jackkuo commited on
Commit
a59c8f6
·
verified ·
1 Parent(s): 30dda68

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -9FLT4oBgHgl3EQfDS7k/content/tmp_files/2301.11979v1.pdf.txt +681 -0
  2. -9FLT4oBgHgl3EQfDS7k/content/tmp_files/load_file.txt +0 -0
  3. -9FLT4oBgHgl3EQfvi-U/content/tmp_files/2301.12160v1.pdf.txt +708 -0
  4. -9FLT4oBgHgl3EQfvi-U/content/tmp_files/load_file.txt +0 -0
  5. -NAzT4oBgHgl3EQfSvt8/content/2301.01237v1.pdf +3 -0
  6. .gitattributes +9 -0
  7. 0NE1T4oBgHgl3EQf4wUX/content/tmp_files/2301.03503v1.pdf.txt +1261 -0
  8. 0NE1T4oBgHgl3EQf4wUX/content/tmp_files/load_file.txt +0 -0
  9. 2NFRT4oBgHgl3EQfmzfK/content/tmp_files/2301.13603v1.pdf.txt +1291 -0
  10. 2NFRT4oBgHgl3EQfmzfK/content/tmp_files/load_file.txt +0 -0
  11. 39A0T4oBgHgl3EQfNf8t/content/tmp_files/2301.02146v1.pdf.txt +3499 -0
  12. 39A0T4oBgHgl3EQfNf8t/content/tmp_files/load_file.txt +0 -0
  13. 4tE2T4oBgHgl3EQf6ghP/content/tmp_files/2301.04200v1.pdf.txt +1439 -0
  14. 4tE2T4oBgHgl3EQf6ghP/content/tmp_files/load_file.txt +0 -0
  15. 6dE4T4oBgHgl3EQf1w1z/content/tmp_files/2301.05293v1.pdf.txt +968 -0
  16. 6dE4T4oBgHgl3EQf1w1z/content/tmp_files/load_file.txt +0 -0
  17. 6tAyT4oBgHgl3EQfpvgE/vector_store/index.faiss +3 -0
  18. 79E1T4oBgHgl3EQf7gUu/content/tmp_files/2301.03534v1.pdf.txt +1467 -0
  19. 79E1T4oBgHgl3EQf7gUu/content/tmp_files/load_file.txt +0 -0
  20. 7dE4T4oBgHgl3EQfcww5/content/2301.05085v1.pdf +3 -0
  21. 7dE4T4oBgHgl3EQfcww5/vector_store/index.faiss +3 -0
  22. 7dE4T4oBgHgl3EQfcww5/vector_store/index.pkl +3 -0
  23. 89E4T4oBgHgl3EQf3A3O/content/tmp_files/2301.05303v1.pdf.txt +1837 -0
  24. 89E4T4oBgHgl3EQf3A3O/content/tmp_files/load_file.txt +0 -0
  25. 8tA0T4oBgHgl3EQfOv9y/content/tmp_files/2301.02165v1.pdf.txt +1045 -0
  26. 8tA0T4oBgHgl3EQfOv9y/content/tmp_files/load_file.txt +0 -0
  27. 8tAyT4oBgHgl3EQfqPgO/content/tmp_files/2301.00537v1.pdf.txt +1396 -0
  28. 8tAyT4oBgHgl3EQfqPgO/content/tmp_files/load_file.txt +0 -0
  29. AdFIT4oBgHgl3EQf-yxb/content/tmp_files/2301.11412v1.pdf.txt +0 -0
  30. AdFIT4oBgHgl3EQf-yxb/content/tmp_files/load_file.txt +0 -0
  31. BtFAT4oBgHgl3EQfsR7g/content/2301.08658v1.pdf +3 -0
  32. BtFAT4oBgHgl3EQfsR7g/vector_store/index.pkl +3 -0
  33. C9E1T4oBgHgl3EQfpwXL/content/tmp_files/2301.03336v1.pdf.txt +1444 -0
  34. C9E1T4oBgHgl3EQfpwXL/content/tmp_files/load_file.txt +0 -0
  35. DNAyT4oBgHgl3EQfSPdR/content/tmp_files/2301.00081v1.pdf.txt +0 -0
  36. DNAyT4oBgHgl3EQfSPdR/content/tmp_files/load_file.txt +0 -0
  37. DdE0T4oBgHgl3EQfQQD8/content/tmp_files/2301.02192v1.pdf.txt +2027 -0
  38. DdE0T4oBgHgl3EQfQQD8/content/tmp_files/load_file.txt +0 -0
  39. E9E4T4oBgHgl3EQfGwxn/content/tmp_files/2301.04897v1.pdf.txt +1622 -0
  40. E9E4T4oBgHgl3EQfGwxn/content/tmp_files/load_file.txt +0 -0
  41. EtAzT4oBgHgl3EQfUPx6/vector_store/index.pkl +3 -0
  42. FNAyT4oBgHgl3EQf4_q8/vector_store/index.pkl +3 -0
  43. HNAzT4oBgHgl3EQfxf6-/content/tmp_files/2301.01740v1.pdf.txt +3023 -0
  44. HNAzT4oBgHgl3EQfxf6-/content/tmp_files/load_file.txt +0 -0
  45. INE2T4oBgHgl3EQf_Qm3/content/tmp_files/2301.04247v1.pdf.txt +2039 -0
  46. INE2T4oBgHgl3EQf_Qm3/content/tmp_files/load_file.txt +0 -0
  47. MNAzT4oBgHgl3EQfV_xV/vector_store/index.pkl +3 -0
  48. MtE0T4oBgHgl3EQfjQEE/content/2301.02455v1.pdf +3 -0
  49. MtE0T4oBgHgl3EQfjQEE/vector_store/index.faiss +3 -0
  50. MtE0T4oBgHgl3EQfjQEE/vector_store/index.pkl +3 -0
-9FLT4oBgHgl3EQfDS7k/content/tmp_files/2301.11979v1.pdf.txt ADDED
@@ -0,0 +1,681 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11979v1 [cond-mat.str-el] 27 Jan 2023
2
+ DFT, L(S)DA, LDA+U, LDA+DMFT..., whether we do approach
3
+ to a proper description of optical response for strongly correlated
4
+ systems?
5
+ A.S. Moskvin1
6
+ 1Ural Federal University, Ekaterinburg, 620083 Russia
7
+ Аннотация
8
+ I present a critical overview of so-called "ab initio"DFT (density fuctional theory) based
9
+ calculation schemes for the description of the electronic structure, energy spectrum, and optical
10
+ response for strongly correlated 3d oxides, in particular, crystal-field and charge transfer transitions
11
+ as compared with an "old" cluster model that does generalize crystal-field and ligand-field theory.
12
+ As a most instructive illustration of validity of numerous calculation techniques I address the
13
+ prototypical 3d insulator NiO predicted to be a metal in frames of a standard LDA (local density
14
+ approximation) band theory.
15
+ 1
16
+
17
+ INTRODUCTION
18
+ The electronic states in strongly correlated 3d oxides manifest both significant localization
19
+ and dispersional features. One strategy to deal with this dilemma is to restrict oneself to
20
+ small many-electron clusters embedded to a whole crystal, then creating model effective
21
+ lattice Hamiltonians whose spectra may reasonably well represent the energy and dispersion
22
+ of the important excitations of the full problem. Despite some shortcomings the method did
23
+ provide a clear physical picture of the complex electronic structure and the energy spectrum,
24
+ as well as the possibility of a quantitative modeling.
25
+ However, last decades the condensed matter community faced an expanding flurry of
26
+ papers with the so called ab initio calculations of electronic structure and physical properties
27
+ for strongly correlated systems such as 3d compounds based on density functional theory
28
+ (DFT). The modern formulation of the DFT originated in the work of Hohenberg and
29
+ Kohn [1], on which based the other classic work in this field by Kohn and Sham [2]. The Kohn-
30
+ Sham equation, has become a basic mathematical model of much of present-day methods for
31
+ treating electrons in atoms, molecules, condensed matter, solid surfaces, nanomaterials, and
32
+ man-made structures [3]. Of the top three most cited physicists in the period 1980-2010, the
33
+ first (Perdew: 65 757 citations) and third (Becke: 62 581 citations) were density-functional
34
+ theorists [4].
35
+ However, DFT still remains, in some sense, ill-defined: many of DFT statements were
36
+ ill-posed or not rigorously proved. Most widely used DFT computational schemes start
37
+ with a "metallic-like"approaches making use of approximate energy functionals, firstly LDA
38
+ (local density approximation) scheme, which are constructed as expansions around the
39
+ homogeneous electron gas limit and fail quite dramatically in capturing the properties of
40
+ strongly correlated systems. The LDA+U and LDA+DMFT (DMFT, dynamical mean-
41
+ field theory) [5] methods are believed to correct the inaccuracies of approximate DFT
42
+ exchange correlation functionals. The main idea of these computational approaches consists
43
+ in a selective description of the strongly correlated electronic states, typically, localized
44
+ d or f orbitals, using the Hubbard model, while all the other states continue to be
45
+ treated at the level of standard approximate DFT functionals. At present the LDA+U
46
+ and LDA+DMFT methods are addressed to be most powerful tools for the investigation
47
+ of strongly correlated electronic systems, however, these preserve many shortcomings of
48
+ 2
49
+
50
+ the DFT-LDA approach. Despite many examples of a seemingly good agreement with
51
+ experimental data (photoemission and inverse-photoemission spectra, magnetic moments,...)
52
+ claimed by the DFT community, both the questionable starting point and many unsolved
53
+ and unsoluble problems give rise to serious doubts in quantitative and even qualitative
54
+ predictions made within the DFT based techniques. In a certain sense the cluster based
55
+ calculations seem to provide a better description of the overall electronic structure of
56
+ insulating 3doxides and its optical response than the DFT based band structure calculations,
57
+ mainly due to a clear physics and a better account for correlation effects (see, e.g.,
58
+ Refs. [6, 7]).
59
+ The paper is organized as follows. In Sec.II we do present a short critical overview of the
60
+ DFT and the DFT based technique with a focus on the NiO oxide. Sec.III is devoted to a
61
+ short overview of the cluster model approaches to a proper semiquantitative description of
62
+ the optical response in strongly correlated 3d oxides with a focus on the NiO oxide. A short
63
+ summary is made in Sec.IV.
64
+ SHORT OVERVIEW OF THE DFT BASED TECHNIQUE
65
+ Hohenberg-Kohn-Sham DFT
66
+ Density functional theory finds its roots in the approach which Thomas and Fermi
67
+ elaborated shortly after the creation of quantum mechanics [8, 9]. The Thomas-Fermi theory
68
+ of atoms may be interpreted as a semiclassical approximation, where the energy of a system
69
+ is written as a functional of the one-particle density.
70
+ Justifying earlier attempts directed at generalizing the Thomas-Fermi theory, Hohenberg
71
+ and Kohn [1] in 1964 advanced a theorem: "For any system of interacting particles in an
72
+ external potential v(r), the external potential is uniquely determined (except for a constant)
73
+ by the ground state density n0(r) which states that the exact ground-state energy is a
74
+ functional of the exact ground-state one-particle density. Unfortunately, it does not tell
75
+ how to construct this functional, i.e., it is an existence theorem for the energy-density
76
+ functional. This explains the fact of why so much effort has been dedicated to the task of
77
+ obtaining approximate functionals for the description of the ground-state properties of many-
78
+ particle systems. Contrary to wavefunction theory, where the objective is to approximate
79
+ 3
80
+
81
+ the wavefunction, in DFT we choose to make approximations for the functional.
82
+ However, DFT still remains, in some sense, ill-defined: many of the DFT statements
83
+ were ill-posed or not rigorously proved. Indeed, the HK theorem is the constellation of two
84
+ statements: (i) the mathematically rigorous HK lemma, which demonstrates that the same
85
+ ground state density cannot correspond to two different potentials of an external field, and
86
+ (ii) the hypothesis of the existence of the universal density functional. However, the HK
87
+ lemma cannot provide justification of the universal density functional for fermions [10]. In
88
+ other words, each external field determines a unique density, and each density determines
89
+ a unique external field on the basis of the HK lemma. However, the rule for the last
90
+ correspondence can be nonuniversal, as the rule in general depends on the concrete form of
91
+ the density. The existence of this nonuniversality violates the HK theorem, although the HK
92
+ lemma is believed to be undoubtedly correct [10].
93
+ Furthermore, there are more serious critics. Sarry and Sarry [11] claim that the proof of
94
+ the HK theorem is not correct. The authors do emphasize that for a strict many-particle
95
+ calculation only the direct mapping: external potential ⇒ ground state wave function ⇒
96
+ electron density
97
+ v(r) ⇒ Ψ0(r) ⇒ ρ0(r)
98
+ is justified while the inverse mapping
99
+ ρ0(r) ⇒ Ψ0(r) ⇒ v(r)
100
+ claimed by the HK theorem can be validated only for single-particle self-consistent
101
+ calculations.
102
+ The DFT exploits the one-to-one correspondence between the single-particle electron
103
+ density and an external potential acting upon the system and relies on the existence of
104
+ a universal functional F[ρ(r)] which can be minimized in order to find the ground state
105
+ energy. However,the correspondence theorem establishes the existence of the functional only
106
+ in principle, and provides no unique practical recipe for its construction. The construction
107
+ of the functional F[ρ(r)] in the HK-DFT is equivalent to the problem of finding the N-
108
+ representability conditions of the reduced density matrix of order two [3, 12], the problem
109
+ whose solution has not been found until now. Generally speaking the functional F[ρ(r)]
110
+ must be N-dependent, namely, F[N, ρ(r)]. Another important aspect, closely related to N-
111
+ representability, is the variational character that either exact or approximate functionals
112
+ 4
113
+
114
+ F[N, ρ(r)] must have in order to guarantee that the energy remains an upper bound to the
115
+ exact value.
116
+ The Kohn-Sham (KS) theory goes further in reducing the problem of calculating ground
117
+ state properties of a many-electron system in a local external single-particle potential to
118
+ solving Hartree-like one-electron KS equations. Within the framework of the HKS-DFT,
119
+ the many-body problem of interacting electrons in a static external potential is cast into
120
+ a tractable problem of non-interacting electrons moving in an effective potential. The
121
+ latter includes the external potential and the effects of the Coulomb interactions between
122
+ the electrons, i.e. the Hartree term, describing the electron-electron repulsion, and the
123
+ exchange and correlation (XC) interactions, which includes all the many-body interactions.
124
+ Modeling the XC interactions is the main difficulty of DFT. In practical calculations, the
125
+ XC contribution is approximated, and the results are only as good as the approximation
126
+ used. Actually, in HKS-DFT there exist hundreds of XC-approximations for vKS
127
+ xc (r) [3]. The
128
+ existence of so many approximations, with so little guidance, makes it ever more difficult
129
+ for non-specialists to separate the silver from the dross [13]. It is worth noting here that all
130
+ the approximate functionals do not comply with the variational principle.
131
+ The leading approximation for density functional construction is the so called local density
132
+ approximation (LDA), which is based upon exact exchange energy for a uniform electron gas
133
+ and only requires the density at each point in space. So the LDA taken from assuming that
134
+ the electron density for an atom, molecule, or solid is similarly homogeneous. But molecules
135
+ in LDA are typically overbound by about 1 eV/bond, and in the late 1980s the so-called
136
+ generalized gradient approximations (GGAs) using both the density and its gradient at
137
+ each point in space were elaborated whose accuracy seemed to be acceptable in chemical
138
+ calculations [13]. All the GGAs functionals, by definition, are corrections to the LDA, they
139
+ all revert to the uniform electron gas at zero density gradient. It should be noted that the
140
+ local nature of the standard approximations implies an exponential decay of the inter-site
141
+ interaction, in other words, the description of weak interactions such as long-range van der
142
+ Waals interactions is well beyond any conventional DFT method [13].
143
+ The DFT calculations are quite different from the usual quantum mechanical methods
144
+ where better accuracy depends on computational resources and not on limitations stemming
145
+ from the method itself. The Hartree-Fock (HF) results cannot be reproduced within the
146
+ framework of Kohn-Sham (KS) theory because the single-particle densities of finite systems
147
+ 5
148
+
149
+ obtained within the HF calculations are not v-representable, i.e., do not correspond to any
150
+ ground state of a N non-interacting electron systems in a local external potential [14]. For
151
+ this reason, the KS theory, which finds a minimum on a different subset of all densities, can
152
+ overestimate the ground state energy, as compared to the HF result.
153
+ In addition to the lack of compliance with N-representability conditions and difficulties
154
+ in extending the application of the first HK theorem to finite subspaces, there are still other
155
+ problems that beset DFT. They have to do with how to properly include symmetry (i.e.,
156
+ properties of all operators commuting with the Hamiltonian of a given system). For instance,
157
+ translational symmetry in crystalline solids should be applied only to a full many-electron
158
+ function rather than to one-electron KS orbitals!
159
+ Currently, the KS-DFT is about occupied orbitals only and is far from giving a consistent
160
+ and quantitatively accurate description of open-shell spin systems, as the currently available
161
+ approximate functionals show unsystematic errors in the (inaccurate) prediction of energies,
162
+ geometries, and molecular properties.
163
+ Strictly speaking, the DFT is designed for description of ground rather than excited states
164
+ with no good scheme for excitations. Because an excited-state density does not uniquely
165
+ determine the potential, there is no general analog of HK for excited states. The standard
166
+ functionals are inaccurate both for on-site crystal field and for charge transfer excitations [13].
167
+ The DFT based approaches cannot provide the correct atomic limit and the term and
168
+ multiplet structure, which is crucial for description of the optical response for 3dcompounds.
169
+ Although there are efforts to obtain correct results for spectroscopic properties depending
170
+ on spin and orbital density this problem remains as an open one in DFT research. Clearly,
171
+ all these difficulties stem from unsolved foundational problems in DFT and are related to
172
+ fractional charges and to fractional spins. Thus, these basic unsolved issues in the HKS-DFT
173
+ point toward the need for a basic understanding of foundational issues.
174
+ In other words, given these background problems, the DFT based models should be
175
+ addressed as semi-empirical approximate ones rather than ab initio theories. M. Levy
176
+ introduced in 2010 the term DFA to define density functional approximation instead of
177
+ DFT, which is believed to quite appropriately describe contemporary DFT [3]. In chemistry,
178
+ it is traditional to refer to standard approaches as ab initio, while DFT is regarded as
179
+ empirical. Because solid-state calculations are more demanding, for many decades DFT was
180
+ the only possible approach. Thus, DFT calculations are referred to as ab initio in solid-state
181
+ 6
182
+
183
+ physics and materials science [13]. Proceeding with a fixed approximate functional, the DFT
184
+ is called "first principles in the sense that the user only chooses the atoms, and the computer
185
+ predicts (correctly or not) all properties of the molecule or solid.
186
+ LSDA
187
+ Basic drawback of the spin-polarized approaches is that these start with a local density
188
+ functional in the form (see, e.g. Ref.15)
189
+ v(r) = v0[n(r)] + ∆v[n(r), m(r)](ˆσ · m(r)
190
+ |m(r)|) ,
191
+ where n(r), m(r) are the electron and spin magnetic density, respectively, ˆσ is the Pauli
192
+ matrix, that is these imply presence of a large fictious local one-electron spin-magnetic field ∝
193
+ (v↑−v↓), where v↑,↓ are the on-site LSDA spin-up and spin-down potentials. Magnitude of the
194
+ field is considered to be governed by the intra-atomic Hund exchange, while its orientation
195
+ does by the effective molecular, or inter-atomic exchange fields. Despite the supposedly
196
+ spin nature of the field it produces an unphysically giant spin-dependent rearrangement of
197
+ the charge density that cannot be reproduced within any conventional technique operating
198
+ with spin Hamiltonians. Furthermore, a direct link with the orientation of the field makes
199
+ the effect of the spin configuration onto the charge distribution to be unphysically large.
200
+ However, magnetic long-range order has no significant influence on the redistribution of
201
+ the charge density. The DFT-LSDA community needed many years to understand such a
202
+ physically clear point.
203
+ In general, the LSDA method to handle a spin degree of freedom is absolutely
204
+ incompatible with a conventional approach based on the spin Hamiltonian concept. There
205
+ are some intractable problems with a match making between the conventional formalism
206
+ of a spin Hamiltonian and LSDA approach to the exchange and exchange-relativistic
207
+ effects. Visibly plausible numerical results for different exchange and exchange-relativistic
208
+ parameters reported in many LSDA investigations (see, e.g., Refs. [16]) evidence only a
209
+ potential capacity of the LSDA based models for semiquantitative estimations, rather than
210
+ for reliable quantitative data. It is worth noting that for all of these "advantageous"instances
211
+ the matter concerns the handling of certain classical N´eel-like spin configurations (ferro-,
212
+ antiferro-, spiral,...) and search for a compatibility with a mapping made with a conventional
213
+ 7
214
+
215
+ quantum spin Hamiltonian. It’s quite another matter when one addresses the search of the
216
+ charge density redistribution induced by a spin configuration as, for instance, in multiferroics.
217
+ In such a case the straightforward application of the LSDA scheme can lead to an unphysical
218
+ overestimation of the effects or even to qualitatively incorrect results due to an unphysically
219
+ strong effect of a breaking of spatial symmetry induced by a spin configuration (see, e.g.
220
+ Refs. [17] and references therein).
221
+ Going beyond LSDA:LDA+U, LDA+DMFT, LDA+U+V
222
+ It is commonly accepted now that the standard DFT-LDA(GGA) approach is insufficient
223
+ to describe the electronic structure of the Mott insulators.
224
+ Apparent weaknesses of the DFT approach were exposed especially after the discovery
225
+ in 1986 of the copper-oxide superconductors, as it failed to yield the fact that the parent
226
+ compound La2CuO4 is an antiferromagnetic insulator. This difficult period for the DFT-
227
+ LDA method as many decided was partially ended in the early and mid 1990s especially
228
+ when an orbital dependent Hubbard-type U was incorporated in the exchange correlation
229
+ functional of the localized 3delectrons within the LDA+U method, while the other electrons
230
+ are still described at the LDA level [5].
231
+ Attempts to go beyond LSDA are based on the self-interaction-corrected density
232
+ functional theory SIC-DFT, the LDA+U method, and the GW approximation [5]. These
233
+ methods represent corrections of the single-particle Kohn-Sham potential in one way or
234
+ another and lead to substantial improvements over the LSDA results for the values of the
235
+ energy gap and local moment. Within the SIC-DFT and LDA+U methods the occupied and
236
+ unoccupied states are split by the Coulomb interaction U, whereas within the LSDA this
237
+ splitting is caused by the Stoner parameter J, which is typically one order of magnitude
238
+ smaller than U. Therefore, compared with the LSDA, the novel methods capture more
239
+ correctly the physics of transition-metal oxides and improve the results for the energy gap
240
+ and local moment significantly.
241
+ An important drawback of the LDA+U method is that it requires U as a starting
242
+ parameter. Even though several schemes for the determination of U exist, it is almost always
243
+ chosen such that it reproduces the experimental value of a specific property of the electronic
244
+ structure, most often the band gap. Usually the LDA+U calculations imply account of
245
+ 8
246
+
247
+ the on-site d-d correlations with Udd parameter and do neglect the ligand p-p correlations
248
+ though Udd parameter is only twice as large as Upp in oxides [6, 7]. The predictive power
249
+ of the novel methods crucially relies on a reliable assessment of the interactions, however,
250
+ the value of the interaction parameters, such as Udd, Upp, depends on the choice of the
251
+ downfolded model, namely, the orbitals treated in the model as well as the basis functions
252
+ employed, as the screened interaction is determined by the various screening processes that
253
+ are not considered in the model. Therefore a careful analysis is needed to make a proper
254
+ model and choose appropriate parameters. By fitting, one usually finds higher accuracy for
255
+ systems similar to those fitted, but usually greater inaccuracies far away.
256
+ All efforts to account for the correlations beyond LDA encounter an insoluble problem
257
+ of double counting (DC) of interaction terms which had just included into Kohn-Sham
258
+ single-particle potential. A well defined analytical expression for the DC potential cannot
259
+ be formulated in the context of LDA+U or other technique going beyond LDA [18]. How to
260
+ choose the DC correction potential in a manner that is both physically sound and consistent
261
+ is unknown. Thus, one has to resort to numerical criteria to fix the value of the DC correction.
262
+ However, there is currently no universal and unambiguous expression for DC correction,
263
+ and different formulations are used for different classes of materials. Moreover, different
264
+ methods for fixing the double counting can drive the result from Mott insulating to almost
265
+ metallic [18, 19].
266
+ The LDA+DMFT approach combines band structure theory within the DFT-LDA with
267
+ many-body theory as provided by dynamical mean-field theory (DMFT) [5]. Within DMFT,
268
+ a lattice model is mapped onto an effective impurity problem embedded in a medium which
269
+ has to be determined self-consistently, e.g., by quantum Monte-Carlo (QMC) simulations.
270
+ This mapping becomes exact in the limit of infinite dimensions.
271
+ The LDA+U and LDA+DMFT methods are believed to correct the inaccuracies of
272
+ approximate DFT exchange correlation functionals. The main idea of the both computational
273
+ approaches consists in a selective description of the strongly correlated electronic states,
274
+ typically, localized d or f orbitals, using the Hubbard model, while all the other states
275
+ continue to be treated at the level of standard approximate DFT functionals. At present
276
+ the LDA+U and LDA+DMFT methods are addressed to be most powerful tools for
277
+ the investigation of strongly correlated electronic systems, however, these preserve many
278
+ shortcomings of the basic DFT-LDA approach.
279
+ 9
280
+
281
+ Current theoretical studies of electronic correlations in transition metal oxides typically
282
+ only account for the local repulsion between d-electrons even if oxygen ligand p-states are
283
+ an explicit part of the effective Hamiltonian. Interatomic correlations such as Vpd between
284
+ d- and (ligand) p-electrons, as well as the on-site and inter-site interaction between p-
285
+ electrons (Upp and Vpp), are usually neglected. Strictly speaking, LDA+DMFT scheme
286
+ should incorporate both Upp, Vpp, Vpd and Vdd interactions [20]. To this end we need a
287
+ proper procedure for their calculation, however, this makes the double counting problem
288
+ significantly more sophisticated.
289
+ NiO as a main TMO system for so-called ab initio studies
290
+ An ongoing challenge during the last 60 years has been the development of a theoretical
291
+ model that could offer an accurate description of both the electric and magnetic phenomena
292
+ observed in NiO. Nickel oxide is one of the prototypical compounds that has highlighted the
293
+ importance of correlation effects in transition metal oxides (TMO). However, despite several
294
+ decades of studies there is still no literature consensus on the detailed electronic structure
295
+ of NiO. Although exhibiting a partially filled 3dband and predicted by simple band theory
296
+ to be a good conductor, NiO has a relatively large band gap (about 4 eV) that cannot be
297
+ accounted for in the LDA calculations.
298
+ NiO has long been viewed as a prototype "Mott insulator" [21] with the gap formed
299
+ by intersite cation-cation d-d charge transfer (CT) transitions, however, this view was
300
+ later replaced by that of a "CT insulator"with the gap formed by anion-cation p-d CT
301
+ transitions [22].
302
+ Strictly speaking, the DFT is designed for description of ground rather than excited
303
+ states. Nevertheless research activity in the condensed matter DFT community is focused
304
+ on the single-particle excitation properties of the TMOs, in particular, the photoemission
305
+ spectra and energy gap.
306
+ The XPS combined with bremsstrahlung-isochromat spectroscopy (BIS) shows a gap
307
+ between the top of the valence band and the bottom of the conducting band of 4.3 eV for
308
+ NiO [23]. Namely this value appears to be in the focus of the so-called ab initio DFT-LDA
309
+ based calculations for NiO. However, the later studies [24] have shown that the exact value of
310
+ this conductivity gap is subject to the band position chosen to define the highest valence and
311
+ 10
312
+
313
+ lowest conducting levels, obtaining values that range from 3.20 to 5.67 eV (!). Experimental
314
+ data, in particular, oxygen x-ray emission (XES) and absorption (XAS) spectra [25] point
315
+ to strong matrix element effects, that makes reliable estimates of the energy gap to be very
316
+ ambiguous adventure.
317
+ The standard DFT-LDA band theory predicts NiO to be a metal. LSDA [26] predicts
318
+ NiO to be an insulator (with severe underestimated gap of 0.3 eV) only in antiferromagnetic
319
+ state (!?). The later GW [27] and LDA+U [28] calculations yielded the larger gap of 3.7 eV.
320
+ First LDA+DMFT calculation performed by Ren et al. [29] yielded the value of 4.3 eV. The
321
+ authors claimed: "The overall agreement between the calculated single-particle spectrum and
322
+ the experimental data is surprisingly good". However, they do neglect the matrix element
323
+ effect, p-d covalency, Upp, Vpd, and Vdd, that de facto does invalidate their conclusion. Part
324
+ of these effects, in particular, p − d covalency was taken into account later [30], but with a
325
+ severe reinterpretation of the DOS. Again, the authors claim: "...we were able to provide
326
+ a full description of the valence-band spectrum and, in particular, of the distribution of
327
+ spectral weight between the lower Hubbard band and the resonant peak at the top of the
328
+ valence band. However, to this day the LDA+DMFT results for NiO strongly depend on
329
+ the choice of the DC correction potential driving the result from Mott insulating to metallic
330
+ state [18, 19].
331
+ It is rather surprising how little attention has been paid to the DFT based calculations
332
+ of the TMO optical properties. Lets turn to a very recent paper by Roedl and Bechstedt [31]
333
+ on NiO and other TMOs, whose approach is typical for DFT community. The authors
334
+ calculated the dielectric function ǫ(ω) for NiO within the DFT-GGA+U+∆ technique and
335
+ claim:"The experimental data agree very well with the calculated curves" (!?). However,
336
+ this seeming agreement is a result of a simple fitting when the two model parameters U and
337
+ ∆ are determined such (U = 3.0, ∆ = 2.0 eV) that the best possible agreement concerning the
338
+ positions and intensities of the characteristic peaks in the experimental spectra is obtained.
339
+ In addition, the authors arrive at absolutely unphysical conclusion: "The optical absorption
340
+ of NiO is dominated by intra-atomic t2g → eg transitions" (!?).
341
+ Nekrasov et al. [19] realized the DMFT calculation of the optical conductivity for NiO.
342
+ Just another correlation parameter was chosen: U = 8 eV. The authors claim a general
343
+ agreement both with optical and the X-ray experiments. In the calculations, they found
344
+ that the main contribution to optical conductivity is due to intra-orbital optical transitions.
345
+ 11
346
+
347
+ Inter-orbital optical transitions give less than 5% of the optical conductivity intensity in
348
+ the frequency range used in the calculations. However, as usual they did neglect a number
349
+ of important on-site and inter-site correlation parameters and all the effects due to optical
350
+ matrix elements that does invalidate their conclusion. Furthermore, the DFT-LDA based
351
+ schemes do not provide the correct atomic limit and the term and multiplet structure. Hence
352
+ these cannot correctly describe both the d-d crystal field and p-d and d-d charge transfer
353
+ transitions. However, some authors [32] suppose that in future this problem probably can be
354
+ solved within the LDA+DMFT.
355
+ Surveying these and other literature data we can argue that the conventional DFT based
356
+ technique cannot provide a proper description of the optical response for strongly correlated
357
+ 3dcompounds. As up till now, in future the optical properties of the Mott or charge transfer
358
+ insulators will be considered within the framework of cluster approaches initially based on
359
+ quantum-chemical calculations.
360
+ CLUSTER MODEL IN NIO
361
+ Cluster model approach does generalize and advance crystal-field and ligand-field theory.
362
+ The method provides a clear physical picture of the complex electronic structure and
363
+ the energy spectrum, as well as the possibility of a quantitative modelling. In a certain
364
+ sense the cluster calculations might provide a better description of the overall electronic
365
+ structure of insulating 3doxides than the band structure calculations, mainly due to a better
366
+ account for correlation effects, electron-lattice coupling, and relatively weak interactions
367
+ such as spin-orbital and exchange coupling. Cluster models have proven themselves to be
368
+ reliable working models for strongly correlated systems such as transition-metal and rare-
369
+ earth compounds. These have a long and distinguished history of application in optical and
370
+ electron spectroscopy, magnetism, and magnetic resonance. The author with colleagues has
371
+ successfully demonstrated great potential of the cluster model for description of the p-d
372
+ and d-d charge transfer transitions and their contribution to optical and magneto-optical
373
+ response in 3doxides such as ferrites, manganites, cuprates, and nickelates [33].
374
+ Cluster models do widely use the symmetry for atomic orbitals, point group symmetry,
375
+ and advanced technique such as Racah algebra and its modifications for point group
376
+ symmetry [34]. From the other hand the cluster model is an actual proving-ground for various
377
+ 12
378
+
379
+ calculation technique from simple quantum chemical MO-LCAO (molecular orbital-linear-
380
+ combination-of-atomic-orbitals) method to a more elaborate LDA+MLFT (MLFT, multiplet
381
+ ligand-field theory) [35] approach.
382
+ Cluster models traditionally combined quantum chemical MO-LCAO calculations [34]
383
+ based on atomic Hartree-Fock orbitals with making use parameters fitted to experiments.
384
+ Several authors obtained model parameters by performing an LDA calculation for the cluster
385
+ and using its Kohn-Sham MOs. First comprehensive description of the electronic structure
386
+ of the NiO6 cluster was performed by Fujimori and Minami [36]. Effective transfer and
387
+ overlap integrals were evaluated from LCAO parameters of NiO found by Mattheiss [37]
388
+ by fitting their APW energy-band results. The localized approach has been shown to
389
+ successfully explain the photoemission, optical-absorption, and isochromat spectra of NiO.
390
+ Recently, Haverkort et al. [35] suggested a sort of generalization of conventional ligand-
391
+ field model with the DFT-based calculations within a so-called "ab initio"LDA+MLFT
392
+ technique. They start by performing a DFT calculation for the proper, infinite crystal
393
+ using a modern DFT code which employs an accurate density functional and basis set
394
+ [e.g., linear augmented plane waves (LAPWs)]. From the (self-consistent) DFT crystal
395
+ potential they then calculate a set of Wannier functions suitable as the single-particle basis
396
+ for the cluster calculation. The authors compared the theory with experimental spectra
397
+ (XAS, nonresonant IXS, photoemission spectroscopy) for SrTiO3, MnO, and NiO and found
398
+ overall satisfactory agreement, indicating that their ligand-field parameters are correct to
399
+ better than 10%. However, as in Ref. [36] the authors have been forced to treat on-site
400
+ correlation parameter Udd and orbitally averaged (spherical) ∆pd parameter as adjustable
401
+ ones. Comparing the novel LDA+MFLT technique with that of Fujimori and Minami [36]
402
+ one should note very similar level of their quantitative conclusions. Despite the involvement
403
+ of powerful calculation techniques the numerical results of the both approaches seem to
404
+ be more like semiquantitative ones. In such a situation we should transfer the center of
405
+ gravity of the cluster approaches more and more to elaboration of physically sound and clear
406
+ semiquantitative models that are maximally take into account all the symmetry requirements
407
+ on one hand and refer to experiment on the other.
408
+ Hereafter, we do present a most recent and most comprehensive such a cluster model
409
+ approach to the description of the p-d and d-d CT transitions in NiO [38] that nicely
410
+ illustrates great potential of the model that does combine simple physically clear ligand-
411
+ 13
412
+
413
+ field analysis, its semiquantitative predictions with a regular appeal to experimental data.
414
+ We believe that such an approach should precede and accompany any detailed numerical
415
+ calculation providing its physical validation.
416
+ Starting with an octahedral NiO6 complex with the point symmetry group Oh we deal
417
+ with five Ni 3dand eighteen oxygen O 2p atomic orbitals forming both the hybrid Ni 3d-O
418
+ 2p bonding and antibonding eg and t2g molecular orbitals (MO), and the purely oxygen
419
+ nonbonding a1g(σ), t1g(π), t1u(σ), t1u(π), t2u(π) orbitals. The nonbonding t1u(σ) and t1u(π)
420
+ orbitals with the same symmetry are hybridized due to the oxygen-oxygen O 2pπ - O
421
+ 2pπ transfer. The relative energy position of different nonbonding oxygen orbitals is of
422
+ primary importance for the spectroscopy of the oxygen-3d-metal charge transfer. This is
423
+ firstly determined by the bare energy separation ∆ǫ2pπσ = ǫ2pπ − ǫ2pσ between O 2pπ and O
424
+ 2pσ electrons. Since the O 2pσ orbital points towards the two neighboring positive 3d ions,
425
+ an electron in this orbital has its energy lowered by the Madelung potential as compared
426
+ with the O 2pπ orbitals, which are oriented perpendicular to the respective 3d-O-3d axes.
427
+ Thus, the Coulomb arguments favor the positive sign of the π − σ separation ǫpπ − ǫpσ
428
+ whose numerical value can be easily estimated in the frames of the well-known point charge
429
+ model, and appears to be of the order of 1.0 eV. In a first approximation, all the γ(π) states
430
+ t1g(π), t1u(π), t2u(π) have the same energy. However, the O 2pπ-O 2pπ transfer and overlap
431
+ yield the energy correction to the bare energies with the largest value and a positive sign for
432
+ the t1g(π) state. The energy of the t1u(π) state drops due to a hybridization with the cation
433
+ 4pt1u(π) state.
434
+ The ground state of NiO610− cluster, or nominally Ni2+ ion corresponds to t6
435
+ 2ge2
436
+ g
437
+ configuration with the Hund 3A2g(F) ground term. Typically for the octahedral MeO6
438
+ clusters [33] the nonbonding t1g(π) oxygen orbital has the highest energy and forms the first
439
+ electron removal oxygen state while the other nonbonding oxygen π-orbitals, t2u(π), t1u(π),
440
+ and the σ-orbital t1u(σ) have a lower energy with the energy separation ∼ 1 eV inbetween
441
+ (see Fig. 1).
442
+ The p-d CT transition in NiO10−
443
+ 6
444
+ center is related to the transfer of O 2p electron to the
445
+ partially filled 3deg-subshell with the formation on the Ni-site of the (t6
446
+ 2ge3
447
+ g) configuration of
448
+ nominal Ni+ ion isoelectronic to the well-known Jahn-Teller Cu2+ ion. Yet actually instead
449
+ of a single p-d CT transition we arrive at a series of O 2pγ→ Ni 3deg CT transitions
450
+ forming a complex p-d CT band. It should be noted that each single electron γ→eg p-d
451
+ 14
452
+
453
+ Рис. 1: (Color online) Spectra of the intersite d-d, p-d CT transitions and on-site crystal field d-d
454
+ transitions in NiO. Strong dipole-allowed σ−σ d-d and p-d CT transitions are shown by thick solid
455
+ uparrows; weak dipole-allowed π − σ p-d transitions by thin solid uparrows; weak dipole-forbidden
456
+ low-energy transitions by thin dashed uparrows, respectively. Dashed downarrows point to different
457
+ electron-hole relaxation channels, dotted downarrows point to photoluminescence (PL) transitions,
458
+ I1,2 are doublet of very narrow lines associated with the recombination of the d-d CT exciton.
459
+ The spectrum of the crystal field d-d transitions is reproduced from Ref. [45]. The right hand side
460
+ reproduces a fragment of the RIXS spectra for NiO [41].
461
+ CT transition starting with the oxygen γ-orbital gives rise to several many-electron CT
462
+ states. For γ=t1,2 these are the singlet and triplet terms 1,3T1, 1,3T2 for the configurations
463
+ t6
464
+ 2ge3
465
+ gt1,2, where t1,2 denotes the oxygen hole. The complex p-d CT band starts with the
466
+ dipole-forbidden t1g(π)→eg, or 3A2g→1,3T1g, 1,3T2g transitions, then includes two formally
467
+ dipole-allowed the so-called π→σ p-d CT transitions, the weak t2u(π)→eg, and relatively
468
+ strong t1u(π)→eg CT transitions, respectively, each giving rise to 3A2g→3T2u transitions.
469
+ 15
470
+
471
+ Finally the main p-d CT band is ended by the strongest dipole-allowed σ→σ t1u(σ)→
472
+ eg (3A2g→3T2u) CT transition. The above estimates predict the separation between the
473
+ partial p-d bands to be ∼ 1 eV. Thus, if the most intensive CT band with a maximum
474
+ around 7 eV observed in the RIXS spectra [39–41] to attribute to the strongest dipole-
475
+ allowed O 2pt1u(σ)→Ni 3deg CT transition then one should expect the low-energy p-d
476
+ CT counterparts with the maxima around 4, 5, and 6 eV respectively, which are related
477
+ to the dipole-forbidden t1g(π)→eg, the weak dipole-allowed t2u(π)→eg, and relatively strong
478
+ dipole-allowed t1u(π)→eg CT transitions, respectively (see Fig. 1). It is worth noting that
479
+ the π→σ p-d CT t1u(π)−eg transition borrows a portion of the intensity from the strongest
480
+ dipole-allowed σ→σ t1u(σ)→eg CT transition because the t1u(π) and t1u(σ) states of the
481
+ same symmetry are partly hybridized due to the p-p covalency and overlap.
482
+ Thus, the overall width of the p-d CT bands with the final t6
483
+ 2ge3
484
+ g configuration occupies
485
+ a spectral range from ∼ 4 up to ∼ 7 eV. The left hand side of Fig. 1 summarizes the
486
+ main semiquantitative results of the cluster model predictions for the energy and relative
487
+ intensities of the p-d CT transitions. Interestingly this assignment finds a strong support in
488
+ the reflectance (4.9, 6.1, and 7.2 eV for the allowed p-d CT transitions) spectra of NiO [42]. A
489
+ rather strong p(π)-d CT band peaked at 6.3 eV is clearly visible in the absorption spectra of
490
+ MgO:Ni [43]. The electroreflectance spectra [44] which detect the dipole-forbidden transitions
491
+ clearly point to a low-energy forbidden transition peaked near 3.7 eV missed in the reflectance
492
+ and absorption spectra [42, 43, 45], which thus defines a p-d character of the optical CT gap
493
+ and can be related to the onset transition for the whole complex p-d CT band. It should
494
+ be noted that a peak near 3.8 eV has been also observed in the nonlinear absorption spectra
495
+ of NiO [46]. At variance with the bulk NiO a clearly visible intensive CT peak near 3.6-
496
+ 3.7 eV has been observed in the absorption spectra of NiO nanoparticles [47]. This strongly
497
+ supports the conclusion that the 3.7 eV band is related to the bulk-forbidden CT transition
498
+ which becomes the partially allowed one in the nanocrystalline state [38]. It is worth noting
499
+ that the hole-type photoconductivity threshold in bulk NiO has been observed also at this
500
+ "magic" energy 3.7 eV [48], that is the t1g(π)→eg p-d CT transition is believed to produce
501
+ itinerant holes. Indeed, the p-d CT transitions in NiO6 cluster are of so-called "anti-Jahn-
502
+ Teller" type, that is these are transitions from orbitally nondegenerate state to the final p-d
503
+ CT state state formed by two orbitally degenerate states that points to strong electron-lattice
504
+ effects in excited state. The final Ni1+ 3d9(t6
505
+ 2ge3
506
+ g) configuration is isoelectronic to Cu2+ ion in
507
+ 16
508
+
509
+ cubic crystal field and presents a well-known textbook example of a Jahn-Teller center that
510
+ implies a strong trend to the localization, while a photo-generated hole can move more or
511
+ less itinerantly in the O 2p valence band determining the hole-like photoconductivity [48]. It
512
+ should be noted that any oxygen π-holes have a larger effective mass than the σ-holes, that
513
+ results in a different role of the p(π)-d and p(σ)-d CT transitions both in photoconductivity
514
+ and, probably, the luminescence stimulation.
515
+ A spectral feature near 6 eV, clearly visible in the NiO photoluminescence excitation
516
+ (PLE) spectra [38] can be certainly attributed to a rather strong p(π)-d (t1u(π) → eg) CT
517
+ transition while the spectral feature near 5 eV to a weaker p(π)-d (t2u(π) → eg) CT transition.
518
+ Interestingly the strongest p(σ)-d (t1u(σ) → eg) CT transition at ∼ 7 eV is actually inactive
519
+ in the PLE spectra, most likely, due to a dominating nonradiative relaxation channel for the
520
+ oxygen t1u(σ) holes.
521
+ However, the p-d CT model cannot explain the main low-energy spectral feature, clearly
522
+ visible in the PLE spectra near 4 eV [38], thus pointing to manifestation of another CT-type
523
+ mechanism. Indeed, along with the p-d CT transitions an important contribution to the
524
+ optical response of the strongly correlated 3doxides can be related to the strong dipole-
525
+ allowed d-d CT, or Mott transitions [33]. In NiO one expects a strong d-d CT transition
526
+ related to the σ − σ-type eg − eg charge transfer t6
527
+ 2ge2
528
+ g + t6
529
+ 2ge2
530
+ g→ t6
531
+ 2ge3
532
+ g + t6
533
+ 2ge1
534
+ g between nnn
535
+ Ni sites with the creation of electron NiO611− and hole NiO69− centers (nominally Ni+ and
536
+ Ni3+ ions, respectively) thus forming a bound electron-hole dimer, or d-d CT exciton.
537
+ The strong dipole-allowed Franck-Condon d(eg)-d(eg) CT transition in NiO manifests
538
+ itself as a strong spectral feature near 4.5 eV clearly visible in the absorption of thin
539
+ NiO films [49], RIXS spectra [39, 41], the reflectance spectra (4.3 eV) [42]. Such a strong
540
+ absorption near 4.5 eV is beyond the predictions of the p-d CT model and indeed is lacking
541
+ in the absorption spectra of MgO:Ni [43]. It should be noticed that, unlike all the above
542
+ mentioned structureless spectra, the nonlinear absorption spectra [46] of NiO films do reveal
543
+ an anticipated "fine" structure of the d-d CT exciton with the two narrow peaks at 4.075
544
+ and 4.33 eV preceding a strong absorption above 4.575 eV. Interestingly the separation 0.2-
545
+ 0.3 eV between the peaks is typical for the exchange induced splittings in NiO (see, e.g.,
546
+ the "0.24 eV" optical feature [45]). Accordingly, the 4.1 eV peak in the PLE spectra can be
547
+ unambiguously assigned to the d-d CT transition [38].
548
+ The charge, spin, and orbital degeneracy of the final state of this unique double anti-
549
+ 17
550
+
551
+ Jahn-Teller transition 3A2g + 3A2g→2Eg + 2Eg results in a complex band observed at 4.2-4.5
552
+ eV [38]. The exchange tunnel reaction Ni++Ni3+↔Ni3++Ni+ due to a two-electron transfer
553
+ gives rise to the two symmetric (S- and P-) excitons having s- and p-symmetry, respectively,
554
+ with the energy separation δ0 = 2|t| and δ1 =
555
+ 2
556
+ 3|t| for the spin singlet and spin triplet
557
+ excitons, where t is the two-electron transfer integral whose magnitude is of the order of the
558
+ Ni2+-Ni2+ exchange integral: t ≈ Innn. Interestingly the P-exciton is dipole-allowed while
559
+ the S-exciton is dipole-forbidden. The anti-Jahn-Teller d-d CT exciton is prone to be self-
560
+ trapped in the lattice due to the electron-hole attraction and a particularly strong double
561
+ Jahn-Teller effect for both the electron and hole centers. Recombination transitions for such
562
+ excitons produce a bulk luminescence with puzzling well isolated doublet of very narrow
563
+ lines with close energies near 3.3 eV [38] that corresponds to a reasonable Stokes shift of 1
564
+ eV. To the best of our knowledge it is the first observation of the self-trapping for the d-d
565
+ CT excitons.
566
+ Thus, we see that a simple cluster model is able to provide a semiquantitative description
567
+ of a large body of experimental spectroscopic data, including subtle effects beyond the reach
568
+ of any "ab initio"DFT technique. We have shown that the prototype 3doxide NiO, similar
569
+ to perovskite manganites RMnO3 or parent cuprates such as La2CuO4 [33], should rather
570
+ be sorted neither into the CT insulator nor the Mott-Hubbard insulator in the Zaanen-
571
+ Sawatzky-Allen scheme [22].
572
+ SUMMARY
573
+ There are still a lot of people who think the Hohenberg-Kohn-Sham DFT within the
574
+ LDA has provided a very successful ab initio framework to successfully tackle the problem
575
+ of the electronic structure of materials. However, both the starting point and realizations
576
+ of the DFT approach have raised serious questions. The HK "theorem"of the existence of
577
+ a mythical universal density functional that can resolve everything looks like a way into
578
+ Neverland, the DFT heaven is probably unattainable. Various DFAs, density functional
579
+ approximations, local or nonlocal, will never be exact. Users are willing to pay this price
580
+ for simplicity, efficacy, and speed, combined with useful (but not yet chemical or physical)
581
+ accuracy [4, 13].
582
+ The most popular DFA fail for the most interesting systems, such as strongly correlated
583
+ 18
584
+
585
+ oxides. The standard approximations over-delocalize the d-electrons, leading to highly
586
+ incorrect descriptions. Some practical schemes, in particular, DMFT can correct some of
587
+ these difficulties, but none has yet become a universal tool of known performance for such
588
+ systems [13].
589
+ Any comprehensive physically valid description of the electron and optical spectra for
590
+ strongly correlated systems, as we suggest, should combine simple physically clear cluster
591
+ ligand-field analysis with a numerical calculation technique such as LDA+MLFT [35], and
592
+ a regular appeal to experimental data.
593
+ The research was supported by the Ministry of Education and Science of the Russian
594
+ Federation, project FEUZ-2020-0054.
595
+ [1] H. Hohenberg and W. Kohn, Phys. Rev. 136, B864 (1964).
596
+ [2] W. Kohn and J.L. Sham, Phys. Rev. 140, A1133 (1965).
597
+ [3] E.S. Kryachko, E.V. Ludena, Physics Reports 544 (2014) 123239.
598
+ [4] A.D. Becke, J. Chem. Phys. 140, 18A301 (2014).
599
+ [5] G. Kotliar, S.Y. Savrasov, K. Haule, V.S. Oudovenko, O. Parcollet, and C.A. Marianetti, Rev.
600
+ Mod. Phys. 78, 865 (2006); V.I. Anisimov and Yu.A. Izyumov, Electronic Structure of Strongly
601
+ Correlated Materials (Springer Verlag, Berlin, 2010).
602
+ [6] H. Eskes, L.H. Tjeng, and G.A. Sawatzky, Phys. Rev. B 41, 288 (1990).
603
+ [7] J. Ghijsen, L.H. Tjeng, J. van Elp, H. Eskes, J. Westerink, G.A. Sawatzky, and M.T. Czyzyk,
604
+ Phys. Rev. B 38, 11322 (1988).
605
+ [8] L.H. Thomas, Proc. Cambr. Phil. Soc. 23, 542 (1926).
606
+ [9] E. Fermi, Rend. Ac. Lincei 6, 602 (1927).
607
+ [10] V.B. Bobrov, S.A. Trigger, JETP 143 , 729 (2013).
608
+ [11] A.M. Sarry, M.F. Sarry, Phys. Solid State, 54(6), 1315 (2012).
609
+ [12] Eduardo V. Ludena, J. Mol. Structure (Theochem) 709 25 (2004).
610
+ [13] K. Burke, J. Chem. Phys. 136, 150901 (2012).
611
+ [14] M.Ya. Amusia, A.Z. Msezane, V.R. Shaginyan, D. Sokolovski, Phys. Lett. A330:1-2 (2004),
612
+ 10-15.
613
+ [15] L.M. Sandratskii, Phys. Rev. B 64, 134402 (2001).
614
+ 19
615
+
616
+ [16] V.V. Mazurenko and V.I. Anisimov, Phys. Rev. B 71, 184434 (2005); M.I. Katsnelson, Y.O.
617
+ Kvashnin, V.V. Mazurenko, and A.I. Lichtenstein, Phys. Rev. B 82, 100403(R) (2010).
618
+ [17] A.S. Moskvin and S.-L. Drechsler, Phys. Rev. B 78, 024102 (2008); Eur. Phys. J. B 71, 331
619
+ (2009); A.S. Moskvin, Yu.D. Panov, S.-L. Drechsler, Phys. Rev. B 79, 104112 (2009).
620
+ [18] M. Karolak, G. Ulm, T. O. Wehling, V. Mazurenko, A. Poteryaev, and A. I. Lichtenstein, J.
621
+ Electron Spectrosc. Relat. Phenom. 181, 11 (2010).
622
+ [19] I.A. Nekrasov, N.S. Pavlov, and M.V. Sadovskii, JETP Lett. 95(11), 581 (2012); JETP 116(4),
623
+ 620 (2013).
624
+ [20] H.J. Kulik and N. Marzari, J. Chem. Phys. 134, 094103 (2011); P. Hansmann, N. Parragh, A.
625
+ Toschi, G. Sangiovanni, and K. Held, arXiv:1312.2757v1, 2013.
626
+ [21] B. Brandow, Adv. Phys. 26, 651 (1977); S. H¨ufner, Adv. Phys. 43, 183 (1994).
627
+ [22] J. Zaanen, G. A. Sawatzky, and J W. Allen, Phys. Rev. Lett. 55, 418 (1985).
628
+ [23] G.A. Sawatzky, J.W. Allen, Phys. Rev. Lett. 53, 2239 (1984).
629
+ [24] S. H¨ufner, P. Steiner, I. Sander, F. Reinert, and H. Schmitt, Z. Phys. B - Condensed Matter
630
+ 86, 207-215 (1992).
631
+ [25] E. Z. Kurmaev, R. G. Wilks, A. Moewes, L. D. Finkelstein, S. N. Shamin, and Kuneˇs, PRB
632
+ 77, 165127 (2008).
633
+ [26] K. Terakura, T. Oguchi, A.R. Williams, and J. Kubler, Phys. Rev. B 30, 4734 (1984).
634
+ [27] S. Massidda, A. Continenza, M. Posternak, and A. Baldereschi, Phys. Rev. B 55, 13494 (1997).
635
+ [28] V.I. Anisimov, I.V. Solovyev, M.A. Korotin, M.T. Czyzyk, and G.A. Sawatzky, Phys. Rev. B
636
+ 48, 16929 (1993).
637
+ [29] X. Ren, I. Leonov, G. Keller, M. Kollar, I. Nekrasov, and D. Vollhardt, Phys. Rev. B 74,
638
+ 195114 (2006).
639
+ [30] J. Kunes, V.I. Anisimov, A.V. Lukoyanov, and D. Vollhardt, Phys.Rev. B 75, 165115 (2007).
640
+ [31] C. Roedl and F. Bechstedt, Phys. Rev. B 86, 235122 (2012).
641
+ [32] M.I. Katsnelson, A.I. Lichtenstein, J. Phys. Cond. Matter. 22, 382201 (2010).
642
+ [33] A. S. Moskvin, A. V. Zenkov, E. I. Yuryeva, V. A. Gubanov, Physica B, 168,186 (1991); A. S.
643
+ Moskvin, A. V. Zenkov, E. A. Ganshina, G. S. Krinchik, and M. M. Nishanova, J. Phys. Chem.
644
+ Solids, 54, 101 (1993); A.V. Zenkov, A.S. Moskvin, J.Phys.Cond. Matter 14 6957 (2002); A. S.
645
+ Moskvin, Phys. Rev. B 65, 205113 (2002); A.S. Moskvin, R. Neudert, M. Knupfer, J. Fink,
646
+ and R. Hayn, Phys. Rev. B 65, 180512(R) (2002); A.S. Moskvin, J. M´alek, M. Knupfer, R.
647
+ 20
648
+
649
+ Neudert, J. Fink, R. Hayn, S.-L. Drechsler, N. Motoyama, H. Eisaki, and S. Uchida, Phys.
650
+ Rev. Lett. 91, 037001 (2003); R. V. Pisarev, A. S. Moskvin, A. M. Kalashnikova, A. A. Bush,
651
+ and Th. Rasing, Phys. Rev. B 74, 132509 (2006); A. S. Moskvin, R. V. Pisarev, Phys. Rev.
652
+ B 77, 060102(R) (2008); A.S. Moskvin, R.V. Pisarev, Low Temp. Phys. 36 613 (2010); A. S.
653
+ Moskvin, A. A. Makhnev, L. V. Nomerovannaya, N. N. Loshkareva, and A. M. Balbashov, Phys.
654
+ Rev. B 82, 035106 (2010); A. S. Moskvin, Optics and Spectroscopy, 111, 403 (2011).
655
+ [34] S. Sugano, Y. Tanabe and H. Kamimura, Multiplets of Transition-Metal Ions in Crystals
656
+ (Academic, New York, 1970).
657
+ [35] M.W. Haverkort, M. Zwierzycki, and O.K. Andersen, Phys. Rev. B 85, 165113 (2012).
658
+ [36] A. Fujimori and F. Minami, Phys. Rev. B 30, 957 (1984).
659
+ [37] L.F. Mattheiss, Phys. Rev. B 5, 290 (1972).
660
+ [38] V.I. Sokolov, V.A. Pustovarov, V.N. Churmanov et al., JETP Letters, 95, 528 (2012); Phys.
661
+ Rev. B 86, 115128 (2012); V.I. Sokolov, V.A. Pustovarov, V.N. Churmanov et al., IOP Conf.
662
+ Series: Materials Science and Engineering 38, 012007 (2012).
663
+ [39] N. Hiraoka, H. Okamura, H. Ishii, I. Jarrige, K.D. Tsuei, and Y.Q. Cai, Eur. Phys. J. B 70,
664
+ 157 (2009).
665
+ [40] M. Magnuson, S.M. Butorin, A. Agui, and J. Nordgren, J. Phys.: Condens. Matter 14, 3669
666
+ (2002).
667
+ [41] L.-C. Duda, T. Schmitt, M. Magnuson, J. Forsberg, A. Olsson, J. Nordgren, K. Okada and A.
668
+ Kotani, Phys. Rev. Lett. 96, 067402 (2006); B.C. Larson, Wei Ku, J.Z. Tischler, Chi-Cheng
669
+ Lee, O.D. Restrepo, A.G. Eguiluz, P. Zschack, and K.D. Finkelstein, Phys. Rev. Lett. 99,
670
+ 026401 (2007).
671
+ [42] R.J. Powell and W.E. Spicer, Phys. Rev. B 2, 2182 (1970).
672
+ [43] K.W. Blazey, Physica 89B, 47 (1977).
673
+ [44] J.L. McNatt, Phys. Rev. Lett. 23, 915 (1969); R. Glosser, W.C. Walker, Solid State Commun,
674
+ 9, 1599 (1971).
675
+ [45] R. Newman and R.M. Chrenko, Phys. Rev. 114, 1507 (1959).
676
+ [46] S.I. Shablaev, and R.V. Pisarev, Physics of the Solid State 45, 1742 (2003).
677
+ [47] V.V. Volkov, Z.L. Wang, and B.S. Zou, Chemical Phys. Lett. 337, 117 (2001).
678
+ [48] Ja.M. Ksendzov and I.A. Drabkin, Sov. Phys. Solid State, 7, 1519 (1965).
679
+ [49] C.E. Rossi and W. Paul, J. Phys. Chem. Solids 30, 2295 (1969).
680
+ 21
681
+
-9FLT4oBgHgl3EQfDS7k/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-9FLT4oBgHgl3EQfvi-U/content/tmp_files/2301.12160v1.pdf.txt ADDED
@@ -0,0 +1,708 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.12160v1 [physics.optics] 28 Jan 2023
2
+ Polarization-independent second-order photonic topological corner states
3
+ Linlin Lei,1 Shuyuan Xiao,2, 3 Wenxing Liu,1 Qinghua Liao,1, ∗ Lingjuan He,1 and Tianbao Yu1, †
4
+ 1School of Physics and Materials Science,
5
+ Nanchang University, Nanchang 330031, China
6
+ 2Institute for Advanced Study, Nanchang University, Nanchang 330031, China
7
+ 3Jiangxi Key Laboratory for Microscale Interdisciplinary Study,
8
+ Nanchang University, Nanchang 330031, China
9
+ 1
10
+
11
+ Abstract
12
+ Recently, much attention has been paid to second-order photonic topological insulators (SPTIs), because
13
+ of their support for highly localized corner states with excellent robustness. SPTIs have been implemented
14
+ in either transverse magnetic (TM) or transverse electric (TE) polarizations in two-dimensional (2D) pho-
15
+ tonic crystals (PCs), and the resultant topological corner states are polarization-dependent, which limits
16
+ their application in polarization-independent optics. However, to achieve polarization-independent corner
17
+ states is not easy, since they are usually in-gap and the exact location in the topological bandgap is not
18
+ known in advance. Here, we report on a SPTI based on a 2D square-lattice PC made of an elliptic metama-
19
+ terial, and whether the bandgap is topological or trivial depends on the choice of the unit cell. It is found that
20
+ locations of topological bandgaps of TM and TE polarizations in the frequency spectrum can be indepen-
21
+ dently controlled by the out-of-plane permittivity ε⊥ and in-plane permittivity ε∥, respectively, and more
22
+ importantly, the location of in-gap corner states can also be separately manipulated by them. From this, we
23
+ achieve topological corner states for both TM and TE polarizations with the same frequency in the PC by
24
+ adjusting ε⊥ and ε∥, and their robustness against disorders and defects are numerically demonstrated. The
25
+ proposed SPTI provides a potential application scenario for polarization-independent topological photonic
26
+ devices.
27
+ I.
28
+ INTRODUCTION
29
+ Recently, the concept of higher-order topological insulators (HOTIs) has been extended from
30
+ electronic waves into classic waves[1–12]. It has been shown that HOTIs do not obey the usual
31
+ bulk-edge correspondence but comply with the bulk-edge-corner correspondence[13–15]. For
32
+ instance, a two-dimensional (2D) second-order topological insulator possesses one-dimensional
33
+ (1D) gapped edge states and zero-dimensional (0D) in-gap corner states. In addition to the charac-
34
+ teristics of strong field localization and small mode volume, 0D corner states also show excellent
35
+ robustness against fabrication flaws[16–18]. On this basis, they have enormous application value
36
+ in the topological cavity[18, 19], lasing[20, 21], non-linear optics[22, 23], and sensing[24]. How-
37
+ ever, for photonic crystals (PCs), the two kinds of polarization, transverse magnetic (TM) and
38
+ transverse electric (TE) modes, are usually studied in a separate way. One reason is either of the
39
40
41
+ 2
42
+
43
+ two modes can be excited independently, each with its own band structure, and the other is that
44
+ forming a common band gap (CBG) is not easy, especially the topological one. Past researches
45
+ have shown the polarization-independent optics is potentially useful in polarization-independent
46
+ waveguides relying full bandgaps[25], enhanced nonlinear optical effects[26], and polarization
47
+ division multiplexing[27]. Topologically protected polarization-independent optics would give
48
+ them additional resistance to perturbation. It is worth noting that dual-polarization second-order
49
+ photonic topological states have been proposed by Chen et al. recently, based on a topologically
50
+ optimized geometric structure within a square-lattice[28]. However, eigenfrequencies of topolog-
51
+ ical states for the two polarizations are not the same, despite they have a common topological
52
+ bandgap.
53
+ In this paper, a 2D second-order photonic topological insulator (SPTI) is proposed, of which the
54
+ topological states are polarization-independent. The square-lattice PC having a fishnet structure is
55
+ made by an elliptic metamaterial. The permittivity is anisotropic and nevertheless, the geometry
56
+ structure is rather simple compared with the previously proposed topologically optimized struc-
57
+ ture. That the CBG is either trivial or topological depends on the choice of the unit cell (UC) for
58
+ both TM and TE modes. The proposed SPTI can host topological edge states and corner states
59
+ for the two modes at the same time. Our results show polarization-independent topological cor-
60
+ ner states based a SPTI is not guaranteed by a common topological bandgap. However, we find
61
+ that locations of bandgaps and corner states in the frequency spectrum can be manipulated inde-
62
+ pendently by the out-of-plane permittivity ε⊥ and in-plane permittivity ε∥ for TM and TE modes,
63
+ respectively, which gives an effective way to achieve overlapped corner states for the two modes.
64
+ On this basis, corner states independent of polarization can be realized by choosing appropriate
65
+ ε⊥ and ε∥. Numerical simulations further show the corner states are topologically protected, with
66
+ strong robustness to disorders and defects. Our work shows potential applications in polarization-
67
+ independent topological photonic devices.
68
+ II.
69
+ STRUCTURE DESIGN AND BAND TOPOLOGY
70
+ For PCs, it is well known that TM bandgaps are favored in dielectric rods, while TE bandgaps
71
+ prefer dielectric veins[29]. From this, the proposed square-lattice PC is constructed by thin dielec-
72
+ tric veins with dielectric rods located at lattice sites, as shown in Fig. 1(a). a is the lattice constant,
73
+ and the circle radius r and vein width d are 0.3a and 0.18a, respectively. The dielectric material is
74
+ 3
75
+
76
+ anisotropic, an elliptic metamaterial with the permittivity ε = (ε∥, ε∥, ε⊥) = (16.9, 16.9, 10). Gen-
77
+ erally, topological corner states lie in a topological bandgap[13], and hence a topological CBG
78
+ of TM and TE polarizations is the prerequisite for polarization-independent topological corner
79
+ states. The choice of the elliptic metamaterial is based on the consideration that bandgap locations
80
+ of TM and TE polarizations in the frequency spectrum can be manipulated independently by ε⊥
81
+ and ε∥, respectively. In practical, we can use the multilayer model to construct the anisotropic
82
+ permittivity[30]. The multilayer consists of two alternative dielectrics with high and low permit-
83
+ tivity, and it is placed horizontally in the x-y plane. According to the formulisms (16) and (17)
84
+ proposed in ref[31], the PC slab with permittivity (16.9,16.9,10) can be approximately built by
85
+ the high dielectric with the permittivity of 17.67 and the air layer when the filling ratio of high
86
+ dielectric is 0.954. Herein, the calculation of band structures and numerical simulations are based
87
+ on the finite element method using the commercial software COMSOL Multiphysics.
88
+ FIG. 1. (a) Fishnet PC and two kinds of unit cells (UC), UC1 and UC2. (b) Band structures of TM and
89
+ TE modes, denoted by red and blue dot-lines, respectively. Even and odd parities of UC1 (UC2) at high
90
+ symmetric points are indicated by plus and minus symbols, colored in red and blue for TM and TE modes,
91
+ respectively. (c) Ez field patterns of the two TM bands at the X point for UC1 and UC2. (d) Hz field patterns
92
+ of the two TE bands at the X point for UC1 and UC2.
93
+ 4
94
+
95
+ (a)
96
+ (b)
97
+ 0.4
98
+ TM
99
+ TE
100
+ Frequency(c/a)
101
+ 0.3
102
+ +
103
+ +(-)
104
+ UC1
105
+ (+)
106
+ 0.2
107
+ +(-)
108
+ -(+)
109
+ 0.1
110
+ 0.0
111
+ X(Y)
112
+ M
113
+ (c)
114
+ (d)
115
+ TM
116
+ TE
117
+ UC1
118
+ UC1
119
+ UC2
120
+ UC2
121
+ 1st
122
+ 2nd
123
+ 1st
124
+ 2nd
125
+ +1
126
+ -1
127
+ +1
128
+ -1
129
+ Ez
130
+ HzBased on the common square lattice, two kinds of unit cells (UCs), UC1 and UC2, are selected
131
+ in Fig. 1(a). Note that the two UCs are consistent with each other after shifting the center of one
132
+ of the UCs by half of the period along x and y directions. Therefore, they share the same band
133
+ structure as plotted in Fig. 1(b), with red and blue dot-lines denoting the TM and TE modes, re-
134
+ spectively. One can find that there is a CBG indicated by the gray region lying between the first
135
+ and second bands of TM modes. However, for the two UCs, the CBG possesses different topo-
136
+ logical behaviors characterized by the 2D Zak phase [see Appendix A], which has the following
137
+ form[32–34]:
138
+ θZak
139
+ j
140
+ =
141
+
142
+ dkxdkyTr[ ˆA j(kx, ky)],
143
+ (1)
144
+ where j = x or y, and the Berry connection ˆA j = i⟨u(k)|∇kj|u(k)⟩ with u(k) being the periodic part
145
+ of the Bloch function. The 2D Zak phase can also be understood by the 2D bulk polarization via
146
+ θZak
147
+ j
148
+ = 2πP j with
149
+ P j = 1
150
+ 2(
151
+
152
+ n
153
+ qn
154
+ j mod 2),
155
+ (−1)qn
156
+ j = η(X j)
157
+ η(Γ)
158
+ (2)
159
+ where P j is determined by the parity η associated with π rotation at Γ and X(Y) points and the
160
+ summation is over all the occupied bands below the bandgap. Here, Px is equal to Py, namely,
161
+ Px = Py, due to the C4 symmetry[35, 36]. Eigenfield patterns at the X point of the two bands
162
+ for TM and TE modes are shown in Figs. 1(c) and 1(d), respectively, with the monopole an even
163
+ parity and dipole an odd parity. As can be seen, the parities of the two bands at the X point have an
164
+ inversion between UC1 and UC2 for both the two modes, whereas the parities at the Γ point stay
165
+ the same. Moreover, parities of the same UC at the X point are opposite for TM and TE modes,
166
+ which gives the same UC distinct topological properties for the two modes. Concretely, for TM
167
+ modes, the distinct parties of UC1 at the X and Γ points give the 2D bulk polarization (Px, Py) a
168
+ value of (0, 0) and the 2D Zak phase (θZak
169
+ x , θZak
170
+ y ) a value of (0, 0), while the same parity of UC2 at
171
+ the X and T points makes (Px, Py) = (1
172
+ 2, 1
173
+ 2) and (θZak
174
+ x , θZak
175
+ y ) = (π, π). The opposite is true for the TE
176
+ modes. As a result, the bandgap of UC1 is trivial and of UC2 is topological for TM modes, and it
177
+ is reversed for TE modes.
178
+ 5
179
+
180
+ FIG. 2. Projected band structures of (a) TM and (b) TE modes, with edge modes colored in red and blue,
181
+ respectively. Eigenfields at kx = 0 show the edge modes can be well confined at the interface between
182
+ UC1s and UC2s for both TM and TE modes. (c) Dependence of bandgaps and eigenfrequencies of one of
183
+ the corner states on ε⊥ and ε∥ for the two modes. The area shaded in light red indicates TM bandgaps,
184
+ while the area shaded in light blue indicates TE bandgaps. The red and blue lines denote one of the corner
185
+ states of TM and TE modes, respectively. (d) TM corner states (colored in red) and TE corner states
186
+ (colored in blue) under any combination of ε⊥ and ε∥ in the same parameter range of (c). The yellow
187
+ intersecting line denotes the combinations that have overlapped corner states. The yellow points on the
188
+ intersecting line is two of the combinations, and their anisotropic permittivity (ε∥, ε∥, ε⊥) are (16.9,16.9,10)
189
+ and (16.375,16.375,9.7), respectively. The green points are the two points that share the same anisotropic
190
+ permittivity (16.7,16.7,10.4) but have different eigenfrequencies.
191
+ III.
192
+ POLARIZATION-INDEPENDENT TOPOLOGICAL CORNER STATES
193
+ The topological distinction between UC1 and UC2 ensures the existence of topological edge
194
+ states[37–40]. To show this, we construct a supercell composed of five UC1s and five UC2s along
195
+ the y direction, and projected band structures are shown in Figs. 2(a) and 2(b) for TM and TE
196
+ modes, respectively. In the calculation, periodic boundary conditions are applied to the x direction.
197
+ 6
198
+
199
+ a
200
+ 0.3
201
+ (b)
202
+ 0.3
203
+ Frequency(c/a)
204
+ 0.2
205
+ 0.2
206
+ 0.1
207
+ 0.1
208
+ +1
209
+ TM
210
+ TE
211
+ 0.0
212
+ 0.0
213
+ 0
214
+ 1
215
+ -1
216
+ 0
217
+ k(π/a)
218
+ k,=0
219
+ kx(元/a)
220
+ k,=0
221
+ (c)
222
+ 16.4 16.6 16.8 17.0 17.2 174
223
+ (d)
224
+ TMcornerstates
225
+ 0.28
226
+ 0.266
227
+ TEcornerstates
228
+ 0.264
229
+ Frequency(c/a)
230
+ 0.27
231
+ 0.262
232
+ (e)
233
+ 0.260
234
+ Frequency(c/
235
+ 0.26
236
+ 0.258
237
+ 0.256
238
+ 0.25
239
+ 0.254
240
+ TM bandgap
241
+ (16.375,9.7)
242
+ TM corner state
243
+ 0.252
244
+ 0.24
245
+ TE bandgap
246
+ (16.9,10)
247
+ TE corner state
248
+ (16.7,10.4)
249
+ 3
250
+ 9.4
251
+ 9.6
252
+ 9.8
253
+ 10.010.210.410.6
254
+ 81FIG. 3. (a) Schematic of the finite-size box-shaped PC, with 15×15 UC1s surrounded by 6-layer UC2s. (b)
255
+ Eigenfrequencies of the box-shaped PC. TM and TE modes are denoted by pentagons and circles, with their
256
+ corner states colored in red and blue, respectively. Edge modes are shown as cyan. (c) Eigenfields of the
257
+ overlapped edge and corner modes.
258
+ FIG. 4. (a) Box-shaped PC with four disorders (red dots) around four corners of the internal PC composed
259
+ UC1s. The enlarged view shows one of the four disorders, with 10% decrease in radius and 0.1a deviation
260
+ from the lattice site along x and y directions. Eigenfields of four corner modes of (b) TM and (c) TE modes,
261
+ under the influence of the disorders.
262
+ As can be seen, there is one in-gap edge state for both the two modes, which does not occupy the
263
+ 7
264
+
265
+ (a)
266
+ (b
267
+ EC1
268
+ EC2
269
+ 0.25895(c/a)
270
+ 0.25897(c/a)
271
+ TEC3
272
+ TEC4
273
+ 0.25876(c/a
274
+ 0.25897(c/a)
275
+ 0.25897(c/a)
276
+ O
277
+ Ez
278
+ Hz(a)
279
+ (b)
280
+ 0.28
281
+ TM bulk
282
+ TE bulk
283
+ 6-layer Uc2s
284
+ TM edge
285
+ TEedge
286
+ 0.27
287
+
288
+ TMcorner
289
+ TE corner
290
+ requency(c/a)
291
+ 0.26
292
+ 0.25883(c/a)
293
+ L5x15UC1s
294
+ 0.25
295
+
296
+ 0.24
297
+ 0.23
298
+ 0
299
+ 10
300
+ 20
301
+ 30
302
+ 40
303
+ 50
304
+ 60
305
+ Solution number
306
+ (c)
307
+ TMC2
308
+ +1
309
+ 5209(c/a
310
+ 0.25883
311
+ 5883
312
+ -1
313
+ TEC1
314
+ TEC2
315
+ TEC3
316
+ TEC4
317
+ +1
318
+ OHz
319
+ 0.25883(c/a)
320
+ -1
321
+ 0.24836(c/a)
322
+ 0.25881(c/a)
323
+ 0.25883(c/a)
324
+ 0.25883(c/a)FIG. 5. (a) Box-shaped PC with defects produced by removing five UC1s in the center and four UC2s near
325
+ the edge of the PC. Eigenfields of four corner modes of (b) TM and (c) TE modes, under the influence of
326
+ the defects.
327
+ whole bulk bandgap and canbe confined at the interface between UC1s and UC2s. Since therer is a
328
+ C4 symmetry for the PC, we can define a corner topological index: Qc = 1
329
+ 4([X1] + 2[M1] + 3[M2]),
330
+ where [Πp] = #Πp − #Γp and #Πp is defined as the number of bands below the bandgap with
331
+ rotation eigenvalues Πn
332
+ p = e[2πi(p−1)/n] for p=1, 2, 3, 4. For the nontrivial TM and TE cases, they
333
+ both have [X1] = −1, [M1] = −1, [M2] = 0. Therefore, the corner topological index is Qc = 1
334
+ 4
335
+ for both the two modes, indicating 1
336
+ 4 fractionalized corner states at each of the four corners[40]. It
337
+ is noteworthy that the existence of polarization-independent corner states is not guaranteed by the
338
+ CBG. In Fig. 2(c), we change ε⊥ and ε∥ in the certain range near (16.9, 16.9, 10) to solely adjust
339
+ the positions of supercell bandgaps in the frequency spectrum for TM and TE modes, respectively.
340
+ Specifically, for the TM band gap, we increase ε⊥ from 9.4 to 10.6 and keep ε∥ at any value, while
341
+ for the TE band gap, we increase ε∥ from 16.3 to 17.5 and keep ε⊥ at an arbitrary value. As can
342
+ be seen, the positions of the two bandgaps descend as the corresponding permittivity increases,
343
+ and the TM bandgap (light red area) is completely embedded in the TE bandgap (light blue area),
344
+ forming the CBG. We also calculate the eigenfrequencies of TM (red line) and TE (blue line)
345
+ corner states from the finite-size box-shaped PC shown in Fig. 3(a), and find that they are in
346
+ the CBG and the variation trend of the corner states with the permittivity is the same as that of
347
+ the bandgaps. Since the two kinds of polarized corner states are independent of each other, in
348
+ order to search for the overlapped ones, we plot their eigenfrequencies under any combination of
349
+ ε⊥ and ε∥ in Fig. 2(d). It can be observed that corner states of the two modes do not coincide
350
+ with each other except on the yellow intersecting line. The yellow points on the intersecting
351
+ 8
352
+
353
+ (a)
354
+ (b)
355
+ EC1
356
+ EC2
357
+ 0.25881(c/a)
358
+ 0.25883(c/a)
359
+ TEC3
360
+ TEC4
361
+ 0.25883(c/a)
362
+ 0.25883(c/a)
363
+ +1
364
+ E7
365
+ Hzline are two of the combinations that have the overlapped corner states, and the corresponding
366
+ anisotropic permittivities (ε∥, ε∥, ε⊥) are (16.9,16.9,10) and (16.375,16.375,9.7). As a contrast,
367
+ green points are the two points that share the same anisotropic permittivity (16.7,16.7,10.4) but
368
+ have different eigenfrequencies. Therefore, the anisotropic permittivity provides an additional
369
+ freedom to manipulate the location of corner states of the two modes, making the corner states
370
+ either polarization-independent or polarization-separable [see Appendix B].
371
+ To verify the existence of the polarization-independent corner states, a box-shaped PC of finite
372
+ size is constructed, which is composed of 15 × 15 UC1s surrounded by six-layer UC2s, as shown
373
+ in Fig. 3(a). The calculated eigenfrequencies of TM and TE modes based on the anisotropic per-
374
+ mittivity (16.9,16.9,10) are shown in Fig. 3(b). As can be seen, both of them show gapped edge
375
+ modes and four in-gap corner modes. Red and blue dotted lines go through the overlapped cor-
376
+ ner and edge states, respectively. In Fig. 3(c), eigenfields of these topological states indicate that
377
+ the edge modes can be well confined along the whole interface between UC1s and UC2s, while
378
+ the corner states are highly localized at the corners of the internal PC formed by the UC1s. Re-
379
+ markably, topological corner states for the two modes do share the same eigenfrequencies, and the
380
+ common eigenfrequency of the corner states is 0.25883(c/a). This is different from the previously
381
+ reported dual-polarization topological corner states, which possess the topological CBG, but their
382
+ eigenfrequencies are not overlapped at all[28].
