i −θj∥≥η for all i}
1908
+ ��−1
1909
+ ,
1910
+ (48)
1911
+ where Φ−1 is the inverse function of the function Φ. Note that, this function exists and is
1912
+ concave as Φ is monotonic increasing and convex. Moreover, by Lemma 3.4(i), we would have
1913
+ that WΦ(G, G0) ≥ K, where,
1914
+ WΦ(G, G0) := infq∈Q(p,p′){inf{k ≥ 0 : � qijΦ(∥θ0
1915
+ i − θj∥/k) ≤ 1}}
1916
+ Combining the results from equations (48) and (49) we obtain the conclusion of the lemma.
1917
+ 27
1918
+
1919
+ B.6
1920
+ Prior mass on Wasserstein ball
1921
+ Lemma B.3. Let G ∼ DP(γ, Hn). Fix r ≥ 1. Assume G0 ∈ M(Θ), where Θ = [−¯θ, ¯θ]d. If
1922
+ Hn admits condition (P.1), then the following holds
1923
+ Π (W r
1924
+ r (G, G0) ≤ (2r + 1)ϵr) ≥
1925
+ Γ(γ)(c0γπd/2)D
1926
+ (2Γ(d/2 + 1))D(2D)D−1
1927
+ � ϵ
1928
+ 2¯θ
1929
+ �r(D−1)+dD
1930
+ for all ϵ sufficiently small so that D(ϵ, Θ, ∥.∥) > γ.
1931
+ Here, D = D(ϵ, Θ, ∥.∥) stands for the maximal ϵ-packing number for Θ under ∥.∥ norm,
1932
+ and Γ(·) is the gamma function.
1933
+ Proof. From Lemma 5 in Nguyen (2013),
1934
+ Π (W r
1935
+ r (G, G0) ≤ (2r + 1)ϵr) ≥ Γ(γ)γD
1936
+ (2D)D−1
1937
+
1938
+ ϵ
1939
+ Diam(Θ)
1940
+ �r(D−1)
1941
+ sup
1942
+ S
1943
+ D
1944
+
1945
+ i=1
1946
+ Hn(Si),
1947
+ where, S := (S1, ..., SD) denotes the D disjoint ϵ/2-balls that form a maximal ϵ-packing of Θ.
1948
+ The supremum is taken over all such packings.
1949
+ Now, Hn(A) ≥
1950
+ � c0
1951
+ µ(Θ)
1952
+
1953
+ µ(A). Moreover, �D
1954
+ i=1 µ(Si) ≥
1955
+
1956
+ (√πϵ)d
1957
+ 2Γ(d/2 + 1)
1958
+ �D
1959
+ . Using this, we
1960
+ arrive at the result.
1961
+ B.7
1962
+ Metric entropy with Hellinger distance
1963
+ Lemma B.4. Let G0 be a discrete mixing measure with all its atoms in Θ = [−˜θ, ˜θ]d ⊂ Rd.
1964
+ Let PG(Θ) := {pG : G ∈ G(Θ)}. Then, if the kernel f is multivariate Gaussian with covariance
1965
+ matrix Σ,
1966
+ log D(ϵ/2, {pG ∈ PG(Θ) : ϵ < h(pG, pG0) ≤ 2ϵ}, h) ≤ c1
1967
+
1968
+ ˜θ
1969
+ √λminϵ
1970
+ �d
1971
+ log
1972
+
1973
+ e + 32e˜θ2
1974
+ λminϵ2
1975
+
1976
+ (49)
1977
+ for some universal constant c1.
1978
+ Proof. Let N(ϵ, P, d) denote the ϵ-covering number of the space P relative to the metric d.
1979
+ It is related to the packing number by the following identity:
1980
+ N(ϵ, P, h) ≤ D(ϵ, P, d) ≤ N(ϵ/2, P, h).
1981
+ (50)
1982
+ Using the result in Example 1 of Nguyen (2013), when fΣ(·|θ) ∼ Nd(θ, Σ),
1983
+ h2(fΣ(·|θi), fΣ(·|θ′
1984
+ j)) = 1 − exp
1985
+
1986
+ −1
1987
+ 8∥θi − θ′
1988
+ j∥2
1989
+ Σ−1
1990
+
1991
+
1992
+ ∥θi − θ′
1993
+ j∥2
1994
+ 8λmin
1995
+ ,
1996
+ (51)
1997
+ where ∥z∥Σ−1 :=
1998
+
1999
+ z′Σ−1z.
2000
+ Let G0 = �k0
2001
+ i=1 p0
2002
+ i δθ0
2003
+ i and G = �k′
2004
+ j=1 p′
2005
+ jδθ′
2006
+ j be mixing measures in G(Θ), with k0, k′ ∈ [1, ∞].
2007
+ Let q = (qij)1≤i≤k0,1 ≤j≤k′ ∈ [0, 1]k0×k′ denote a coupling of p0 and p′.
2008
+ 28
2009
+
2010
+ Using Lemma 2 of Nguyen (2013) with φ(x) = 1
2011
+ 2(√x − 1)2, gives us:
2012
+ h2(pG, pG0) ≤
2013
+ inf
2014
+ q∈Q(p0,p′)
2015
+
2016
+ i,j
2017
+ qij
2018
+ ∥θi − θ′
2019
+ j∥2
2020
+ 8λmin
2021
+ = W2(G, G0)2
2022
+ 8λmin
2023
+ ,
2024
+ (52)
2025
+ where Q(p0, p′) is the set of all couplings of p0 and p′. Therefore, it immediately follows that:
2026
+ log D(ϵ/2, {pG ∈ PG(Θ) : ϵ < h(pG, pG0) ≤ 2ϵ}, h)
2027
+
2028
+ log D(
2029
+
2030
+ 2λminϵ, {G : G ∈ G(Θ)}, W2) ≤ N
2031
+ ��
2032
+ λmin
2033
+ 8
2034
+ ϵ, Θ, ∥ · ∥
2035
+
2036
+ log
2037
+
2038
+ e + 32e˜θ2
2039
+ λminϵ2
2040
+
2041
+ .
2042
+ The last inequality follows by applying Eq. (50) followed by Lemma 4 part (b) of Nguyen
2043
+ (2013). The result then follows immediately.
2044
+ B.8
2045
+ Computation of M corresponding to KL ball
2046
+ Lemma B.5. Let G be a discrete mixing measure with all its atoms in
2047
+
2048
+ −˜θ, ˜θ
2049
+ �d
2050
+ for some
2051
+ ˜θ > 0. Furthermore, assume the atoms of G0 lie in
2052
+
2053
+ −¯θ, ¯θ
2054
+ �d where ¯θ > 0 is given. Then, the
2055
+ following holds if the kernel f is multivariate Gaussian,
2056
+
2057
+ (pG0(x))2
2058
+ pG(x)
2059
+ µ(dx) ≤ exp(dλ−1
2060
+ min(5¯θ2 + 4˜θ2)).