383
+ FIG. 6. (a) Eigenfrequencies of the box-shaped PC with an anisotropic permittivity of (16.375,16.375,9.7),
384
+ showing overlapped corner states of TM and TE modes. Pentagons and circles denote TM and TE modes,
385
+ and their corner states are colored in red and blue, respectively. (b). Eigenfields of the corner states of TM
386
+ modes. (c) Eigenfields of the corner states of TE modes.
387
+ The polarization-independent photonic corner states are topologically protected due to their
388
+ 9
389
+
390
+ (b)
391
+ (c)
392
+ 2
393
+ 0.28
394
+ M
395
+ TEC1
396
+ TEC2
397
+
398
+ TM bulk/edge
399
+
400
+ TM corner
401
+ TE bulk/edge
402
+ a
403
+ 0.27
404
+ TEcorner
405
+ 0.26247(c/a)
406
+ 0.26244(c/a)
407
+ 0.26247(c/a)
408
+ 0.26247(c/a)
409
+ ★食鱼食★★★★
410
+ ★★★★★
411
+ FMC3
412
+ FMC4
413
+ TEC3
414
+ TEC4
415
+ 0.25
416
+ 0
417
+ 2
418
+ 4
419
+ 6
420
+ 8
421
+ 10
422
+ 12
423
+ 14
424
+ 0.26252(c/a)
425
+ 0.26256(c/a)
426
+ 0.26247(c/a)
427
+ 0.26247(c/a)
428
+ Solution number
429
+ +1
430
+ +1
431
+ 0
432
+ -1
433
+ Ez
434
+ HzFIG. 7. (a) Box-shaped PC with a disorder (red dot) located at the left bottom corner of the internal PC
435
+ composed UC1s. The enlarged view shows the single disorder, with 10% decrease in radius and 0.1a
436
+ deviation from the lattice site along x and y directions. Eigenfields of four corner modes of (b) TM and (c)
437
+ TE modes, under the influence of the disorder.
438
+ FIG. 8. (a) Eigenfrequencies of the box-shaped PC with an anisotropic permittivity of (16.7,16.7,10.4),
439
+ which shows corner states of TM and TE modes are not overlapped. Pentagons and circles denote TM and
440
+ TE modes, and their corner states are colored in red and blue, respectively. (b). Eigenfields of the corner
441
+ states of TM modes. (c) Eigenfields of the corner states of TE modes.
442
+ topology origin[41, 42]. To verify this, we introduce four disorders marked by red dots around
443
+ the four corners into the instead perfect PC, as shown in Fig. 4(a). The enlarged view in Fig. 4(a)
444
+ exhibits the single disorder, with 10% decrease in radius and 0.1a deviation from the lattice site
445
+ along x and y directions. Eigenfields of the corner states of TM and TE modes are shown in
446
+ Figs. 4(b) and 4(c), respectively, from which we can see that the corner states still exist with
447
+ negligible offsets of the eigenfrequencies. Beyond that, defects, produced by removing five UC1s
448
+ 10
449
+
450
+ (b)
451
+ (c)
452
+ 0.28
453
+ TEC1
454
+ TEC2
455
+ TM bulk/edge
456
+
457
+ TM corner
458
+ TEbulk/edge
459
+ 0.27
460
+ TE corner
461
+ 0.25416(c/a)
462
+ 025411c3
463
+ 0.26017(c/a)
464
+ 0.26020(c/a)
465
+ TMC3
466
+ TEC3
467
+ M4
468
+ TEC4
469
+
470
+ 0.25
471
+ 0
472
+ 2
473
+ 4
474
+ 6
475
+ 8
476
+ 10
477
+ 12
478
+ 14
479
+ 0.25416(c/a
480
+ 0.25423(c/
481
+ 0.26020(c/a)
482
+ 0.26020(c/a
483
+ Solution number
484
+ +1
485
+ +1
486
+ O
487
+ -1
488
+ Ez
489
+ Hz(a)
490
+ (b)
491
+ (c)
492
+ TMC1
493
+ TEC1
494
+ TEC2
495
+ 0.26225(c/a)
496
+ 0.26245(c/a)
497
+ 0.26244(c/a)
498
+ 0.26247(c/a)
499
+ TMC3
500
+ TMC4
501
+ TEC3
502
+ TEC4
503
+ 0.26249(c/a)
504
+ 0.26255(c/a)
505
+ 0.26247(c/a)
506
+ 0.26427(c/a)
507
+ +1
508
+ O1
509
+ +1
510
+ 0
511
+ -1
512
+ Ez
513
+ Hzand four UC2s in the center and near the edge of the PC respectively, are also introduced, as shown
514
+ in Fig. 5(a). As can be seen in Figs. 5(b) and 5(c), since the defects are far away from the corners,
515
+ the eigenfrequencies of the corner states for the TM and TE modes remain unchanged, although
516
+ the defects have a more destructive effect on the PC structure[43].
517
+ IV.
518
+ CONCLUSION
519
+ In summary, a polarization-independent SPTI is achieved, based on a 2D square-lattice PC. The
520
+ dielectric is an elliptic metamaterial, and the geometric structure is rather simple nevertheless. By
521
+ selecting appropriate geometric parameters and anisotropic permittivity, a CBG is can be obtained
522
+ for TM and TE modes. That the CBG of a certain UC is either trivial or topological depends on the
523
+ polarization modes. Topological corner states of TM and TE modes can coexist in the CBG, but
524
+ only the combinations of in-plane permittivity ε∥ and out-of-plane permittivity ε⊥ that lie on the
525
+ intersecting line in the eigenfrequency-permittivity space can make them overlapped. Numerical
526
+ simulations further show they have strong robustness to disorders and defects. The proposed
527
+ scheme can also be extended to corner states induced by the quadrupole topological phase in
528
+ square-lattices, pseudo-spin and valley-spin degrees of freedom. Our work would pave the way
529
+ toward designing high-performance polarization-independent topological photonic devices, such
530
+ as the polarization-independent topological laser and coupled cavity-waveguide.
531
+ ACKNOWLEDGMENTS
532
+ The work was jointly supported by the National Natural Science Foundation of China (12064025,
533
+ 12264028) and Natural Science Foundation of Jiangxi Province (20212ACB202006) and Major
534
+ Discipline Academic and Technical Leaders Training Program of Jiangxi Province (20204BCJ22012).
535
+ Appendix A: Tight-binding model
536
+ The tight-binding model gives the topological phase transition between the UC1 and UC2 a
537
+ well description, in which one can take the dielectric rods as lattice sites for TM modes while the
538
+ air holes act the part for TE modes. The Hamiltonain has the following form,
539
+ 11
540
+
541
+ H = −
542
+
543
+ ij
544
+ tijc†
545
+ i cj,
546
+ (A1)
547
+ where tij is the hopping amplitude between the nearest lattice sites and c†
548
+ i (cj) is the creation (an-
549
+ nihilation) operator. As there is only one lattice cite in UCs, the one band below the photonic
550
+ bandgap can be expressed as
551
+ E = −t0(eikx + e−ikx + eiky + e−iky) = −2t0(cos kx + cos ky).
552
+ (A2)
553
+ Look at TM modes first, for UC1, the lattice site choosed as the inversion center is at the center
554
+ of the UC1, and the inversion operator is I = 1. Hence, parities at Γ and X points are the same.
555
+ For UC2, lattice sites are at the four corners and the inversion operator I = e±i(kx+ky) hinges on
556
+ which lattice site is referenced. Thus, the parity is +1 at the Γ = (0, 0) point, while it is -1 at the
557
+ X = (π, 0) point[34].
558
+ For TE modes, lattice sites of UC1 choosed as the inversion center are at the four corners, since
559
+ the air holes instead of the dielectric rods act the role of lattice sites. For UC2, the lattice site
560
+ choosed as the inversion center is at the center of UC2. As a consequence, parities at Γ and X
561
+ points are oppostie for UC1, while they are the same for the UC2. The results are consistence with
562
+ parities showed in Fig. 1(b).
563
+ Appendix B: Switch between polarization-independent and polarization-separable corner states
564
+ Here, we would like to show another anisotropic permittivity lying on the intersecting line that
565
+ can achieve polarization-independent topological corner states. The anisotropic permittivity is
566
+ (16.375, 16.375, 9.7), as indicated in the Fig. 2(e). Fig. 6(a) shows the calculated eigenfrequencies,
567
+ from which we can see that the corner states of the two modes can be overlapped under this
568
+ permittivity. Eigenfrequencies and eigenfields of the corner states are shown in Figs. 6(b) and
569
+ 6(c), and one can see the overlapped eigenfrequency is 0.26247(c/a). In Fig. 7, if we introduce a
570
+ single disorder into the box-shaped PC, the corner states still survive with litte frequency shit, but
571
+ monopole and quadrupole of TM modes no longer exist due to the broken of the C4 symmetry of
572
+ the box-shaped PC.
573
+ Noting that if the anisotropic permittivity is off the intersecting line, polarization-independent
574
+ corner states will be changed into polarization-separable corner states. As shown in the Fig. 2(e),
575
+ 12
576
+
577
+ if the anisotropic permittivity is (16.7,16.7,10.4), eigenfrequencies of the corner states of the two
578
+ modes are apart from each other. In detail, we plot the eigenfrequencies in Fig. 8(a), and one can
579
+ find that none of the four corner states of the two modes are the same, and the maximum frequency
580
+ difference between the two modes is 0.00606(c/a) as shown in Figs. 8(b) and 8(c).
581
+ [1] C. W. Peterson, W. A. Benalcazar, T. L. Hughes, and G. Bahl, Nature 555, 346 (2018).
582
+ [2] H. R. Xue, Y. H. Yang, F. Gao, Y. D. Chong, and B. L. Zhang, Nature Materials 18, 108 (2019).
583
+ [3] S. Y. Huo, H. B. Huang, L. Y. Feng, and J. J. Chen, Applied Physics Express 12, 094003 (2019).
584
+ [4] Y. T. Yang,
585
+ Z. Y. Jia,
586
+ Y. J. Wu,
587
+ R. C. Xiao,
588
+ Z. H. Hang,
589
+ H. Jiang, and X. Xie,
590
+ Science Bulletin 65, 531 (2020).
591
+ [5] Z. Z. Yang, X. Li, Y. Y. Peng, X. Y. Zou, and J. C. Cheng, Phys. Rev. Lett. 125, 255502 (2020).
592
+ [6] H. M. Mu, B. Liu, T. Y. Hu, and Z. F. Wang, Nano Letters 22, 1122 (2022).
593
+ [7] S. G. Marc, V. Peri, R. S¨usstrunk, R. B. Osama, L. Tom, L. G. Villanueva, and D. H. Sebastian, Nature
594
+ 555, 342 (2018).
595
+ [8] X. Ni, M. Weiner, A. Al`u, and A. B. Khanikaev, Nature Materials 18, 113 (2019).
596
+ [9] L. He, Z. Addison, E. J. Mele, and B. Zhen, Nature Communications 11, 3119 (2020).
597
+ [10] W. A. Benalcazar, B. A. Bernevig, and T. L. Hughes, Science 357, 61 (2017).
598
+ [11] S. W. An, T. Liu, H. Y. Fan, H. Gao, Z. M. Gu, S. J. Liang, S. B. Huang, Y. Zheng, Y. F. Chen,
599
+ L. Cheng, and J. Zhu, International Journal of Mechanical Sciences 224, 107337 (2022).
600
+ [12] B. Y. Xie, H. F. Wang, H. X. Wang, X. Y. Zhu, J. H. Jiang, M. H. Lu, and Y. F. Chen,
601
+ Phys. Rev. B 98, 205147 (2018).
602
+ [13] Z. G. Chen, C. Q. Xu, J. R. Al, J. Mei, and Y. Wu, Phys. Rev. B 100, 075120 (2019).
603
+ [14] M. Li, D. Zhirihin, M. Gorlach, X. Ni, D. Filonov, A. Slobozhanyuk, A. Al`u, and A. B. Khanikaev,
604
+ Nature Photonics 14, 89 (2020).
605
+ [15] X. Zhang, H.-X. Wang, Z.-K. Lin, Y. Tian, B. Xie, M.-H. Lu, Y.-F. Chen, and J.-H. Jiang,
606
+ Nature Physics 15, 582 (2019).
607
+ [16] A. Q. Shi, B. Yan, R. Ge, J. L. Xie, Y. C. Peng, H. Li, W. E. I. Sha, and J. J. Liu,
608
+ Opt. Lett. 46, 1089 (2021).
609
+ [17] X.
610
+ D.
611
+ Chen,
612
+ W.
613
+ M.
614
+ Deng,
615
+ F.
616
+ L.
617
+ Shi,
618
+ F.
619
+ L.
620
+ Zhao,
621
+ M.
622
+ Chen,
623
+ and
624
+ J.
625
+ W.
626
+ Dong,
627
+ Phys. Rev. Lett. 122, 233902 (2019).
628
+ 13
629
+
630
+ [18] O. Yasutomo, L. Feng, K. Ryota, W. Katsuyuki, W. Katsunori, A. Yasuhiko, and I. Satoshi,
631
+ Optica 6, 786 (2019).
632
+ [19] X. Xie, W. Zhang, X. He, S. Wu, J. Dang, K. Peng, F. Song, L. Yang, H. Ni, Z. Niu, C. Wang, K. Jin,
633
+ X. Zhang, and X. Xu, Laser & Photonics Reviews 14, 1900425 (2020).
634
+ [20] H. R. Kim, M. S. Hwang, D. Smirnova, K. Y. Jeong, Y. Kivshar, and H. G. Park, Nature Communica-
635
+ tions 11, 5758 (2020).
636
+ [21] H. Zhong, Y. V. Kartashov, A. Szameit, Y. Li, C. Liu, and Y. Zhang, APL Photonics 6, 040802 (2021).
637
+ [22] Z. Hu, D. Bongiovanni, D. Juki´c, E. Jajti´c, S. Xia, D. Song, J. Xu, R. Morandotti, H. Buljan, and
638
+ Z. Chen, Light: Science & Applications 10, 164 (2021).
639
+ [23] S. S. Kruk, W. Gao, D.-Y. Choi, T. Zentgraf, S. Zhang, and Y. Kivshar, Nano Letters 21, 4592 (2021).
640
+ [24] M. H. Chao, Q. S. Liu, W. J. Zhang, L. Y. Zhuang, and G. F. Song, Opt. Express 30, 29258 (2022).
641
+ [25] H. Wu, D. S. Citrin, L. Y. Jiang, and X. Y. Li, IEEE Photonics Technology Letters 27, 840 (2015).
642
+ [26] Y. N. Zhang, W. M. Murray, B. B. Lan, and L. Marko, Opt. Lett. 34, 2694 (2009).
643
+ [27] D. X. Dai and J. E. Bowers, Nanophotonics 3, 283 (2014).
644
+ [28] Y. F. Chen, F. Meng, Z. H. Lan, B. H. Jia, and X. D. Huang, Phys. Rev. Applied 15, 034053 (2021).
645
+ [29] Y. F. Chau, F. L. Wu, Z. H. Jiang, and H. Y. Li, Opt. Express 19, 4862 (2011).
646
+ [30] J. R. Wang, X. D. Chen, F. L. Zhao, and J. W. Dong, Scientific Reports 6, 22739 (2016).
647
+ [31] D. L. X. Z. Z. L. Lorenzo Ferrari, Chihhui Wu, Progress in Quantum Electronics 40, 1 (2015).
648
+ [32] Y. F. Chen, Z. H. Lan, and J. Zhu, Phys. Rev. Applied 17, 054003 (2022).
649
+ [33] F. Liu and K. Wakabayashi, Phys. Rev. Lett. 118, 076803 (2017).
650
+ [34] Y. F. Chen, Z. H. Lan, and J. Zhu, Nanophotonics 11, 1345 (2022).
651
+ [35] X. T. He, M. Y. Li, H. Y. Qiu, W. S. Ruan, L. D. Zhou, L. Liu, X. D. Chen, W. J. Chen, F. L. Zhao,
652
+ and J. W. Dong, Photon. Res. 9, 1423 (2021).
653
+ [36] Z. J. Zhang, J. B. Yang, T. Du, and X. P. Jiang, Photon. Res. 10, 855 (2022).
654
+ [37] L. Liu, Y. K. Wang, F. X. Zheng, and T. Sang, Opt. Lett. 47, 2634 (2022).
655
+ [38] H.
656
+ Zhong,
657
+ Y.
658
+ V.
659
+ Kartashov,
660
+ A.
661
+ Szameit,
662
+ Y.
663
+ D.
664
+ Li,
665
+ C.
666
+ L.
667
+ Liu,
668
+ and
669
+ Y.
670
+ Q.
671
+ Zhang,
672
+ APL Photonics 6, 040802 (2021).
673
+ [39] G. C. Ma, M. Xiao, and C. T. Chan, Nature Reviews Physics 1, 281 (2019).
674
+ [40] B. Y. Xie, G. X. Su, H. F. Wang, H. Su, X. P. Shen, P. Zhan, M. H. Lu, Z. L. Wang, and Y. F. Chen,
675
+ Phys. Rev. Lett. 122, 233903 (2019).
676
+ [41] M. Proctor, P. A. Huidobro, B. Bradlyn, M. B. de Paz, M. G. Vergniory, D. Bercioux, and A. Garc´ıa-
677
+ 14
678
+
679
+ Etxarri, Phys. Rev. Research 2, 042038 (2020).
680
+ [42] S. Wu, B. Jiang, Y. Liu, and J.-H. Jiang, Photon. Res. 9, 668 (2021).
681
+ [43] Z. W. Zhang, H. Y. Long, C. Liu, C. Shao, Y. Cheng, X. J. Liu, and J. Christensen,
682
+ Advanced Materials 31, 1904682 (2019).
683
+ 15
684
+
685
+ This figure "fig_1.png" is available in "png"� format from:
686
+ http://arxiv.org/ps/2301.12160v1
687
+
688
+ This figure "fig_2.png" is available in "png"� format from:
689
+ http://arxiv.org/ps/2301.12160v1
690
+
691
+ This figure "fig_3.png" is available in "png"� format from:
692
+ http://arxiv.org/ps/2301.12160v1
693
+
694
+ This figure "fig_4.png" is available in "png"� format from:
695
+ http://arxiv.org/ps/2301.12160v1
696
+
697
+ This figure "fig_5.png" is available in "png"� format from:
698
+ http://arxiv.org/ps/2301.12160v1
699
+
700
+ This figure "fig_6.png" is available in "png"� format from:
701
+ http://arxiv.org/ps/2301.12160v1
702
+
703
+ This figure "fig_7.png" is available in "png"� format from:
704
+ http://arxiv.org/ps/2301.12160v1
705
+
706
+ This figure "fig_8.png" is available in "png"� format from:
707
+ http://arxiv.org/ps/2301.12160v1
708
+
-9FLT4oBgHgl3EQfvi-U/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
-NAzT4oBgHgl3EQfSvt8/content/2301.01237v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:0c8cf0a8bfda9f4ff0476d4691e51d43897843e51d480f024d5a5f34270d5d60
3
+ size 7071049
.gitattributes CHANGED
@@ -260,3 +260,12 @@ hNE4T4oBgHgl3EQfrQ2w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
260
  QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf filter=lfs diff=lfs merge=lfs -text
261
  ptAzT4oBgHgl3EQf5v4s/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
262
  1tAzT4oBgHgl3EQf8_4M/content/2301.01911v1.pdf filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
260
  QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf filter=lfs diff=lfs merge=lfs -text
261
  ptAzT4oBgHgl3EQf5v4s/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
262
  1tAzT4oBgHgl3EQf8_4M/content/2301.01911v1.pdf filter=lfs diff=lfs merge=lfs -text
263
+ -NAzT4oBgHgl3EQfSvt8/content/2301.01237v1.pdf filter=lfs diff=lfs merge=lfs -text
264
+ pNE0T4oBgHgl3EQf9AKq/content/2301.02796v1.pdf filter=lfs diff=lfs merge=lfs -text
265
+ BtFAT4oBgHgl3EQfsR7g/content/2301.08658v1.pdf filter=lfs diff=lfs merge=lfs -text
266
+ 7dE4T4oBgHgl3EQfcww5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
267
+ 7dE4T4oBgHgl3EQfcww5/content/2301.05085v1.pdf filter=lfs diff=lfs merge=lfs -text
268
+ MtE0T4oBgHgl3EQfjQEE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
269
+ qdFRT4oBgHgl3EQfejci/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
270
+ MtE0T4oBgHgl3EQfjQEE/content/2301.02455v1.pdf filter=lfs diff=lfs merge=lfs -text
271
+ 6tAyT4oBgHgl3EQfpvgE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
0NE1T4oBgHgl3EQf4wUX/content/tmp_files/2301.03503v1.pdf.txt ADDED
@@ -0,0 +1,1261 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03503v1 [hep-th] 9 Jan 2023
2
+ IPARCOS-23-001
3
+ Embedding Unimodular Gravity in String Theory
4
+ Luis J. Garay∗
5
+ Departamento de F´ısica Te´orica and IPARCOS,
6
+ Universidad Complutense de Madrid, 28040 Madrid, Spain
7
+ Gerardo Garc´ıa-Moreno†
8
+ Instituto de Astrof´ısica de Andaluc´ıa (IAA-CSIC),
9
+ Glorieta de la Astronom´ıa, 18008 Granada, Spain
10
+ Abstract
11
+ Unimodular Gravity is a theory displaying Weyl rescalings of the metric and transverse (volume-
12
+ preserving) diffeomorphisms as gauge symmetries, as opposed to the full set of diffeomorphisms
13
+ displayed by General Relativity. Recently, we presented a systematic comparison of both theories,
14
+ concluding that both of them are equivalent in everything but the behaviour of the cosmological
15
+ constant under radiative corrections. A careful study of how Unimodular Gravity can be embedded
16
+ in the string theory framework has not been provided yet and was not analyzed there in detail.
17
+ In this article, we provide such an explicit analysis, filling the gap in the literature. We restrict
18
+ ourselves to the unoriented bosonic string theory in critical dimension for the sake of simplicity,
19
+ although we argue that no differences are expected for other string theories. Our conclusions are
20
+ that both a Diff and a WTDiff invariance principle are equally valid for describing the massless
21
+ excitations of the string spectrum.
22
23
24
+ 1
25
+
26
+ CONTENTS
27
+ I. Introduction
28
+ 2
29
+ II. Unimodular Gravity and General Relativity: Matching global degrees of freedom
30
+ 5
31
+ III. String perturbation theory in trivial backgrounds
32
+ 10
33
+ IV. Strings in general backgrounds
34
+ 16
35
+ A. Determination of the Weyl anomaly
36
+ 17
37
+ B. Including string-loop corrections
38
+ 21
39
+ C. EFTs for the theory
40
+ 23
41
+ V. Conclusions
42
+ 25
43
+ Acknowledgments
44
+ 26
45
+ References
46
+ 27
47
+ I.
48
+ INTRODUCTION
49
+ Unimodular gravity (UG) is a theory which is so similar to General Relativity (GR) that
50
+ one may wonder to what extent both of them are equivalent. Recently we presented a sys-
51
+ tematic comparison of both theories in all the regimes and situations in which a potential
52
+ difference might appear, which was still lacking [1]. We concluded that for all of the possible
53
+ regimes analyzed there, both theories are equivalent except for the behaviour of the cosmo-
54
+ logical constant. Whereas the cosmological constant is radiatively stable in UG [2] (it is
55
+ simply an integration constant of the equations of motion), in GR it is radiatively unstable.
56
+ In this way, if one uses technical naturalness in the sense introduced by ’t Hooft [1, 3, 4] as
57
+ a guiding principle toward building theories, UG theories are much more desirable than GR
58
+ theories since the cosmological constant is technically natural.
59
+ There are mainly three arguments used to argue that the low-energy limit of string theory
60
+ is given by the effective field theory (EFT) consisting of GR coupled to some other fields.
61
+ First of all, when one analyzes the massless spectrum (leaving aside the tachyon field) of
62
+ bosonic string theory propagating on top of flat spacetime one finds that for oriented strings
63
+ 2
64
+
65
+ it contains a graviton, a Kalb-Ramond field, and a dilaton; and for unoriented strings
66
+ it contains only a graviton and a dilaton.
67
+ In principle, for computing observables only
68
+ involving massless states, one expects that one can write down an effective action which
69
+ simply involves fields that account for these massless excitations, i.e., a graviton-field hµν,
70
+ (possibly) a Kalb-Ramond field Bµν, and a dilaton field Φ.
71
+ As usual, the fundamental
72
+ observable considered is the S-matrix.
73
+ Now, we come to the arguments used to argue that GR “emerges naturally” as the low-
74
+ energy description of such degrees of freedom. First of all, it has been argued that the only
75
+ self-consistent way of coupling the graviton (massless spin-2 representation of the Poincar´e
76
+ group) to itself is through GR. In that way, having a massless spin-2 field in the spectrum,
77
+ one necessarily guesses that the non-linear structure of the theory needs to be GR up to
78
+ potential higher-derivative corrections arising in the EFT. However, we argued [1, 5] that
79
+ the self-coupling of UG gravitons (those displaying linerarized WTDiff gauge-invariance) to
80
+ themselves also gives rise to the full non-linear UG in a consistent way, although the coupling
81
+ of the graviton to itself is through the traceless part of the energy-momentum tensor, instead
82
+ of the full one. Hence, this first argument does not allow one to discern whether UG or GR
83
+ is preferred from the string point of view since one is as legitimate as the other.
84
+ The second argument comes from the analysis of string scattering amplitudes, which was
85
+ already revisited in [1]. One can compute within string perturbation theory the scattering
86
+ amplitudes for graviton asymptotic states. The result is that, to the lowest order in α′ and
87
+ at string tree level, one obtains the same scattering amplitudes obtained in GR. The point is
88
+ that UG scattering amplitudes are exactly the same as the GR scattering amplitudes [6, 7].
89
+ In that sense, GR is not preferred over UG from the point of view of scattering amplitudes
90
+ either, as it was concluded in [1].
91
+ The final argument comes from analyzing perturbatively in α′ the non-linear sigma model
92
+ that arises from coupling the string degrees of freedom to an arbitrary background metric (or
93
+ conformal structure), Kalb-Ramond field, and dilaton field generated by the string degrees
94
+ of freedom themselves. For such a model, the Weyl symmetry of the worldsheet, which is
95
+ potentially anomalous, needs to be handled carefully. However, although in flat spacetime
96
+ and zero background fields it simply constrains the dimension of spacetime to be 26 (critical
97
+ dimension), in this case constraints also appear for the spacetime fields entering the sigma
98
+ model construction. Such constraints arise from imposing a cancellation of the Weyl anomaly
99
+ 3
100
+
101
+ to make it a sensible theory.
102
+ The equations that arise are basically Einstein equations,
103
+ although interpreted as β-functionals. Both GR and UG give rise to Einstein equations,
104
+ hence from this point of view we show that it is possible to write both a GR and UG-like
105
+ EFT for the massless degrees of freedom of the string. Moreover, both actions are also
106
+ consistent with the previous argument since they reproduce all the scattering amplitudes
107
+ involving massless states of the string. The only difference that seems to appear, is that,
108
+ whereas in the GR EFT the cosmological constant is a coupling constant that needs to be
109
+ set to zero, in the UG EFT it is an integration constant that needs to be set to zero. In
110
+ other words, UG contains the space of theories which is GR with all possible values of the
111
+ cosmological constant within a single theory.
112
+ The α′-expansion on its own points toward a zero cosmological constant. However, once
113
+ we include string loop corrections, the situation changes.
114
+ We will revisit the Fischler-
115
+ Susskind approach [8–10]towards including the lowest order string loop correction in the
116
+ picture. In this way, an arbitrary cosmological constant is generated through the string-
117
+ loop corrections in the EFT. In this way, the EFT that we need to write down within the
118
+ GR EFT to include the string-loop corrections contains an arbitrary cosmological constant,
119
+ which is exactly what happens with the UG EFT, although in the former case it is a coupling
120
+ constant whereas in the latter it is an integration constant. In this way, we conclude that
121
+ both the UG and the GR EFTs can account for the low-energy description of massless string
122
+ states with the only difference arising in the nature of the cosmological constant.
123
+ It is worth remarking that this analysis gives further evidence for UG as a sensible classical
124
+ theory of gravitation according to the criteria invoked by Weinberg in [11]. According to
125
+ Weinberg, one of the key aspects that needs to be addressed to regard UG as a reasonable
126
+ classic theory of gravitation is to understand whether it can be obtained as a low energy
127
+ limit of a quantum theory of gravitation. By embedding UG within the framework of string
128
+ theory, here we answer here in the affirmative.
129
+ The remain of this article is structured as follows. In Section II we introduce the frame-
130
+ work of UG, making special emphasis on the existence of a priviliged background volume
131
+ form and the existence of an additional global degree of freedom with respect to GR. Then,
132
+ we introduce a modification of GR in which a new global degree of freedom, precisely the
133
+ cosmological constant is assigned to a (D+1)-form field, to make clear the difference between
134
+ UG and the standard formulation of GR. In Sec. III we review the basics of the quantiza-
135
+ 4
136
+
137
+ tion of strings in flat spacetimes and explain why UG and GR are both valid as the low
138
+ energy description of string theory from the point of view of scattering amplitudes involving
139
+ massless particles. In Sec. IV we move on to analyze strings in general backgrounds. In
140
+ Subsec. IV A we rederive the consistency conditions (Weyl anomaly cancellation) from the
141
+ perturbative α′ expansion of the sigma model. Some of the details of the computation that
142
+ are well explained in the literature and not relevant for our purposes are skipped and we
143
+ refer the reader to the literature at those points. In Subsec. IV B we introduce the Susskind-
144
+ Fischler approach for cancelling some of the divergences arising from string loops, with the
145
+ divergences of the sigma model on the trivial genus worldsheet. The main novelty that this
146
+ mechanism introduces is a cosmological-constant-like term in the β functions. We close this
147
+ section by analyzing in Subsec. IV C how these consistency conditions can be derived from
148
+ an effective action once they are interpreted as equations of motion for the background fields.
149
+ We emphasize the consistency of this approach when computing scattering amplitudes in-
150
+ volving the massless excitations. we close this section. In Sec. V we summarize the results
151
+ and draw the conclusions that can be taken from our analysis. We also point interesting
152
+ future lines of work that seem promising in virtue of our analysis presented here.
153
+ Notation and conventions: Our convention for the signature of the metric is (−, +, ..., +)
154
+ for the (D+1)-dimensional target space metric and (−, +) for the worldsheet metric. Tensor
155
+ objects will be represented by bold symbols, whereas their components in a given basis will
156
+ be written with the same (not bold) symbol and indices, e.g., the Minkowski metric η
157
+ will be represented in components as ηµν. We will use Greek letters for spacetime indices
158
+ (µ, ν, ...) whereas we will reserve lower case latin indices (a, b, ...) for the worldsheet indices.
159
+ Curvature quantities like the Riemann tensor are defined following Misner-Thorne-Wheeler’s
160
+ conventions [12] and we will specify explicitly the metric it depends on, e.g. Rα
161
+ βγδ(g). We
162
+ also represent the (D + 1)-dimensional Newton’s constant as κ2 = 16πG.
163
+ II.
164
+ UNIMODULAR GRAVITY AND GENERAL RELATIVITY: MATCHING
165
+ GLOBAL DEGREES OF FREEDOM
166
+ It is well accepted that metric theories of gravity, those in which the fundamental object
167
+ describing the gravitational field at a given point is a metric, are suitable for describing
168
+ gravitational experiments to great accuracy [13]. The metric at a given point of the spacetime
169
+ 5
170
+
171
+ is completely specified by the lightcone at that point up to a conformal factor. Although
172
+ the conformal structure of the spacetime is allowed to fluctuate both in UG and GR, the
173
+ difference arises in the conformal factor. Whereas in UG the conformal factor is fixed to be
174
+ a fiducial (non-dynamical) volume form that we represent as ω =
175
+ 1
176
+ (D+1)!ω(x)dx0 ∧ ... ∧ dxD
177
+ and hence it does not have any dynamics, in GR it is also dynamical like the lightcone itself.
178
+ Naively, one could conclude that this reduction in the number of independent components
179
+ of the metric may lead to a reduction of the independent degrees of freedom of the theory.
180
+ However, it reduces the gauge symmetries of the theory to only transverse diffeomorphisms
181
+ (those preserving the background volume form) and hence it is not surprising that the theory
182
+ displays the same number of local degrees of freedom as GR does. Actually, it displays
183
+ an additional global degree of freedom associated with the cosmological constant. In this
184
+ section we will introduce the basic formulation of UG, emphasizing the presence of this new
185
+ additional global degree of freedom. Furthermore, we will present a formulation of GR closer
186
+ in spirit to UG, since the cosmological constant appears as a combination of an arbitrary
187
+ integration constant and the renormalized cosmological constant entering the action and we
188
+ still have the invariance under the full set of diffeomorphisms.
189
+ Let us begin with the standard formulation of UG. UG is a theory in which the group of
190
+ gauge transformations is WTDiff (Weyl rescalings of the metric and Transverse Diffeomor-
191
+ phisms) instead of the whole group of Diffs (Diffeomorphisms), see [1] for further details. In
192
+ order to define such a theory, we need to use the non-dynamical volume form that we have
193
+ already introduced ω. It is useful to introduce the Weyl-invariant auxiliary metric
194
+ ˜gµν = gµν
195
+ �ω2
196
+ |g|
197
+
198
+ 1
199
+ D+1
200
+ .
201
+ (1)
202
+ In this way, every curvature scalar built from the auxiliary metric ˜gµν inherits the invariance
203
+ under Weyl rescalings and is also invariant under transverse-diffeomorphism transformations
204
+ by construction. The simplest action principle that one can think for an UG-like theory is
205
+ the UG version of the Einstein-Hilbert action:
206
+ SUG =
207
+ 1
208
+ 2κ2
209
+
210
+ dD+1xωR (g) .
211
+ (2)
212
+ We can also add a coupling to some matter fields which need to couple to the auxiliary metric,
213
+ i.e., the matter action will be of the form Sm (˜g, Φ), so that it remains Weyl-invariant (note
214
+ that the matter fields are not affected by Weyl transformations). The equations of motion
215
+ 6
216
+
217
+ of this theory are the traceless Einstein equations:
218
+ Rµν(˜g) −
219
+ 1
220
+ D + 1R(˜g)˜gµν = κ2
221
+
222
+ Tµν(˜g) −
223
+ 1
224
+ D + 1T(˜g)˜gµν
225
+
226
+ .
227
+ (3)
228
+ Upon using the Bianchi identities, they become Einstein equations with the cosmological
229
+ constant entering as an integration constant [1]
230
+ Rµν(˜g) − 1
231
+ 2R(˜g)˜gµν + Λ˜gµν = κ2Tµν(˜g),
232
+ (4)
233
+ provided that ˜∇µT µν (˜g) = 0.
234
+ It is clear that the Weyl invariance is trivial in the sense that its gauge fixing is trivial,
235
+ we simply need to fix the volume form given by the determinant of the metric
236
+
237
+ |g| to be
238
+ the background volume form. Actually, this can be done also at the level of the action. The
239
+ result is still a local action for the metric which does not contain any mention to the Weyl
240
+ symmetry. In that sense, the resulting action is the most minimalistic action that one can
241
+ conceive for a metric field. If one tried to make a gauge fixing of the remaining degrees of
242
+ freedom, one would end up with a non-local action for the actual physical degrees of freedom
243
+ encoded in the field gµν.
244
+ In this way, it seems clear that both theories display the same number of local degrees
245
+ of freedom of GR, except for the cosmological constant that we will analyze now. To put
246
+ it in other words, leaving aside the cosmological constant, from the point of view of initial
247
+ conditions, the same amount of initial data are needed to specify a solution to the equations.
248
+ The cosmological constant in this case appears with a difference, it is an additional global
249
+ degree of freedom. The simplest way to see this is from the point of view of such constant
250
+ being an integration constant. This means that it is a constant that parametrizes the space
251
+ of solutions, which is separate from the initial data required in GR. In that sense, it is a
252
+ constant to be fixed by initial conditions which makes the space of solutions of UG bigger
253
+ than the GR space of solutions, precisely by this cosmological constant as an integration
254
+ constant. This analysis can be made much more precise by making a Hamiltonian analysis
255
+ of the theory, as it has been done in [14], reaching the same conclusions.
256
+ We have concluded that UG is equivalent to GR, up to a global degree of freedom which
257
+ is precisely playing the role of the cosmological constant. To make it more explicit, we will
258
+ introduce now an additional field in GR that accounts for this global degree of freedom, to
259
+ sharpen the difference. We need to introduce a (D +1)-form field which is the differential of
260
+ 7
261
+
262
+ a D-form [15, 16]. Explicitly, we want to introduce a D + 1 form F which is the differential
263
+ of a D-form A. In components, this reads:
264
+ Fµ0...µD = ∇[µ0Aµµ1...µD ].
265
+ (5)
266
+ We can write down the action principle which is the Einstein-Hilbert action with an arbitrary
267
+ cosmological constant and a Maxwell-like term for F , namely:
268
+ S =
269
+ 1
270
+ 2κ2
271
+
272
+ dD+1x√−g
273
+
274
+ −2Λ + R(g) −
275
+ K
276
+ (D + 1)!Fµ0...µDF µ0...µD
277
+
278
+ ,
279
+ (6)
280
+ where K is simply a coupling constant which can be both positive or negative. The equations
281
+ of motion for the F -field are
282
+ ∇µ0F µ0...µD = 0.
283
+ (7)
284
+ In a (D + 1)-dimensional manifold, a completely antisymmetric volume form like F needs
285
+ to be proportional to the ǫ pseudotensor. Hence, the equations of motion simply fixed the
286
+ proportionality function to be a constant, i.e.
287
+ Fµ0...µD = c√−gǫµ0...µD.
288
+ (8)
289
+ From the point of view of the initial value problem, this constant c is precisely a global degree
290
+ of freedom that needs to be fixed in terms of initial conditions. From that point of view, it
291
+ is akin to the cosmological constant in UG, since it is completely fixed in terms of the initial
292
+ conditions. We can sharpen the analogy by examining how does this constant c enter the
293
+ equations of motion for the metric. The energy-momentum tensor once we evaluate the F
294
+ form on shell, behaves exactly as a cosmological constant [15, 16]. Assuming the existence of
295
+ additional matter fields, the equations of motion for the gravitational field take the following
296
+ form:
297
+ Rµν(g) − 1
298
+ 2R(g)gµν + Λeffgµν = κ2Tµν(g),
299
+ (9)
300
+ where the constant Λeff is expressed in terms of the action as
301
+ Λeff = Λ + NDKc2,
302
+ (10)
303
+ with ND an irrelevant numerical factor depending on the spacetime dimension. In this way,
304
+ the cosmological constant entering the equations of motion for the metric are a combination
305
+ of an initial condition c and the cosmological constant Λ entering the action.
306
+ 8
307
+
308
+ From a purely classical point of view, we have presented a theory akin to GR, exhibiting
309
+ the whole set of diffeomorphisms as gauge symmetries and containing an additional global
310
+ degree of freedom encoded in a (D + 1)-form. The equations of motion for this volume form
311
+ enforce that it is proportional to the Levi-Civita pseudotensor, with the proportionality
312
+ constant been called here c. The constant of proportionality enters the equations of motion
313
+ for the metric as an effective cosmological constant. In this way, it plays a similar role to
314
+ the one played by the global degree of freedom of UG. Independently of the value that we
315
+ assign to the cosmological constant entering the action Λ, the resulting effective cosmological
316
+ constant entering Einstein equations Λeff is given by a combination of Λ and c. In terms of
317
+ the initial conditions, it is possible to adjust c in order to make Λeff take any desired value.
318
+ This formulation of GR with the additional (D + 1) form field is equivalent to UG, in the
319
+ sense that it displays the same amount of degrees of freedom, both local and global, and the
320
+ global degree of freedom plays the role of a cosmological constant.
321
+ At the quantum level, both formulations seem to be different from the point of view of
322
+ radiative corrections. The reason behind this mismatch is that, whereas in UG the cos-
323
+ mological constant does not receive any radiative corrections and this makes it technically
324
+ natural [1, 2]1, in this formulation of GR, the cosmological constant in the action Λ does re-
325
+ ceive radiative corrections, and hence it is not technically natural. However, the cosmological
326
+ constant relevant for the dynamics is the effective one Λeff that combines the renormalized
327
+ Λ with the initial value constant c. It is possible to obtain any value for the cosmological
328
+ constant Λeff independently of the potentially huge radiative corrections that Λ may receive.
329
+ The equivalence once quantum corrections are included into the picture is unclear. Whether
330
+ this formulation is then completely equivalent to UG at the semiclassical level is something
331
+ that deserves a separate and detailed study on its own.
332
+ Our point here was mainly to introduce a formulation within the GR setup that is close
333
+ to the UG version, so that both theories can be compared easily. We have made explicit
334
+ the difference existing in the global degrees of freedom of UG and GR (UG contains the
335
+ whole space of GR with arbitrary values of the cosmological constant coupling). This only
336
+ difference in the two theories, will be also the only difference appearing from the point of
337
+ 1 We note that technical naturalness is a definition that only applies to coupling constants appearing in
338
+ the action. In that sense it is not completely legitimate to say that in UG the cosmological constant is
339
+ technically natural since it is not a coupling constant. However, making an abuse of language we find it
340
+ convenient to say that it is technically natural.
341
+ 9
342
+
343
+ view of regarding UG as the low energy EFT for massless string states.
344
+ III.
345
+ STRING PERTURBATION THEORY IN TRIVIAL BACKGROUNDS
346
+ This section contains a review of the quantization of strings in a flat background as well
347
+ as the computation of string scattering amplitudes for gravitons from string theory. This is
348
+ well-known material that can be found in any textbook [17, 18]. Also we think that a reader
349
+ unfamiliarized with string theory might find here a quick introduction to the arguments
350
+ presented in the literature leading to the conclusion that GR is the EFT describing the
351
+ excitation in massless degrees of freedom. We find convenient to make such introduction
352
+ here to expand the discussion presented in [1] about how the scattering amplitudes can be
353
+ equivalently obtained from a GR and a UG-like EFT.
354
+ The starting point of our discussion of perturbative string theory is the action describing
355
+ relativistic strings propagating in flat spacetime. For relativistic free particles it is natural to
356
+ consider the action to be the proper time of the particle trajectory i.e., the embedding of the
357
+ worldline in the target space. In the same way, for strings it is natural to consider the area
358
+ swept out by the worldsheet to replace the proper time of the particle trajectory. For that
359
+ purpose, let us introduce a coordinate system in the worldsheet, a pair σa (a = 0, 1) which
360
+ correspond to the time coordinate σ0 ∈ (−∞, ∞) and a spatial coordinate σ1. Furthermore,
361
+ we will restrict our attention to closed strings (those giving rise to graviton excitations) in
362
+ which the points at σ1 and σ1 + 2π are identified. If we endow the (D + 1) dimensional flat
363
+ spacetime with coordinates Xµ, we look for an action such that the area density swept by
364
+ the string is expressed in terms of derivatives of the embedding Xµ(τ, σ). We notice that
365
+ the induced metric on the worldsheet is given by
366
+ hab = ηµν∂aXµ∂bXν.
367
+ (11)
368
+ If we take the action to be the area swept out by the string, we write down the Nambu-Goto
369
+ action as
370
+ SNG[X] = −
371
+ 1
372
+ 2πα′
373
+
374
+ d2σ
375
+
376
+ −h.
377
+ (12)
378
+ The constant α′ represents the string tension, i.e., the energy density per unit length. Al-
379
+ though this action is perfectly reasonable classically, from the point of view of quantization
380
+ 10
381
+
382
+ is problematic. This is because it is not quadratic in its variables: we have a square root
383
+ appearing explicitly in the action.
384
+ To circumvent this problem, one can work with the
385
+ Polyakov action, which is given by
386
+ SP[X, γ] = −
387
+ 1
388
+ 4πα′
389
+
390
+ d2σ√−γγab∂aXµ∂bXνηµν.
391
+ (13)
392
+ In this action, there is an additional configuration variable γab which is a metric in the
393
+ worldsheet. Now, this action is clearly quadratic in the Xµ variables over which we will
394
+ path-integrate to quantize the theory. To see the equivalence among these two actions, we
395
+ can compute the equations of motion for the γab variable. Actually, following the standard
396
+ conventions, we can define a two-dimensional energy-momentum tensor as the variation of
397
+ the Polyakov action with respect to the worldsheet metric, i.e. γab:
398
+ Tab = −
399
+ 1
400
+ √−γ
401
+ δSP
402
+ δγab =
403
+ 1
404
+ 4πα′
405
+
406
+ ∂aXµ∂bXν − 1
407
+ 2γabγad∂cXµ∂dXν
408
+
409
+ ηµν.
410
+ (14)
411
+ The Polyakov action does not contain any derivatives of the metric γab, and hence the
412
+ equations of motion for the metric can be regarded as a constraint Tab = 0 (as a consequence,
413
+ strictly speaking it is not a dynamical variable). Actually, this constraint can be used to
414
+ solve γab in terms of the Xµ variables. When we plug the result back into the Polyakov
415
+ action, we find the Nambu-Goto action we began with.
416
+ It is worth pausing at this point and discussing the continuous symmetries of the theory:
417
+ • Poincar´e invariance. This is a global symmetry on the worldsheet
418
+ Xµ → Λµ
419
+ νXν + c��.
420
+ (15)
421
+ • Reparametrization invariance or diffeomorphism invariance in the worldsheet σa →
422
+ ˜σa(σ). Whereas the Xµ fields transform as worldsheet scalars, γab transforms as a
423
+ two-index covariant tensor:
424
+ Xµ(σ) → Xµ(˜σ) = Xµ(σ),
425
+ (16)
426
+ γab(σ) → ˜γab(˜σ) = ∂σc
427
+ ∂˜σa
428
+ ∂σd
429
+ ∂˜σb γcd(σ).
430
+ (17)
431
+ • Weyl invariance of the worldsheet metric γab. This transformation leaves invariant the
432
+ Xµ coordinates and the metric gets a local rescaling
433
+ Xµ(σ) → Xµ(σ),
434
+ (18)
435
+ γab(σ) → e2φ(σ)γab(σ).
436
+ (19)
437
+ 11
438
+
439
+ We can distinguish now between oriented and unoriented strings. The former have a well
440
+ defined transformation law under the parity transformation σ1 → 2π − σ1. We will focus on
441
+ the unoriented strings for the sake of simplicity.
442
+ Not all the symmetries that we have introduced are directly preserved through the process
443
+ of quantization. Actually, the Weyl symmetry is anomalous, as it is well known. However,
444
+ in this case the Weyl symmetry is a gauge symmetry that we must insist on preserving
445
+ at the quantum level to remove unphysical states. We will further discuss this point later
446
+ when we deal with strings in general backgrounds. For the time being, let us focus on the
447
+ quantization of the theory through a path-integral procedure.
448
+ Let us illustrate the quantization of the theory through a path-integral procedure as
449
+ well as the spectrum that the theory displays.
450
+ Let us define the generating functional
451
+ following the usual Faddeev-Popov procedure. First of all, we would write down the action
452
+ in Euclidean space, in order to make the quantization procedure sensible. We write down
453
+ the generating functional as
454
+ Z =
455
+ 1
456
+ V (gauge)
457
+
458
+ DγDXe−SP [X,γ],
459
+ (20)
460
+ where V (gauge) represents the volume of the gauge group. We recall that we have the Weyl
461
+ rescalings of the metric and diffeomorphisms as gauge symmetries of our theory. Hence,
462
+ we need to avoid counting more than once physical configurations and that is the reason
463
+ for taking the quotient by the volume of the gauge group. As usual, we will introduce a
464
+ Faddeev-Popov determinant ∆F P[γ] to take this volume into account.
465
+ The integral over the gauge orbits cancels with the volume of the gauge group and we
466
+ reach the expression for the generating functional which is
467
+ Z[γ] =
468
+
469
+ DX∆F P[γ]e−SP [X,γ].
470
+ (21)
471
+ Choosing a convenient normalization for the action, we can rewrite the Faddeev-Popov
472
+ determinant as
473
+ ∆F P[γ] =
474
+
475
+ DbDce−Sg[b,c],
476
+ (22)
477
+ where b and c are ghosts Grassman-values that anticommute and
478
+ Sg = 1
479
+
480
+
481
+ d2σ√γbab∇acb.
482
+ (23)
483
+ 12
484
+
485
+ At this point, we have reduced the evaluation of the path integral for the bosonic string
486
+ theory to the evaluation of the path integral:
487
+ Z =
488
+
489
+ DbDcDXe−SP [γ,X]−Sg[γ,b,c],
490
+ (24)
491
+ which is the CFT of D + 1 scalar fields (the Xµ) and the bc-ghost system [17, 19]. If the
492
+ theory is going to preserve the Weyl invariance, we need the theory to have a total zero
493
+ central charge. This is precisely the consistency condition that we mentioned would appear.
494
+ Weyl invariance means that the trace of the two-dimensional energy momentum tensor needs
495
+ to vanish. In two-dimensions, the trace of the energy-momentum tensor is determined by
496
+ the central charge and the trace anomaly
497
+ ⟨T a
498
+ a⟩ = − c
499
+ 12R [γ] .
500
+ (25)
501
+ The system of the Xµ-scalars and the bc-ghost system is linear, and hence the total central
502
+ charge is the sum of the central charges of the two systems independently:
503
+ c = cg + cX.
504
+ (26)
505
+ The bc-ghost system [17] has a central charge cg = −26 while each scalar field gives a
506
+ contribution of 1 to the central charge cX = D + 1. Ensuring Weyl-invariance means that
507
+ we need the spacetime dimension to be 26. This is the well-known way in which the critical
508
+ dimension of bosonic string theory emerges.
509
+ Now that we have ensured how to preserve the gauge invariance at the quantum level in
510
+ order to make the theory consistent, it is time to talk about the spectrum of the strings.
511
+ Our point is simply to illustrate that the spectrum of the closed unoriented bosonic string
512
+ contains a tachyon, a dilaton, and a graviton. Hence, for this purpose, we can skip the
513
+ detailed BRST analysis and focus only on the states generated by the X-fields which are
514
+ the “physical fields”.
515
+ In order to characterize the spectrum, the simplest way to do it is to use the so called
516
+ state-operator map for CFTs [20, 21], in which states are replaced by operator insertions
517
+ that generate them by acting in a neighbourhood of the vacuum. For this purpose, it is
518
+ first easier to use complex coordinates σ → (z, ¯z) on the worldsheet. Furthermore, we now
519
+ need the operators to be gauge invariant. The diffeomorphism invariance can be ensured
520
+ by integrating local operators O(z, ¯z) over the worldsheet, i.e. constructing operators of the
521
+ 13
522
+
523
+ form
524
+ V =
525
+
526
+ d2zO(z, ¯z),
527
+ (27)
528
+ with V standing for vertex operators. Weyl invariance is ensured by choosing the operators
529
+ O to transform adequately under Weyl rescalings, i.e., having a suitable weight. The measure
530
+ of integration, d2z has a conformal weight (−1, −1) under such rescalings. Hence, O needs
531
+ to be a primary operator of the CFT with weight (+1, +1) to compensate it.
532
+ The kind of operators that give rise to the lowest energy states of the string are eip·X
533
+ and Pµν∂Xµ∂Xνeip·X, with p a given momentum that we endow the string with and Pµν
534
+ the polarization tensor [17, 18].
535
+ The operator eip·X gives rise to the tachyon, since we
536
+ need to impose that −p2 = −4/α′ < 0 for the operator to be Weyl invariant. The operator
537
+ Pµν∂Xµ∂Xνeip·X corresponds to the dilaton (pure trace part of Pµν) and the symmetric part
538
+ of Pµν gives rise to the graviton, since p2 = 0 (massless condition) and pµPµν = 0 (transverse
539
+ condition) needs to be imposed to ensure the Weyl invariance. The antisymmetric part does
540
+ not appear for unoriented strings since it corresponds to the Kalb-Ramond excitation [17].
541
+ Up to this point, we have analyzed the spectrum of the closed unoriented bosonic string
542
+ theory and found that the massless states correspond to the dilaton and the graviton. The
543
+ Polyakov action per se does not give rise to interactions. We will now make a small digression
544
+ on how interactions among the massless states arise in string theory. There is a term that we
545
+ can add to the Polyakov action which is an Einstein-Hilbert term that is purely topological
546
+ in two-dimensions
547
+ Sint = λ
548
+
549
+
550
+ d2σ√γR(γ) = 2λ(1 − g),
551
+ (28)
552
+ being g the genus of the worldsheet and λ a coupling constant which we assume to be small
553
+ in order to do perturbation theory. Hence, if we add this term to the string action, we will
554
+ get
555
+ Z =
556
+
557
+ topologies
558
+
559
+ DXDγe−SP −Sint =
560
+
561
+
562
+ g=0
563
+ e−2λ(1−g)
564
+
565
+ DXDγe−SP .
566
+ (29)
567
+ If we call eλ = gs, as it is common, this gives a good expansion as long as gs ≪ 1. The whole
568
+ series is known to be a divergent series as the standard perturbative series in QFT [22]. In
569
+ addition to this problem, there is a harder problem which is the finiteness of each of the
570
+ terms in the series, i.e., the path integral over the different geometries. For a fixed topology,
571
+ 14
572
+
573
+ the path integral with the Polyakov action requires to compute a sum over the moduli
574
+ of conformally inequivalent surfaces.
575
+ In general, for higher loop orders (i.e.
576
+ non-trivial
577
+ topologies) this requires to perform an integral over a moduli space that is not obviously
578
+ convergent, although some results in the literature point toward its finiteness [23].
579
+ Now it comes to the point of computing some observables. The observable to compute
580
+ in string theory is the string S-matrix. This means, we plug some “in” state of the free
581
+ string spectrum and compute the probability amplitude of generating another “out” state of
582
+ free string spectrum. These states are generated by introducing their corresponding vertex
583
+ operators.
584
+ For our purposes of analyzing how GR or UG might emerge from string theory, we are
585
+ interested in computing the scattering amplitude involving m gravitons with momenta pi and
586
+ polarization tensors ei which we represent as A(m)(p1, e1; p2, e2; ...pm, em). This is computed
587
+ as a suitable path integral for the Polyakov action SP that schematically reads [17, 18]
588
+ A(m)(1h1, 2h2, ..., mhm) = 1
589
+ g2s
590
+ 1
591
+ Vgauge
592
+
593
+ DXDg e−SP[X,g]
594
+ m
595
+
596
+ i=1
597
+ Vi(pi, hi),
598
+ (30)
599
+ where Vi represents the vertex operator associated with a graviton insertion with a given
600
+ spin and momentum. To begin with, we particularize the amplitude for three gravitons and
601
+ we find
602
+ A(p1, e1; p2, e2; p3, e3) = igs(α′)6
603
+ 2
604
+ (2π)26δ26 (p1 + p2 + p3) e1µνe2αβe3γδT µαγT νβδ,
605
+ (31)
606
+ where
607
+ T µαγ = pµ
608
+ 23ηαγ + pα
609
+ 31ηγµ + pγ
610
+ 12ηµα + α′
611
+ 8 pµ
612
+ 23pα
613
+ 31pγ
614
+ 12,
615
+ (32)
616
+
617
+ ij = pµ
618
+ i − pµ
619
+ j . The terms of order O(α′) in T µαγ contribute as O(p4) to the amplitude.
620
+ If we focus just on the lowest order terms O(p2), this amplitude is equivalent to the ones
621
+ computed at tree level from the Einstein-Hilbert action upon the identification κ = gs(α′)6.
622
+ The same agreement is found with amplitudes involving an arbitrary number of gravitons:
623
+ if we neglect the higher-order contribution from the string amplitude, they agree with those
624
+ computed from the Einstein-Hilbert action [17, 18], with the same identification of κ and
625
+ the string constants.
626
+ As it has been already discussed in the literature [6, 7], the tree-level scattering amplitudes
627
+ of gravitons computed in GR and UG are identical.
628
+ Hence, from the point of view of
629
+ 15
630
+
631
+ scattering amplitudes, string theory does not point toward GR in a univocal way: both UG
632
+ and GR are equivalent from a low-energy effective field theory point of view. This result
633
+ was already advanced in [1] and we have reproduced here the analysis in more detail for the
634
+ sake of completeness. We will come back to this analysis later, when we introduce the low
635
+ energy EFTs for the massless degrees of freedom of the string: both the UG and the GR-like
636
+ actions.
637
+ IV.
638
+ STRINGS IN GENERAL BACKGROUNDS
639
+ Up to now, we have only considered strings propagating in flat spacetime. However, the
640
+ spectrum of the strings contains some excitations which typically interact among themselves
641
+ and could lead to the generation of a non-trivial background. In particular, it contains a
642
+ graviton and, necessarily, gravitons need to interact gravitationally. At low energies, all the
643
+ excitations that matter are the massless ones. In the same way a laser is a coherent state of
644
+ photons, we expect that a coherent state of gravitons might look like a curved background
645
+ and a string propagating on top of it needs to be described appropiately. The same comment
646
+ applies to the dilaton field. As such, we can write down the most general renormalizable
647
+ action including those fields, which is the following non-linear σ-model
648
+ S[X, γ] = SP[X, γ] + SD[X, γ] = −
649
+ 1
650
+ 4πα′
651
+
652
+ d2σ√−γ
653
+
654
+ γabGµν(X)∂aXµ∂bXν + α′R (γ) Φ(X)
655
+
656
+ ,
657
+ (33)
658
+ where Gµν(X) represents a metric (graviton excitations), Φ(X) represents the dilaton back-
659
+ ground field, and R[γ] represents the Ricci-scalar of the two-dimensional metric. This term
660
+ breaks explicitly the Weyl invariance in the worldsheet. This term is of a higher dimension
661
+ than the Weyl-invariant terms, and it does not require to be normalized with a dimensionful
662
+ constant. In virtue of the expansion in α′ that we will perform, we will cancel the tree-level
663
+ contribution to the anomaly of this last term with the one-loop contribution of the classically
664
+ Weyl-invariant terms. The result of this procedure is a reasonable effective field theory for
665
+ the massless degrees of freedom of the string.
666
+ There are two missing terms that still give rise to a renormalizable theory. The first of
667
+ these terms is the coupling to the Kalb-Ramond field. However, if we focus on unoriented
668
+ strings, we can skip it since the divergences of the rest of the terms do not require this term
669
+ 16
670
+
671
+ to be renormalized. In case we deal with oriented strings, this term gives a contribution to
672
+ the conformal anomaly [17].
673
+ The additional term that we can add to the action corresponds to a coupling to the
674
+ background tachyon field T(X)
675
+ ST = 1
676
+
677
+
678
+ d2σ√−γT (X) .
679
+ (34)
680
+ In principle this term is needed to cancel some of the quadratic divergences arising from
681
+ vacuum to vacuum diagrams. However, if we use a renormalization scheme such that those
682
+ divergences are absent (for example, dimensional regularization), we can safely skip those
683
+ terms. Hence, we will work with a renormalization scheme fullfilling this property. Fur-
684
+ thermore, it is worth mentioning that supersymmetry in the worldsheet ensures that those
685
+ quadratic divergences are absent in superstrings due to the characteristic cancellation among
686
+ fermionic and bosonic degrees of freedom, with independence of the renormalization scheme.
687
+ A.
688
+ Determination of the Weyl anomaly
689
+ Anomalies always appear when there are two symmetries that the theory displays at the
690
+ classical level, but it is not possible to quantize such theory preserving both of them. This
691
+ means, there is a trade-off between the two symmetries and it is only possible to preserve
692
+ one of them in the process. For example, the chiral anomaly is a trade-off between the vector
693
+ and axial currents for massless fermion fields. If we use a regularization procedure which
694
+ automatically preserves one of those currents, then straightforwardly the other current will
695
+ be anomalous.
696
+ In the case of the chiral anomaly, it is standard to use a regularization
697
+ scheme that preserves gauge invariance and hence yields to the conservation of the vector
698
+ current, leading to an anomalous axial current. In the case of Weyl invariance for strings, we
699
+ are using a regularization scheme that preserves diffeomorphism invariance, while the Weyl
700
+ symmetry becomes potentially anomalous. We need to ensure that the non-linear sigma
701
+ model is chosen in such a way that it gives rise to a Weyl-invariant theory. In a language
702
+ closer to particle physics, this means that we need to choose our theory in such a way that
703
+ we cancel the potential gauge anomalies, which in this case corresponds to choosing the
704
+ background fields in such a way that the theory is not Weyl-anomalous.
705
+ In the case of
706
+ the Standard Model, since it corresponds to a chiral gauge theory, arbitrary matter fields
707
+ 17
708
+
709
+ would lead to an anomalous theory. However, the matter content is such that the potential
710
+ anomaly is absent. This is precisely what we have done in the previous section to fix the
711
+ target space dimension to be 26; otherwise, the Weyl-symmetry becomes anomalous. In
712
+ this case, we expect constraints also on the background fields entering the non-linear sigma
713
+ models, i.e., constraints that the Gµν(X) and the Φ(X) fields need to obey.
714
+ We want now to write down the most general form that the Weyl anomaly can display.
715
+ Following D’Hoker [24], it is possible to show that the structure of the anomaly for unoriented
716
+ strings in a curved background needs to be of the form
717
+ ⟨T a
718
+ a ⟩ = βG
719
+ µν(X)∂aXµ∂bXνγab + βΦ (X) R (γ) + βV
720
+ µ (X)gabD∗
721
+ a∂bXµ,
722
+ (35)
723
+ where D∗
724
+ a represents the covariant derivative on the product space of the cotangent space
725
+ of the worldsheet and the tangent space of the target space, and it can be explicitly written
726
+ down as
727
+ D∗
728
+ a∂bXµ = ∂a∂bXµ − Γc
729
+ ab∂cXµ + Γµ
730
+ νρ∂aXν∂bXρ,
731
+ (36)
732
+ where Γc
733
+ ab are the Christoffel symbols of the metric γab and Γµ
734
+ νρ represent the Christoffel
735
+ symbols of the metric Gµν. The last term in the Weyl anomaly, βV can be removed through
736
+ a transformation on the Xµ fields, since we are always able to perform a local transformation
737
+ on the Xµ fields at the same time that we perform a Weyl-rescaling of the metric. This
738
+ leaves only two independent β functionals: βG and βΦ2.
739
+ Hence we need to determine the β functionals obtained from the action (33). We want
740
+ to study perturbatively this action order by order in the α′ expansion, which is done by
741
+ assuming that the background fields Gµν(X), Φ(X) vary smoothly with respect to the scale
742
+ α′. It is conventional to do the computations in the background field formalism. In this for-
743
+ malism, we decompose the fields Xµ in a background part Xµ
744
+ 0 and its quantum fluctuations
745
+ Y µ
746
+ Xµ (σ) = Xµ
747
+ 0 (σ) + Y µ (σ) ,
748
+ (37)
749
+ where the integration is now performed with respect to the quantum fluctuations instead of
750
+ Xµ. We define the effective action Γ[X0, g] following [25] as
751
+ e−Γ[X0,g] =
752
+
753
+ DY e
754
+
755
+
756
+ S(X0,Y )−S(X0)−� d2σY µ(σ) δS
757
+ δXµ
758
+ 0
759
+
760
+ ,
761
+ (38)
762
+ 2 For oriented strings there will be another β-functional associated with the Kalb-Ramond field.
763
+ 18
764
+
765
+ which is the generating functional of the Feynman diagrams relevant for the computation of
766
+ the β-functionals.
767
+ At this point, it is better to pause and mention a crucial step in the computations. The
768
+ coordinate difference does not transform in a covariant way under changes of coordinates.
769
+ Hence, in order to obtain results that are manifestly covariant, it is better to do the com-
770
+ putation in variables that are manifestly covariant at intermediate steps. This can be done
771
+ as follows. Imagine that the coordinates Xµ
772
+ 0 correspond to a given point p0 and the coor-
773
+ dinates Xµ = Xµ
774
+ 0 + Y µ to a point p. If both points are close enough, there exists only one
775
+ geodesic with respect to Gµν connecting both of them. Hence, we can replace the coordinate
776
+ difference Y µ which characterizes the point p by the tangent vector tµ of the geodesic at the
777
+ point p0, which transforms covariantly under changes of coordinates. Hence, it is better to
778
+ use this vector as the integration variable in the path integral.
779
+ In fact, we can use this tangent vector tµ to perform a covariant Taylor expansion based
780
+ on Xµ
781
+ 0 of an arbitrary tensor living in the target manifold. To put it explicitly, any tensor
782
+ Tµ1...µn(X) can be expanded as
783
+ Tµ1...µn(X0 + t) =
784
+
785
+
786
+ k=0
787
+ T (k)
788
+ µ1...µnν1...νk(X0)tν1 . . . tνk,
789
+ (39)
790
+ where each of the terms T (k)
791
+ µ1...µnν1...νk is a combination of covariant derivatives of the tensor
792
+ Tµ1...µn and contractions with curvature tensors evaluated at X0. This expansion can be
793
+ achieved with the help of the normal coordinate expansion although we emphasize that it
794
+ remains valid in an arbitrary coordinate system since it is a tensor expression. We are inter-
795
+ ested in the expansion of the tensors Gµν, Φ(X) (the latter is a trivial tensor, i.e. a scalar),
796
+ and the object ∂a (Xµ
797
+ 0 + Y µ). These expansions can be obtained after a straightforward
798
+ computation, see [25] for details:
799
+ Gµν(X) = Gµν(X0) + 1
800
+ 3Rµρσνtρtσ + ...,
801
+ (40)
802
+ Φ(X) = Φ(X0) + ∇µΦ(X0)tµ + 1
803
+ 2∇µ∇νΦ(X0)tµtν + ...,
804
+ (41)
805
+ ∂a (Xµ
806
+ 0 + Y µ) = ∂aXµ
807
+ 0 + ∇atµ + 1
808
+ 3Rµ
809
+ νρσ∂aXσ
810
+ 0 tνtρ + ...,
811
+ (42)
812
+ where Rµ
813
+ νρσ represents the Riemann tensor associated with Gµν.
814
+ We are not ready to perform the diagrammatic computation yet. There is a problem
815
+ arising from the fact that the term that gives us the propagator for the quantum fields over
816
+ 19
817
+
818
+ which we integrate, tµ, contains an arbitrary metric in front of it, i.e. we need to invert
819
+ a term that looks like Gµν(X0)∇atµ∇btν. The way to deal with this problem and obtain a
820
+ simple propagator is to introduce a vielbein eA
821
+ µ(X0) which fulfills the property
822
+ eA
823
+ µ(X0)eB
824
+ ν(X0)ηAB = Gµν(X0),
825
+ (43)
826
+ with ηAB a Lorentzian metric. In this way, we can rewrite all the vector expressions in the
827
+ non-holonomic basis eA
828
+ µ and get a trivial propagator for the tA = eA
829
+ µtµ fields. This comes
830
+ with a subtlety, because now the derivatives ∇a involve the spin-connection of the spacetime
831
+ ω AB
832
+ µ
833
+ ; for example,
834
+ ∇atA = ∂atA + ω AB
835
+ µ
836
+ ∂aXµ
837
+ 0 tCηBC.
838
+ (44)
839
+ Obtaining a trivial propagator means breaking the SO(D, 1) invariance that the theory
840
+ displays, but since we are working in a formalism that is explicitly gauge covariant, we
841
+ automatically know that there will always be contributions in the diagrammatic expansion
842
+ that make the theory explicitly gauge covariant in intermediate steps. Up to this point,
843
+ collecting all the information, we have performed the following expansion for the Polyakov
844
+ piece of the action:
845
+ SP = SP[X0] +
846
+ 1
847
+ 2πα′
848
+
849
+ d2σ√γγabGµν(X0)∂aXµ
850
+ 0 ∇btν
851
+ (45)
852
+ +
853
+ 1
854
+ 4πα′
855
+
856
+ d2σ√γγab �
857
+ ηAB∇atA∇btB�
858
+ (46)
859
+ +
860
+ 1
861
+ 3πα′
862
+
863
+ d2σ√γγabRµABC∂aXµ
864
+ 0 tAtB∇btC
865
+ (47)
866
+ +
867
+ 1
868
+ 12πα′
869
+
870
+ d2σ√γγabRABCDtBtC∇a∇atA∇btD,
871
+ (48)
872
+ and for the dilaton part we have the trivial structure:
873
+ SD[X0 + t] =SD[X0] − 1
874
+
875
+
876
+ d2σ√γ∇AΦ(X0)tA
877
+ (49)
878
+
879
+ 1
880
+ 16π
881
+
882
+ d2σ√γ∇A∇BΦ(X0)tAtB + ... .
883
+ (50)
884
+ We recall that we can safely impose the equations of motion for the classical fields and safely
885
+ drop the linear terms. This is tantamount to a legitimate field redefinition.
886
+ Now we can determine the trace anomaly, see Eq. (35) from the effective action introduced
887
+ above. The computation requires to go to the next higher order in loops in the dilaton field,
888
+ 20
889
+
890
+ since the piece of the action for the dilaton field α′ comes with an additional α′ with respect
891
+ to the other field. The computation is rather lengthy and hence we do not reproduce it
892
+ here [25]. We simply write down the result as
893
+ βG
894
+ µν = Rµν (G) − ∇µ∇νΦ + O(α′),
895
+ (51)
896
+ βΦ = D − 26
897
+ 6
898
+ + α′ �
899
+ −R (G) + 2∇2Φ + (∇Φ)2�
900
+ + O
901
+
902
+ α′2�
903
+ .
904
+ (52)
905
+ A comment is in order now. If we are dealing with a flat worldsheet, the vanishing of βG
906
+ is enough to ensure the Weyl invariance at the quantum level, as long as we are working in
907
+ D = 26 dimensions, the critical dimension (see Eq. (35). Hence, in principle, we expect that
908
+ the same applies to non-flat worldsheets, i.e. that the condition βΦ = 0 is not independent
909
+ of βG = 0. Actually, we have a non-trivial constraint coming from the Bianchi identity
910
+ ∇µ
911
+
912
+ Rµν (G) − 1
913
+ 2R (G) Gµν
914
+
915
+ = 0.
916
+ (53)
917
+ This ensures that we have to the computed order the following identity whenever βG
918
+ µν = 0
919
+ ∇µβG
920
+ µν = ∇νβΦ = 0,
921
+ (54)
922
+ as can be seen by direct calculation. This implies that βΦ is a constant as long as βG = 0.
923
+ By continuity, this automatically implies at this level that βΦ = 0 for D = 26 [25]. From
924
+ now on we will restrict ourselves to work in D = 26 and make a comment on strings on
925
+ non-critical dimension later.
926
+ B.
927
+ Including string-loop corrections
928
+ At this point, we have only focused on the zeroth-order in the gs-expansion. Although
929
+ it is clear that string loops should modify the results, it is not completely clear how those
930
+ corrections must be included. One of the most accepted proposals is the Fischler-Susskind
931
+ approach [8–10]. The idea behind such mechanism is that string loop divergences can be
932
+ absorbed through a renormalization of the background fields in the non-linear sigma models.
933
+ Let us illustrate this explicitly for unoriented closed bosonic strings. For the purpose of this
934
+ section, it is simpler to work with a a sharp cut-off as regularization scheme.
935
+ The divergences in string loops appear when we have to sum over conformally inequivalent
936
+ surfaces of a fixed topology (i.e. genus). For a fixed but arbitrary topology (i.e. we focus
937
+ 21
938
+
939
+ here on non-trivial topologies), this sum is an integral over a finite-dimensional parameter
940
+ space, the so-called Teichm¨uller space [17, 18].
941
+ These integrals are divergent, but these
942
+ divergences arise from handles that shrink to zero size. These divergences are equivalent to
943
+ the divergences coming from inserting a local operator on the trivial-genus worldsheet. In a
944
+ flat spacetime, the divergence appearing for the torus topology can be eliminated through
945
+ the insertion of an operator log Λ
946
+ 2π γabηµν∂aXµ∂bXν, with a suitable coefficient. Here Λ is a
947
+ suitable cut-off in the Teichm¨uller space.
948
+ If we move to a curved geometry Gµν with a non-trivial zero mode of the dilaton field Φ,
949
+ we need to substitute the metric Gµν and include a relative factor e−Φ to account for the
950
+ dependence of the path integral on the topology of the surface. We recall that the asymptotic
951
+ value of the dilaton field λ = ⟨Φ⟩ is identified with the string coupling constant gs = eλ
952
+ through an exponential relation, as it can be seen by comparison of the actions in Eq. (33)
953
+ and Eq. (28) [17, 18]. Explicitly for the first non-trivial order (torus topology) we have the
954
+ following divergences:
955
+ δSloop = log Λ
956
+
957
+
958
+ d2σ√−γγabe−ΦGµν(X)∂aXµ∂bXν.
959
+ (55)
960
+ The e−Φ factor ensures that, when evaluated on the trivial topology on the worldsheet, it
961
+ captures the divergences in the torus. If the dilaton field displays a non-trivial background
962
+ profile Φ(X), not only a zero mode λ, we expect that replacing Φ with Φ(X) would lead to
963
+ a first term in an α′ expansion of the term. This term modifies the β-functional (we will
964
+ refer from now on to those β-functionals modified due to the the presence of string loop
965
+ corrections as ˜β) associated with the metric through the addition of a term δβG
966
+ µν to the
967
+ functional βG
968
+ µν above
969
+ ˜βG
970
+ µν = βG
971
+ µν + δβG
972
+ ��ν,
973
+ (56)
974
+ which looks like a cosmological constant term, i.e.
975
+ δβG
976
+ µν = Ce−ΦGµν,
977
+ (57)
978
+ where C is an arbitrary constant that arises in the renormalization procedure. On equal
979
+ footing, an additional contribution to the dilaton, which we call δβΦ will also appear, al-
980
+ though it is hard to evaluate explicitly.
981
+ Instead, it is easier to obtain it by applying a
982
+ consistency argument [8–10]. As we have argued above, in principle the vanishing of the
983
+ 22
984
+
985
+ modified ˜βΦ-functional through string loop corrections is not independent of the vanishing
986
+ of the ˜βG
987
+ µν functional. As we have seen, in the CFT computation, it being constant is pre-
988
+ cisely a consequence of the vanishing of the remaining β-functionals. By this consistency
989
+ condition, it is possible to derive an equation for the ˜βΦ-function.
990
+ Taking the divergence of the ˜βG
991
+ µν and simplifying it through Bianchi identities and using
992
+ also the vanishing of ˜βG
993
+ µν itself, we find:
994
+ ∇µ ˜βG
995
+ µν = ∇ν
996
+ �1
997
+ 2R (G) − ∇2Φ − 1
998
+ 2 (∇Φ)2
999
+
1000
+ (58)
1001
+ This leads us to the following ˜βΦ functional for the dilaton field:
1002
+ ˜
1003
+ βΦ = α′
1004
+
1005
+ −R (G) + 2∇2Φ + 1
1006
+ 2 (∇Φ)2
1007
+
1008
+ ,
1009
+ (59)
1010
+ which knowing that is a constant, can be safely chosen to be equal to zero. In case that we
1011
+ were dealing with strings in non-critical dimension, an additional D − 26/6 factor should be
1012
+ included arising from the bc-ghost system contribution to the Weyl-anomaly at the string
1013
+ tree level. Notice that we have introduced α′ as a dimensionful parameter. Once we have
1014
+ reached this point, it is better to pause and recapitulate what we have done until now. We
1015
+ began analyzing the α′-expansion of the sigma model describing the propagation of strings in
1016
+ arbitrary backgrounds. We determined the β-functionals of the Weyl anomaly to the lowest
1017
+ order. Then we jumped into the problem of including string-loop corrections that should
1018
+ clearly modify the constraints that the background fields should obey. For the purpose of
1019
+ including such corrections, we noticed that the divergences arising from the string loops can
1020
+ be absorbed into a renormalization of the background fields Gµν and Φ. Hence, up to this
1021
+ point we have found a set of equations that these background fields need to obey for the
1022
+ consistent propagation of the strings.
1023
+ C.
1024
+ EFTs for the theory
1025
+ The consistency equations that we found arising from the Weyl anomaly cancellation and
1026
+ the cancellation of the divergences from string loop corrections resemble a lot the equations
1027
+ of motion of a given field theory for Gµ(X) and Φ(X):
1028
+ ˜βG
1029
+ µν = Rµν (G) − ∇µ∇νΦ + Ce−ΦGµν + O(α′),
1030
+ (60)
1031
+ ˜βΦ = D − 26
1032
+ 6
1033
+ + α′ �
1034
+ −R (G) + 2∇2Φ + (∇Φ)2�
1035
+ + O
1036
+
1037
+ α′2�
1038
+ .
1039
+ (61)
1040
+ 23
1041
+
1042
+ Setting C = 0 corresponds to omitting the string loop corrections. The natural question is
1043
+ then whether it is possible to obtain an effective action whose dynamics correctly reproduce
1044
+ these equations. In addition, such effective action needs to correctly account for the scatter-
1045
+ ing amplitudes involving only massless excitations of the string (to the lowest order in the
1046
+ α′ expansion) in order to be a sensible action. There are (at least) two effective actions that
1047
+ fullfill these criteria: match the scattering amplitudes involving gravitons and dilatons and
1048
+ their equations of motion give rise to the β-functionals. These two actions correspond to a
1049
+ GR-like EFT and a UG-like EFT. The GR-like EFT can be given as:
1050
+ SGR
1051
+ eff =
1052
+ 1
1053
+ 2κ2
1054
+
1055
+ dD+1X
1056
+
1057
+ −GeΦ
1058
+
1059
+ −(D − 26)
1060
+ 6α′
1061
+ − 2Ce−Φ + R (G) + (∇Φ)2
1062
+
1063
+ + O(α′).
1064
+ (62)
1065
+ From this action principle it is straightforward to obtain the β-functionals as
1066
+ ˜βΦ = −2κ2 e−Φ
1067
+
1068
+ −G
1069
+ δSGR
1070
+ eff
1071
+ δΦ ,
1072
+ (63)
1073
+ ˜βG
1074
+ µν = 2κ2 e−Φ
1075
+
1076
+ −G
1077
+ �δSGR
1078
+ eff
1079
+ δGµν + 1
1080
+ 2Gµν
1081
+ δSGR
1082
+ eff
1083
+ δΦ
1084
+
1085
+ .
1086
+ (64)
1087
+ Furthermore, it is possible to perform a field redefinition to map this action to the Einstein
1088
+ Frame [18].
1089
+ Following [1] we know that it is also possible to write down an action principle which
1090
+ reproduces the same equations of motion that Eq. (62) displays, with the cosmological con-
1091
+ stant C entering as an integration constant instead of a coupling constant. To be concrete,
1092
+ we can write down the following action principle:
1093
+ SUG
1094
+ eff =
1095
+ 1
1096
+ 2κ2
1097
+
1098
+ dD+1XωeΦ
1099
+
1100
+ −(D − 26)
1101
+ 6α′
1102
+ + R( ˜
1103
+ G) + ( ˜∇Φ)2
1104
+
1105
+ + O(α′).
1106
+ (65)
1107
+ If we compute the variation with respect to Gµν we obtain the traceless version of the
1108
+ equations obtained from Eq. (62). Explicitly, if we define
1109
+ δSUG
1110
+ eff
1111
+ δGµν
1112
+ = Kµν (G) − 1
1113
+ 2K (G) ,
1114
+ (66)
1115
+ for the variation of SUG
1116
+ eff we obtain the following:
1117
+ δSUG
1118
+ eff
1119
+ δGµν = Kµν( ˜
1120
+ G) −
1121
+ 1
1122
+ D + 1K( ˜
1123
+ G) ˜Gµν = 0.
1124
+ (67)
1125
+ with K( ˜
1126
+ G) = ˜GµνKµν( ˜
1127
+ G). Upon taking the divergence and using the generalized Bianchi
1128
+ identities for the corresponding tensor K entering the equations (see [1] for further details)
1129
+ 24
1130
+
1131
+ we find:
1132
+ Eµν = Kµν( ˜
1133
+ G) − 1
1134
+ 2K( ˜
1135
+ G) ˜Gµν + C ˜Gµν = 0.
1136
+ (68)
1137
+ Again, a suitable combination of these equations with the equation obtained from the equa-
1138
+ tion of motion for Φ we find:
1139
+ ˜βΦ = −2κ2e−Φ
1140
+ ω
1141
+ δSUG
1142
+ eff
1143
+ δΦ ,
1144
+ (69)
1145
+ ˜βG
1146
+ µν = 2κ2e−Φ
1147
+ ω
1148
+
1149
+ Eµν + 1
1150
+ 2
1151
+ ˜Gµν
1152
+ δSeff
1153
+ δΦ
1154
+
1155
+ ,
1156
+ (70)
1157
+ confirming our claim that the Unimodular Gravity action (65) reproduces the β-functionals.
1158
+ Notice that this effective action does not only reproduce the β-functionals but it also repro-
1159
+ duces all of the scattering amplitudes involving massless excitations of the string (graviton
1160
+ and dilaton asymptotic states), as derived following the procedure sketched in the previous
1161
+ section. In that sense, both actions reproduce the desired properties and hence none of them
1162
+ is preferred over the other one from the perspective of using them as EFTs for the massless
1163
+ modes of the string.
1164
+ V.
1165
+ CONCLUSIONS
1166
+ We have analyzed the embedding of UG in string theory from the point of view of the
1167
+ consistent quantization of the strings in an arbitrary background. Furthermore, we have
1168
+ followed the proposal by Susskind and Fischler towards cancelling divergences arising from
1169
+ string loops with suitable counterterms in the non-linear sigma model. Our analysis here
1170
+ does not unveil any preference for UG or GR as a low energy description of string theory.
1171
+ This ties up the loose ends that were not analyzed in [1], regarding the embedding of UG
1172
+ in string theory. To put it explicitly: both UG and GR are equally valid as low energy
1173
+ descriptions of the massless modes of string theory and none of them seems to be preferred
1174
+ over the other one.
1175
+ Regarding future directions of work, we recall that our analysis here has focused on
1176
+ bosonic string theory. At first sight, the extension to superstring theory seems straightfor-
1177
+ ward although subtleties may arise in a careful study. Previous considerations of supergrav-
1178
+ ity in a UG-like context suggest that some of the vacua may spontenously break SUSY and
1179
+ hence both theories may develop a potential inequivalence at the quantum level [26–28].
1180
+ 25
1181
+
1182
+ Although there is no analysis of the global degrees of freedom in such contexts, it should be
1183
+ mentioned that it seems possible that a careful implementation of SUSY in that contexts
1184
+ requires also from a fermionic global degree of freedom, which is the responsible for the
1185
+ apparent SUSY-breaking presented there.
1186
+ A second direction of work that is worthwhile exploring is that of non-perturbative defini-
1187
+ tions of string theory and its interplay with UG. For instance, the gauge/gravity correspon-
1188
+ dence (also called usually AdS/CFT) [29–31] and matrix models [32], among them probably
1189
+ we could highlight the BFSS matrix model [33]. In such contexts, we have not explored
1190
+ whether it is easy or not to accomodate a UG principle instead of a GR principle.
1191
+ ACKNOWLEDGMENTS
1192
+ The authors would like to thank Carlos Barcel´o and Ra´ul Carballo-Rubio for collab-
1193
+ oration in early stages of this project and invaluable discussions during the preparation
1194
+ of the manuscript.
1195
+ We would also like to thank Tom´as Ort´ın for helpful conversations.
1196
+ Financial support was provided by the Spanish Government through the projects PID2020-
1197
+ 118159GB-C43, PID2020-118159GB-C44, and by the Junta de Andaluc´ıa through the
1198
+ project FQM219. GGM acknowledges financial support from the grant CEX2021-001131-S
1199
+ funded by MCIN/AEI/10.13039/501100011033. GGM is funded by the Spanish Government
1200
+ fellowship FPU20/01684.
1201
+ 26
1202
+
1203
+ [1] R. Carballo-Rubio, L. J. Garay, and G. Garc´ıa-Moreno, (2022), arXiv:2207.08499 [gr-qc].
1204
+ [2] R. Carballo-Rubio, Phys. Rev. D 91, 124071 (2015), arXiv:1502.05278 [gr-qc].
1205
+ [3] G. ’t Hooft, NATO Sci. Ser. B 59, 135 (1980).
1206
+ [4] C. P. Burgess, Introduction to Effective Field Theory (Cambridge University Press, 2020).
1207
+ [5] A. Delhom, G. Garc´ıa-Moreno, M. Hohmann, A. Jim´enez-Cano, and T. S. Koivisto, (2022),
1208
+ arXiv:2211.13056 [gr-qc].
1209
+ [6] E. ´Alvarez, S. Gonzalez-Martin,
1210
+ and C. P. Mart´ın, Eur. Phys. J. C 76, 554 (2016),
1211
+ arXiv:1605.02667 [hep-th].
1212
+ [7] R. Carballo-Rubio, F. Di Filippo, and N. Moynihan, JCAP 10, 030 (2019), arXiv:1811.08192
1213
+ [hep-th].
1214
+ [8] W. Fischler and L. Susskind, Phys. Lett. B 171, 383 (1986).
1215
+ [9] W. Fischler and L. Susskind, Phys. Lett. B 173, 262 (1986).
1216
+ [10] W. Fischler, I. R. Klebanov, and L. Susskind, Nucl. Phys. B 306, 271 (1988).
1217
+ [11] S. Weinberg, Rev. Mod. Phys. 61, 1 (1989).
1218
+ [12] C. W. Misner, K. S. Thorne, and J. A. Wheeler, Gravitation (W. H. Freeman, San Francisco,
1219
+ 1973).
1220
+ [13] C. M. Will, Theory and Experiment in Gravitational Physics (Cambridge University Press,
1221
+ 2018).
1222
+ [14] M. Henneaux and C. Teitelboim, Physics Letters B 222, 195 (1989).
1223
+ [15] M. Henneaux and C. Teitelboim, Phys. Lett. B 143, 415 (1984).
1224
+ [16] E. Mottola, JHEP 11, 037 (2022), arXiv:2205.04703 [hep-th].
1225
+ [17] J. Polchinski, String theory. Vol. 1: An introduction to the bosonic string, Cambridge Mono-
1226
+ graphs on Mathematical Physics (Cambridge University Press, 2007).
1227
+ [18] M. B. Green, J. H. Schwarz, and E. Witten, Superstring Theory. Vol. 1: Introduction, Cam-
1228
+ bridge Monographs on Mathematical Physics (1988).
1229
+ [19] Y. Nakayama, Phys. Rept. 569, 1 (2015), arXiv:1302.0884 [hep-th].
1230
+ [20] J. D. Qualls, (2015), arXiv:1511.04074 [hep-th].
1231
+ [21] P. Di Francesco, P. Mathieu, and D. Senechal, Conformal Field Theory, Graduate Texts in
1232
+ Contemporary Physics (Springer-Verlag, New York, 1997).
1233
+ 27
1234
+
1235
+ [22] D. J. Gross and V. Periwal, Phys. Rev. Lett. 60, 2105 (1988).
1236
+ [23] S. Mandelstam, Phys. Lett. B 277, 82 (1992).
1237
+ [24] P. Deligne, P. Etingof, D. S. Freed, L. C. Jeffrey, D. Kazhdan, J. W. Morgan, D. R. Morrison,
1238
+ and E. Witten, eds., Quantum fields and strings: A course for mathematicians. Vol. 1, 2
1239
+ (1999).
1240
+ [25] C. G. Callan, Jr. and L. Thorlacius, in Theoretical Advanced Study Institute in Elementary
1241
+ Particle Physics: Particles, Strings and Supernovae (TASI 88) (1989).
1242
+ [26] J. Anero, C. P. Martin, and R. Santos-Garcia, JHEP 01, 145 (2020), arXiv:1911.04160 [hep-
1243
+ -th].
1244
+ [27] J. Anero, C. P. Martin,
1245
+ and R. Santos-Garcia, JCAP 03, 006 (2020), arXiv:2001.05365
1246
+ [hep-th].
1247
+ [28] S. Bansal, S. Nagy, A. Padilla, and I. Zavala, JHEP 01, 146 (2021), arXiv:2010.13758 [hep-th].
1248
+ [29] J. M. Maldacena, Adv. Theor. Math. Phys. 2, 231 (1998), arXiv:hep-th/9711200.
1249
+ [30] O. Aharony, S. S. Gubser, J. M. Maldacena, H. Ooguri,
1250
+ and Y. Oz, Phys. Rept. 323, 183
1251
+ (2000), arXiv:hep-th/9905111.
1252
+ [31] J. Polchinski, in Theoretical Advanced Study Institute in Elementary Particle Physics: String
1253
+ theory and its Applications: From meV to the Planck Scale (2010) pp. 3–46, arXiv:1010.6134
1254
+ [hep-th].
1255
+ [32] P. H. Ginsparg and G. W. Moore, in Theoretical Advanced Study Institute (TASI 92): From
1256
+ Black Holes and Strings to Particles (1993) pp. 277–469, arXiv:hep-th/9304011.
1257
+ [33] T. Banks, W. Fischler, S. H. Shenker,
1258
+ and L. Susskind, Phys. Rev. D 55, 5112 (1997),
1259
+ arXiv:hep-th/9610043.
1260
+ 28
1261
+
0NE1T4oBgHgl3EQf4wUX/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2NFRT4oBgHgl3EQfmzfK/content/tmp_files/2301.13603v1.pdf.txt ADDED
@@ -0,0 +1,1291 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13603v1 [math.LO] 31 Jan 2023
2
+ Limits of structures and Total NP Search Problems∗
3
+ Ondřej Ježil
4
5
+ Faculty of Mathematics and Physics, Charles University†
6
+ Abstract
7
+ For a class of finite graphs, we define a limit object relative to some computation-
8
+ ally restricted class of functions. The properties of the limit object then reflect how
9
+ a computationally restricted viewer “sees” a generic instance from the class. The
10
+ construction uses Krajíček’s forcing with random variables [7]. We prove sufficient
11
+ conditions for universal and existential sentences to be valid in the limit, provide sev-
12
+ eral examples, and prove that such a limit object can then be expanded to a model
13
+ of weak arithmetic. We then take the limit of all finite pointed paths to obtain a
14
+ model of arithmetic where the problem OntoWeakPigeon is total but Leaf (the
15
+ complete problem for PPA) is not. This can be viewed as a logical separation of
16
+ the oracle classes of total NP search problems, which in our setting implies standard
17
+ nonreducibility of Leaf to OntoWeakPigeon.
18
+ 1
19
+ Introduction
20
+ There exist several logical constructions of limits of classes of finite structures such as
21
+ the ultraproduct and the compactness theorem. The latter was used in [2] to prove the
22
+ 0–1 law for structures over relational vocabularies.
23
+ In combinatorics there are also several notions of limits of finite graphs. For example
24
+ the dense graph limit defined for a sequence of graphs {Gk}k>0 satisfying the condition
25
+ that
26
+ t(F, Gn) = |hom(F, G)|
27
+ |Gn||F |
28
+ ,
29
+ converges for every fixed connected graph F, where hom(F, G) denotes the set of all graph
30
+ homomorphisms from F to G. This provided a framework (see [8]) to restate and find new
31
+ proofs for results in extremal graph theory — for instance Goodman’s theorem relating
32
+ the number of edges to the number of triangles in a graph. There are other notions of
33
+ limits of sequences of graphs, and we refer the interested reader to [10]. Another recent
34
+ use of limit objects for the results of extremal combinatorics was by Razborov in [11].
35
+ ∗ This work has been supported by Charles University Research Center program No.UNCE/SCI/022.
36
+ † Sokolovská 83, Prague, 186 75, The Czech Republic
37
+ 1
38
+
39
+ In this work, we define a new construction of a limit object. Given a class of finite
40
+ graphs G, whose vertex sets are initial segments of N, we can stratify it into the sequence
41
+ of sets {Gk}∞
42
+ k=1 as follows
43
+ Gk = {G ∈ G; G has {0, . . . , k − 1} as its vertex set}.
44
+ Our construction would yield a pseudofinite structure if limk→∞|Gk| = 1, but an
45
+ ordinary application of the compactness theorem suffices for that, we therefore generally
46
+ care about the case, where limk→∞|Gk| = ∞.1 We call such a sequence of sets of graphs
47
+ a wide sequence and the limit object its wide limit.
48
+ Let F be a class of functions with some computational restrictions, for example take
49
+ F to be the set of functions computed by decision trees of some small depth. We define
50
+ the wide limit denoted limF Gn, where n is a technical parameter to be defined later.
51
+ The wide limit limF Gn is a Boolean-valued graph2 — its edge relation does not only
52
+ permit the truth values 0 and 1 but also many other values from some infinite complete
53
+ Boolean algebra B. This algebra is in fact also a σ-algebra with a measure µ on it,
54
+ so to any statement formulated as a first order sentence ϕ we can assign a real number
55
+ µ([[ϕ]]) ∈ [0, 1] which measures how far is the truth value of ϕ (denoted [[ϕ]]) from the value
56
+ 0. The key method we use is arithmetical forcing with random variables, developed in [7],
57
+ which allows us to construct models of (weak) arithmetical theories and by restricting to
58
+ a language of graphs gives us Boolean-valued graphs. In these Boolean-valued graphs,
59
+ validity of existential quantifiers corresponds to the ability of F to solve search problems
60
+ over the class of graphs we are considering.
61
+ Our limit object can be expanded to the original model Krajíček’s method would
62
+ otherwise construct. We prove (Theorem 5.8) that the truth values of first order sentences
63
+ concerning the object are preserved even when evaluated in the model of arithmetic
64
+ relativized to the wide limit (under a mild condition on the family F).
65
+ As an application of this construction, we take the limit of all finite paths starting
66
+ at the vertex 0 relative to the class of functions computed by oracle trees of subex-
67
+ ponential depth and obtain the Boolean-valued graph limFnb ∗PATHn which is an infi-
68
+ nite path with only one endpoint. This object is then expanded to a Boolean-valued
69
+ model of weak second order arithmetic K(∗PATHn, Fnb, Gnb) in which every instance of
70
+ OntoWeakPigeon has a solution. However, the object limFnb ∗PATHn in the model
71
+ K(∗PATHn, Fnb, Gnb) is an instance of the PPA-complete problem Leaf which does not
72
+ have a solution. This can be seen as a logical analogue of an oracle separation of these
73
+ two classes, which is known to hold3. We then show the result implies a separation of
74
+ those classes under stronger notion of reducibility.
75
+ 1The case where the limit tends to some other positive number results in a structure which after
76
+ collapsing to a two-valued boolean algebra becomes pseudofinite too.
77
+ 2Generally, we can do this with any L-structures for some first order language L. The limit object is
78
+ then a Boolean-valued L-structure limF Gn. In this work we restrict ourselves to the language of graphs
79
+ L = {E} to simplify the presentation.
80
+ 3OntoWeakPigeon can be reduced to WeakPigeon which is known to be in PPP [6] and it is
81
+ known [1] that Leaf cannot be reduced to any problem in PPP.
82
+ 2
83
+
84
+ There is already an established connection between complexity of search problems and
85
+ logic (namely bounded arithmetic, see [4]). The model we construct is not known nor ex-
86
+ pected to be a model of any theory which has been considered under these investigations.
87
+ However, we show that open induction and open comprehension is valid in this model,
88
+ and thus we show these principles along with the principle that OntoWeakPigeon is
89
+ total cannot prove that the problem Leaf is total. The way the model is constructed
90
+ also implies nonreducibility from Leaf to OntoWeakPigeon for subexponential time
91
+ oracle machines. Moreover, one can at least in theory tweak our construction (e.g. by
92
+ extending the family Fnb) to obtain a model of a stronger theory. This has been success-
93
+ fully done for several models already in [7, Chapter 10, Chapter 14, Chapter 21] using
94
+ the switching lemma.
95
+ 2
96
+ Preliminaries
97
+ By graphs we mean structures in a language with a single binary relation denoted E
98
+ which is antireflexive and possibly symmetric if the graph in question is undirected. We
99
+ will denote any particular graph by ω as it will be used in some sense as a sample of a
100
+ discrete probability space. The edge relation of a particular graph ω will be denoted Eω.
101
+ In the rest of this section we recall notions needed for Krajíček’s forcing construc-
102
+ tion. Fundamental notion we use throughout the work is of nonstandard models of (true)
103
+ arithmetic. Let Lall be the language containing the names of all relations and functions
104
+ on the natural numbers and let ThLall(N) denote the set of true sentences in this lan-
105
+ guage. By classical results of logic there exist Lall-structures in which all sentences from
106
+ ThLall(N) are valid but which are not isomorphic to N. These are called nonstandard
107
+ models (of ThLall(N)).
108
+ All nonstandard models of ThLall(N) (and even much weaker theories) contain an
109
+ isomorphic copy of N as an initial segment. Therefore, we can assume that in fact all
110
+ models we encounter satisfy N ⊆ M.
111
+ After considering a concrete nonstandard model M (of ThLall(N)) we shall call the
112
+ elements of M\N nonstandard numbers. These can be intuitively understood as “infinite
113
+ natural numbers”. The key feature of those elements is that all functions and relations
114
+ from Lall are defined even on nonstandard numbers. This includes functions for coding
115
+ sequences and sets by numbers, and therefore we can use notation like a0, . . . , an−1 even
116
+ for a nonstandard number n. The notation then means that for each i ∈ M such that
117
+ i < n we have an object ai coded by a number in M and that this whole sequence is
118
+ coded by some number {ai}n−1
119
+ i=0 ∈ M. For a nonstandard number S ∈ M coding a set
120
+ we denote its nonstandard size (cardinality) to be |S|. In the case where we talk about
121
+ a binary string x the notation |x| denotes the bit length of x (which is nonstandard if x
122
+ is).
123
+ In the next section we will fix a nonstandard model M which has the model theoretic
124
+ property that it is ℵ1-saturated. There is a self-contained construction of such model
125
+ in [7, Appendix]. The only consequence of the ℵ1-saturation we shall use is the following.
126
+ Property. Let {ai}∞
127
+ i=0 be a sequence of standard numbers. Then there exists t ∈ M \N
128
+ 3
129
+
130
+ and a sequence {bi}t
131
+ i=0 ∈ M such that for all i ∈ N it holds that ai = bi. We shall call
132
+ the sequence of {bi}t
133
+ i=0 the nonstandard prolongation of {ai}∞
134
+ i=0.
135
+ The language Lall contains symbols for all relations on N.
136
+ Since every sequence
137
+ of numbers can be defined by some relation it turns out that in our case there is a
138
+ unique nonstandard prolongation which matches the definition of the wide sequence (up
139
+ to length which can be chosen arbitrarily high). We can therefore allow ourselves to use
140
+ nonstandard numbers as indices of any sequences of objects unambiguously.
141
+ Any nonstandard model M can be extended to an ordered ring ZM by adding neg-
142
+ ative elements. This ring then can be extended to a fraction field QM. We shall call
143
+ elements of QM M-rationals. The field QM contains an isomorphic copy of Q as a sub-
144
+ structure. We call an element in QM with absolute valued greater than all k
145
+ 1, k ∈ N,
146
+ infinite otherwise we call it finite. We call elements in QM with absolute value smaller
147
+ than all 1
148
+ k, k ∈ N infinitesimal.
149
+ We will denote the set of finite M-rationals as QM
150
+ fin and one can check it forms an
151
+ ordered ring.
152
+ Lemma (The existence of a standard part). There is a function st : QM
153
+ fin → R assigning
154
+ to each finite M-rational a real number. st is a ring homomorphism and the kernel of st
155
+ is exactly the ideal of infinitesimal numbers. When q is a finite M-rational we call st(q)
156
+ its standard part.
157
+ We shall use the structure QM analogously to how hyperreal numbers are used in
158
+ nonstandard analysis. For more details about nonstandard analysis we recommend [3]
159
+ to the interested reader. The following result characterizes convergence of sequences of
160
+ rational numbers using QM.
161
+ Theorem. Let {ai}∞
162
+ i=0 be a sequence of rational numbers and let r ∈ R.
163
+ Then the
164
+ following are equivalent.
165
+ • limi→∞ ai = r
166
+ • For every {bi}t
167
+ i=0, t ∈ M\N, which is a nonstandard prolongation of {ai}∞
168
+ i=0, there
169
+ is an nonstandard s0 ≤ t, such that for every nonstandard s ≤ s0: st(as) = r.
170
+ It is important for forcing with random variables to consider discrete probability
171
+ spaces of nonstandard size. We shall always use uniform distribution on the samples
172
+ (although this is not necessary for the general construction). Thus, the probability of an
173
+ event coded by an element A ∈ M is then just the M-rational number |A|/|S| where S
174
+ is the set of samples of such a space.
175
+ We conclude this section by restating classical inequalities used in this work using
176
+ the nonstandard approach.
177
+ Theorem (Bernoulli’s inequlity). Let y ∈ M, x ∈ QM and x ≥ −1, then
178
+ (1 + x)y ≥ 1 + yx.
179
+ Theorem (Exponential inequality). Let x ∈ M \ N, then
180
+ st
181
+ ��
182
+ 1 − 1
183
+ x
184
+ �x�
185
+ ≤ e−1.
186
+ 4
187
+
188
+ 3
189
+ Wide limits
190
+ 3.1
191
+ The definition
192
+ We shall define a wide limit of every sequence of the following form.
193
+ Definition 3.1. A sequence of sets of graphs {Gk}∞
194
+ k=1 is called a wide sequence if the
195
+ following holds:
196
+ • Every graph ω ∈ Gk has the vertex set {0, . . . , k − 1}.
197
+ • limk→∞|Gk| = ∞.
198
+ By abuse of notation we will simply talk about a wide sequence Gk instead of {Gk}∞
199
+ k=1.
200
+ Since a wide limit is a Boolean-valued graph, we need to construct a Boolean algebra in
201
+ which the truth evaluation of statements shall take place.
202
+ For the construction of the Boolean algebra we will closely follow [7, Chapter 1] albeit
203
+ with slight changes. Let us now fix for the rest of this work an ℵ1-saturated model of
204
+ ThLall(N) which we will denote M.
205
+ Definition 3.2. Let n ∈ M. We define
206
+ An = {A ⊆ {0, . . . , n − 1}; A ∈ M},
207
+ in words An is the set of subsets of {0, . . . , n − 1} coded by an element in M. This is
208
+ a boolean algebra and to each A ∈ An we assign an M-rational |A|/n which we call its
209
+ counting measure.
210
+ Even though An is a boolean algebra with a “measure” it is not a σ-algebra. Indeed,
211
+ An contains all singletons, but the countable set of those elements in {0, . . . , n − 1} with
212
+ only finitely many predecessors is not definable by compactness. However, having infinite
213
+ joins and meets at our disposal allows us to interpret quantifiers in the boolean valued
214
+ case, so we now want to ‘tweak’ this Boolean algebra.
215
+ Definition 3.3. Let I be the ideal of An consisting of elements with infinitesimal count-
216
+ ing measure. We define Bn = An/I. Each element in Bn is of the form A/I, where
217
+ A ∈ An, and we define µ(A/I) = st(|A|/n). We will denote the maximal element of Bn
218
+ by 1 and the minimal element by 0.
219
+ One can easily check that µ is well-defined since for all A ∈ I it holds that st(|A|/n) =
220
+ 0. The measure µ is called the Loeb measure. The following then holds.
221
+ Lemma 3.4 ( [7, Lemma 1.2.1]). Bn is a σ-algebra with a real valued measure µ. More-
222
+ over, Bn is a complete boolean algebra.
223
+ It is important to note that 1 ∈ Bn is the only element of Bn with measure µ(1) = 1
224
+ and similarly 0 ∈ Bn is the only element with measure µ(0) = 0. Also, for B, B′ ∈ Bn
225
+ the inequality B ≤ B′ implies µ(B) ≤ µ(B′).
226
+ 5
227
+
228
+ We now define precisely what we mean by the family of functions F relative to which
229
+ we will be taking the wide limit. This is still a part of Krajíček’s construction, we just
230
+ modify it to make it compatible with our setup — where we start with a wide sequence.
231
+ For every k ∈ N the set Gk is finite and thus can be coded by a number. Therefore,
232
+ there is a nonstandard prolongation of this sequence, and we can consider the set coded
233
+ by the nonstandard number Gn, which matches the definition of the wide sequence in M.
234
+ Definition 3.5. Let {Gk}∞
235
+ k=1 be a wide sequence and let n ∈ M \ N. We say that F is a
236
+ family of random variables on Gn if every α ∈ F is a function coded by a number in M
237
+ with domain Gn and taking values in M. We say α ∈ F is an F-vertex if for all ω ∈ Gn
238
+ it holds that α(ω) ∈ {0, . . . , n − 1}. The set of all F-vertices is denoted U(F).
239
+ If the wide sequence {Gk}∞
240
+ k=1 and the number n ∈ M \ N is clear from context we
241
+ just say F is a family of random variables. This is for now everything we need to recall
242
+ from [7], and we can proceed to define the central object of our work.
243
+ Definition 3.6 (The wide limit). Let {Gk}∞
244
+ k=1 be a wide sequence, let n ∈ M \ N and
245
+ let F be a family of random variables on Gn. We define the wide limit limF,n{Gk}∞
246
+ k=1 as
247
+ a Bn-valued structure in the language consisting of a single binary relation symbol {E}
248
+ as follows. The universe of the wide limit is taken as the set of all F-vertices. We now
249
+ inductively define the truth values for all {E}-sentences.
250
+ • [[α = β]] = {ω ∈ Gn; α(ω) = β(ω)}/I
251
+ • [[E(α, β)]] = {ω ∈ Gn; Eω(α(ω), β(ω))}/I
252
+ • [[ − ]] commutes with ¬, ∧ and ∨
253
+ • [[(∃x)A(x)]] = �
254
+ α∈U(F ) [[A(α)]]
255
+ • [[(∀x)A(x)]] = �
256
+ α∈U(F ) [[A(α)]]
257
+ By abuse of notation we will denote the wide limit limF,n{Gk}∞
258
+ k=1 by limF Gn. To
259
+ stress in which boolean valued structure is the truth evaluation [[ − ]] taking place we will
260
+ sometimes denote the evaluation C1[[ − ]], C2[[ − ]] for boolean valued structures C1 and C2
261
+ respectively. Furthermore, if C1[[ϕ]] = 1 for some sentence ϕ we say ϕ is valid in C1.
262
+ Note that since Gn can be recovered from F as the domain of its elements the wide
263
+ limit strictly speaking only depends on F. We keep Gn in the notation to cover the
264
+ situation where we have a very general family of functions (e.g. the family of polynomial
265
+ functions FPV) which can be applied to every wide sequence. Thus, the notation limF Gn
266
+ means that F is restricted to those functions which take elements of Gn as an input even
267
+ when F possibly contains other functions too.
268
+ The variability of the parameter n may also seem unnecessary and indeed in our
269
+ applications it is the case, but generally there are examples of wide sequences where n
270
+ directly affects the wide limit.
271
+ 6
272
+
273
+ Example 3.7. Let Fconst be the family of all constant functions with domain Gn and
274
+ range anywhere in M. Let
275
+ Gk =
276
+
277
+ {({0, . . . , k − 1}, E); |E| = 2, (0, 1) ∈ E}
278
+ k even
279
+ {({0, . . . , k − 1}, E); |E| = 1, (0, 1) ̸∈ E}
280
+ k odd
281
+ then
282
+ lim
283
+ Fconst Gn[[E(0, 1)]] =
284
+
285
+ 1
286
+ n even
287
+ 0
288
+ n odd.
289
+ 3.2
290
+ An example of a wide limit relative to shallow decision trees
291
+ Now we shall define the first nontrivial family of random variables relative to which we
292
+ shall take wide limits of several sequences. The functions in the family will be computed
293
+ by shallow decision trees. So the shape of the wide limit reflects what can ‘superloga-
294
+ rithmic’ trees witness in the wide sequence with probability arbitrarily close to 1.
295
+ Definition 3.8. Let Trud be a family of labeled rooted binary trees in M of the following
296
+ form. At each vertex the tree is labeled by an element of {0, . . . , n − 1} × {0, . . . , n − 1}
297
+ and the two outgoing edges incident to it are labeled as 0 and 1 respectively. The leaves
298
+ are labeled by an element of M. The depth of the tree is bounded by a number of a
299
+ form n1/t (rounded to the nearest element of M) for some t ∈ M \ N.
300
+ A computation of a T ∈ Trud on some ω ∈ Gn is defined as follows. Start at the root
301
+ and interpret each label (i, j) of the vertex as a question whether the pair (i, j) is in
302
+ the edge set Eω and follow a path through T reading 1 as a positive answer and 0 as a
303
+ negative answer. The label of the leaf visited at the end of the path is the output of T
304
+ on ω, denoted T(ω).
305
+ We define Frud to be the set of all functions computed by a tree T ∈ Trud.
306
+ The simplest wide sequence we shall consider is the following sequence of sets of
307
+ undirected graphs with exactly one edge.
308
+ Definition 3.9. EDGEk = {({0, . . . , k − 1}, E); |E| = 1}
309
+ Since any ω ∈ EDGEk has only 1 edge in all potential k · (k − 1)/2 edges, it is not
310
+ likely a shallow tree will find the edge. This is the idea behind the proof of the following
311
+ theorem.
312
+ Theorem 3.10.
313
+ lim
314
+ Frud
315
+ EDGEn[[(∃x)(∃y)E(x, y)]] = 0
316
+ Proof. Let α, β ∈ U(Frud), we proceed by proving that
317
+ [[E(α, β)]] = 0
318
+ which is enough to prove the theorem since even an infinite disjunction of the values 0
319
+ is 0.
320
+ 7
321
+
322
+ Let α and β be computed by T ∈ Trud and S ∈ Trud respectively. Let the depth of
323
+ both T and S be at most n1/t, where t ∈ M \N. Walk down T from the root and always
324
+ prolong the path along the edge labeled 0. On this path we have a set of at most n1/t
325
+ different pairs of vertices and a label of the leaf lT .
326
+ We do the same for S, and we find another set of at most n1/t pairs of vertices and
327
+ a label of the leaf lS. lS and lT are then combined to one last pair (lS, lT ). Now we just
328
+ need to compute the probability that none of these 2n1/t + 1 pairs of vertices are not in
329
+ the edge set Eω.
330
+ There are
331
+ �n
332
+ 2
333
+
334
+ different graphs in EDGEn and
335
+ �n−4n1/t−2
336
+ 2
337
+
338
+ graphs which fulfill our
339
+ requirements. The probability is thus
340
+ �n−4n1/t−2
341
+ 2
342
+
343
+ �n
344
+ 2
345
+
346
+ = (n − 4n1/t − 2)(n − 4n1/t − 3)
347
+ n(n − 1)
348
+ ≥ (n − 4n1/t − 3)2
349
+ n2
350
+
351
+
352
+ 1 − 4n1/t + 3
353
+ n
354
+ �2
355
+
356
+
357
+ 1 − 8n1/t + 6
358
+ n
359
+
360
+ after taking the standard part of the last line we get st(1 − 8n1/t+6
361
+ n
362
+ ) = 1. Therefore,
363
+ µ([[E(α, β)]]) = 0 and [[E(α, β)]] = 0.
364
+ 3.3
365
+ Sufficient conditions for validity of existential and universal sen-
366
+ tences
367
+ To analyze wide limits we need ideally to know the values of sentences which describe
368
+ properties whose complexity we are interested in. Generally this can be hard, so in this
369
+ section we prove sufficient conditions at least for the validity of universal and existential
370
+ sentences.
371
+ We will start with the simpler condition for the validity of universal sentences. This
372
+ is important also because we would like to know that a wide limit of a wide sequence
373
+ of graphs (i.e. antireflexive {E}-structures) is also a graph and that a wide limit of a
374
+ wide sequence of undirected graphs (directed graphs with E symmetric) is an undirected
375
+ graph. All of these properties are expressible as universal sentences.
376
+ Theorem 3.11. Let Gk be a wide sequence and let F be any family of random variables.
377
+ Let ϕ(x0, . . . , xl−1) be an open {E}-formula and assume that
378
+ lim
379
+ k→∞ Pr
380
+ ω∈Gk
381
+ [ω |= (∀x)ϕ(x)] = 1.
382
+ Then limF Gn[[(∀x)ϕ(x)]] = 1.
383
+ 8
384
+
385
+ Proof. By induction in M we have that st(Prω∈Gn[ω |= (∀x)ϕ(x)]) = 1. Therefore, we
386
+ have for every tuple of F-vertices α that [[ϕ(α)]] = 1. Now
387
+ [[(∀x)ϕ(x)]] =
388
+
389
+ α∈U(F )l
390
+ [[ϕ(α)]]
391
+ =
392
+
393
+ α∈U(F )l
394
+ 1
395
+ = 1.
396
+ Corollary 3.12. Let Gk be a wide sequence and F any family of random variables.
397
+ • If all ω ∈ Gk, k ∈ N, are directed graphs ({E}-structures satisfying that E is antire-
398
+ flexive) then limF Gn is a Boolean-valued {E}-structure in which the antireflexivity
399
+ of E is valid (i.e. limF Gn is a Boolean-valued graph).
400
+ • If all ω ∈ Gk, k ∈ N, are undirected graphs (directed graphs where E is symmetric)
401
+ then limF Gn is an {E}-structure in which both antireflexivity and symmetry of E
402
+ is valid. (i.e. limF is a Boolean-valued undirected graph)
403
+ Now to give a sufficient condition for the validity of an existential sentence (∃x)ϕ(x)
404
+ we use the auxiliary value of density of ϕ(x0, . . . , xl−1) defined as the probability that a
405
+ random graph ω ∈ Gk and a random tuple a ∈ {0, . . . , k − 1}l satisfy ω |= ϕ(a) and show
406
+ that the limiting density gives a lower bound for the measure of [[(∃x)ϕ(x)]].
407
+ Theorem 3.13. Let Gk be a wide sequence and let F be a family of random variables
408
+ which contains all constant functions. Let ϕ(x0, . . . , xl−1) be an open {E}-formula and
409
+ let p ∈ [0, 1]. Assume that
410
+ lim
411
+ k→∞ Pr
412
+ ω∈Gk
413
+ a
414
+ [ω |= ϕ(a)] ≥ p,
415
+ where a is sampled uniformly over all elements of {0, . . . , k − 1}l. Then
416
+ µ(lim
417
+ F Gn[[(∃x)ϕ(x)]]) ≥ p.
418
+ In particular if p = 1 then limF Gn[[(∃x)ϕ(x)]] = 1.
419
+ Proof. Consider an array C indexed by ω ∈ Gn and a ∈ {0, . . . , n − 1}l such that
420
+ Cω,a =
421
+
422
+ 1
423
+ ω |= ϕ(a)
424
+ 0
425
+ otherwise.
426
+ By the assumption and induction in M we have that
427
+ st
428
+
429
+ 1
430
+ nl|Gn|
431
+
432
+ ω∈Gn
433
+
434
+ a
435
+ Cω,a
436
+
437
+ ≥ p.
438
+ 9
439
+
440
+ We now claim that there exists a specific b ∈ {0, . . . , n−1}l such that st(Prω∈Gn[ω |=
441
+ ϕ(b)]) ≥ p. Assume for contradiction that the claim is false. Then
442
+ 1
443
+ |Gn|nl
444
+
445
+ ω∈Gn
446
+
447
+ a
448
+ Cω,α = 1
449
+ nl
450
+
451
+ a
452
+ Pr
453
+ ω∈Gn[ω |= ϕ(a)]
454
+ ≤ Pr
455
+ ω∈Gn[ω |= ϕ(a0)],
456
+ where we pick a0 such that it maximizes Prω∈Gn[ω |= ϕ(a0)].
457
+ But after taking the
458
+ standard part of the inequality we obtain that
459
+ st
460
+
461
+ 1
462
+ nl|Gn|
463
+
464
+ ω∈Gn
465
+
466
+ a
467
+ Cω,a
468
+
469
+ ≤ st( Pr
470
+ ω∈Gn[ω |= ϕ(a0)]) < p.
471
+ Which is a contradiction and so the claim is true. Let γb be a tuple of constant
472
+ functions which is at every sample equal to b. We have
473
+ [[(∃x)ϕ(x)]] =
474
+
475
+ α∈U(F )l
476
+ [[ϕ(α)]]
477
+ ≥ [[ϕ(γb)]]
478
+ and by taking µ of this inequality we finally obtain that µ([[(∃x)ϕ(x)]]) ≥ p.
479
+ In the following example we use Theorem 3.13 to show that in the wide limit of graphs
480
+ which have exactly one large clique and no other edges the nonexistence of a standard
481
+ sized clique cannot be valid relative to any F with all constants.
482
+ Example 3.14. Consider the wide sequence
483
+ SK1/2
484
+ k
485
+ = {({0, . . . , k − 1}, E); E has a clique of size ⌊k/2⌋ and no other edges}.
486
+ We will check that for an {E}-formula ϕl(x) which states that x forms a clique of size l
487
+ we have
488
+ lim
489
+ k→∞
490
+ Pr
491
+ ω∈SK1/2
492
+ k
493
+ a
494
+ [ω |= ϕl(a)] ≥ (1/2)l.
495
+ Notice that we can compute the probability for a fixed a such that ai ̸= aj whenever
496
+ i ̸= j, since the ratio of tuples containing some vertex twice is infinitesimal. So we have
497
+ Pr
498
+ ω∈SK1/2
499
+ k
500
+ [ω |= ϕl(a)] =
501
+ l−1
502
+
503
+ i=0
504
+
505
+ 1 − k − ⌊k/2⌋
506
+ k − i
507
+
508
+
509
+
510
+ 1 − k − ⌊k/2⌋
511
+ k − l
512
+ �l
513
+
514
+
515
+ 1 −
516
+ 1
517
+ 2(1 − l/k) −
518
+ 1
519
+ k − l
520
+ �l
521
+ 10
522
+
523
+ and since l ∈ N we just take the limit of the inner expression. But one can see that
524
+ limk→∞(1 − l/k) = 1 and that limk→∞(1/(k − l)) = 1.
525
+ Now by Theorem 3.13 we obtain that for any F that contains all constants we have
526
+ lim
527
+ F SK1/2
528
+ n [[(∃x)ϕl(x)]] > 0.
529
+ The following example demonstrates that Theorem 3.11 cannot be generalized to a
530
+ similar hypothesis as Theorem 3.13.
531
+ Example 3.15. Let Gk consist of all undirected graphs on the vertex set {0, . . . , k − 1}
532
+ with exactly ⌈ k(k−1)
533
+ 2 log(k)⌉edges. One can see that
534
+ lim
535
+ k→∞ Pr
536
+ ω���Gk
537
+ x,y
538
+ [ω |= ¬E(x, y)] = 1,
539
+ but in fact limFrud Gn[[(∀x)(∀y)¬E(x, y)]] = 0.
540
+ Let t ∈ M \ N such that n1/t is not bounded above by a standard number. Let T be
541
+ a tree which queries on all paths a fixed set of n1/t different potential edges. If we prove
542
+ that any such set in Gn has to contain at least one edge with probability infinitesimally
543
+ close to 1 then we can construct Frud-vertices α and β using T such that [[E(α, β)]] = 1
544
+ by simply taking T and labeling each leaf on a path which finds an edge with one of the
545
+ vertices incident to this edge.
546
+ Let S be the set of potential edges queried by T and let m =
547
+ �n
548
+ 2
549
+
550
+ . Now we have
551
+ Pr
552
+ ω∈Gn[S contains no edge in ω] =
553
+ (m − n1/t)!(m − ⌈ m
554
+ log n⌉!)
555
+ m!(m − ⌈
556
+ m
557
+ log m⌉ − n1/t)!
558
+ =
559
+ n1/t−1
560
+
561
+ i=0
562
+ m − ⌈ m
563
+ log n⌉ − i
564
+ m − i
565
+
566
+
567
+ 1 −
568
+ ⌈ m
569
+ log n⌉
570
+ m
571
+ �n1/t
572
+
573
+
574
+ 1 −
575
+ 1
576
+ 2 log n
577
+ �n1/t
578
+ standard part of which is for all k ∈ N bounded above by
579
+ st
580
+ ��
581
+ 1 −
582
+ 1
583
+ 2 log n
584
+ �k·2 log n�
585
+ ≤ e−k
586
+ which tends to 0 as k → ∞.
587
+ 11
588
+
589
+ 4
590
+ A wide limit of Leaf instances relative to oracle trees
591
+ The class of total NP search problems TFNP, first defined in [9], consists of all relations
592
+ on binary strings P(x, y) such that:
593
+ • (verifiability in polynomial time) There is a polynomial time machine M which,
594
+ given x, y, can decide whether P(x, y) holds.
595
+ • (totality) There exists a polynomial p and for every x there exists at least one y
596
+ satisfying |y| ≤ p(|x|) such that P(x, y) holds.
597
+ Two particular problems are relevant for us.
598
+ The problem Leaf is formulated as follows. An instance is given by a number k and
599
+ a undirected graph ω on the vertex set {0, . . . , 2|k| − 1}, presented by a Boolean circuit
600
+ of polynomial size in |k| computing its neighborhood function, such that degω(0) = 1
601
+ and ∀v : degω(v) ≤ 2. The task is then to find some nonzero v with degω(v) = 1. The
602
+ corresponding combinatorial principle being the handshaking lemma, which assures the
603
+ problem is total.
604
+ The problem OntoWeakPigeon is formulated as follows.
605
+ An instance is given
606
+ by a number k and two functions A : {0, . . . , 2|k| − 1} → {0, . . . , 2|k|−1 − 1} and B :
607
+ {0, . . . , 2|k|−1 − 1} → {0, . . . , 2|k| − 1}, each presented by a Boolean circuit of polynomial
608
+ size in |k|. The task is then to find some x such that B(A(x)) ̸= x or some y such
609
+ that A(B(y)) ̸= y. The corresponding combinatorial principle being the bijective weak
610
+ pigeonhole principle, which assures the problem is total. The domain of A is twice as
611
+ large as its range, so B and A cannot form a pair of inverse functions between their
612
+ respective domains.
613
+ So far, we presented what is called ‘type 1’ problem in [1]. We are interested about the
614
+ ‘type 2’ problems which replace the input function(s) with oracle(s). So in the ‘type 2’
615
+ Leaf problem, the input is a pair (α, x) where α is an oracle which describes the neighbor
616
+ function on G with vertex set {0, . . . , 2|x| − 1}. For the ‘type 2’ OntoWeakPigeon
617
+ problem, the input is a triple (α, β, x), where α and β are oracles describing the functions
618
+ α : {0, . . . , 2|x| − 1} → {0, . . . , 2|x|−1 − 1} and β : {0, . . . , 2|x|−1 − 1} → {0, . . . , 2|x| − 1}.
619
+ The associated computational models for the ‘type 1’ problems are Turing machines
620
+ and for the ‘type 2’ problems oracle Turing machines.
621
+ 4.1
622
+ The wide limit and oracle trees
623
+ The wide sequence ∗PATHk (pointed paths on k vertices) consists of all undirected graphs
624
+ ω on the vertex set {0, 1, . . . , k − 1} which are isomorphic to a path with k − 1 edges
625
+ connecting all vertices and degω(0) = 1. Graphs in ∗PATHk are ‘the hardest instances
626
+ of Leaf’ so we can expect the wide limit to reflect the complexity of these instances
627
+ relative to the family F we choose.
628
+ Since each ω ∈ ∗PATHk has only k − 1 edges we can proceed similarly to the proof
629
+ of Theorem 3.10 to get the following.
630
+ Lemma 4.1. limFrud ∗PATHn[[(∃x)(∃y)E(x, y)]] = 0
631
+ 12
632
+
633
+ To get a result which reflects the properties of the wide sequence more faithfully we
634
+ will define a new family of random variables on ∗PATHn.
635
+ Definition 4.2. We define Tnb as the set of all labeled rooted trees of the following shape:
636
+ • Each non-leaf node is labeled by some v ∈ {0, . . . , n − 1}.
637
+ • For each {u, w} ⊆ {0, . . . , n − 1} and a node v there is an outgoing edge from v
638
+ labeled {u, w} (it can be that u = w).
639
+ • Each leaf is labeled by some m ∈ M.
640
+ • The depth of the tree is defined as the maximal number of edges in a path from
641
+ the root, and we require it is at most n1/t (rounded to the nearest element of M)
642
+ for some t ∈ M \ N.
643
+ The computation of such a tree in Tnb on ω ∈ ∗PATHn is defined as follows. We
644
+ build a path by starting at the root and interpreting every vertex labeled by some v as
645
+ a question ‘what are the neighbors of the vertex v?’ and we follow the output edge with
646
+ the answer and continue analogously until we find a leaf. The label of the leaf is defined
647
+ to be the output of the computation.
648
+ We define Fnb to be the set of all functions on ∗PATHn which are computed by some
649
+ T ∈ Tnb.
650
+ The trees computing the functions in Fnb can be thought of as a protocol describing
651
+ the behavior of a machine M communicating with an oracle describing a particular
652
+ ω ∈ ∗PATHn. In the study of total NP search problems presented by oracles, we usually
653
+ denote the size of the object by some 2|x| where x is an additional input to the problems.
654
+ If 2|x| = n then n1/t = 2|x|/t which for t ∈ M \ N corresponds to protocols describing
655
+ non-uniform subexponential-time computations. If we prove that no tuple of Fnb-vertices
656
+ satisfies some open {E}-formula in limFnb ∗PATH we also prove that subexponential-time
657
+ oracle machines cannot solve the corresponding type 2 problem on a non-diminishing
658
+ fraction of the inputs. In the rest of this section we proceed to prove that limFnb ∗PATHn
659
+ has no vertex with degree 1 other than the vertex 0.
660
+ To do so, we will consider computations of trees on samples with different nonstandard
661
+ lengths. For the rest of this section we put Gm = ∗PATHm for all m ∈ M, but we can
662
+ assume m to be smaller than n. We define T (m)
663
+ nb
664
+ to be the subset of Tnb consisting of
665
+ all the trees that have the vertex labels from {0, . . . , m − 1}. For trees in T (m)
666
+ nb
667
+ we can
668
+ extend the definition of a computation to input graphs from Gm in a straight forward
669
+ way.
670
+ Definition 4.3. We say a tree T ∈ T (m)
671
+ nb
672
+ fails on ω ∈ Gm if the output of T on ω has
673
+ degree 2.
674
+ Definition 4.4. Let m ∈ M, v ∈ {0, . . . , m − 1} and {u, w} ⊆ {0, . . . , m − 1} we define
675
+ Gv:{u,w}
676
+ m
677
+ = {ω ∈ Gm; ω |= E(v, u) ∧ E(v, w)}.
678
+ 13
679
+
680
+ Lemma 4.5. Let m ∈ M and let u, v and w be distinct elements of {1, . . . , m−1}. Then
681
+ there are bijections:
682
+ Gv:{u,w}
683
+ m
684
+ ∼= Gm−2 × {L, R}
685
+ Gv:{u,0}
686
+ m
687
+ ∼= Gm−2
688
+ Gv:{u}
689
+ m
690
+ ∼= Gm−1
691
+ G0:{u}
692
+ m
693
+ ∼= Gm−1
694
+ Proof. For the first case a bijection can be given as follows.
695
+ Contract u, v and w to
696
+ just one vertex min{u, v, w} and if u is closer to 0 than w pick L otherwise pick R
697
+ and relabel the remaining vertices using a function ‘new’ which has a property that if
698
+ u′, v′ remain and u′ < v′ as numbers then new(u′) < new(w′) and the range of new is
699
+ {0, . . . , m−2}. This can be inverted by first renaming the vertices using new−1 and then
700
+ replacing min{u, v, w} by a path (u, v, w) with the orientation given either by L or R.
701
+ The second bijection is almost the same, but the orientation is clear since u is always
702
+ the neighbor further from 0 since the other neighbor is 0.
703
+ The third and fourth bijections are given by just removing one end of the graph and
704
+ relabeling.
705
+ Definition 4.6. Let m ∈ M and v ∈ {0, . . . , m − 1}.
706
+ Let u and w be elements of
707
+ {0, . . . , m − 1} \ {v} and let T ∈ T (m)
708
+ nb
709
+ be a tree with the root labeled v. By Tv:{u,w} we
710
+ denote the induced subtree whose root is the vertex neighboring the root of T via the
711
+ edge labeled {u, w}.
712
+ Lemma 4.7. Let m ∈ M. Let T ∈ T (m)
713
+ nb
714
+ be a tree with the root labeled v ̸= 0. For
715
+ each u and w which are distinct elements of {0, . . . , m − 1} \ {v} there exists a tree
716
+ ˜Tv:{u,w} ∈ T (m−2)
717
+ nb
718
+ of the same depth as Tv:{u,w} such that
719
+ Pr
720
+ ω∈Gm[Tv:{u,w} fails | ω |= E(v, u) ∧ E(v, w)] =
721
+ Pr
722
+ ω∈Gm−2[ ˜Tv:{u,w} fails].
723
+ If T has the root labeled 0 then there exists a tree ˜T0:{u} ∈ T (m−1)
724
+ nb
725
+ of the same depth
726
+ as T0:{u} such that
727
+ Pr
728
+ ω∈Gm[T0:{u} fails | ω |= E(0, u)] =
729
+ Pr
730
+ ω∈Gm−1[ ˜T0:{u} fails].
731
+ Proof. In the case where the root is labeled by v ∈ {1, . . . , m − 1} we can construct
732
+ the tree ˜Tv:{u,w} by simply relabeling vertices of Tv:{u,w}. We use the relabeling function
733
+ ‘new’ from the proof of Lemma 4.5. Now for every ω ∈ Gm there is by the first bijection in
734
+ Lemma 4.5 a uniquely determined ω′ ∈ Gm−2. The computation of ˜Tv:{u,w} on ω′ is then
735
+ of the same shape as the computation of Tv:{u,w} on ω assuming ω |= E(v, u) ∧ E(v, w).
736
+ And ˜Tv:{u,w}(ω′) has the same degree in ω′ as Tv:{u,w}(ω) does in ω.
737
+ The case where the root is labeled by 0 is analogous, but we instead use the relabeling
738
+ from the fourth bijection in Lemma 4.5.
739
+ 14
740
+
741
+ Lemma 4.8. Let T ∈ T (m)
742
+ nb
743
+ of depth d ∈ M and let d ≤ m. Then we have
744
+ Pr
745
+ ω∈Gm[T fails] ≥
746
+ d
747
+
748
+ i=0
749
+
750
+ 1 −
751
+ 2
752
+ m − 2i − 2
753
+
754
+ .
755
+ Proof. We proceed by induction on d. The case d = 0 follows from
756
+ Pr
757
+ ω∈Gm[T fails] ≥
758
+
759
+ 1 −
760
+ 1
761
+ m − 1
762
+
763
+
764
+
765
+ 1 −
766
+ 2
767
+ m − 2
768
+
769
+ .
770
+ Now for the inductive case we assume the lemma holds for d − 1, and prove it for d. If
771
+ the root of T is labeled 0 we proceed as follows. For a given T let u0 be the vertex which
772
+ minimizes the value Prω∈Gm[T fails | E(0, u0)] which exists by the least number principle
773
+ in M. Then by Lemma 4.7 and the induction hypothesis
774
+ Pr
775
+ ω∈Gm[T fails] ≥
776
+ Pr
777
+ ω∈Gm[T fails | E(0, u0)]
778
+ =
779
+ Pr
780
+ ω∈Gm−1[ ˜T0:{u0} fails]
781
+
782
+ d−1
783
+
784
+ i=0
785
+
786
+ 1 −
787
+ 2
788
+ m − 2i − 3
789
+
790
+
791
+ d
792
+
793
+ i=0
794
+
795
+ 1 −
796
+ 2
797
+ m − 2i − 2
798
+
799
+ .
800
+ Now for the case where the root of T is labeled by nonzero v. First we note that
801
+ Pr
802
+ ω∈Gm[v has degree 2 ∧ ¬E(v, 0)] = 1 −
803
+ 2
804
+ m − 1.
805
+ Now we choose distinct u0, w0 such that they minimize
806
+ Pr
807
+ ω∈Gm[Tv:{u0,w0} fails | E(v, u0) ∧ E(v, w0)].
808
+ Then by the Lemma 4.7 and the induction hypothesis we have
809
+ Pr
810
+ ω∈Gm[T fails] ≥
811
+
812
+ 1 −
813
+ 2
814
+ m − 1
815
+
816
+ Pr
817
+ ω∈Gm[Tv:{u0,w0} fails | E(v, u0) ∧ E(v, w0)]
818
+ =
819
+
820
+ 1 −
821
+ 2
822
+ m − 1
823
+
824
+ Pr
825
+ ω∈Gm−2[ ˜Tv:{u0,w0} fails]
826
+
827
+
828
+ 1 −
829
+ 2
830
+ m − 1
831
+ � d−1
832
+
833
+ i=0
834
+
835
+ 1 −
836
+ 2
837
+ m − 2i − 4
838
+
839
+
840
+
841
+ 1 −
842
+ 2
843
+ m − 1
844
+
845
+ d
846
+
847
+ i=1
848
+
849
+ 1 −
850
+ 2
851
+ m − 2i − 2
852
+
853
+
854
+ d
855
+
856
+ i=0
857
+
858
+ 1 −
859
+ 2
860
+ m − 2i − 2
861
+
862
+ .
863
+ 15
864
+
865
+ Lemma 4.9. Let T ∈ Tnb, then st (Prω∈Gn[T fails]) = 1.
866
+ Proof. The depth of T is bounded by n1/t for some t ∈ M \ N. We have by Lemma 4.8
867
+ that
868
+ Pr
869
+ ω∈Gn[T fails] ≥
870
+ n1/t
871
+
872
+ i=0
873
+
874
+ 1 −
875
+ 2
876
+ n − 2i − 2
877
+
878
+ (1)
879
+
880
+
881
+ 1 −
882
+ 2(n1/t + 1)
883
+ n − 2n1/t − 2
884
+
885
+ (2)
886
+ and the standard part of this lower bound is 1.
887
+ Finally, in the next theorem we prove that a formalization of ‘there is a nonzero
888
+ vertex of degree 1’ is not valid in limFnb ∗PATHn and in fact its boolean value is 0.
889
+ Theorem 4.10.
890
+ lim
891
+ Fnb ∗PATHn[[(∃v)(∃u)(∀w)(v ̸= 0 ∧ E(v, u) ∧ (E(v, w) → w = u))]] = 0
892
+ Proof. By expanding the left-hand side of the statement we get
893
+
894
+ α∈U(Fnb)
895
+
896
+ β∈U(Fnb)
897
+
898
+ γ∈U(Fnb)
899
+ [[α ̸= 0 ∧ E(α, β) ∧ (E(α, γ) → γ = β)]].
900
+ Therefore, it is enough if we prove that for each Fnb-vertices α and β there exists an
901
+ Fnb-vertex γ such that
902
+ [[α ̸= 0 ∧ E(α, β) ∧ (E(α, γ) → γ = β)]] = 0.
903
+ For any α, β ∈ U(Fnb) we can append the tree computing β to every leaf of a tree
904
+ computing α. This is still a tree in Tnb as its depth is at most twice the maximum of
905
+ depths of the original trees. By relabeling the leaves of the resulting tree we can obtain
906
+ a tree computing a function
907
+ γ(ω) =
908
+
909
+ v
910
+ if degω(α(ω)) = 1 and v is the only neighbor of α(ω)
911
+ w
912
+ if degω(α(ω)) = 2, w is a neighbor of α(ω) and w ̸= β(ω).
913
+ This is obviously an Fnb-vertex. Let us assume for contradiction that
914
+ [[α ̸= 0 ∧ E(α, β) ∧ (E(α, γ) → γ = β)]] > 0.
915
+ By definition this gives us
916
+ 0 < st
917
+
918
+ Pr
919
+ ω∈Gn[α(ω) ̸= 0 ∧ Eω(α(ω), β(ω)) ∧ (E(α(ω), γ(ω)) → γ(ω) = β(ω))]
920
+
921
+ ≤ st
922
+
923
+ Pr
924
+ ω∈Gn[α(ω) ̸= 0 ∧ degω(α(ω)) = 1]
925
+
926
+ ,
927
+ but this is in contradiction with Lemma 4.9.
928
+ 16
929
+
930
+ 5
931
+ The expanded model with a Leaf instance without a so-
932
+ lution and with total OntoWeakPigeon
933
+ As a part of the proof of Theorem 4.10 we proved what can be reformulated as the
934
+ statement that oracle instances of Leaf are not in oracle time O(2f(|x|)) with f ∈ o(|x|1/c)
935
+ for every c ∈ N even when we just require it to be correct on any nondiminishing ratio
936
+ of inputs as |x| grows. In this section we proceed to compare strength of (type 2) NP
937
+ search problems not only with oracle FP but also with other NP search problems via
938
+ relative consistency of their totality and nontotality. We will show that there is a model
939
+ of weak second order arithmetic in which the problem Leaf is not total even though
940
+ OntoWeakPigeon is.
941
+ 5.1
942
+ The structures K(F, G)
943
+ We will now recall the construction of second order models of weak arithmetic K(F, G)
944
+ defined in [7, Chapter 5]. We will take the liberty to define them as an extension of
945
+ the definition of a wide limit to obtain structures K(Gn, F, G) 4 which under the right
946
+ conditions result in a structure in some sublanguage of Lall with two sorts: numbers and
947
+ bounded sets of numbers which contains the wide limit as an object of the second sort.
948
+ Definition 5.1. Let L ⊆ Lall. This determines a language L2 which we get by adding
949
+ to L second order variables X, Y, . . . whose intended interpretation are bounded sets and
950
+ the equality symbol for second order variables (denoted the same as the first order one).
951
+ All second order variables are treated as function symbols and can form terms with the
952
+ first order terms as arguments.
953
+ We will also use the second order variables as relation symbols, and we define the
954
+ atomic formula X(x0, . . . , xk−1) simply to be evaluated as the formula X(x0, . . . , xk−1) ̸=
955
+ 0.
956
+ Now we assume we fix a number n, a wide sequence Gk and a family of random
957
+ variables on Gn which all together determine a wide limit limF Gn.
958
+ Definition 5.2. We define Mn ⊆ M to be the subset of M consisting of all numbers
959
+ bounded above by 2n1/t for some t ∈ M \ N.
960
+ Definition 5.3. We define Ln ⊆ Lall to contain all relation symbols from Lall and all
961
+ functions from Lall for which their values on any element of Mn is still in Mn. We say
962
+ F is Ln-closed if for every function symbol f ∈ Ln we have that f(α0, . . . , αk−1) ∈ F.
963
+ Note that Mn is then a substructure of the Ln-reduct of M.
964
+ Definition 5.4. We say that G is a family of random functions (on Gn) if every Θ ∈ G
965
+ assigns to each ω ∈ Gn a function Θω ∈ Mn.
966
+ 4This notation is just making some parameters of the construction explicit, the models constructed
967
+ can be obtained by the original method without first constructing the wide limit. Our contribution is in
968
+ observing that the truth values of first order sentences concerning the wide limit is preserved between
969
+ the wide limit and the structure K(Gn, F, G).
970
+ 17
971
+
972
+ We say G is F-compatible if for every α ∈ F, Θ ∈ G we have that the function Θ(α)
973
+ defined as
974
+ Θ(α)(ω) =
975
+
976
+ Θω(α(ω))
977
+ if α(ω) ∈ dom(Θω)
978
+ 0
979
+ otherwise
980
+ is in fact in F.
981
+ Definition 5.5. Let F be an Ln-closed family of random variables with values in Mn.
982
+ Let G be an F-compatible family of random functions. We define K(Gn, F, G) to be
983
+ a Bn-valued L2
984
+ n structure with first order sort of the universe F and second order sort
985
+ of the universe G. The valuation of formulas is then given by the following inductive
986
+ definition:
987
+ • [[α = β]] = {ω ∈ Gn; α(ω) = β(ω)}/I, where α, β ∈ F
988
+ • [[R(α0, . . . , αk−1)]] = {ω ∈ Gn; ω |= R(α0(ω), . . . , αk−1(ω))}/I, where α0, . . . , αk−1
989
+ are from F and is R a relation symbol in Ln
990
+ • [[Θ = Ξ]] = {ω ∈ Gn; Θω = Ξω}/I, where Θ, Ξ ∈ G
991
+ • [[(∀x)A(x)]] = �
992
+ α∈F [[A(α)]]
993
+ • [[(∃x)A(x)]] = �
994
+ α∈F [[A(α)]]
995
+ • [[(∀X)A(X)]] = �
996
+ Θ∈G [[A(Θ)]]
997
+ • [[(∃X)A(X)]] = �
998
+ Θ∈G [[A(Θ)]].
999
+ 5.2
1000
+ Preservation of sentences concerning the wide limit
1001
+ We will now prove (under a mild condition on F) that in a structure K(Gn, F, G) which
1002
+ represents the wide limit limF Gn by a second order object are the values of all sentences
1003
+ regarding the object the same as in the wide limit. This lets us construct models in
1004
+ which an object elementary equivalent to the wide limit might be desired.
1005
+ Definition 5.6. We say that the edge relation of the wide limit limF Gn is represented
1006
+ in G by Γ if Γ ∈ G and for all α, β ∈ U(F) we have that
1007
+ K(Gn, F, G)[[Γ(α, β)]] = lim
1008
+ F Gn[[E(α, β)]].
1009
+ Definition 5.7. We say a family of random variables F has restrictable ranges if for
1010
+ every α ∈ F and m ∈ Mn there is ˜αm ∈ F such that
1011
+ ˜αm(ω) =
1012
+
1013
+ α(ω)
1014
+ α(ω) < m
1015
+ 0
1016
+ otherwise.
1017
+ 18
1018
+
1019
+ Theorem 5.8. Let ϕ be a {E}-sentence.
1020
+ Let F be Ln-closed and have restrictable
1021
+ ranges and let G be F-compatible. Let the edge relation of the wide limit limF Gn be
1022
+ represented in G by Γ. We define ˜ϕ(Γ) to be the L2
1023
+ n-sentence obtained by replacing
1024
+ all the occurrences of the relation symbol E by Γ, keeping the structure of the logical
1025
+ connectives and replacing all quantifiers (∀x)(. . . ) by (∀x)(x < n → (. . . )) and (∃x)(. . . )
1026
+ by (∃x)(x < n ∧ . . . ).
1027
+ Then we have that for all {E}-sentences that
1028
+ lim
1029
+ F Gn[[ϕ]] = K(Gn, F, G)[[ ˜ϕ(Γ)]].
1030
+ Proof. We will prove that for all {E}-formulas ϕ(x) and all α ∈ F we have that
1031
+ lim
1032
+ F Gn[[ϕ(α)]] = K(Gn, F, G)[[ ˜ϕ(Γ, α)]].
1033
+ We proceed by induction on the complexity of the formula.
1034
+ The case for atomic
1035
+ formulas is clear and the step for logical connectives also since [[ − ]] commutes with
1036
+ them.
1037
+ With the induction step for negation in hand it is now enough to prove the
1038
+ inductive step for the universal quantifier.
1039
+ We assume that the statement works for a formula of lower complexity ϕ(y, x). By
1040
+ the restrictability of ranges in F we get that for all β ∈ F there is ˜βn ∈ U(F) such that
1041
+ K(Gn, F, G)[[ ˜ϕ(Γ, ˜βn, α)]] ≤ K(Gn, F, G)[[β < n → ˜ϕ(Γ, β, α)]].
1042
+ Now we have that for all α ∈ U(F)
1043
+ K(Gn, F, G)[[(∀y) ˜ϕ(Γ, y, α)]] =
1044
+
1045
+ α∈F
1046
+ K(Gn, F, G)[[β < n → ˜ϕ(Γ, β, α)]]
1047
+ =
1048
+
1049
+ ˜βn∈U(F )
1050
+ K(Gn, F, G)[[ ˜ϕ(Γ, ˜βn, α)]]
1051
+ =
1052
+
1053
+ ˜βn∈U(F )
1054
+ lim
1055
+ F Gn[[ϕ(˜βn, α)]]
1056
+ = lim
1057
+ F Gn[[(∀y)ϕ(y, α)]].
1058
+ 5.3
1059
+ Failure of totality of Leaf
1060
+ Now we are in a situation that lets us construct a model of weak second order arithmetic
1061
+ that contains an instance of the problem Leaf without a solution. Consider a suitable
1062
+ family Gnb in which we can define not only the wide limit itself but instances of some
1063
+ other search problem. We can then ask: ‘Do all these instances have a solution?’ This
1064
+ is a way to compare the strength of the different total NP search problems by relative
1065
+ unprovability results. We will pick the family Gnb such that validity of totality of some
1066
+ search problem P implies the nonexistence of a suitable reduction from Leaf to P.
1067
+ 19
1068
+
1069
+ Definition 5.9. Let Gnb be the family of all random functions on ∗PATHn such that for
1070
+ each Θ ∈ Gnb there exists a tuple (γ0, . . . , γm−1) ∈ M so that γi ∈ Fnb and
1071
+ Θ(α)(ω) =
1072
+
1073
+ γα(ω)(ω)
1074
+ α(ω) < m
1075
+ 0
1076
+ otherwise.
1077
+ In the models Mn we are working with there is a pairing function ⟨i, j⟩ which can
1078
+ code pairs of numbers by a single number thus we can represent functions of any finite
1079
+ arity by functions from Gnb.
1080
+ One can understand the tuples which compute the random functions from Gnb as
1081
+ tuples of protocols describing the computations of subexponential oracle machines. Such
1082
+ a tuple defines a function which is at every index of the tuple computed using queries to
1083
+ some ω ∈ ∗PATHn. If we prove that every instance of a search problem P represented
1084
+ by such a tuple has a solution in K(∗PATHn, Fnb, Gnb), and we know that Leaf in
1085
+ K(∗PATHn, Fnb, Gnb) is not total, which implies nonexistence of a subexponential oracle
1086
+ machine which converts solutions of P to solutions of Leaf even on any standard fraction
1087
+ of instances from ∗PATHn and thus a nonexistence of a many-one reduction from Leaf
1088
+ to P as defined in [1].
1089
+ Lemma 5.10.
1090
+ 1. Fnb has restrictable ranges
1091
+ 2. Fnb is Ln-closed
1092
+ 3. Gnb is Fnb-compatible
1093
+ 4. Gnb represents the edge relation of limFnb ∗PATHn.
1094
+ Proof. 1, 2: Here we can proceed simply by relabeling the leaves of the trees computing
1095
+ the functions from Fnb.
1096
+ 3: Assume that Θ ∈ Gnb is computed by a tuple (γ0, . . . , γm−1). By induction in
1097
+ M there exists t ∈ M \ N such that ∀i ∈ {0, . . . , m − 1} the depth of γi is at most
1098
+ n1/t. Therefore, for all α ∈ Fnb we have that Θ(α) has also depth at most n1/t′ for some
1099
+ t′ ∈ M \ N. Thus, Gnb is Fnb-compatible.
1100
+ 4: Let γ⟨i,j⟩ ∈ Fnb be computed by a tree in Tnb which queries i and outputs 1
1101
+ if the neighbor set contains j otherwise it outputs 0. Let Γ be computed by a tuple
1102
+ (γ⟨i,j⟩)n−1
1103
+ i,j=0. Then we have
1104
+ K(∗PATHn, Fnb, Gnb)[[Γ(α, β)]] = lim
1105
+ Fnb ∗PATHn[[E(α, β)]].
1106
+ Definition 5.11. The L2
1107
+ n-formula ϕLeaf(X, Y, m) is defined as the disjunction of the
1108
+ following formulas
1109
+ (X(0) ̸= Y (0) ∨ X(0) = 0)
1110
+ (∃x)((x < m) ∧ (X(x) > m − 1 ∨ Y (x) > m − 1))
1111
+ (∃x)((x < m) ∧ ((X(x) = x ∧ Y (x) ̸= x) ∨ (X(x) ̸= x ∧ Y (x) = x)))
1112
+ (∃x)((x < m) ∧ (Y (X(x)) ̸= x ∧ X(X(x)) ̸= x) ∨ (X(Y (x)) ̸= x ∧ Y (Y (x)) ̸= x)))
1113
+ (∃x)((0 < x < m) ∧ (X(x) = Y (x) ∧ X(x) ̸= x)),
1114
+ 20
1115
+
1116
+ this formula formalizes that if X and Y are functions representing the neighbor set of
1117
+ each x < m as {X(x), Y (x)} \ {x} and 0 has only one neighbor then there has to exist
1118
+ another y < x which also has only one neighbor.
1119
+ Theorem 5.12.
1120
+ K(∗PATHn, F, G)[[(∃X)(∃Y )(∃m)¬ϕLeaf(X, Y, m)]] = 1
1121
+ Proof. We can find Θ1, Θ2 ∈ Gnb such that for each v ∈ {0, . . . , n − 1} we have that
1122
+ {Θ1(v)(ω), Θ2(v)(ω)} is the neighbor set of v on ω ∈ ∗PATHn. (We can just query v and
1123
+ split the answer between Θ1 and Θ2.)
1124
+ By Theorem 4.10 we know that limF Gn has one degree 1 vertex and all other vertices
1125
+ of degree 2 and by Lemma 5.10 we know that it can be represented by some Γ ∈ Gnb.
1126
+ Furthermore, we can verify that
1127
+ [[(Γ(α, β)) ≡ (Θ1(α) = β ∨ Θ2(α) = β)]] = 1,
1128
+ thus Θ1 and Θ2 do not satisfy the last disjunct of ϕLeaf otherwise it would be in contra-
1129
+ diction with Theorem 4.10. By their construction and the definition of ∗PATHk we have
1130
+ that (Θ1, Θ2, n) does not satisfy the other disjuncts either.
1131
+ 5.4
1132
+ Totality of OntoWeakPigeon
1133
+ Definition 5.13. The L2
1134
+ n formula ϕOntoWeakPigeon(X, Y, m) is defined as the disjunc-
1135
+ tion of the following formulas
1136
+ (∃x)((x < 2m) ∧ (X(x) > m − 1))
1137
+ (∃y)((y < m) ∧ Y (y) > m − 1))
1138
+ (∃x)((x < 2m) ∧ Y (X(x)) ̸= x)
1139
+ (∃y)((y < m) ∧ X(Y (y)) ̸= y)
1140
+ it formalizes the bijective weak pigeonhole principle which claims that any pair of func-
1141
+ tions
1142
+ X :{0, . . . , 2m − 1} → {0, . . . , m − 1}
1143
+ Y :{0, . . . , m − 1} → {0, . . . 2m − 1}
1144
+ is not a pair of inverse bijections.
1145
+ To prove that ϕOntoWeakPigeon(X, Y, m) is valid in K(∗PATHn, Fnb, Gnb) we will
1146
+ construct a tree which finds some x such that Yω(Xω(x)) ̸= x or Xω(x) > m − 1 with
1147
+ probability infinitesimally close to one.
1148
+ Definition 5.14. Let Θ, Ξ ∈ Gnb, and ζ ∈ Fnb. We say that a tree T ∈ Tnb fails for
1149
+ (Θ, Ξ, ζ) on ω if
1150
+ Θω(T(ω)) < ζ(ω)
1151
+ and
1152
+ Ξω(Θω(T(ω))) = T(ω).
1153
+ In words if T does not witness the failure of Ξ being the inverse function to Θ.
1154
+ 21
1155
+
1156
+ Lemma 5.15. Let Θ, Ξ ∈ Gnb and ζ ∈ Fnb. Then there is a tree T such that
1157
+ st
1158
+
1159
+ Pr
1160
+ ω∈Gn[T fails for (Θ, Ξ, ζ)]
1161
+
1162
+ = 0.
1163
+ Proof. Without loss of generality we may assume that ζ is actually constant, and its
1164
+ value is r ∈ Mn which we pick to be the least possible output of ζ on any sample.
1165
+ Furthermore, let Θ be computed by (θ0, . . . , θ2r−1) and Ξ by (ξ0, . . . , ξr−1).
1166
+ We construct T by stages and at each stage it will have some potential output. First
1167
+ we notice that at the beginning stage there is at least one i ∈ {0, . . . , 2r − 1} such that
1168
+ the probability that θi < r or ξθi = i is at most 1
1169
+ 2. The tree T0 is thus the constant tree
1170
+ always outputting i.
1171
+ Assume Td−1 have been constructed and pick any path p ∈ Td−1. If p did not fail we
1172
+ leave it as it is otherwise we extend Td−1 along this path and after extending all such
1173
+ paths this will become the new stage Td. The path p has a leaf with some label i. We
1174
+ can check whether i fails by first appending the tree θi to this path and then to each
1175
+ new leaf (labeled with a number < r) appending ξθi, let the leaves which confirm the
1176
+ nonfailure of i be labeled by i. Now consider a path p′ extending p without determined
1177
+ output. We claim that there is j ∈ {0, . . . , 2r − 1} such that
1178
+ Pr
1179
+ Gn[θj < r ∧ ξθj = j | p′ is compatible with ω] ≤ 1
1180
+ 2,
1181
+ where p′ being compatible with ω means that the computation along p′ agrees with the
1182
+ edge labels which would be chosen according to ω.
1183
+ To prove the claim we notice that along p′ it was confirmed that already d-many
1184
+ distinct elements of {0, . . . , 2r − 1} are in bijection with some d-many elements of the
1185
+ set {0, . . . , r − 1}. Therefore, to fail further there are only at most (r − d)-many other
1186
+ values j′ in {0, . . . , 2r−1} for which it holds that ξθj′ = j′. By an analogous argument to
1187
+ the proof of Theorem 3.13 this is enough to show that at least for one of them the claim
1188
+ holds since r−d
1189
+ 2r ≤ 1
1190
+ 2. Thus, we let j to be the label of the leaf of p′ which concludes the
1191
+ construction.
1192
+ Therefore, by construction for each d ∈ Mn, d < 2r we have
1193
+ Pr
1194
+ ω∈Gn[Td fails for (Θ, Ξ, ζ)] ≤ 2−d.
1195
+ If r is in Mn \ N then we put T = Tt′ for any nonstandard t′ such that the depth of
1196
+ T is still bounded by some n1/t, where t ∈ Mn \ N. Otherwise, we put T = T2r−1 and
1197
+ since this tree can go through the whole range of Θ it can never fail.
1198
+ Theorem 5.16.
1199
+ K(∗PATHn, Fnb, Gnb)[[(∀X)(∀Y )(∀m)ϕOntoWeakPigeon(X, Y, m)]] = 1
1200
+ Proof. By Lemma 5.15 we can construct for each (Θ, Ξ, ζ) a tree T which computes some
1201
+ function α which validates the third disjunct of ϕOntoWeakPigeon.
1202
+ 22
1203
+
1204
+ Theorem 5.17. Let ϕ(x) be an L2
1205
+ n-formula with parameters from Fnb and Gnb. Then
1206
+ for every m ∈ Mn the open comprehension principle
1207
+ (∃X)(∀y < m)(X(y) ≡ ϕ(y))
1208
+ and the open induction principle
1209
+ ¬ϕ(0) ∨ ϕ(m) ∨ (∃x < m)(ϕ(x) ∧ ¬ϕ(x + 1))
1210
+ are both valid in K(∗PATH, Fnb, Gnb).
1211
+ Proof. This can be proven completely analogously to [7, Lemma 20.2.5].
1212
+ Compiling the results we have about K(∗PATH, Fnb, Gnb) we get the following.
1213
+ Corollary 5.18. In the structure K(∗PATH, Fnb, Gnb) the following are valid:
1214
+ • open induction with parameters from Fnb and Gnb
1215
+ • open comprehension with parameters from Fnb and Gnb
1216
+ • every instance of OntoWeakPigeon has a solution
1217
+ • there is an instance of Leaf which does not have a solution.
1218
+ Concluding remarks
1219
+ We have to note that the problem OntoWeakPigeon has not been considered in
1220
+ the context of oracle NP search problems and the proof of Theorem 5.16 cannot be
1221
+ adapted to prove that every instance of the stronger WeakPigeon 5 has a solution
1222
+ in K(∗PATH, Fnb, Gnb) because the presence of the inverse function is essential to the
1223
+ construction of the witness.
1224
+ A stronger problem called SourceOrSink is well established in the study of NP
1225
+ search problems (it is the complete problem for PPAD, see [1]) and can be formulated
1226
+ as follows: Given a directed graph ω on the vertex set {0, . . . , 2|x| − 1} with the property
1227
+ that any vertex v has outdegree bounded by 1 and indegree also bounded by 1 and the
1228
+ indegree of the zero vertex is 0 find a nonzero vertex which is either a source or a sink.
1229
+ In the type 2 setting the problem is given by a tuple (α, β, x), where x is a binary string
1230
+ and α and β functions presented by an oracle with domain {0, . . . , 2|x| − 1} computing
1231
+ the potential successor or predecessor of a given vertex.
1232
+ It was established in [1] that Leaf is not many-one reducible to SourceOrSink and
1233
+ therefore this nonreducibility may be reflected in our model K(∗PATH, Fnb, Gnb). The
1234
+ way SourceOrSink is presented is similar to how OntoWeakPigeon is presented,
1235
+ and thus a similar strategy could be potentially used to solve the following problem.
1236
+ Problem. Let ϕSourceOrSink(X, Y, m) be the formula formalizing that (X, Y, m) as an
1237
+ instance of SourceOrSink has a solution. Is it true that
1238
+ K(∗PATH, Fnb, Gnb)[[(∀X)(∀Y )(∀m)ϕSourceOrSink(X, Y, m)]] = 1?
1239
+ 5The problem to witness that α : {0, . . . , 2|x| − 1} → {0, . . . , 2|x|−1 − 1} is not injective.
1240
+ 23
1241
+
1242
+ Acknowledgement
1243
+ This work is based on the author’s master’s thesis [5] which was completed under the
1244
+ supervision of Jan Krajíček. The author also thanks Eitetsu Ken for comments on a draft
1245
+ of this paper.
1246
+ References
1247
+ [1]
1248
+ Paul Beame, Stephen Cook, Jeff Edmonds, Russell Impagliazzo, and Toniann
1249
+ Pitassi.
1250
+ The relative complexity of np search problems.
1251
+ In Proceedings of the
1252
+ Twenty-Seventh Annual ACM Symposium on Theory of Computing, STOC ’95, page
1253
+ 303–314, New York, NY, USA, 1995. Association for Computing Machinery.
1254
+ [2]
1255
+ Ronald Fagin.
1256
+ Probabilities on finite models.
1257
+ The Journal of Symbolic Logic,
1258
+ 41(1):50–58, 1976.
1259
+ [3]
1260
+ Isaac Goldbring. Lecture notes on nonstandard analysis, 2014. Available at https://
1261
+ www.math.uci.edu/~isaac/NSA%20notes.pdf (last accessed 9th of January 2023).
1262
+ [4]
1263
+ J. Hanika. Search problems and Bounded Arithmetic. PhD thesis, Charles University,
1264
+ Prague, 2004.