2061
+ (53)
2062
+ Here µ is the Lebesgue measure on Rd.
2063
+ Proof. For the multivariate Gaussian kernel with covariance matrix Σ, similar to the multi-
2064
+ variate Laplace case, using lemma 2 of Nguyen (2013) with φ(x) = 1
2065
+ x, gives us:
2066
+
2067
+ (pG0(x))2
2068
+ pG(x)
2069
+ µ(dx) ≤
2070
+ inf
2071
+ q∈Q(p0,p′)
2072
+
2073
+ i,j
2074
+ qij
2075
+
2076
+ (fΣ(x|θ0
2077
+ i ))2
2078
+ fΣ(x|θ′
2079
+ j) µ(dx),
2080
+ (54)
2081
+ where Q(p0, p′) is the set of all couplings of p0 and p′, and fΣ(·|θ) is the multivariate Gaussian
2082
+ kernel with covariance parameter Σ and mean parameter θ.
2083
+
2084
+ (fΣ(x|θ0
2085
+ i ))2
2086
+ fΣ(x|θ′
2087
+ j) µ(dx)
2088
+ =
2089
+
2090
+ fΣ(x|θ0
2091
+ i ) exp
2092
+
2093
+ −∥x − θ0
2094
+ i ∥2
2095
+ Σ−1 + ∥x − θ′
2096
+ j∥2
2097
+ Σ−1
2098
+ 2
2099
+
2100
+ µ(dx)
2101
+ (55)
2102
+ =
2103
+
2104
+ fΣ(x|θ0
2105
+ i ) exp
2106
+
2107
+ −∥θ′
2108
+ j − θ0
2109
+ i ∥2
2110
+ Σ−1
2111
+ 2
2112
+ + ⟨x − θ′
2113
+ j, Σ−1θ′
2114
+ j − θ0
2115
+ i ⟩
2116
+
2117
+ µ(dx),
2118
+ where the second equality follows by simple calculation using x − θ0
2119
+ i = (x − θ′
2120
+ j) + (θ′
2121
+ j − θ0
2122
+ i ).
2123
+ If MΣ(t|θ) is the moment generating function of the Gaussian distribution with mean θ
2124
+ and covariance Σ, then
2125
+ MΣ(t|θ) = exp(⟨θ, t⟩ + 1
2126
+ 2⟨t, Σt⟩).
2127
+ 29
2128
+
2129
+ Using this result , we can rewrite Eq. (55) as
2130
+
2131
+ (fΣ(x|θ0
2132
+ i ))2
2133
+ fΣ(x|θ′
2134
+ j) µ(dx)
2135
+ =
2136
+ exp(⟨θ′
2137
+ j − θ0
2138
+ i , Σ−1θ0
2139
+ i + θ′
2140
+ j⟩) ≤ exp(2dλ−1
2141
+ min(˜θ + ¯θ)2 + dλ−1
2142
+ min¯θ2),
2143
+ The bound on
2144
+
2145
+ (pG0(x))2/pG(x)µ(dx) then follows immediately.
2146
+ C
2147
+ Theoretical guarantee of Algorithm 1
2148
+ We show in this section that the output of Algorithm 1 converges to the Entropy regularised
2149
+ version of the Orlicz-Wasserstein distance in equation (19).
2150
+ Proposition C.1. Let ˆW λ
2151
+ Φ(ν1, ν2) be the output of Algorithm 1 and W λ
2152
+ Φ(ν1, ν2) be as in
2153
+ equation (19). Then
2154
+ | ˆW λ
2155
+ Φ(ν1, ν2) − W λ
2156
+ Φ(ν1, ν2)| < ϵ.
2157
+ (56)
2158
+ Proof. Here M is the cost matrix such that Mij = ∥xi − yj∥.
2159
+ Note that S(Φ(M/W λ
2160
+ Φ(ν1, ν2)), λ, r, c) < 1 and if S(Φ(M/η), λ, r, c) < 1, then η <
2161
+ W λ
2162
+ Φ(ν1, ν2)).
2163
+ If ˆxupp = max(M)/Φ−1(1), ˆxlow = d(M, λ, r, c)/Φ−1(1 + d(M, λ, r, c) − S(M, λ, r, c)) it is
2164
+ enough to show that
2165
+ fxupp = S(Φ(M/ˆxupp), λ, r, c) < 1,fxlow = S(Φ(M/ˆxlow), λ, r, c) > 1, since it would imply
2166
+ xupp := ˆW λ
2167
+ Φ(ν1, ν2) < W λ
2168
+ Φ(ν1, ν2) < xlow and therefore if |xupp − xlow| < ϵ, the result holds
2169
+ directly.
2170
+ We need to show
2171
+ (i) S(Φ(M/ˆxupp), λ, r, c) < 1.
2172
+ (ii) S(Φ(M/ˆxlow), λ, r, c) > 1.
2173
+ For (i), observe that
2174
+ S(Φ(M/ˆxupp), λ, r, c) =
2175
+ inf
2176
+ ν∈Q(ν1,ν2)
2177
+
2178
+ Rd×Rd Φ(∥x − y∥/ˆxupp) dν(x, y) − (1/λ)(H(ν))
2179
+ (57)
2180
+ =
2181
+ inf
2182
+ ν∈Q(ν1,ν2)
2183
+
2184
+ Rd×Rd Φ(Φ−1(1)∥x − y∥/max(M)) dν(x, y) − (1/λ)(H(ν)) ≤ 1
2185
+ (58)
2186
+ The last inequality holds by monotonicity of Φ combined with ∥x − y∥/max(M) < 1 with
2187
+ ν-probability 1, and the fact that H(ν) > 0.
2188
+ For (ii),note that for any ν ∈ Q(ν1, ν2), it holds that
2189
+
2190
+ Rd×Rd Φ(∥x − y∥/η) dν(x, y) − H(ν)/λ
2191
+ ≥ Φ
2192
+ ��
2193
+ Rd×Rd(∥x − y∥/η) dν(x, y)
2194
+
2195
+ − (H(r) + H(c))/λ
2196
+ (59)
2197
+ ≥ Φ((S(M, λ, r, c) + (H(r) + H(c))/2λ)/η)) − (H(r) + H(c))/λ.
2198
+ (60)
2199
+ Both the inequalities hold by monotonicty and convexity of Φ combined with the fact that
2200
+ ∀ν ∈ Q(ν1, ν2), it holds that H(r) + H(c) ≥ H(ν) ≥ (H(r) + H(c))/2.
2201
+ Now Φ((S(M, λ, r, c) + (H(r) + H(c))/2λ)/η)) − (H(r) + H(c))/λ ≥ 1, for any η ≤ ˆxupp,
2202
+ this completes the proof.