1265
+ [5]
1266
+ Ondřej Ježil. Pseudofinite structures and limits. Master’s thesis, Charles University,
1267
+ Prague, 2022. Also available in Electronic Colloquium on Computational Complex-
1268
+ ity.
1269
+ [6]
1270
+ Emil Jeřábek. Integer factoring and modular square roots. Journal of Computer
1271
+ and System Sciences, 82(2):380–394, 2016.
1272
+ [7]
1273
+ Jan Krajíček. Forcing with random variables and proof complexity, volume 382 of
1274
+ London Mathematical Society Lecture Note Series.
1275
+ Cambridge University Press,
1276
+ 2011.
1277
+ [8]
1278
+ László Lovász and Balázs Szegedy. Limits of dense graph sequences. Journal of
1279
+ Combinatorial Theory, Series B, 96(6):933–957, 2006.
1280
+ [9]
1281
+ Nimrod Megiddo and Christos H Papadimitriou. On total functions, existence theo-
1282
+ rems and computational complexity. Theoretical Computer Science, 81(2):317–324,
1283
+ 1991.
1284
+ [10] Jaroslav Nešetřil and Patrice Ossona de Mendez.
1285
+ A model theory approach to
1286
+ structural limits. Commentationes Mathematicae Universitatis Carolinae, 53:581–
1287
+ 603, 11 2012.
1288
+ [11] Alexander A. Razborov. Flag algebras. The Journal of Symbolic Logic, 72(4):1239–
1289
+ 1282, 2007.
1290
+ 24
1291
+
2NFRT4oBgHgl3EQfmzfK/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
39A0T4oBgHgl3EQfNf8t/content/tmp_files/2301.02146v1.pdf.txt ADDED
@@ -0,0 +1,3499 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Searching for Lindbladians obeying local conservation laws and showing thermalization
2
+ Devashish Tupkary,1, ∗ Abhishek Dhar,2, † Manas Kulkarni,2, ‡ and Archak Purkayastha3, 4, 5, §
3
+ 1Institute for Quantum Computing and Department of Physics and Astronomy,
4
+ University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1
5
+ 2International Centre for Theoretical Sciences, Tata Institute of Fundamental Research, Bangalore 560089, India
6
+ 3Department of Physics, Indian Institute of Technology, Hyderabad 502285, India
7
+ 4Centre for complex quantum systems, Aarhus University, Nordre Ringgade 1, 8000 Aarhus C, Denmark
8
+ 5School of Physics, Trinity College Dublin, College Green, Dublin 2, Ireland
9
+ We investigate the possibility of a Markovian quantum master equation (QME) that consistently
10
+ describes a finite-dimensional system, a part of which is weakly coupled to a thermal bath. In order
11
+ to preserve complete positivity and trace, such a QME must be of Lindblad form. For physical con-
12
+ sistency, it should additionally preserve local conservation laws and be able to show thermalization.
13
+ First, we show that the microscopically derived Redfield equation (RE) violates complete positivity
14
+ unless in extremely special cases. We then prove that imposing complete positivity and demanding
15
+ preservation of local conservation laws enforces the Lindblad operators and the lamb-shift Hamil-
16
+ tonian to be ‘local’, i.e, to be supported only on the part of the system directly coupled to the
17
+ bath. We then cast the problem of finding ‘local’ Lindblad QME which can show thermalization
18
+ into a semidefinite program (SDP). We call this the thermalization optimization problem (TOP).
19
+ For given system parameters and temperature, the solution of the TOP conclusively shows whether
20
+ the desired type of QME is possible up to a given precision. Whenever possible, it also outputs a
21
+ form for such a QME. For a XXZ chain of few qubits, fixing a reasonably high precision, we find
22
+ that such a QME is impossible over a considerably wide parameter regime when only the first qubit
23
+ is coupled to the bath. Remarkably, we find that when the first two qubits are attached to the bath,
24
+ such a QME becomes possible over much of the same paramater regime, including a wide range of
25
+ temperatures.
26
+ I.
27
+ INTRODUCTION
28
+ A small finite-dimensional quantum system, a part of
29
+ which is weakly coupled to a macroscopic thermal bath,
30
+ is expected to thermalize to the temperature of the bath.
31
+ Describing this dynamics is relevant across various fields
32
+ in quantum science and technology, including quantum
33
+ information and thermodynamics [1], quantum optics [2],
34
+ quantum chemistry [3], engineering [4] and biology [5].
35
+ In absence of coupling to the macroscopic thermal bath,
36
+ the dynamics of the density matrix of the system is gov-
37
+ erned by the Heisenberg equation of motion. This unitary
38
+ evolution is Markovian.
39
+ When coupled to the macro-
40
+ scopic thermal bath, the dynamics becomes non-unitary,
41
+ described by a quantum master equation (QME) [6–8].
42
+ We investigate whether it is possible to have a physically
43
+ consistent Markovian QME describing such dynamics. In
44
+ order to do so, we are led to introduce the “thermaliza-
45
+ tion optimization problem” (TOP). This is a semidefinite
46
+ program (SDP), the output of which conclusively shows
47
+ whether, for given system parameters and temperature,
48
+ such a QME is possible, up to given precision. When-
49
+ ever possible, the output also yields one possible form
50
+ for such a QME. Whenever impossible, it means that,
51
+ for such parameters, the dynamics cannot be described
52
53
54
55
56
+ FIG. 1. Schematic of the setup we consider: an arbitrary fi-
57
+ nite dimensional system described by Hamiltonian HS, a part
58
+ of which is weakly coupled to a thermal bath at inverse tem-
59
+ perature β. The Hilbert space of the system, HS is divided
60
+ into a part HL which directly couples to the bath, and the
61
+ remaining part HM.
62
+ by any Markovian QME even at weak system-bath cou-
63
+ pling, and therefore must have some non-Markovian char-
64
+ acter. The SDP can be solved using standard packages
65
+ in high-level computing.
66
+ We note that, while SDP is
67
+ widely used in many branches of quantum information
68
+ and communication [9, 10], and also in quantum chem-
69
+ istry [11, 12], it has been combined with open quantum
70
+ system techniques in only few previous works [13–15], in
71
+ very different contexts.
72
+ It was shown by Gorini, Kossakowski, Sudarshan, and
73
+ arXiv:2301.02146v1 [quant-ph] 5 Jan 2023
74
+
75
+ Hilbert space Hl
76
+ Hilbert space HM
77
+ Hilbert space Hs = HL HM, Hamiltonian Hs2
78
+ Lindblad (GKSL) [16–18] that any QME that preserves
79
+ complete positivity and trace of the density matrix, and
80
+ describes Markovian dynamics has to be of the form
81
+ ∂ρ
82
+ ∂t = i[ρ, HS + HLS] + D(ρ),
83
+ D(ρ) =
84
+ d2−1
85
+
86
+ λ=1
87
+ γλ
88
+
89
+ LλρL†
90
+ λ − 1
91
+ 2{L†
92
+ λLλ, ρ}
93
+
94
+ ,
95
+ γλ ≥ 0,
96
+ (1)
97
+ which is commonly called the Lindblad equation.
98
+ In
99
+ Eq. (1), ρ is the density matrix of the system, d is the
100
+ Hilbert space dimension of the system, HS is the sys-
101
+ tem Hamiltonian, HLS is the Lamb shift Hamiltonian,
102
+ Lλ are the Lindblad operators, γλ are the rates, and
103
+ D(ρ) is called the “dissipator” term. The preservation
104
+ of complete positivity condition is enforced by demand-
105
+ ing γλ ≥ 0. Lindblad equations have been extensively
106
+ used in studying both theoretical and experimental se-
107
+ tups [6–8, 19–22].
108
+ Given this enormous scope of application, it is of
109
+ paramount importance to assess the conditions under
110
+ which such a Markovian description emerges from a more
111
+ microscopic theory.
112
+ The standard way to microscopi-
113
+ cally obtain a Markovian QME is to consider the global
114
+ Hamiltonian of the system weakly coupled to baths, and
115
+ to trace out the baths perturbatively to the leading or-
116
+ der. Starting with this microscopic viewpoint, it becomes
117
+ clear that only having an equation in the Lindblad form
118
+ is not sufficient, there are some additional fundamental
119
+ requirements for physical consistency [23].
120
+ In particu-
121
+ lar, one must preserve local conservation laws, and if the
122
+ steady state is unique, the system is not driven and all
123
+ baths have same temperature, the system must thermal-
124
+ ize to the temperature of the baths. It would be useful to
125
+ have a QME which, by construction, is of Lindblad form
126
+ and satisfy these additional requirements. In this paper,
127
+ we systematically go about searching for such a QME for
128
+ a setup where a part of the system is coupled to a single
129
+ bath (see Fig. 1). This is done in three steps, each step
130
+ having important consequences:
131
+ 1. The microscopically derived quantum master equa-
132
+ tion to the leading order in system-bath coupling
133
+ is the so-called Redfield equation (RE) [6].
134
+ The
135
+ RE has been shown to preserve local conservation
136
+ laws and be able to show thermalization [23]. Here,
137
+ we provide an explicit, model independent proof
138
+ that the RE necessarily violates complete positiv-
139
+ ity unless the Redfield dissipator happens to act
140
+ “locally”, meaning it is identity on the part of the
141
+ system that is not directly coupled to the bath. Al-
142
+ though the violation of complete positivity by RE
143
+ has been previously demonstrated in specific exam-
144
+ ples [24–30], we are unaware of any previous work
145
+ with such a model independent explicit proof.
146
+ 2. We then prove that enforcing complete positivity
147
+ condition γλ ≥ 0 and preservation of local conser-
148
+ vation laws necessarily requires the Lindblad oper-
149
+ ators and the Lamb shift Hamiltonian to be “lo-
150
+ cal”. That is, they must act only on the part of
151
+ the system coupled to the bath, and be identity
152
+ on the part of the system that is not connected to
153
+ the bath. This directly rules out the possibility of
154
+ any so-called ‘global’ Lindblad equation, such as
155
+ the eigenbasis Lindblad equation [6, 8], the Uni-
156
+ versal Lindblad Equation [31] to be consistent with
157
+ local conservation laws.
158
+ 3. Given the restriction of the dissipator and the
159
+ Lamb shift Hamiltonian to be “local’, we devise
160
+ a numerical technique using SDP to check conclu-
161
+ sively in a case-by-case basis whether such a QME
162
+ can show thermalization in a particular situation.
163
+ We call this the TOP. We use this method to study
164
+ the case of a XXZ chain of few qubits with a part
165
+ of it coupled to a bath. If the bath is coupled only
166
+ to the first qubit, our method conclusively shows
167
+ that over a large regime of system parameters and
168
+ temperature, no such QME exists.
169
+ However, re-
170
+ markably if the bath is coupled to two qubits of
171
+ the chain, up to a chosen precision, our method
172
+ shows that a Marovian QME respecting all condi-
173
+ tions becomes possible over a considerable regime
174
+ of parameters, including a wide range of tempera-
175
+ tures. Note that the RE for the XXZ chain does
176
+ show thermalization and preserve local conserva-
177
+ tion laws [23], even when only one qubit is attached
178
+ to a bath. But it is not completely positive.
179
+ This work is organized as follows. In Sec. II we ex-
180
+ plain the setup studied in this work, derive the Redfield
181
+ equation for our setup, and show that it will necessarily
182
+ violate complete positivity, unless the Redfield dissipa-
183
+ tor happens to act “locally”.
184
+ In Sec. III we consider
185
+ quantum master equations preserving complete positiv-
186
+ ity and obeying local conservation laws, and show that
187
+ such equations must have a dissipator and Lamb shift
188
+ operator that acts only on the part of the system cou-
189
+ pled to the bath. In Sec. IV we discuss the possibility of
190
+ QMEs respecting complete positivity, local conservation
191
+ laws and being able to show thermalization. We intro-
192
+ duce the TOP, and use it in the specific case of the few
193
+ site XXZ chain with one or two sites attached to bath.
194
+ In Sec. V we summarize our results, and discuss future
195
+ directions. Certain details are delegated to the appen-
196
+ dices.
197
+ II.
198
+ THE MODEL AND REDFIELD
199
+ DESCRIPTION
200
+ Our setup is described schematically in Fig. 1. The
201
+ full Hamiltonian be given by
202
+ H = HS + ϵHSB + HB,
203
+ (2)
204
+ where HS and HB are the Hamiltonians of the system
205
+ and bath respectively, ϵ ≪ 1 is a small dimensionless pa-
206
+
207
+ 3
208
+ rameter controlling system-bath coupling strength, and
209
+ HSB is the system-bath coupling Hamiltonian. At initial
210
+ time, the system is considered to be in an arbitrary ini-
211
+ tial state ρ(0), while the bath is in a thermal state with
212
+ inverse temperature β
213
+ ρtot(0) = ρ(0) ⊗ ρB,
214
+ ρB = e−βHB
215
+ ZB
216
+ .
217
+ (3)
218
+ Starting with this initial state, the whole set-up of the
219
+ system and the bath is evolved with the full Hamiltonian
220
+ H, and the bath degrees of freedom are traced out to
221
+ obtain the state of the system,
222
+ ρ(t) = TrB
223
+
224
+ e−iHtρtot(0)eiHt�
225
+ ,
226
+ (4)
227
+ where TrB(. . .) denotes trace over bath degrees of free-
228
+ dom.
229
+ The Eq. (4), by construction, is a completely
230
+ positive trace preserving (CPTP) map from ρ(0) to
231
+ ρ(t) [6, 7].
232
+ Without any loss of generality, we assume
233
+ TrB(HSBρB) = 0, where TrB(. . .) denotes trace over
234
+ bath degrees of freedom [6, 7].
235
+ The effective equation
236
+ of motion for the system density matrix written to the
237
+ leading order in system-bath coupling strength ϵ is the
238
+ RE, given by, [6],
239
+ ∂ρ
240
+ ∂t =i[ρ(t), HS]
241
+ +ϵ2
242
+ � ∞
243
+ 0
244
+ dt′ TrB[HSB, [HSB(−t′), ρ(t) ⊗ ρB]],
245
+ (5)
246
+ where
247
+ HSB(t) = ei(HS+HB)tHSBe−i(HS+HB)t
248
+ (6)
249
+ and ρB is the state of the bath. In complete generality,
250
+ we can write the system-bath coupling Hamiltonian as
251
+ HSB =
252
+
253
+ l
254
+ (SlB†
255
+ l + S†
256
+ l Bl),
257
+ (7)
258
+ where Sl and Bl are operators on the system and bath
259
+ respectively, and l can be summed over as many indices as
260
+ required for HSB. Using Eq.(7) in Eq.(5) and simplifying,
261
+ we have
262
+ ∂ρ
263
+ ∂t = i[ρ(t), HS] + ϵ2� �
264
+ l
265
+
266
+ S†
267
+ l , S(1)
268
+ l
269
+ ρ(t)
270
+
271
+
272
+
273
+ S†
274
+ l , ρ(t)S(2)
275
+ l
276
+
277
+ + H.c
278
+
279
+ ,
280
+ (8)
281
+ where
282
+ S(1)
283
+ l
284
+ =
285
+
286
+ m
287
+ � ∞
288
+ 0
289
+ dt′ Tr
290
+
291
+ BlB†
292
+ m(−t′)ρB
293
+
294
+ Sm(−t′)
295
+ +
296
+
297
+ m
298
+ � ∞
299
+ 0
300
+ dt′ Tr
301
+
302
+ BlBm(−t′)ρB
303
+
304
+ S†
305
+ m(−t′)
306
+ S(2)
307
+ l
308
+ =
309
+
310
+ m
311
+ � ∞
312
+ 0
313
+ dt′ Tr
314
+
315
+ B†
316
+ m(−t′)BlρB
317
+
318
+ Sm(−t′)
319
+ +
320
+
321
+ m
322
+ � ∞
323
+ 0
324
+ dt′ Tr
325
+
326
+ Bm(−t′)BlρB
327
+
328
+ S†
329
+ m(−t′).
330
+ (9)
331
+ Since the actual microscopic evolution is given by a
332
+ CPTP map [see Eqs. (3), (4)], one might naively expect
333
+ that the evolution obtained from the microscopically de-
334
+ rived RE respects complete positivity. However, as we
335
+ prove in the next subsection in generality, unless in ex-
336
+ tremely special cases, the RE violates complete positivity.
337
+ A.
338
+ Violation of complete positivity in Redfield
339
+ equation
340
+ 1.
341
+ Choosing an operator Basis
342
+ As shown in Fig. 1, we consider only a part of the sys-
343
+ tem is coupled to the bath.
344
+ Let us denote HL as the
345
+ Hilbert space of that part of the system that couples to
346
+ the bath, and let HM be the Hilbert space of the re-
347
+ maining part of the system. In mathematical terms, this
348
+ means that any operator OM in the Hilbert space HM
349
+ commutes with the system-bath coupling Hamiltonian
350
+ HSB,
351
+ [OM, HSB] = 0.
352
+ (10)
353
+ The system Hamiltonian can then be written as
354
+ HS = HL + HLM + HM,
355
+ (11)
356
+ where the Hamiltonian HL is in Hilbert space HL, the
357
+ Hamiltonian HM is in Hilbert space HM, and HLM gives
358
+ the coupling between the two Hilbert spaces. Note that
359
+ we do not consider this coupling to be small.
360
+ Let the dimension of HL and HM be dL and dM re-
361
+ spectively. Then, one can pick an orthonormal basis of
362
+ operators {fi} and {gj} on HL and HM respectively,
363
+ where 1 ≤ i ≤ d2
364
+ L and 1 ≤ j ≤ d2
365
+ M, and where or-
366
+ thonormality is defined according to the Hilbert Schmidt
367
+ inner product given by ⟨A, B⟩ = Tr[A†B]. One can al-
368
+ ways choose this basis such that fd2
369
+ L = IL/√dL and
370
+ gd2
371
+ M = IM/√dM, where IM and IL are the identity op-
372
+ erators on those spaces. Such a basis is required by the
373
+ GKSL theorem [6, 7, 16, 18]. Taking the tensor prod-
374
+ uct of these two basis, one can obtain an orthonormal
375
+ basis {Fk} = {fi} ⊗ {gj} for operators on HS, with
376
+ Fd2
377
+ Ld2
378
+ M = IS/
379
+
380
+ d, where d = dLdM is the dimension of
381
+ the system Hilbert space. Without loss of generality, the
382
+ Lindblad equation [Eq. (1)] written in this basis is given
383
+ by
384
+ ∂ρ
385
+ ∂t = i[ρ, HS + HLS] +
386
+ d2−1
387
+
388
+ α,˜α=1
389
+ Γα˜α
390
+
391
+ F˜αρF †
392
+ α − {F †
393
+ αF˜α, ρ}
394
+ 2
395
+
396
+ ,
397
+ (12)
398
+ where complete positivity of ρ is preserved iff Γ is positive
399
+ semidefinite [6, 7]. Eq. (12) can be turned into Eq. (1)
400
+ by diagonalizing the matrix Γ.
401
+ The complete positivity of RE can be checked by tak-
402
+ ing the RE to the same form as Eq.(12) and checking if
403
+ the corresponding Γ is positive semidefinite. To do so,
404
+
405
+ 4
406
+ let us relabel the indices so that Fi = fi ⊗ IM/√dM for
407
+ 1 ≤ i ≤ d2
408
+ L − 1. This allows us to expand the system
409
+ operators in Eq. (8) as,
410
+ Sl =
411
+ d2
412
+
413
+ α=1
414
+ alαFα,
415
+ S†
416
+ l =
417
+ d2
418
+
419
+ α=1
420
+ a′
421
+ lαFα,
422
+ S(1)
423
+ l
424
+ =
425
+ d2
426
+
427
+ α=1
428
+ blαFα,
429
+ S(1)†
430
+ l
431
+ =
432
+ d2
433
+
434
+ α=1
435
+ b′
436
+ lαFα,
437
+ S(2)
438
+ l
439
+ =
440
+ d2
441
+
442
+ α=1
443
+ clαFα,
444
+ S(2)†
445
+ l
446
+ =
447
+ d2
448
+
449
+ α=1
450
+ c′
451
+ lαFα,
452
+ (13)
453
+ where alα = a′
454
+ lα = 0, ∀
455
+ d2
456
+ L ≤ α ≤ d2 −1 since Sl and S†
457
+ l
458
+ are identity on HM. Substituting Eq. (13) into Eq. (8),
459
+ we obtain
460
+ ∂ρ
461
+ ∂t = i[ρ, HS] − ϵ2 �
462
+ l
463
+ d2
464
+
465
+ α,˜α=1
466
+
467
+ a��
468
+ lαbl˜α[F †
469
+ α, F˜αρ]
470
+ + c′∗
471
+ lαa′
472
+ l˜α[ρF †
473
+ α, F˜α] + b∗
474
+ lαal˜α[ρF †
475
+ α, F˜α] + a′∗
476
+ lαc′
477
+ l˜α[F †
478
+ α, F˜αρ]
479
+
480
+ .
481
+ (14)
482
+ Using some straightforward algebra (see Appendix A),
483
+ Eq. (14) can be simplified to
484
+ ∂ρ
485
+ ∂t = i[ρ, HS + HLS] +
486
+ d2−1
487
+
488
+ α,˜α=1
489
+ Γα˜α
490
+
491
+ F˜αρF †
492
+ α − {F †
493
+ αF˜α, ρ}
494
+ 2
495
+
496
+ ,
497
+ (15)
498
+ where Γα˜α is a (d2 −1)×(d2 −1) hermitian matrix given
499
+ by
500
+ Γα˜α = ϵ2 �
501
+ l
502
+ (a∗
503
+ lαbl˜α + c′∗
504
+ lαa′
505
+ l˜α + b∗
506
+ lαal˜α + a′∗
507
+ lαc′
508
+ l˜α),
509
+ (16)
510
+ where x∗ in Eq. (16) denotes the complex conjugate of x,
511
+ and the expression of HLS that appears in Eq. (15) can
512
+ be found in Appendix A. Since Eq. (16) is of the form in
513
+ Eq. (12), the condition for preserving complete positivity
514
+ of ρ is equivalent to Γ being positive semidefinite.
515
+ 2.
516
+ The dissipator
517
+ Let us now look at Γα˜α from Eq. (16). Recall from
518
+ Sec. II A 1, that if α ≥ d2
519
+ L, then alα = a′
520
+ lα = 0. Therefore,
521
+ Γα˜α = 0 when α, ˜α ≥ d2
522
+ L, and has the following structure:
523
+ Γ =
524
+
525
+ Γα,˜α<d2
526
+ L
527
+ Γα<d2
528
+ L,˜α≥d2
529
+ L
530
+ Γα≥d2
531
+ L,˜α<d2
532
+ L
533
+ 0
534
+
535
+ .
536
+ (17)
537
+ In general, the off-diagonal blocks Γα<d2
538
+ L,˜α≥d2
539
+ L, and
540
+ Γα≥d2
541
+ L,˜α<d2
542
+ L will not be identically zero.
543
+ The RE will
544
+ preserve complete positivity if and only if the matrix
545
+ Γ is positive semidefinite. To move forward we will re-
546
+ quire the following Lemma concerning positive semidefi-
547
+ nite matrices.
548
+ Lemma 1 Let M be any positive semidefinite matrix,
549
+ such that Mjj = 0. Then, ∀i it must be the case that
550
+ Mij = Mji = 0. Thus, if a positive semidefinite matrix
551
+ has a zero as its jth diagonal element, then the entire jth
552
+ row and jth column must consist of zeros.
553
+ Proof : For a matrix M to be positive semidefinite, it
554
+ is necessary that every 2 × 2 matrix (M ′) of the form
555
+ M ′ =
556
+ � Mii Mij
557
+ Mji Mjj
558
+
559
+ (18)
560
+ is positive semidefinite. Otherwise there would exist a
561
+ vector |v′⟩ such that ⟨v′| M ′ |v′⟩ < 0. Then, there would
562
+ exist a vector |v⟩ which is non-zero only on the ith and
563
+ jth entries, such that ⟨v| M |v⟩ = ⟨v′| M ′ |v′⟩ < 0.
564
+ If
565
+ Mjj = 0, the eigenvalues of M ′ are given by solving the
566
+ characteristic equation: λ2 − Miiλ − MijMji = 0. Since
567
+ M is hermitian, for both eigenvalues to be non-negative,
568
+ it must be the case that Mij = Mji = 0.
569
+ Applying Lemma 1 to Eq. (17), we find that Γ can
570
+ be positive semidefinite only if the off-diagonal blocks
571
+ Γα<d2
572
+ L,˜α≥d2
573
+ L and Γα≥d2
574
+ L,˜α<d2
575
+ L are zero. Since this is not
576
+ generically true for RE, we have shown that the RE equa-
577
+ tion for any generic setup where the bath only couples
578
+ to a part of the system violates complete positivity. An
579
+ important exception here are situations where the RE
580
+ happens to be such that the off-diagonal blocks in Γ are
581
+ identically zero. In such cases, the RE dissipator consists
582
+ of operators of the form fi ⊗ IM/√dM, and acts only
583
+ the part of the system connected to the bath. However,
584
+ such situations can be expected to arise in only some ex-
585
+ tremely special cases. Even in such situations, RE may
586
+ or may not preserve complete positivity, depending on
587
+ Γα<d2
588
+ L,˜α<d2
589
+ L. Thus we have rigorously shown that for se-
590
+ tups where the bath couples to only a part of the system,
591
+ the RE will violate complete positivity unless its dissipa-
592
+ tor is “local” and acts only on the part of the system
593
+ that is connected to the bath. We also see from Eq. (16),
594
+ that both the positive and negative eigenvalues of the Γ
595
+ matrix can be the same order in system-bath coupling,
596
+ i.e O(ϵ2).
597
+ We stress that although it is known that RE does not
598
+ conserve complete positivity, most previous works show
599
+ this via specific examples (for instance, [24, 25, 30, 32]).
600
+ To the best of our knowledge, we are not aware of a
601
+ proof of violation of complete positivity via the explicit,
602
+ model independent construction as shown above. In Ap-
603
+ pendix B, we give a concrete example of a two-qubit XXZ
604
+ system with the first qubit connected to the bath. We
605
+ indeed find that the matrix Γ for this specific example
606
+ has the expected structure from Eq. (17), and negative
607
+ eigenvalues.
608
+ A natural question that arises, is how one could recover
609
+ complete positivity of RE via a suitable approximation to
610
+ the RE. In order to recover complete positivity, one must
611
+ change Γα˜α to some �Γα˜α that is positive semidefinite. By
612
+ the above discussion, for any ˜α ≥ d2
613
+ L, this will require
614
+ either (i) making �Γαα > 0, ∀α > d2
615
+ L or (ii) making �Γα˜α =
616
+
617
+ 5
618
+ 0 ∀α < d2
619
+ L. We will see in the next section (Sec. III) that
620
+ any equation with (i), will violate local conservation laws.
621
+ III.
622
+ LINDBLAD DESCRIPTIONS OBEYING
623
+ LOCAL CONSERVATION LAWS
624
+ A.
625
+ Local conservation laws
626
+ Let us make precise what we mean by preservation of
627
+ local conservation laws. For our setup, since the bath
628
+ only acts on HL part of the system, any operator on
629
+ HM commutes with the system-bath coupling Hamilto-
630
+ nian HSB (see Eq. (10), Fig. 1). So, writing down the
631
+ Heisenberg equation of motion with respect to the full
632
+ Hamiltonian H [Eq. (2)], and using Eq. (10), we see that
633
+ the dynamical equation for the expectation value of any
634
+ observable OM on HM is given by
635
+ d
636
+ dt ⟨IL ⊗ OM⟩ = −i ⟨[IL ⊗ OM, HS]⟩
637
+ (19)
638
+ where ⟨X⟩ = Tr[Xρ]. Any effective QME obtained by
639
+ integrating out the bath should satisfy this property. We
640
+ call QMEs satisfying this property as ones preserving lo-
641
+ cal conservation laws. The justification for this name be-
642
+ comes clear if we look at an operator in HM that would
643
+ remain conserved if there is coupling with HL, i.e, if HLM
644
+ in Eq.(11) is zero. One such operator is the Hamiltonian
645
+ HM. The dynamical equation for expectation value of
646
+ HM gives the energy continuity equation
647
+ d
648
+ dt ⟨HM⟩ = JL→M,
649
+ JL→M = −i ⟨[HM, HLM]⟩ .
650
+ (20)
651
+ Here, JL→M can be interpreted as the energy current
652
+ from the region L to the region M (see Fig. 1). In steady
653
+ state, the rate of change of any system operator is zero.
654
+ From above equation, this gives, JL→M = 0 in steady
655
+ state. Thus, steady state energy current inside the sys-
656
+ tem is zero. This is a statement of local conservation of
657
+ energy and is one of the fundamental physical require-
658
+ ments for a system coupled to a single bath that follows
659
+ from the more general requirement Eq. (19).
660
+ Importantly, the RE, i.e, Eq. (5), can be shown to sat-
661
+ isfy Eq. (19) [23] and thereby preserves local conservation
662
+ laws. We can write any QME to leading order in system
663
+ bath coupling as
664
+ ∂ρ
665
+ ∂t = L0(ρ) + ϵ2L2(ρ),
666
+ (21)
667
+ where L0(ρ) = i[ρ, HS] and L2(ρ) contains both the dis-
668
+ sipator and the Lamb-shift Hamiltonian. Computing the
669
+ left hand size of Eq. (19) using Eq. (21), and comparing
670
+ with the right hand size of Eq. (19), we obtain [23],
671
+ Tr[(IM ⊗ OM)L2(ρ)] = 0.
672
+ (22)
673
+ This is a necessary condition for satisfying local conser-
674
+ vation laws. If we now further restrict the QME to be of
675
+ Lindblad form, i.e, of the form Eq. (1), thereby respecting
676
+ complete positivity, we obtain the following theorem.
677
+ Theorem 2 Any QME of Lindblad form Eq. (1) (thereby
678
+ satisfying complete positivity) that also satisfies local con-
679
+ servation laws must have the Lindblad operators and the
680
+ Lamb-shift Hamiltonian acting only on the part of the
681
+ system connected to the bath. That is, Lλ = LL
682
+ λ ⊗ IM,
683
+ HLS = HL
684
+ LS ⊗IM, where LL
685
+ λ, HL
686
+ LS act only on the Hilbert
687
+ space HL which is coupled to the bath by system-bath cou-
688
+ pling Hamiltonian HSB, and IM is the identity on the
689
+ remaining of the system Hilbert space HM.
690
+ In the next subsection, we give the proof of this theorem.
691
+ B.
692
+ Proof of theorem 2
693
+ We start by writing the most general Lindblad equa-
694
+ tion in the basis of Sec. II A 1,
695
+ ∂ρ
696
+ ∂t = i[ρ, HS + �HLS] +
697
+ d2−1
698
+
699
+ α,˜α=1
700
+ �Γα˜α
701
+
702
+ F˜αρF †
703
+ α − {F †
704
+ αF˜α, ρ}
705
+ 2
706
+
707
+ (23)
708
+ where �HLS is some Lamb shift Hamiltonian, and �Γ is a
709
+ positive semidefinite matrix. As mentioned before, this
710
+ form can be reduced to the form of Eq.(1) by transform-
711
+ ing to a basis where matrix �Γ is diagonal. So, it suffices to
712
+ work with this form. Since Fi = fi ⊗ IM for 1 ≤ i < d2
713
+ L,
714
+ the condition for the Lindblad operators to act only on
715
+ HL then translates to the matrix �Γ being of the form
716
+ �Γ =
717
+ � �Γα,˜α<d2
718
+ L 0
719
+ 0
720
+ 0
721
+
722
+ .
723
+ (24)
724
+ In the following we prove that in order to preserve local
725
+ conservation laws the matrix �Γ must be of this form.
726
+ 1.
727
+ The restriction on �Γ
728
+ Writing down the evolution of any observable IL ⊗OM
729
+ for Eq. (23), we have
730
+ d ⟨IL ⊗ OM⟩
731
+ dt
732
+ = −i ⟨[IL ⊗ OM, HS]⟩ − i ⟨[IL ⊗ OM, �HLS]⟩
733
+ +
734
+ d2
735
+ L−1
736
+
737
+ α=1
738
+ d2−1
739
+
740
+ ˜α=d2
741
+ L
742
+ �Γα˜α
743
+ 2
744
+ ⟨[IL ⊗ OM, F †
745
+ αF˜α]⟩
746
+ +
747
+ d2−1
748
+
749
+ α=d2
750
+ L
751
+ d2
752
+ L−1
753
+
754
+ ˜α=1
755
+ �Γα˜α
756
+ 2
757
+ ⟨[F †
758
+ αF˜α, IL ⊗ OM]⟩
759
+ +
760
+ d2−1
761
+
762
+ α,˜α=d2
763
+ L
764
+
765
+ �Γα˜α
766
+
767
+ ⟨F †
768
+ α(IL ⊗ OM)F˜α⟩ − 1
769
+ 2 ⟨(IL ⊗ OM)F †
770
+ αF˜α⟩
771
+ − 1
772
+ 2 ⟨F †
773
+ αF˜α(IL ⊗ OM)⟩
774
+
775
+ (25)
776
+
777
+ 6
778
+ where ⟨X⟩ denotes the expectation value of X given by
779
+ Tr[Xρ], and we use the fact that [Fi, IL ⊗ OM] = 0 when
780
+ i < d2
781
+ L. We can combine all commutators in above equa-
782
+ tion into a single commutator with an effective Lamb-
783
+ shift like Hamiltonian, which we denote �H(2)
784
+ LS. This gives
785
+ d ⟨IL ⊗ OM⟩
786
+ dt
787
+ = −i ⟨[IL ⊗ OM, HS + �H(2)
788
+ LS]⟩
789
+ +
790
+ d2−1
791
+
792
+ α,˜α=d2
793
+ L
794
+ �Γα˜α
795
+
796
+ ⟨F †
797
+ α(IL ⊗ OM)F˜α⟩ − 1
798
+ 2 ⟨(IL ⊗ OM)F †
799
+ αF˜α⟩
800
+ − 1
801
+ 2 ⟨F †
802
+ αF˜α(IL ⊗ OM)⟩
803
+
804
+ (26)
805
+ where �H(2)
806
+ LS is some hermitian operator. Comparing with
807
+ Eq. (19), and noting that Tr[Mρ] = 0
808
+ ∀ρ implies M =
809
+ 0, we obtain the condition for satisfying Eq. (19) as
810
+ − i[IL ⊗ OM, �H(2)
811
+ LS] +
812
+ d2−1
813
+
814
+ α,˜α=d2
815
+ L
816
+ �Γα˜α
817
+
818
+ F †
819
+ α(IL ⊗ OM)F˜α
820
+ − 1
821
+ 2(IL ⊗ OM)F †
822
+ αF˜α − 1
823
+ 2F †
824
+ αF˜α(IL ⊗ OM)
825
+
826
+ = 0
827
+ ∀OM.
828
+ (27)
829
+ We will now relabel the indices α, ˜α for the sake of con-
830
+ venience.
831
+ Recall from Sec. II A 1, that α, ˜α which ap-
832
+ pear in the above expression can be equivalently writ-
833
+ ten as α → (αL, αM), ˜α → (˜αL, ˜αM), and vice-versa,
834
+ where Fα = fαL ⊗ gαM . Therefore, �d2−1
835
+ α=1 is equivalent
836
+ to �d2
837
+ M−1
838
+ αM=1
839
+ �d2
840
+ L
841
+ αL=1. We can also expand �H(2)
842
+ LS as
843
+ �H(2)
844
+ LS =
845
+ d2
846
+
847
+ α=1
848
+ ναFα =
849
+ d2
850
+ L
851
+
852
+ αL=1
853
+ d2
854
+ M
855
+
856
+ αM=1
857
+ ναL,αM (fαL ⊗gαM ). (28)
858
+ This basis aids in taking a partial trace over the L part of
859
+ the system. Performing this partial trace and using the
860
+ orthonormality of fi operators, we can rewrite Eq. (27)
861
+ as
862
+ − i
863
+ d2
864
+ M
865
+
866
+ αM=1
867
+ νd2
868
+ L,αM [OM, gαM ] +
869
+ d2
870
+ M−1
871
+
872
+ αM,˜αM=1
873
+ �ΛαM,˜αM
874
+
875
+ g†
876
+ αM OMg˜αM − 1
877
+ 2OMg†
878
+ αM g˜αM − 1
879
+ 2g†
880
+ αM g˜αM OM
881
+
882
+ = 0,
883
+ ∀OM.
884
+ (29)
885
+ where
886
+ �ΛαM,˜αM =
887
+ d2
888
+ L
889
+
890
+ αL,˜αL=1
891
+ δαL,˜αL�Γ(αL,αM),(˜αL,˜αM)
892
+ (30)
893
+ We show in Appendix C that Eq. (29) implies
894
+ d2
895
+ M−1
896
+
897
+ αM=1
898
+ �ΛαM,αM =
899
+ d2
900
+ M−1
901
+
902
+ αM=1
903
+ d2
904
+ L
905
+
906
+ αL=1
907
+ �Γ(αL,αM),(αL,αM) = 0 (31)
908
+ Since we require �Γ to be positive semidefinite, it cannot
909
+ have negative values on the diagonal. Therefore, Eq. (31)
910
+ implies �Γ(αL,αM),(αL,αM) = 0 for 1 ≤ αL ≤ d2
911
+ L and 1 ≤
912
+ αM ≤ d2
913
+ M − 1 .
914
+ Equivalently, �Γαα = 0 for α ≥ d2
915
+ L.
916
+ Applying Lemma 1 to this case, we see that �Γα,˜α can be
917
+ non-zero only when both α, ˜α < d2
918
+ L, and therefore �Γ is a
919
+ matrix of the form in Eq. (24). This concludes the first
920
+ part of the proof.
921
+ 2.
922
+ The restriction on �
923
+ HLS
924
+ Given this structure for �Γ from Eq. (24), we now in-
925
+ vestigate the restrictions on the Lamb shift Hamilto-
926
+ nian �HLS. Since �Γ has to obey Eq. (24), we find that
927
+ �HLS = �H(2)
928
+ LS = �
929
+ αL,αM ναL,αM (fαL ⊗ gαM ) in Eq. (27).
930
+ Then, our condition for satisfying local conservation laws
931
+ from Eq. (27) is given by,
932
+ −i
933
+ d2
934
+ L
935
+
936
+ αL=1
937
+ d2
938
+ M
939
+
940
+ αM=1
941
+ ναL,αM [IL ⊗OM, (fαL ⊗gαM )] = 0
942
+ ∀OM.
943
+ (32)
944
+ which further implies
945
+ − i
946
+ d2
947
+ L
948
+
949
+ αL=1
950
+ d2
951
+ M
952
+
953
+ αM=1
954
+ ναL,αM fαL ⊗ [OM, gαM ] = 0
955
+ ∀OM. (33)
956
+ Multiplying both sides by f †
957
+ αL ⊗ IM, and tracing out the
958
+ L part of the system, we obtain
959
+ − i
960
+ d2
961
+ M
962
+
963
+ αM=1
964
+ ναL,αM [OM, gαM ] = 0
965
+ ∀αL, OM.
966
+ (34)
967
+ This can happen only if
968
+ d2
969
+ M
970
+
971
+ αM=1
972
+ ναL,αM gαM ∝ IM
973
+ ∀αL
974
+ (35)
975
+ Using Eq. (35) in Eq. (28), and recalling that �HLS =
976
+ �H(2)
977
+ LS, we obtain �HLS = �H(L)
978
+ LS ⊗ IM. This concludes the
979
+ second part of the proof.
980
+ C.
981
+ Remarks on Theorem 2
982
+ Theorem 2 says that for a QME to preserve complete
983
+ positivity and obey local conservation laws, both the
984
+ Lamb shift Hamitonian and the dissipator must only act
985
+ on the part of the system connected to the bath. Such a
986
+ Lindblad equation is often termed a ‘local Lindblad equa-
987
+ tion’. Theorem 2 thus says that only local Lindblad equa-
988
+ tions are consistent with local conservation laws. The RE
989
+ preserves local conservation laws without having a local
990
+ dissipator, but it does so at the cost of losing complete
991
+
992
+ 7
993
+ positivity.
994
+ Any global form of Lindblad equation, like
995
+ the eigenbasis Lindblad equation [6, 8] and the universal
996
+ Lindblad Equation [31], violates local conservation laws,
997
+ while preserving complete positivity. One main reason
998
+ such global forms of Lindblad equations are often derived
999
+ under various approximations is that they can be proven
1000
+ to show thermalization. However, general statements re-
1001
+ lated to thermalization in local Lindblad equations are
1002
+ usually difficult to make. In the next section, we discuss
1003
+ a numerical technique which allows to study whether, in
1004
+ a given set-up, a QME consistent with Theorem 2 is pos-
1005
+ sible such that it also shows thermalization.
1006
+ IV.
1007
+ ON THE POSSIBILITY OF
1008
+ THERMALIZATION WITH LOCAL
1009
+ DISSIPATORS
1010
+ A.
1011
+ Condition for satisfying thermalization
1012
+ We start by making precise what we mean by thermal-
1013
+ ization. Going back to the form of the QME in Eq. (21),
1014
+ the setup is said to show thermalization if
1015
+ lim
1016
+ ϵ→0
1017
+
1018
+ lim
1019
+ t→∞ et(L0+ϵ2L2)ρ(0)
1020
+
1021
+ = ρth,
1022
+ ρth =
1023
+ e−βHS
1024
+ Tr[e−βHS],
1025
+ (36)
1026
+ irrespective of the initial state of the system ρ(0). Phys-
1027
+ ically, it means that if the system is weakly coupled to
1028
+ a thermal bath for a long time, and then the system-
1029
+ bath coupling is slowly switched-off, the state of the sys-
1030
+ tem will be the Gibbs state at the temperature of the
1031
+ bath, irrespective of the system’s initial state. If there
1032
+ is no explicit time-dependence in the Hamiltonian, as in
1033
+ Eq. (2), this statement can be proven starting with the
1034
+ initial state of the full set-up in Eq. (3), and assuming
1035
+ that the steady state is unique [23]. Given a QME of the
1036
+ form in Eq.(21), in Ref. [23], we showed that the follow-
1037
+ ing condition needs to be satisfied in order to guarantee
1038
+ thermalization,
1039
+ ⟨Ei| L2(ρth) |Ei⟩ = 0
1040
+ ∀ i.
1041
+ (37)
1042
+ where |Ei⟩ is the eigenvector of the system Hamiltonian
1043
+ HS with eigenvalue Ei.
1044
+ The derivation of this condi-
1045
+ tion can also be found in Appendix D. Given a system
1046
+ Hamiltonian HS, the inverse temperature β of the bath
1047
+ and a partition of the system Hilbert space into the part
1048
+ HL which is attached to a bath and the remainder of
1049
+ Hilbert space HM (see Fig.1), we would like to find a
1050
+ QME respecting the restrictions in theorem 2 and satis-
1051
+ fying Eq.(37). As we will see later by example, such a
1052
+ QME is not guaranteed to be possible. In the next sub-
1053
+ section, we provide a numerical way to conclusively check
1054
+ if such a QME is possible in a given setup.
1055
+ B.
1056
+ The thermalization optimization problem
1057
+ For the setup shown in Fig. 1, the most general form
1058
+ of QME respecting the restrictions in theorem 2 for sat-
1059
+ isfying complete positivity and local conservation laws
1060
+ is
1061
+ ∂ρ
1062
+ ∂t = i[ρ, HS + ϵ2H(L)
1063
+ LS ⊗ IM] + ϵ2
1064
+ d2
1065
+ L−1
1066
+
1067
+ αL,˜αL=1
1068
+ Γ(L)
1069
+ αL,˜αL
1070
+
1071
+ (f˜αL ⊗ IM)ρ(fαL ⊗ IM)†
1072
+ − {(fαL ⊗ IM)†(f˜αL ⊗ IM), ρ}
1073
+ 2
1074
+
1075
+ .
1076
+ (38)
1077
+ Here H(L)
1078
+ LS is a Lamb shift Hamiltonian that acts on the
1079
+ HL part of the system, Γ(L) is (d2
1080
+ L − 1) ⊗ (d2
1081
+ L − 1) matrix
1082
+ that must be positive semidefinite, dL is the dimension
1083
+ of the Hilbert space HL that is directly coupled with the
1084
+ bath. We include the factor of ϵ2 in front of Γ(L) and
1085
+ H(L)
1086
+ LS explicitly.
1087
+ The system Hamiltonian HS and the
1088
+ Hilbert space HL are assumed to be given. The task is
1089
+ then to find H(L)
1090
+ LS and Γ(L), such that Eq.(37) is satisfied
1091
+ to a given precision, for a given inverse temperature β.
1092
+ To this end, we introduce the quantity
1093
+ τ =
1094
+
1095
+ i
1096
+ |⟨Ei| L2(ρth) |Ei⟩| ,
1097
+ (39)
1098
+ where L2 consist of all terms in Eq. (38) which are mul-
1099
+ tiplied by ϵ2, i.e all terms except the commutator with
1100
+ the system Hamiltonian. Then, we can cast the task in
1101
+ terms of an optimization problem given by :
1102
+ minimize :
1103
+ τ by varying H(L)
1104
+ LS , Γ(L),
1105
+ subject to :
1106
+ H(L)
1107
+ LS is hermitian,
1108
+ Tr(Γ(L)) = 1,
1109
+ Γ(L) ≥ 0,
1110
+ (40)
1111
+ where we use Γ(L) ≥ 0 to denote Γ(L) being positive
1112
+ semidefinite. The condition Tr(Γ(L)) = 1 is imposed to
1113
+ avoid the trivial solution H(L)
1114
+ LS , Γ(L) = 0, which trivially
1115
+ gives the global minimum τ = 0. Since we want Γ(L)
1116
+ to be a non-zero positive semi-definite matrix, it must
1117
+ have a positive trace. We have fixed that trace to one
1118
+ in some arbitrarily chosen energy unit.
1119
+ This does not
1120
+ cause loss of generality since the strength of system-bath
1121
+ coupling is explicitly governed by ϵ2 in Eq.(38). We call
1122
+ the optimization problem in Eq. (40) the “thermalization
1123
+ optimization problem”(TOP). Let τopt be the optimal
1124
+ value obtained from solving TOP. Given a tolerance δ,
1125
+ if τopt < δ,
1126
+ the desired QME is possible,
1127
+ else,
1128
+ the desired QME is impossible,
1129
+ (41)
1130
+ up to the precision δ.
1131
+ Most interestingly, we find that the TOP in Eq. (40)
1132
+ can be written as a SDP. The background and theoreti-
1133
+ cal framework of SDP is discussed in Appendix E 1. The
1134
+
1135
+ 8
1136
+ TOP is proven to be a SDP in Appendix E 2. In particu-
1137
+ lar, any choice of H(L)
1138
+ LS and Γ(L) in Eq. (40) can be used
1139
+ to obtain an upper bound on τopt. Then, the theoreti-
1140
+ cal framework of SDP can be used to construct a “dual”
1141
+ problem to the optimization problem in Eq. (40). This
1142
+ dual problem can then be used to obtain a lower bound on
1143
+ τopt. If the lower bound and upper bound match, then
1144
+ this guarantees that one has found the global optimal
1145
+ value of τ . Our above described approach is transpar-
1146
+ ent, and simple to use, since the optimization problem in
1147
+ Eq. (40) can be directly put into standard packages for
1148
+ disciplined convex optimization like the CVX MATLAB
1149
+ package [33].
1150
+ In particular, CVX itself automatically
1151
+ constructs the dual problem, outputs τopt, and gives one
1152
+ choice of H(L)
1153
+ LS , and Γ(L) which yields the output value of
1154
+ τopt. Thus, if τopt < δ, it not only says that the desired
1155
+ type of QME is possible but also it outputs one possible
1156
+ candidate for such a QME. If τopt ≥ δ, the desired type
1157
+ of QME is impossible.
1158
+ We would like to point out here that, in a microscopic
1159
+ derivation, given the temperature of the baths, H(L)
1160
+ LS and
1161
+ Γ(L) would depend only on the bath spectral functions
1162
+ and system-bath coupling Hamiltonian.
1163
+ So, the TOP
1164
+ can be thought of as varying over all possible bath spec-
1165
+ tral functions and system-bath coupling Hamiltonians to
1166
+ find τopt. Thus, if τopt ≥ δ, we can conclusively say that,
1167
+ for the chosen system parameters and temperature, un-
1168
+ der no choice of bath spectral function and system-bath
1169
+ coupling Hamiltonian, can a Markovian QME be derived
1170
+ which simultaneously satisfies complete positivity, local
1171
+ conservation laws and shows thermalization up to the
1172
+ chosen precision. In the next subsection, we look at the
1173
+ TOP in an open XXZ qubit chain.
1174
+ C.
1175
+ Open XXZ qubit chain as an example
1176
+ We study the possibility of having a Lindblad descrip-
1177
+ tion satisfying local conservation laws and showing ther-
1178
+ malization in an open XXZ qubit chain system with some
1179
+ of the qubits attached to baths. The system Hamiltonian
1180
+ for this setup is given by
1181
+ HS =
1182
+ N
1183
+
1184
+ ℓ=1
1185
+ ω(ℓ)
1186
+ 0
1187
+ 2 σ(ℓ)
1188
+ z
1189
+
1190
+ N−1
1191
+
1192
+ ℓ=1
1193
+ gℓ
1194
+
1195
+ σ(ℓ)
1196
+ x σ(ℓ+1)
1197
+ x
1198
+ + σ(ℓ)
1199
+ y σ(ℓ+1)
1200
+ y
1201
+ + ∆ℓσ(ℓ)
1202
+ z σ(ℓ+1)
1203
+ z
1204
+
1205
+ ,
1206
+ (42)
1207
+ where σ(ℓ)
1208
+ x,y,z denotes the Pauli matrices acting on the
1209
+ ℓth qubit, and ω(ℓ)
1210
+ 0 , gℓ, and gℓ∆ℓ represent the mag-
1211
+ netic field, the overall qubit-qubit coupling strength and
1212
+ the anisotropy respectively. The first NL qubits are at-
1213
+ tached to a bath, while the remaining NM = N − NL
1214
+ qubits are not attached to any bath.
1215
+ We use the for-
1216
+ malism of Sec. IV B to investigate thermalization in this
1217
+ set-up for various values of NL and NM.
1218
+ In order to
1219
+ do so, we first need to construct the basis for opera-
1220
+ FIG. 2. τopt vs g, for NL = 1, with ω(ℓ)
1221
+ 0
1222
+ = 1, ∆ℓ = 1, β = 1
1223
+ and gℓ = g for all ℓ. The tolerance chosen is δ = 10−6. We find
1224
+ that τopt ≫ δ, conclusively showing that, for such setups, no
1225
+ QME can simultaneously preserve complete positivity, obey
1226
+ local conservation laws, and show thermalization up to the
1227
+ precision set by the tolerance.
1228
+ FIG. 3.
1229
+ τopt vs β, for NL = 1, with ω(ℓ)
1230
+ 0
1231
+ = 1, ∆ℓ = 1,
1232
+ gℓ = 0.1 for all ℓ. The tolerance chosen is δ = 10−6, and is
1233
+ plotted as the dashed horizontal line. We find that τopt ≫ δ,
1234
+ indicating that, for such setups, it is not possible to have a
1235
+ QME simultaneously preserving complete positivity, obeying
1236
+ local conservation laws, and showing thermalization up to the
1237
+ precision set by the tolerance.
1238
+ tors in Hilbert space of the first NL qubits, so that the
1239
+ most general form of the desired QME can be written
1240
+ as in Eq. (38).
1241
+ For the ℓth qubit, we choose the ba-
1242
+ sis {−σ(ℓ)
1243
+ z /
1244
+
1245
+ 2, σ(ℓ)
1246
+ + , σ(ℓ)
1247
+ − , I(ℓ)
1248
+ 2 /
1249
+
1250
+ 2}, where σ(ℓ)
1251
+ +
1252
+ = (σ(ℓ)
1253
+ x
1254
+ +
1255
+ iσ(ℓ)
1256
+ y )/2, σ(ℓ)
1257
+ − = (σ(ℓ)
1258
+ x
1259
+ − iσ(ℓ)
1260
+ y )/2, and I(ℓ)
1261
+ 2
1262
+ is the identity
1263
+ operator for the qubit Hilbert space. The basis for the
1264
+ first NL qubits is obtained by direct product of the basis
1265
+ of each of the qubits. We construct the TOP [Eq.(40)]
1266
+ in this basis, which we then directly input in the CVX
1267
+ MATLAB package to obtain τopt. We set an ad-hoc value
1268
+ of the tolerance δ = 10−6 [see Eq.(41)]. In a typical cal-
1269
+ culation from a weak system-bath coupling QME, usually
1270
+ the error due to neglecting higher order terms would be
1271
+ larger than such a low value of tolerance.
1272
+
1273
+ -NM=1
1274
+ θNM = 2
1275
+ ×NM=3
1276
+ +NM=4
1277
+ 10
1278
+ 10~3
1279
+ 100
1280
+ 10-1
1281
+ 10~2
1282
+ 910
1283
+ *NM=1
1284
+ θNM=2
1285
+ 10-5
1286
+ ×NM =3
1287
+ +NM= 4
1288
+ 100
1289
+ 10-1
1290
+ 101
1291
+ 39
1292
+ 1.
1293
+ Single qubit attached to bath
1294
+ First we consider the case where the first qubit of the
1295
+ chain is coupled to a bath, so, NL = 1. In Fig. (2), we
1296
+ plot τopt vs g for NM = 1, 2, 3, fixing ω(ℓ)
1297
+ 0
1298
+ = 1, ∆ℓ = 1 for
1299
+ all ℓ and β = 1. We find that τopt ≫ δ when NL = 1, and
1300
+ NM = 1, 2, 3. Thus, no Markovian QME can simultane-
1301
+ ously preserve complete positivity, obey local conserva-
1302
+ tion laws, and satisfy thermalization for such setups in
1303
+ the chosen range of parameters. This explicit example
1304
+ also directly rules out the possibility of having a general
1305
+ form of Markovian QME that is guaranteed to meet all
1306
+ the fundamental requirements. We see from Fig. (2) that
1307
+ τopt increases with g. This is consistent with previous re-
1308
+ sults showing that such local Lindblad equations become
1309
+ a good description when the coupling between the sys-
1310
+ tem qubits are weak.
1311
+ Additionally, we see that for a
1312
+ given value of g, τopt decreases as NM increases. This,
1313
+ interestingly, seems to indicate that for long chains, local
1314
+ Lindblad with dissipator acting on only one qubit might
1315
+ be able to describe the thermal state up to a reason-
1316
+ ably good precision. However, more detailed studies are
1317
+ required to make any conclusive statement in this direc-
1318
+ tion.
1319
+ Intuitively, memory effects, and hence Markovianity of
1320
+ open system dynamics, depend on temperature. So, we
1321
+ might expect that at a different temperature, τopt might
1322
+ be smaller than δ.
1323
+ In Fig. (3), we plot τopt vs β for
1324
+ NL = 1, fixing ω(ℓ)
1325
+ 0
1326
+ = 1, ∆ℓ = 1, gℓ = 0.1 for all ℓ. We
1327
+ find that τopt ≫ δ, for almost the entire range of β chosen,
1328
+ showing that for these parameters, no Markovian QME
1329
+ can simultaneously preserve complete positivity, obey lo-
1330
+ cal conservation laws, and satisfy thermalization. But,
1331
+ we see some interesting features. Firstly, as before, we
1332
+ see that τopt decreases as NM increases. Secondly, we see
1333
+ that τopt varies non-monotonically with β. At very low
1334
+ temperatures, τopt decreases tends to decay below δ. In
1335
+ Fig. (3), for NM = 4 and β = 10, τopt < δ. At high
1336
+ temperatures also, τopt decreases. This suggests that at
1337
+ very low and very high temperatures, it is possible to
1338
+ obtain a local Lindblad equation that shows thermaliza-
1339
+ tion. That this is indeed true can be checked indepen-
1340
+ dently. At such extremes of temperatures, for at least
1341
+ some choices of baths and system-bath couplings, local
1342
+ Linblad equations can be microscopically derived [34, 35].
1343
+ This explains the non-monotonic dependence of τopt on
1344
+ β. Since very high and very low temperatures can allow
1345
+ for a local Lindblad description, it is then intuitive that
1346
+ departure from such behavior is maximum when β is of
1347
+ the order of system time scales. Indeed it is close to such
1348
+ values of β, i.e, β ∼ ω(ℓ)
1349
+ 0
1350
+ = 1, that the highest value of
1351
+ τopt is seen in Fig. (3).
1352
+ We would like to point out here that, τopt ≥ δ does not
1353
+ mean the system coupled to a thermal bath is unable
1354
+ to thermalize for such parameters. Unless in extremely
1355
+ special cases, it is almost always possible to find a bath
1356
+ spectral function and system-bath coupling which ensure
1357
+ FIG. 4. τopt vs g, for NL = 2, with ω(ℓ)
1358
+ 0
1359
+ = 1, ∆ℓ = 1, gℓ = g
1360
+ for all ℓ and β = 1. The tolerance chosen is δ = 10−6, and is
1361
+ plotted as the dashed horizontal line. We find that τopt ≪ δ
1362
+ for smaller values of g, indicating that, for such setups, it is
1363
+ possible to have a QME simultaneously preserving complete
1364
+ positivity, obeying local conservation laws, and showing ther-
1365
+ malization up to the precision set by the tolerance.
1366
+ FIG. 5. τopt vs β, for NL = 2, with ω(ℓ)
1367
+ 0
1368
+ = 1, ∆ℓ = 1, gℓ = 0.1
1369
+ for all ℓ. The tolerance chosen is δ = 10−6, and is plotted as
1370
+ the dashed horizontal line. We find that τopt ≪ δ for smaller
1371
+ values of g, indicating that, for such setups, it is possible to
1372
+ have a QME simultaneously preserving complete positivity,
1373
+ obeying local conservation laws, and showing thermalization
1374
+ up to the precision set by the tolerance. The values in the
1375
+ figure less than 10−12 are below the numerical precision of
1376
+ CVX Matlab package.
1377
+ thermalization. So τopt ≥ δ instead means that, for those
1378
+ parameters, the dynamics of approach to thermal state
1379
+ cannot be governed by a completely positive Markovian
1380
+ QME preserving local conservation laws. The dynamics
1381
+ then must have some non-Markovian character. In fact,
1382
+ as we see from above example, τopt gives an estimate of
1383
+ how close to Markovianity the open system dynamics can
1384
+ be for the chosen parameters.
1385
+ Next, we discuss the case where first two qubits are
1386
+ attached to the bath and highlight the drastic difference
1387
+ observed for similar choice of parameters.
1388
+
1389
+ *NM
1390
+
1391
+ θNM = 2
1392
+ ×NM=3
1393
+ +NM=4
1394
+ NM=5
1395
+ 10-10
1396
+ Topt
1397
+ 10-20
1398
+ 10-1
1399
+ 10~2
1400
+ 100
1401
+ gNM=
1402
+ θNM=2
1403
+ &= WN*
1404
+ ΦNM=5
1405
+ Topt
1406
+ 15
1407
+ 10
1408
+ 10-20
1409
+ 101
1410
+ 10-1
1411
+ 100
1412
+ 310
1413
+ 0.00033
1414
+ 0
1415
+ 0
1416
+ -0.00123 0
1417
+ 0 0.00033
1418
+ 0
1419
+ 0
1420
+ 0.00019
1421
+ 0 0
1422
+ 0.00001
1423
+ 0
1424
+ 0
1425
+ 0
1426
+ 0.00196
1427
+ 0
1428
+ 0
1429
+ -0.00179 0 0
1430
+ -0.03638 0
1431
+ 0
1432
+ 0 0
1433
+ 0
1434
+ -0.00002 0
1435
+ 0
1436
+ 0
1437
+ 0.00081
1438
+ 0
1439
+ 0
1440
+ 0 0
1441
+ 0
1442
+ -0.00081 0
1443
+ 0 0.01307
1444
+ 0
1445
+ 0
1446
+ -0.00021
1447
+ -0.00123 0
1448
+ 0
1449
+ 0.02611
1450
+ 0
1451
+ 0 -0.00282 0
1452
+ 0
1453
+ 0.00157
1454
+ 0 0
1455
+ -0.00143 0
1456
+ 0
1457
+ 0
1458
+ -0.00179 0
1459
+ 0
1460
+ 0.00172
1461
+ 0 0
1462
+ 0.03491
1463
+ 0
1464
+ 0
1465
+ 0 0
1466
+ 0
1467
+ 0.00011
1468
+ 0
1469
+ 0
1470
+ 0
1471
+ 0
1472
+ 0
1473
+ 0
1474
+ 0 0
1475
+ 0
1476
+ 0
1477
+ 0
1478
+ 0 0
1479
+ 0
1480
+ 0
1481
+ 0
1482
+ 0.00033
1483
+ 0
1484
+ 0
1485
+ -0.00282 0
1486
+ 0 0.00045
1487
+ 0
1488
+ 0
1489
+ 0.00002
1490
+ 0 0
1491
+ 0.00011
1492
+ 0
1493
+ 0
1494
+ 0
1495
+ -0.03638 0
1496
+ 0
1497
+ 0.03491
1498
+ 0 0
1499
+ 0.70685
1500
+ 0
1501
+ 0
1502
+ 0 0
1503
+ 0
1504
+ 0.00209
1505
+ 0
1506
+ 0
1507
+ 0
1508
+ -0.00081 0
1509
+ 0
1510
+ 0 0
1511
+ 0
1512
+ 0.00082
1513
+ 0
1514
+ 0 -0.01311 0
1515
+ 0
1516
+ 0.00021
1517
+ 0.00019
1518
+ 0
1519
+ 0
1520
+ 0.00157
1521
+ 0
1522
+ 0 0.00002
1523
+ 0
1524
+ 0
1525
+ 0.00035
1526
+ 0 0
1527
+ -0.00014 0
1528
+ 0
1529
+ 0
1530
+ 0
1531
+ 0
1532
+ 0
1533
+ 0
1534
+ 0 0
1535
+ 0
1536
+ 0
1537
+ 0
1538
+ 0 0
1539
+ 0
1540
+ 0
1541
+ 0
1542
+ 0
1543
+ 0
1544
+ 0.01307
1545
+ 0
1546
+ 0
1547
+ 0 0
1548
+ 0
1549
+ -0.01311 0
1550
+ 0 0.26032
1551
+ 0
1552
+ 0
1553
+ -0.00208
1554
+ 0.00001
1555
+ 0
1556
+ 0
1557
+ -0.00143 0
1558
+ 0 0.00011
1559
+ 0
1560
+ 0
1561
+ -0.00014 0 0
1562
+ 0.00009
1563
+ 0
1564
+ 0
1565
+ 0
1566
+ -0.00002 0
1567
+ 0
1568
+ 0.00011
1569
+ 0 0
1570
+ 0.00209
1571
+ 0
1572
+ 0
1573
+ 0 0
1574
+ 0
1575
+ 0.0001
1576
+ 0
1577
+ 0
1578
+ 0
1579
+ -0.00021 0
1580
+ 0
1581
+ 0 0
1582
+ 0
1583
+ 0.00021
1584
+ 0
1585
+ 0 -0.00208 0
1586
+ 0
1587
+ 0.00009
1588
+ TABLE I.
1589
+ The Γ(L) obtained from CVX for NL = 2, NM = 4, ω(ℓ)
1590
+ 0
1591
+ = 1, gℓ = 0.1, ∆ℓ = 1, β = 1, i.e, the values used to
1592
+ compute Fig. 6. Every entry is rounded to 5 digits after the decimal point for convenience of representation. The corresponding
1593
+ H(L)
1594
+ LS is given to be zero. This Γ(L) satisfies complete positivity, local conservation laws and thermalization up to a precision of
1595
+ δ = 10−6 for the given choice of parameters.
1596
+ 2.
1597
+ Two qubits attached to bath
1598
+ In Fig. (4), we plot τopt vs gℓ = g for NL = 2, i.e, first
1599
+ two qubits attached to the bath, and NM = 1, 2, 3, 4,
1600
+ taking fixed values of ω(ℓ)
1601
+ 0
1602
+ = 1, ∆ℓ = 1 and β = 1. These
1603
+ parameters are the same as in Fig. 2 and g is varied over
1604
+ the same range. Quite remarkably, in stark contrast to
1605
+ Fig. 2, we find that in this case τopt ≪ δ over a consid-
1606
+ erable range for g < 1. We then look at the behavior
1607
+ of τopt versus β, fixing ω(ℓ)
1608
+ 0
1609
+ = 1, ∆ℓ = 1, gℓ = g = 0.1.
1610
+ This is shown in Fig. 5. For NM > NL, we again see
1611
+ the non-monotonic behavior. However, in stark contrast
1612
+ to Fig. 3, we find that over the entire chosen range of β
1613
+ τopt ≪ δ. Thus, for NL = 2, over a considerable range of
1614
+ parameters, a QME that simultaneously preserves com-
1615
+ plete positivity, obeys local conservation laws, and satis-
1616
+ fies thermalization up to the given precision is possible.
1617
+ This is a highly non-trivial result.
1618
+ Previously, local two-qubit Lindblad dissipators have
1619
+ been used to study energy transport in XXZ-type qubit
1620
+ chains (for example, Refs. [36, 37]). However, those local
1621
+ two-qubit Lindblad operators were constructed so as to
1622
+ thermalize the two qubits only, in absence of coupling to
1623
+ the rest of the chain. Such Lindblad description is not
1624
+ guaranteed to thermalize the whole chain to the given
1625
+ inverse temperature β of the bath [38]. Our result here
1626
+ shows that it is possible to have a two-qubit local Lind-
1627
+ blad description that can thermalize the full chain to the
1628
+ given temperature of the bath to a good approximation.
1629
+ As mentioned before, CVX also outputs a possible
1630
+ choice of Γ(L) and H(L)
1631
+ LS matrices corresponding to τopt.
1632
+ So, when τopt < δ, we get one possible candidate for the
1633
+ desired type of QME. For our choice of parameters, we
1634
+ find that CVX always outputs H(L)
1635
+ LS = 0, and a non-
1636
+ trivial value of Γ(L) that would be hard to guess other-
1637
+ wise. In Table. I, we demonstrate the Γ(L) obtained for
1638
+ NL = 2, NM = 4, ω(ℓ)
1639
+ 0
1640
+ = 1, gℓ = 0.1, ∆ℓ = 1, β = 1. The
1641
+ Γ(L) matrix corresponds to the basis of operators {Fk}
1642
+ chosen as
1643
+ Fk = f⌈k/4⌉ ⊗ fk(mod 4) ⊗ IM
1644
+ (43)
1645
+ where {fi} = {−σz/
1646
+
1647
+ 2, σ−, σ+, I2/
1648
+
1649
+ 2}, ⌈k/4⌉ denotes
1650
+ the nearest integer greater than or equal to k/4, and
1651
+ k(mod 4) denotes the value of k modulo 4, and k goes
1652
+ from 1 to 15. We also note that the exact values of Γ(L)
1653
+ and H(L)
1654
+ LS computed by CVX may depend on the exact
1655
+ configuration of the programming environment (such as
1656
+ internal solvers used by CVX).
1657
+ For every parameter of the system, there is a differ-
1658
+ ent τopt, with a corresponding value of Γ(L) and H(L)
1659
+ LS
1660
+ given by CVX. If we want to explore a large parameter
1661
+ space of the system, it seems that we need a different
1662
+ Γ(L) and H(L)
1663
+ LS for each parameter point. Surprisingly,
1664
+ we find that this is not always required. If τopt ≪ δ for
1665
+ one set of parameters, we can substantially change pa-
1666
+ rameters of the system far from the qubits attached to
1667
+ baths, and still obtain a value of τ ≪ δ with the same
1668
+ value of Γ(L) and H(L)
1669
+ LS . This is shown in Fig. (6), where
1670
+ τ is calculated changing various parameters away from
1671
+ the two qubits coupled with the bath, fixing H(L)
1672
+ LS = 0
1673
+ and Γ(L) to be the same as in Table. I. Over the entire
1674
+ regime of chosen parameters τ ≪ δ. Note that, in con-
1675
+ trast to previous plots, this is not be the optimal value of
1676
+ τ. Nevertheless, if τ ≪ δ, we still get a completely posi-
1677
+ tive Markovian QME preserving local conservation laws
1678
+ and showing thermalization up to the chosen precision.
1679
+ Given Γ(L) and H(L)
1680
+ LS , it is much easier to just check this
1681
+ rather than finding the optimal value τopt.
1682
+ If parameters of the two qubits that are coupled to the
1683
+ bath are changed, we can no longer use the same Γ(L)
1684
+ and H(L)
1685
+ LS . For example, if we choose the same Γ(L) as
1686
+
1687
+ 11
1688
+ FIG. 6. τ vs g4, for NL = 2, NM = 4, with ω(ℓ)
1689
+ 0
1690
+ = 1, ∆ℓ = 1,
1691
+ β = 1 and gℓ = 0.1 for all ℓ unless otherwise mentioned.
1692
+ τ is computed from Γ(L) and H(L)
1693
+ LS obtained from CVX for
1694
+ NL = 2, NM = 4, with ω(ℓ)
1695
+ 0
1696
+ = 1, ∆ℓ = 1, β = 1 and gℓ = 0.1
1697
+ for all ℓ. The modified parameters for the plots are given by (i)
1698
+ (no parameters changed), (ii) ∆3 = 0.4, ∆4 = 1.2, (iii) ω(3)
1699
+ 0
1700
+ =
1701
+ 1.5, ω(4)
1702
+ 0
1703
+ = 1.5, g5 = 0.3, (iv) ω(3)
1704
+ 0
1705
+ = 1.5, ω(4)
1706
+ 0
1707
+ = 1.5, g5 =
1708
+ 0.3, ∆4 = 0.5, (v) g3 = 0.3. We find that τ ≪ δ = 10−6 even
1709
+ if parameters are changed for qubits of the system that are
1710
+ not coupled to the baths.
1711
+ in Fig. 6, and change g1 to 0.2 from 0.1, we get τ =
1712
+ 0.0014 ≫ δ.
1713
+ The above observation suggests that the values of Γ(L)
1714
+ and H(L)
1715
+ LS obtained by CVX can be used to define a QME,
1716
+ independent of the parameters in the bulk of the sys-
1717
+ tem. This is consistent with underlying picture that each
1718
+ value of Γ(L) and H(L)
1719
+ LS corresponds to a different choice of
1720
+ the bath spectral function and the system-bath coupling
1721
+ Hamiltonian. If we change any parameter of the qubits
1722
+ attached to the baths, the change reflects substantially
1723
+ on the system-bath coupling Hamiltonian, so the value of
1724
+ τ changes drastically from τopt obtained with original pa-
1725
+ rameters. If we change any parameter away from the two
1726
+ qubits, the change reflects much less on the system-bath
1727
+ coupling Hamiltonian, causing τ to be of the same order
1728
+ as the original value of τopt. This presents an exciting
1729
+ prospect for studying the dynamics of the system-bath
1730
+ setup over a wide range of parameters, including a wide
1731
+ range of temperatures, with physically consistent Marko-
1732
+ vian QMEs. Such studies may also be possible for long
1733
+ chains, since local Markovian dissipation is favourable for
1734
+ tensor network based numerical techniques. Such dissi-
1735
+ pation may, also, in principle, be engineered in quantum
1736
+ computing and quantum simulation platforms, like ion
1737
+ traps [39, 40], Rydberg atoms [41, 42], superconducting
1738
+ qubits [43] and quantum dots [44].
1739
+ V.
1740
+ SUMMARY AND OUTLOOK
1741
+ Searching for a physically consistent Markvian QME
1742
+ — A physically consistent Markovian QME must satisfy
1743
+ complete positivity, obey local conservation laws and be
1744
+ able to show thermalization. In this work, we have sys-
1745
+ tematically gone about searching for such QMEs. This
1746
+ is done in three steps, and the result in each step has im-
1747
+ portant consequences. Especially, we are led to introduce
1748
+ the TOP problem, which is an optimization problem for
1749
+ finding a QME with all the above properties up to a given
1750
+ precision. The TOP opens a completely new avenue in
1751
+ the study of dissipative quantum systems.
1752
+ We consider a finite-dimensional undriven system a
1753
+ part of which is weakly coupled to a thermal bath. The
1754
+ microscopically derived QME written to leading order
1755
+ in system-bath coupling is the RE, which is known to
1756
+ obey local conservation laws and be able to show ther-
1757
+ malization [23].
1758
+ First, we show in generality that the
1759
+ RE violates complete positivity, unless in extremely spe-
1760
+ cial cases. Although there are previous works showing
1761
+ this via specific examples (for instance, [24, 25, 30, 32]),
1762
+ we are unaware of a model independent proof similar to
1763
+ ours. Next, we prove that imposing complete positivity
1764
+ and preservation of local conservation laws enforces the
1765
+ QME to be of ‘local’ form. That is, the Lindblad op-
1766
+ erators and the Lamb-shift Hamiltonian must have sup-
1767
+ port only on the part of the system directly coupled to
1768
+ the bath, and be identity elsewhere. This rules out the
1769
+ possibility of any ‘global’ forms of Lindblad equations,
1770
+ which are usually constructed to show thermalization,
1771
+ to be consistent with local conservation laws. Then, we
1772
+ ask if a ‘local’ Lindblad equation can be found which is
1773
+ able to show thermalization. We find that, the task of
1774
+ finding such a Lindblad equation can be cast as an op-
1775
+ timization problem, which we call TOP. Most interest-
1776
+ ingly, this optimization problem turns out to be a SDP.
1777
+ For given system and parameters, the SDP can be ef-
1778
+ ficiently solved using high-level programming packages
1779
+ like the CVX Matlab package. The output of the TOP
1780
+ conclusively shows whether the desired type of QME is
1781
+ possible for the chosen system parameters and tempera-
1782
+ ture, up to a chosen precision. For numerical example,
1783
+ we look at the TOP in a XXZ qubit chain of few sites,
1784
+ fixing a reasonably high precision. When only the first
1785
+ site is coupled to a bath, we find that, unless in extremes
1786
+ of temperatures, it is impossible to find a local Lindblad
1787
+ equation that is capable of showing thermalization up to
1788
+ the chosen precision.
1789
+ Discussion in light of various existing forms of QMEs
1790
+ — Various forms of QMEs have been derived it literature
1791
+ under various approximations (for example, [31, 35, 45–
1792
+ 54]), along with the standard RE, local and eigenbasis
1793
+ Lindblad equations [6].
1794
+ Although the above example
1795
+ shows that there is no general form of physically consis-
1796
+ tent Markovian QME, this does not immediately make
1797
+ them unusable.
1798
+ Instead, it turns out that in each of
1799
+ these forms of QME, some elements of the system den-
1800
+ sity matrix are given correctly, while the others are not
1801
+ [23]. So, one needs to be careful in interpreting the re-
1802
+ sults from them, always keeping in mind their micro-
1803
+ scopic derivation and approximations. The RE, despite
1804
+ not being completely positive, is provably more accurate
1805
+ than all such Lindblad QMEs. To elucidate how this can
1806
+
1807
+ X10-8
1808
+ 2.5
1809
+ 2.
1810
+ 1.5
1811
+ (i)
1812
+ (ii)
1813
+ (ii)
1814
+ 1
1815
+ (iv)
1816
+ 中(v)
1817
+ 0.5
1818
+ 100
1819
+ 9412
1820
+ happen, imagine that, in a given setup, physically, the
1821
+ population of one energy level, say, ⟨Ej| ρ |Ej⟩, is zero in
1822
+ steady state. The RE might then give a small negative
1823
+ value (say, ⟨Ej| ρ |Ej⟩ = −10−3), while any of the Lind-
1824
+ blad equations will give a larger positive value, which
1825
+ might be (say, ⟨Ej| ρ |Ej⟩ = 0.1). Either case is a prob-
1826
+ lem if we want to calculate various kinds of entropies,
1827
+ as often required in quantum information and thermo-
1828
+ dynamics. In case of RE, unphysical results can often
1829
+ be ruled out by checking the scaling with system-bath
1830
+ coupling [23, 55]. This is often more difficult in Lindblad
1831
+ QMEs, where approximations are often less controlled.
1832
+ The state obtained from the recently derived ULE [31],
1833
+ which been shown to violate local conservation laws [23],
1834
+ can be corrected to obtain results as accurate as the RE
1835
+ [48]. This re-instates the local conservation laws, at the
1836
+ cost of also re-instating the same positivity problem of
1837
+ the density matrix as in RE. In another recent work, a
1838
+ general form of QME has been derived [45] which is more
1839
+ accurate than RE, even though complete positivity of dy-
1840
+ namics is still not guaranteed.
1841
+ TOP and (non) Markovianity — In the microscopic
1842
+ picture, given the temperature of the bath, the QME is
1843
+ completely defined by the bath spectral functions and
1844
+ the type of system-bath coupling. The TOP can then be
1845
+ thought of as varying over all possible bath spectral func-
1846
+ tions and types of system-bath couplings to find the clos-
1847
+ est to satisfying thermalization the local Lindblad equa-
1848
+ tion can be. So, when TOP shows that the desired type
1849
+ of QME is impossible, it means no matter what type of
1850
+ bath is attached and how it is coupled to the system, for
1851
+ the chosen parameters, it is impossible to describe the
1852
+ dynamics via a completely positive Markovian QME sat-
1853
+ isfying local conservation laws and showing thermaliza-
1854
+ tion. The approach to thermal state must then have some
1855
+ non-Markovian character for such system parameters and
1856
+ temperature. The output of TOP, τopt, shows non-trivial
1857
+ dependence on the system parameters and the temper-
1858
+ ature. This dependence seems to capture how close to
1859
+ Markovian the dynamics can be for the chosen parame-
1860
+ ters.
1861
+ Surprises when two qubits are attached to bath — Sur-
1862
+ prisingly, we have found that, when first two qubits of
1863
+ the few-site XXZ chain are attached to a bath, solving
1864
+ the TOP shows that it is possible to find Lindbladians
1865
+ obeying local conservation laws and showing thermaliza-
1866
+ tion up to quite high precision. This holds over a con-
1867
+ siderable range of parameters, including a wide range of
1868
+ temperatures. Notably, in this entire parameter regime,
1869
+ when one qubit was coupled to a bath, such a QME was
1870
+ impossible.
1871
+ Whenever the TOP shows a QME respecting all condi-
1872
+ tions is possible, standard high-level programming pack-
1873
+ ages used to solve the SDP also outputs one possible form
1874
+ for such a QME. When two qubits are attached to the
1875
+ bath, the form of QME so obtained, which respects all the
1876
+ requirements, is quite non-trivial and would be hard to
1877
+ guess otherwise. Even more interestingly, we have found
1878
+ that if we take one such QME obtained for one choice of
1879
+ system parameters, and change some system parameters
1880
+ away from two qubits that couple to the bath, the QME
1881
+ still satisfies all the requirements. This opens several ex-
1882
+ citing possibilities that we describe below.
1883
+ Future directions — Our results open the exciting pos-
1884
+ sibility of studying the dynamics of approach to thermal
1885
+ state in open quantum many-body systems using phys-
1886
+ ically consistent Markovian QMEs, over a wide range
1887
+ of parameters, including a wide range of temperatures.
1888
+ This is particularly aided by the fact that local Lindblad
1889
+ equations are favourable for tensor network techniques.
1890
+ Studying such dynamics at finite temperatures is often
1891
+ quite challenging otherwise, requiring simulation of non-
1892
+ Markovian dynamics [56–58].
1893
+ The TOP lets us find parameters of the system where
1894
+ local Lindblad equations can show thermalization. For
1895
+ two qubits attached to bath, this range of parameters
1896
+ can be considerably large, as we have seen. It may be
1897
+ possible to design such local dissipation in quantum com-
1898
+ puting and quantum simulation platforms like ion traps
1899
+ [39, 40], Rydberg atoms [41, 42], superconducting qubits
1900
+ [43] and quantum dots [44]. Especially in ion traps and
1901
+ Rydberg atom platforms, this offers an interesting way to
1902
+ controllably prepare finite temperature states of complex
1903
+ quantum many-body systems in these platforms, which
1904
+ is presently a technological challenge. Usually, one would
1905
+ require global Lindblad dissipators to ensure that a ther-
1906
+ mal state is prepared. This would be hard to design in
1907
+ quantum simulation platforms if one wants to simulate
1908
+ complex many-body systems. The possibility of having
1909
+ local dissipation confined to two qubits offers a much eas-
1910
+ ier alternative.
1911
+ Moreover, as we have seen in the example of XXZ qubit
1912
+ chain, the dependence of the output of the TOP, τopt, on
1913
+ various parameters of the system already encode rich and
1914
+ interesting physics.
1915
+ For complex quantum many-body
1916
+ systems, one may need more scalable techniques for SDP,
1917
+ which is itself a direction of research in computer science
1918
+ [59].
1919
+ Using these techniques, the rich behavior of τopt
1920
+ with various parameters can then be studied.
1921
+ It is therefore clear that our results, especially the in-
1922
+ troduction of the TOP, leads to new paradigm within the
1923
+ fields of quantum information, computation and technol-
1924
+ ogy. Nevertheless, various questions still remain. One
1925
+ main question concerns steady-state coherences [55, 60–
1926
+ 62]. When coupled to a thermal bath at any finite cou-
1927
+ pling, the system density matrix will have coherences in
1928
+ energy eigenbasis of the system [61, 62]. These coher-
1929
+ ences can be important in quantum information and ther-
1930
+ modynamics [63–66] and are given correctly to the lead-
1931
+ ing order by the RE [23, 55, 62]. However, it is not clear
1932
+ that the steady-state coherences calculated from physi-
1933
+ cally consistent Markovian QME obtained via TOP will
1934
+ be the same as those obtained from RE. Further inves-
1935
+ tigation is required in this respect, which will be carried
1936
+ out in future works.
1937
+ All code used in this work can be found at [67].
1938
+
1939
+ 13
1940
+ ACKNOWLEDGEMENTS
1941
+ MK would like to acknowledge support from the
1942
+ project 6004-1 of the Indo-French Centre for the Promo-
1943
+ tion of Advanced Research (IFCPAR), Ramanujan Fel-
1944
+ lowship (SB/S2/RJN-114/2016), SERB Early Career Re-
1945
+ search Award (ECR/2018/002085) and SERB Matrics
1946
+ Grant (MTR/2019/001101) from the Science and En-
1947
+ gineering Research Board (SERB), Department of Sci-
1948
+ ence and Technology, Government of India. AD and MK
1949
+ acknowledge support of the Department of Atomic En-
1950
+ ergy, Government of India, under Project No. RTI4001.
1951
+ AP acknowledges funding from the European Research
1952
+ Council (ERC) under the European Unions Horizon 2020
1953
+ research and innovation program (Grant Agreement No.
1954
+ 758403). A.P also acknowledges funding from the Dan-
1955
+ ish National Research Foundation through the Center of
1956
+ Excellence “CCQ” (Grant agreement no.: DNRF156).
1957
+ Appendix A: Casting Eq.(14) to Eq.(15)
1958
+ In this appendix we show the steps for taking Eq. (14)
1959
+ to the form of Eq. (15) which is more amenable to study-
1960
+ ing issues related to conservation of complete positivity.
1961
+ We start with Eq. (14), which we recall to be
1962
+ ∂ρ
1963
+ ∂t = i[ρ, HS] − ϵ2 �
1964
+ l
1965
+ d2
1966
+
1967
+ α,˜α=1
1968
+
1969
+ a∗
1970
+ lαbl˜α[F †
1971
+ α, F˜αρ]
1972
+ + c′∗
1973
+ lαa′
1974
+ l˜α[ρF †
1975
+ α, F˜α] + b∗
1976
+ lαal˜α[ρF †
1977
+ α, F˜α] + a′∗
1978
+ lαc′
1979
+ l˜α[F †
1980
+ α, F˜αρ]
1981
+
1982
+ .
1983
+ (A1)
1984
+ This can be rewritten as
1985
+ ∂ρ
1986
+ ∂t = i[ρ, HS] + ϵ2 �
1987
+ l
1988
+ d2
1989
+
1990
+ α,˜α=1
1991
+
1992
+ a∗
1993
+ lαbl˜α
1994
+
1995
+ F˜αρF †
1996
+ α − {F †
1997
+ αF˜α, ρ}
1998
+ 2
1999
+ − [F †
2000
+ αF˜α, ρ]
2001
+ 2
2002
+
2003
+ + c′∗
2004
+ lαa′
2005
+ l˜α
2006
+
2007
+ F˜αρF †
2008
+ α − {F †
2009
+ αF˜α, ρ}
2010
+ 2
2011
+ + [F †
2012
+ αF˜α, ρ]
2013
+ 2
2014
+
2015
+ + b∗
2016
+ lαal˜α
2017
+
2018
+ F˜αρF †
2019
+ α − {F †
2020
+ αF˜α, ρ}
2021
+ 2
2022
+ + [F †
2023
+ αF˜α, ρ]
2024
+ 2
2025
+
2026
+ + a′∗
2027
+ lαc′
2028
+ l˜α
2029
+
2030
+ F˜αρF †
2031
+ α − {F †
2032
+ αF˜α, ρ}
2033
+ 2
2034
+ − [F †
2035
+ αF˜α, ρ]
2036
+ 2
2037
+ ��
2038
+ ,
2039
+ (A2)
2040
+ where, A, B
2041
+ =
2042
+ AB + BA is the anti-commutator.
2043
+ Next,
2044
+ we
2045
+ note
2046
+ that
2047
+ the
2048
+ summation
2049
+ �d2
2050
+ α,˜α=1
2051
+ in
2052
+ above
2053
+ equation,
2054
+ can
2055
+ be
2056
+ written
2057
+ as
2058
+ �d2
2059
+ α,˜α=1
2060
+ =
2061
+
2062
+ α=˜α=d2 + �d2−1
2063
+ α=1,˜α=d2 + �d2−1
2064
+ ˜α=1,α=d2 + �d2−1
2065
+ α,˜α=1 .
2066
+ Us-
2067
+ ing this, and the fact that Fd2 = IS/
2068
+
2069
+ d commutes with
2070
+ all operators, we combine all commutator terms and
2071
+ write them as as i[ρ, HS + HLS] to obtain
2072
+ ∂ρ
2073
+ ∂t = i[ρ, HS + HLS] +
2074
+ d2−1
2075
+
2076
+ α,˜α=1
2077
+ Γα˜α
2078
+
2079
+ F˜αρF †
2080
+ α − {F †
2081
+ αF˜α, ρ}
2082
+ 2
2083
+
2084
+ .
2085
+ (A3)
2086
+ Here
2087
+ HLS = ϵ2 �
2088
+ l
2089
+
2090
+ d2
2091
+
2092
+ α,˜α=1
2093
+ �a∗
2094
+ lαbl˜α
2095
+ 2i
2096
+ − c′∗
2097
+ lαa′
2098
+ l˜α
2099
+ 2i
2100
+ − b∗
2101
+ lαal˜α
2102
+ 2i
2103
+ + a′∗
2104
+ lαc′
2105
+ l˜α
2106
+ 2i
2107
+
2108
+ F †
2109
+ αF˜α
2110
+ +
2111
+ d2−1
2112
+
2113
+ α=1
2114
+ (a∗
2115
+ lαbl,d2 + c′∗
2116
+ lαa′
2117
+ ld2 + b∗
2118
+ lαal,d2 + a′∗
2119
+ lαc′
2120
+ l,d2)
2121
+ 2i
2122
+
2123
+ d
2124
+ F †
2125
+ α
2126
+
2127
+ d2−1
2128
+
2129
+ ˜α=1
2130
+ (a∗
2131
+ ld2bl˜α + c′∗
2132
+ l,d2a′
2133
+ l˜α + b∗
2134
+ l,d2al˜α + a′∗
2135
+ l,d2c′
2136
+ l˜α)
2137
+ 2i
2138
+
2139
+ d
2140
+ F˜α
2141
+
2142
+ (A4)
2143
+ and
2144
+ Γα˜α = ϵ2 �
2145
+ l
2146
+ (a∗
2147
+ lαbl˜α + c′∗
2148
+ lαa′
2149
+ l˜α + b∗
2150
+ lαal˜α + a′∗
2151
+ lαc′
2152
+ l˜α),
2153
+ (A5)
2154
+ α, ˜α going from 1 to d2 − 1. This is Eq. (15) given in the
2155
+ main text.
2156
+ Appendix B: An example of RE violating complete
2157
+ positivity
2158
+ In this section, we will present a simple example of the
2159
+ discussion in Sec. II. Our setup consists of a two-qubit
2160
+ XXZ qubit chain, where only the first qubit is connected
2161
+ to the bath modelled by an infinite number of bosonic
2162
+ modes.
2163
+ Let H be the Hamiltonian of the full set-up,
2164
+ given by
2165
+ H = HS + ϵ HSB + HB,
2166
+ (B1)
2167
+ where
2168
+ HS = ω0
2169
+ 2 (σ(1)
2170
+ z
2171
+ + σ(2)
2172
+ z )
2173
+ − g(σ(1)
2174
+ x σ(2)
2175
+ x
2176
+ + σ(1)
2177
+ y σ(2)
2178
+ y
2179
+ + ∆σ(1)
2180
+ z σ(2)
2181
+ z )
2182
+ HSB =
2183
+
2184
+
2185
+ r=1
2186
+ (κr ˆB†
2187
+ rσ(1)
2188
+ − + κ∗
2189
+ r ˆBrσ(1)
2190
+ + )
2191
+ HB =
2192
+
2193
+
2194
+ r=1
2195
+ Ωr ˆB†
2196
+ r ˆBr
2197
+ (B2)
2198
+
2199
+ 14
2200
+ where σ(ℓ)
2201
+ x,y,z denotes the Pauli matrices acting on the ℓth
2202
+ qubit, σ(ℓ)
2203
+ +
2204
+ = (σ(ℓ)
2205
+ x
2206
+ + iσ(ℓ)
2207
+ y )/2, σ(ℓ)
2208
+
2209
+ = (σ(ℓ)
2210
+ x
2211
+ − iσ(ℓ)
2212
+ y )/2,
2213
+ ˆBr is bosonic annihilation operator for the rth mode of
2214
+ the bath. Here, ω0, g, and g∆ represent the magnetic
2215
+ field, the overall qubit-qubit coupling strength and the
2216
+ anisotropy respectively. The RE for this setup can be
2217
+ computed to be [23]
2218
+ ∂ρ
2219
+ ∂t = i[ρ(t), HS] + ϵ2�
2220
+ [S†, S(1)ρ(t)] − [S†, ρ(t)S(2)]
2221
+ + H.c
2222
+
2223
+ (B3)
2224
+ with
2225
+ S† = σ(1)
2226
+ + ,
2227
+ S = σ(1)
2228
+
2229
+ S(1) =
2230
+ 4
2231
+
2232
+ j,k=1
2233
+ |Ej⟩ ⟨Ej| σ(1)
2234
+ − |Ek⟩ ⟨Ek| D(j, k),
2235
+ S(2) =
2236
+ 4
2237
+
2238
+ j,k=1
2239
+ |Ej⟩ ⟨Ej| σ(1)
2240
+ − |Ek⟩ ⟨Ek| C(j, k)
2241
+ ,
2242
+ (B4)
2243
+ and
2244
+ C(j, k) = J(Ekj)n(Ekj)
2245
+ 2
2246
+ − iP
2247
+ � ∞
2248
+ 0
2249
+ dω J(ω)n(ω)
2250
+ ω − Ekj
2251
+ ,
2252
+ D(j, k) = eβ(Ekj−µℓ)J(Ekj)n(Ekj)
2253
+ 2
2254
+ − iP
2255
+ � ∞
2256
+ 0
2257
+ dω eβ(ω−µ)J(ω)n(ω)
2258
+ ω − Ekj
2259
+ ,
2260
+ J(ω) =
2261
+
2262
+
2263
+ k=1
2264
+ 2π |κk|2 δ(ω − Ωk),
2265
+ n(ω) = [eβω − 1]−1.
2266
+ (B5)
2267
+ In above, J(ω) is called the bath spectral function. Let us
2268
+ consider bosonic baths described by Ohmic spectral func-
2269
+ tions with Gaussian cut-offs, J(ω) = ωe−(ω/ωc)2Θ(ω),
2270
+ where Θ(ω) is the Heaviside step function, and ωc is the
2271
+ cut-off frequency. The above operators can then be com-
2272
+ puted numerically.
2273
+ The next step is to choose the basis fi and gj for oper-
2274
+ ators on HL and HM. For the general case, one can start
2275
+ with any set of linearly independent operators that forms
2276
+ a basis and includes the identity operator, and then ap-
2277
+ ply the Gram Schmidt orthonormalization procedure to
2278
+ produce an orthonormal basis that includes the normal-
2279
+ ized identity operator. For our case, one can easily verify
2280
+ that the set {−σ(i)
2281
+ z /
2282
+
2283
+ 2, σ(i)
2284
+ − , σ(i)
2285
+ + , I(i)
2286
+ 2 /
2287
+
2288
+ 2} suffices, where
2289
+ i = 1 for {fi} and i = 2 for {gj}, and I2 is the identity
2290
+ operator.
2291
+ The basis for the full system {Fi} can be constructed
2292
+ from the above basis as described in subsection
2293
+ II A 1,
2294
+ and is given by
2295
+ Fi = fi ⊗ I(2)
2296
+ 2
2297
+ 2
2298
+ (for i = 1, 2, 3)
2299
+ F3i+j = fi ⊗ gj
2300
+ (for i = 1, 2, 3, 4 and j = 1, 2, 3)
2301
+ F16 = I4
2302
+ 2
2303
+ (B6)
2304
+ Any operator X can be expanded in terms of the above
2305
+ basis as X = �
2306
+ α xαFα, where xα = ⟨Fα, X⟩ = Tr(F †
2307
+ αX).
2308
+ Thus, expanding S, S†, S(1), S(2) [Eq. (B4)], one can
2309
+ evaluate all the coefficients in Eq. (13).
2310
+ Finally, one
2311
+ can compute the matrix Γ according to Eq. (16). The
2312
+ matrix Γ for this example, with parameters chosen as
2313
+ g = 0.1, ω0 = 1, ωc = 10, β = 1, µ = −0.5, ∆ = 1 is given
2314
+ by
2315
+ Γ = ϵ2
2316
+
2317
+ �����������������������
2318
+ 0
2319
+ 0
2320
+ 0
2321
+ 0
2322
+ 0
2323
+ 0
2324
+ 0
2325
+ 0 0 0 0 0 0 0 0
2326
+ 0
2327
+ 0
2328
+ 1.542 + 3.428i 0
2329
+ 0
2330
+ 0.014 + 0.047i
2331
+ 0
2332
+ 0 0 0 0 0 0 0 0
2333
+ 0 1.542 − 3.428i
2334
+ 0
2335
+ 0 −0.18 − 0.007i
2336
+ 0
2337
+ 0.18 + 0.007i 0 0 0 0 0 0 0 0
2338
+ 0
2339
+ 0
2340
+ 0
2341
+ 0
2342
+ 0
2343
+ 0
2344
+ 0
2345
+ 0 0 0 0 0 0 0 0
2346
+ 0
2347
+ 0
2348
+ −0.18 + 0.007i 0
2349
+ 0
2350
+ 0
2351
+ 0
2352
+ 0 0 0 0 0 0 0 0
2353
+ 0 0.014 − 0.047i
2354
+ 0
2355
+ 0
2356
+ 0
2357
+ 0
2358
+ 0
2359
+ 0 0 0 0 0 0 0 0
2360
+ 0
2361
+ 0
2362
+ 0.18 − 0.007i
2363
+ 0
2364
+ 0
2365
+ 0
2366
+ 0
2367
+ 0 0 0 0 0 0 0 0
2368
+ 0
2369
+ 0
2370
+ 0
2371
+ 0
2372
+ 0
2373
+ 0
2374
+ 0
2375
+ 0 0 0 0 0 0 0 0
2376
+ 0
2377
+ 0
2378
+ 0
2379
+ 0
2380
+ 0
2381
+ 0
2382
+ 0
2383
+ 0 0 0 0 0 0 0 0
2384
+ 0
2385
+ 0
2386
+ 0
2387
+ 0
2388
+ 0
2389
+ 0
2390
+ 0
2391
+ 0 0 0 0 0 0 0 0
2392
+ 0
2393
+ 0
2394
+ 0
2395
+ 0
2396
+ 0
2397
+ 0
2398
+ 0
2399
+ 0 0 0 0 0 0 0 0
2400
+ 0
2401
+ 0
2402
+ 0
2403
+ 0
2404
+ 0
2405
+ 0
2406
+ 0
2407
+ 0 0 0 0 0 0 0 0
2408
+ 0
2409
+ 0
2410
+ 0
2411
+ 0
2412
+ 0
2413
+ 0
2414
+ 0
2415
+ 0 0 0 0 0 0 0 0
2416
+ 0
2417
+ 0
2418
+ 0
2419
+ 0
2420
+ 0
2421
+ 0
2422
+ 0
2423
+ 0 0 0 0 0 0 0 0
2424
+ 0
2425
+ 0
2426
+ 0
2427
+ 0
2428
+ 0
2429
+ 0
2430
+ 0
2431
+ 0 0 0 0 0 0 0 0
2432
+
2433
+ �����������������������
2434
+ (B7)
2435
+
2436
+ 15
2437
+ We see that the above matrix has the expected struc-
2438
+ ture of Eq. (17),
2439
+ Γ =
2440
+
2441
+ Γα,˜α<4
2442
+ Γα<4,˜α≥4
2443
+ Γα≥4,˜α<4
2444
+ 0
2445
+
2446
+ (B8)
2447
+ and crucially, Γα<4,˜α≥4 ̸= 0. Therefore, as per the GKSL
2448
+ theorem, this RE will not preserve complete positivity.
2449
+ This example was computed using QuTiP [68, 69].
2450
+ Appendix C: Effective Lindblad equation satisfying
2451
+ local conservation laws
2452
+ In this appendix, we will show that Eq. (29) implies
2453
+ Eq. (31). The condition for a QME preserving complete
2454
+ positivity and obeying local conservation laws is given by
2455
+ Eq. (29), which we recall to be
2456
+ − i[OM, H′] +
2457
+ d2
2458
+ M−1
2459
+
2460
+ αM,˜αM=1
2461
+ �ΛαM,˜αM
2462
+
2463
+ g†
2464
+ αM OMg˜αM
2465
+ − 1
2466
+ 2OMg†
2467
+ αM g˜αM − 1
2468
+ 2g†
2469
+ αM g˜αM OM
2470
+
2471
+ = 0,
2472
+ ∀OM,
2473
+ (C1)
2474
+ where we write
2475
+ H′ =
2476
+ d2
2477
+ M
2478
+
2479
+ αM=1
2480
+ νd2
2481
+ L,αM gαM ,
2482
+ (C2)
2483
+ for convenience. To move forward we will use the opera-
2484
+ tor vector correspondence from Ref. 9, where the vector-
2485
+ ized version of the operator X is given by vec(X), and
2486
+ can be constructed using linearity and
2487
+ vec(|i⟩ ⟨j|) = |i⟩ ⊗ |j⟩∗ ,
2488
+ (C3)
2489
+ where |j⟩∗ denotes the complex conjugate of |j⟩. We will
2490
+ apply Eq. (C3) to Eq. (C1), using the identity (Eq. 1.132
2491
+ of Ref. 9)
2492
+ vec(A0BAT
2493
+ 1 ) = (A0 ⊗ A1)vec(B).
2494
+ (C4)
2495
+ Applying the vec operation on both sides of Eq. (C1),
2496
+ we obtain
2497
+ − i vec(IMOMH′) + i vec(H′OMIM) +
2498
+ d2
2499
+ M−1
2500
+
2501
+ αM,˜αM=1
2502
+ �ΛαM,˜αM
2503
+
2504
+ vec(g†
2505
+ αM OMg˜αM ) − 1
2506
+ 2vec(IMOMg†
2507
+ αM g˜αM )
2508
+ − 1
2509
+ 2vec(g†
2510
+ αM g˜αM OMIM)
2511
+
2512
+ = 0,
2513
+ ∀OM.
2514
+ (C5)
2515
+ Eq. (C5) can be simplified using Eq. (C4) to obtain,
2516
+
2517
+ − iIM ⊗ (H′)T + iH′ ⊗ IM
2518
+ d2
2519
+ M−1
2520
+
2521
+ αM,˜αM=1
2522
+ �ΛαM,˜αM
2523
+
2524
+ g†
2525
+ αM ⊗ gT
2526
+ ˜αM − 1
2527
+ 2IM ⊗ (g†
2528
+ αM g˜αM )T
2529
+ − 1
2530
+ 2(g†
2531
+ αM g˜αM ) ⊗ IM
2532
+ ��
2533
+ vec(OM) = 0,
2534
+ ∀OM.
2535
+ (C6)
2536
+ Eq. (C6) is of the form M vec(OM) = 0 for all hermi-
2537
+ tian OM. Since hermitian matrices (such as OM) form
2538
+ a basis for the entire space of operators, this implies
2539
+ M vec(X) = 0 for all operators X. This is because one
2540
+ can expand X as a linear combination of hermitian op-
2541
+ erators (such as OM). Now, M vec(X) = 0 ∀ X implies
2542
+ M = 0. Therefore, Eq. (C6) implies
2543
+ M = − iIM ⊗ (H′)T + iH′ ⊗ IM +
2544
+ d2
2545
+ M−1
2546
+
2547
+ αM,˜αM=1
2548
+ �ΛαM,˜αM
2549
+
2550
+ g†
2551
+ αM ⊗ gT
2552
+ ˜αM − 1
2553
+ 2IM ⊗ (g†
2554
+ αM g˜αM )T
2555
+ − 1
2556
+ 2(g†
2557
+ αM g˜αM ) ⊗ IM
2558
+
2559
+ = 0.
2560
+ (C7)
2561
+ If M = 0, then Tr(M) = 0. Taking the trace of Eq. (C7),
2562
+ and using the orthonormality of {gi} along with the fact
2563
+ that Tr(gi) = δi,d2
2564
+ M , we obtain
2565
+ Tr(M) = −
2566
+ d2
2567
+ M−1
2568
+
2569
+ αM=1
2570
+ �ΛαM,αM dM = 0
2571
+ (C8)
2572
+ which implies
2573
+ d2
2574
+ M−1
2575
+
2576
+ αM=1
2577
+ �ΛαM,αM =
2578
+ d2
2579
+ M−1
2580
+
2581
+ αM=1
2582
+ d2
2583
+ L
2584
+
2585
+ αL=1
2586
+ �Γ(αL,αM),(αL,αM) = 0. (C9)
2587
+ which is Eq. (31) in the main text.
2588
+ Appendix D: The condition for thermalization
2589
+ From fundamental principles of quantum statistical
2590
+ mechanics, we expect the system to thermalize when cou-
2591
+ pled to baths at equal temperatures. The exact condition
2592
+ that QME’s must obey to satisfy thermalization has been
2593
+ derived in Ref. 23. For the sake of completeness, we recall
2594
+ that discussion here.
2595
+ Let the total system Hamiltonian be given by H =
2596
+ HS + ϵHSB + HB, where ϵ is a dimensionless parame-
2597
+ ter controlling the strength of the system bath coupling,
2598
+ and HSB is the system bath coupling Hamiltonian. We
2599
+ proceed by obtaining an order-by-order solution to the
2600
+ steady state of our QME. Any QME describing our setup
2601
+
2602
+ 16
2603
+ can be expanded in the so-called time-convolution-less
2604
+ form [6],
2605
+ ∂ρ(t)
2606
+ ∂t
2607
+ =
2608
+
2609
+
2610
+ m=0
2611
+ ϵ2mL2m(t)[ρ(t)],
2612
+ (D1)
2613
+ where L could in general be time-dependent operators
2614
+ and L0(t)[ρ(t)] = i[ρ(t), HS]. For quantum master equa-
2615
+ tions written to second-order in system-bath coupling,
2616
+ the above summation can be truncated at second order.
2617
+ Denoting L2m ≡ limt→∞ L2m(t), the steady state ρSS
2618
+ can be given by
2619
+ ρSS = lim
2620
+ t→∞ et(L0+ϵ2L2)ρ(0),
2621
+ (D2)
2622
+ which is assumed to be unique. The steady state satisfies
2623
+ 0 =
2624
+
2625
+
2626
+ m=0
2627
+ ϵ2mL2m[ρSS].
2628
+ (D3)
2629
+ We can then perform an expansion of ρSS in the even
2630
+ powers of ϵ as
2631
+ ρSS =
2632
+
2633
+
2634
+ m=0
2635
+ ϵ2mρ(2m)
2636
+ SS
2637
+ (D4)
2638
+ Using Eq. (D4) in Eq. (D3), we can obtain an order by
2639
+ order solution of ρSS. At the zeroth order in ϵ, we obtain
2640
+ [ρ(0)
2641
+ SS, HS] = 0.
2642
+ (D5)
2643
+ Assuming that the Hamiltonian has no degeneracies,
2644
+ Eq. (D5) implies that ρ(0)
2645
+ SS is diagonal in the energy eigen-
2646
+ basis,
2647
+ ρ(0)
2648
+ SS =
2649
+
2650
+ i
2651
+ pi |Ei⟩ ⟨Ei| .
2652
+ (D6)
2653
+ where |Ei⟩ is an eigenstate of the system. At second order
2654
+ in ϵ (m = 1), we obtain the following two equations,
2655
+ ⟨Ei| L2[ρ(0)
2656
+ SS] |Ei⟩ = 0,
2657
+ ∀i
2658
+ (D7)
2659
+ i(Ei − Ej) ⟨Ei| ρ(2)
2660
+ SS |Ej⟩
2661
+ +ϵ2 ⟨Ei| L2[ρ(0)
2662
+ SS] |Ej⟩ = 0,
2663
+ ∀i ̸= j
2664
+ (D8)
2665
+ Since ρ(0)
2666
+ SS is diagonal in the energy eigenbasis, Eq. (D7)
2667
+ determines the diagonal elements of ρ(0)
2668
+ SS.
2669
+ Having ob-
2670
+ tained ρ(0)
2671
+ SS, Eq. (D8) then determines the off-diagonal
2672
+ elements of ρ(2)
2673
+ SS.
2674
+ Note from above equations that the
2675
+ leading order diagonal elements of ρSS are independent
2676
+ of ϵ.
2677
+ It can also be shown that the leading order off-
2678
+ diagonal elements of ρSS in the energy eigenbasis of the
2679
+ system scale as ϵ2. As discussed in the main text, the
2680
+ QME thermalizes if
2681
+ lim
2682
+ ϵ→0 ρSS = ρth
2683
+ (D9)
2684
+ where ρth is the Gibbs state of the system given by
2685
+ ρth =
2686
+ e−βHS
2687
+ Tr[e−βHS].
2688
+ (D10)
2689
+ We then conclude that the thermalization in this sense
2690
+ is a statement about leading order diagonal elements of
2691
+ ρSS. Substituting Eq. (D9) in Eq. (D7), we obtain the
2692
+ following condition on L2 for the system to thermalize,
2693
+ ⟨Ei| L2[ρth] |Ei⟩ = 0
2694
+ ∀i.
2695
+ (D11)
2696
+ Appendix E: Semidefinite Programming (SDP)
2697
+ 1.
2698
+ Basic Theory
2699
+ In this section, we present the theoretical framework of
2700
+ semidefinite programming (SDP). We follow the defini-
2701
+ tion of SDPs given in page 57 of Ref. 9. In what follows,
2702
+ we will use Φ and Ψ to denote hermitian preserving lin-
2703
+ ear maps. We will also use Φ† to denote the “adjoint
2704
+ map” [9], which is defined as the unique linear map that
2705
+ satisfies
2706
+ ⟨A, Φ(B)⟩ = ⟨Φ†(A), B⟩
2707
+ (E1)
2708
+ where
2709
+ ⟨A, B⟩ = Tr(A†B)
2710
+ (E2)
2711
+ denotes the Hilbert Schmidt inner product.
2712
+ An SDP is defined by the tuple (Φ, Ψ, A, B, C), where
2713
+ Φ, Ψ are hermitian-preserving linear maps, and A, B, C
2714
+ are hermitian operators. The “primal” problem of the
2715
+ SDP is given by
2716
+ maximize :
2717
+ ⟨A, X⟩
2718
+ w.r.t. X
2719
+ subject to :
2720
+ Φ(X) = B, Ψ(X) ≤ C, X ≥ 0,
2721
+ (E3)
2722
+ where the inequalities represent matrix inequalities. I.e,
2723
+ A ≥ B is equivalent to A − B ≥ 0 and implies A − B
2724
+ is positive semidefinite. We will use the notation Xf to
2725
+ denote any “feasible” value of X that satisfies the three
2726
+ constraints in Eq. (E3), and P to denote the maximum
2727
+ value of ⟨A, X⟩ attained in Eq. (E3) (assuming there is
2728
+ atleast one X which satisfies constraints).
2729
+ For every “primal” problem, there exists a “dual”
2730
+ problem given by
2731
+ minimize :
2732
+ ⟨B, Y ⟩ + ⟨C, Z⟩
2733
+ w.r.t. Y, Z
2734
+ subject to :
2735
+ Φ†(Y ) + Ψ†(Z) ≥ A,
2736
+ Y is hermitian, Z ≥ 0.
2737
+ (E4)
2738
+ We will use the notation (Yf, Zf) to denote any “fea-
2739
+ sible” value of Y, Z that satisfies the three constraints
2740
+ in Eq. (E4), and D to denote the minimum value of
2741
+ ⟨B, Y ⟩ + ⟨C, Z⟩ attained in Eqs. (E4) (assuming atleast
2742
+ some (Y, Z) satisfies constraints).
2743
+
2744
+ 17
2745
+ FIG. 7.
2746
+ Schematic representing weak duality for the SDP
2747
+ given in Eqs. (E3) and (E4), according to Eq. (E6).
2748
+ X(j)
2749
+ f
2750
+ and (Y (j)
2751
+ f
2752
+ , Z(j)
2753
+ f ) represents any feasible input to the primal
2754
+ and dual problems respectively. Any such inputs yield upper
2755
+ and lower bounds on the solutions of the primal and dual
2756
+ problems.
2757
+ Semidefinite programs have a notion of duality asso-
2758
+ ciated with them, which relates properties of the primal
2759
+ and the dual problems. In particular, it can be shown
2760
+ that
2761
+ P ≤ D
2762
+ (E5)
2763
+ a property known as “weak duality”.
2764
+ In most situa-
2765
+ tions, it can be shown that P = D, i.e, equality holds
2766
+ in Eq. (E5). This condition is known as “strong dual-
2767
+ ity”.
2768
+ By weak duality and the definition of our primal and
2769
+ dual problems, using Eq. (E3),(E4), and (E5), we obtain
2770
+ ⟨A, Xf⟩ ≤ P ≤ D ≤ ⟨B, Yf⟩ + ⟨C, Zf⟩ .
2771
+ (E6)
2772
+ From Eq. (E6), any feasible choice of inputs to the pri-
2773
+ mal and dual problem (Xf, Yf, Zf) leads to lower and
2774
+ upper bounds on the optimal values of the primal and
2775
+ dual problems [see Fig. (7)]. In particular, if we obtain
2776
+ ⟨A, Xf⟩ = ⟨B, Yf⟩ + ⟨C, Zf⟩, equality holds throughout
2777
+ in Eq. (E6). This property can therefore be exploited to
2778
+ obtain exact solutions to the primal problem of an SDP.
2779
+ We will show in Sec. E 2 that the thermal optimiza-
2780
+ tion problem (TOP) in Eq. (40) can be reduced to the
2781
+ standard form of SDP [Eq. (E3)].
2782
+ 2.
2783
+ Reducing the thermal optimization problem
2784
+ (TOP) to standard form
2785
+ Recall that the TOP was given by [Eq.(40)]
2786
+ minimize : τ
2787
+ subject to : H(L)
2788
+ LS is hermitian, Tr(Γ(L)) = 1, Γ(L) ≥ 0.
2789
+ (E7)
2790
+ See Eq. (39) for definition of τ and Eq. (38) for defini-
2791
+ tion of H(L)
2792
+ LS , Γ(L). In this subsection, we will show how
2793
+ the TOP from Eq. (E7) can be reduced to the standard
2794
+ form of an SDP. We note that the standard form of SDP
2795
+ in Eq. (E3) is not yet suitable for this purpose. There-
2796
+ fore, we replace A → −A, C → −C, Ψ → −Ψ, Y → −Y,
2797
+ in Eq. (E3) and Eq. (E4), leaving Φ, B, X and Z un-
2798
+ changed. Since maximizing any function is the same as
2799
+ minimizing its negative, we obtain the new “primal” form
2800
+ as
2801
+ minimize :
2802
+ ⟨A, X⟩
2803
+ subject to :
2804
+ Φ(X) = B, Ψ(X) ≥ C, X ≥ 0,
2805
+ (E8)
2806
+ FIG. 8.
2807
+ Schematic representing weak duality for the SDP
2808
+ given in Eqs. (E8) and (E9), according to Eq. (E10). X(j)
2809
+ f
2810
+ and (Y (j)
2811
+ f
2812
+ , Z(j)
2813
+ f ) represents any feasible input to the primal
2814
+ and dual problems respectively. Any such inputs yield upper
2815
+ and lower bounds on the solutions of the primal and dual
2816
+ problems.
2817
+ where we use �P to denote the minimum value of ⟨A, X⟩
2818
+ obtained in Eq. (E8). The new “dual” form is written as
2819
+ maximize :
2820
+ ⟨B, Y ⟩ + ⟨C, Z⟩
2821
+ subject to :
2822
+ Φ†(Y ) + Ψ†(Z) ≤ A,
2823
+ Y is hermitian, Z ≥ 0,
2824
+ (E9)
2825
+ where we use �D to denote the minimum value of ⟨B, Y ⟩+
2826
+ ⟨C, Z⟩ obtained in Eq. (E9). Eq. (E6) is then transformed
2827
+ into [see Fig (8)],
2828
+ ⟨A, Xf⟩ ≥ �P ≥ �D ≥ ⟨B, Yf⟩ + ⟨C, Zf⟩ .
2829
+ (E10)
2830
+ We will now show how to reduce the TOP from
2831
+ Eq. (E7) to Eq. (E8), via a series of changes to the opti-
2832
+ mization problem in Eq. (E8). We do so in three steps.
2833
+ Step 1: Our first step is to write down a primal op-
2834
+ timization problem whose solution (minimum value at-
2835
+ tained) is equal to
2836
+ ||K||1 = Tr(
2837
+
2838
+ K†K).
2839
+ (E11)
2840
+ for any hermitian matrix K. Let Πp and Πn be projectors
2841
+ onto the positive and negative eigenspaces of K. In this
2842
+ case,
2843
+ ||K||1 = Tr(ΠpKΠp) − Tr(ΠnKΠn).
2844
+ (E12)
2845
+ Let us now consider the optimization problem given by,
2846
+ minimize :
2847
+ ��
2848
+ I 0
2849
+ 0 I
2850
+
2851
+ ,
2852
+
2853
+ P
2854
+ .
2855
+ .
2856
+ Q
2857
+ ��
2858
+ subject to :
2859
+ Ψ1
2860
+
2861
+ P
2862
+ .
2863
+ .
2864
+ Q
2865
+
2866
+ =
2867
+
2868
+ P
2869
+ 0
2870
+ 0 Q
2871
+
2872
+
2873
+
2874
+ K
2875
+ 0
2876
+ 0
2877
+ −K
2878
+
2879
+ ,
2880
+
2881
+ P
2882
+ .
2883
+ .
2884
+ Q
2885
+
2886
+ ≥ 0,
2887
+ (E13)
2888
+ where we use dots to represent arbitrary blocks of the
2889
+ matrices which can always be set to zero without af-
2890
+ fecting the objective function or constraints. Note that
2891
+ Ψ1 in Eq. (E13) is a map that replaces the off-diagonal
2892
+ blocks with null matrices, leaving the diagonal blocks un-
2893
+ changed. It is easy to see that Eq. (E13) is of the form
2894
+ Eq. (E8) (with Φ and B omitted i.e., no equality con-
2895
+ straint). Thus Eq. (E13) is an SDP.
2896
+
2897
+ D
2898
+ (Yf),zf1)
2899
+ 8
2900
+ P
2901
+ α(f1),zf1)
2902
+ D
2903
+ 8
2904
+ (y(2), z(2)
2905
+ +8
2906
+ p18
2907
+ The dual problem to the primal problem in Eq. (E13)
2908
+ is given by
2909
+ maximize :
2910
+ ��
2911
+ K
2912
+ 0
2913
+ 0
2914
+ −K
2915
+
2916
+ ,
2917
+ � ¯P
2918
+ .
2919
+ .
2920
+ ¯Q
2921
+ ��
2922
+ subject to :
2923
+ Ψ†
2924
+ 1
2925
+ � ¯P
2926
+ .
2927
+ .
2928
+ ¯Q
2929
+
2930
+ =
2931
+ � ¯P
2932
+ 0
2933
+ 0
2934
+ ¯Q
2935
+
2936
+
2937
+
2938
+ I 0
2939
+ 0 I
2940
+
2941
+ � ¯P
2942
+ .
2943
+ .
2944
+ ¯Q
2945
+
2946
+ ≥ 0.
2947
+ (E14)
2948
+ where Ψ†
2949
+ 1 turns out to be the same map as Ψ1 using
2950
+ Eq. (E1). It can be seen that Eq. (E14) is of the form
2951
+ Eq. (E9) (again with Φ and B omitted).
2952
+ We will now show that the optimal values attained in
2953
+ both the primal and dual problems in Eqs. (E13) and
2954
+ (E14) is equal to ||K||1. To show this, note that setting
2955
+ Pf = ΠpKΠp,
2956
+ Qf = −ΠnKΠn
2957
+ (E15)
2958
+ (where Pf and Qf denote ‘feasible’ choices of P and Q
2959
+ respectively) in Eq. (E13) allows us to obtain ||K||1 in
2960
+ the primal objective function. Furthermore, setting
2961
+ ¯Pf = Πp,
2962
+ ¯Qf = Πn
2963
+ (E16)
2964
+ in Eq. (E14) allows us to obtain ||K||1 in the dual objec-
2965
+ tive function. Thus, we have explicitly constructed fea-
2966
+ sible choices of inputs to the primal and dual problems
2967
+ of Eqs. (E13) and (E14) respectively, that yield ||K||1
2968
+ in the primal and dual objective functions. Therefore,
2969
+ according to Eq. (E10), the optimal values attained in
2970
+ the primal and dual problems are both exactly equal to
2971
+ ||K||1.
2972
+ Step 2: In the first step we constructed an SDP whose
2973
+ solution is equal to ||K||1, for a fixed K. We will now
2974
+ construct an SDP which computes the minimum value of
2975
+ ||K||1, subject to some constraints on K. We will first
2976
+ recast the problem in Eq. (E13) as
2977
+ minimize :
2978
+ Tr(P) + Tr(Q)
2979
+ subject to :
2980
+ P ≥ K, Q ≥ −K, P, Q ≥ 0.
2981
+ (E17)
2982
+ Eq. (E13) computes
2983
+ ||K||1 =
2984
+
2985
+ i
2986
+ |Kii|.
2987
+ (E18)
2988
+ when K is diagonal. Let G be a linear, hermitian preserv-
2989
+ ing map that always outputs a diagonal matrix. Then,
2990
+ the optimization problem given by
2991
+ minimize :
2992
+ Tr(P) + Tr(Q)
2993
+ subject to :
2994
+ P ≥ G(R), Q ≥ −G(R),
2995
+ Φ(R) = B,
2996
+ P, Q, R ≥ 0,
2997
+ (E19)
2998
+ computes minR≥0,Φ(R)=B
2999
+
3000
+ i |G(R)ii|. We will now begin
3001
+ to connect the above formalism to TOP from Eq. (E7).
3002
+ We will show how R can be chosen to reflect the opti-
3003
+ mization over H(L)
3004
+ LS and Γ(L), and Φ can be chosen to
3005
+ reflect the trace constraint on Γ(L). Then, we will spec-
3006
+ ify a map G that takes R as input (i.e, H(L)
3007
+ LS and Γ(L)
3008
+ LS ),
3009
+ and outputs a diagonal matrix such that the objective
3010
+ function computes
3011
+ τ =
3012
+
3013
+ i
3014
+ |⟨Ei| L2(ρth) |Ei⟩| .
3015
+ (E20)
3016
+ Step
3017
+ 3:
3018
+ In
3019
+ the
3020
+ thermal
3021
+ optimization
3022
+ problem
3023
+ [Eq. (E7)], we have an optimization over Γ(L) ≥ 0, and
3024
+ hermitian H(L)
3025
+ LS . We use the fact that any hermitian ma-
3026
+ trix H(L)
3027
+ LS can be written as a H(L)
3028
+ LS
3029
+ = S − T, where
3030
+ S, T ≥ 0. Moreover S − T for any S, T ≥ 0 is always
3031
+ hermitian. We will now replace the hermitian H(L)
3032
+ LS with
3033
+ the difference of positive matrices S − T. This is needed,
3034
+ since semidefinite programs can only handle optimization
3035
+ over positive semidefinite variables. Furthermore, let us
3036
+ identify Γ(L) with some matrix U. Now consider the map
3037
+ G that acts as follows :
3038
+ G
3039
+
3040
+
3041
+ S
3042
+ .
3043
+ .
3044
+ . T
3045
+ .
3046
+ .
3047
+ .
3048
+ U
3049
+
3050
+ � ≡ G(S, T, U) ≡
3051
+
3052
+
3053
+
3054
+
3055
+
3056
+ ⟨E1| L2(ρth) |E1⟩
3057
+ 0
3058
+ . . .
3059
+ 0
3060
+ 0
3061
+ ⟨E2| L2(ρth) |E2⟩ . . .
3062
+ 0
3063
+ ...
3064
+ . . .
3065
+ ...
3066
+ ...
3067
+ 0
3068
+ . . .
3069
+ 0
3070
+ ⟨Ed| L2(ρth) |Ed⟩ ,
3071
+
3072
+
3073
+
3074
+
3075
+
3076
+ (E21)
3077
+ where the map constructs L2 according to Eq. (38) after
3078
+ setting H(L)
3079
+ LS = S − T, and Γ(L) = U. Now, we consider
3080
+ a specific case of the optimization problem in Eq. (E19),
3081
+ for the choice of G in Eq. (E21). We obtain,
3082
+ minimize :
3083
+ Tr(P) + Tr(Q)
3084
+ subject to :
3085
+ P ≥ G
3086
+
3087
+
3088
+ S
3089
+ .
3090
+ .
3091
+ . T
3092
+ .
3093
+ .
3094
+ .
3095
+ U
3096
+
3097
+ � , Q ≥ −G
3098
+
3099
+
3100
+ S
3101
+ .
3102
+ .
3103
+ . T
3104
+ .
3105
+ .
3106
+ .
3107
+ U
3108
+
3109
+ � ,
3110
+ Φ1
3111
+
3112
+
3113
+ S
3114
+ .
3115
+ .
3116
+ . T
3117
+ .
3118
+ .
3119
+ .
3120
+ U
3121
+
3122
+ � = Tr(U) = 1, P, Q, S, T, U ≥ 0.
3123
+ (E22)
3124
+
3125
+ 19
3126
+ Since G always outputs a diagonal matrix [see Eq. (E21)],
3127
+ Eq. (E22) computes
3128
+ min
3129
+
3130
+ i
3131
+ ������
3132
+ G
3133
+
3134
+
3135
+ S
3136
+ T
3137
+ U
3138
+
3139
+
3140
+ ii
3141
+ ������
3142
+ subject to :
3143
+ S, T, U ≥ 0, Tr(U) = 1
3144
+ (E23)
3145
+ Since H(L)
3146
+ LS can always be written as S−T, and Γ(L) as U,
3147
+ Eq. (E23) [and therefore Eq. (E22) ] is identical to the
3148
+ thermal optimization problem in Eq. (E7).
3149
+ Therefore,
3150
+ Eq. (E22) computes τopt.
3151
+ All that remains is converting Eq. (E22) to the stan-
3152
+ dard form Eq. (E8).
3153
+ Eq. (E22) can be obtained from
3154
+ Eq. (E22) after choosing
3155
+ A =
3156
+
3157
+
3158
+
3159
+
3160
+
3161
+ I
3162
+ I
3163
+ 0
3164
+ 0
3165
+ 0
3166
+
3167
+
3168
+
3169
+
3170
+ � ,
3171
+ B = 1,
3172
+ X =
3173
+
3174
+
3175
+
3176
+
3177
+
3178
+ P
3179
+ .
3180
+ .
3181
+ .
3182
+ .
3183
+ .
3184
+ Q .
3185
+ .
3186
+ .
3187
+ .
3188
+ .
3189
+ S
3190
+ .
3191
+ .
3192
+ .
3193
+ .
3194
+ . T
3195
+ .
3196
+ .
3197
+ .
3198
+ .
3199
+ .
3200
+ U
3201
+
3202
+
3203
+
3204
+
3205
+ � ,
3206
+ C = 0,
3207
+ Ψ
3208
+
3209
+
3210
+
3211
+
3212
+
3213
+ P
3214
+ .
3215
+ .
3216
+ .
3217
+ .
3218
+ .
3219
+ Q .
3220
+ .
3221
+ .
3222
+ .
3223
+ .
3224
+ S
3225
+ .
3226
+ .
3227
+ .
3228
+ .
3229
+ . T
3230
+ .
3231
+ .
3232
+ .
3233
+ .
3234
+ .
3235
+ U
3236
+
3237
+
3238
+
3239
+
3240
+ � =
3241
+
3242
+ P − G(S, T, U)
3243
+ 0
3244
+ 0
3245
+ Q + G(S, T, U)
3246
+
3247
+ ,
3248
+ Φ
3249
+
3250
+
3251
+
3252
+
3253
+
3254
+ P
3255
+ .
3256
+ .
3257
+ .
3258
+ .
3259
+ .
3260
+ Q .
3261
+ .
3262
+ .
3263
+ .
3264
+ .
3265
+ S
3266
+ .
3267
+ .
3268
+ .
3269
+ .
3270
+ . T
3271
+ .
3272
+ .
3273
+ .
3274
+ .
3275
+ .
3276
+ U
3277
+
3278
+
3279
+
3280
+
3281
+ � = Tr(U)
3282
+ (E24)
3283
+ Recall that it is helpful to think of P, Q as variables
3284
+ needed to compute the objective function τ [Eq. (E7)],
3285
+ S, T are variables that give rise to H(L)
3286
+ LS = S − T, and U
3287
+ is a variable that encodes Γ(L). We have therefore shown
3288
+ that the TOP [Eq. (E7)] is an SDP.
3289
+ It is to be noted that it is not necessary to reduce
3290
+ the TOP to the standard form of an SDP in order to
3291
+ use CVX [33]. Infact, the TOP from Eq. (E7) can be
3292
+ directly implemented into CVX, which itself handles the
3293
+ construction of the dual problem automatically in the
3294
+ background.
3295
+ [1] F. Binder,
3296
+ L. A. Correa,
3297
+ C. Gogolin,
3298
+ J. Anders,
3299
+ and G. Adesso, eds., Thermodynamics in the Quantum
3300
+ Regime (Springer, Cham, 2018).
3301
+ [2] K. L. Hur, L. Henriet, A. Petrescu, K. Plekhanov,
3302
+ G. Roux, and M. Schir´o, Comptes Rendus Physique 17,
3303
+ 808 (2016).
3304
+ [3] Y. Cao, J. Romero, J. P. Olson, M. Degroote, P. D. John-
3305
+ son, M. Kieferov´a, I. D. Kivlichan, T. Menke, B. Per-
3306
+ opadre, N. P. D. Sawaya, and et al., Chemical Reviews
3307
+ 119, 10856–10915 (2019).
3308
+ [4] D. D. Awschalom, C. H. R. Du, R. He, J. Heremans,
3309
+ A. Hoffmann, J. Hou, H. Kurebayashi, Y. Li, L. Liu,
3310
+ V. Novosad, J. Sklenar, S. Sullivan, D. Sun, H. Tang,
3311
+ V. Tyberkevych, C. Trevillian, A. W. Tsen, L. Weiss,
3312
+ W. Zhang, X. Zhang, L. Zhao,
3313
+ and C. W. Zollitsch,
3314
+ IEEE Transactions on Quantum Engineering , 1 (2021).
3315
+ [5] J. Cao, R. J. Cogdell, D. F. Coker, H.-G. Duan, J. Hauer,
3316
+ U. Kleinekath¨ofer, T. L. C. Jansen, T. Manˇcal, R. J. D.
3317
+ Miller, J. P. Ogilvie, V. I. Prokhorenko, T. Renger, H.-S.
3318
+ Tan, R. Tempelaar, M. Thorwart, E. Thyrhaug, S. West-
3319
+ enhoff, and D. Zigmantas, Science Advances 6 (2020).
3320
+ [6] H.-P. Breuer and F. Petruccione, The Theory of Open
3321
+ Quantum Systems (Oxford University Press, Oxford,
3322
+ 2006).
3323
+ [7] ´A. Rivas and S. F. Huelga, SpringerBriefs in Physics
3324
+ (2012).
3325
+ [8] H. Carmichael, Statistical Methods in Quantum Op-
3326
+ tics 1. Master Equations and Fokker–Planck Equations
3327
+ (Springer-Verlag Berlin Heidelberg, 2002).
3328
+ [9] J. Watrous, The Theory of Quantum Information (Cam-
3329
+ bridge University Press, 2018).
3330
+ [10] V. Siddhu and S. Tayur, “Five starter pieces: Quantum
3331
+ information science via semidefinite programs,” in Tu-
3332
+ torials in Operations Research: Emerging and Impactful
3333
+ Topics in Operations (2022) Chap. 3, pp. 59–92.
3334
+ [11] D. A. Mazziotti, Phys. Rev. Lett. 93, 213001 (2004).
3335
+ [12] D. A. Mazziotti, Phys. Rev. Lett. 106, 083001 (2011).
3336
+ [13] M. M. Wolf, J. Eisert, T. S. Cubitt,
3337
+ and J. I. Cirac,
3338
+ Phys. Rev. Lett. 101, 150402 (2008).
3339
+ [14] T. S. Cubitt, J. Eisert, and M. M. Wolf, Communications
3340
+ in Mathematical Physics 310, 383 (2012).
3341
+ [15] A. H. Kiilerich and K. Mølmer, Phys. Rev. A 97, 052113
3342
+ (2018).
3343
+ [16] V. Gorini, A. Kossakowski,
3344
+ and E. C. G. Sudarshan,
3345
+ Journal of Mathematical Physics 17, 821 (1976).
3346
+ [17] V. Gorini, A. Frigerio, M. Verri, A. Kossakowski,
3347
+ and
3348
+ E. Sudarshan, Reports on Mathematical Physics 13, 149
3349
+ (1978).
3350
+ [18] G. Lindblad, Communications in Mathematical Physics
3351
+ 48, 119 (1976).
3352
+
3353
+ 20
3354
+ [19] H. Weimer, A. Kshetrimayum, and R. Or´us, Rev. Mod.
3355
+ Phys. 93, 015008 (2021).
3356
+ [20] M. B. Plenio and P. L. Knight, Rev. Mod. Phys. 70, 101
3357
+ (1998).
3358
+ [21] J. Dalibard, Y. Castin, and K. Mølmer, Phys. Rev. Lett.
3359
+ 68, 580 (1992).
3360
+ [22] K. Mølmer, Y. Castin, and J. Dalibard, Journal of the
3361
+ Optical Society of America B 10, 524 (1993).
3362
+ [23] D. Tupkary, A. Dhar, M. Kulkarni, and A. Purkayastha,
3363
+ Phys. Rev. A 105, 032208 (2022).
3364
+ [24] R. Hartmann and W. T. Strunz, Phys. Rev. A 101,
3365
+ 012103 (2020).
3366
+ [25] P. R. Eastham, P. Kirton, H. M. Cammack, B. W. Lovett,
3367
+ and J. Keeling, Phys. Rev. A 94, 012110 (2016).
3368
+ [26] S. Anderloni, F. Benatti,
3369
+ and R. Floreanini, Journal
3370
+ of Physics A: Mathematical and Theoretical 40, 1625
3371
+ (2007).
3372
+ [27] P. Gaspard and M. Nagaoka, The Journal of Chemical
3373
+ Physics 111, 5668 (1999).
3374
+ [28] D. Kohen, C. C. Marston, and D. J. Tannor, The Journal
3375
+ of Chemical Physics 107, 5236 (1997).
3376
+ [29] S. Gnutzmann and F. Haake, Zeitschrift f¨ur Physik B
3377
+ Condensed Matter 101, 263 (1996).
3378
+ [30] A. Su´arez, R. Silbey, and I. Oppenheim, The Journal of
3379
+ Chemical Physics 97, 5101 (1992).
3380
+ [31] F. Nathan and M. S. Rudner, Phys. Rev. B 102, 115109
3381
+ (2020).
3382
+ [32] H. Spohn, Rev. Mod. Phys. 52, 569 (1980).
3383
+ [33] M. Grant and S. Boyd, “CVX: Matlab software for disci-
3384
+ plined convex programming, version 2.1,” http://cvxr.
3385
+ com/cvx (2014).
3386
+ [34] D. Walls and G. J. Milburn, Quantum optics (Springer-
3387
+ Verlag Berlin Heidelberg, 2008).
3388
+ [35] T. Becker, L.-N. Wu, and A. Eckardt, Phys. Rev. E 104,
3389
+ 014110 (2021).
3390
+ [36] T. Prosen and M. ˇZnidariˇc, Journal of Statistical Me-
3391
+ chanics: Theory and Experiment 2009, P02035 (2009).
3392
+ [37] J. J. Mendoza-Arenas, S. R. Clark, and D. Jaksch, Phys.
3393
+ Rev. E 91, 042129 (2015).
3394
+ [38] M. ˇZnidariˇc, T. c. v. Prosen, G. Benenti, G. Casati, and
3395
+ D. Rossini, Phys. Rev. E 81, 051135 (2010).
3396
+ [39] J. T. Barreiro, M. M¨uller, P. Schindler, D. Nigg, T. Monz,
3397
+ M. Chwalla, M. Hennrich, C. F. Roos, P. Zoller,
3398
+ and
3399
+ R. Blatt, Nature 470, 486 (2011).
3400
+ [40] P. Schindler, M. M¨uller, D. Nigg, J. T. Barreiro, E. A.
3401
+ Martinez, M. Hennrich, T. Monz, S. Diehl, P. Zoller, and
3402
+ R. Blatt, Nature Physics 9, 361 (2013).
3403
+ [41] H. Weimer, M. M¨uller, I. Lesanovsky, P. Zoller, and H. P.
3404
+ B¨uchler, Nature Physics 6, 382 (2010).
3405
+ [42] T. L. Nguyen, J. M. Raimond, C. Sayrin, R. Corti˜nas,
3406
+ T.
3407
+ Cantat-Moltrecht,
3408
+ F.
3409
+ Assemat,
3410
+ I.
3411
+ Dotsenko,
3412
+ S. Gleyzes, S. Haroche, G. Roux, T. Jolicoeur,
3413
+ and
3414
+ M. Brune, Phys. Rev. X 8, 011032 (2018).
3415
+ [43] G. Garc´ıa-P´erez, M. A. C. Rossi, and S. Maniscalco, npj
3416
+ Quantum Information 6, 1 (2020).
3417
+ [44] C. W. Kim, J. M. Nichol, A. N. Jordan, and I. Franco,
3418
+ PRX Quantum 3, 040308 (2022).
3419
+ [45] T. Becker, A. Schnell, and J. Thingna, Phys. Rev. Lett.
3420
+ 129, 200403 (2022).
3421
+ [46] G. McCauley, B. Cruikshank, D. I. Bondar, and K. Ja-
3422
+ cobs, npj Quantum Information 6 (2020).
3423
+ [47] U. Harbola, M. Esposito,
3424
+ and S. Mukamel, Phys. Rev.
3425
+ B 74, 235309 (2006).
3426
+ [48] F.
3427
+ Nathan
3428
+ and
3429
+ M.
3430
+ S.
3431
+ Rudner,
3432
+ (2022),
3433
+ 10.48550/ARXIV.2206.02917.
3434
+ [49] A.
3435
+ Trushechkin,
3436
+ Physical
3437
+ Review
3438
+ A
3439
+ 103
3440
+ (2021),
3441
+ 10.1103/physreva.103.062226.
3442
+ [50] A. S. Trushechkin and I. V. Volovich, EPL (Europhysics
3443
+ Letters) 113, 30005 (2016).
3444
+ [51] E. Kleinherbers, N. Szpak, J. K¨onig, and R. Sch¨utzhold,
3445
+ Phys. Rev. B 101, 125131 (2020).
3446
+ [52] D. Davidovi´c, Quantum 4, 326 (2020).
3447
+ [53] E. Mozgunov and D. Lidar, Quantum 4, 227 (2020).
3448
+ [54] G. Kirˇsanskas, M. Francki´e, and A. Wacker, Phys. Rev.
3449
+ B 97, 035432 (2018).
3450
+ [55] A. Purkayastha, G. Guarnieri, M. T. Mitchison, R. Filip,
3451
+ and J. Goold, npj Quantum Information 6 (2020).
3452
+ [56] G. E. Fux, D. Kilda, B. W. Lovett,
3453
+ and J. Keeling,
3454
+ (2022), 10.48550/ARXIV.2201.05529.
3455
+ [57] A. Purkayastha, G. Guarnieri, S. Campbell, J. Prior, and
3456
+ J. Goold, Phys. Rev. B 104, 045417 (2021).
3457
+ [58] A.
3458
+ M.
3459
+ Lacerda,
3460
+ A.
3461
+ Purkayastha,
3462
+ M.
3463
+ Kewming,
3464
+ G.
3465
+ T.
3466
+ Landi,
3467
+ and
3468
+ J.
3469
+ Goold,
3470
+ (2022),
3471
+ 10.48550/ARXIV.2206.01090.
3472
+ [59] A. Majumdar, G. Hall, and A. A. Ahmadi, Annual Re-
3473
+ view of Control, Robotics, and Autonomous Systems 3,
3474
+ 331 (2020).
3475
+ [60] G. Guarnieri, M. Kol´aˇr, and R. Filip, Phys. Rev. Lett.
3476
+ 121, 070401 (2018).
3477
+ [61] A. S. Trushechkin, M. Merkli, J. D. Cresser, and J. An-
3478
+ ders, AVS Quantum Science 4, 012301 (2022).
3479
+ [62] J. D. Cresser and J. Anders, Phys. Rev. Lett. 127, 250601
3480
+ (2021).
3481
+ [63] A. Streltsov, G. Adesso,
3482
+ and M. B. Plenio, Rev. Mod.
3483
+ Phys. 89, 041003 (2017).
3484
+ [64] G. Francica, J. Goold, and F. Plastina, Phys. Rev. E 99,
3485
+ 042105 (2019).
3486
+ [65] J. P. Santos, L. C. C´eleri, G. T. Landi,
3487
+ and M. Pater-
3488
+ nostro, npj Quantum Information 5 (2019).
3489
+ [66] V. Narasimhachar and G. Gour, Nature Communications
3490
+ 6 (2015).
3491
+ [67] D.
3492
+ Tupkary,
3493
+ https://github.com/dtupkary/
3494
+ SearchingLindbladians (2022).
3495
+ [68] J. Johansson, P. Nation, and F. Nori, Computer Physics
3496
+ Communications 183, 1760 (2012).
3497
+ [69] J. Johansson, P. Nation, and F. Nori, Computer Physics
3498
+ Communications 184, 1234 (2013).
3499
+
39A0T4oBgHgl3EQfNf8t/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4tE2T4oBgHgl3EQf6ghP/content/tmp_files/2301.04200v1.pdf.txt ADDED
@@ -0,0 +1,1439 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Smoothing the H0 tension with a dynamical dark energy model
2
+ Safae Dahmani,∗ Amine Bouali,† Imad El Bojaddaini,‡ Ahmed Errahmani,§ and Taoufik Ouali¶
3
+ Laboratory of Physics of Matter and Radiation, Mohammed I University, BP 717, Oujda, Morocco
4
+ (Dated: January 12, 2023)
5
+ The discrepancy between Planck data and direct measurements of the current expansion rate H0 and the
6
+ matter fluctuation amplitude S8 has become one of the most intriguing puzzles in cosmology nowadays. The
7
+ H0 tension has reached 4.2σ in the context of standard cosmology i.e ΛCDM. Therefore, explanations to this
8
+ issue are mandatory to unveil its secrets. Despite its success, ΛCDM is unable to give a satisfying explanation
9
+ to the tension problem.
10
+ Unless some systematic errors might be hidden in the observable measurements,
11
+ physics beyond the standard model of cosmology must be advocated. In this perspective, we study a phantom
12
+ dynamical dark energy model as an alternative to ΛCDM in order to explain the aforementioned issues. This
13
+ phantom model is characterised by one extra parameter, Ωpdde, compared to ΛCDM. We obtain a strong
14
+ positive correlation between H0 and Ωpdde, for all data combinations. Using Planck measurements together
15
+ with BAO and Pantheon, we find that the H0 and the S8 tensions are 3σ and 2.6σ, respectively. By introducing
16
+ a prior on the absolute magnitude, MB, of the SN Ia, the H0 tension decreases to 2.27σ with H0 = 69.76+0.75
17
+ −0.82
18
+ km s−1 Mpc−1 and the S8 tension reaches the value 2.37σ with S8 = 0.8269+0.011
19
+ −0.012.
20
+ Keywords: dark energy, H0 tension, S8 tension.
21
+ I.
22
+ INTRODUCTION
23
+ Supernova Type Ia (SN Ia) observation [1, 2] reports
24
+ an unexpected cosmic acceleration of the expansion of
25
+ the current Universe. This observation was corroboratted
26
+ latter by other observations such as the cosmic microwave
27
+ background (CMB) [3, 4], the large scale structure [5, 6]
28
+ and the baryonic acoustic oscillations (BAO) [7, 8]. The
29
+ standard model of cosmology successfully describes this
30
+ late time cosmic acceleration by introducing a new exotic
31
+ component in the budget of the Universe dubbed dark
32
+ energy (DE). In the context of the standard model of
33
+ cosmology, called ΛCDM, the major part of the content
34
+ of the Universe is dominated by DE which is in the
35
+ form of a cosmological constant, Λ, and the cold dark
36
+ matter (CDM). In addition, various observational data
37
+ give preference to ΛCDM for a vast range of redshifts z
38
+ [9–13]. However, this model faces many problems, among
39
+ them the “Hubble tension”, related to the current Hubble
40
+ rate H0 and the σ8 tension due to the matter fluctuation
41
+ amplitude.
42
+ The Hubble tension appears when comparing the value
43
+ measured indirectly by calibrating theoretical models in
44
+ the early Universe i.e. at high-redshift and that measured
45
+ directly using cosmological distances and redshifts by
46
+ observing space objects. Generally, the value obtained at
47
+ high-redshifts is lower than that obtained at low-redshifts.
48
+ The value predicted at high-redshifts i.e.
49
+ by cosmic
50
+ microwave
51
+ background
52
+ measurements
53
+ assuming
54
+ the
55
+ ΛCDM model, is H0 = 67.37 ± 0.54 km s−1 Mpc−1
56
+ [11] while the one determined by the Cepheid calibrated
57
58
59
60
61
62
+ supernovae Ia, is H0 = 73.2 ± 1.3 km s−1 Mpc−1 [14].
63
+ It is clear that there is significant discrepancy between
64
+ these values qualified as a tension.
65
+ This tension is at
66
+ about 4.2σ level.
67
+ Recent studies have shown that this
68
+ tension depends directly on the SN Ia absolute magnitude,
69
+ MB [15–19].
70
+ In fact the SH0ES project measures the
71
+ absolute peak magnitude (MB = −19.244 ± 0.037 mag
72
+ [16]) of SN Ia, while the value of H0 can be estimated
73
+ by the magnitude-redshift relation of SN Ia in the range
74
+ z ∈ [0.023, 0.15] [20]. The same studies indicated that to
75
+ test any model that modifies the late-time of the Universe,
76
+ it is necessary to use a prior on the absolute magnitude of
77
+ supernovae type Ia, MB, instead of using the prior on H0
78
+ from SH0ES for a correct statistical analysis and to avoid
79
+ misleading results.
80
+ On the other hand, the tension between the value of
81
+ the matter fluctuation amplitude σ8 found by CMB
82
+ measurements and that from large-scale observations
83
+ in the late Universe rises another problem in ΛCDM.
84
+ The parameter that quantifies the matter fluctuations
85
+ is defined by S8
86
+ =
87
+ σ8
88
+
89
+ (Ωm,0/0.3), representing a
90
+ combination of σ8 and the matter density Ωm,0 at the
91
+ present time.
92
+ Constraints from Planck and those from
93
+ local measurements are in tension at more than 2σ.
94
+ Indeed, while the constrained S8 from Planck data is
95
+ S8 = 0.832 ± 0.013 [11], smaller values are found from
96
+ local measurements, e.g. S8 = 0.762+0.025
97
+ −0.024 obtained by
98
+ KV450 (KiDS+VIKING-450) and DES-Y1 (Dark Energy
99
+ Survey Year 1) combined [21]. This discrepancy could be
100
+ an evidence of new physics beyond the standard model of
101
+ cosmology [22–24].
102
+ Several theoretical approaches have been proposed to
103
+ solve these tension problems, such as extensions of the
104
+ ΛCDM model, DE–DM interactions and decaying DM
105
+ [26–36]. These approaches have also shown that changing
106
+ the properties of DE e.g. by introducing the early Dark
107
+ Energy [37] and the phantom Dark Energy where the
108
+ equation of state (EoS) parameter is slightly less than
109
+ arXiv:2301.04200v1 [astro-ph.CO] 10 Jan 2023
110
+
111
+ 2
112
+ −1, can increase the value of H0 and consequently can
113
+ alleviate the Hubble tension compared to ΛCDM [38–47].
114
+ These conclusions motivated us to address these issues
115
+ in the context of a particular dynamical dark energy (DDE)
116
+ model where the EoS and the energy density are given re-
117
+ spectively by [48]
118
+ pde = −(ρde + α
119
+ 3 ),
120
+ (1.1)
121
+ and
122
+ ρde(z) = ρde,0 − α ln (1 + z),
123
+ (1.2)
124
+ where ρde,0 is the present DE density, α is a positive con-
125
+ stant that distinguishes this model from ΛCDM. Hence
126
+ ρde tends to the standard cosmological constant Λ at the
127
+ present (z = 0). This phantom dynamical dark energy
128
+ model induces an abrupt event in the future where the dark
129
+ energy density dominates all other forms of energy density.
130
+ However, in the past, this dark energy density decreases
131
+ and the energy density of dark matter dominates the bud-
132
+ get of the Universe.
133
+ According to Eqs. (1.1) and (1.2) the EoS parameter is
134
+ given by
135
+ ωde = −(1 +
136
+ α
137
+ 3(ρde,0 − α ln (1 + z))).
138
+ (1.3)
139
+ For positive values of α, we get ωde < −1 and the model
140
+ describes a phantom dark energy. For negative values of α,
141
+ ωde > −1, the model describes a quintessence dark energy
142
+ and mimics ΛCDM in the limit α → 0. In the following,
143
+ we will focus on the phantom case i.e. α > 0.
144
+ The Friedmann equation of a Universe filled by CDM and
145
+ DE can be written as [48–50]
146
+ E2(z) = Ωm,0(1+z)3 +Ωde,0 −Ωpdde ln (1 + z), (1.4)
147
+ where E = H(z)
148
+ H0 , H0 is the current Hubble rate, Ωm,0 is
149
+ the actual matter density, Ωde,0 = 8πG
150
+ 3H2
151
+ 0 ρde,0 and Ωpdde =
152
+ 8πG
153
+ 3H2
154
+ 0 α is a dimensionless parameter characterizing our
155
+ phantom DDE model.
156
+ From Eq (1.4), the model predicts more dark matter in the
157
+ past as z → ∞. However, in the future, this model is
158
+ dominant by the DE and it is characterized by a particu-
159
+ lar behaviour. Indeed, its Hubble rate H diverges while its
160
+ derivative ˙H remains constant. This abrupt event has been
161
+ well studied in [48–50] and dubbed as Little Sibling of the
162
+ Big Rip since it smooths the big rip singularity in the fu-
163
+ ture.
164
+ In this paper, we study the effect of this phantom dy-
165
+ namical dark energy model (PDDE) on both tensions,
166
+ namely the H0 and S8 tensions, and we compare the results
167
+ with those of ΛCDM. To this aim, we perform a Markov
168
+ Chain Monte Carlo (MCMC) [51] analysis, using the last
169
+ datasets.
170
+ This paper is organized as follows: in Sec. II, we describe
171
+ the methodology followed and the data used in our anal-
172
+ ysis. In Sec. III, we present the results and discussions,
173
+ while in Sec. IV we analyze the effect on the power spec-
174
+ trum. Finally, Sec. V is dedicated to conclusions.
175
+ II.
176
+ METHODOLOGY AND DATASETS
177
+ To constrain our theoretical model we employ the χ2
178
+ statistics
179
+ χ2 = [Pobs − Pth]2
180
+ σ2
181
+ P
182
+ ,
183
+ (2.1)
184
+ where Pobs, Pth and σ2
185
+ P indicate the observed values, the
186
+ predicted values and the standard deviation, respectively.
187
+ The model with a small value of χ2 fits better the observa-
188
+ tional data and is considered as the best. We also use the
189
+ Akaike Information Criterion (AIC) [52], which is widely
190
+ used in cosmology [53, 54] to compare cosmological mod-
191
+ els with different free parameters numbers
192
+ AIC = −2 ln (Lmax) + 2N,
193
+ (2.2)
194
+ where L is the likelihood and N is the number of free
195
+ parameters. The model with a small value of AIC is the
196
+ most supported by observational data. In this work, we
197
+ calculate △AIC = AICP DDE − AICΛCDM and we
198
+ consider ΛCDM as the reference model i.e. △AIC = 0.
199
+ Furthermore, a positive (negative) value of △AIC indi-
200
+ cates that ΛCDM (PDDE) is the most preferred model by
201
+ observational data.
202
+ To run the MCMC [51] we use the MontePython code
203
+ [57], which interfaces with CLASS [58] in which we have
204
+ implemented our PDDE fluid. We consider 7-dimensional
205
+ parameters space, consisting of six standard cosmological
206
+ parameters ωb, ωcdm, H0, ns, τreio and ln (1010As) which
207
+ correspond to the physical densities of baryons and CDM,
208
+ the Hubble constant, the scalar spectral index, the optical
209
+ depth and the power spectrum amplitude, respectively plus
210
+ the additional parameter Ωpdde characterizing our PDDE
211
+ model. The priors of these free parameters are mentioned
212
+ in Table I. To avoid non-adiabatic instabilities at the
213
+ perturbation evolution, we employ the Parameterized
214
+ Post-Friedmann (PPF) [59] approach.
215
+ In this work, we use the following observational data:
216
+ Planck18: The CMB temperature measurements (low-ℓ
217
+ TT) and polarization (low-ℓ EE) at low multipoles 2 ⩽ ℓ ⩽
218
+ 29. We also use temperature and polarization combined
219
+ (high-ℓ TT TE EE) at higher multipoles 30 ⩽ ℓ ⩽ 2500. In
220
+ addition we use the lensing constraint [11].
221
+ BAO: The Baryon Acoustic Oscillation measurements at
222
+ different redshifts z, BOSS DR12 from the CMASS (at
223
+ z = 0.57) and LOWZ galaxies (at z = 0.32) [60], 6dFGS
224
+ (at z = 0.106) [61] and SDSS DR7 (at z = 0.15) [62].
225
+ Pantheon: The luminosity distance from 1048 Supernovae
226
+
227
+ 3
228
+ Type Ia (SN Ia) in the range z ∈ [0.01, 2.3] [20]. The SN
229
+ Ia data directly give measures of mb(z) for each z, where
230
+ mb(z) is the apparent magnitude. For a given cosmolog-
231
+ ical model this parameter can be calculated theoretically
232
+ by
233
+ mb(z) = 5log10[dL(z)
234
+ Mpc ] + MB + 25,
235
+ (2.3)
236
+ where, dL(z) = (1 + z)
237
+ ´ z
238
+ 0
239
+ cdz′
240
+ H(z′) is the luminosity
241
+ distance and MB is the absolute magnitude which will be
242
+ considered as a free parameter in our analysis.
243
+ Prior on MB: The SN measurements from the SH0ES
244
+ project give a Gaussian prior on the absolute magnitude as
245
+ MB = −19.244 ± 0.037 mag [16].
246
+ The total χ2 of the combined data is
247
+ χ2
248
+ tot = χ2
249
+ P lanck18 + χ2
250
+ BAO + χ2
251
+ P antheon + χ2
252
+ MB. (2.4)
253
+ Table I. A prior imposed on different parameters for the ΛCDM
254
+ and PDDE models
255
+ Parameters
256
+ Prior
257
+ Ωbh2
258
+ [0.005, 0.1]
259
+ Ωch2
260
+ [0.01, 0.99]
261
+ Ωpdde
262
+ [0, 1]
263
+ H0
264
+ [40, 100]
265
+ τreio
266
+ [0.001, 0.8]
267
+ ns
268
+ [0.8, 1.2]
269
+ ln (1010As)
270
+ [2, 4]
271
+ MB
272
+ default priora
273
+ a For the absolute magnitude parameter we used MontePython v3.5
274
+ default prior.
275
+ III.
276
+ RESULTS AND DISCUSSIONS
277
+ We perform an MCMC analysis to obtain con-
278
+ straints on cosmological parameters of the PDDE model
279
+ and compare them with those of ΛCDM. First of all,
280
+ we employ the PDDE model with three different data
281
+ combinations,
282
+ namely Planck18,
283
+ Planck18+BAO and
284
+ Planck18+BAO+Pantheon, in order to make a comparison
285
+ with ΛCDM and get a general insight of the analysis. In the
286
+ second analysis, we include a prior on MB from SHOES
287
+ to Planck18+BAO+Pantheon datasets.
288
+ A.
289
+ Planck18, BAO and Pantheon datasets.
290
+ Table II shows the mean values and their correspond-
291
+ ing errors at 68% C.L. for all considered parameters using
292
+ Planck18, Planck18+BAO and Planck18+BAO+Pantheon.
293
+ Fig. 1 shows the 2D and 1D posterior distributions for the
294
+ PDDE model for the aforementioned datasets.
295
+ Using Planck data alone, we get a large value of H0 =
296
+ 77.5±1.1 km s−1 Mpc−1 for PDDE and H0 = 67.93+0.58
297
+ −0.63
298
+ km s−1 Mpc−1 for ΛCDM. This last value is in ten-
299
+ sion of about 3.6σ with the local measurement of R20
300
+ i.e.
301
+ HR20
302
+ 0
303
+ = 73.2 ± 1.3 km s−1 Mpc−1.
304
+ While for
305
+ the PDDE model the tension is reduced to ∼ 2.5σ. De-
306
+ spite this we notice that our model deviates strongly from
307
+ ΛCDM i.e. Ωpdde = 0, where the value of Ωpdde obtained
308
+ (Ωpdde = 0.4901+0.031
309
+ −0.022) is around 15σ away from 0, which
310
+ shows that our late model strictly shifted towards the more
311
+ phantom regime (i.e. ωde << −1). Therefore, Planck18
312
+ alone does not provide any sientific conclusion to our late-
313
+ time dark energy transition. When we add the BAO data
314
+ the Ωpdde value decreases to 0.08478+0.024
315
+ −0.085. We also see
316
+ a small decrease by 7.1% for H0 i.e. H0 = 69.13+0.79
317
+ −1.1
318
+ km s−1 Mpc−1 for PDDE and a small increase by 0.2%
319
+ for ΛCDM i.e.
320
+ H0 = 68.07 ± 0.45 km s−1 Mpc−1.
321
+ The tension of H0 remains around ∼ 2.5σ for the PDDE
322
+ model and increases to ∼ 3.7σ for ΛCDM compared to
323
+ HR20
324
+ 0
325
+ . The significant difference between HΛCDM
326
+ 0
327
+ and
328
+ HP DDE
329
+ 0
330
+ tensions is actually not enough to come out with
331
+ conclusive results about the H0 tension because analyz-
332
+ ing this tension in light of any late-time model like PDDE
333
+ should necessarily involve analyzing the Pantheon SN Ia
334
+ sample [15].
335
+ Adding Pantheon data to Planck18+BAO
336
+ dataset, we observe a decreasing values of Ωpdde and H0
337
+ to 0.0586+0.017
338
+ −0.059 km s−1 Mpc−1 and 68.76+0.59
339
+ −0.76 km s−1
340
+ Mpc−1, respectively for PDDE. The tension in this case
341
+ is still significant with 3σ for PDDE. However, this value
342
+ is less than that of ΛCDM that gives 3.7σ. These con-
343
+ clusions can be justified by the positive correlation ob-
344
+ served in the (Ωpdde, H0) plan as can be seen in Fig. 1.
345
+ We also compare the absolute magnitude, MB, value with
346
+ SH0ES calibration i.e. MB = −19.244 ± 0.037 mag, we
347
+ notice that our model can considerably smooth the MB
348
+ tension, where the tension with SH0ES calibration is at
349
+ about 3.6σ, while for ΛCDM is at about 4.2σ (see Fig.
350
+ 2). On the other hand, in the context of PDDE model,
351
+ we obtain a relatively high value of σ8 i.e. 0.9038+0.0094
352
+ −0.0094
353
+ and a noticeable decrease in the current density of matter
354
+ i.e. Ωm = 0.2358+0.0079
355
+ −0.0082. This gives a small value of
356
+ S8 i.e. 0.8011+0.015
357
+ −0.014. According to KV450+DES-Y1, S8
358
+ tension is at 1.4σ for PDDE and at 2.6σ for ΛCDM. Us-
359
+ ing Planck18+BAO and Planck18+BAO+Pantheon, we get
360
+ S8 = 0.831 ± 0.011 (S8 = 0.832+0.011
361
+ −0.012) and 0.8312+0.011
362
+ −0.012
363
+ (0.832 ± 0.011) for ΛCDM (PDDE), respectively. S8 ten-
364
+ sion is at 2.6σ (2.6σ) and 2.5σ (2.6σ) for ΛCDM (PDDE).
365
+ We deduce that PDDE attenuates the S8 tension compared
366
+ to the ΛCDM when constrained by Planck data only.