2203
+ 30
2204
+
2205
+ D
2206
+ Estimation of number of components for mixing measures
2207
+ In this section, we consider how Orlicz-Wasserstein distances could be used to improved
2208
+ estimation of the number of components with Gaussian mixture models. Gaussian Mixture
2209
+ models have been used for the purpose of clustering both historically Goldberger & Roweis
2210
+ (2004) as well as in modern applications Athey & Vogelstein (2019); Chakravarti et al. (2019);
2211
+ Jiao et al. (2022). From the Bayesian perspective, often used BNP priors for mixture models
2212
+ tend to overestimate the number of components drastically by producing multiple extraneous
2213
+ components around the ”true” components Miller & Harrison (2014). This makes it difficult
2214
+ to estimate the number of components, where it may of interest MacEachern & Muller (1998);
2215
+ Green & Richardson (2001).
2216
+ Several recent works have explored the consistent estimation of the number of compo-
2217
+ nents with mixture models, both with in-processing Manole & Khalili (2021) and post-
2218
+ processing Guha et al. (2021) techniques. However, while Manole & Khalili (2021) restricts
2219
+ attention to the overfit setting only, Guha et al. (2021) requires the knowledge of explicit
2220
+ contraction rates of respective parameters in Wasserstein distances. As parameter convergence
2221
+ rates of Dirichlet Process Gaussian Mixture models are extremely slow Nguyen (2013), this
2222
+ would also affect the estimation of the number of components negatively. The procedures in
2223
+ both the works Guha et al. (2021); Manole & Khalili (2021) consist of two smaller steps, trun-
2224
+ cation of extraneous outlier atoms and merging of atoms which are close to the ”true” atoms.
2225
+ The results in this work specifically, Theorem 3.3 provide a low threshold for truncating outlier
2226
+ atoms thereby eliminating outlier atoms more efficiently. Combined with an understanding of
2227
+ convergence behavior around the ”true” atoms would allow efficient estimation of the number
2228
+ of components with Dirichlet Process Gaussian Mixture models.
2229
+ 31
2230
+
c9FJT4oBgHgl3EQfRiy-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
cNE0T4oBgHgl3EQfWQCi/content/tmp_files/2301.02276v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
cNE0T4oBgHgl3EQfWQCi/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
cdE5T4oBgHgl3EQffg9z/content/tmp_files/2301.05627v1.pdf.txt ADDED
@@ -0,0 +1,822 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Genuinely noncyclic geometric gates in two-pulse schemes
2
+ Nils Eivarsson1 and Erik Sj¨oqvist1, ∗
3
+ 1Department of Physics and Astronomy, Uppsala University, Box 516, Se-751 20 Uppsala, Sweden
4
+ (Dated: January 16, 2023)
5
+ While most approaches to geometric quantum computation is based on geometric phase in cyclic evolution,
6
+ noncyclic geometric gates have been proposed to further increase flexibility. While these gates remove the dy-
7
+ namical phase of the computational basis, they do not in general remove it from the eigenstates of the time
8
+ evolution operator, which makes the geometric nature of the gates ambiguous. Here, we resolve this ambiguity
9
+ by proposing a scheme for genuinely noncyclic geometric gates. These gates are obtained by evolving the com-
10
+ putational basis along open paths consisting geodesic segments, and simultaneously assuring that no dynamical
11
+ phase is acquired by the eigenstates of the time evolution operator. While we illustrate the scheme for the sim-
12
+ plest nontrivial case of two geodesic segments starting at each computational basis state of a single qubit, the
13
+ scheme can be straightforwardly extended to more elaborate paths, more qubits, or even qudits.
14
+ I.
15
+ INTRODUCTION
16
+ Quantum computation is a form of information processing
17
+ that uses quantum mechanical properties, such as superpo-
18
+ sition and entanglement, to perform calculations. Although
19
+ quantum computers of today do not have the number of qubits
20
+ required for realising programmable large-scale computation,
21
+ progress towards this goal has been achieved [1] on different
22
+ experimental platforms [2–4].
23
+ It is not, however, enough to scale up quantum computers;
24
+ they also need to be resilient to noise and decoherence un-
25
+ der which qubits would lose their desired quantum mechan-
26
+ ical properties. The state within a quantum computer can-
27
+ not be completely isolated and decoherence is therefore in-
28
+ evitable. It is possible to overcome this problem according
29
+ to the threshold theorem [5, 6], which entails that an arbitrar-
30
+ ily long quantum computation can be sustained by error cor-
31
+ rection techniques provided the error rate per gate is below a
32
+ certain threshold value.
33
+ One approach to reach below this threshold is to use ge-
34
+ ometric quantum gates [7–12].
35
+ These are based on the
36
+ (Abelian) geometric phase (GP) of quantum systems [13, 14].
37
+ When a quantum state undergoes a cyclic evolution it can gain
38
+ a phase factor. This phase factor can be split into a dynam-
39
+ ical part and a geometric part, where the geometric part is
40
+ only dependent on the path a quantum state takes through its
41
+ state space. By choosing an evolution for which the dynami-
42
+ cal phase effect is trivial, it is possible to implement quantum
43
+ logic gates that are purely dependent on the geometry of the
44
+ path. This dependency on only geometry can be shown to be
45
+ resilient against certain types of noise [16, 17].
46
+ While geometric quantum gates show promise in the im-
47
+ plementation of robust quantum computers, there are still im-
48
+ provements to be made before they are fully operational. One
49
+ possible improvement is to reduce the number of pulses and
50
+ the run time needed to implement the gates, as this would re-
51
+ duce the qubits’ exposure to the environment, thereby limit-
52
+ ing the effect of decoherence, as well as simplifying the pulse
53
+ schemes. To reduce the run time, noncyclic evolution in the
54
55
+ implementation of geometric quantum gates have been pro-
56
+ posed [18–25] and experimentally implemented [26]. These
57
+ gate are based on computational states evolving along open
58
+ paths while still only acquiring a GP in noncyclic evolution
59
+ [27, 28]. However, in cyclic evolution of the computational
60
+ states, the GPs are the eigenvalues of the time evolution oper-
61
+ ator but this is not the case in the noncyclic case. This makes
62
+ the geometric meaning of these noncyclic gates ambiguous.
63
+ Here, we propose precise conditions for geometric gates.
64
+ Under these conditions the meaning of noncyclic geomet-
65
+ ric gates become unambiguous.
66
+ This provides a notion of
67
+ genuinely noncyclic geometric gates. Furthermore, geomet-
68
+ ric gates under cyclic evolution of the computational states,
69
+ which are gates that trivially satisfy these conditions, are
70
+ Abelian (they diagonalize in the computational basis) and
71
+ therefore fail universality. In order to complete the univer-
72
+ sal set, we shall thus see that at least one genuinely noncyclic
73
+ geometric gate is needed.
74
+ II.