367
+ Table III shows the χ2 for each data combination. Fur-
368
+ thermore, △χ2
369
+ tot = χ2(P DDE)
370
+ tot
371
+ − χ2(ΛCDM)
372
+ tot
373
+ , △AIC =
374
+ AICP DDE − AICΛCDM and AIC are also shown in Ta-
375
+ ble III. Using Planck18 together with BAO and Pantheon
376
+ datasets we get a positive value of △χ2
377
+ tot and △AIC. The
378
+ inclusion of these data gives preference to ΛCDM.
379
+
380
+ 4
381
+ Table II. Summary of the mean±1σ of the cosmological parameters for the ΛCDM and PDDE models, using Planck18, Planck18+BAO and
382
+ Planck18+BAO+Pantheon datasets.
383
+ Data
384
+ Planck18a
385
+ Planck18+BAO
386
+ Planck18+BAO+Pantheon
387
+ Model
388
+ ΛCDM
389
+ PDDE
390
+ ΛCDM
391
+ PDDE
392
+ ΛCDM
393
+ PDDE
394
+ 100Ωbh2
395
+ 2.238+0.016
396
+ −0.017
397
+ 2.244 ± 0.016
398
+ 2.24+0.014
399
+ −0.013
400
+ 2.236 ± 0.015
401
+ 2.241 ± 0.014
402
+ 2.236 ± 0.015
403
+ Ωch2
404
+ 0.1199 ± 0.0013 0.1191 ± 0.0013
405
+ 0.1196+0.00099
406
+ −0.00098
407
+ 0.12 ± 0.0011 0.1196+0.00096
408
+ −0.001
409
+ 0.12 ± 0.001
410
+ Ωpdde
411
+ -
412
+ 0.4901+0.031
413
+ −0.022
414
+ -
415
+ 0.0847+0.024
416
+ −0.085
417
+ -
418
+ 0.0586+0.017
419
+ −0.059
420
+ H0 [km s−1 Mpc−1]
421
+ 67.93+0.58
422
+ −0.63
423
+ 77.5 ± 1.1
424
+ 68.07 ± 0.45
425
+ 69.13+0.79
426
+ −1.1
427
+ 68.09+0.46
428
+ −0.45
429
+ 68.76+0.59
430
+ −0.76
431
+ τreio
432
+ 0.054 ± 0.0081
433
+ 0.05211+0.0088
434
+ −0.0081
435
+ 0.0545+0.0076
436
+ −0.0077
437
+ 0.0528+0.0075
438
+ −0.008
439
+ 0.055+0.0074
440
+ −0.0079
441
+ 0.053 ± 0.0076
442
+ ns
443
+ 0.965 ± 0.0046
444
+ 0.9674+0.0044
445
+ −0.0046
446
+ 0.9661+0.0039
447
+ −0.0041
448
+ 0.964 ± 0.0041 0.9663+0.0039
449
+ −0.0038
450
+ 0.965+0.0042
451
+ −0.0039
452
+ ln (1010As)
453
+ 3.044+0.015
454
+ −0.016
455
+ 3.037+0.017
456
+ −0.016
457
+ 3.044+0.015
458
+ −0.016
459
+ 3.041 ± 0.015
460
+ 3.045 ± 0.015
461
+ 3.042 ± 0.015
462
+ Ωm
463
+ 0.308+0.0081
464
+ −0.008
465
+ 0.2358+0.0079
466
+ −0.0082
467
+ 0.3065+0.0058
468
+ −0.0061
469
+ 0.2982+0.0094
470
+ −0.0082
471
+ 0.3063+0.0057
472
+ −0.0062
473
+ 0.3013+0.007
474
+ −0.0066
475
+ σ8
476
+ 0.823 ± 0.0066
477
+ 0.9038+0.0094
478
+ −0.0094
479
+ 0.8226 ± 0.0066
480
+ 0.835+0.0094
481
+ −0.013
482
+ 0.8227+0.0062
483
+ −0.0066
484
+ 0.831+0.0082
485
+ −0.01
486
+ S8
487
+ 0.834 ± 0.014
488
+ 0.8011+0.015
489
+ −0.014
490
+ 0.831 ± 0.011
491
+ 0.832+0.011
492
+ −0.012
493
+ 0.8312+0.011
494
+ −0.012
495
+ 0.832 ± 0.011
496
+ MB [mag]
497
+ -
498
+ -
499
+ -
500
+ -
501
+ −19.41+0.013
502
+ −0.012
503
+ −19.39+0.015
504
+ −0.017
505
+ H0 tensionb
506
+ 3.6σ
507
+ 2.525σ
508
+ 3.72σ
509
+ 2.531σ
510
+ 3.7σ
511
+
512
+ MB tension
513
+ -
514
+ -
515
+ -
516
+ -
517
+ 4.2σ
518
+ 3.6σ
519
+ S8 tension
520
+ 2.6σ
521
+ 1.4σ
522
+ 2.6σ
523
+ 2.6σ
524
+ 2.5σ
525
+ 2.6σ
526
+ a We used the “lite” version of high-ℓ likelihood.
527
+ b To calculate the tension between two values of H0 obtained from different data (d1, d2), we use the following expression [63, 64]:
528
+ T(H0) = |H0(d1) − H0(d2)|/(
529
+
530
+ σ(H0(d1))2 + σ(H0(d2))2), where H0 and σ are the mean and the variance of the posterior of Hubble rate (the same
531
+ for MB and S8).
532
+ Table III. The best-fit χ2 per experiment for the ΛCDM and PDDE models.
533
+ Datasets
534
+ Planck18
535
+ Planck18+BAO
536
+ Planck18+BAO+Pantheon
537
+ Model
538
+ ΛCDM
539
+ PDDE
540
+ ΛCDM
541
+ PDDE
542
+ ΛCDM
543
+ PDDE
544
+ Planck high-ℓ TTTEEE lite 583.41
545
+ 582.37
546
+ 583.96
547
+ 584.26
548
+ 583.5
549
+ 583.96
550
+ Planck low-ℓ EE
551
+ 396.23
552
+ 395.68
553
+ 395.98
554
+ 395.86
555
+ 396.26
556
+ 395.84
557
+ Planck low-ℓ TT
558
+ 23.44
559
+ 22.31
560
+ 23.27
561
+ 23.22
562
+ 23.36
563
+ 23.43
564
+ Planck lensing
565
+ 8.78
566
+ 8.73
567
+ 8.81
568
+ 8.8
569
+ 8.801
570
+ 8.81
571
+ bao boss dr12
572
+ -
573
+ -
574
+ 3.73
575
+ 3.69
576
+ 3.88
577
+ 3.92
578
+ bao smallz 2014
579
+ -
580
+ -
581
+ 1.48
582
+ 1.53
583
+ 1.41
584
+ 1.43
585
+ Pantheon
586
+ -
587
+ -
588
+ -
589
+ -
590
+ 1025.84
591
+ 1025.80
592
+ χ2
593
+ tot
594
+ 1011.88 1009.12 1017.25 1017.39 2043.09
595
+ 2043.23
596
+ △χ2
597
+ tot
598
+ 0
599
+ −2.76
600
+ 0
601
+ +0.14
602
+ 0
603
+ +0.14
604
+ AIC
605
+ 1029.88 1029.12 1035.25 1037.39 2063.09
606
+ 2065.23
607
+ △AIC
608
+ 0
609
+ −0.76
610
+ 0
611
+ +2.14
612
+ 0
613
+ +2.14
614
+ In the following, we will focus on the data combination
615
+ Planck18+BAO+Pantheon as it is the only suitable combi-
616
+ nation to study the tension in the framework of the late-
617
+ time model PDDE.
618
+ B.
619
+ Adding MB prior.
620
+ To combine the SH0ES results with the other cosmo-
621
+ logical data, we take into account the SN Ia peak absolute
622
+ magnitude MB rather than the H0 parameter. For this,
623
+ we introduce a prior on MB from the SN measurements,
624
+ MB = −19.244 ± 0.037. In Fig. 3, we show the 2D
625
+ and 1D posterior distributions at 68.3% and 95.4% C.
626
+ L. for all cosmological parameters of the ΛCDM and
627
+ PDDE models.
628
+ The mean values, the error at 68%
629
+ C.L. and χ2 per experiment are given in Table IV and
630
+ Table V, respectively.
631
+ When adding the MB prior to
632
+ Planck18+BAO+Pantheon, the Ωpdde parameter reaches
633
+ the value 0.1087+0.052
634
+ −0.061 and the Hubble rate increases to
635
+ H0 = 69.76+0.75
636
+ −0.82.
637
+ This increase can be observed also
638
+ for the absolute magnitude where MB = −19.37+0.017
639
+ −0.018,
640
+ compared to the same datasets without MB prior, as can
641
+ be noticed from the strong positive correlation in the
642
+
643
+ 5
644
+ 0.115
645
+ 0.119
646
+ 0.124
647
+ Ωcdmh2
648
+ 0
649
+ 0.284
650
+ 0.569
651
+ Ωpdde
652
+ 67.3
653
+ 74.3
654
+ 81.3
655
+ H0
656
+ 2.96
657
+ 3.02
658
+ 3.09
659
+ ln1010As
660
+ 0.951
661
+ 0.967
662
+ 0.983
663
+ ns
664
+ 0.001
665
+ 0.0402
666
+ 0.0794
667
+ τ reio
668
+ 0.212
669
+ 0.266
670
+ 0.321
671
+ Ωm
672
+ 0.812
673
+ 0.873
674
+ 0.934
675
+ σ8
676
+ 0.755
677
+ 0.811
678
+ 0.868
679
+ S8
680
+ -19.4
681
+ -19.4
682
+ -19.3
683
+ MB
684
+ 2.19
685
+ 2.24
686
+ 2.3
687
+ Ωbh2
688
+ -19.4
689
+ -19.4
690
+ -19.3
691
+ MB
692
+ 0.115
693
+ 0.119
694
+ 0.124
695
+ Ωcdmh2
696
+ 0
697
+ 0.284
698
+ 0.569
699
+ Ωpdde
700
+ 67.3
701
+ 74.3
702
+ 81.3
703
+ H0
704
+ 2.96
705
+ 3.02
706
+ 3.09
707
+ ln1010As
708
+ 0.951
709
+ 0.967
710
+ 0.983
711
+ ns
712
+ 0.001
713
+ 0.0402
714
+ 0.0794
715
+ τ reio
716
+ 0.212
717
+ 0.266
718
+ 0.321
719
+ Ωm
720
+ 0.812
721
+ 0.873
722
+ 0.934
723
+ σ8
724
+ 0.755
725
+ 0.811
726
+ 0.868
727
+ S8
728
+ Planck18
729
+ Planck18+BAO
730
+ Planck18+BAO+Pantheon
731
+ Figure 1. The 2D and 1D posterior distributions at 68.3% and 95.4% C.L. for the PDDE model using different combinations of data (Planck,
732
+ Planck+BAO and Planck+BAO+Pantheon). The local measurement of H0 = 73.2 ± 1.3km s−1 Mpc−1 and S8 = 0.762+0.025
733
+ −0.024 obtained by
734
+ R20 and KV450+DES-Y1 respectively, are represented by the orange band.
735
+ {Ωpdde, H0}, {Ωpdde, MB} and {H0, MB} plans (see
736
+ Fig. 3). We also notice that the H0 tension is reduced
737
+ to a lower value of about ∼ 2.27σ and the MB tension
738
+ reduced to ∼ 3.06σ for the PDDE model. For ΛCDM,
739
+ we obtain H0 = 68.58+0.43
740
+ −0.44 and MB = −19.39 ± 0.012
741
+ with a tension of about 3.36σ and 3.7σ, respectively.
742
+ Therefore, we conclude that the PDDE model is able to
743
+ make a slight attenuation of the H0 and MB tensions
744
+ using Planck18+BAO+Pantheon+MB datasets compared
745
+ to ΛCDM. On the other hand, the prior on MB reduces
746
+ the value of S8 to 0.8212 ± 0.011 (0.8269+0.011
747
+ −0.012) for
748
+ ΛCDM (PDDE), respectively, compared to the same
749
+ datasets without MB prior.
750
+ A negative correlation can
751
+ also be seen in Fig.3 between S8 and MB. According to
752
+ KV450+DES-Y1, the S8 tension is at 2.16σ and 2.37σ
753
+ for ΛCDM and PDDE, respectively. We notice that the
754
+ ΛCDM model, reduces the S8 tension compared to PDDE
755
+ when
756
+ constrained
757
+ by
758
+ Planck18+BAO+Pantheon+MB
759
+ datasets.
760
+ Table V shows the χ2 per experiment using
761
+ Planck18+BAO+Pantheon+MB datasets. We get a nega-
762
+ tive value for △χ2
763
+ tot and △AIC, i. e. △χ2
764
+ tot = −3.01 and
765
+ △AIC = −1.01, while in the previous section, positive
766
+ values were found for the same datasets without MB prior.
767
+ The negative value of △χ2
768
+ tot is mainly related to the MB
769
+ prior from SH0ES data with △χ2
770
+ MB = −3.59. Conse-
771
+ quently the PDDE model provides a slightly better fit for
772
+ Planck18+BAO+Pantheon+MB datasets than ΛCDM.
773
+
774
+ 6
775
+ ΛCDM
776
+ PDDE
777
+ SH0ES
778
+ -19.6
779
+ -19.5
780
+ -19.4
781
+ -19.3
782
+ -19.2
783
+ -19.1
784
+ -19.0
785
+ 0.0
786
+ 0.2
787
+ 0.4
788
+ 0.6
789
+ 0.8
790
+ 1.0
791
+ MB
792
+ P/Pmax
793
+ -19.5
794
+ -19.4
795
+ -19.3
796
+ -19.2
797
+ MB
798
+ 66.8
799
+ 68.9
800
+ 71.1
801
+ 73.2
802
+ H0
803
+ -19.5
804
+ -19.4
805
+ -19.3
806
+ -19.2
807
+ MB
808
+ ΛCDM
809
+ PDDE
810
+ Figure 2. The left panel shows 1D posterior distributions for the absolute magnitude, MB. The right panel shows 68% and 95% constraints
811
+ on (H0, MB) plan using Planck18+BAO+Pantheon datasets. The local measurement of H0 = 73.2 ± 1.3km s−1 Mpc−1 and MB =
812
+ −19.244 ± 0.037 mag obtained by SH0ES, are represented by the grey band and the orange band respectively.
813
+ Table IV. Summary of the mean±1σ of cosmological parameters for the ΛCDM and PDDE models, using Planck18+BAO+Pantheon+MB
814
+ datasets.
815
+ Data
816
+ Planck18+BAO+Pantheon+MB
817
+ Model
818
+ ΛCDM
819
+ PDDE
820
+ 100Ωbh2
821
+ 2.25 ± 0.014
822
+ 2.242 ± 0.015
823
+ Ωch2
824
+ 0.1185+0.00093
825
+ −0.00098 0.1196 ± 0.0011
826
+ Ωpdde
827
+ -
828
+ 0.1087+0.052
829
+ −0.061
830
+ H0 [km s−1 Mpc−1]
831
+ 68.58+0.43
832
+ −0.44
833
+ 69.76+0.75
834
+ −0.82
835
+ τreio
836
+ 0.05758+0.0073
837
+ −0.0085
838
+ 0.05414+0.0077
839
+ −0.0081
840
+ ns
841
+ 0.9688+0.0039
842
+ −0.004
843
+ 0.9661+0.0041
844
+ −0.0042
845
+ ln (1010As)
846
+ 3.049+0.015
847
+ −0.016
848
+ 3.043+0.015
849
+ −0.016
850
+ Ωm
851
+ 0.3+0.0054
852
+ −0.0056
853
+ 0.292 ± 0.0071
854
+ σ8
855
+ 0.8213+0.0064
856
+ −0.0068
857
+ 0.8382+0.011
858
+ −0.012
859
+ S8
860
+ 0.8212 ± 0.011
861
+ 0.8269+0.011
862
+ −0.012
863
+ MB [mag]
864
+ −19.39 ± 0.012
865
+ −19.37+0.017
866
+ −0.018
867
+ H0 tension
868
+ 3.36σ
869
+ 2.27σ
870
+ MB tension
871
+ 3.7σ
872
+ 3.06σ
873
+ S8 tension
874
+ 2.16σ
875
+ 2.37σ
876
+ IV.
877
+ EFFECT ON THE CMB POWER SPECTRUM.
878
+ In the top panel of Fig. 4, we show the effect of the
879
+ phantom dynamical dark energy model and the ΛCDM
880
+ model on the CMB temperature power spectrum using
881
+ the results obtained by Planck18+BAO+Pantheon+MB
882
+ dataset. We notice that in the CMB temperature power
883
+ spectrum, the effect of the PDDE model is visible at large
884
+ scales 2 < ℓ < 30 but at higher multipoles ℓ this model
885
+ is indistinguishable from ΛCDM. This conclusion agrees
886
+ with that of several model of this type of dark energy (see
887
+ for example [43, 45]).
888
+ We also show the current mat-
889
+ ter power spectrum P(z), for the ΛCDM and the PDDE
890
+ models for different values of Ωpdde using the results ob-
891
+ tained in Tab. II and Tab. III. The bottom left and right
892
+ panels of Fig. 4 correspond to the amplitude of the mat-
893
+ ter power spectrum for different k-modes running approxi-
894
+ mately from the current Hubble horizon, k = 3.33×10−4h
895
+ Mpc−1 to k ∼ 1h Mpc−1. The bottom panels of Fig. 4 are
896
+ obtained using datasets under consideration without MB
897
+ prior (left panel) and with MB prior (right panel). In the
898
+ bottom-left panel of Fig. 4, we notice a clear difference
899
+
900
+ 7
901
+ 0.116
902
+ 0.12
903
+ 0.123
904
+ Ωcdmh2
905
+ 67.4
906
+ 69.9
907
+ 72.3
908
+ H0
909
+ 3
910
+ 3.05
911
+ 3.1
912
+ ln1010As
913
+ 0.952
914
+ 0.965
915
+ 0.978
916
+ ns
917
+ 0.0285
918
+ 0.0547
919
+ 0.0808
920
+ τ reio
921
+ -19.4
922
+ -19.4
923
+ -19.3
924
+ MB
925
+ 0.272
926
+ 0.294
927
+ 0.316
928
+ Ωm
929
+ 0.801
930
+ 0.838
931
+ 0.876
932
+ σ8
933
+ 0.791
934
+ 0.828
935
+ 0.865
936
+ S8
937
+ 0
938
+ 0.152
939
+ 0.304
940
+ Ωpdde
941
+ 2.19
942
+ 2.24
943
+ 2.3
944
+ Ωbh2
945
+ 0
946
+ 0.152
947
+ 0.304
948
+ Ωpdde
949
+ 0.116
950
+ 0.12
951
+ 0.123
952
+ Ωcdmh2
953
+ 67.4
954
+ 69.9
955
+ 72.3
956
+ H0
957
+ 3
958
+ 3.05
959
+ 3.1
960
+ ln1010As
961
+ 0.952
962
+ 0.965
963
+ 0.978
964
+ ns
965
+ 0.0285
966
+ 0.0547
967
+ 0.0808
968
+ τ reio
969
+ -19.4
970
+ -19.4
971
+ -19.3
972
+ MB
973
+ 0.272
974
+ 0.294
975
+ 0.316
976
+ Ωm
977
+ 0.801
978
+ 0.838
979
+ 0.876
980
+ σ8
981
+ 0.791
982
+ 0.828
983
+ 0.865
984
+ S8
985
+ ΛCDM
986
+ PDDE
987
+ Figure 3.
988
+ The 2D and 1D posterior distributions at 68.3% and 95.4% C.L. for the ΛCDM and PDDE models using
989
+ Planck18+BAO+Pantheon+MB datasets. The local measurement of H0 = 73.2 ± 1.3 km s−1 Mpc−1 and S8 = 0.762+0.025
990
+ −0.024 obtained
991
+ by SH0ES and KV450+DES-Y1 respectively, are shown by the orange band.
992
+ between ΛCDM and PDDE using Planck18 datasets alone.
993
+ This difference is due to the increase of the value of Ωpdde,
994
+ particularly when we use Planck18 alone. This observa-
995
+ tion is justified by the high value of σ8 for PDDE model
996
+ and the positive correlation observed in the plan (Ωpdde,
997
+ σ8) (see Fig. 1). However, this difference becomes less
998
+ observable by using Planck + BAO and Planck + BAO +
999
+ Pantheon datasets. The phantom dark energy model has
1000
+ a low effect on the matter power spectrum. This result
1001
+ is also shown in the reference [49]. The addition of MB
1002
+ prior to Planck18+BAO+Pantheon datasets slightly distin-
1003
+ guishes the PDDE model from the ΛCDM model. The
1004
+ different effect between ΛCDM and PDDE on the ampli-
1005
+ tude of the matter power spectrum is observed clearly in
1006
+ the range of smallest modes.
1007
+ V.
1008
+ CONCLUSIONS
1009
+ In this work, we have studied the effect of a phantom
1010
+ dynamical dark energy (PDDE) model on the cosmo-
1011
+ logical parameters, particularly its capability of relieving
1012
+ the H0 and S8 tensions.
1013
+ The equation of state of this
1014
+ model depends on the redshift z and deviates from the
1015
+ ΛCDM model by a positive constant. This PDDE model
1016
+ is specified by introducing an abrupt event in the future
1017
+ labeled in the literature the Little Sibling of the Big Rip
1018
+ as it smooths the big rip singularity. The Boltzman code
1019
+ CLASS has been modified to implement the parameter
1020
+
1021
+ 8
1022
+ Table V. The χ2 per experiment for the ΛCDM and PDDE models
1023
+ Dataset
1024
+ Planck18+BAO+Pantheon+MB
1025
+ Model
1026
+ ΛCDM
1027
+ PDDE
1028
+ Planck high-ℓ TTTEEE lite 585.005
1029
+ 582.857
1030
+ Planck low-ℓ EE
1031
+ 396.53
1032
+ 396.29
1033
+ Planck low-ℓ TT
1034
+ 22.75
1035
+ 23.45
1036
+ Planck lensing
1037
+ 8.84
1038
+ 8.77
1039
+ bao boss dr12
1040
+ 3.38
1041
+ 4.025
1042
+ bao smallz 2014
1043
+ 1.99
1044
+ 2.64
1045
+ Pantheon
1046
+ 1025.65
1047
+ 1026.7
1048
+ MB prior
1049
+ 16.29
1050
+ 12.7
1051
+ χ2
1052
+ tot
1053
+ 2060.47
1054
+ 2057.46
1055
+ △χ2
1056
+ tot
1057
+ 0
1058
+ −3.01
1059
+ AIC
1060
+ 2080.47
1061
+ 2079.46
1062
+ △AIC
1063
+ 0
1064
+ −1.01
1065
+ characterizing the PDDE model and a first Markov
1066
+ Chain Monte Carlo analysis has been performed using
1067
+ the dataset combinations Planck18, Planck18+BAO and
1068
+ Planck18+BAO+Pantheon.
1069
+ We have found that when
1070
+ using Planck18 data alone and Planck18+BAO, a mislead-
1071
+ ing reduction of the tension is noticed. In fact, finding a
1072
+ late-time solution of the H0 tension implies an analysis
1073
+ of the SN measurements, i.e.
1074
+ Pantheon data.
1075
+ Adding
1076
+ Pantheon data shows a persistent 3σ tension for H0 and
1077
+ 2.6σ for S8. Although the H0 tension for PDDE is reduced
1078
+ in comparison with ΛCDM, it is clear that a late-time
1079
+ model can not lead to a solution to this H0 discrepancy.
1080
+ In a second analysis,
1081
+ we have added a prior on
1082
+ MB that was obtained by the SH0ES project,
1083
+ i.e.
1084
+ MB
1085
+ =
1086
+ −19.244 ± 0.037 mag.
1087
+ As shown in Ta-
1088
+ ble IV, the PDDE model reduces the H0 tension to
1089
+ 2.27σ and the S8 tension to 2.37σ when combin-
1090
+ ing Planck18+BAO+Pantheon datasets with the MB
1091
+ prior,
1092
+ i.e
1093
+ Planck18+BAO+Pantheon+MB.
1094
+ Further-
1095
+ more,
1096
+ the PDDE model provides a slightly better
1097
+ fit
1098
+ to
1099
+ Planck18+BAO+Pantheon+MB
1100
+ datasets
1101
+ with
1102
+ ∆χ2 = −3.01 and ∆AIC = −1.01 (see Table V).
1103
+ The distinction of the PDDE model over the standard
1104
+ model of cosmology is clearly observed in our work,
1105
+ for a wide range of data combinations.
1106
+ These findings
1107
+ agree with the fact that phantom dark energy models are
1108
+ supported by observations and can be an alternative of
1109
+ ΛCDM to solve problems related to the fine-tuning, the
1110
+ coincidence and the tensions under consideration if more
1111
+ investigations with regards to these models are done.
1112
+ Particularly, other phantom dark energy models such as
1113
+ the little rip [65] can be employed and many scenarios
1114
+ for the structure of the Universe such as the inclusion of
1115
+ massive neutrinos and the modification of the space-time
1116
+ curvature can be tested. We will focus on these subjects in
1117
+ our future works.
1118
+
1119
+ 9
1120
+ 101
1121
+ 102
1122
+ 103
1123
+ 0
1124
+ 1000
1125
+ 2000
1126
+ 3000
1127
+ 4000
1128
+ 5000
1129
+ 6000
1130
+ ( + 1)CTT/2 [ K2]
1131
+ CDM
1132
+ PDDE
1133
+ Planck Data
1134
+ 2
1135
+ 20
1136
+ 35
1137
+ 10 4
1138
+ 10 3
1139
+ 10 2
1140
+ 10 1
1141
+ 100
1142
+ k [hMpc
1143
+ 1]
1144
+ 102
1145
+ 103
1146
+ 104
1147
+ P(k) [Mpc/h]3
1148
+ CDM
1149
+ PDDE
1150
+ CDM
1151
+ PDDE
1152
+ CDM
1153
+ PDDE
1154
+ 10 4
1155
+ 10 3
1156
+ 10 2
1157
+ 10 1
1158
+ 100
1159
+ k [hMpc
1160
+ 1]
1161
+ 102
1162
+ 103
1163
+ 104
1164
+ P(k) [Mpc/h]3
1165
+ CDM
1166
+ PDDE
1167
+ Figure 4. The CMB Temperature power spectrum (top panel) for the ΛCDM (dashed line) and PDDE (continuous line) models using the
1168
+ best-fit obtained by Planck18+BAO+Pantheon+MB datasets. The bottom panels correspond to the matter power spectrum using different
1169
+ combinations of data. The left panel is for Planck18 (blue lines), Planck18+BAO (red lines) and Planck18+BAO+Pantheon (green lines)
1170
+ datasets. The right panel is for Planck18+BAO+Pantheon+MB datasets.
1171
+
1172
+ 10
1173
+ [1] A. G. Riess et al., “Observational Evidence from Super-
1174
+ novae for an Accelerating Universe and a Cosmological
1175
+ Constant”, Astron. J. 116 (1998) 1009. [astro-ph/9805201].
1176
+ [2] S. Perlmutter et al., “Measurements of Ω and Λ from 42
1177
+ High-Redshift Supernovae”, Astrophys. J. 517 (1999) 565,
1178
+ [astro-ph/9812133].
1179
+ [3] R.R. Caldwell, M. Doran, “Cosmic microwave background
1180
+ and supernova constraints on quintessence: concordance re-
1181
+ gions and target models”, Phys. Rev. D 69 (2004) 103517, [
1182
+ arXiv:astro-ph/0305334].
1183
+ [4] Z.Y. Huang et al., “Holographic explanation of wide-
1184
+ angle power correlation suppression in the Cosmic Mi-
1185
+ crowave Background Radiation”, JCAP 0605 (2006) 013,
1186
+ [ arXiv:hep-th/0501059].
1187
+ [5] T. Koivisto, D.F. Mota, “Dark Energy Anisotropic Stress
1188
+ and Large Scale Structure Formation”, Phys. Rev. D 73
1189
+ (2006) 083502, [ arXiv:astro-ph/0512135].
1190
+ [6] S.F. Daniel, “Large Scale Structure as a Probe of Grav-
1191
+ itational Slip ”, Phys. Rev. D 77 (2008) 103513, [
1192
+ arXiv:0802.1068 [astro-ph]].
1193
+ [7] D.J. Eisenstein et al., “Detection of the Baryon Acoustic
1194
+ Peak in the Large-Scale Correlation Function of SDSS Lu-
1195
+ minous Red Galaxies ”, Astrophys. J 633 (2005) 560 , [
1196
+ arXiv:astro-ph/0501171].
1197
+ [8] D.J. Eisenstein et al., “Baryon Acoustic Oscillations in the
1198
+ Sloan Digital Sky Survey Data Release 7 Galaxy Sample
1199
+ ”, MNRAS. 401 (2010) 2148 , [ arXiv:0907.1660 [astro-
1200
+ ph.CO]].
1201
+ [9] A. Shadab et al.,“The clustering of galaxies in the com-
1202
+ pleted SDSS-III Baryon Oscillation Spectroscopic Sur-
1203
+ vey:
1204
+ cosmological analysis of the DR12 galaxy sam-
1205
+ ple,” Mon. Not. R. Astron. Soc 470 (2017) 2617–2652,
1206
+ [arXiv:1607.03155[astro-ph.CO]].
1207
+ [10] M. Blomqvist, et al.,“Baryon acoustic oscillations from
1208
+ the cross-correlation of Lyα absorption and quasars in
1209
+ eBOSS DR14,”
1210
+ Astron. Astrophys. 629 (2019) A86,
1211
+ [arXiv:1904.03430[astro-ph.CO]].
1212
+ [11] Planck Collaboration: N. Aghanim et al.,“Planck 2018 re-
1213
+ sults. VI. Cosmological parameters,” Astron. Astrophys.
1214
+ 641 (2020) A6, [ arXiv:1807.06209[astro-ph.CO]].
1215
+ [12] T. M. C. Abbott et al.,“First Cosmology Results using
1216
+ Type Ia Supernovae from the Dark Energy Survey: Con-
1217
+ straints on Cosmological Parameters,”ApJL. 872 (2019)
1218
+ L30, [arXiv:1811.02374[astro-ph.CO]].
1219
+ [13] A. G. Riess et al.,“Milky Way Cepheid Standards for Mea-
1220
+ suring Cosmic Distances and Application to Gaia DR2:
1221
+ Implications for the Hubble Constant,”Astrophys. J. 861
1222
+ (2018) 126, [arXiv:1804.10655v2[astro-ph.CO]].
1223
+ [14] A. G. Riess et al., “ Cosmic Distances Calibrated to 1%
1224
+ Precision with Gaia EDR3 Parallaxes and Hubble Space
1225
+ Telescope Photometry of 75 Milky Way Cepheids Con-
1226
+ firm Tension with ΛCDM, ”Astrophys. J 908 (2021) L6,
1227
+ [arXiv:2012.08534 [astro-ph.CO]].
1228
+ [15] G. Efstathiou, “To H0 or not to H0?,” MNRAS 505 (2021)
1229
+ 3866–3872 [arXiv:2103.08723v3 [astro-ph.CO] ].
1230
+ [16] D. Camarena and V. Marra, “On the use of the local prior
1231
+ on the absolute magnitude of Type Ia supernovae in cos-
1232
+ mological inference,” MNRAS 504 (2021) 5164–5171 [
1233
+ arXiv:2101.08641 [astro-ph.CO]].
1234
+ [17] R. C. Nunes, E. Di Valentino, “Dark sector interaction and
1235
+ the supernova absolute magnitude tension,” Phys. Rev. D
1236
+ 104 (2021) 063529 [ arXiv:2107.09151 [astro-ph.CO]].
1237
+ [18] S. Gariazzo, E. Di Valentino et al, “Late time interacting
1238
+ cosmologies and the Hubble constant tension,” Phys. Rev.
1239
+ D 106 (2022) 023530 [arXiv:2111.03152v2 [astro-ph.CO]].
1240
+ [19] G. Benevento et al, “Can Late Dark Energy Transitions
1241
+ Raise the Hubble constant?,” Phys. Rev. D 101 (2020)
1242
+ 103517 [ arXiv:2002.11707 [astro-ph.CO]].
1243
+ [20] D. M. Scolnic, D. O. Jones et al, “The Complete Light-curve
1244
+ Sample of Spectroscopically Confirmed SNe Ia from Pan-
1245
+ STARRS1 and Cosmological Constraints from the Com-
1246
+ bined Pantheon Sample,” Astrophys . J. 859 (2018) 101
1247
+ [arXiv:1710.00845 [astro-ph.CO]].
1248
+ [21] S. Joudaki, et al., “KiDS+VIKING-450 and DES-Y1 com-
1249
+ bined: Cosmology with cosmic shear, ” Astron. Astrophys.
1250
+ L1 (2020) 638, [ arXiv:1708.01530 [astro-ph.CO]].
1251
+ [22] W. L. Freedman, “ Cosmology at at Crossroads: Tension
1252
+ with the Hubble Constant, ” Nat. Astron 1 (2017) 0169, [
1253
+ arXiv:1706.02739 [astro-ph.CO]].
1254
+ [23] E. M¨ortsell, S. Dhawan, “ Does the Hubble constant ten-
1255
+ sion call for new physics?, ” JCAP 09 (2018) 025, [
1256
+ arXiv:1906.09262 [astro-ph.CO]].
1257
+ [24] L. Knox, M. Millea, “ The Hubble Hunter’s Guide, ” Phys.
1258
+ Rev. D 101 (2020) 043533, [ arXiv:1908.03663 [astro-
1259
+ ph.CO]].
1260
+ [25] E. D. Valentino, A. Melchiorri, J. Silk, “ Beyond six param-
1261
+ eters: extending ΛCDM, ” Phys. Rev. D 92 (2015) 121302,
1262
+ [arXiv:1507.06646 [astro-ph.CO]].
1263
+ [26] E. D. Valentino, A. Melchiorri, J. Silk, “ Beyond six param-
1264
+ eters: extending ΛCDM, ” Phys. Rev. D 92 (2015) 121302,
1265
+ [arXiv:1507.06646 [astro-ph.CO]].
1266
+ [27] M. Lucca, D. C. Hooper, “ Tensions in the dark: shedding
1267
+ light on Dark Matter-Dark Energy interactions, ” Phys. Rev.
1268
+ D 102 (2020) 123502, [ arXiv:2002.06127 [astro-ph.CO]].
1269
+ [28] S. Kumar, R. C. Nunes, “ Probing the interaction be-
1270
+ tween dark matter and dark energy in the presence of
1271
+ massive neutrinos, ” Phys. Rev. D 94 (2016) 123511, [
1272
+ arXiv:1608.02454 [astro-ph.CO]].
1273
+ [29] E. D. Valentino, A. Melchiorri, O. Mena, “Can interacting
1274
+ dark energy solve the H0 tension?
1275
+ , ” Phys. Rev. D 96
1276
+ (2017) 043503, [ arXiv:1704.08342 [astro-ph.CO]].
1277
+ [30] A. G´omez-Valent, V. Pettorino, L. Amendola, “Update on
1278
+ Coupled Dark Energy and the H0 tension , ” Phys. Rev. D
1279
+ 101 (2020) 123513, [ arXiv:2004.00610 [astro-ph.CO]].
1280
+ [31] W. Yang, S. Pan, E. D. Valentino, R. C. Nunes, S. Vagnozzi,
1281
+ D. F. Mota, “Tale of stable interacting dark energy, observa-
1282
+ tional signatures, and the H0 tension , ” JCAP 1809 (2018)
1283
+ 019, [ arXiv:1805.08252 [astro-ph.CO]].
1284
+ [32] E. D. Valentino, A. Melchiorri, O. Mena, S. Vagnozzi,
1285
+ “Non-minimal
1286
+ dark
1287
+ sector
1288
+ physics
1289
+ and
1290
+ cosmological
1291
+ tensions ,
1292
+
1293
+ Phys. Rev. D 101 (2020) 063502,
1294
+ [
1295
+ arXiv:1910.09853 [astro-ph.CO]].
1296
+ [33] L. P. Kanhaiya, K. Tanvi, D. Subinoy, “ Alleviating the
1297
+ H0 and σ8 anomalies with a decaying dark matter model,
1298
+ ” JCAP 072020 (2020) 026, [ arXiv:1902.10636 [astro-
1299
+ ph.CO]].
1300
+ [34] S. R. Choudhury and S. Choubey, “Constraining light ster-
1301
+ ile neutrino mass with the BICEP2/Keck Array 2014 B-
1302
+ mode polarization data, ”Eur. Phys. J. C79 (2019) 557,
1303
+ [arXiv:1807.10294 [astro-ph.CO]].
1304
+ [35] S. Carneiro,
1305
+ P. C. de Holanda,
1306
+ C. Pigozzo and F.
1307
+ Sobreira, “ Is the H0 tension suggesting a 4th neu-
1308
+
1309
+ 11
1310
+ trino’s generation?, ”Phys. Rev. D 100 (2019) 023505,
1311
+ [arXiv:1812.06064v2[astro-ph.CO]].
1312
+ [36] M. Lucca, “ Dark energy–dark matter interactions as a solu-
1313
+ tion to the S8 tension, ”Phys. Dark. Univ. 34 (2021) 100899,
1314
+ [https://doi.org/10.1016/j.dark.2021.100899].
1315
+ [37] Vivian Poulin et al., “ Early Dark Energy can Resolve the
1316
+ Hubble Tension, ”Phys. Rev. Lett.. 122 (2019) 221301, [
1317
+ arXiv:1811.04083 [astro-ph.CO]].
1318
+ [38] E. D. Valentino, A. Melchiorri and J. Silk, “ Recon-
1319
+ ciling Planck with the local value of H0 in extended
1320
+ parameter space, ”Phys. Lett. B 761 (2016) 242–246,
1321
+ [arXiv:1606.00634 [astro-ph.CO]].
1322
+ [39] Q. Huang and K. Wang, “How the Dark Energy Can Rec-
1323
+ oncile Planck with Local Determination of the Hubble Con-
1324
+ stant, ” EPJC 76 (2016), [ arXiv:1606.05965 [astro-ph.CO]
1325
+ ].
1326
+ [40] E. D. Valentino, A. Melchiorri, E. V. Linder and J. Silk,
1327
+ “Constraining Dark Energy Dynamics in Extended Pa-
1328
+ rameter Space, ” Phys. Rev. D 96 (2017) 023523, [
1329
+ arXiv:1704.00762 [astro-ph.CO]].
1330
+ [41] E. D. Valentino, A. Melchiorri, E. V. Linder, J. Silk, “How
1331
+ the Dark Energy Can Reconcile Planck with Local De-
1332
+ termination of the Hubble Constant, ” Phys. Rev. D 96
1333
+ (2017)023523, [ arXiv:1704.00762 [astro-ph.CO] ].
1334
+ [42] U. Alam, S. Bag, V. Sahni, “Constraining the Cosmology of
1335
+ the Phantom Brane using Distance Measures, ” Phys. Rev.
1336
+ D 95 (2017) 023524, [arXiv:1605.04707 [astro-ph.CO] ].
1337
+ [43] W.
1338
+ Yang,
1339
+ S.
1340
+ Pan,
1341
+ E.
1342
+ D.
1343
+ Valentino,
1344
+ E.
1345
+ N.
1346
+ Sari-
1347
+ dakis, S. Chakraborty, “Observational constraints on one-
1348
+ parameter dynamical dark-energy parametrizations and the
1349
+ H0 tension, ” Astrophys. J. Lett. 99 (2019) 043543, [
1350
+ arXiv:1810.05141 [astro-ph.CO] ].
1351
+ [44] S. Vagnozzi, “New physics in light of the H0 tension: an
1352
+ alternative view, ” Phys. Rev. D 102 (2020) 023518, [
1353
+ arXiv:1907.07569 [astro-ph.CO]].
1354
+ [45] G. Alestas, L. Kazantzidis, L. Perivolaropoulos, “H0 Ten-
1355
+ sion, Phantom Dark Energy and Cosmological Parame-
1356
+ ter Degeneracies, ” Phys. Rev. D 101 (2020) 123516,
1357
+ [arXiv:2004.08363v3 [astro-ph.CO] ].
1358
+ [46] E. D. Valentino, A. Mukherjee, A. A. Sen, “Dark Energy
1359
+ with Phantom Crossing and the H0 tension, ” Entropy J. 23
1360
+ (2021) 404, [ arXiv:2005.12587 [astro-ph.CO] ].
1361
+ [47] F. X. L. Cede˜no et al., “Tracker phantom field and a
1362
+ cosmological constant:
1363
+ dynamics of a composite dark
1364
+ energy model, ” Phys. Rev. D. 104 (2021) 123502, [
1365
+ arXiv:2105.07103 [astro-ph.CO] ].
1366
+ [48] M. Bouhmadi-Lopez, A. Errahmani, P. Martin-Moruno,
1367
+ T. Ouali, Y. Tavakoli, “The little sibling of the big rip
1368
+ singularity, ” Int. J. Mod. Phys. D. 24 (2015) 1550078,
1369
+ [arXiv:1407.2446 [gr-qc] ].
1370
+ [49] A. Bouali, I. Albarran, M. Bouhmadi-L´opez, T. Ouali, “Cos-
1371
+ mological constraints of phantom dark energy models”,
1372
+ Phys. Dark. Univ. 26 (2019) 100391. [arXiv:1905.07304
1373
+ [astro-ph.CO]].
1374
+ [50] A. Bouali, I. Albarran, M. Bouhmadi-L´opez, A. Errahmani,
1375
+ T. Ouali, “Cosmological constraints of interacting phantom
1376
+ dark energy models”, Phys. Dark. Univ. 34 (2021) 100907.
1377
+ [https://doi.org/10.1016/j.dark.2021.100907].
1378
+ [51] L. E. Padilla,
1379
+ L. O. Tellez,
1380
+ L. A. Escamilla and
1381
+ J. A. Vazquez,
1382
+ “ Cosmological parameter inference
1383
+ with Bayesian statistics,
1384
+
1385
+ Universe 97 (2021) 213,
1386
+ [arXiv:1903.11127 [astro-ph.CO]].
1387
+ [52] H. Akaike, “ A new look at the statistical model identifica-
1388
+ tion, ” IEEE Transactions on Automatic Control 19 (716-
1389
+ 723) 023537.
1390
+ [53] A. R. Liddle, “ Information criteria for astrophysical model
1391
+ selection, ” MNRAS 377 (2007) L74-L78.
1392
+ [54] M. Szydlowski, A. Krawiec, A. Kurek and M. Kamionka,
1393
+ “ AIC, BIC, Bayesian evidence against the interacting dark
1394
+ energy model, ” Eur. Phys. J. C . 75 (2015) 1-11.
1395
+ [55] B. Krzysztof, “ Emerging spatial curvature can resolve the
1396
+ tension between high-redshift CMB and low-redshift dis-
1397
+ tance ladder measurements of the Hubble constant, ” Phys.
1398
+ Rev. D 97 (2018) 103529, [arXiv:1712.02967v2 [astro-
1399
+ ph.CO]].
1400
+ [56] W. K. Hastings, “Monte Carlo sampling methods using
1401
+ Markov chains and their applications, ” Biometrika 57
1402
+ (1970) 97–109.
1403
+ [57] T. Brinckmann, J. Lesgourgues, “MontePython 3: boosted
1404
+ MCMC sampler and other features,” Phys. Dark. Univ. 57
1405
+ (2019) 100260 [arXiv:1804.07261v2 [astro-ph.CO]].
1406
+ [58] J. Lesgourgues, “The Cosmic Linear Anisotropy Solving
1407
+ System (CLASS) I: Overview,”(2011) [arXiv:1104.2932v2
1408
+ [astro-ph.IM]].
1409
+ [59] W. Fang, W.Hu, A. Lewis, “Crossing the phantom divide
1410
+ with parametrized post-Friedmann dark energy,” Phys.Rev.
1411
+ D78 (2008) [arXiv:0808.3125 [astro-ph]].
1412
+ [60] BOSS collaboration, S. Alam, M. Ata et al., “The cluster-
1413
+ ing of galaxies in the completed SDSS-III Baryon Oscil-
1414
+ lation Spectroscopic Survey: cosmological analysis of the
1415
+ DR12 galaxy sample”, MNRAS. 470 (2017) 2617–2652,
1416
+ [arXiv:1607.03155 [astro-ph.CO]].
1417
+ [61] F. Beutler, C. Blake, M. Colless, D. H. Jones, L. Staveley-
1418
+ Smith, L. Campbell, Lachlan, Q Parker, W. Saunders, F.
1419
+ Watson, “The 6dF Galaxy Survey: baryon acoustic oscil-
1420
+ lations and the local Hubble constant,” Mon. Not. Roy. As-
1421
+ trono. Soc. 416 (2011) 3017–3032 [arXiv:1106.3366 [astro-
1422
+ ph.CO]].
1423
+ [62] A. J. Ross, L. Samushia, C. Howlett, W. J. Percival, A. Bur-
1424
+ den, M. Manera, “The clustering of the SDSS DR7 main
1425
+ Galaxy sample – I. A 4 per cent distance measure at z =
1426
+ 0.15,” Mon. Not. Roy. Astrono. Soc. J. 449 (2015) 835–847
1427
+ [arXiv:1409.3242 [astro-ph.CO]].
1428
+ [63] D. Camarena, V. Marra, “ Impact of the cosmic variance
1429
+ on H0 on cosmological analyses, ” Phys. Rev. D 98 (2018)
1430
+ 023537, [arXiv:1805.09900v3 [astro-ph.CO]].
1431
+ [64] C. A. P. Bengaly, U. Andrade and J. S. Alcaniz, “
1432
+ How does an incomplete sky coverage affect the Hub-
1433
+ ble Constant variance?, ” Eur. Phys. J. C 79 (2019) 768,
1434
+ [arXiv:1810.04966v2 [astro-ph.CO] ].
1435
+ [65] F. Contreras, N. Cruz, E. Elizalde, E. Gonz´alez and
1436
+ S. Odintsov, “ Linking little rip cosmologies with regu-
1437
+ lar early universes, ” Phys. Rev. D98 (2018) 123520, [
1438
+ arXiv:1808.06546 [gr-qc] ].
1439
+
4tE2T4oBgHgl3EQf6ghP/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6dE4T4oBgHgl3EQf1w1z/content/tmp_files/2301.05293v1.pdf.txt ADDED
@@ -0,0 +1,968 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ HTTE: A Hybrid Technique For Travel Time
2
+ Estimation In Sparse Data Environments
3
+ immediate
4
+ Nikolaos Zygouras1, [email protected] Nikolaos Panagiotou1, [email protected]
5
+ Yang Li3, [email protected] Dimitrios Gunopulos1, [email protected] Leonidas
6
+ Guibas2, [email protected]
7
+ 1
8
+ Abstract
9
+ Travel time estimation is a critical task, useful to many urban appli-
10
+ cations at the individual citizen and the stakeholder level. This paper
11
+ presents a novel hybrid algorithm for travel time estimation that lever-
12
+ ages historical and sparse real-time trajectory data. Given a path and a
13
+ departure time we estimate the travel time taking into account the histor-
14
+ ical information, the real-time trajectory data and the correlations among
15
+ different road segments. We detect similar road segments using historical
16
+ trajectories, and use a latent representation to model the similarities. Our
17
+ experimental evaluation demonstrates the effectiveness of our approach.
18
+ 1
19
+ Introduction
20
+ The increasing population density in modern cities is leading to massively in-
21
+ creasing commuting demands for citizens. This strongly motivates the need for
22
+ faster and more efficient navigation tools in the city. To be truly useful such
23
+ systems need to be able to monitor and accurately predict the traffic condi-
24
+ tions across the entire city road network in real-time, to respond to abrupt or
25
+ unexpected condition changes. Accurate travel time estimation for a path in
26
+ the road network is important for tools that help individual citizens plan their
27
+ travel; equally stakeholders and city/traffic authorities can exploit such tools
28
+ for efficient route planning and automatic detection of traffic anomalies. Sev-
29
+ eral works have used data from static sensors, including loop detectors Kwon
30
+ et al. (2003) and CCTV cameras Zhan et al. (2015) to address the travel time
31
+ estimation for a path. Such sensors are typically located at several junctions
32
+ across the city monitoring the traffic condition. The prevalence of such solu-
33
+ tions has diminished since their first appearance. The increased capital cost of
34
+ 1(1)National and Kapodistrian University of Athens (2)Stanford University (3) Tsinghua-
35
+ Berkeley Shenzhen Institute
36
+ 1
37
+ arXiv:2301.05293v1 [cs.LG] 12 Jan 2023
38
+
39
+ installing and maintaining such devices and their limited and static coverage
40
+ of the road network in combination with the inherent inaccuracy in calculating
41
+ the travel time from the output of these sensors (i.e. number of vehicles, speed
42
+ and video frames) limit their application in practice.
43
+ Recently researchers have used trajectory data in order to perform travel
44
+ time estimation, thus taking advantage of the widespread use of mobile devices
45
+ that are equipped with Global Position System (GPS) technology. Thus, such
46
+ mobile devices are transformed into important moving and ubiquitous sensors
47
+ reporting the traffic condition at different parts of the road network.
48
+ However, not all such data are available in real-time for a variety of reasons.
49
+ Sensors may be offline or smartphones may report their locations infrequently
50
+ or in batches.
51
+ Additionally, in several cases the application has access to a
52
+ small number of sensors. Taxi or bus companies, for instance, have data for the
53
+ vehicles in their fleet only. Over time, such applications can compile massive
54
+ historical data with impressive coverage, although at any given time the coverage
55
+ of the map is sparse.
56
+ The goal of this study is to estimate the time that is required to travel a
57
+ given query path considering a particular departure time in real time even when
58
+ very patchy real time coverage of the network is available. To accomplish this
59
+ we propose a hybrid model that considers efficiently the recent and historical
60
+ trajectories generated by a sample of vehicles. In our settings, the travel time
61
+ estimation is a challenging problem for the following reasons:
62
+ 1. Data sparsity: for the majority of the road segments we do not have any
63
+ information regarding their recent traffic condition, since only the trajectories
64
+ of a small subset of vehicles moving in the road network is available. Therefore,
65
+ our setting is different from industry situations where an extensive real-time
66
+ coverage of the traffic conditions may be available.
67
+ 2. Noisy data: the travel time reports are extremely noisy. A driver may stop at
68
+ a traffic light and spend a while waiting, while another driver crosses the junction
69
+ without stopping at the traffic light. This would generate two divergent travel
70
+ time reports for the same road segment. Also, some drivers may drive faster or
71
+ slower than others adding further complexity in the measurements.
72
+ 3. Unpredictable dynamics of traffic: there are many traffic irregularities and
73
+ anomalies that may occur in the road network (i.e. an accident, a social event
74
+ etc.) that could affect the expected and the orderly traffic behaviour of the road
75
+ network.
76
+ 4. Response time: it is crucial to create a model able to answer users’ queries
77
+ instantly and at the same time update its state in real time considering the
78
+ recent traffic condition.
79
+ To address the aforementioned challenges, we propose a Hybrid Travel Time
80
+ Estimation framework, referred as HTTE. The framework achieves the estima-
81
+ tion of the travel time for a given query path (laying on top of the road network),
82
+ using data from moving vehicles. The proposed framework is capable of pro-
83
+ viding predictions in real-time by exploiting the similarity of the road segments
84
+ and by considering travel time reports provided by recent as well as historical
85
+ trajectories. The contributions of this work can be summarized as follows:
86
+ 2
87
+
88
+ • A latent representation for road segments: In order to treat the data sparsity
89
+ problem in individual segments, we take advantage of the available traffic
90
+ information from other segments with similar traffic behavior. We provide a
91
+ mechanism for learning a latent representation for the road segments. This
92
+ representation describes their traffic behaviour. Thus, road segments with
93
+ similar traffic behaviour will be placed close in this latent space.
94
+ • A Hybrid Estimation Model: We develop a streaming and hybrid estimation
95
+ model that captures the recent traffic reports, the periodicity of the time
96
+ series and the correlations among different road segments. Our framework
97
+ models large areas of the city jointly and not the road segments individually,
98
+ addressing this way the data sparsity problem.
99
+ • We evaluate our method under realistic settings using data from buses and
100
+ taxis and compare it with state of the art techniques. We show that hybrid
101
+ techniques such as the one we propose outperform techniques that use only
102
+ historical or only real-time and near real-time data. Experiments show that
103
+ incorporating pathlets can improve the query efficiency up to 14 times with
104
+ slight degradation in accuracy. This modification allows HTTE to work with
105
+ interactive applications on a much larger scale.
106
+ 2
107
+ Related Work
108
+ Travel Time Estimation Using Static Sensor Data: A variety of tech-
109
+ niques have been proposed in the literature for estimating the road segments’
110
+ traffic flow or speed, exploiting static sensor data. Among these techniques, Qu
111
+ et al. (2008) describes a matrix decomposition method, for estimating the traffic
112
+ flow in Beijing, Li et al. (2013) proposes an extension of Probabilistic Principal
113
+ Component Analysis and Kernel Principal Component Analysis that captures
114
+ spatial and temporal dependencies and Wang et al. (2016b) uses deep convo-
115
+ lutional neural networks for predicting the road segments’ speed. A DeepNN
116
+ architecture able to capture spatial/temporal relations between road segments
117
+ was proposed in Li et al. (2018b) using speeds from static sensors.
118
+ Travel Time Estimation Using Dynamic Mobile Sensor Data: Many
119
+ studies have explored the travel time estimation problem using moving sensors.
120
+ In Zhan et al. (2013) the authors estimated the travel time in links, employing
121
+ least-square optimization on taxi trip data that contained endpoint locations
122
+ and trip metadata. A Bayesian mixture model was introduced in Zhan et al.
123
+ (2016a) that estimated the short-term average urban link travel times with par-
124
+ tial information available. The correlations between the travel times of nearby
125
+ links and different time slots are crucial for inferring the traffic state of a partic-
126
+ ular link Niu et al. (2014); Zhang et al. (2016). Online methods that determine
127
+ the time required by a bus to reach a specified bus stop were proposed in Gal
128
+ et al. (2017), Gal et al. (2018) and Yu et al. (2011). In Wang et al. (2016a) the
129
+ authors propose a method that estimates the travel time by identifying near-
130
+ neighbor trajectories, with similar origin and destination. The final estimation
131
+ 3
132
+
133
+ of the travel time is the weighted average of the neighbors travel times. The au-
134
+ thors in Jenelius and Koutsopoulos (2013) state that the travel time estimation
135
+ can be approximated by the sum of the segments’ traversal time and a delay
136
+ penalty that occurs at the links between the segments. In Zhan et al. (2016b)
137
+ the authors propose a hybrid framework that incorporates (i) road network data,
138
+ (ii) POI (Points of Interest), (iii) GPS trajectories and (iv) weather informa-
139
+ tion to estimate the travel speed and the traffic volume. In Li et al. (2017) the
140
+ authors proposed a technique that estimates the travel time using a small num-
141
+ ber of GPS-equipped cars available, discovering local traffic patterns over a set
142
+ of frequent paths, a.k. a. pathlets. At query time, a trajectory is decomposed
143
+ into pathlets, whose recent travel time is estimated using pattern matching with
144
+ recent travel time observations. A spatio-temporal hidden Markov model that
145
+ models correlations among different traffic time series was proposed in Yang
146
+ et al. (2013) taking into account the sparsity, the spatio-temporal correlation,
147
+ and the heterogeneity of time series. A different approach was followed by Yang
148
+ et al. (2018); Dai et al. (2016) assigning the weights to the paths instead of the
149
+ edges of the road network, avoiding splitting the trajectories in small fragments.
150
+ The authors in Yang et al. (2014) explored the use of weighted PageRank values
151
+ of edges for assigning appropriate weights to all edges. The authors in Id´e and
152
+ Sugiyama (2011) proposed a weight propagation model able to capture neigh-
153
+ boring road-link dependencies and embedded the model to the regression task.
154
+ In the same direction in Zheng and Ni (2013) the authors provided a multi
155
+ task learning framework that simultaneously captures spatial dependencies and
156
+ temporal dynamics encouraging spatio-temporal smoothness.
157
+ Learning Latent Features on the Road Network: Recent techniques have
158
+ suggested more sophisticated methods for taking advantage of historical data
159
+ for travel time prediction. In Hofleitner et al. (2012) a technique that estimates
160
+ the arterial travel time distributions is proposed, introducing hidden random
161
+ variables that represent the road segments’ state (congested and undersatu-
162
+ rated). Then a dynamic bayesian network learns the travel time distributions.
163
+ A technique that detects the time-varying distribution of travel time of road seg-
164
+ ments using Graph Convolutional Neural Network was introduced in Hu et al.
165
+ (2019). In Deng et al. (2016) the authors proposed a method that imputes the
166
+ short future speeds for the road segments, utilizing latent topological and tem-
167
+ poral features learned and updated incrementally through matrix factorization.
168
+ In Wang et al. (2014) the travel times of different road segments, drivers and
169
+ time slots are modeled as a 3D sparse tensor. The missing values were filled
170
+ in using the geospatial features and the recent and historical traffic informa-
171
+ tion. A dynamic programming technique optimally concatenated the path into
172
+ subpaths.
173
+ Deep Learning Approaches: The recent success of deep learning in a variety
174
+ of learning problems, lead to the design of deep learning architectures for the
175
+ travel time estimation task. In DeepTravel Zhang et al. (2018) a deep learn-
176
+ ing architecture is proposed with two major components. The first handles the
177
+ representation of the features (spatial, temporal, driving state) with an embed-
178
+ dings layer while the second consists of a BiLSTM layer that performs the actual
179
+ 4
180
+
181
+ regression. An origin-destination travel time estimation method is MURAT Li
182
+ et al. (2018a) that employs a graph embedding method for extracting roads’
183
+ embeddings and an embedding layer for capturing the spatial and temporal fea-
184
+ tures. These embeddings layers transform and provide the input to a Residual
185
+ network.
186
+ The authors in Wang et al. (2018a) proposed an end-to-end Deep
187
+ learning framework for travel time estimation of an entire path (DeepTTE). A
188
+ geo-convolution operation is proposed that handles the GPS points of the tra-
189
+ jectory followed by a recurrent component. A multi-task learning component is
190
+ used in order to learn both the total travel time of the given path and the travel
191
+ times of smaller parts of the path. Finally in Wang et al. (2018b) the authors
192
+ proposed a deep learning model that estimates the time of arrival using wide,
193
+ deep and recurrent components.
194
+ In essence, in our work we exploit novel techniques for the discovery of latent
195
+ features in the spatial and temporal traffic data and at the same time leverage
196
+ the use of sparse real-time information.
197
+ 3
198
+ Our Approach
199
+ 3.1
200
+ Problem Setup
201
+ In this work we propose an efficient algorithm for estimating the travel time that
202
+ is required for a vehicle to traverse a path of the road network. The proposed
203
+ framework receives firstly as input a set of vehicles’ trajectories. Each trajectory
204
+ is a sequence of time ordered spatial points T : (p1, t1) → · · · → (pn, tn), where
205
+ each point pi ∈ R2 is the sampled GPS position and ti is the corresponding
206
+ timestamp of the measurement. Then the points of the trajectories are mapped
207
+ on a Road Network.
208
+ A Road Network is defined as a topological structure
209
+ of a network captured by a graph G, where the nodes of G correspond to a
210
+ collection of road segments ri that link different urban areas together and the
211
+ set of edges represent the connections between these road segments. A map-
212
+ matched trajectory TG is a projection of a trajectory T in the road network G.
213
+ TG : (r1, tin,1, t1) → · · · → (rn′, tin,n′, tn′) is defined as a sequence of the visited
214
+ road segments ri along with the timestamps that the vehicle entered tin,i and
215
+ left ti each road segment. In this work we are computing the estimated travel
216
+ time of a given query path, without maintaining profiles for each driver.
217
+ Each vehcile that traverses a segment ri generates a Travel Time Report
218
+ Ri = (ri, ti, TTi). The reports Ri are available when the vehicle exits the road
219
+ segment. TTi = ti−tin,i is the travel time required for the traversal and ti is the
220
+ time when the vehicle left the road segment. The travel time reports are stored
221
+ in a collection RH that is incrementally updated as new reports are provided.
222
+ Also, a Road Segment Embedding is a mapping E : ri → RD , that maps a road
223
+ segment ri of the road network G to a D-dimensional latent space. Finally, a
224
+ query path Pq : rq1 → · · · → rqm is an ordered sequence of m consecutive road
225
+ segments of G.
226
+ Problem Definition. Given a query q that consists of a query path Pq and
227
+ 5
228
+
229
+ Query
230
+ q
231
+ Offline
232
+ Data
233
+ Real Time
234
+ Data
235
+ Road
236
+ Network
237
+ Trajectory
238
+ Database
239
+ Map
240
+ Matching
241
+ Segments
242
+ TT - RH
243
+ Matrix
244
+ Factorization
245
+ Embeddings
246
+ Gaussian
247
+ Processes
248
+ Training
249
+ Hyperpar
250
+ ameters
251
+ Gaussian
252
+ Process
253
+ Real Time/
254
+ Offline Data
255
+ Travel Time
256
+ Estimation
257
+ TTq
258
+ Figure 1: Framework of our approach.
259
+ a departure time tdep,q, predict the travel time TTq� that is required for a vehicle
260
+ to traverse all the road segments of Pq departing at tdep,q using the collection
261
+ of historical travel time reports RH that have been received until the time of the
262
+ query.
263
+ 3.2
264
+ Overview of the Approach
265
+ The overview of our framework for estimating the travel time of a given query
266
+ path is illustrated in Figure 1. Our framework has two major tasks. Initially, it
267
+ aims to model the historical data by examining the traffic behavior of the road
268
+ segments. Then it makes real-time predictions that exploit both historical and
269
+ real-time information. Our architecture consists of the following modules:
270
+ Module 1: Road Network & Trajectory Partitioning. The first pro-
271
+ cessing component receives as input raw GPS trajectories and maps them onto
272
+ paths in a road network, such as OpenStreetMap (OSM). In this case, the GPS
273
+ points of a trajectory are mapped to road segments (i.e. OSM road segments)
274
+ using the Barefoot2 library. Also, in this work we consider more abstract models
275
+ of the road network. Under this case, the input GPS points could be mapped
276
+ to sequences of road segments, or to pairs of GPS locations that represent a
277
+ transition from an origin to a destination.
278
+ One way to obtain a compact set of road segment sequences for learning the
279
+ traffic behaviour is using the concept of pathlet dictionary. Given a set of map
280
+ matched trajectories S, the pathlet dictionary (PD) is a collection of paths
281
+ (road segment sequences) on the road network that reconstructs all trajectories
282
+ in S by concatenation. Entries in the pathlet dictionary are referred as pathlets.
283
+ A pathlet dictionary is considered optimal if it satisfies the following criteria:
284
+ (i) The number of pathlets in the dictionary, |PD| is minimized. (ii) For each
285
+ map matched trajectory TG ∈ S, the number of pathlets used to reconstruct TG,
286
+ |p(TG)| is minimized.
287
+ Although computing the optimal pathlet dictionary from a trajectory col-
288
+ lection is an NP-hard problem, Chen et al. (2013) proposed an efficient approx-
289
+ imation algorithm to find solution in O(|S|·n2) time, where |S| is the size of the
290
+ trajectory collection and n is the maximum number of road segments. When the
291
+ 2https://github.com/bmwcarit/barefoot
292
+ 6
293
+
294
+ Figure 2: Example segments mapping into the embedding space. The t-SNE
295
+ technique is used in order to project the embeddings in a 3-dimensional space.
296
+ dictionary is computed, it’s easy to query the decomposition of map matched
297
+ trajectories using graph search creating the travel time reports for the pathlets.
298
+ After the mapping to the road segments is completed using the former or the
299
+ latter approach the travel time reports RH are generated, containing the time
300
+ required to travel the road segments or the pathlets. This processing module is
301
+ common for both the historical and the real-time data. These reports are the
302
+ fundamental element of the proposed travel time estimation technique.
303
+ Module 2: A latent representation for road segments.
304
+ Identifying
305
+ segments with similar traffic patterns is crucial for tackling the data sparsity
306
+ problem. This component receives as input timestamped travel time reports for
307
+ the various road segments. A latent representation for each segment is learned
308
+ capturing the correlations among the road segments. That is, segments with
309
+ similar traffic behaviour are placed close in the latent space. On the other hand,
310
+ segments with divergent traffic behaviour are placed far apart in the latent space.
311
+ Figure 2 on the right illustrates on the map several road segments with similar
312
+ traffic behavior (similar embeddings). On the left part of the figure the mapping
313
+ of these road segments into the embedding space is presented.
314
+ Module 3: Travel Time Estimation. The final module estimates the time
315
+ needed to travel a given query path Pq. This module is comprised by an offline
316
+ and a real-time stage. A Gaussian Process (Williams and Rasmussen, 2006)
317
+ model is trained offline with a set of historical reports RH using a complex
318
+ covariance function, able to capture a variety of data aspects such as the data
319
+ periodicity and the magnitude of the most recent values.
320
+ Then our system
321
+ receives in real-time queries q and estimates the total travel time required to
322
+ traverse the given query path Pq, estimating the travel times of all the individual
323
+ road segments of Pq.
324
+ 4
325
+ THE HTTE Algorithm
326
+ We describe the HTTE travel time estimation algorithm. Initially, we describe
327
+ a technique for modeling the traffic data and for identifying road segments with
328
+ similar traffic behavior. Then we discuss the desirable properties of our data
329
+ and present a covariance function that captures these properties. Finally, we
330
+ describe a method for predicting in real-time the travel times of the query paths.
331
+ 7
332
+
333
+ 40
334
+ 30
335
+ 20
336
+ 10
337
+ 0
338
+ 10
339
+ -20
340
+ 30
341
+ 20
342
+ 30
343
+ 0
344
+ 10
345
+ 10
346
+ 20
347
+ -10
348
+ 0
349
+ 30
350
+ -30
351
+ -20A Latent Representation for Road Segments
352
+ Data sparsity is one of the major obstacles in estimating the travel time of a road
353
+ segment since traffic information is provided only by a few vehicles. Information
354
+ for the recent traffic state for the majority of road segments is often missing.
355
+ It is essential to ensure that the method will use the traffic information from
356
+ the segments for which we have recent reports in order to infer the state for a
357
+ segment with similar traffic behavior but without recent information.
358
+ Here we propose a technique that detects a latent embedding representation
359
+ for the segments. The main property of this mapping is that segments with sim-
360
+ ilar traffic behaviour should be placed close in this embedding space. This latent
361
+ representation is used by the proposed prediction model in order to address the
362
+ data sparsity issue. For the purpose of constructing the embedding representa-
363
+ tion for the segments we decided to employ a matrix factorization approach. A
364
+ similar technique is also used in Deng et al. (2016); Wang et al. (2014). Our
365
+ aim is to discover some latent features that describe the road segments traffic
366
+ characteristics. Each road segment ri and time window w is associated with
367
+ a D-dimensional embedding vector of latent features. Then, the actual travel
368
+ time report for the segment ri in the time window w can be approximated by
369
+ the product of these two latent vectors. In order to satisfy this condition, the
370
+ learned embeddings of segments with similar traffic behaviour should be close
371
+ in the latent space.
372
+ In order to apply the matrix factorization method we need to convert the
373
+ historical reports RH to a sparse matrix M ∈ RN×W , where the N rows corre-
374
+ spond to the segments ri of the road network G and the W columns correspond
375
+ to all the time windows of the historical data w. Each time window has a size of
376
+ 30 minutes and each cell corresponds to the average travel time for a segment ri
377
+ in this window (i.e. from 10:00 till 10:30), considering all the vehicles that tra-
378
+ versed ri. After applying the matrix factorization the matrix M is decomposed
379
+ into two matrices P ∈ RN×D, Q ∈ RW ×D such that M ≈ P × QT = M ′. The
380
+ rows of P are the D-dimensional embeddings of the road segments and the rows
381
+ of Q are the D-dimensional embeddings of the time windows. For estimating
382
+ the matrices P and Q we minimize the Mean Squared Error (MSE) between
383
+ the original matrix M and the matrix reconstruction M ′ using the Stochastic
384
+ Gradient Descent (SGD). The SGD starts with the random matrices P and Q
385
+ and at each step alters them considering the direction of the gradient of the
386
+ objective function. The algorithm terminates when the objective function does
387
+ not significantly change.
388
+ Constructing the Covariance Function: Here, we first introduce the prop-
389
+ erties that characterise the road segments’ travel times. Then we describe the
390
+ complex covariance function that fits our data. Our aim is to predict the travel
391
+ time of several queried road segments considering multiple travel time reports
392
+ which are transmitted by the moving vehicles. Multiple evolving time-series are
393
+ generated, one for each road segment, and our aim is to make accurate forecasts
394
+ for their future traffic condition.
395
+ To accurately estimate travel time the following key properties of the time
396
+ 8
397
+
398
+ series data should be considered: (i) Periodicity: the traffic condition of the road
399
+ segments is periodic in a daily basis, since commuters tend to follow similar trips.
400
+ (ii) Correlation among road segments: The information provided by multiple
401
+ road segments can be used in order to make predictions jointly, exploiting the
402
+ correlations among the road segments and allows us to ameliorate the effects of
403
+ data sparsity. (iii) Short term irregularities: even if the time series are periodic
404
+ the traffic condition can be affected by multiple factors (i.e. constructions in
405
+ the road network, an accident or a social event). This could generate traffic
406
+ congestion events that are impossible to detect without monitoring the real-
407
+ time traffic reports. (iv) Noisiness: the travel time reports are extremely noisy,
408
+ for instance a driver may be stopped by a traffic light spending 1 minute waiting
409
+ while another driver may not.
410
+ In this work we use Gaussian processes to tackle the travel time estima-
411
+ tion problem. We construct appropriately the covariance function providing an
412
+ excellent fit to the data and characterizing the correlations among the differ-
413
+ ent travel time reports in the process. Here we consider Gaussian processes
414
+ with a zero mean function. Our goal is to model the travel time (TT) of the
415
+ road segments as a function of the input vector x �� RD+1. x contains the D-
416
+ dimensional embedding representation of the road segment along with the time
417
+ that the vehicle left the road segment.
418
+ x =
419
+ �t, e�T
420
+ (1)
421
+ e =
422
+
423
+ e1, . . . , eD�
424
+ (2)
425
+ We model the daily variation of the road segments’ travel times using a
426
+ periodic covariance function on the timestamp of measurements t, modified by
427
+ taking the product with a squared exponential component on (i) the timestamp
428
+ measurement t reducing the impact of older reports and (ii) the embeddings in
429
+ order to reduce the impact of irrelevant road segments.
430
+ k1(x, x′) = θ2
431
+ 1exp(−(t − t′)2
432
+ 2θ2
433
+ 2
434
+ − (e − e′)T (e − e′)
435
+ 2θ2
436
+ 3
437
+ − 2sin2(π(t − t′))
438
+ θ2
439
+ 4
440
+ )
441
+ (3)
442
+ The next term of the covariance function, models the medium term irreg-
443
+ ularities and the correlations among similar road segments. This term uses a
444
+ rational quadratic component on the timestamp t and a squared exponential
445
+ component on the road segments’ embeddings e. Using this term the travel
446
+ time prediction of a road segment is affected by the recent reports of road seg-
447
+ ments with similar traffic behaviour (close in the embedding space), treating
448
+ the data sparsity problem.
449
+ k2(x, x′) = θ2
450
+ 5(1 + (t − t′)2
451
+ 2θ6θ7
452
+ )−θ6exp(−(e − e′)T (e − e′)
453
+ 2θ2
454
+ 8
455
+ )
456
+ (4)
457
+ Finally, a noise model is introduced considering the timestamp and the em-
458
+ beddings of the datapoints.
459
+ k3(x, x′) = θ2
460
+ 9exp(−(e − e′)T (e − e′)
461
+ 2θ2
462
+ 10
463
+ − (t − t′)2
464
+ 2θ2
465
+ 11
466
+ )
467
+ (5)
468
+ 9
469
+
470
+ The final covariance function is the sum of the previously described covari-
471
+ ance functions, k(x, x′) = k1(x, x′) + k2(x, x′) + k3(x, x′) , with hyperparam-
472
+ eters θ = [θ1 . . . θ11]. We empirically initialize these hyperparameters based on
473
+ our prior beliefs about the data. During the learning procedure θ is automati-
474
+ cally adjusted in order to appropriately fit the training data.
475
+ Hybrid Travel Time Estimation (HTTE): We now present in detail our
476
+ travel time estimation algorithm for the received query paths. Our algorithm,
477
+ presented in Algorithm 1, consists of an offline and a real-time stage. The offline
478
+ stage is responsible to initialize the required variables and is executed only once.
479
+ The real-time stage of the algorithm receives in a streaming manner query paths
480
+ and a departure time for each path and estimates instantly the corresponding
481
+ travel time considering the already received travel time reports RH.
482
+ Offline stage: Here we perform a set of tasks that initialize our system. Firstly,
483
+ we compute the average travel time for each road segment for different times of
484
+ the day, referred as TTavg. These average travel times will provide us later an
485
+ approximate estimation of the departure time for each road segment of the given
486
+ query path. In order to compute TTavg the day is partitioned in time windows
487
+ of 30 minutes. Additionally, we compute for each road segment the average
488
+ travel time and the standard deviation of travel time, referred as segsStats.
489
+ The segsStats variable does not consider the time of the day. These statistics
490
+ will be used later in order to standardize the travel time reports of the various
491
+ road segments. Then our algorithm computes an embedding representation E
492
+ for each road segment as it was described in Section 4. In the next step of the
493
+ algorithm, a Gaussian process model, with the covariance function described in
494
+ Section 4 and zero-mean is trained and its hyperparmeters θ are learned.
495
+ Having all the travel time reports that have been received until now and
496
+ the road segments statistics and embeddings, our next step is to initialize the
497
+ Gaussian process models, defined as gpModels. In order to avoid generating a
498
+ large Gaussian process model that would consider the travel time reports for all
499
+ the city and the whole day we perform spatial and temporal partitioning of RH.
500
+ This results in multiple gpModels and expedits the estimation of travel times
501
+ queries. Each model is affiliated with a particular spatial area and time of the
502
+ day. When a gpModel is generated, a covariance matrix K is constructed using
503
+ the covariance function of Section 4, and the hyperparameters θ. The covariance
504
+ matrix, for each gpModel, describes the correlation between the different travel
505
+ time reports that have been received till now for a particular time window and
506
+ area.
507
+ Since the road segments have different lengths and their travel times
508
+ deviate significantly, we decided to standardize the travel time reports for each
509
+ road segment using the corresponding statistics segsStats. Thus the targets y
510
+ for each gpModel are the standardized, with the statistics, travel times and not
511
+ the raw travel times.
512
+ The travel time reports are partitioned into different gpModels considering
513
+ the location of the road segments and their timestamp (Figure 3). More specifi-
514
+ cally the whole city is decomposed in smaller areas applying a grid of uniformly
515
+ sized cells. In order to feed the model we allow spatial overlaps with neighbor-
516
+ ing spatial grid cells in order to improve the accuracy for the road segments
517
+ 10
518
+
519
+ Overlapping Area
520
+ Query area
521
+ ...
522
+ 00
523
+ 01
524
+ 02
525
+ 10
526
+ 12
527
+ 13
528
+ 14
529
+ 21
530
+ 22
531
+ 23
532
+ ...
533
+ 11
534
+ Query time
535
+ window
536
+ Overlapping
537
+ time window
538
+ Figure 3: Spatial and temporal partitioning.
539
+ that are near the edges of each cell. Also, each day is partitioned into smaller
540
+ time windows. Here we allow temporal overlaps with the previous and the next
541
+ time windows, providing traffic information at the beginning of each query time
542
+ window.
543
+ The travel time reports that belong in overlapping areas and time
544
+ windows are inserted into multiple gpModels. Finally, each gpModel contains
545
+ the recent and historical reports of each query and overlapping time window
546
+ and area that is associated with.
547
+ Real-time stage:
548
+ Our system receives query paths in real-time from the
549
+ QueriesStream and performs instantly the travel time estimation for each given
550
+ query. Initially our algorithm updates the gpModels adding the newly received
551
+ travel time reports. The update of the gpModels is performed in predetermined
552
+ periods and not every time a travel time report or a query is received. Such
553
+ frequent updates would be time consuming. In order to do this we identify the
554
+ current time window of the day w, considering the current time. If the window w
555
+ has changed from the window of the previous query prevW then the gpModels
556
+ are updated. Each gpModel is updated extending its covariance matrix K with
557
+ the travel time reports that have been received from the previous update of the
558
+ gpModel for the investigated spatial area and time window.
559
+ The next step of the algorithm is to decompose the given query path in a
560
+ set of individual road segments (SubQueries) and estimate their travel times
561
+ querying the corresponding gpModels. In order to query the gpModels it is
562
+ required to estimate an approximate departure time ti for each road segment
563
+ rqi of the given query path. In order to approximate the departure times we
564
+ begin with the first road segment rq1 of the query path setting as departure
565
+ time t1 for this road segment the trip’s departure time tdep,q. Then in order to
566
+ estimate the departure time for the next road segment rqi we add to the previous
567
+ road segment departure time ti−1 the average travel time TTavg of the previous
568
+ road segment rqi−1, as it was computed in the offline stage of the algorithm.
569
+ This procedure iterates till the last road segment of the query path. Having an
570
+ approximate estimation for the departure time for each road segment will allow
571
+ to perform batch queries to the affected gpModels of the query path, speeding
572
+ up the execution time of the queries.
573
+ Finally, individual queries for the road segments’ travel times are posed
574
+ to the appropriate gpModel, considering the spatial and temporal partitioning.
575
+ The gpModels return standardized travel times, thus the segsStats are required
576
+ in order to get the actual travel time estimations. The total travel time of the
577
+ query path TT�q is updated considering the estimates of the gpModels for the
578
+ individual road segments.
579
+ Finally, TT�q is the estimated travel time for the
580
+ 11
581
+
582
+ DRUMCONDRA
583
+ [R807]
584
+ R803
585
+ ad
586
+ R131]
587
+ FainviewPark
588
+ R834
589
+ CrokePark
590
+ R101
591
+ R803
592
+ OADSTONE
593
+ R131
594
+ EastPointBusinessPark
595
+ H
596
+ The Mater Misericordiae
597
+ University Hospital
598
+ R802]
599
+ NORTHSTRAND
600
+ [R803]
601
+ Mountjoy
602
+ R105]
603
+ Square Park
604
+ M50
605
+ Dublin City Gallery
606
+ JamesJoyceCentre
607
+ The Hugh Lane
608
+ EASTWALL
609
+ Rotunda Hospital C
610
+ R803
611
+ R101]
612
+ R131
613
+ R108
614
+ NT
615
+ St Mary'sProCathedral
616
+ CA.