75
+ CONDITIONS FOR GEOMETRIC GATES
76
+ We consider Schr¨odinger evolution iℏ| ˙ψ(t)⟩ = H(t)|ψ(t)⟩,
77
+ where H(t) is the Hamiltonian of the system with Hilbert
78
+ space H. Let U(t, 0) = Te− i
79
+
80
+ � t
81
+ 0 H(t′)dt′ be the corresponding
82
+ time evolution operator. We assume that the computational
83
+ system consists of n qubits with state space M ⊆ H spanned
84
+ by 2n ≤ dim H predetermined computational state vectors
85
+ {|⃗q⟩ = |q1, . . . , qn⟩}q1,...,qn=0,1, fixed by the final read out of the
86
+ computation.
87
+ Let U(τ, 0) be the desired gate realized during the time in-
88
+ terval t ∈ [0, τ]. Consider the eigenvalue equation
89
+ U(τ, 0)|ψk⟩ = eiϕk|ψk⟩, k = 1, . . . , 2n.
90
+ (1)
91
+ Here, {|ψk⟩} is an orthonormal set of vectors since U(τ, 0) is
92
+ a normal operator [5]. We assume that U(τ, 0) preserves M,
93
+ i.e., |ψk⟩ = �
94
+ ⃗q c(k)
95
+ ⃗q |⃗q⟩, ∀k, even in the case where 2n < dim H.
96
+ Thus, U(0, τ)U†(τ, 0) is a projection operator on M.
97
+ The action of U(τ, 0) on each computational state |⃗q⟩ can be
98
+ arXiv:2301.05627v1 [quant-ph] 13 Jan 2023
99
+
100
+ 2
101
+ understood in terms of its GP
102
+ Γ⃗q = arg⟨⃗q|U(τ, 0)|⃗q⟩
103
+ +i
104
+ � τ
105
+ 0
106
+ ⟨⃗q|U†(t, 0) ˙U(t, 0)|⃗q⟩dt,
107
+ (2)
108
+ provided ⟨⃗q|U(τ, 0)|⃗q⟩ is nonzero. Γ⃗q is real-valued and a prop-
109
+ erty of the path U(t, 0)|⃗q⟩⟨⃗q|U†(t, 0) in state space, as it is
110
+ invariant under monotonic reparametrizations t �→ s(t) and
111
+ time-local phase changes U(t, 0) �→ eif(t)U(t, 0) [28]. These
112
+ Γ⃗q:s are generically noncyclic GPs as the paths in state space
113
+ are typically open. On the other hand, the eigenvectors |ψk⟩ of
114
+ U(τ, 0) are the cyclic states of the evolution U(t, 0), t ∈ [0, τ],
115
+ and may thus be analyzed by using the Aharonov-Anandan
116
+ GP [14]. In this framework, each cyclic phase ϕk contains a
117
+ geometric (γk) and a dynamical (δk) part, given by
118
+ γk = arg⟨ψk|U(τ, 0)|ψk⟩
119
+ +i
120
+ � τ
121
+ 0
122
+ ⟨ψk|U†(t, 0) ˙U(t, 0)|ψk⟩dt.
123
+ (3)
124
+ and
125
+ δk = −1
126
+
127
+ � τ
128
+ 0
129
+ ⟨ψk|U†(t, 0)H(t)U(t, 0)|ψk⟩dt,
130
+ (4)
131
+ such that ϕk = γk + δk.
132
+ Based on the above, we can now define a genuinely non-
133
+ cyclic geometric gate (GNGG) as a unitary U(τ, 0) that satis-
134
+ fies the following two conditions:
135
+ (i) Γ⃗q − Γ⃗0 = arg⟨⃗q|U(τ, 0)|⃗q⟩ − ⟨⃗0|U(τ, 0)|⃗0⟩, mod 2π,
136
+ (ii) δk − δ1 = 0, mod 2π,
137
+ for binary vectors ⃗q and k. In essence, such a gate depends
138
+ only on GPs for both its eigenstates and the predetermined
139
+ computational states.
140
+ Before addressing the physical realization of GNGGs in the
141
+ next section, we consider some qubit gates assuming them to
142
+ be genuinely noncyclic, in order to gain some further con-
143
+ ceptual insights. First, let us consider a genuinely noncyclic
144
+ geometric Hadamard gate H. Such a gate takes the form
145
+ H =
146
+ 1√
147
+ 2
148
+
149
+ |0⟩ + |1⟩
150
+
151
+ ⟨0| + eiπ 1√
152
+ 2
153
+
154
+ |1⟩ − |0⟩
155
+
156
+ ⟨1|
157
+ (5)
158
+ in the computational basis [29, 30], and
159
+ H =
160
+ 1
161
+ 4 − 2
162
+
163
+ 2
164
+
165
+ |0⟩ −
166
+
167
+ 1 −
168
+
169
+ 2
170
+
171
+ |1⟩
172
+ � �
173
+ ⟨0| −
174
+
175
+ 1 −
176
+
177
+ 2
178
+
179
+ ⟨1|
180
+
181
+ +eiπ
182
+ 1
183
+ 4 + 2
184
+
185
+ 2
186
+
187
+ |0⟩ −
188
+
189
+ 1 +
190
+
191
+ 2
192
+
193
+ |1⟩
194
+ � �
195
+ ⟨0| −
196
+
197
+ 1 +
198
+
199
+ 2
200
+
201
+ ⟨1|
202
+
203
+ ,
204
+ (6)
205
+ in the eigenbasis, with the phase factor eiπ = −1 assumed to be
206
+ geometric in both cases. We thus see that the geometric phase
207
+ difference for both forms is π, i.e., Γ1 − Γ0 = γ2 − γ1 = π.
208
+ As a second example, we consider rotation gates Uz(ϑz) =
209
+ e−i ϑz
210
+ 2 σz and Uy(ϑy) = e−i
211
+ ϑy
212
+ 2 σy that can be used to describe
213
+ an arbitrary single-qubit rotation [31].
214
+ First, we note that
215
+ Uz(ϑz) is diagonal in the computational basis, i.e., the eigen-
216
+ basis coincides with the computational basis. This implies
217
+ that the gate is a standard cyclic geometric gate [8], for which
218
+ Γ1 −Γ0 = γ2 −γ1 = ϑz. More interesting is the genuinely non-
219
+ cyclic geometric implementation of Uy(ϑy). We may write
220
+ Uy =
221
+
222
+ cos ϑy
223
+ 2 |0⟩ + sin ϑy
224
+ 2 |1⟩
225
+
226
+ ⟨0|
227
+ +
228
+
229
+ − sin ϑy
230
+ 2 |0⟩ + cos ϑy
231
+ 2 |1⟩
232
+
233
+ ⟨1|
234
+ (7)
235
+ and
236
+ Uy = e−i
237
+ ϑy
238
+ 2 |y+⟩⟨y+| + ei
239
+ ϑy
240
+ 2 |y−⟩⟨y−|,
241
+ |y±⟩ =
242
+ 1√
243
+ 2
244
+ �|0⟩ ± i|1⟩�
245
+ (8)
246
+ in the computational basis and eigenbasis, respectively. Pro-
247
+ vided ϑy � π, we find Γ1 − Γ0 = 0 and γ2 − γ1 = ϑy, i.e., while
248
+ the noncyclic GP difference of the computational basis states
249
+ is trivial, the cyclic GP difference is generally not. In the case
250
+ where ϑy = π, the noncyclic phases are not defined as the com-
251
+ putational states are each mapped on orthogonal states. It fol-
252
+ lows, more generally, that π rotations around any axis in the xy
253
+ plane cannot be implemented in a genuinly noncyclic manner.
254
+ Curiously, this implies that there is no genuinely noncyclic
255
+ implementation of CNOT, while the GNGG scheme can be
256
+ used to realize other entangling two-qubit control gates with
257
+ noncyclic and cyclic GPs 0, 0, Γ10, Γ11 and 0, 0, γ3, γ4, respec-
258
+ tively.
259
+ III.
260
+ TWO-PULSE SINGLE-QUBIT GATES
261
+ A key point of the GNGG technique is that it can be used
262
+ to reduce the number of pulses to implement a universal set of
263
+ geometric gates. To make this point explicit, we shall now ex-
264
+ amine the physical realization of genuinely noncyclic single-
265
+ qubit gates and demonstrate single-qubit universality, by using
266
+ the simplest nontrivial case of two pulses. To achieve univer-
267
+ sality with geometric gates in such schemes, adhering to the
268
+ proposed conditions (i) and (ii) above, noncyclic geometric
269
+ gates are required, as cyclic gates are inherently Abelian and
270
+ thus insufficient for universality [29].
271
+ Let the two pulses be applied during [0, t1] and [t1, τ], re-
272
+ spectively. By choosing the pulses such that they move the
273
+ computational basis along a pair of geodesic segments, the
274
+ corresponding dynamical phases vanish. After constructing
275
+ these gates, the dynamical phases of the eigenstates of the time
276
+ evolution operator are studied, to find which gates are gen-
277
+ uinely geometric, i.e., satisfy the condition 2δ = 0, mod 2π,
278
+ where we have used that δ0 = −δ1 ≡ δ. As we shall see,
279
+ this requires a careful tuning of rotation axes and precession
280
+ angles associated with the two pulses.
281
+ A path is geodesic on the Bloch sphere when the axis n of
282
+ rotation is orthogonal to the initial Bloch vector. Since the
283
+ first pulse acts on the computational basis {|q⟩}q=0,1, it should
284
+ thus correspond to a rotation around any axis n1 in the xy-
285
+ plane, as this would result in evolution of these states along
286
+
287
+ 3
288
+ FIG. 1. The rotation of the qubit during the first pulse (upper panel).
289
+ θ1 is the rotational angle and n1 is the axis of rotation. The rotation
290
+ of the qubit during the second pulse (lower panel). θ2 is the rotational
291
+ angle and φ determines the axis of rotation n2. n2 is orthogonal to
292
+ the final state (with Bloch vector r1) of the first pulse. The paths
293
+ gradually shifts from black (dark) at the start to yellow (bright) at the
294
+ end.
295
+ parts of a great circle that pass through the poles of the Bloch
296
+ sphere. Choosing one axis over another only rotates the finale
297
+ eigenvector of the evolution around the z-axis. We can there-
298
+ fore limit ourselves to one specific axis of rotation and later
299
+ generalize to other axes in the xy-plane by simply rotating the
300
+ gate. We choose the y axis, i.e., n1 = ey, which defines the
301
+ Hamiltonian
302
+ H1 = 1
303
+ 2ℏω σy
304
+ (9)
305
+ with corresponding time evolution operator
306
+ U1(t, 0) = e− i
307
+ 2 ωt|y+⟩⟨y+| + e
308
+ i
309
+ 2 ωt|y−⟩⟨y−|.
310
+ (10)
311
+ At the final time t1 of the first pulse, the qubit has rotated an
312
+ angle θ1 = ωt1. This rotation can be seen in Fig. 1(a).
313
+ For the second pulse to move the qubit along a geodesic,
314
+ the axis of rotation must be orthogonal to the final state of
315
+ the first pulse. Starting at |0⟩, the final state of the first pulse
316
+ can be described by the Bloch vector r1 = sin θ1ex + cos θ1ez,
317
+ which serves as initial state for the second pulse. The axis of
318
+ rotation can therefore be taken as
319
+ n2 = − cos θ1 cos φ ex + sin φ ey + sin θ1 cos φ ez.
320
+ (11)
321
+ This lies in the plane spanned by the vector − cos θ1 ex +
322
+ sin θ1 ez, orthogonal to r1, and the y-axis. φ is the rotational
323
+ angle around r1 relative the xz-plane, see Fig. 1(b). With the
324
+ axis of rotation defined, the Hamiltonian becomes
325
+ H2 = ℏω
326
+ 2
327
+
328
+ − cos θ1 cos φ σx + sin φ σy
329
+ + sin θ1 cos φ σz
330
+
331
+ (12)
332
+ with eigenvalues and eigenvectors
333
+ λ± = ±1
334
+ 2ℏω,
335
+ |κ±⟩ =
336
+
337
+ cos2 θ1 cos2 φ + sin2 φ
338
+ 2 ∓ 2 sin θ1 cos φ
339
+ ×
340
+
341
+ |0⟩ +
342
+ ∓1 + sin θ1 cos φ
343
+ cos θ1 cos φ + i sin φ|1⟩
344
+
345
+ .
346
+ (13)
347
+ The time evolution operator of the second rotation is
348
+ U2(t, t1) = e− i
349
+ 2 ω(t−t1)|κ+⟩⟨κ+| + e
350
+ i
351
+ 2 ω(t−t1)|κ−⟩⟨κ−|,
352
+ (14)
353
+ which rotates the qubit an additional angle θ2 = ω(τ−t1). This
354
+ rotation is shown in Fig. 1(b) as the geodesic path connecting
355
+ r1 and r2. The time evolution during the full time interval
356
+ [0, τ] can be written as
357
+ U(t, 0) =
358
+
359
+ U1(t, 0),
360
+ 0 ≤ t ≤ t1,
361
+ U2(t, t1)U1(t1, 0), t1 ≤ t ≤ τ
362
+ (15)
363
+ with the gate U(τ, 0) = U2(τ, t1)U1(t1, 0) being characterized
364
+ by the angles θ1, θ2, and φ, i.e., U(τ, 0) ≡ U(θ1, θ2, φ).