617
+
618
+ Dublin
619
+ R101
620
+ NORTH WALL
621
+ R10S]
622
+ R801
623
+ EPICTheIrish
624
+ 3Arena
625
+ rch
626
+ EmigrationMuseum
627
+ Ha'penny Bridge
628
+ R802
629
+ R814
630
+ RiverLiffey
631
+ R148
632
+ Trinity College
633
+ R131
634
+ TEMPLEBAR
635
+ Dublin
636
+ Bord Gais
637
+ Cathedral
638
+ EnergyTheatre
639
+ Dublin Castle
640
+ R131
641
+ R108]
642
+ R802
643
+ National Gallery
644
+ oscarwilde House
645
+ R802
646
+ Ringsend
647
+ of Ireland
648
+ R118
649
+ TheLittleMuseum
650
+ R138
651
+ R802
652
+ Cathedral
653
+ of Dublin
654
+ Merrion
655
+ R815]
656
+
657
+ Square
658
+ STELLA GARDENS
659
+ R131
660
+ StStephen's
661
+ TheFitzwilliam
662
+ Technological
663
+ UniversityDublin R110
664
+ Green
665
+ Casinoand Card Club
666
+ R815
667
+ R137
668
+ R111
669
+ Irishtown
670
+ R110
671
+ Dicey's Garden ClubO
672
+ BEGGAR'SBUSH
673
+ UNT
674
+ AvivaStadium
675
+ Hey
676
+ R114
677
+ Iveagh
678
+ TheNational
679
+ Gardens
680
+ ConcertHall
681
+ R118]
682
+ Royal Victoria Eye H
683
+
684
+ R816M50
685
+ R108]
686
+ R104]
687
+ R809]
688
+ R107
689
+ Finglas
690
+ R103]
691
+ RT
692
+ Coolock
693
+ NCHARDSTOWN
694
+ R135
695
+ Glasnevin
696
+ WHITEHALL
697
+ Artane
698
+ Kilba
699
+ RahenyR105
700
+ M50
701
+ R147
702
+ R102
703
+ [R103]
704
+ R808)
705
+ National
706
+ R102
707
+ M50
708
+ R807
709
+ Castleknock
710
+ Botanic
711
+ R108
712
+ R107
713
+ Gardens
714
+ NT
715
+ R808
716
+ Saint
717
+ R806
718
+ Marino
719
+ R105]
720
+ AnnesPark
721
+ ASHTOWN
722
+ Cabra
723
+ Clontarf
724
+ Fairview
725
+ Dollymount
726
+ R806]
727
+ DRUMCONDRA
728
+ R147
729
+ [R80S]
730
+ BROADSTONE
731
+ EastPointBusinessPark
732
+ DublinZoo
733
+ R101]
734
+ nerstown
735
+ R105
736
+ PhoenixPark
737
+ M50
738
+ QDublin Port
739
+ JamesonDistillery Bow St
740
+ Dublin
741
+ 3Arena
742
+ R109
743
+ R112
744
+ R109
745
+ R801
746
+ R111R148
747
+ [R802]
748
+ R131
749
+ Ballyfermot
750
+ R833
751
+ DublinEhbourg
752
+ GuinnessStorehouse
753
+ AD
754
+ StStephen's
755
+ Rinasend
756
+ R810
757
+ StPatrick'sCathedral
758
+ Green
759
+ INCHICORE
760
+ R812
761
+ R111
762
+ DolphinsBarn
763
+ West
764
+ Bluebell
765
+ DRIMNAGH
766
+ R111
767
+ x&Geese
768
+ Ballsbridge
769
+ R131
770
+ Ranelagh
771
+ R112
772
+ R114
773
+ Rathmines
774
+ R815
775
+ R110
776
+ R117
777
+ .
778
+ Ballymount
779
+ R817
780
+ Rathgar
781
+ Donnybrook
782
+ IndustrialEstate
783
+ Greenhills
784
+ R820
785
+ TERENURE
786
+ UCDInstitute
787
+ forDiscovery
788
+ Booterstown
789
+ M5D
790
+ R112]
791
+ R118
792
+ [R838]
793
+ TymonPark
794
+ R138
795
+ R817]
796
+ R112
797
+ Blackrock
798
+ [R137]
799
+ Kilnamanagh
800
+ R117
801
+ R825
802
+ N31
803
+ R114
804
+ R112
805
+ DUNDRUM
806
+ R825
807
+ Monks
808
+ R821]
809
+ Goatstown
810
+ R817
811
+ N11
812
+ Tallaght
813
+ R115
814
+ M50
815
+ Ballyboden
816
+ R826
817
+ R826
818
+ R113]
819
+ R827
820
+ Firhouse
821
+ Knocklyon
822
+ R822
823
+ RE
824
+ R113]Algorithm 1: Travel Time Estimation Algorithm
825
+ Data: RH, QueriesStream = [q1, . . . , q∞]
826
+ Result: TT�1, . . . , TT�∞)
827
+ 1 Offline Stage;
828
+ 2 TTavg ← computeAvgTravelTime(RH);
829
+ 3 segsStats ← computeRoadSegmentsStats(RH);
830
+ 4 E ← computeEmbeddings(RH, segsStats);
831
+ 5 θ ← computeHyperparametersGP(RH, E, segsStats);
832
+ 6 gpModels ← initializeMultipleGPs(RH, E, segsStats, θ);
833
+ 7 prevW ← None;
834
+ 8 Online Stage;
835
+ 9 foreach q =< Pq, tdep,q > in QueriesStream do
836
+ 10
837
+ TT�q ← 0;
838
+ 11
839
+ w ← getTimeWindow();
840
+ 12
841
+ if w ̸= prevW then
842
+ 13
843
+ gpModels.update(RH, segsStats, θ);
844
+ 14
845
+ prevW ← w;
846
+ 15
847
+ SubQueries ← decompose path(Pq, tdep,q, TTavg);
848
+ 16
849
+ foreach < ri, ti >∈ SubQueries do
850
+ 17
851
+ gpModel ← findGP(ri, ti);
852
+ 18
853
+ TT�q ← TT�q + gpModel.query(ri, ti, segsStats)
854
+ query q.
855
+ 5
856
+ Conclusion
857
+ We develop a novel hybrid technique for travel time estimation, that considers
858
+ recent and historical traffic reports. An embedding representation for each road
859
+ segment is learned based on its traffic behaviour. This representation is incor-
860
+ porated by a regression technique, handling the data sparsity problem. This
861
+ allows our technique to make accurate estimations even if there are no recent
862
+ traffic reports available for a segment. Finally, our technique adapts different
863
+ levels and types of abstraction that allow the real-time travel time estimation.
864
+ References
865
+ Chen, C., Su, H., Huang, Q., Zhang, L., and Guibas, L. (2013). Pathlet learning
866
+ for compressing and planning trajectories. In ACM SIGSPATIAL 2013, pages
867
+ 392–395.
868
+ Dai, J., Yang, B., Guo, C., Jensen, C. S., and Hu, J. (2016). Path cost distri-
869
+ bution estimation using trajectory data. PVLDB 2016, 10(3):85–96.
870
+ 12
871
+
872
+ Deng, D., Shahabi, C., Demiryurek, U., Zhu, L., Yu, R., and Liu, Y. (2016).
873
+ Latent space model for road networks to predict time-varying traffic. In ACM
874
+ SIGKDD 2016, pages 1525–1534.
875
+ Gal, A., Gunopulos, D., Panagiotou, N., Rivetti, N., Senderovich, A., and Zy-
876
+ gouras, N. (2018). Remi: A framework of reusable elements for mining het-
877
+ erogeneous data with missing information. Journal of Intelligent Information
878
+ Systems 2018, (2):367–388.
879
+ Gal, A., Mandelbaum, A., Schnitzler, F., Senderovich, A., and Weidlich, M.
880
+ (2017). Traveling time prediction in scheduled transportation with journey
881
+ segments. Inf. Syst. 2017, 64(C):266–280.
882
+ Hofleitner, A., Herring, R., Abbeel, P., and Bayen, A. (2012). Learning the
883
+ dynamics of arterial traffic from probe data using a dynamic bayesian network.
884
+ IEEE T-ITS 2012, 13(4):1679–1693.
885
+ Hu, J., Guo, C., Yang, B., and Jensen, C. S. (2019). Stochastic weight comple-
886
+ tion for road networks using graph convolutional networks. In IEEE ICDE
887
+ 2019, pages 1274–1285.
888
+ Id´e, T. and Sugiyama, M. (2011). Trajectory regression on road networks. In
889
+ AAAI 2011, pages 203–208.
890
+ Jenelius, E. and Koutsopoulos, H. N. (2013). Travel time estimation for ur-
891
+ ban road networks using low frequency probe vehicle data. Transportation
892
+ Research Part B: Methodological, 53:64–81.
893
+ Kwon, J., Varaiya, P., and Skabardonis, A. (2003). Estimation of truck traffic
894
+ volume from single loop detectors with lane-to-lane speed correlation. Journal
895
+ of the TRB 2003, (1856):106–117.
896
+ Li, L., Li, Y., and Li, Z. (2013). Efficient missing data imputing for traffic flow
897
+ by considering temporal and spatial dependence. Transportation research part
898
+ C: emerging technologies 2013, 34:108–120.
899
+ Li, Y., Fu, K., Wang, Z., Shahabi, C., Ye, J., and Liu, Y. (2018a). Multi-task
900
+ representation learning for travel time estimation. In ACM SIGKDD 2018,
901
+ pages 1695–1704.
902
+ Li, Y., Gunopulos, D., Lu, C., and Guibas, L. (2017). Urban travel time predic-
903
+ tion using a small number of gps floating cars. In ACM SIGSPATIAL 2017,
904
+ pages 3:1–3:10.
905
+ Li, Y., Yu, R., Shahabi, C., and Liu, Y. (2018b). Diffusion convolutional recur-
906
+ rent neural network: Data-driven traffic forecasting. In ICLR 2018.
907
+ Niu, X., Zhu, Y., and Zhang, X. (2014). Deepsense: A novel learning mechanism
908
+ for traffic prediction with taxi gps traces. In IEEE GLOBECOM 2014, pages
909
+ 2745–2750. IEEE.
910
+ 13
911
+
912
+ Qu, L., Zhang, Y., Hu, J., Jia, L., and Li, L. (2008). A bpca based missing
913
+ value imputing method for traffic flow volume data. In IEEE IV Symposium
914
+ 2008, pages 985–990.
915
+ Wang, D., Zhang, J., Cao, W., Li, J., and Zheng, Y. (2018a). When will you
916
+ arrive? estimating travel time based on deep neural networks. In AAAI 2018,
917
+ pages 2500–2507.
918
+ Wang, H., Kuo, Y.-H., Kifer, D., and Li, Z. (2016a). A simple baseline for
919
+ travel time estimation using large-scale trip data.
920
+ In ACM SIGSPATIAL
921
+ 2016, pages 19:1–19:22.
922
+ Wang, J., Gu, Q., Wu, J., Liu, G., and Xiong, Z. (2016b). Traffic speed pre-
923
+ diction and congestion source exploration: A deep learning method. In IEEE
924
+ ICDM 2016, pages 499–508. IEEE.
925
+ Wang, Y., Zheng, Y., and Xue, Y. (2014). Travel time estimation of a path
926
+ using sparse trajectories. In ACM SIGKDD 2014, pages 25–34.
927
+ Wang, Z., Fu, K., and Ye, J. (2018b). Learning to estimate the travel time. In
928
+ ACM SIGKDD 2018, pages 858–866.
929
+ Williams, C. K. and Rasmussen, C. E. (2006). Gaussian processes for machine
930
+ learning. the MIT Press, 2(3):4.
931
+ Yang, B., Dai, J., Guo, C., Jensen, C. S., and Hu, J. (2018). PACE: a path-
932
+ centric paradigm for stochastic path finding. VLDB J., 27(2):153–178.
933
+ Yang, B., Guo, C., and Jensen, C. S. (2013). Travel cost inference from sparse,
934
+ spatio-temporally correlated time series using markov models.
935
+ PVLDB,
936
+ 6(9):769–780.
937
+ Yang, B., Kaul, M., and Jensen, C. S. (2014). Using incomplete information for
938
+ complete weight annotation of road networks. IEEE TKDE 2014, 26(5):1267–
939
+ 1279.
940
+ Yu, B., Lam, W. H., and Tam, M. L. (2011). Bus arrival time prediction at
941
+ bus stop with multiple routes. Transportation Research Part C: Emerging
942
+ Technologies, 19(6):1157–1170.
943
+ Zhan, X., Hasan, S., Ukkusuri, S. V., and Kamga, C. (2013). Urban link travel
944
+ time estimation using large-scale taxi data with partial information. Trans-
945
+ portation Research Part C: Emerging Technologies, 33:37–49.
946
+ Zhan, X., Li, R., and Ukkusuri, S. V. (2015). Lane-based real-time queue length
947
+ estimation using license plate recognition data. Transportation Research Part
948
+ C: Emerging Technologies, 57:85–102.
949
+ Zhan, X., Ukkusuri, S. V., and Yang, C. (2016a). A bayesian mixture model
950
+ for short-term average link travel time estimation using large-scale limited
951
+ information trip-based data. Automation in Construction, 72:237–246.
952
+ 14
953
+
954
+ Zhan, X., Zheng, Y., Yi, X., and Ukkusuri, S. V. (2016b).
955
+ Citywide traffic
956
+ volume estimation using trajectory data. IEEE Transactions on Knowledge
957
+ and Data Engineering, 29(2):272–285.
958
+ Zhang, F., Zhu, X., Hu, T., Guo, W., Chen, C., and Liu, L. (2016). Urban
959
+ link travel time prediction based on a gradient boosting method considering
960
+ spatiotemporal correlations. ISPRS 2016, 5(11):201.
961
+ Zhang, H., Wu, H., Sun, W., and Zheng, B. (2018).
962
+ Deeptravel: a neural
963
+ network based travel time estimation model with auxiliary supervision. In
964
+ IJCAI 2018, pages 3655–3661.
965
+ Zheng, J. and Ni, L. M. (2013). Time-dependent trajectory regression on road
966
+ networks via multi-task learning. In AAAI 2013, pages 1048–1055.
967
+ 15
968
+
6dE4T4oBgHgl3EQf1w1z/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
6tAyT4oBgHgl3EQfpvgE/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1b982a9810fca63eef74f001102423c6fc83823b9779385ccbd6a5b77d0c1117
3
+ size 9633837
79E1T4oBgHgl3EQf7gUu/content/tmp_files/2301.03534v1.pdf.txt ADDED
@@ -0,0 +1,1467 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ THE ONE-VISIBILITY LOCALIZATION GAME
2
+ ANTHONY BONATO, TRENT G. MARBACH, MICHAEL MOLNAR, AND JD NIR
3
+ Abstract. We introduce a variant of the Localization game in which the cops only
4
+ have visibility one, along with the corresponding optimization parameter, the one-
5
+ visibility localization number ζ1.
6
+ By developing lower bounds using isoperimetric
7
+ inequalities, we give upper and lower bounds for ζ1 on k-ary trees with k ≥ 2 that
8
+ differ by a multiplicative constant, showing that the parameter is unbounded on k-
9
+ ary trees. We provide a O(√n) bound for Kh-minor free graphs of order n, and we
10
+ show Cartesian grids meet this bound by determining their one-visibility localization
11
+ number up to four values. We present upper bounds on ζ1 using pathwidth and the
12
+ domination number and give upper bounds on trees via their depth and order. We
13
+ conclude with open problems.
14
+ 1. Introduction
15
+ Pursuit-evasion games, such as the Localization game and the Cops and Robber
16
+ game, are combinatorial models for detecting or neutralizing an adversary’s activity on
17
+ a graph. In such models, pursuers attempt to capture an evader loose on the vertices
18
+ of a graph. How the players move and the rules of capture depend on which variant is
19
+ studied. Such games are motivated by foundational topics in computer science, discrete
20
+ mathematics, and artificial intelligence, such as robotics and network security.
21
+ For
22
+ surveys of pursuit-evasion games, see the books [7, 11]; see Chapter 5 of [11] for more
23
+ on the Localization game.
24
+ Among the many variants of the game of Cops and Robbers, one theme is to limit the
25
+ visibility of the robber. For a nonnegative integer k, in k-visibility Cops and Robbers,
26
+ the robber is visible to the cops only when a cop is distance at most k. The case when
27
+ k = 0 has been studied [17, 18, 23], as has the case when k = 1 [26, 27, 28], and a recent
28
+ paper covers the cases k ≥ 1 [16].
29
+ The Localization game was first introduced for one cop by Seager [15, 21]. The game
30
+ in the present form was first considered in the paper [15], and subsequently studied in
31
+ several papers such as [2, 8, 9, 10, 12, 13, 14]. We consider a novel analogue of one-
32
+ visibility Cops and Robbers in the setting of the Localization game. In the one-visibility
33
+ Localization game, there are two players playing on a graph, with one player controlling
34
+ a set of k cops, where k is a positive integer, and the second controlling a single robber.
35
+ The game is played over a sequence of discrete time-steps; a round of the game is a
36
+ move by the cops and the subsequent move by the robber. The robber occupies a vertex
37
+ of the graph, and when the robber is ready to move during a round, they may move to a
38
+ neighboring vertex or remain on their current vertex. A move for the cops is a placement
39
+ 2020 Mathematics Subject Classification. 05C57,05C12.
40
+ Key words and phrases. localization number, limited visibility, pursuit-evasion games, isoperimetric
41
+ inequalities, graphs.
42
+ 1
43
+ arXiv:2301.03534v1 [math.CO] 9 Jan 2023
44
+
45
+ 2
46
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
47
+ of cops on a set of vertices (note that the cops are not limited to moving to neighboring
48
+ vertices). The players move on alternate time-steps, with the robber going first. In each
49
+ round, the cops C1,C2,...,Ck occupy a set of vertices u1,u2,...,uk and each cop sends
50
+ out a cop probe di, where 1 ≤ i ≤ k. If a cop Ci is on the vertex of the robber, then di = 0.
51
+ If the cop Ci is adjacent to the robber, then di = 1. In all other cases, the cop probe
52
+ returns no information, and we set di = ∗. Hence, in each round, the cops determine a
53
+ distance vector D = (d1,d2,...,dk) of cop probes. Relative to the cops’ position, there
54
+ may be more than one vertex x with the same distance vector. We refer to such a vertex
55
+ x as a candidate of D or simply a candidate. The cops win if they have a strategy to
56
+ determine, after a finite number of rounds, a unique candidate, at which time we say
57
+ that the cops capture the robber. We assume the robber is omniscient, in the sense
58
+ that they know the entire strategy for the cops. If the robber evades capture, then the
59
+ robber wins. For a graph G, define the one-visibility localization number of G, written
60
+ ζ1(G), to be the least positive integer k for which k cops have a winning strategy in
61
+ the one-visibility Localization game. The standard Localization game is played in the
62
+ same way, except that each cops’ probe returns di as the distance between this cop and
63
+ the robber. The localization number is the minimum number of cops required for this
64
+ game and is denoted ζ(G).
65
+ For a graph G of order n, ζ(G) ≤ ζ1(G), as a winning cop strategy in one-visibility
66
+ localization will also be winning in the Localization game. Further, ζ1(G) ≤ n − 1. If
67
+ G has diameter at most 2, then a probe of ∗ by a one-visibility cop can only represent
68
+ a distance of 2, and so ζ(G) = ζ1(G). We may define ζj for all integers j ≥ 0 in an
69
+ analogous fashion, although we will only consider the case j = 1 in this paper. A recent
70
+ work [3] introduced the so-called zero-visibility search game, which is equivalent to ζj
71
+ in the case when j = 0.
72
+ We illustrate briefly how the parameters ζ(G) and ζ1(G) may differ. Spiders are
73
+ trees with exactly one vertex of degree at least 3. This vertex is referred to as the head,
74
+ and the paths from the head to the leaves, not including the head, are referred to as
75
+ arms. Let G be the spider consisting of head vertex r and three arms of length three.
76
+ It is straightforward to see that ζ(G) = 1; however, ζ1(G) = 2. To see that ζ1(G) > 1,
77
+ suppose one cop plays. The robber chooses one of the neighbors of r on an arm the cop
78
+ will not probe first and passes until the cop is about to probe on that arm. When the
79
+ cop moves to the robber’s arm, the robber moves to r. Anticipating the next cop probe,
80
+ they move to a neighbor of r on an arm that will not be probed in the next round and
81
+ the process repeats. To see that ζ1(G) ≤ 2, have one cop probe r in every round, and
82
+ the other cop scans each of the arms until the robber is captured.
83
+ The paper is organized as follows. We begin in Section 2 by considering a relaxation
84
+ of the one-visibility Localization game to the one-proximity game, where the robber
85
+ is captured if they occupy a neighbor of the cop. We consider bounds on ζ1 in terms
86
+ of the corresponding one-proximity number prox1(G). In Section 3, we give several
87
+ techniques for bounding ζ1(G) and prox1(G) for general graphs G. Upper bounds are
88
+ given using pathwidth and the domination number, and are found for certain minor-free
89
+ graphs. Lower bounds are derived by using isoperimetric inequalities and a new graph
90
+ parameter we call the h-index. In Section 4, we show that ζ1 and prox1 differ on trees
91
+ by at most 1. We derive upper bounds on trees via their depth and order and give lower
92
+ bounds on k-ary trees with k ≥ 2 using their isoperimetric peaks. One consequence of
93
+
94
+ THE ONE-VISIBILITY LOCALIZATION GAME
95
+ 3
96
+ these results is that the one-visibility number is unbounded on the family of k-ary trees;
97
+ this contrasts significantly from the Localization game, where trees have localization
98
+ number at most 2. We consider Cartesian grid graphs in Section 5 and derive bounds
99
+ there that differ by four values. We conclude with further directions and open problems.
100
+ All graphs we consider are finite, undirected, reflexive, and do not contain multiple
101
+ edges. We only consider connected graphs, unless otherwise stated. The set of vertices
102
+ that share an edge with x is denoted N(x), and we refer to vertices in N(x) as neighbors
103
+ of x. Although our graphs are reflexive, we insist that x ∉ N(x). We define N[x] =
104
+ N(x)∪{x}. For a set S of vertices, N[S] = ⋃u∈S N[u]. For a graph G, let ∆(G) b e the
105
+ maximum degree of a vertex in G. For further background on graph theory, see [25].
106
+ 2. The one-proximity game
107
+ Before we present results on the one-visibility Localization game, we give a simpler
108
+ version that will prove useful for bounding ζ1(G). In the one-proximity game, play is
109
+ defined as in the one-visibility Localization game, except that the cops win immediately
110
+ if any probe returns a distance other than ∗. We call the corresponding graph parameter
111
+ the one-proximity number, written as prox1(G). This game corresponds to the probes
112
+ returning perfect information about the neighborhood of a vertex, rather than merely
113
+ whether or not the robber is adjacent to the probed vertex. Note that prox1 is the
114
+ analogue of the one-visibility seeing cop-number c′
115
+ 1, where the robber is captured if they
116
+ are in the neighborhood of a cop; see [16].
117
+ Observe that prox1(G) ≤ ζ1(G), as the one-proximity game cops can use the same
118
+ strategy as the Localization game cops until the final round when, having located the
119
+ robber, the one-proximity game cop probes the robber’s last known location and must
120
+ be within distance one from the robber. As noted for k-visibility Cops and Robber in
121
+ [16], seeing the robber for the first time could be much more resource intensive than the
122
+ subsequent capture. The extra expense cannot be too large, however.
123
+ Theorem 1. For every graph G, we have
124
+ ζ1(G) ≤ ∆(G)prox1(G).
125
+ Proof. Suppose that when prox1(G) cops play the one-proximity game, and that if these
126
+ cops move on the vertices Vt in round t, then the cops win. We play with ∆(G)prox1(G)
127
+ cops in the one-visibility Localization game. In round t, for each u ∈ Vt, a cop is placed
128
+ on u and on ∆(G)−1 of the at most ∆(G) vertices in N(u), chosen arbitrarily. We know
129
+ that in some round t′, there is a v ∈ Vt′ such that the robber is in N[v]. (This was the
130
+ requirement for the cops to win independent of the robber strategy in the one-proximity
131
+ game.) Before round t′, every cop in the one-proximity game received a distance of ∗,
132
+ so the cops in the one-visibility Localization game are playing with no less information.
133
+ In round t′, we have either a cop on the same vertex as the robber, or the robber is on
134
+ the unique vertex in N(v) that does not contain a cop. In the latter case, the robber’s
135
+ exact location is now known, so they are captured.
136
+
137
+ Theorem 1 is tight on the complete graphs. We can say more if prox1(G) is large
138
+ compared to the maximum degree of G. We do not claim the bound on prox1 in the
139
+ hypothesis of the following theorem is optimal.
140
+
141
+ 4
142
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
143
+ Theorem 2. If G is a graph and prox1(G) ≥ ∆(G)2, then ζ1(G) = prox1(G).
144
+ Proof. The prox1(G)-many cops play the one-visibility Localization game, following a
145
+ winning strategy from the one-proximity game. At some point, since the strategy is
146
+ winning, at least one probe returns a distance of 1 on vertex v. On the robber’s move,
147
+ the robber moves to a vertex of distance 0, 1, or 2 from v.
148
+ During the cops’ next move, a cop is placed on each vertex of distance 1 or 2 from
149
+ v, which requires at most ∆(G)2 cops. Either a cop on some vertex u probes 0 and the
150
+ robber is found on u, or no cop probes 0 and the robber is found on v.
151
+
152
+ One benefit of considering the one-proximity game instead of the one-visibility Local-
153
+ ization game is the success or failure of the cops strategy is independent of the robber’s
154
+ strategy. Let G be a graph, and for t ≥ 1, let Vt denote the set of vertices probed by the
155
+ cops in round t. Define St = St(G,{V1,...,Vt}) to be the set of vertices on which the
156
+ robber may reside immediately after the cops’ tth move without having been captured.
157
+ Consider the following three properties:
158
+ (1) the robber can start on any vertex;
159
+ (2) if the robber was on some vertex v before the robber’s (t+1)th move, then they
160
+ can move to any vertex in N[v] on their (t + 1)th move; and
161
+ (3) the robber is captured on the cops’ (t + 1)th move if they are in a vertex of
162
+ ⋃v∈Vt+1 N[v].
163
+ The following theorem translates these properties to statements about St. For a set
164
+ of vertices S, let δ(S) be the set of vertices not in S that are adjacent to some vertex
165
+ in S. To avoid conflicting notation, we do not use δ to denote the minimum degree of
166
+ a graph.
167
+ Lemma 3. When playing the one-proximity game on a graph G where the cops play
168
+ on Vt in round t, the robber can be on a vertex u if and only if u ∈ St, where
169
+ (1) S1 = V (G); and
170
+ (2) St+1 = (St ∪ δ(St)) ∖ (⋃v∈Vt+1 N[v]).
171
+ Proof. The robber may start on any vertex, so S1 = V (G). Immediately before the
172
+ robber’s (t + 1)th move, the robber may be on a vertex v if and only if v ∈ St. The
173
+ robber uses their (t + 1)th move to occupy some vertex in N[v]. Thus, the robber can
174
+ be on vertex v if and only if v ∈ (St ∪ δ(St)) after the robber’s (t + 1)th move.
175
+ The robber will be captured on the cops’ (t+1)th move if and only if it is in a vertex
176
+ of ⋃v∈Vt+1 N[v].
177
+ Therefore, the robber remains uncaptured after the cop’s (t + 1)th
178
+ move if and only if it is on a vertex in (St ∪ δ(St)) ∖ (⋃v∈Vt+1 N[v]). This completes the
179
+ proof.
180
+
181
+ There are a variety of different terminologies for the sets St. These can be called the
182
+ robber territory, or the set of contaminated vertices. We use the term contaminated,
183
+ denoting these vertices as red in the figures. The vertices not in St are usually called
184
+ either clean or cleared. We use the term cleared and denote these vertices as white in
185
+ any figures. A set of vertices is contaminated (respectively, cleared) if all of its contained
186
+ vertices are contaminated (respectively, cleared). We say a cleared set S is fully cleared
187
+ when the robber can never return to recontaminate the vertices of S under the given
188
+ cop strategy.
189
+
190
+ THE ONE-VISIBILITY LOCALIZATION GAME
191
+ 5
192
+ Lemma 3 is the one-visibility Localization game equivalent of Proposition 10 of [3],
193
+ which is a result about the zero-visibility Localization game. As a result, we can treat
194
+ play in the one-proximity game as a single-player game where the cops clear vertices on
195
+ their move and the contamination spreads between the cops’ moves. This will often be
196
+ easier to analyze because the robber strategy is no longer necessary.
197
+ 3. Bounds on ζ1
198
+ In the present section, we focus on several bounds for ζ1, including upper bounds
199
+ using pathwidth, the domination number, and one using properties of certain minor-
200
+ free graphs. We finish by giving lower bounds using isoperimetric inequalities.
201
+ 3.1. Upper bounds. We begin with an upper bound using pathwidth. In [12], the lo-
202
+ calization number of a graph is bounded above by the graph’s pathwidth. An analogous
203
+ result holds for the one-localization number.
204
+ Given a graph G, a path-decomposition of G is a pair (X,P), where the set X =
205
+ {B1,B2,...,Bn} consists of subsets of V (G) called bags, and P is a path whose vertices
206
+ are the bags Bi, satisfying the following properties:
207
+ (1) V (G) = ⋃n
208
+ i=1 Bi;
209
+ (2) for every edge (u,v) ∈ E(G), there exists a bag that contains both u and v; and
210
+ (3) for all 1 ≤ i ≤ k ≤ j ≤ n, Bi ∩ Bj ⊆ Bk.
211
+ The width of the path-decomposition is the cardinality of its largest bag minus 1, and
212
+ the pathwidth of the graph G, denoted pw(G), is the minimum width among all possible
213
+ path-decompositions of G. While the proof of the following theorem is analogous to the
214
+ proof bounding the localization number by pathwidth given in [12], we include it for
215
+ completeness.
216
+ Theorem 4. For any graph G, ζ1(G) ≤ pw(G).
217
+ Proof. Assume G has at least two vertices and let P be a path-decomposition of G.
218
+ Without loss of generality, linearly order the bags B1,B2,...,Bk from left to right. For
219
+ all 1 ≤ i ≤ k we assume Bi ∖Bi+1 is nonempty; otherwise, Bi can be eliminated from the
220
+ path-decomposition. Furthermore, for every u ∈ Bi ∖ Bi+1, we assume u has a neighbor
221
+ in Bi. If this were not the case, then we remove u from bag Bi without changing the
222
+ path-decomposition.
223
+ For each 1 ≤ i < k, let ui be a fixed vertex in Bi ∖Bi+1 and let vi be a neighbor of ui in
224
+ Bi. Also let uk be a vertex in Bk ∖Bk−1 and vk be a neighbor of uk in Bk. Sequentially,
225
+ for i = 1,2,...,k, the cops probe each vertex of Bi ∖ vi.
226
+ Starting with B1, which is a leaf of P, cops probe B1 ∖ v1. Suppose the robber is in
227
+ B1. If they are in B1 ∖v1, then they are captured since a cop will probe 0. If the robber
228
+ is on v1, the cop at u1 probes 1. Since u1 must have a neighbor in B1 and no cop has
229
+ probed 0, the robber is captured at v1. In this way, we can ensure the robber is not in
230
+ B1. We then proceed inductively, probing the vertices in Bj ∖ vj, for j > 1, to ensure
231
+ the robber is not in Bi, with i ≤ j. The robber is forced to move into Bk where they
232
+ will be captured.
233
+
234
+ The bound in Theorem 4 is tight for complete graphs Kn, as pw(Kn) = ζ1(Kn) = n−1.
235
+ We note that proof of Theorem 4 also holds for the zero-visibility Localization game,
236
+
237
+ 6
238
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
239
+ except that we must place a cop on all vertices of a bag as we sequentially probe the
240
+ bags. Therefore, we also have the following.
241
+ Lemma 5. For any graph G, ζ0(G) ≤ pw(G) + 1.
242
+ For graphs which are C4-free (that is, do not contain the 4-cycle as a subgraph),
243
+ we have the following bound for the one-visibility localization number in terms of two
244
+ common graph parameters, including the domination number, written γ(G).
245
+ Theorem 6. If G is C4-free, then ζ1(G) ≤ γ(G) + ∆(G).
246
+ Proof. Let S = {v1,v2,...,vγ(G)} be a dominating set of G and have γ(G)-many cops
247
+ probe each vertex of S in each round. On the first probe, either some cop probes 0 and
248
+ the robber is captured, or the robber is on some vertex u ∈ V (G) ∖ S, and there is at
249
+ least one cop who probes 1. Say this is the cop at v1.
250
+ In the next round, we will use the additional ∆(G)-many cops to probe each neighbor
251
+ of v1, and so the robber must move to avoid capture. The robber moves to w ∈ V (G)∖S,
252
+ where w is not a neighbor of v1. On the next round of probes, since S is a dominating
253
+ set, there will be some other cop, say the one at v2, who probes 1, while the cop at
254
+ u also probes 1. If v2 were adjacent to a second neighbor of u, then G would contain
255
+ a 4-cycle. Therefore, the cops can uniquely determine the robber’s location to be at
256
+ w.
257
+
258
+ Our next result provides an upper bound on ζ1 for a large family of graphs. A graph
259
+ H formed from G by first taking a subgraph and then contracting some of the remaining
260
+ edges is said to be a minor of G. The family of Kh-minor free graphs includes planar
261
+ graphs in the case h = 5. The following separator theorem for Kh-minor-free graphs will
262
+ be useful for bounding the one-localization number.
263
+ Theorem 7 ([1]). If h ≥ 1 is a fixed integer and G is a Kh-minor-free graph of order
264
+ n, then there are sets of vertices A, B, and C so that no vertex in A is adjacent with a
265
+ vertex in B, neither A nor B contains more than 2/3n vertices, and C contains no more
266
+ than h3/2√n vertices.
267
+ We refer to the set C in Theorem 7 as a separator, and the sets A and B of order at
268
+ most 2/3n as parts. The following theorem gives an upper bound on the ζ1 number for
269
+ several classes of graphs, including planar graphs. The proof uses a divide-and-conquer
270
+ approach. Later in the paper, we will give bounds Ω(√n) in square grids. We do not
271
+ attempt to optimize constants in the upper bound.
272
+ Theorem 8. If h > 3 and n are integers, and G is a Kh-minor free graph of order n,
273
+ then ζ1(G) = O(√n). In particular, if G is planar of order n, then ζ1(G) = O(√n).
274
+ Proof. Define the function f(m) = h3/2√m(
275
+ 1
276
+ 1−
277
+
278
+ 2/3) + √n. We write P(m) to be the
279
+ statement that for each Kh-minor-free graph G of order m, there exists a strategy using
280
+ at most f(m) cops to capture the robber on G. We apply induction, assuming that
281
+ P(m) is true for 1 ≤ m ≤ n−1, and show that P(n) holds. Once that is established, the
282
+ proof of the theorem follows.
283
+ The base cases are when 1 ≤ m ≤ √n. In any such graph, we can place a cop on every
284
+ vertex to capture the robber in one round. This uses at most √n ≤ f(m) cops, and so
285
+ P(m) is true in these cases.
286
+
287
+ THE ONE-VISIBILITY LOCALIZATION GAME
288
+ 7
289
+ For the inductive step, for a graph G of order n, we apply Theorem 7 to give a
290
+ separator C of G with ∣C∣ ≤ h3/2√n, with parts A and B of cardinalities at most 2n/3.
291
+ We note that A and B are not necessarily connected; however, they are both Kh-minor-
292
+ free graphs.
293
+ The cops employ a strategy in two phases. During both phases (and hence, in all
294
+ rounds), at most h3/2√n cops are played on C so that each vertex in C contains a cop;
295
+ we label this set of cops by X. As such, the robber cannot move between A and B
296
+ without being captured on a cop move.
297
+ We know by the inductive hypothesis that a strategy exists to capture the robber on
298
+ A using at most f(∣A∣) cops. Therefore in the first phase, we play this strategy on A
299
+ using the cops while also playing the cops in X on C. After this, the robber will be
300
+ captured if it was ever on a vertex in A or C, and so we may assume that the robber is
301
+ now in B after the cops’ last move.
302
+ There similarly exists a strategy to capture the robber on B using at most f(∣B∣)
303
+ cops, and in the second phase, we play this strategy on B while also playing the cops in
304
+ X on C. After this process, the robber will be captured either on a vertex of B or C.
305
+ Assuming without loss of generality that ∣A∣ ≥ ∣B∣, we used at most
306
+ max(h3/2√n + f(∣A∣),h3/2√n + f(∣B∣))
307
+
308
+ h3/2√n + f(∣A∣)
309
+
310
+ h3/2√n + h3/2√
311
+ 2n/3⎛
312
+
313
+ 1
314
+ 1 −
315
+
316
+ 2/3
317
+
318
+ ⎠ + √n
319
+ =
320
+ h3/2√n⎛
321
+
322
+ 1
323
+ 1 −
324
+
325
+ 2/3
326
+
327
+ ⎠ + √n
328
+ cops to capture the robber on G. In the first inequality, we used the fact that ∣f(B)∣ ≤
329
+ ∣f(A)∣, while the second follows by inductive hypothesis. Hence, P(n) holds, and the
330
+ proof follows.
331
+
332
+ Interestingly, we show that the bound in Theorem 8 is tight in the sense that there
333
+ exist planar graphs G (in particular, Cartesian grid graphs) with ζ1(G) =
334
+
335
+ ∣V (G)∣ +
336
+ O(1).
337
+ 3.2. Lower bounds from isoperimetric inequalities. The isoperimetric problem
338
+ of a graph G asks for the minimum cardinality of the boundary of a set of vertices,
339
+ given the set of vertices has cardinality k. For a subset of vertices S, this border can
340
+ be either the vertex border δ(S) = N[S] ∖ S, or the edge border
341
+ ∂(S) = ∣E(S,S)∣ = ∣{(u,v) ∈ E(G) ∶ u ∈ S,v ∉ S}∣,
342
+ which is the set of edges that have exactly one endpoint in S.
343
+ We consider the following two standard isoperimetric parameters for graphs:
344
+ ΦE(G,k) =
345
+ min
346
+ S⊆V ∶∣S∣=k ∣∂(S)∣,
347
+ ΦV (G,k) =
348
+ min
349
+ S⊆V ∶∣S∣=k ∣δ(S)∣.
350
+ The isoperimetric problem for either of these two parameters asks for an exact eval-
351
+ uation of ΦE(G,k) or ΦV (G,k), while an isoperimetric inequality is a bound on these
352
+
353
+ 8
354
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
355
+ values. The edge isoperimetric problem is also studied along with the problem of max-
356
+ imizing the number of edges between vertices of a k-set of vertices, maxS∶∣S∣=k ∣E(S,S)∣.
357
+ For a survey on edge isoperimetric inequalities, see [4].
358
+ The two isoperimetric problems are closely related. We have that ΦV (G,k) ≤ ΦE(G,k).
359
+ Since each vertex in δ(S) is incident to at most ∆(G) vertices in S, it follows that
360
+ ΦE(G,k) ≤ ∆(G)ΦV (G,k). Therefore, these parameters differ at most by a factor of
361
+ ∆(G):
362
+ ΦE(G,k)
363
+ ∆(G)
364
+ ≤ ΦV (G,k) ≤ ΦE(G,k).
365
+ The isoperimetric peak is the maximum over the isoperimetric numbers on the graph:
366
+ ΦE(G) = max
367
+ k
368
+ ΦE(G,k),
369
+ ΦV (G) = max
370
+ k
371
+ ΦV (G,k).
372
+ The vertex isoperimetric peak has been explicitly studied for trees [5, 20, 24], although
373
+ further results for the isoperimetric peak problem appear implicitly within many works.
374
+ We introduce a modification to this concept inspired by the h-index metric of citation
375
+ metrics. For some function f ∶ Z → Z, define the h-index function on f, H(f), as follows:
376
+ H(f) = max{h ∈ Z ∶ for some k1, we have f(k) ≥ h for k1 ≤ k ≤ k1 + h − 1}.
377
+ In particular, there are H(f) consecutive integers k1 ≤ k ≤ k1 + h − 1 with f(k) ≥ H(f).
378
+ The vertex-h-index of a graph is
379
+ HV (G) = H(ΦV (G,k)),
380
+ and similarly, the edge-h-index of a graph is
381
+ HE(G) = H(ΦE(G,k)).
382
+ See Figure 1 for an illustration of HV (G).
383
+ The following lemma establishes inequalities for the HV and HE parameters.
384
+ Lemma 9. For a graph G, we have that
385
+ HE(G)
386
+ ∆(G) ≤ HV (G) ≤ HE(G).
387
+ Proof. Let h = HV (G). By the definition of HV (G), there exists an integer ka such that
388
+ each k ∈ [ka,...,ka + h − 1] satisfies ΦV (G,k) ≥ h. However, since ΦE(G,k) ≥ ΦV (G,k),
389
+ this gives that ΦE(G,k) ≥ h for k ∈ [ka,...,ka + h − 1]. Therefore, HE(G) ≥ h = HV (G)
390
+ by the definition of HE.
391
+ Let h = HE(G). By the definition of HE(G), there exists an integer ka such that each
392
+ k ∈ [ka,...,ka + h − 1] has ΦE(G,k) ≥ h. However, since ΦV (G,k) ≥ ΦE(G,k)/∆(G),
393
+ this gives that ΦV (G,k) ≥ h/∆(G) for k ∈ [ka,...,ka+⌈h/∆(G)⌉−1] ⊆ [ka,...,ka+h−1].
394
+ Therefore, HV (G) ≥ h/∆(G) = HE(G)/∆(G) by the definition of HV .
395
+
396
+ The following theorem gives a lower bound on prox1(G) in terms of HV (G), and
397
+ hence, gives a lower bound for ζ1(G).
398
+ Theorem 10. If G is a graph, then
399
+ prox1(G) > HV (G)
400
+ ∆(G) + 1.
401
+
402
+ THE ONE-VISIBILITY LOCALIZATION GAME
403
+ 9
404
+ k
405
+ ΦV (G,k)
406
+ ka
407
+ kb = ka + HV (G) − 1
408
+ HV (G)
409
+ k1
410
+ k2
411
+ k3
412
+ cleared
413
+ re-contaminated
414
+ Figure 1. A graph of Φ(G,k) that illustrates HV (G), where a contigu-
415
+ ous set of HV (G) integers each have Φ(G,k) ≥ HV (G). For Theorem 10,
416
+ if the cops manage to reduce the number of contaminated vertices k be-
417
+ low kb + 1 (in our example, moving from k = k1 to k = k2 that is in
418
+ the gray region), then the contamination is guaranteed to grow to some
419
+ cardinality at least kb + 1 (that is, moving from k = k2 to k = k3 in our
420
+ example, which is to the right of the gray region).
421
+ Proof. We may assume HV (G) ≥ (∆(G)+1), or else the proof is immediate. See Figure
422
+ 1 as an aid to this proof. As a high-level overview of the proof, p cops can clear at most
423
+ p(∆(G) + 1) vertices per round (that is, a cop on u clears the at most ∆ + 1 vertices in
424
+ N[u]) and the contamination spreads at a rate of at least ΦV (G,k), with k being the
425
+ number of currently contaminated vertices. If ΦV (G,k) is larger than p(∆(G) + 1) for
426
+ enough contiguous values k, then there will always be some point in the game where
427
+ the contamination will grow faster than the cops can clear the contamination.
428
+ Consider a game in which the cop player controls p = ⌊ HV (G)
429
+ ∆(G)+1⌋ cops. By the definition
430
+ of HV (G), there must exist ka and kb = ka + HV (G) − 1 such that for any value k ∈
431
+ {ka,ka + 1,...,kb} we have ΦV (G,k) ≥ HV (G). Note that ka > 1, since
432
+ ΦV (G,1) = min
433
+ v∈V (G)deg(v) < ∆(G) + 1 ≤ HV (G),
434
+ so the inequality ΦV (G,1) ≥ HV (G) does not hold.
435
+ Suppose there are at least kb+1 contaminated vertices just before the cops move. If a
436
+ cop plays on vertex v, then the vertices on N[v] that were contaminated are no longer
437
+ contaminated. As a consequence, after this cop round at most p(∆(G) + 1) ≤ HV (G)
438
+ vertices have been cleared, which implies that at least
439
+ kb + 1 − HV (G) = (ka + HV (G) − 1) + 1 − HV (G) = ka
440
+ vertices remain contaminated.
441
+ That is, in a round where the cops reduce the con-
442
+ taminated vertices below kb + 1, there will always be at least ka contaminated vertices
443
+ remaining. For the cops to win by eliminating all contaminated vertices, there must
444
+ be some round where between ka and kb vertices are contaminated. Suppose we are in
445
+ such a round after the cops move.
446
+
447
+ 10
448
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
449
+ Now ΦV (G,k) ≥ HV (G) for each k with ka ≤ k ≤ kb, so on the contamination round
450
+ at least HV (G) clear vertices become re-contaminated, and so at least ka + HV (G) =
451
+ kb + 1 vertices are now contaminated. That is, if the cops ever reduce the number of
452
+ contaminated vertices to be kb or fewer, then there will be kb + 1 or more contaminated
453
+ vertices after the subsequent contamination round. Therefore, we conclude that the
454
+ cops can never reduce the number of contaminated vertices below ka.
455
+
456
+ An analogous bound for HE can be found using Lemma 9 on Theorem 10 is the
457
+ following.
458
+ Corollary 11. For a graph G,
459
+ prox1(G) >
460
+ HE(G)
461
+ (∆(G) + 1)∆(G).
462
+ Since ζ1(G) ≥ prox1(G), both Theorem 10 and Corollary 11 allow results in isoperi-
463
+ metric bounds to be applied to yield lower bounds on the k-visibility Location number.
464
+ The primary challenge remaining is that even when the isoperimetric parameters are
465
+ known exactly, computing HV (G) and HE(G) is often a complex task. As an example,
466
+ the vertex isometric peak of a binary tree of radius d is known to be asymptotically
467
+ equal to d/2 [19]; it is also known that the number of vertices in the vertex border
468
+ is small for many sporadic values of k. However, we can find a lower bound of HV
469
+ and HE using the corresponding isoperimetric peak, showing that an h-index and its
470
+ corresponding isoperimetric parameter differ by a small multiplicative constant without
471
+ complicated direct analysis.
472
+ Theorem 12. For a graph G,
473
+ ΦV (G)
474
+ 2
475
+ (1 +
476
+ 1
477
+ 2∆(G) + 1) ≤ HV (G) ≤ ΦV (G).
478
+ Proof. The upper bound is clear by the definition of HV and ΦV . For the lower bound,
479
+ we will show that two consecutive values cannot have their ΦV (G,k) values differ too
480
+ much.
481
+ Consider a set S of cardinality k + 1. If we remove any vertex u from S, then the
482
+ only vertex that can be in δ(S ∖ {u}) that is not in δ(S) is the vertex u, and so
483
+ ∣δ(S)∣ ≥ ∣δ(S ∖ {u})∣ − 1. As a consequence, if ∣δ(S)∣ = ΦV (G,k + 1) and u ∈ S, then we
484
+ have that
485
+ ΦV (G,k + 1) = ∣δ(S)∣ ≥ ∣δ(S ∖ {u})∣ − 1 ≥
486
+ min
487
+ S′∶∣S′∣=k ∣δ(S′)∣ − 1 = ΦV (G,k) − 1.
488
+ (1)
489
+ Now consider a set S of cardinality k − 1. If we add a vertex v to S, then any vertex
490
+ in δ(S ∪{v}) that is not in δ(S) must be a neighbor of v. As a consequence, δ(S ∪{v})
491
+ contains at most ∆(G) more vertices than δ(S), and so similar to the previous case,
492
+ ΦV (G,k − 1) ≥ ΦV (G,k) − ∆(G).
493
+ (2)
494
+ Let kp be a value such that ΦV (G,kp) = ΦV (G). By recursively applying inequality
495
+ (1), we find htat
496
+ ΦV (G,kp + i) ≥ ΦV (G,kp) − i ≥ ΦV (G) − ΦV (G)∆(G)/(2∆(G) + 1)
497
+
498
+ THE ONE-VISIBILITY LOCALIZATION GAME
499
+ 11
500
+ for each i ∈ {0,...,ΦV (G)∆(G)/(2∆(G) + 1)}. Similarly, by recursively applying in-
501
+ equality (2),
502
+ ΦV (G,kp − i) ≥ ΦV (G,kp) − i∆(G) ≥ ΦV (G) − ΦV (G)∆(G)/(2∆(G) + 1)
503
+ for each i ∈ {1,...,ΦV (G)/(2∆(G) + 1)}. Therefore, there are at least
504
+ ΦV (G)∆(G)
505
+ 2∆(G) + 1
506
+ + 1 +
507
+ ΦV (G)
508
+ 2∆(G) + 1 = ΦV (G) ∆(G) + 1
509
+ 2∆(G) + 1 + 1
510
+ contiguous values of k such that
511
+ ΦV (G,k) ≥ ΦV (G) − ΦV (G)∆(G)
512
+ 2∆(G) + 1
513
+ = ΦV (G) ∆(G) + 1
514
+ 2∆(G) + 1.
515
+ By the definition of HV , this yields that
516
+ HV (G) ≥ ΦV (G) ∆(G) + 1
517
+ 2∆(G) + 1 = ΦV (G)
518
+ 2
519
+ (1 +
520
+ 1
521
+ 2∆(G) + 1),
522
+ as required.
523
+
524
+ We note that as ΦV (G) ≥ HV (G), the vertex-h-index and the vertex isoperimetric
525
+ peak differ by a multiplicative factor of at most a little over 2. There is an analogous
526
+ result for the edge-h-index, as follows.
527
+ Theorem 13. For a graph G,
528
+ HE(G) ≥
529
+ 2
530
+ ∆(G) + 2ΦE(G).
531
+ Proof. Follows similarly to the proof of Theorem 12, except using
532
+ ΦE(G,k + 1) ≥ ΦE(G,k) − ∆(G)
533
+ in place of the inequality (1).
534
+
535
+ We have the following corollary as a consequence of Theorems 10 and 12.
536
+ Corollary 14. For a graph G, we have that
537
+ prox1(G) = Ω(ΦV (G)
538
+ ∆(G) ),
539
+ and as ΦV (G) ≥ ΦE(G)/∆(G),
540
+ prox1(G) = Ω(ΦE(G)
541
+ ∆(G)2 ).
542
+ 4. Trees
543
+ As was proved first in [21] and later in [13], the localization number of trees is at
544
+ most two. For the one-visibility Localization game, the situation is quite different. We
545
+ explore bounds on ζ1 for trees and give upper and lower bounds on ζ1 for k-ary trees
546
+ with k ≥ 2 that differ by a multiplicative constant; this family is shown as a result to
547
+ have ζ1 unbounded.
548
+ We begin by showing that ζ1 is monotone on subtrees of a tree.
549
+ Lemma 15. If T is a tree and S is a subtree of T, then ζ1(S) ≤ ζ1(T).
550
+
551
+ 12
552
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
553
+ Proof. For each v ∈ T, let des(v) ∈ S be the unique vertex in S at the shortest distance
554
+ (in T) from v. Using ζ1(T) cops, if a successful strategy on T calls for a cop to probe
555
+ v ∈ T, they instead probe des(v). Since the robber cannot be in T ∖ S, the distance
556
+ in T between the robber and des(v) is at most the distance between the robber and v.
557
+ Thus, this strategy gives no less information than it would in T. As the cops win in T,
558
+ they will win in S.
559
+
560
+ Our next result shows that the one-visibility localization number and one-proximity
561
+ number differ by at most one for trees.
562
+ Lemma 16. For any tree T,
563
+ prox1(T) ≤ ζ1(T) ≤ prox1(T) + 1.
564
+ Furthermore, if prox1(T) ≥ ∆(T), then ζ1(T) = prox1(T).
565
+ Proof. Let m = prox1(T). Root T arbitrarily and let r be the root vertex. The cops
566
+ of the one-visibility Localization game use m cops to follow a winning strategy in the
567
+ one-proximity game and place one additional cop at r on each round. If the robber
568
+ ever tries to cross from one subtree of T − r to another, then they must pass through
569
+ r, at which point the cop on r would probe a distance of 0, and the robber would be
570
+ captured. Therefore, the robber may only move in one subtree.
571
+ As the cops’ strategy succeeds in the one-proximity game, they eventually probe a
572
+ vertex and receive a distance of at most one. If the probe returns distance zero, the
573
+ robber has been located, so assume it returns one. This uniquely determines on which
574
+ subtree the robber is located. If the cop on r also returned a probe of distance 1 to
575
+ the robber, then the robber would be captured as r has exactly one neighbor on each
576
+ subtree. Therefore, we may assume the robber has distance at least 2 from r. The cop
577
+ dedicated to probing r can now probe the root of the robber’s subtree while the other
578
+ m cops start the winning strategy from the beginning. After repeating this process at
579
+ most d times, where d is the depth of T, the subtree onto which the robber is forced
580
+ will be a leaf. The cops can then win by probing each leaf until locating the robber.
581
+
582
+ Let T be a tree. Note that given any v ∈ T, T −v is a forest. Call v a midway vertex of
583
+ T if each component T1,T2,...,Tk of T − v satisfies ∣V (Ti)∣ ≤ n/2. The following result
584
+ is folklore.
585
+ Lemma 17. Every tree has at least one midway vertex.
586
+ Proof. Given u ∈ V (T), let T1,T2,...,Tk be the components of T − u and define
587
+ s(u) = max
588
+ 1≤i≤k ∣V (Ti)∣.
589
+ Assume for the sake of contradiction that minu∈V (T) s(u) > n/2. Let v be a vertex with
590
+ s(v) minimal and let T1,T2,...,Tk be the components of T −v, where we have s(v) > n/2
591
+ by our initial assumption. Note that at most one component satisfies ∣V (Ti)∣ > n/2 as
592
+ ∑∣V (Ti)∣ = n − 1; without loss of generality, let this component be T1.
593
+ Let w ∈ T1 be the neighbor of v in T. We then have that T − w is a collection of
594
+ components, say S1,S2,...,Sr. The largest of these components, say S1, cannot be a
595
+ subtree of T1 as any such subset does not contain w and therefore has fewer than ∣V (T1)∣
596
+ vertices, contradicting that s(v) was minimal. However, any Si intersecting T1 must,
597
+
598
+ THE ONE-VISIBILITY LOCALIZATION GAME
599
+ 13
600
+ in fact, be a subtree of T1 as the only path from elements in T1 to elements in T − T1
601
+ contains w.
602
+ Thus, the largest component S1 must be the subtree formed by combining the subtrees
603
+ T2,...,Tk and v, and so we have that ∣V (S1)∣ ≤ n − ∣V (T1)∣. As ∣V (T1)∣ > n/2, we have
604
+ that
605
+ ∣V (S1)∣ ≤ n − ∣V (T1)∣ < n − n/2 = n/2,
606
+ which contradicts that s(w) ≥ s(v).
607
+
608
+ We now derive the following bound in terms of the order of the tree.
609
+ Theorem 18. If T is a tree of order n ≥ 2, then ζ1(T) ≤ ⌈log2 n⌉.
610
+ Proof. The proof is by induction on n. The base case with n = 2 is straightforward: the
611
+ only tree on two vertices is an edge, for which log2 2 = 1 probe suffices.
612
+ Now assume T is a tree on n vertices. Let x be a midway vertex of T and probe x
613
+ every round. This prevents the robber from moving from one component of T − x to
614
+ another. Each component of T −x contains at most n/2 vertices and thus, by induction,
615
+ requires at most log2(n/2) = log2 n − 1 probes to search. As the robber is restricted
616
+ to a single component of T − x, the cops can use these log2 n − 1 probes to clear each
617
+ component of T −x before moving on to the next. The winning cop strategy we outlined
618
+ uses at most 1 + log2 n − 1 = log2 n probes, and the proof follows.
619
+
620
+ The depth of a vertex in a rooted tree is the number of edges in a shortest path from
621
+ the vertex to the tree’s root. The depth of a rooted tree T is the greatest depth in T.
622
+ The depth of a tree is the smallest depth of a rooted tree over all ways of rooting T. We
623
+ next turn to two bounds in terms of the depth of a tree.
624
+ Theorem 19. For a tree T of depth d, we have that
625
+ ζ1(T) ≤ ⌊d
626
+ 4⌋ + 2.
627
+ Proof. We provide a strategy using m = ⌊d
628
+ 4⌋ + 1 cops to win the one-proximity game on
629
+ T. The result then follows from Lemma 16. The idea of the proof is to clear paths
630
+ sequentially, based on an ordering of the leaves. We clear all the paths to leaves from
631
+ lower to higher index, using two cop moves to clear a given path. We ensure that the
632
+ robber cannot reinfect previously infected paths to leaves with a lower index in each
633
+ round.
634
+ Let u0 be the root vertex of T, and let ℓ1,...,ℓp denote an ordering of the leaves of
635
+ T, where the ordering is obtained by performing a depth-first search on T. Let i be the
636
+ smallest index such that ℓi has not yet been chosen. Let Pi = u0u1,...,uq = ℓi denote
637
+ the path from the root to ℓi. Define vi as the vertex in Pi that is not in Pi+1 but is as
638
+ close to the root u0 as possible.
639
+ By induction, we assume that an even number of rounds have occurred, and it is
640
+ immediately before the cops’ move on a round of odd parity. Further, we assume that
641
+ each subtree in the forest T − Pi either has:
642
+ (1) all vertices cleared; or
643
+ (2) all vertices infected, except perhaps the unique vertex with a neighbor in Pi
644
+ (within the graph T).
645
+
646
+ 14
647
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
648
+ We call these subtrees cleared and infected, respectively. The base step for induction is
649
+ follows as, on the first round, T − P1 is composed of infected trees. We note that under
650
+ these assumptions and since the ℓi were defined using a depth-first search, directly before
651
+ the cops take their move, the only infected descendants of vi are in Pi.
652
+ Recall that q ≤ d is the length of the path Pi. The cop player places a cop on the
653
+ vertex u4j for each 0 ≤ j ≤ ⌊q/4⌋ using at most ⌊q/4⌋ + 1 ≤ m cops. If the robber was
654
+ on Pi and was not captured in this move, then they must have been on u4j+2 for some
655
+ 0 ≤ j ≤ ⌊(q − 2)/4⌋ or else on uq = ℓi if q ≡ 3 (mod 4). Therefore, after the robber moves,
656
+ they are on either an infected subtree of T −Pi or on N[u4j+2] for some 0 ≤ j ≤ ⌊(q−2)/4⌋.
657
+ On the next cop move, a cop is placed on vertex u4j+2 for each 0 ≤ j ≤ ⌊(q−2)/4⌋ using at
658
+ most ⌊(q−2)/4⌋+1 ≤ m cops. The robber may now only be on an infected subtree and is
659
+ not on Pi nor on a cleared tree. As we noted before these two rounds, the descendants of
660
+ vi were infected only if they were in Pi. Consequently, each descendant of vi (including
661
+ vi itself) is cleared after these two moves. The robber then takes their move, and after
662
+ this move may be on an infected tree or on a vertex in V (Pi) ∩ V (Pi+1).
663
+ We observe that the descendants of vi (including vi itself) form a cleared tree of
664
+ T −Pi+1, which we label as S. In addition, a cleared tree in T −Pi is either a cleared tree
665
+ in T −Pi+1 or is a subtree of S. Similarly, we can show that each subtree of T −Pi+1 that
666
+ is not one of these cleared trees is an infected tree. Therefore, we have that an even
667
+ number of rounds has occurred, it is now the cops’ move on an odd-parity round, and
668
+ each subtree of T − Pi+1 is either cleared or infected, completing the inductive step.
669
+
670
+ We provide a third and final upper bound for ζ1 on trees. An example will follow,
671
+ illustrating three graphs such that each bound is best on exactly one graph.
672
+ Let T be a tree, rooted at vertex v, of depth d.
673
+ Let Lv = {L1,L2,...,Ld} be a
674
+ level decomposition of T rooted at v, where Li = {u ∈ V (T) ∶ d(u,v) = i}. Define the
675
+ nonnegative integer Li = ∣{w ∈ Li ∶ deg(w) ≥ 2}∣, which counts the number of non-leaf
676
+ vertices within each level. We have the following upper bound on prox1(T).
677
+ Theorem 20. If Lv is the level decomposition of T rooted at v, then
678
+ prox1(T) ≤ ⌈maxi{Li}
679
+ 3
680
+ ⌉ + 1.
681
+ Proof. Let k = ⌈maxi{Li}
682
+ 3
683
+ ⌉. We give a strategy for k + 1 one-proximity cops to clear T
684
+ starting from level Lm−1 and working up to the root v. Divide the non-leaf vertices of
685
+ Lm−1 into disjoint groups of three vertices, assigning one cop to each set, and consider
686
+ the first such group consisting of vertices x, y, and z. For x, let x1 denote the parent of
687
+ x, x2 denote the parent of x1, and define y1,y2,z1 and z2 analogously. We refer to the
688
+ cop initially assigned to these three vertices as C1. At the start of the game, the robber
689
+ may be anywhere on T, so all vertices start contaminated.
690
+ In the first three rounds, C1 will probe x, then y, then z. After these probes, imme-
691
+ diately before the robber’s move, the robber may be at x (had they begun on x2, they
692
+ could move to x1 prior to the cop probing y, and then to x prior to the cop probing z).
693
+ The robber could also be at y1 or z2. We note that the robber cannot currently be on
694
+ a leaf adjacent to x, y, or z without being previously detected by one of the first three
695
+ probes. See Figure 2.
696
+
697
+ THE ONE-VISIBILITY LOCALIZATION GAME
698
+ 15
699
+ x
700
+
701
+ x1
702
+ x2
703
+ y
704
+
705
+ y1
706
+ y2
707
+ z
708
+
709
+ z1
710
+ z2
711
+ Lm
712
+ Lm−1
713
+ Lm−2
714
+ Lm−3
715
+ Figure 2. Possible robber locations are shown in red after C1’s third
716
+ probe.
717
+ The robber now takes their move. To keep the leaves adjacent to x clear, C1 will next
718
+ probe x. They could then probe y, and then z, repeating the previous three probes.
719
+ This would protect the leaves adjacent to x, y, and z, but would not allow the cop player
720
+ to make progress. We now introduce our additional cop, C∗, who will help C1 shift from
721
+ guarding x,y and z to guarding x1,y1, and z1. To do this, C∗ probes x instead of C1.
722
+ Had the robber moved to x they will be detected by this next probe regardless of where
723
+ they now move. This allows C1’s next three probes to be x1, then y, then z, while C∗
724
+ continues to probe x. Following these three rounds of cop probes, x is fully cleared.
725
+ In the next three rounds we will have C∗ probe y, while C1 probes x1, then y1, then
726
+ z. Next, C∗ probes z while C1 probes x1, then y1, then z1. On the robber’s move
727
+ following this sequence of probes, they may now be at x1, y2, or z3. Next, C∗ will move
728
+ to the second trio of non-leaf vertices in Lm−1 and will perform this same strategy with
729
+ the cop there, C2. At the same time, C1 will repeatedly probe x1, then y1, then z1,
730
+ ensuring that the robber can only reach Lm−1 in this part of the graph, and will be
731
+ detected doing so, thereby clearing x, y, and z, and the adjacent leaves in Lm. This is
732
+ continued for each group of three non-leaf vertices in Lm−1, of which we have at most
733
+ k.
734
+ When C∗ has concluded with the last group of three non-leaves in Lm−1, the cops will
735
+ probe in Lm−1 so that every non-leaf vertex there is probed every three rounds. This
736
+ ensures that the robber will be captured if they ever move onto a non-leaf in Lm−1.
737
+ The clearing strategy continues up the tree, one level at a time. When the cops move
738
+ to Lm−2, we note that we may have non-leaf vertices in Lm−2 which have yet to be
739
+ probed (those that have all their children as leaves in Lm−1). The tree T has at most
740
+ k sets of three non-leaves in any level. For such vertices, divide them into groups of
741
+ three and assign an unused cop to each. We have these cops repeatedly probe each of
742
+ their three vertices (as C1 probed x, y, then z initially), clearing their adjacent leaves
743
+ in Lm−1.
744
+ The cop C∗ is then used to extend the cop territory up from Lm−2 into Lm−3. First,
745
+ C∗ probes x1 while C1 probes x2, then y1, then z1. The process is repeated as in the
746
+ level below. In each grouping of vertices, the cop C∗ extends the cop territory up the
747
+ tree, one vertex at a time. Since each vertex in a level is probed every three terms
748
+ while C∗ is probing that level, the robber cannot move down the tree into cop territory
749
+ without being detected.
750
+
751
+ 16
752
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
753
+ In this way, C∗ can extend the cop territory eventually up to the root v, cleaning the
754
+ tree and winning the one-proximity game. The proof follows.
755
+
756
+ For integers d,k ≥ 2, we use the notation T k
757
+ d for the k-ary tree of depth d, where each
758
+ non-leaf vertex has k children. We note that the bound in Theorem 20 is tight for T 3
759
+ 2 .
760
+ Rooted at the midway vertex, the tree has maxi{Li} = ∣L1∣ = 3, and so Theorem 20
761
+ provides that prox1(T 3
762
+ 2 ) ≤ 2. It is known [22] that the original localization number
763
+ satisfies ζ(T 3
764
+ 2 ) = 2, so we have ζ1(T 3
765
+ 2 ) ≥ 2 as well.
766
+ To compare the upper bounds on ζ1(T) provided by Theorems 18, 19, and 20, let
767
+ T0 = T 3
768
+ 3 , which has 40 vertices and 39 edges. The corresponding upper bounds for T0
769
+ are displayed in the first row of Table 1. Define the trees Ti to be T0 with each edge
770
+ subdivided into i vertices. We then have that Ti will have depth 3(i + 1) and order
771
+ 40 + 39i. The best upper bound for each tree is shown in bold. Note that each of the
772
+ theorems gives the best bound depending on the tree considered.
773
+ Theorem 18
774
+ Theorem 19
775
+ Theorem 20
776
+ T0
777
+ 6
778
+ 2
779
+ 4
780
+ T10
781
+ 9
782
+ 10
783
+ 10
784
+ T100
785
+ 12
786
+ 77
787
+ 10
788
+ Table 1. Upper bounds for ζ1 from Theorems 18, 19, and 20.
789
+ Finding lower bounds for the one-visibility localization number is challenging in most
790
+ cases. We determined that the isoperimetric peak can give a lower bound on prox1,
791
+ enabling us to utilize such isoperimetric results when they exist. We finish by applying
792
+ such results to binary trees, where k = 2. We cite the following result, which gives
793
+ asymptotically tight values for the isoperimetric peak of binary trees.
794
+ Theorem 21 ([19]). If d ≥ 2 is an integer, then
795
+ d
796
+ 2 − O(log d) ≤ ΦE(T 2
797
+ d ) ≤ d
798
+ 2 + O(1).
799
+ We therefore have that HE(T 2
800
+ d ) ≥ d
801
+ 5 − O(log d) from Theorem 13, and so we have the
802
+ following bounds.
803
+ Corollary 22. If d ≥ 2 is an integer, then
804
+ d
805
+ 60 − O(log d) < prox1(T 2
806
+ d ) ≤ ζ1(T 2
807
+ d ) ≤ d
808
+ 4 + 2.
809
+ Proof. The upper bound follows from Theorem 19. The lower bound follows from using
810
+ Corollary 11, then applying Theorem 13 to the result, and then finally using the lower
811
+ bound of Theorem 21.
812
+
813
+ Similar lower bounds of the vertex isoperimetric peak on k-ary trees are also useful
814
+ to us here.
815
+
816
+ THE ONE-VISIBILITY LOCALIZATION GAME
817
+ 17
818
+ Theorem 23 ([24]). If d,k ≥ 2 are integers, then
819
+ ΦV (T k
820
+ d ) ≥ 3
821
+ 40(d − 2).
822
+ Theorem 23 provides the following bounds on prox1 and ζ1 for k-ary trees.
823
+ Corollary 24. If d,k ≥ 2 are integers, then
824
+ 3
825
+ 80(d − 2)(
826
+ 2
827
+ 2k + 3) < prox1(T k
828
+ d ) ≤ ζ1(T k
829
+ d ) ≤ d
830
+ 4 + 2.
831
+ Proof. The upper bound follows from Theorem 19. The lower bound follows from using
832
+ Theorem 10, then applying Theorem 12, and then finally using Theorem 23.
833
+
834
+ Corollaries 22 and 24 provide families of trees with unbounded ζ1 number, in stark
835
+ contrast to ζ being bounded by 2 for trees. The result of Corollary 24 is far from tight.
836
+ We note that improvements to the isoperimetric value of k-ary trees would improve this
837
+ result.
838
+ 5. Cartesian grid graphs
839
+ We proved in Theorem 8 that for planar graphs of order n, ζ1(G) ≤ O(√n). In this
840
+ section, we show that grid graphs make this bound tight, in the sense that such graphs
841
+ have ζ1 numbers in
842
+
843
+ ∣V (G)∣ + O(1).
844
+ For a positive integer n, let Gn,n be the n × n Cartesian grid, which consists of the
845
+ Cartesian product of the n-order path with itself, or Pn ◻ Pn. As we only consider
846
+ Cartesian grids, we refer to them as grids.
847
+ The lower bound for grids follows by using our earlier results with the h-index.
848
+ Theorem 25. For a positive integer n > 1, prox1(Gn,n) ≥ n
849
+ 5 + 1.
850
+ Proof. The vertex isoperimetric values are known for the grids [6]. In particular, for
851
+ Gn,n, ΦV (Gn,n,k) = n for k ∈ {n2−3n+4
852
+ 2
853
+ ,..., n2+n−2
854
+ 2
855
+ }, which are 2n−2 contiguous values of
856
+ k. Thus, it follows that HV (Gn,n) ≥ n, and by Theorem 10 we have that prox1(Gn,n) >
857
+ n/5, as required.
858
+
859
+ We next establish upper bounds for grid graphs that differ from the lower bound in
860
+ Theorem 25 by an additive constant.
861
+ Theorem 26. Let m be the odd integer such that n = 5m − i for some integer 0 ≤ i ≤ 9.
862
+ We then have that
863
+ prox1(Gn,n) ≤ m + 3.
864
+ We prove Theorem 26 at the end of this section. As a consequence of Theorem 26,
865
+ we know prox1(Gn,n) up to one of four values.
866
+ This gives a class of graphs where
867
+ Theorem 10 is close to being tight.
868
+ Corollary 27. For n a positive integer,
869
+ ⌈n
870
+ 5 ⌉ + 1 ≤ prox1(Gn,n) ≤ ⌈n
871
+ 5 ⌉ + 4.
872
+ Proof. Theorem 25 gives prox1(Gn,n) ≥ ⌈n
873
+ 5 ⌉+1. When we note that m = ⌈n
874
+ 5 ⌉+⌊ i
875
+ 5⌋ ≤ ⌈n
876
+ 5 ⌉+1
877
+ in Theorem 26, it follows that prox1(Gn,n) ≤ ⌈n
878
+ 5 ⌉ + 4.
879
+
880
+
881
+ 18
882
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
883
+ The following result determines the one-visibility localization number of Cartesian
884
+ grids up to four values, assuming that n is sufficiently large.
885
+ Corollary 28. If n ≥ 11, then
886
+ ⌈n
887
+ 5 ⌉ + 1 ≤ ζ1(Gn,n) ≤ ⌈n
888
+ 5 ⌉ + 4.
889
+ Proof. Using prox1(Gn,n) cops in the one-visibility Localization game, the cops may
890
+ initially follow the strategy guaranteed by Corollary 27 until some cop probes a distance
891
+ of 1 from the robber, say the cop on vertex u. The robber moves and may now be on
892
+ any vertex of distance 0, 1, or 2 from u. Since n ≥ 11, we have that ⌈n
893
+ 5 ⌉ + 1 ≥ 4, and so
894
+ we know that at least four cops are playing. For the cops’ second move, play four cops
895
+ on the vertices of N(u).
896
+ If all four cops probe a distance of 1, then the robber is on u. If exactly two of these
897
+ cops probe a distance of 1, then the robber must be on the unique vertex of distance
898
+ 2 from u that is adjacent to the two vertices containing these cops. If exactly one cop
899
+ probes a distance of 1, then the robber must be on the unique vertex of distance 1 from
900
+ this cop that is not adjacent to any of the other cops. Thus, the robber’s location is
901
+ determined by the cops.
902
+
903
+ We finish the section with the proof of Theorem 26, but as the proof is quite technical,
904
+ we motivate our technique by exploring some less efficient but more intuitive strategies.
905
+ A first strategy one may think of for the cops is to clear the grid using n cops to probe
906
+ an entire row and march upwards, clearing the grid from bottom to top. This approach
907
+ is effective but inefficient.
908
+ A natural improvement is to place a cop in every other column, alternating between
909
+ the first and second row, so that two full rows of the grid are cleared using at most
910
+ (n+1)/2 cops; see Figure 3. As the cops march upwards, two rows are cleared, and only
911
+ c
912
+ c
913
+ c
914
+ c
915
+ c
916
+ c
917
+ Figure 3. Cops placed on every other column can clear two rows.
918
+ one row is reinfected each round. This strategy avoids overlapping the neighborhoods of
919
+ the cops’ probes, but only the “forward” edge of the cops’ line clears infected vertices.
920
+ The “rear” of each probe is already cleared. Matching the isoperimetric lower bound
921
+ requires most cops to clear the maximum ∆(G) + 1 = 5 new vertices with every probe.
922
+ To improve on this second strategy, note that it would take the robber multiple rounds
923
+ to cross the cops’ formation: three rounds on a column with a cop and two rounds on
924
+ a column without a cop. This implies that cops only need to play on these positions
925
+ every other round to prevent the robber from reinfecting the portion of the grid they’ve
926
+
927
+ THE ONE-VISIBILITY LOCALIZATION GAME
928
+ 19
929
+ fully cleared. By shifting the set of columns where the cops’ probe, it is possible for the
930
+ cops to protect these rows by playing twice every five rounds, so that each column has
931
+ two vertices cleared by one cop move and three vertices cleared by the other.
932
+ We now give a high-level description of our strategy. We partition the grid into five
933
+ rectangles of width approximately n/5 vertices. Using two sets of approximately n/10
934
+ cops, each rectangle is probed twice every five rounds with a cop probing every other
935
+ column in the rectangle. To prevent the robber from slipping from the infected portion
936
+ of one rectangle to the cleared portion of the next, the cops clear a diagonal, rather
937
+ than the two rows from Figure 3. Although it takes several rounds to do so, we show
938
+ that the cops can move these diagonals up the rectangles, closing in on the robber until
939
+ they are captured.
940
+ We now turn to the proof of our main result in this section.
941
+ Proof of Theorem 26. Let Gn,m′ denote the n×m′ grid and G denote the square lattice
942
+ with vertices in Z×Z. It will be convenient to allow the cops to play on G and to restrict
943
+ the robber’s position to a subgraph Gn,m′, where m′ = m for the first part of the proof
944
+ and m′ = n in the second part of the proof. (Recall that m is the odd integer for which
945
+ n = 5m − i for some 0 ≤ i ≤ 9.) We will then argue this relaxation did not benefit the
946
+ cop player.
947
+ We break the proof into three parts which prove the following three claims, respec-
948
+ tively:
949
+ (1) When the robber is restricted to a subgraph Gn,m within G, m+3
950
+ 2
951
+ cops which
952
+ only play on rounds t with t ≡ 0,3 (mod 5) can capture the robber.
953
+ (2) When the robber is restricted to a subgraph Gn,5m of G, the robber can be
954
+ captured by m + 3 cops.
955
+ (3) At most m + 3 cops are required to capture the robber on Gn,n.
956
+ Throughout the proof, let
957
+ fi,j(c) =
958
+ ⎧⎪⎪⎨⎪⎪⎩
959
+ i + 1 + ⌊c−j
960
+ 2 ⌋
961
+ for c − j > 0
962
+ i + ⌈c−j
963
+ 2 ⌉
964
+ for c − j ≤ 0,
965
+ and define Fi,j = {(r,c) ∶ 1 ≤ c ≤ m′,fi,j(c) ≤ r ≤ n}, which we call a forced region. These
966
+ forced regions describe different subsets of vertices that the cop player will contain the
967
+ robber within. The strategy we describe will reduce the cardinality of the forced region
968
+ over time. It is important to note here that when we show that the robber must be
969
+ in a given forced region, there may be some vertices the robber cannot occupy.
970
+ In
971
+ particular, it will be convenient to assume that the forced region will, in some rounds,
972
+ contain several vertices (x,y) with x < 1.
973
+ The (i,j) index of Fi,j refers to a cell along the lower edge of the region, which cuts
974
+ diagonally from southwest to northeast across columns 1 through m′. In particular, the
975
+ second index describes the column of focus of the forced region, which we pay special
976
+ attention to in the proof. The function fi,j, given a column c, gives a certain key position
977
+ in Fi,j related to where the cops will play. See Figure 4 for a visual reference.
978
+ Let
979
+ Si,j ={(fi,j(c) + 1,c) ∶ c > j and c − j is odd}∪
980
+ {(fi,j(c) + 1,c) ∶ c ≤ j and c − j is even}.
981
+
982
+ 20
983
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
984
+ The set Si,j contains points spaced apart in an L-shape, similar to a knight move
985
+ in chess. These vertices are chosen so that the neighborhoods of the points cover a
986
+ diagonal stripe along the bottom of Fi,j with minimal overlap.
987
+ Claim 1: When the robber is restricted to a subgraph Gn,m within G, m+3
988
+ 2
989
+ cops which
990
+ only play on rounds t with t ≡ 0,3 (mod 5) can capture the robber.
991
+ The cops��� strategy consists of two moves. If the cops have restricted the robber to
992
+ Fi,j immediately before the cops’ move, then the cops will play on the vertices Si,j that
993
+ are within the columns [0,m+1]. By the definition of Si,j, the cops will only be playing
994
+ on every other column in [0,j] and every other column in [j + 1,m + 1], for a total of
995
+ ⌈j
996
+ 2⌉ + ⌈(m + 1) − (j + 1) + 1
997
+ 2
998
+ ⌉ ≤ j + 1
999
+ 2
1000
+ + (m + 1) − (j + 1) + 1 + 1
1001
+ 2
1002
+ = m + 3
1003
+ 2
1004
+ cops.
1005
+ Immediately after this cop’s move, the robber may only be on a vertex in Fi,j ∖
1006
+ N[Si,j] = Fi+2,j−1. To see this fact, we consider the cases c > j and c ≤ j. For the
1007
+ first case, when c − j is odd, N[(fi,j(c) + 1,c)] is a superset of {(fi,j(c),c),(fi,j(c) +
1008
+ 1,c),(fi,j(c) + 2,c)}; if the robber is in column c, then it must be on a vertex (r,c)
1009
+ with r ≥ fi,j(c) + 3 = fi+2,j−1(c).
1010
+ When c − j is even, {(fi,j(c),c),(fi,j(c) + 1,c)} ⊆
1011
+ N[(fi,j(c)+1,c)], and the robber must be in a row r ≥ fi,j(c)+2 = fi+2,j−1(c). The case
1012
+ when c ≤ j follows similarly to find that if the robber is in column c, then the robber
1013
+ must be on row r ≥ fi+2,j−1(c), which defines the set Fi+2,j−1. We call this the natural
1014
+ cop move and label this as P1 for future reference.
1015
+ In the case that the robber is known to be on a vertex of Fi+2,0, the cops instead think
1016
+ of the robber as being on a vertex of Fi+2+ m+1
1017
+ 2
1018
+ ,m. These two forced regions describe the
1019
+ same set of vertices, but as Si,j is determined by the index (i,j), this change of index
1020
+ describes a different cop move. We label this replacement as P2 for future reference.
1021
+ Observe that when the robber is on a vertex in Fi,j but the cops do not play during
1022
+ their next move (as in rounds 1,2,4 (mod 5)), then the robber moves to a vertex in
1023
+ Fi−1,j = N[Fi,j]. We label this as P3 for future reference.