365
+ By inserting Eqs. (10) and (14) into (15), we find the eigen-
366
+ values and eigenvectors of U(θ1, θ2, φ):
367
+ λ± = cos
368
+ �θ1
369
+ 2
370
+
371
+ cos
372
+ �θ2
373
+ 2
374
+
375
+ − sin
376
+ �θ1
377
+ 2
378
+
379
+ sin
380
+ �θ2
381
+ 2
382
+
383
+ sin φ ± i
384
+
385
+ 1 −
386
+
387
+ cos
388
+ �θ1
389
+ 2
390
+
391
+ cos
392
+ �θ2
393
+ 2
394
+
395
+ − sin
396
+ �θ1
397
+ 2
398
+
399
+ sin
400
+ �θ2
401
+ 2
402
+
403
+ sin φ
404
+ �2
405
+ ≡ e±iϕ,
406
+ |ψ±⟩ = N±
407
+ ���������|0⟩ +
408
+ cos
409
+ � θ1
410
+ 2
411
+ � �
412
+ − cos
413
+ � θ2
414
+ 2
415
+
416
+ + i cos φ sin
417
+ � θ2
418
+ 2
419
+ ��
420
+ + sin
421
+ � θ1
422
+ 2
423
+
424
+ sin
425
+ � θ2
426
+ 2
427
+
428
+ sin (φ) + e±iϕ
429
+ sin
430
+ � θ1
431
+ 2
432
+ � �
433
+ − cos
434
+ � θ2
435
+ 2
436
+
437
+ + i cos φ sin
438
+ � θ2
439
+ 2
440
+ ��
441
+ − cos
442
+ � θ1
443
+ 2
444
+
445
+ sin
446
+ � θ2
447
+ 2
448
+
449
+ sin φ
450
+ |1⟩
451
+ ���������
452
+ (16)
453
+
454
+ zez
455
+ r1
456
+ 01
457
+ n1
458
+ XZ
459
+ r1
460
+ x
461
+ 02
462
+ r24
463
+ with normalization factors
464
+ N± =
465
+ 1
466
+ 2
467
+
468
+ 2
469
+ �������������
470
+ 2 − cos θ1
471
+
472
+ 1 + cos θ2 + 2 cos(2φ) sin
473
+ � θ2
474
+ 2
475
+ �2�
476
+ + 2 sin θ1 sin θ2 sin(φ)
477
+ 1 + cos
478
+ � θ1
479
+ 2
480
+ � �
481
+ − cos
482
+ � θ2
483
+ 2
484
+
485
+ cos ϕ ± sin
486
+ � θ2
487
+ 2
488
+
489
+ cos φ sin ϕ
490
+
491
+ + sin
492
+ � θ1
493
+ 2
494
+
495
+ sin
496
+ � θ2
497
+ 2
498
+
499
+ sin φ cos ϕ
500
+ �������������
501
+ 1/2
502
+ .
503
+ (17)
504
+ FIG. 2. The roots of 2δ = 0. θ1 (θ2) is the first (second) rotation angle,
505
+ and φ is the angle determining the axis of rotation for the second
506
+ rotation.
507
+ Next, we find the dynamical phases of the evolution by us-
508
+ ing Eq. (4), yielding
509
+ δ± = −1
510
+
511
+ � t1
512
+ 0
513
+ ⟨ψ±|H1|ψ±⟩dt
514
+ −1
515
+
516
+ � τ
517
+ t1
518
+ ⟨ψ±|U†
519
+ 1(t1, 0)H2U1(t1, 0)|ψ±⟩dt,
520
+ (18)
521
+ where we have taken into account that H1 and H2 commute
522
+ with U1 and U2, respectively. Explicitly,
523
+ U†
524
+ 1(t1, 0)H2U1(t1, 0) = ℏω
525
+ 2
526
+
527
+ − cos φ σx + sin φ σy
528
+
529
+ . (19)
530
+ This shows that both integrands on the right-hand side of
531
+ FIG. 3. GP corresponding to the roots of 2δ = 0. θ1 (θ2) is the first
532
+ (second) rotation angle, and φ is the angle determining the axis of
533
+ rotation for the second rotation.
534
+ Eq. (18) are time-independent, which implies
535
+ δ± = −θ1
536
+ 2 ⟨ψ±|σy|ψ±⟩
537
+ −θ2
538
+ 2 ⟨ψ±|
539
+
540
+ − cos φ σx + sin φ σy
541
+
542
+ |ψ±⟩ = ±δ.
543
+ (20)
544
+ To find geometric gates, we need to solve for which choices of
545
+ θ1, θ2, and φ the dynamical phases become trivial, i.e., satisfy
546
+ the condition 2δ = 0, mod 2π. We thus look for numerical
547
+ solutions of
548
+ θ1⟨ψ±|σy|ψ±⟩ + θ2⟨ψ±|
549
+
550
+ − cos φ σx + sin φ σy
551
+
552
+ |ψ±⟩
553
+ = 0,
554
+ mod 2π.
555
+ (21)
556
+ We restrict to 2δ = 0 in the following.
557
+
558
+ Roots of 2s
559
+ 3
560
+ 2.5
561
+ —01/元 = 0.1
562
+ 01/π = 0.3
563
+ 2
564
+ —01/元 = 0.5
565
+ 2
566
+ 1.5
567
+ 01/π = 0.7
568
+ 01/元 = 0.9
569
+ 0.5
570
+ 0
571
+ 0.5
572
+ 1
573
+ 1.5
574
+ 2
575
+ Φ/元Roots of 2s
576
+ 3
577
+ 2.5
578
+ —01/元 = 1.1
579
+ 2
580
+ 01/元 = 1.3
581
+ 01/π = 1.5
582
+ 1.5
583
+ 01/π = 1.7
584
+ 1
585
+ 01/元 = 1.9
586
+ 0.5
587
+ 0
588
+ 0
589
+ 0.5
590
+ 1
591
+ 1.5
592
+ 2
593
+ Φ/元Geometric phase for roots of 2d
594
+ 2
595
+ 1.8
596
+ 01/元 = 0.1
597
+ 1.6
598
+ 01/元 = 0.3
599
+ 1.4
600
+ 01/元 = 0.5
601
+ 1.2
602
+ 01/π = 0.7
603
+ 1
604
+ 01/π = 0.9
605
+ 0.8
606
+ 0.6
607
+ 0
608
+ 0.5
609
+ 1.5
610
+ 2Geometric phase for roots of 2
611
+ 2
612
+ 1.5
613
+ 01/π = 1.1
614
+ -01/元 = 1.3
615
+ /
616
+ 01/π = 1.5
617
+ 01/π = 1.7
618
+ 01/元 = 1.9
619
+ 0.5
620
+ 0
621
+ 0
622
+ 0.5
623
+ 1.5
624
+ 25
625
+ It is possible to find multiple roots for the same set of
626
+ {θ1, φ}. In Fig. 2, roots where θ1 and θ2 are positive and give
627
+ rise to the smallest total precession angles θ1 + θ2, as function
628
+ of φ, are shown. A positive θ1 (θ2) corresponds to a clock-
629
+ wise rotation driven by the first (second) pulse. Roots can be
630
+ found for counter-clockwise rotations to have the same shape
631
+ but reflected or inverted. For θ1 > 0, θ2 < 0, the roots are
632
+ inverted through the point (φ, θ2) = (π, 0); for θ1 < 0, θ2 > 0,
633
+ on the other hand, they are reflected in the line φ = π. When
634
+ both rotations are counter-clockwise the roots are reflected in
635
+ the line θ1 = 0. In Fig. 3, the GPs corresponding to these
636
+ roots are shown. For both counter-clockwise rotations where
637
+ θ1 > 0, θ2 < 0 and θ1 < 0, θ2 > 0 the GPs are reflected in the
638
+ line φ = π and for the case when both rotations are counter-
639
+ clockwise the GPs are the same as in Fig. 3.