1024
+ We prove Claim 1 recursively. As a base case, we can assume the robber is contained
1025
+ within Fi,m for any i ≤ 1, where we note that we will take i to be negative in some cases.
1026
+ Note that for such i, Fi,m contains the subset of vertices [1,n] × [1,m], so this initial
1027
+ assumption is always true.
1028
+ For the recursive step, assume the robber is contained within some Fi,m in round t
1029
+ with t ≡ 0 (mod 5). Repeating the natural move P1, the column of focus j will shift
1030
+ from m down to 1, with rounds 0 (mod 5) focusing on an odd column and rounds 3
1031
+ (mod 5) focusing on an even column. We refer to these rounds collectively as the first
1032
+ sweep. Once the column of focus is 1, we continue to play, and the column of focus
1033
+ again becomes m. For this second sweep, the column of focus will shift from m all the
1034
+ way down to 1, but with the parity reversed: rounds 3 (mod 5) focus on an odd column
1035
+ and rounds 0 (mod 5) focus on an even column. After both sweeps, the cops will have
1036
+ successfully moved the robber from Fi,m to Fi+1,m.
1037
+ We refer the reader to Figure 4, which depicts the following cop moves.
1038
+ First sweep: The cops play the natural move so that the robber must be contained
1039
+ within Fi+2,m−1 (see P1). The robber moves three times, first to a vertex in Fi+1,m−1,
1040
+
1041
+ THE ONE-VISIBILITY LOCALIZATION GAME
1042
+ 21
1043
+ then to a vertex in Fi,m−1, and finally to a vertex in Fi−1,m−1 (see P3). The cops then play
1044
+ the natural move in round t + 3, so that the robber must be contained within Fi+1,m−2
1045
+ (see P1). Then the robber moves twice, first to a vertex in Fi,m−2, then to a vertex in
1046
+ Fi−1,m−2 (see P3). This shows that every five moves, the indices of the forced region
1047
+ decrease by one in the first coordinate and two in the second coordinate. This process
1048
+ repeats (m − 1)/2 times until the robber is known to reside on Fi− m−1
1049
+ 2
1050
+ ,1 immediately
1051
+ before the cops’ (t + 5m−1
1052
+ 2 )th move, where we note that t + 5m−1
1053
+ 2
1054
+ ≡ 0 (mod 5). The
1055
+ cops again play the natural move, and so the robber is known to reside in Fi− m−1
1056
+ 2
1057
+ +2,0,
1058
+ immediately after the cops’ move, which is then replaced with Fi+3,m by P2. The robber
1059
+ takes three moves and is on a vertex in Fi,m.
1060
+ Second sweep: The cops again play the natural move, and so the robber is known
1061
+ to reside in Fi+2,m−1. The robber takes two moves and is on a vertex in Fi,m−1. Once
1062
+ again, every five moves the first index of the forced region is decreased by one and
1063
+ the second index by two. Play continues in this fashion (the cops playing the natural
1064
+ move on round 0,3 (mod 5)) for (m − 1)/2 rounds, until the robber is known to reside
1065
+ in Fi− m−1
1066
+ 2
1067
+ ,1 immediately before the cops’ move in the (t + 5(m − 1))th round, where
1068
+ t + 5(m − 1) ≡ 0 (mod 5). The cops play the natural move, so the robber is known
1069
+ to reside in Fi− m−1
1070
+ 2
1071
+ +2,0 immediately after the cops’ move, which is then replaced with
1072
+ Fi+3,m by P2. The robber takes two moves and is on a vertex in Fi+1,m immediately
1073
+ before the cops’ (t + 5m)th move.
1074
+ We note that we started with the robber being on a vertex of Fi,m in some round 0
1075
+ (mod 5), and now have that Fi+1,m in some round 0 (mod 5). This completes the recur-
1076
+ sive step, and so we can conclude that after sufficiently many rounds, as Fn+ 3m
1077
+ 2 ,m = ∅,
1078
+ the robber is captured, and the proof of Claim 1 follows.
1079
+ For the next claim, it will be useful to note that if this process is initialized with Fi,m,
1080
+ then immediately before the cops’ move in round t = 5mα + 1, the robber must be in
1081
+ the forced region Fi+α,m.
1082
+ Claim 2: When the robber is restricted to a subgraph Gn,5m of G, the robber can be
1083
+ captured by m + 3 cops.
1084
+ We split the subgraph Gn,5m into five subgraphs A1,A2,A3,A4, and A5, where Aj is
1085
+ on the vertices of Gn,5m in columns [(j − 1)m + 1,jm]. We use a set of m+3
1086
+ 2
1087
+ cops on
1088
+ Aj on rounds j,j + 3 (mod 3). This requires two sets of m+3
1089
+ 2
1090
+ cops, and so m + 3 cops
1091
+ are used in total. The technique described in Claim 1 is applied to each Ai, shifting
1092
+ the rounds on which the cops play appropriately, and with the additional condition
1093
+ that the process in Claim 1 is started in Aj in round j with forced region Fi,m where
1094
+ i = −2m + (j − 1)m−1
1095
+ 2 .
1096
+ To illustrate how the process in Claim 1 is extended to Gn,5m, we describe the first
1097
+ six cops moves of the m + 3 cops on the infinite square grid G, focused on the subgraph
1098
+ Gn,5m.
1099
+ Cop move 1: The first set of m+3
1100
+ 2
1101
+ cops play on S−2m,m on the columns [0,m + 1] (this
1102
+ is the first move for the cops in A1).
1103
+ Cop move 2: The first set of m+3
1104
+ 2
1105
+ cops play on S−2m+ m−1
1106
+ 2
1107
+ ,m on the columns [m,2m + 1]
1108
+ (this is the first move for the cops in A2).
1109
+
1110
+ 22
1111
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
1112
+ Figure 4. The first sweep of claim 1 where m = 7. Red and pink dots
1113
+ indicate the forced region before the cops’ move, and the square indicates
1114
+ the i,j such that this forced region is Fi,j. Red dots indicate the forced
1115
+ region after the cops’ move. Black circles indicate the locations of the
1116
+ cops their move. From left to right, top to bottom, the images indicate
1117
+ play just before and after the cops’ 1st, 4th, 6th, 9th, 11th, 14th, 16th,
1118
+ and 19th move.
1119
+
1120
+ THE ONE-VISIBILITY LOCALIZATION GAME
1121
+ 23
1122
+ Cop move 3: The first set of m+3
1123
+ 2
1124
+ cops play on S−2m+2 m−1
1125
+ 2
1126
+ ,m on the columns [2m,3m+1]
1127
+ (this is the first move for the cops in A3).
1128
+ Cop move 4: The first set of m+3
1129
+ 2
1130
+ cops play on S−2m+3 m−1
1131
+ 2
1132
+ ,m on the columns [3m,4m+1]
1133
+ (this is the first move for cops in A4) and the second set of m+3
1134
+ 2
1135
+ cops play on S−2m−1,m−1
1136
+ on the columns [0,m + 1] (this is the fourth round in A1).
1137
+ Cop move 5: The first set of m+3
1138
+ 2
1139
+ cops play on S−2m+4 m−1
1140
+ 2
1141
+ ,m on the columns [4m,5m +
1142
+ 1] (this is the first move for cops in A5) and the second set of
1143
+ m+3
1144
+ 2
1145
+ cops play on
1146
+ S−2m−1+ m−1
1147
+ 2
1148
+ ,m−1 on the columns [m,2m + 1] (this is the fourth round in A2).
1149
+ Cop move 6: The first set of m+3
1150
+ 2
1151
+ cops play on S−2m−1,m−2 on the columns [0,m + 1]
1152
+ (this is the sixth round in A1) and the second set of m+3
1153
+ 2
1154
+ cops play on S−2m−1+2 m−1
1155
+ 2
1156
+ ,m−1
1157
+ on the columns [2m,3m + 1] (this is the fourth round in A3).
1158
+ If the robber stays within a subgraph Aj, then by Claim 1 they will eventually be
1159
+ captured. Suppose the robber moves from one subgraph to another, say from Aa to
1160
+ Ab. The robber must have been on a vertex of the cops’ current forced region in Aa in
1161
+ round t. If the robber moved to the cops’ current forced region in Ab, then the robber
1162
+ has not made progress as they may as well have started in Ab and stayed there until
1163
+ the current move. Therefore, we can assume that the robber moves to a vertex of Ab
1164
+ outside of the cops’ forced region.
1165
+ Assume without loss of generality that a,b ∈ {1,2}. We analyze the moves that occur
1166
+ on the border of A1 and A2, which affect where the robber can be on either column m
1167
+ or m + 1. Before we begin, we analyze each of the cops’ moves of A1 to find which cops
1168
+ played on either the left-most columns 0, 1, and 2, or the right-most columns m − 1, m,
1169
+ and m + 1. This will require a deeper analysis of the moves in Claim 1. We note the
1170
+ following properties.
1171
+ Property 1: The first sweep of Claim 1 utilized 5m−1
1172
+ 2
1173
+ + 3 rounds and the second
1174
+ sweep of Claim 1 utilized 5m−1
1175
+ 2
1176
+ + 2 rounds. Together, this is 5m−1
1177
+ 2
1178
+ + 3 + 5m−1
1179
+ 2
1180
+ + 2 = 5m
1181
+ rounds needed to perform both sweeps. Therefore, if the cops were on Si,m in round t,
1182
+ then the cops are on Si+1,m in round t+5m. Since the cops play on S−2m,m in the round
1183
+ with t = 1, we conclude that the cops play on S−2m+α,m during round t = 1 + (5m)α.
1184
+ Property 2: If the cops played on Si,j in round t, then the cops play on Si−1,j−2
1185
+ in round t + 5, unless j ∈ {1,2}, in which case the cops play on Si+ m−1
1186
+ 2
1187
+ ,j+m−2. Since
1188
+ the cops play on S−2m+α,m in round t = 1 + (5m)α, we conclude that the cops play on
1189
+ S−2m+α−β,m−2β in round t = 1 + (5m)α + 5β when 0 ≤ β ≤ m−1
1190
+ 2 , and the cops play on
1191
+ S−2m+α−β+ m−1
1192
+ 2
1193
+ ,m−2β+(m−2) in round t = 1 + (5m)α + 5β when m+1
1194
+ 2
1195
+ ≤ β ≤ m − 1.
1196
+ Property 3: If the cops play on Si,j in round t where t ≡ 1 (mod 5), then in the
1197
+ round t + 3 the cops play on Si−1,j−1 if j ≠ 1, and on Si+ m−1
1198
+ 2
1199
+ ,j+(m−1) if j = 1.
1200
+ We next consider the situation where the cops play near the left and right edges.
1201
+ For each t ≡ 1 (mod 5), we describe which of these cops in A1 played on a column in
1202
+ {0,1,2,m − 1,m,m + 1}.
1203
+ (1) If we are playing in round t = 1+(5m)α+5β where β = 0, then the cops in these
1204
+ columns were played on vertices {(−2m + α + 1,m),(−2m + α + 2,m + 1),(−2m +
1205
+ α + 1 − m−1
1206
+ 2 ,1)}.
1207
+
1208
+ 24
1209
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
1210
+ (2) If we are playing in round t = 1 + (5m)α + 5β where 1 ≤ β ≤ m−1
1211
+ 2 , then the cops
1212
+ in these columns were played on vertices {(−2m+α+1,m−1),(−2m+α+2,m+
1213
+ 1),(−2m + α + 1 − m−1
1214
+ 2 ,1)}.
1215
+ (3) If we are playing in round t = 1 + (5m)α + 5β where m+1
1216
+ 2
1217
+ ≤ β ≤ m − 1, then the
1218
+ cops in these columns were played on vertices {(−2m + α + 2,m),(−2m + α + 1 −
1219
+ m−1
1220
+ 2 ,0),(−2m + α + 2 − m−1
1221
+ 2 ,2)}.
1222
+ For each t ≡ 4 (mod 5), we describe which of these cops in A1 played on a column in
1223
+ {0,1,2,m − 1,m,m + 1}.
1224
+ (1) If we are playing in round t = 4 + (5m)α + 5β where 0 ≤ β ≤ m−1
1225
+ 2 , then the
1226
+ cops in these columns were played on vertices {(−2m + α + 1,m),(−2m + α −
1227
+ m−1
1228
+ 2 ,0),(−2m + α + 1 − m−1
1229
+ 2 ,2)}.
1230
+ (2) If we are playing in round t = 4 + (5m)α + 5β where β = m+1
1231
+ 2 , then the cops
1232
+ in these columns were played on vertices {(−2m + α + 1,m),(−2m + α + 2,m +
1233
+ 1),(−2m + α + 1 − m−1
1234
+ 2 ,1)}.
1235
+ (3) If we are playing in round t = 4 + (5m)α + 5β where m+1
1236
+ 2
1237
+ ≤ β ≤ m − 1, then the
1238
+ cops in these columns were played on vertices {(−2m − 1 + α + 1,m − 1),(−2m +
1239
+ α + 2,m + 1),(−2m + α + 1 − m−1
1240
+ 2 ,1)}.
1241
+ Property 4: A cop on A1 plays on the vertex (i,j) during round t if and only if a
1242
+ cop on A2 plays on the vertex (i + m−1
1243
+ 2 ,j + m) in round t + 1. As a consequence, for
1244
+ each of the vertices (i,j) with j ∈ {0,1,2} that were visited by a cop in A1 in round t as
1245
+ described above, the corresponding vertex (i′,j′) = (i + m−1
1246
+ 2 ,j + m) in A2 was visited in
1247
+ round t + 1, where j′ ∈ {m,m + 1,m + 2}. Therefore, for every round, we can now derive
1248
+ which cops probed a vertex in column {m − 1,m,m + 1,m + 2}.
1249
+ This is relevant as only the cops playing in columns {m − 1,m,m + 1,m + 2} will
1250
+ impact the robber’s location on the border of A1 and A2. To simplify, take α = 2m. A
1251
+ similar argument follows for all other α. In Table 2, we describe exactly which vertices
1252
+ are probed by the cops on columns {m − 1,m,m + 1,m + 2} in rounds i + 5β + 5m(2m),
1253
+ where 0 ≤ β ≤ m − 1 and 1 ≤ i ≤ 5.
1254
+ i
1255
+ β = 0
1256
+ 1 ≤ β ≤ m−1
1257
+ 2
1258
+ β = m+1
1259
+ 2
1260
+ m+1
1261
+ 2
1262
+ ≤ β ≤ m − 1
1263
+ 1
1264
+ (1,m) (2,m + 1)
1265
+ (1,m − 1) (2,m + 1)
1266
+ (2,m)
1267
+ (2,m)
1268
+ 2
1269
+ (1,m + 1)
1270
+ (1,m + 1)
1271
+ (1,m),(2,m + 2)
1272
+ (1,m) (2,m + 2)
1273
+ 3
1274
+ 4
1275
+ (1,m)
1276
+ (1,m)
1277
+ (1,m) (2,m + 1)
1278
+ (1,m − 1) (2,m + 1)
1279
+ 5
1280
+ (0,m) (1,m + 2)
1281
+ (0,m) (1,m + 2)
1282
+ (1,m + 1)
1283
+ (1,m + 1)
1284
+ Table 2. The vertices in columns {m − 1,m,m + 1,m + 2} where a cop
1285
+ plays in round t = i + 5β + 5mα, where α = 2m.
1286
+ We may also analyze Claim 1 to find that if the robber is on a vertex (i,m) in
1287
+ column m that is in the forced region of A1 immediately after the cops move in round
1288
+ t = 1+5β +(5m)α, then i ≥ α−2m+3 if 0 ≤ β ≤ m−1
1289
+ 2 , and i ≥ α−2m+4 if m+1
1290
+ 2
1291
+ ≤ β ≤ m−1.
1292
+ Similarly, after the cops move in round t = 4 + 5β + (5m)α, then i ≥ α − 2m + 3 for
1293
+ 0 ≤ β ≤ m − 1.
1294
+
1295
+ THE ONE-VISIBILITY LOCALIZATION GAME
1296
+ 25
1297
+ If the robber is on a vertex (i,m + 1) in column m + 1 that is in the forced region of
1298
+ A2 immediately after the cops move in round t = 2 + 5β + (5m)α, then i ≥ α − 2m + 3.
1299
+ Similarly, after the cops move in round t = 5 + 5β + (5m)α, then i ≥ α − 2m + 2 if
1300
+ 0 ≤ β ≤ m−1
1301
+ 2 , and i ≥ α − 2m + 3 if m+1
1302
+ 2
1303
+ ≤ β ≤ m − 1.
1304
+ Let xt
1305
+ 1 denote the smallest value of x such that a cop may be on (x,m) in round t in
1306
+ the forced region of A1, and let xt
1307
+ 2 denote the smallest value of x such that a cop may be
1308
+ on (x,m+1) in round t in the forced region of A2. The robber may then move from the
1309
+ forced region of A1 onto a vertex not in the forced region of A2 only when xt
1310
+ 1 ≤ xt
1311
+ 2 + 2.
1312
+ Similarly, the robber may move from the forced region of A2 onto a vertex not in the
1313
+ forced region of A1 only when xt
1314
+ 2 ≤ xt
1315
+ 1 +2. We note that by the above analysis, this only
1316
+ occurs when t ≡ 1,4 (mod 5). In each of these rounds and for every possible move of
1317
+ the robber from a vertex of a forced region onto a vertex not in a forced region, there is
1318
+ a cop that prevents it by either being adjacent to the robber before or after their move.
1319
+ The complete list of such events is presented in Table 3 for the case α = 2m. The proof
1320
+ of Claim 2 follows.
1321
+ t ≡
1322
+ robber at t
1323
+ robber at t + 1
1324
+ capturing cop
1325
+ 0 ≤ β ≤ m−1
1326
+ 2
1327
+ 1
1328
+ (1,m+1)
1329
+ (1,m)
1330
+ (2,m + 1) on round t
1331
+ 4
1332
+ (1,m + 1)
1333
+ (1,m)
1334
+ (1,m) on round t
1335
+ β = m+1
1336
+ 2
1337
+ 1
1338
+ (1,m + 1)
1339
+ (1,m)
1340
+ (1,m) on round t + 1
1341
+ 1
1342
+ (2,m+1)
1343
+ (2,m)
1344
+ (1,m) on round t + 1
1345
+ 4
1346
+ (1,m + 1)
1347
+ (1,m)
1348
+ (1,m) on round t
1349
+ m+3
1350
+ 2
1351
+ ≤ β ≤ m − 1
1352
+ 1
1353
+ (2,m + 1)
1354
+ (2,m)
1355
+ (2,m) on round t
1356
+ 4
1357
+ (2,m + 1)
1358
+ (1,m + 1)
1359
+ (2,m + 1) on round t
1360
+ Table 3. In round t = i+5β +(5m)α with α = 2m, each possible robber
1361
+ move from the forced region of one Aj to the unforced region of the other
1362
+ Aj′ is represented as a row, with the corresponding cop that captures
1363
+ the robber if it performs this move.
1364
+ Claim 3: At most m + 3 cops are required to capture the robber on Gn,n.
1365
+ We now show that at most m + 3 cops are required to capture the robber on Gn,n,
1366
+ which proves Claim 3 and will complete the proof of the theorem. Recall that n = 5m−i
1367
+ for some 0 ≤ i ≤ 9. To capture the robber on Gn,n, the cops’ will observe and modify
1368
+ the strategy to capture the robber on the subgraph Gn,5m of G given in Claim 2.
1369
+ That is, suppose that the m + 3 cops play on vertices St in round t in G where the
1370
+ robber is restricted to Gn,5m. We further restrict the robber so that it can only be on
1371
+ Gn,n ⊆ Gn,5m. A simple modification to the cop moves St also ensures that the cops
1372
+ only play on the subset Gn,n of G. However, this game is identical to just playing on
1373
+ the graph Gn,n, and so is a winning strategy for m + 3 cops to capture the robber on
1374
+ Gn,n.
1375
+ We note that each cop outside of [0,n + 1] × [0,n + 1] will not affect the robber, since
1376
+ the robber is contained within the vertices [1,n]×[1,n] in all rounds. Delete all vertices
1377
+ in St that are not within [0,n + 1] × [0,n + 1]. This has no impact on capturing the
1378
+ robber.
1379
+
1380
+ 26
1381
+ A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
1382
+ Suppose (0,x) ∈ St. This cop clears only the vertex (1,x) in round t, and so it is a
1383
+ strictly better move for the cop to play on (1,x). We therefore, replace (0,x) ∈ St with
1384
+ (1,x) ∈ St. Similarly, we replace (n + 1,x) ∈ St with (n,x) ∈ St, replace (x,0) ∈ St with
1385
+ (x,1) ∈ St, and replace (x,n + 1) ∈ St with (x,n) ∈ St.
1386
+ The resulting cop moves are, therefore, strictly better at capturing the robber on
1387
+ Gn,n, but also have the robber contained within Gn,n. This completes the proof.
1388
+
1389
+ 6. Conclusion and future directions
1390
+ We introduced the one-visibility localization number and proved asymptotically tight
1391
+ bounds on Cartesian grids and bounds on k-ary trees. We gave bounds for trees in terms
1392
+ of their order and depth. Determining a tree’s exact one-visibility localization number
1393
+ based on its structural features remains an open problem.
1394
+ The one-visibility localization number may be investigated in various graph families
1395
+ where the localization number has been studied, such as Kneser graphs, Latin square
1396
+ graphs, or the incidence graphs of projective planes and combinatorial designs. Our
1397
+ approach using isoperimetric inequalities should apply to the families of hypercubes,
1398
+ higher dimensional Cartesian grids, and strong grids.
1399
+ Another natural direction would be to consider the k-limited visibility Localization
1400
+ game for k > 1, with corresponding optimization parameter ζk. It would be interesting
1401
+ to find graphs G such ζi(G) ≠ ζj(G) for all distinct values of i and j that are at most
1402
+ the radius of G.
1403
+ 7. Acknowledgements
1404
+ The authors were supported by NSERC.
1405
+ References
1406
+ [1] N. Alon, P. Seymour, R. Thomas, A separator theorem for nonplanar graphs, Journal of the
1407
+ American Mathematical Society 3 (1990) 801–808.
1408
+ [2] N.C. Behague, A. Bonato, M.A. Huggan, T.G. Marbach, B. Pittman, The localization capture time
1409
+ of a graph, Theoretical Computer Science 911 (2022) 80-91.
1410
+ [3] A. Bernshteyn, E. Lee, Searching for an intruder on graphs and their subdivisions, Electronic
1411
+ Journal of Combinatorics 29(3) (2022) P3.9.
1412
+ [4] S.L. Bezrukov, Edge isoperimetric problems on graphs, Bolyai Soc. Math. Stud. 7 (1999) 157–197.
1413
+ [5] B.V.S. Bharadwaj, L.S. Chandran, Bounds on isoperimetric values of trees, Discrete Mathematics
1414
+ textbf309 (2009) 834–842.
1415
+ [6] B. Bollob´as, I. Leader, Compressions and isoperimetric inequalities Journal of Combinatorial The-
1416
+ ory, Series A 56 (1991) 47–62.
1417
+ [7] A. Bonato, An Invitation to Pursuit-Evasion Games and Graph Theory, American Mathematical
1418
+ Society, Providence, Rhode Island, 2022.
1419
+ [8] A. Bonato, M.A. Huggan, T. Marbach, The localization number of designs, Journal of Combina-
1420
+ torial Designs 29 (2021) 175–192.
1421
+ [9] A. Bonato, M.A. Huggan, T. Marbach, The localization number and metric dimension of graphs
1422
+ of diameter 2, accepted to Contributions to Discrete Mathematics.
1423
+ [10] A. Bonato, W. Kinnersley, Bounds on the localization number, Journal of Graph Theory 94 (2020)
1424
+ 1–18.
1425
+ [11] A. Bonato, R.J. Nowakowski, The Game of Cops and Robbers on Graphs, American Mathematical
1426
+ Society, Providence, Rhode Island, 2011.
1427
+
1428
+ THE ONE-VISIBILITY LOCALIZATION GAME
1429
+ 27
1430
+ [12] B. Bosek, P. Gordinowicz, J. Grytczuk, N. Nisse, J. Sok´o�l, M. ´Sleszy´nska-Nowak, Localization
1431
+ game on geometric and planar graphs, Discrete Applied Mathematics 251 (2018) 30–39.
1432
+ [13] B. Bosek, P. Gordinowicz, J. Grytczuk, N. Nisse, J. Sok´o�l, M. ´Sleszy´nska-Nowak, Centroidal local-
1433
+ ization game, Electronic Journal of Combinatorics 25(4) (2018) P4.62.
1434
+ [14] A. Brandt, J. Diemunsch, C. Erbes, J. LeGrand, C. Moffatt, A robber locating strategy for trees,
1435
+ Discrete Applied Mathematics 232 (2017) 99–106.
1436
+ [15] J. Carraher, I. Choi, M. Delcourt, L.H. Erickson, D.B. West, Locating a robber on a graph via
1437
+ distance queries, Theoretical Computer Science 463 (2012) 54–61.
1438
+ [16] N.E. Clarke, D. Cox, C. Duffy, D. Dyer, S.L. Fitzpatrick, M.E. Messinger, Limited visibility Cops
1439
+ and Robber, Discrete Applied Mathematics 282 (2020) 53–64.
1440
+ [17] D. Dereniowski, D. Dyer, R. Tifenbach, B. Yang, Zero-visibility cops & robber and the pathwidth
1441
+ of a graph, Journal of Combinatorial Optimization 29 (2015) 541–564.
1442
+ [18] D. Dereniowski, D. Dyer, B. Yang, The complexity of zero-visibility cops and robber, Theoretical
1443
+ Computer Science 607 (2015) 135–148.
1444
+ [19] P. Hrubevs, A. Yehudayoff, On isoperimetric profiles and computational complexity, 43rd Interna-
1445
+ tional Colloquium on Automata, Languages, and Programming (ICALP 2016) 55 (2016) 89:1–89:12.
1446
+ [20] Y. Otachi, K. Yamazaki, A lower bound for the vertex boundary-width of complete k-ary trees,
1447
+ Discrete Mathematics 308 2389–2395.
1448
+ [21] S. Seager, Locating a robber on a graph, Discrete Mathematics 312 (2012) 3265–3269.
1449
+ [22] S. Seager, Locating a backtracking robber on a tree, Theoretical Computer Science 539 (2014)
1450
+ 28–37.
1451
+ [23] R. Tovsi´c, Vertex-to-vertex search in a graph, In: Proceedings of the Sixth Yugoslav Seminar on
1452
+ Graph Theory, Dubrovnik (1985) 233–237.
1453
+ [24] I. Vrt’o, A note on isoperimetric peaks of complete trees, Discrete Mathematics 310 (2010) 1272–
1454
+ 1274.
1455
+ [25] D.B. West, Introduction to Graph Theory, 2nd edition, Prentice Hall, 2001.
1456
+ [26] B.T. Yang, T. Akter, One-visibility cops and robber on trees, Theoretical Computer Science 886
1457
+ (2021) 139–156.
1458
+ [27] B.T. Yang, One-visibility cops and robber on trees: optimal cop-win strategies, Theoretical Com-
1459
+ puter Science 928 (2022) 27–47.
1460
+ [28] B.T. Yang, Computing the one-visibility cop-win strategies for trees, Combinatorial optimization
1461
+ and applications Lecture Notes in Comput. Sci., 13135 (2021) 125–139.
1462
+ (A1,A2,A3,A4) Toronto Metropolitan University, Toronto, Canada
1463
+ Email address, A1: (A1) [email protected]
1464
+ Email address, A2: (A2) [email protected]
1465
+ Email address, A3: (A3) [email protected]
1466
+ Email address, A4: (A4) [email protected]
1467
+
79E1T4oBgHgl3EQf7gUu/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dE4T4oBgHgl3EQfcww5/content/2301.05085v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:191bf91e21c378bc7fe6fe54720d9ae582e5a728c5aae4d37f08b08f4c1512fd
3
+ size 947446
7dE4T4oBgHgl3EQfcww5/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:11cf8c00339a85d09f2e05b5036e0cf6a15ebc2ab805a8ae95c93ea93a568eca
3
+ size 3473453
7dE4T4oBgHgl3EQfcww5/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7a781f5279023d0f322dfa98bb77b5656f01a5e122d044b3ba1f55e3384b7b1e
3
+ size 128306
89E4T4oBgHgl3EQf3A3O/content/tmp_files/2301.05303v1.pdf.txt ADDED
@@ -0,0 +1,1837 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.05303v1 [eess.SY] 12 Jan 2023
2
+ 1
3
+ Probabilistic Constraint Construction for
4
+ Network-safe Load Coordination
5
+ Sunho Jang, Student Member, IEEE, Necmiye Ozay, Senior Member, IEEE,
6
+ Johanna L. Mathieu, Senior Member, IEEE
7
+ Abstract—Distributed Energy Resources (DERs) can provide
8
+ balancing services to the grid, but their power variations might
9
+ cause voltage and current constraint violations in the distribution
10
+ network, compromising network safety. This could be avoided by
11
+ including network constraints within DER control formulations,
12
+ but the entities coordinating DERs (e.g., aggregators) may not
13
+ have access to network information, which typically is known only
14
+ to the utility. Therefore, it is challenging to develop network-safe
15
+ DER control algorithms when the aggregator is not the utility;
16
+ it requires these entities to coordinate with each other. In this
17
+ paper, we develop an aggregator-utility coordination framework
18
+ that enables network-safe control of thermostatically-controlled
19
+ loads to provide frequency regulation. In our framework, the
20
+ utility sends a network-safe constraint set on the aggregator’s
21
+ command without directly sharing any network information. We
22
+ propose a constraint set construction algorithm that guarantees
23
+ satisfaction of a chance constraint on network safety. Assuming
24
+ monotonicity of the probability of network safety with respect
25
+ to the aggregator’s command, we leverage the bisection method
26
+ to find the largest possible constraint set, providing maximum
27
+ flexibility to the aggregator. Simulations show that, compared to
28
+ two benchmark algorithms, the proposed approach provides a
29
+ good balance between service quality and network safety.
30
+ Index Terms—chance constraints, distributed energy resources,
31
+ load control, network safety, thermostatically-controlled loads
32
+ I. INTRODUCTION
33
+ A
34
+ S the amount of intermittent renewable generation is
35
+ rapidly growing, it is becoming more difficult to rely
36
+ solely on the conventional ways of balancing power systems.
37
+ One emerging solution is to leverage Distributed Energy
38
+ Resources (DERs), such as thermostatically-controlled loads
39
+ (TCLs), batteries, and electric vehicles, to provide grid ser-
40
+ vices. By doing so, they can improve the reliability, and
41
+ reduce the operating cost and environmental impact of power
42
+ systems. However, DERs coordinated to provide balancing
43
+ services might cause issues in the distribution network, such as
44
+ under/over-voltages, over-current violations, and transformer
45
+ overheating, compromising network safety.
46
+ When the distribution network operator (i.e., the utility)
47
+ coordinates DERs to provide grid services it can adopt a cen-
48
+ tralized algorithm that explicitly manages distribution network
49
+ constraints, e.g., the algorithms provided in [1]–[3]. However,
50
+ in competitive U.S. electricity markets it is becoming more
51
+ likely that third-party (i.e., non-utility) DER aggregators will
52
+ take on this role. Unfortunately, the aggregator does not have
53
+ This work was supported by U.S. National Science Foundation Award
54
+ CNS-1837680. The authors are with the Department of Electrical Engineering
55
+ and Computer Science, University of Michigan, Ann Arbor, MI 48109 USA
56
+ {sunhoj,necmiye,jlmath}@umich.edu.
57
+ access to detailed distribution network information typically
58
+ known only to the utility, and so it is unable to directly de-
59
+ termine how its actions would affect the distribution network.
60
+ This challenge has already been recognized by the US Federal
61
+ Energy Regulatory Commission (FERC) [4].
62
+ Thus, there is a need for coordination between the aggrega-
63
+ tor and the utility to ensure network-safe operation of DERs.
64
+ The recent FERC Order No. 2222 [5] provided some guidance
65
+ on the development of operational coordination architectures
66
+ between DER aggregators, utilities, and market coordinators;
67
+ however, it is still unclear how these architectures will evolve
68
+ and which architecture is “best.” Beyond ensuring network
69
+ safety, coordination architectures should also 1) ensure that
70
+ each entity’s private information (e.g., sensitive network in-
71
+ formation held by the utility, proprietary DER coordination
72
+ strategies held by the aggregator, and private DER state
73
+ information held by the DERs’ end-users) is not shared with
74
+ the other entities and 2) communication between the entities
75
+ is minimal for compatibility with current communications
76
+ infrastructure and/or to reduce the cost of any newly required
77
+ infrastructure. Furthermore, architectures need to specify coor-
78
+ dination protocols on different timescales, for example, 1) for
79
+ operational planning such that the aggregator can determine
80
+ its offer for balancing services, and 2) for real-time control
81
+ in case network conditions differ significantly from forecasts
82
+ and aggregator actions need to be curtailed.
83
+ In this paper, we propose an aggregator-utility coordination
84
+ framework for a collection of TCLs to provide balancing
85
+ services like frequency regulation while ensuring distribution
86
+ network-safety with high probability. We focus on real-time
87
+ coordination, specifically, a setting in which an aggregator is
88
+ already committed to provide a certain amount of balancing
89
+ services, but real-time distribution network conditions require
90
+ curtailment of those services. In our framework, the utility
91
+ sends the aggregator a one-step ahead constraint set on the
92
+ aggregator’s control input, which guarantees the satisfaction of
93
+ a chance constraint on network safety with a certain confidence
94
+ level. This method leverages estimation from Monte Carlo
95
+ simulation and the bisection method to provide the largest
96
+ possible constraint set to maximize the network-safe TCL
97
+ flexibility. To achieve light communication requirements, the
98
+ aggregator control algorithm assumes the TCLs all respond to
99
+ the same scalar control input. This constrains the aggregator’s
100
+ degrees-of-freedom but also makes it possible for the utility
101
+ to define a simple constraint set on the control input.
102
+ Previous work, e.g. [6]–[9], has proposed strategies to con-
103
+ trol aggregations of TCLs, such as air conditioners and water
104
+
105
+ 2
106
+ heaters, to provide balancing services in ways that are non-
107
+ disruptive to end-users. TCLs have inherent thermal energy
108
+ storage capacity and non-disruptiveness can be achieved, e.g.,
109
+ by keeping internal temperatures inside a narrow temperature
110
+ dead-band. However, network safety was not considered in the
111
+ above papers. Some work has developed network-safe control
112
+ algorithms for TCLs coordinated by third-party aggregators.
113
+ Ref. [10] proposes both a utility-centric and an aggregator-
114
+ centric coordination framework, differentiated by which entity
115
+ ultimately sends control commands to the TCLs. That paper
116
+ and [11] develop utility-centric strategies wherein the utility
117
+ blocks aggregator’s commands that would otherwise cause net-
118
+ work constraint violations. In contrast, our proposed approach
119
+ would be considered aggregator-centric.
120
+ Aggregator-centric network-safe DER coordination could
121
+ be achieved through (convex) inner approximation of safe
122
+ operating regions [12]–[14], which could be computed by the
123
+ utility and sent to the aggregator as constraints on the net
124
+ DER power deviations at each node. Research from Australia
125
+ refers to these nodal constraints as operating envelopes [15]–
126
+ [17]. Ref. [18] proposes an optimization problem to obtain a
127
+ hyper-rectangular constraint set on the net power consumption
128
+ of controllable DERs at each node in order to satisfy chance
129
+ constraints on the voltage at each node. However, these
130
+ approaches all require constraints to be applied at each node,
131
+ rather than applying a constraint on aggregate power devia-
132
+ tions by DERs located across a network. Ref. [19] proposes a
133
+ method to constrain the norm of the power deviations across
134
+ all nodes in the network, but requires significant computation
135
+ to compute the constraint. Assuming an aggregate power
136
+ deviation constraint exists, our previous work [20] develops an
137
+ aggregator-centric TCL coordination algorithm using formal
138
+ methods, but does not develop an approach to obtain the
139
+ constraint, and the solutions are very conservative.
140
+ In contrast to this previous work, this paper makes the
141
+ following contributions: 1) we develop a new aggregator-
142
+ centric approach to enable network-safe control of TCLs for
143
+ balancing services; 2) assuming a simple control scheme that
144
+ leverages a scalar control input to coordinate TCLs to provide
145
+ balancing services (the aggregator’s algorithm), we develop
146
+ an approach to constrain the control input to satisfy a chance
147
+ constraint on network safety (the utility’s algorithm); and
148
+ 3) we demonstrate our approach in simulation and compare
149
+ its performance to two benchmark approaches. In contrast to
150
+ past work on network-safe control that assumes the system is
151
+ deterministic, e.g., [19], here we consider uncertainty in the
152
+ power consumption of non-participating loads. Furthermore,
153
+ in contrast to [20], we assume the aggregator has incomplete
154
+ information about the TCLs to reduce communication require-
155
+ ments and preserve some level of privacy. Lastly, though some
156
+ past work leveraged chance constraints to develop network-
157
+ safe DER coordination approaches, e.g., [18], [21]–[26], these
158
+ papers all assume that the controller has detailed distribution
159
+ network information (enabling the formulation of a chance-
160
+ constrained optimal power flow problem), which is inconsis-
161
+ tent with our utility-aggregator coordination framework.
162
+ The organization of the paper is as follows. Section II
163
+ introduces the coordination framework and problem of in-
164
+ terest. Section III explains the aggregator’s control approach
165
+ and Section IV details the proposed constraint construction
166
+ algorithm used by the utility to achieve network safety at
167
+ a high level of probability. Section V presents the results
168
+ of a case study comparing the proposed approach to two
169
+ benchmarks. The appendix includes proofs of two of the
170
+ theorems.
171
+ Notation: N, [N], [N]0 are the set of natural num-
172
+ bers, {1, . . ., N}, and {0, 1, . . ., N}, respectively. The n-
173
+ dimensional Euclidean space is Rn. The jth element of the
174
+ vector y is yj. Binomial distribution B(ns, ν) has ns trials,
175
+ each with success probability ν, and cumulative density func-
176
+ tion (cdf) FB(x; ns, ν). N(µ, σ2) is the normal distribution
177
+ with mean µ and variance σ2. Function
178
+ 1(A) is 1 if A is
179
+ true, and 0 otherwise. All random variables are capitalized
180
+ English letters, e.g., X, with realizations denoted ˜x and esti-
181
+ mates/approximates denoted ˆx. All other variables are denoted
182
+ by symbols other than capitalized English letters. Vectors and
183
+ matrices are bolded.
184
+ II. FRAMEWORK & PROBLEM OF INTEREST
185
+ We consider a framework in which a utility and aggregator
186
+ coordinate to provide network-safe grid balancing services,
187
+ e.g., frequency regulation, by aggregations of TCLs. TCLs
188
+ switch ON/OFF to maintain temperature within a dead-band.
189
+ We focus on real-time coordination, i.e., we assume that the
190
+ aggregator has already participated in the ancillary services
191
+ market and committed balancing service capacity to the in-
192
+ dependent system operator (ISO). The amount of balancing
193
+ service capacity offered by the aggregator was based on
194
+ forecasts of the capabilities of the TCLs and the network state.
195
+ However, the real-time network state differs significantly from
196
+ its forecasts and so the committed balancing service capacity
197
+ must be curtailed to avoid distribution network constraint
198
+ violations. This could happen when load consumption and/or
199
+ renewable power injections are significantly different from
200
+ forecasts and the network is operating close to its limits.
201
+ We assume that the following coordination steps occur at
202
+ each discrete time step t, where the length of each time step
203
+ is ∆t. The coordination scheme is shown in Fig. 1.
204
+ 1) The aggregator receives a constraint set U(t) from the
205
+ utility and a reference signal pref(t) (e.g., a scaled and
206
+ biased frequency regulation signal) from the ISO.
207
+ 2) The aggregator determines the control command u(t) ∈
208
+ U(t) and broadcasts the same command to all TCLs.
209
+ 3) Each TCL maintains or switches its ON/OFF mode based
210
+ on its temperature and the aggregator’s command u(t).
211
+ 4) The utility observes the real and reactive power consump-
212
+ tion at each network node p(t) and q(t), and obtains
213
+ some information from the aggregator (described below).
214
+ Then, it constructs a one-step ahead constraint set U(t+1)
215
+ and sends it to the aggregator. (And go back to step 1.)
216
+ The aggregator’s goal is to select u(t) to maximize the
217
+ quality of grid balancing services. This means that the aggre-
218
+ gator should choose a command u(t) that is likely to adjust
219
+ the aggregate power of the TCLs to match the reference
220
+ signal pref(t) as closely as possible. Here, we assume the
221
+
222
+ 3
223
+ Fig. 1. Coordination between the aggregator, utility, and the TCLs.
224
+ aggregator’s command u(t) is a real scalar in the range [−1, 1]
225
+ and is interpreted by each TCL as the probability it should
226
+ switch modes; the details of how it switches are given in
227
+ Section III. TCL coordination through probabilistic switching
228
+ has been considered in previous work e.g., [6], [10]. An
229
+ advantage of this type of command is that it only needs simple
230
+ broadcast communication infrastructure. However, it does not
231
+ allow the aggregator to directly adjust the power consumption
232
+ of individual TCLs, which means that the aggregator has a
233
+ low degree-of-freedom in control.
234
+ Since the aggregator does not have detailed distribution
235
+ network information and cannot evaluate how its command
236
+ would affect the network, the utility sends a one-step ahead
237
+ constraint set U(t+1) on the aggregator’s command u(t+1).
238
+ This set U(t+1) is designed such that, if u(t+1) ∈ U(t+1),
239
+ then probability of network safety is over a desired value 1−ǫ.
240
+ We propose a method for the utility to compute U(t + 1) in
241
+ Section IV, which is the main contribution of this work. To
242
+ do this, the utility leverages:
243
+ 1) Real-time data from household smart meters to obtain
244
+ the real and reactive power consumption at each node, p(t)
245
+ and q(t). We recognize that in practice most utilities do not
246
+ currently gather smart meter data in real-time, but this is
247
+ possible with most existing smart meters and could be enabled
248
+ through reconfiguration of their settings.
249
+ 2) Forecasts of the probability distributions of the one-
250
+ step ahead real and reactive power consumption of non-
251
+ participating loads at each node, P L(t+1) and QL(t+1). We
252
+ assume that these distributions are estimated using historical
253
+ and real-time data from household smart meters, and lever-
254
+ aging a disaggregation technique [27] to separate the power
255
+ consumption of the TCLs from that of the non-participating
256
+ loads. We assume that P L(t) and QL(t) are correlated and
257
+ fP L,QL(t) is their joint probability density function (pdf).
258
+ 3) Some real-time TCL information from the aggregator
259
+ that is necessary for constraint set computation. This should
260
+ be minimal to protect end-user privacy. In our framework, the
261
+ aggregator provides the one-step ahead estimated fractions of
262
+ TCLs that will be outside of their temperature dead-band and
263
+ switched OFF-to-ON and ON-to-OFF by their thermostats,
264
+ ˆ
265
+ wON(t + 1) and ˆ
266
+ wOFF(t + 1). Details on how this information
267
+ is used are provided in Section IV-A.
268
+ In this paper, for the sake of simplicity, we define network
269
+ safety in terms of under-voltage violations. Specifically, we
270
+ say that the network is safe if there are no under-voltage
271
+ violations, and unsafe if there are any violations. The approach
272
+ can be easily extended to include over-voltage violations and
273
+ other distribution network constraint violations. The formal
274
+ statement problem is as follows.
275
+ Problem 1. Given the desired safety probability 1−ǫ, the real-
276
+ time real and reactive power consumption at each node p(t)
277
+ and q(t), the joint pdfs of the uncontrollable loads fP L,QL(t),
278
+ fP L,QL(t + 1), and the fractions of TCLs that are outside of
279
+ their dead-band wON(t + 1), wOFF(t + 1), find a one-step
280
+ ahead constraint set U(t + 1) such that the following chance
281
+ constraint holds if u(t + 1) ∈ U(t + 1),
282
+ Pr
283
+
284
+ min
285
+ j∈[n] Vj(t + 1) ≥ v
286
+
287
+ ≥ 1 − ǫ,
288
+ (1)
289
+ where v is the lower bound on each of the nodal voltages Vj
290
+ and n is the number of nodes other than the substation.
291
+ To solve this problem, we define the one-time step ahead
292
+ voltage at each node Vj(t + 1) as a random variable whose
293
+ distribution depends on the command u(t + 1); the details are
294
+ explained in Section IV. It is difficult to obtain a closed-form
295
+ expression for the probability distribution of each Vj(t + 1).
296
+ Therefore, our approach leverages Monte Carlo simulation to
297
+ estimate the left side of (1) given a one-step ahead command
298
+ u(t + 1). Since estimation from sampling leads to error, we
299
+ find a constraint set U(t + 1) with a confidence level over a
300
+ desired level 1 − β rather than giving an exact solution.
301
+ III. AGGREGATOR’S CONTROL APPROACH
302
+ In this section, we explain how the TCLs operate under the
303
+ aggregator’s command u(t). For simplicity, we assume that all
304
+ participating TCLs are cooling TCLs (e.g., air conditioners),
305
+ though the approach also applies to heating TCLs. We denote
306
+ by nTCL the vector whose element nTCL
307
+ j
308
+ is the number of
309
+ participating TCLs at node j, and by nTCL := 1⊤nTCL the total
310
+ number of participating TCLs, which satisfies �n
311
+ j=1 nTCL
312
+ j
313
+ =
314
+ nTCL. The internal temperature of the ith TCL at time t is
315
+ denoted by θi(t) and its mode is denoted by mi(t), which
316
+ is 0 when it is OFF, and 1 when it is ON. The temperature
317
+ dynamics of the ith TCL follow the affine model from [28],
318
+ θi(t + 1) = ai
319
+ thθi(t) +
320
+
321
+ 1 − ai
322
+ th
323
+ � �
324
+ θi
325
+ a(t) + ri
326
+ thpi
327
+ trmi(t)
328
+
329
+ ,
330
+ (2)
331
+ where
332
+ θi
333
+ a(t)
334
+ is
335
+ the
336
+ ambient
337
+ temperature
338
+ and
339
+ ai
340
+ th
341
+ =
342
+ exp(−∆t/(ri
343
+ thci
344
+ th)) is a parameter computed from the thermal
345
+ resistance ri
346
+ th and capacitance ci
347
+ th of the ith TCL. Also, pi
348
+ tr is
349
+ the energy transfer rate of the ith TCL, which is negative for
350
+ a cooling TCL. The power consumption of the ith TCL in the
351
+ ON mode is pi := pi
352
+ tr/ζi where ζi is the coefficient of per-
353
+ formance; the power consumption in the OFF mode is 0. We
354
+ assume that the reactive power consumption of the ith TCL is
355
+ qi := ωipi, where ωi is a positive constant. The aggregate real
356
+ power consumption of the TCLs is pagg(t) := �nTCL
357
+ i=1 pimi(t).
358
+ Each TCL has a temperature range [θi, θ
359
+ i] within which its
360
+ internal temperature should always be; this range is called the
361
+ temperature dead-band. The temperature set-point, which is
362
+ set by its end-user, θi
363
+ s := (θi + θ
364
+ i)/2 is the middle point of
365
+ the dead-band. Whenever a TCL’s internal temperature reaches
366
+
367
+ Input
368
+ Reference
369
+ Constraints
370
+ Signal
371
+ Utility
372
+ Aggregator
373
+ Network
374
+ Aggregate
375
+ Probabilistic
376
+ information
377
+ Power
378
+ Input
379
+ TCL
380
+ TCL
381
+ TCL
382
+ Distribution
383
+ 1
384
+ 2
385
+ NT
386
+ Network
387
+ Aggregate TCLs4
388
+ or goes beyond the boundary of its dead-band it switches its
389
+ mode to go back into the dead-band.
390
+ At each time step t, the aggregator determines its command
391
+ u(t) and broadcasts it to all participating TCLs. TCLs within
392
+ their dead-bands interpret this command as the desired prob-
393
+ ability of OFF TCLs to switch ON when u(t) > 0, and the
394
+ desired probability of ON TCLs to switch OFF when u(t) < 0.
395
+ To determine whether or not to switch, each TCL draws a
396
+ random number zi(t) from the uniform distribution on the
397
+ interval [0, 1) and compares it to the command u(t). If it is
398
+ OFF and zi(t) ≤ u(t), then it switches ON. If it is ON and
399
+ zi(t) ≤ −u(t), then it switches OFF.
400
+ In summary, the mode of the ith TCL is
401
+ mi(t) =
402
+
403
+
404
+
405
+
406
+
407
+ 1
408
+ if θi(t) ≥ θ
409
+ i
410
+ 0
411
+ if θi(t) ≤ θi
412
+ mc(zi(t), u(t))
413
+ otherwise,
414
+ (3)
415
+ where mc(zi(t), u(t)) is equal to
416
+
417
+
418
+
419
+
420
+
421
+ 1
422
+ if mi(t − 1) = 0 and zi(t) ≤ u(t)
423
+ 0
424
+ if mi(t − 1) = 1 and zi(t) ≤ −u(t)
425
+ mi(t − 1)
426
+ otherwise.
427
+ Note that, when positive (negative) u(t) is broadcast to
428
+ the TCLs, the fraction of the OFF (ON) TCLs within their
429
+ dead-bands that are switched is approximately u(t) (−u(t)).
430
+ Thus, |u(t)| can be interpreted by the aggregator as the ratio
431
+ of the power consumption increase (decrease) compared to
432
+ the maximal increase (decrease). Therefore, even though the
433
+ power consumption of each TCL is not directly controlled
434
+ by the aggregator, the aggregator can manipulate pagg(t) by
435
+ selecting the u(t) ∈ U(t) that is likely to adjust pagg(t) to
436
+ match the reference signal pref(t) as closely as possible, i.e.,
437
+ uopt(t) = arg min
438
+ u∈U(t)
439
+ |E [Pagg(t)] − pref(t)| ,
440
+ (4)
441
+ where U(t) is provided by the utility.
442
+ IV. UTILITY’S CONSTRAINT CONSTRUCTION METHOD
443
+ As mentioned in Section II, the utility computes a one-step
444
+ ahead constraint set U(t + 1), which should be a solution to
445
+ Problem 1. This requires the utility to be able to evaluate
446
+ how the command u(t + 1) would affect the probability of
447
+ network safety. In this section, we first show how the voltage
448
+ at each node is modeled as a random variable. For ease
449
+ of exposition, we consider only balanced radial distribution
450
+ networks. Then, we derive the probability of network safety
451
+ (i.e., the probability that no under-voltage violations happen)
452
+ as a function of the command u(t + 1) = u.
453
+ Next, we show how to verify whether or not the chance
454
+ constraint (1) is satisfied under u(t + 1) = u with a desired
455
+ confidence level, and how the utility can construct U(t+1) to
456
+ ensure (1) is satisfied. We introduce a theorem establishing a
457
+ confidence interval for the success probability of a Bernoulli
458
+ random variable using Monte Carlo simulations. Using this
459
+ result, we leverage the bisection method to find the largest
460
+ upper bound on u(t + 1) that guarantees (1) with a desired
461
+ confidence level. The largest upper bound gives the aggregator
462
+ the greatest possible flexibility in determining its command.
463
+ A. Modeling the probability of network safety
464
+ We denote the real and reactive power consumption of
465
+ participating TCLs across all nodes by P T(t) and QT(t) ∈ Rn.
466
+ The utility approximates the nodal values as
467
+ P T
468
+ j (t) ≈ pjN ON
469
+ j
470
+ (t), QT
471
+ j (t) ≈ qjN ON
472
+ j
473
+ (t)
474
+ ∀j ∈ [n],
475
+ (5)
476
+ where N ON
477
+ j
478
+ (t) and N OFF
479
+ j
480
+ (t) are the number of ON and OFF
481
+ TCLs at node j, and pj and qj are the average real and reactive
482
+ power rating (i.e., the ON-mode consumption) of the TCLs at
483
+ node j. We additionally define diagonal matrices Ξp and Ξq ∈
484
+ Rn×n whose jth diagonal elements are pj and qj, respectively.
485
+ Then, P T(t) = ΞpN ON(t) and QT(t) = ΞqN ON(t), and the
486
+ total real and reactive power consumption across all nodes is
487
+ P (t) = ΞpN ON(t) + P L(t) and Q(t) = ΞqN ON(t) + QL(t).
488
+ We first show how the one-step ahead number of ON TCLs
489
+ N ON(t + 1) ∈ Rn is modeled as a random variable under the
490
+ command u(t+1) = u. The number N ON(t+1) depends upon
491
+ how many TCLs are switched both by their thermostat (i.e., the
492
+ first and second cases of (3)) and by the aggregator’s command
493
+ (i.e., the third case of (3)). The number of TCLs at each node
494
+ j that will be switched ON, OFF by their thermostats is
495
+ SON
496
+ j (t + 1) = wON
497
+ j (t + 1)N OFF
498
+ j
499
+ (t),
500
+ SOFF
501
+ j
502
+ (t + 1) = wOFF
503
+ j
504
+ (t + 1)N ON
505
+ j
506
+ (t),
507
+ (6)
508
+ where, as defined in Section II, wON
509
+ j
510
+ (t + 1) is the one-step
511
+ ahead fraction of OFF TCLs that will be switched ON and
512
+ wOFF
513
+ j
514
+ (t + 1) is the one-step ahead fraction of ON TCLs that
515
+ will be switched OFF by their thermostats at bus j. We assume
516
+ that the aggregator estimates wON
517
+ j (t + 1) and wOFF
518
+ j
519
+ (t + 1)
520
+ using a model of the aggregate TCL dynamics and sends
521
+ the estimated values ˆwON
522
+ j (t + 1) and ˆwOFF
523
+ j
524
+ (t + 1) to the
525
+ utility, which corresponds to the TCL information illustrated
526
+ in Fig. 1. The utility uses these estimates to obtain realizations
527
+ of SON
528
+ j (t + 1) and SOFF
529
+ j
530
+ (t + 1) via Monte Carlo simulation,
531
+ which will be explained in Section IV-B.
532
+ According to (3), the numbers of TCLs at each node j that
533
+ will be switched ON and OFF by the aggregator’s command
534
+ follow binomial distributions,
535
+ CON
536
+ u,j(t + 1) ∼ B
537
+
538
+ N OFF
539
+ j
540
+ (t) − SON
541
+ j (t + 1), u+�
542
+ ,
543
+ COFF
544
+ u,j (t + 1) ∼ B
545
+
546
+ N ON
547
+ j
548
+ (t) − SOFF
549
+ j
550
+ (t + 1), u−�
551
+ ,
552
+ (7)
553
+ where u+ := max(u, 0) and u− = max(−u, 0). Therefore,
554
+ the number of ON TCLs given the command u(t + 1) = u is
555
+ N ON
556
+ u (t + 1) = N ON(t) + SON(t + 1)
557
+ −SOFF(t + 1) + CON
558
+ u (t + 1) − COFF
559
+ u
560
+ (t + 1). (8)
561
+ Since the distributions of CON
562
+ u,j(t + 1) and COFF
563
+ u,j (t + 1) depend
564
+ on u, the real and reactive power consumption across all nodes
565
+ P (t+1) and Q(t+1) also depend on u. Therefore, from now
566
+ on, we denote these random variables under the one-step ahead
567
+ command u(t + 1) = u as Pu(t + 1) and Qu(t + 1).
568
+ The next step is to model the one-step ahead voltage
569
+ Vj(t + 1) at each node j as a random variable. Suppose that
570
+ vj is the voltage magnitude at node j; pb
571
+ j and qb
572
+ j are the
573
+ real and reactive power flowing through the branch whose
574
+ receiving end is node j; and the resistance and reactance
575
+
576
+ 5
577
+ of the branch are rj > 0 and xj > 0, respectively. Then,
578
+ the DistFlow equations [29] corresponding to a single-phase
579
+ equivalent model of a radial three-phase balanced network are
580
+ pb
581
+ j =
582
+
583
+ k∈c(j)
584
+ pb
585
+ k + pj + rj|ib
586
+ j|
587
+ qb
588
+ j =
589
+
590
+ k∈c(j)
591
+ qb
592
+ k + qj + xj|ib
593
+ j|
594
+ v2
595
+ j = v2
596
+ e(j) − 2(rjpb
597
+ j + xjqb
598
+ j) + (r2
599
+ j + x2
600
+ j)|ib
601
+ j|,
602
+ (9)
603
+ where e(j) and c(j) are the parent node and set of child
604
+ nodes of node j, respectively, and |ib
605
+ j|= ((pb
606
+ j)2 + (qb
607
+ j)2)/v2
608
+ e(j)
609
+ is the magnitude of the current flowing through the branch
610
+ whose receiving end is node j. Given real and reactive power
611
+ consumption p and q ∈ Rn and substation voltage v0, we
612
+ let fvj(p, q, v0) be the voltage solution of (9), which can
613
+ be obtained by various algorithms such as Backward-Forward
614
+ Sweep [30]. Then, the one-step ahead voltage at node j under
615
+ the command u(t + 1) = u is Vu,j(t + 1) = fvj(Pu(t +
616
+ 1), Qu(t + 1), v0). Note that we cannot obtain an explicit pdf
617
+ of Vu,j(t + 1) since there is no closed-form solution of fvj.
618
+ Instead, we can obtain a realization of Vu,j(t + 1) by solving
619
+ (9) for a set of realizations ˜p and ˜q of Pu(t+1) and Qu(t+1).
620
+ Finally, we define a Bernoulli random variable that indicates
621
+ whether or not an under-voltage violation exists,
622
+ Xu(t + 1) =
623
+ 1
624
+
625
+ minj∈[n]Vu,j(t + 1) ≥ v
626
+
627
+ ,
628
+ (10)
629
+ whose success probability νu(t + 1) = Pr (Xu(t + 1) = 1)
630
+ corresponds to the one-step ahead probability of network
631
+ safety under command u(t + 1) = u. Thus, the utility’s
632
+ problem is to find a set U(t+1) such that, for any u ∈ U(t+1),
633
+ νu(t+1) is larger than 1−ǫ with confidence level over 1−β.
634
+ The solution to this problem is explained in the next section.
635
+ B. Probabilistically-safe set construction
636
+ In this section, we first present a theorem on computing a
637
+ confidence interval for the success probability of a Bernoulli
638
+ random variable via a Monte Carlo simulation. Based on this
639
+ theorem, we then show how the utility can test whether a
640
+ command u(t + 1) = u is probabilistically safe and how this
641
+ test procedure can be used to construct the set U(t + 1) of all
642
+ commands that satisfy the chance constraint.
643
+ Theorem 1. Suppose that X(1), . . . , X(ns) are i.i.d. samples of
644
+ a random variable X following Bernoulli distribution B(1, ν)
645
+ for a positive ν (i.e. Pr(X(i) = 1) = ν, Pr(X(i) = 0) = 1−ν
646
+ for any i ∈ [ns]). Let Mns := �ns
647
+ i=1 X(i)/ns be the estimator
648
+ of ν, and ˜mns a realization of Mns. If the following inequalities
649
+ hold,
650
+ ˜mns > 1 − ǫ
651
+ (11)
652
+ ns > ln
653
+ � 1
654
+ β
655
+
656
+ 1
657
+ ( ˜mns + ǫ) ln( ˜mns + ǫ) − ( ˜mns + ǫ − 1), (12)
658
+ then [1 − ǫ, 1] is a confidence interval for the success proba-
659
+ bility ν of X with the confidence level over 1 − β.
660
+ The proof is given in Appendix A. In our problem, ˜mns is a
661
+ realization of an estimator of the success probability νu(t+1)
662
+ obtained from realizations of Xu(t+1). This theorem implies
663
+ that, if both ˜mns and the number of samples ns are sufficiently
664
+ large, then νu(t+1) is larger than 1−ǫ. Thus, to verify whether
665
+ or not νu(t + 1) is larger than 1 − ǫ, the utility can obtain a
666
+ number of realizations of Xu(t + 1) and check if inequalities
667
+ (11) and (12) hold.
668
+ Now, we introduce the procedure the utility uses to obtain
669
+ realizations of Xu(t + 1) given some u ∈ [−1, 1]. The utility
670
+ first computes the probability mass function (pmf) of N ON(t)
671
+ given the observed p(t) and q(t) as follows,
672
+ Pr
673
+
674
+ N ON(t) = nON | (P (t) = p(t)) ∩ (Q(t) = q(t))
675
+
676
+ =
677
+ Pr
678
+ � �
679
+ P L(t) = p(t) − ΞpnON�
680
+
681
+
682
+ QL(t) = q(t) − ΞqnON�
683
+ | (P (t) = p(t)) ∩ (Q(t) = q(t))
684
+
685
+ =
686
+ fP L,QL
687
+
688
+ p(t) − ΞpnON, q(t) − ΞqnON�
689
+
690
+ n∈NON fP L,QL (p(t) − Ξpn, q(t) − Ξqn),
691
+ (13)
692
+ where NON :=
693
+
694
+ nON | nON
695
+ j
696
+ ∈ [nTCL
697
+ j
698
+ ]0 ∀j ∈ [n]
699
+
700
+ is the set of
701
+ all possible vectors for N ON(t). Then, the utility obtains a
702
+ realization ˜xu(t + 1) of Xu(t + 1) through the following
703
+ sampling procedure, illustrated in Fig. 2.
704
+ Step 1) a. Obtain a realization ˜nON(t) of N ON(t) by sampling
705
+ from its pmf derived through (13), and compute
706
+ ˜nOFF(t) = nTCL − ˜nON(t).
707
+ b. Obtain realizations
708
+ ˜pL(t + 1) and ˜qL(t + 1) of P L(t + 1) and QL(t + 1)
709
+ by sampling from fP L,QL(t + 1).
710
+ Step 2) Obtain realizations ˜sON and ˜sOFF of SON(t + 1) and
711
+ SOFF(t + 1) by computing their elements per (6) as
712
+ ˜sON
713
+ j (t + 1) = ˆwON
714
+ j (t + 1)˜nOFF
715
+ j
716
+ (t) ∀j ∈ [n]
717
+ ˜sOFF
718
+ j
719
+ (t + 1) = ˆwOFF
720
+ j
721
+ (t + 1)˜nON
722
+ j (t) ∀j ∈ [n].
723
+ Step 3) Obtain
724
+ realizations
725
+ ˜cON
726
+ u (t + 1)
727
+ and
728
+ ˜cOFF
729
+ u
730
+ (t +
731
+ 1) of CON
732
+ u (t + 1) and COFF
733
+ u
734
+ (t + 1) by sam-
735
+ pling
736
+ their
737
+ elements
738
+ per
739
+ (7)
740
+ from
741
+ the
742
+ bino-
743
+ mial distributions B
744
+
745
+ ˜nOFF
746
+ j
747
+ (t) − ˜sON
748
+ j (t + 1), u+�
749
+ and
750
+ B
751
+
752
+ ˜nON
753
+ j (t) − ˜sOFF
754
+ j
755
+ (t + 1), u−�
756
+ .
757
+ Step 4) Obtain realizations of N ON
758
+ u (t+1), Pu(t+1), Qu(t+
759
+ 1), Vu(t + 1), and Xu(t + 1) as
760
+ ˜nON
761
+ u (t + 1) = ˜nON(t) + ˜sON(t + 1) − ˜sOFF(t + 1)
762
+ + ˜cON
763
+ u (t + 1) − ˜cOFF
764
+ u
765
+ (t + 1)
766
+ ˜pu(t + 1) = ˜pL(t + 1) + Ξp ˜nON
767
+ u (t + 1)
768
+ ˜qu(t + 1) = ˜qL(t + 1) + Ξq ˜nON
769
+ u (t + 1)
770
+ ˜vu,j(t + 1) = fvj(˜pu(t + 1), ˜qu(t + 1), v0) ∀j ∈ [n]
771
+ ˜xu(t + 1) =
772
+ 1(minj∈[n]˜vu,j(t + 1) ≥ v).
773
+ The utility can obtain multiple realizations of Xu(t + 1)
774
+ by iterating this sampling procedure. Denote each realization
775
+ i of Xu(t + 1) as ˜x(i)
776
+ u (t + 1), where i ∈ [ns]. In each
777
+ iteration, the utility updates the realization of the estimator
778
+ ˜mns = �ns
779
+ i=1 ˜x(i)
780
+ u (t + 1)/ns and checks if the inequalities
781
+ (11), (12) hold. If they do, u(t + 1) = u satisfies the
782
+ chance constraint with confidence level over 1−β; otherwise,
783
+ the utility continues to iterate until ns reaches some pre-
784
+ determined upper bound ns, as shown in Fig. 2.
785
+
786
+ 6
787
+ Fig. 2. Flowchart of the test procedure to check if a one-step ahead command
788
+ u(t + 1) = u satisfies the chance constraint. The information required for
789
+ each step is in orange.
790
+ Next, we construct a one-step ahead constraint set U(t+1).
791
+ We first make an assumption on the monotonicity of νu(t+1).
792
+ Assumption 1. The one-step ahead probability of network
793
+ safety νu(t + 1) monotonically decreases with respect to u.
794
+ The intuition behind this assumption is that the real and
795
+ reactive power consumption at each node is likely to increase
796
+ as u increases, which is also likely to lead to a voltage
797
+ decrease at every node. This assumption will be justified in
798
+ Section IV-C. Under this assumption, the following holds.
799
+ Theorem 2. Suppose that Assumption 1 holds and let ˜x(1)
800
+ u (t+
801
+ 1), . . . , ˜x(ns)
802
+ u
803
+ (t + 1) be ns realizations of Xu(t + 1) for a
804
+ command u ∈ [−1, 1]. If ns and ˜mns = �ns
805
+ i=1 ˜x(i)
806
+ u (t + 1)/ns
807
+ satisfy (11) and (12), then U(t + 1) = [−1, u] is a solution to
808
+ the Problem 1 with confidence level over 1 − β.
809
+ Proof. By Theorem 1, the interval [1 − ǫ, 1] is a confidence
810
+ interval for νu(t + 1) with confidence level over 1 − β. Also,
811
+ under Assumption 1, νu(t + 1) ≥ νu(t + 1) holds for any
812
+ u ∈ U(t + 1) = [−1, u]. Thus, νu(t + 1) is greater than or
813
+ equal to 1−ǫ for any u ∈ U(t+1) with confidence level over
814
+ 1 − β.
815
+ This theorem means that, if the one-step ahead probability
816
+ of network safety νu(t+1) under the command u(t+1) = u is
817
+ greater than or equal to the desired safety probability, then any
818
+ less aggressive command in the range [−1, u] also satisfies the
819
+ chance constraint. Therefore, a solution to Problem 1 is the
820
+ interval [−1, u], where u passes the test procedure in Fig. 2.
821
+ The choice of probabilistically-safe set U(t + 1) is not
822
+ unique. A larger U(t + 1) gives more flexibility to the aggre-
823
+ gator, potentially improves the quality of balancing services,
824
+ and reduces the conservativeness of our approach. Therefore,
825
+ the utility should find the largest possible u that passes the test
826
+ procedure. This can be achieved using the bisection method
827
+ [31], starting with u = 1.
828
+ Remark 1. To restrict the probability of over-voltage vi-
829
+ olations, we can also apply the monotonicity assumption;
830
+ the probability of over-voltage violations increases as the
831
+ command u decreases. In this case, we can use the bisection
832
+ method to obtain a lower bound on u(t + 1). Then, the utility
833
+ can send both a lower and upper bound on u(t+1) to restrict
834
+ the probability of over- and under-voltage violations.
835
+ Remark 2. Since the utility approximates P T and QT in
836
+ (5) and uses estimates of wON and wOFF in Step 2 of the
837
+ sampling procedure, Theorem 2 holds only if those approxi-
838
+ mations/estimates are accurate. We will justify the use of these
839
+ approximations/estimations through simulation in Section V.
840
+ C. Justification of Assumption 1
841
+ In this section, we justify Assumption 1 by showing that
842
+ an approximation of νu(t + 1) is a monotonically decreasing
843
+ function with respect to u. We consider the LinDistFlow
844
+ equations [32], which drop the nonlinear terms of (9), i.e.,
845
+ ˆpb
846
+ j =
847
+
848
+ k∈c(j)
849
+ ˆpb
850
+ k + pj,
851
+ ˆqb
852
+ j =
853
+
854
+ k∈c(j)
855
+ ˆqb
856
+ k + qj
857
+ ˆv2
858
+ j = ˆv2
859
+ e(j) − 2(rj ˆpb
860
+ j + xj ˆqb
861
+ j),
862
+ (14)
863
+ where variables with hats correspond to approximations of the
864
+ original DistFlow variables. Let ˆfvj(p, q, v0) be the voltage
865
+ solution of (14), i.e., ˆVu,j(t + 1) := ˆfvj(Pu(t + 1), Qu(t +
866
+ 1), v0) is the approximate voltage at node j. Also, let
867
+ ˆXu(t + 1) =
868
+ 1
869
+
870
+ minj∈[n] ˆVu,j(t + 1) ≥ v
871
+
872
+ ,
873
+ (15)
874
+ whose success probability ˆνu(t + 1) := Pr( ˆXu(t + 1) = 1)
875
+ approximates νu(t + 1). To show that ˆνu(t + 1) is decreasing
876
+ with respect to u, we start with a proposition.
877
+ Proposition 1. Suppose that p(1), p(2) ∈ Rn and q(1), q(2) ∈
878
+ Rn are different instances of real and reactive power con-
879
+ sumption where p(1)
880
+ j
881
+ ≤ p(2)
882
+ j
883
+ and q(1)
884
+ j
885
+ ≤ q(2)
886
+ j
887
+ ∀ j ∈ [n]. Then,
888
+ ˆfvj(p(1), q(1), v0) ≥ ˆfvj(p(2), q(2), v0) for all j ∈ [n].
889
+ Proof. First let ˆfpb
890
+ j(p, q, v0) and ˆfqb
891
+ j(p, q, v0) be the solutions
892
+ of (14) corresponding to pb
893
+ j and qb
894
+ j when the real and reactive
895
+ power consumption at each node are p and q, and the
896
+ substation voltage is v0. Then, for all j ∈ [n] [32]
897
+ ˆfpb
898
+ j(p, q, v0) =
899
+
900
+ k∈d(j)
901
+ pk,
902
+ ˆfqb
903
+ j(p, q, v0) =
904
+
905
+ k∈d(j)
906
+ qk
907
+ ˆf 2
908
+ vj(p, q, v0) = v2
909
+ 0 − 2
910
+
911
+ k∈a(j)
912
+
913
+ rk ˆfpb
914
+ k(p, q, v0)
915
+ + xk ˆfqb
916
+ k(p, q, v0)
917
+
918
+ ,
919
+ (16)
920
+ where d(j) := c(j)∪{j} is the set of indices of all descendants
921
+ of node j including itself, and a(j) is the set of indices of
922
+ all ancestors of node j including itself. Hence, ˆfpb
923
+ j(p, q, v0)
924
+ and ˆfqb
925
+ j(p, q, v0) are increasing as pk and qk increase for
926
+ all k ∈ [n], and ˆfpb
927
+ j(p(1), q(1), v0) ≤ ˆfpb
928
+ j(p(2), q(2), v0) and
929
+ ˆfqb
930
+ j(p(1), q(1), v0) ≤ ˆfqb
931
+ j(p(2), q(2), v0) for all j ∈ [n]. Also,
932
+ since all rk and xk are positive, ˆfvj(p, q, v0) is decreasing as
933
+
934
+ Initialize
935
+ ns ←1
936
+ fpLou (t),p(t),q(t)
937
+ Stepla
938
+ Step1b
939
+ fpLo
940
+ L(t+1)
941
+ Sample NON (t)
942
+ Sample
943
+ pl(t + 1), Q(t + 1)
944
+ WON(t + 1)
945
+ Step2
946
+ WOFF(t + 1)
947
+ Sample
948
+ sON(t + 1), SOFF(t + 1)
949
+ ns - ns +1
950
+ u(t+1)=u
951
+ Step3
952
+ Sample
953
+ CON(t +1),COFF(t+1)
954
+ Step 4
955
+ Step4
956
+ SampleNoN(t+1),Pu(t+1),Qu(t+1)
957
+ V,(t + 1), X,(t + 1) and obtain x(ns)(t + 1)
958
+ No
959
+ Do
960
+ x(t+1)
961
+ No
962
+ rns
963
+ Is
964
+ m
965
+ ns
966
+ ns
967
+ ns≥n,?
968
+ satisfy(10),(11)?
969
+ Yes
970
+ Yes
971
+ Safe
972
+ Unsafe7
973
+ Fig. 3. Demonstration of the monotonicity of νu(t + 1) with respect to u.
974
+ ˆfpb
975
+ k(p, q, v0) and ˆfqb
976
+ k(p, q, v0) increase for all k ∈ [n]. There-
977
+ fore, ˆfvj(p(1), q(1), v0) ≥ ˆfvj(p(2), q(2), v0) ∀ j ∈ [n].
978
+ This proposition states that ˆfvj(p, q, v0) monotonically de-
979
+ creases as the real and reactive power consumption pj and
980
+ qj at every node increase for all j ∈ [n]. Since the one-step
981
+ ahead real and reactive power consumption of the TCLs at
982
+ each node are likely to increase as u increases (recall that
983
+ in Section III we made the realistic assumption that TCLs
984
+ have constant lagging power factors, and so their real and
985
+ reactive power consumption change in the same direction),
986
+ this proposition implies that the probability of under-voltage
987
+ violations increases as u increases. This is stated in the
988
+ following theorem.
989
+ Theorem 3. The approximate probability of network safety
990
+ ˆνu(t + 1) under the one-step ahead command u is a mono-
991
+ tonically decreasing function of u.
992
+ The proof is given in Appendix B. While Theorem 3
993
+ justifies Assumption 1 for the approximation ˆνu(t + 1), we
994
+ also empirically validate that νu(t + 1) is a monotonically
995
+ decreasing function of u in Fig. 3. To create this plot, we
996
+ generated ns = 106 realizations of Xu(t + 1) for each of 101
997
+ uniformly spaced points u from -1 to 1.
998
+ V. CASE STUDY
999
+ We next present the result of a case study in which we com-
1000
+ pare the proposed approach with two benchmark approaches,
1001
+ a tracking controller benchmark and an Optimal Power Flow
1002
+ (OPF) benchmark. We first describe our simulation setup and
1003
+ detail the benchmark approaches. Then, we present our results.
1004
+ We use the 56-bus balanced distribution network from [33]
1005
+ where the nominal real and reactive power consumption at
1006
+ node j are denoted by pLn
1007
+ j
1008
+ and qLn
1009
+ j , respectively. We set
1010
+ the safe lower bound on the voltage to v
1011
+ = 0.95 pu.
1012
+ TCL parameters are randomly sampled1, and the TCLs are
1013
+ distributed throughout the network so that the aggregate
1014
+ TCLs’ nominal real power consumption at node j is ap-
1015
+ proximately 0.25pLn
1016
+ j . For simplicity, we assume that the
1017
+ real and reactive power consumption of the non-participating
1018
+ loads at each node P L
1019
+ j (t) and QL
1020
+ j (t) follow normal distribu-
1021
+ tions N(pLn
1022
+ j (t), (0.15pLn
1023
+ j )2) and N(qLn
1024
+ j (t), (0.15qLn
1025
+ j )2) trun-
1026
+ cated by the intervals [pLmin
1027
+ j
1028
+ , pLmax
1029
+ j
1030
+ ] = [−0.25pLn
1031
+ j , 0.675pLn
1032
+ j ]
1033
+ and [qLmin
1034
+ j
1035
+ , qLmax
1036
+ j
1037
+ ] = [−0.25qLn
1038
+ j , 0.675qLn
1039
+ j ], respectively. We
1040
+ 1Each parameter is sampled from uniform distributions with intervals:
1041
+ θi
1042
+ a ∈ [29, 31] °C, ci
1043
+ th ∈ [1.5, 2.5]kWh/°C, ri
1044
+ th = [1.2, 2.5]°C/kW, pi
1045
+ tr ∈
1046
+ [−18, −14] kW, ζi ∈ [2.3, 2.7], θi
1047
+ s ∈ [20, 25]°C, θ
1048
+ i − θi ∈ [1.5, 2]°C, and
1049
+ ωi = tan(arccos(φi)), where φi ∈ [0.95, 0.99].
1050
+ 13
1051
+ 13.5
1052
+ 14
1053
+ 14.5
1054
+ 15
1055
+ Time (h)
1056
+ 0
1057
+ 0.01
1058
+ 0.02
1059
+ 0.03
1060
+ 0.04
1061
+ 0.05
1062
+ 0.06
1063
+ 0.07
1064
+ Fraction of TCLs
1065
+ Actual Fraction
1066
+ Estimated Fraction
1067
+ 13
1068
+ 13.5
1069
+ 14
1070
+ 14.5
1071
+ 15
1072
+ Time (h)
1073
+ 0
1074
+ 0.02
1075
+ 0.04
1076
+ 0.06
1077
+ 0.08
1078
+ 0.1
1079
+ Fraction of TCLs
1080
+ Actual Fraction
1081
+ Estimated Fraction
1082
+ Fig. 4. Actual and estimated fractions of TCLs switched ON (left) and OFF
1083
+ (right) by their thermostats, in the proposed approach (ǫ = 0.02).
1084
+ conduct 2h simulations (13h-15h) and let pLn
1085
+ j (t) and qLn
1086
+ j (t)
1087
+ linearly increase from 0.5 to 0.65 of their nominal values
1088
+ from 13.0h to 13.9h, stay constant from 13.9h to 14.1h, and
1089
+ linearly decrease to 0.5 of their nominal values from 14.1h to
1090
+ 15.0h. The reference signal pref(t) is a scaled and shifted 2h
1091
+ segment of a PJM RegD signal [34]. We use the desired safety
1092
+ probabilities 1−ǫ = 0.95 and 0.98 and the desired confidence
1093
+ level 1 − β = 0.999.
1094
+ The aggregator obtains the estimates
1095
+ ˆwON
1096
+ j (t + 1) and
1097
+ ˆwOFF
1098
+ j
1099
+ (t + 1) for each node leveraging an approximate model
1100
+ of the dynamics of the TCL aggregation. The model was
1101
+ developed in past work, e.g., [6], and so not detailed here.
1102
+ While we could identify different models for each node,
1103
+ here we use the same model for each node j ∈ [n] and so
1104
+ ˆwON
1105
+ j (t + 1) and ˆwOFF
1106
+ j
1107
+ (t + 1) are identical across nodes. Fig. 4
1108
+ demonstrates the model’s estimation performance, showing the
1109
+ actual and estimated fractions of TCLs outside of their dead-
1110
+ bands. Although the estimates do not perfectly track the actual
1111
+ values, they capture the overall trends.
1112
+ The tracking controller benchmark does not take into ac-
1113
+ count network safety. It chooses the optimal command uopt(t)
1114
+ using (4) with U(t) = [−1, 1], where E [Pagg(t)] is the
1115
+ expected aggregate power of the TCLs under u(t) = u, which
1116
+ is computed with the same approximate aggregate TCL model.
1117
+ The OPF benchmark approximately enforces network safety
1118
+ assuming linearized power flow. It solves the following mixed
1119
+ integer linear program at each time step to compute the optimal
1120
+ one-step ahead mode of each TCL,
1121
+ min
1122
+ mi |pagg − pref|
1123
+ (17a)
1124
+ s.t. pagg =
1125
+ nTCL
1126
+
1127
+ i=1
1128
+ pimi
1129
+ (17