640
+ One motivating aspect of noncyclic geometric schemes is
641
+ that they may shortened the exposure to decoherence effects
642
+ by shortening the run time of the gates. To test this in the two-
643
+ pulse realization of GNGGs, we use the total precession angle
644
+ θ1+θ2 as a natural measure of run time. A closer inspection of
645
+ Fig. 2 entails that this angle is at least 2π for all roots. It thus
646
+ appears that the run time cannot be shortened in the proposed
647
+ noncyclic scheme, as compared to cyclic geometric gates with
648
+ pulses driving the computational basis states along ‘orange
649
+ slice’ shaped loops on the Bloch sphere [33, 34].
650
+ FIG. 4. Continuous set of eigenvectors of gates with 2γ = π with the
651
+ first rotation taken around the y-axis. The eigenvectors are swept so
652
+ as to form surfaces inside the Bloch sphere of the qubit.
653
+ To implement a specific gate, both eigenvalues and eigen-
654
+ vectors must match the desired gate. We have shown that
655
+ it is possible to find any eigenvalue but it is also necessary
656
+ to find the corresponding eigenvectors. To demonstrate this,
657
+ eigenvectors corresponding to 2γ = π are displayed in Fig. 4.
658
+ These eigenvectors cover the entire z-axis. Keep in mind that
659
+ only a first rotation around the y-axis has been considered so
660
+ far.
661
+ GNGGs with the same eigenvalue and an eigenvector
662
+ only differing by a rotation around the z-axis can be found by
663
+ changing the first axis of rotation to another in the xy-plane,
664
+ while keeping the relation between the first and the second
665
+ axis. With this finding any GNGGs with eigenvalue 2γ = π,
666
+ such as the Hadamard gate H, can be realized with only two
667
+ pulses and it can similarly be shown for other γ as well.
668
+ FIG. 5. The path of the |0⟩-state (upper panel) and one of the eigen-
669
+ states (lower panel) when acted upon by a geometric Hadamard gate.
670
+ The paths gradually shifts from black (dark) at the start to yellow
671
+ (bright) at the end. The computational state evolves along geodesic
672
+ segments.
673
+ To give an example, we show how a Hadamard gate can
674
+ be implemented. For this, 2γ = π and eigenvectors corre-
675
+ spond to ± ex+ez
676
+
677
+ 2 on the Bloch sphere. These eigenvectors are
678
+ not present in Fig. 4, but can be found by a suitable rotation
679
+ around the z axis. Fig. 5 illustrates this Hadamard gate acting
680
+ on the computational state |0⟩ and one of the eigenstates.
681
+ IV.
682
+ CONCLUSIONS
683
+ We have proposed a notion of noncyclic geometric gates
684
+ in which both the computational basis and the eigenbasis ac-
685
+ quire purely geometric phases. We have demonstrated a phys-
686
+ ical realization of such genuinely noncyclic geometric gates
687
+ in the single qubit case. This is achieved by using pulse pairs
688
+ that drive the computational states along pairs of geodesic seg-
689
+ ments on the Bloch sphere, and simultaneously make the dy-
690
+ namical phase difference of the eigenstates to vanish. The pro-
691
+ posed concept removes the ambiguity of standard noncyclic
692
+ geometric gates [18–25], in which the computational basis
693
+ undergoes purely geometric evolution, while the eigenstates
694
+ generally do not. Our scheme takes advantage of noncyclic
695
+ geometric phase in order to achieve universality.
696
+ While the analysis focuses on gates using only two pulses,
697
+
698
+ yZez
699
+ r2
700
+ yz
701
+ q1
702
+ y6
703
+ it can straightforwardly be extended to three or more pulses.
704
+ This may open up for reduction of accumulated rotation angle
705
+ as well as more elaborate paths of the computational states, so
706
+ as to reduce the detrimental effect of noise and decoherence.
707
+ The scheme may further be extended to nongeodesic evolu-
708
+ tion of the computational basis to further improve the error
709
+ resilience of the gates. This extension would require simulta-
710
+ neous removal of the dynamical phase effects of the computa-
711
+ tional basis and the eigenstates of the gates.
712
+ ACKNOWLEDGMENT
713
+ E.S. acknowledges financial support from the Swedish Re-
714
+ search Council (VR) through Grant No. 2017-03832.
715
+ [1] S. Debnath, N. M. Linke, C. Figgatt, K. A. Landsman,
716
+ K. Wright, and C. Monroe, Demonstration of a small pro-
717
+ grammable quantum computer with atomic qubits, Nature
718
+ (London) 536, 63 (2016).
719
+ [2] T. F. Watson, S. G. J. Philips, E. Kawakami, D. R. Ward, P. Scar-
720
+ lino, M. Veldhorst, D. E. Savage, M. G. Lagally, M. Friesen, S.
721
+ N. Coppersmith, M. A. Eriksson, and L. M. K. Vandersypen, A
722
+ programmable two-qubit quantum processor in silicon, Nature
723
+ (London) 555, 633 (2018).
724
+ [3] Y. Wu, Y. Wang, X. Qin, X. Rong, and J. Du, A programmable
725
+ two-qubit solid-state quantum processor under ambient condi-
726
+ tions, npj Quantum Inf. 5, 9 (2019).
727
+ [4] T. Roy, S, Hazra, S. Kundu, M. Chand, M. P. Patankar, and R.
728
+ Vijay, Programmable Superconducting Processor with Native
729
+ Three-Qubit Gates, Phys. Rev. Appl. 14, 014072 (2020).
730
+ [5] M. A. Nielsen and I. L. Chuang, Quantum Computation
731
+ and Quantum Information (Cambridge University Press, Cam-
732
+ bridge, UK, 2000), Ch. 10.6.
733
+ [6] D. Gottesman, Proc. Symp. Appl. Math. 68, 13 (2010).
734
+ [7] J. A. Jones, V. Vedral, A. Ekert, and G. Castagnoli, Geometric
735
+ quantum computation using nuclear magnetic resonance, Na-
736
+ ture (London) 403, 869 (2000).
737
+ [8] A. Ekert, M. Ericsson, P. Hayden, H. Inamori, J. A. Jones, D.
738
+ K. L. Oi, and V. Vedral, Geometric Quantum Computation, J.
739
+ Mod. Opt. 47, 2501 (2000).
740
+ [9] W. Xiang-Bin and M. Keiji, Nonadiabatic Conditional Geomet-
741
+ ric Phase Shift with NMR, Phys. Rev. Lett. 87, 097901 (2001).
742
+ [10] S.-L. Zhu and Z. D. Wang, Implementation of Universal Quan-
743
+ tum Gates Based on Nonadiabatic Geometric Phases, Phys.
744
+ Rev. Lett. 89, 097902 (2002).
745
+ [11] S.-L. Zhu and Z. D. Wang, Unconventional Geometric Quan-
746
+ tum Computation, Phys. Rev. Lett. 91, 187902 (2003).
747
+ [12] Z. S. Wang, C. Wu, X.-L. Feng, L. C. Kwek, C. H. Lai, C. H.
748
+ Oh, and V. Vedral, Nonadiabatic geometric quantum computa-
749
+ tion, Phys. Rev. A 76, 044303, (2007).
750
+ [13] M. V. Berry, Quantal phase factors accompanying adiabatic
751
+ changes, Proc. R. Soc. London Ser. A 392, 45 (1984).
752
+ [14] Y. Aharonov and J. Anandan, Phase change during a cyclic
753
+ quantum evolution, Phys. Rev. Lett. 58, 1593 (1987).
754
+ [15] A. Bohm, L. J. Boya, and B. Kendrick, Derivation of the geo-
755
+ metrical phase, Phys. Rev. A 43, 1206 (1991).
756
+ [16] S.-L. Zhu and P. Zanardi, Geometric quantum gates that are
757
+ robust against stochastic control errors, Phys. Rev. A 72,
758
+ 020301(R) (2005).
759
+ [17] S. Berger, M. Pechal, A. A. Abdumalikov, Jr., C. Eichler, L.
760
+ Steffen, A. Fedorov, A. Wallraff, and S. Filipp, Exploring the
761
+ effect of noise on the Berry phase, Phys. Rev. A 58, 060303
762
+ (2013).
763
+ [18] A. Friedenauer and E. Sj¨oqvist, Noncyclic geometric quantum
764
+ computation, Phys. Rev. A 67, 024303 (2003).
765
+ [19] M. Ericsson, D. Kult, E. Sj¨oqvist, and J. Åberg, Nodal free ge-
766
+ ometric phases: Concept and application to geometric quantum
767
+ computation, Phys. Lett. A 372, 596 (2008).
768
+ [20] Z. S. Wang, G. Q. Liu, and Y. H. Ji, Noncyclic geometric
769
+ quantum computation in a nuclear-magnetic-resonance system,
770
+ Phys. Rev. A 79, 054301 (2009).
771
+ [21] B. Liu, S. Su, and M. Yung, Nonadiabatic noncyclic geomet-
772
+ ric quantum computation in Rydberg atoms, Phys. Rev. Res. 2,
773
+ 043130 (2020).
774
+ [22] L.-N. Ji, C.-Y. Ding, T. Chen, and Z.-Y. Xue Noncyclic Geo-
775
+ metric Quantum Gates with Smooth Paths via Invariant-Based
776
+ Shortcuts, Adv. Quantum Tech. 2, 2100019 (2021).
777
+ [23] L. Qiu, H. Li, Z. Han, W. Zheng, X. Yang, Y. Dong, S. Song, D.
778
+ Lana, X. Tana, and Y. Yu, Experimental realization of noncyclic
779
+ geometric gates with shortcut to adiabaticity in a superconduct-
780
+ ing circuit, Appl. Phys. Lett. 118, 254002 (2021).
781
+ [24] L. N. Sun, F. Q. Guo, Z. Shan, M. Feng, L. L. Yan, and
782
+ S. L. Su One-step implementation of Rydberg nonadiabatic
783
+ noncyclic geometric quantum computation in decoherence-free
784
+ subspaces, Phys. Rev. A 105, 062602 (2022).
785
+ [25] F.-Q. Guo, X.-Y. Zhu, M.-R. Yun, L.-L. Yan, Y. Zhang, Y. Jia1,3
786
+ and S.-L. Su, Multiple-qubit nonadiabatic noncyclic geomet-
787
+ ric quantum computation in Rydberg atoms, EPL 137, 55001
788
+ (2022).
789
+ [26] J. W. Zhang, L.-L. Yan, J. C. Li, G. Y. Ding, J. T. Bu, L. Chen,
790
+ S.-L. Su, F. Zhou, and M. Feng, Single-Atom Verification of the
791
+ Noise-Resilient and Fast Characteristics of Universal, Nonadi-
792
+ abatic Noncyclic Geometric Quantum Gates, Phys. Rev. Lett.
793
+ 127, 030502 (2021).
794
+ [27] J. Samuel and R. Bhandari, General Setting for Berry’s Phase,
795
+ Phys. Rev. Lett. 60, 2339 (1988).
796
+ [28] N. Mukunda and R. Simon, Quantum Kinematic Approach to
797
+ the Geometric Phase. I. General Formalism, Ann. Phys. (N.Y.)
798
+ 228, 205 (1993).
799
+ [29] Note that the chosen phases of the vectors |A⟩ =
800
+ 1√
801
+ 2
802
+ �|1⟩−|0⟩� and
803
+ |B⟩ = |1⟩ in the second term are made such that their Pancharat-
804
+ nam relative phase arg⟨A|B⟩ [30] vanishes. This is to assure that
805
+ eiπ is the GP factor given the assumption that H is a GNGG.
806
+ [30] S. Pancharatnam, Generalized theory of interference, and its
807
+ applications. Part I. Coherent pencils, Proc. Indian Acad. Sci.,
808
+ Sect. A 44, 247 (1956).
809
+ [31] J. J. Sakurai, Modern Quantum Mechanics, 2nd Ed. (Addison
810
+ Wesley Longman, Reading, MA, 1993).
811
+ [32] To see this, we note that the eigenstates and computational
812
+ states coincide for cyclic geometric gates, thus resulting in an
813
+ Abelian subset consisting of phase shift gates |x⟩ �→ eiγx|x⟩.
814
+ [33] M. Tian, Z. W. Barber, J. A. Fischer, and W. R. Babbitt, Geo-
815
+ metric manipulation of the quantum states of two-level atoms,
816
+ Phys. Rev. A 69, 050301(R) (2004).
817
+ [34] J. T. Thomas, M. Lababidi, and M. Z. Tian, Robustness of
818
+ single-qubit geometric gate against systematic error, Phys. Rev.
819
+
820
+ 7
821
+ A 84, 042335 (2011).
822
+
cdE5T4oBgHgl3EQffg9z/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
ddE1T4oBgHgl3EQfLQO1/content/tmp_files/2301.02975v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff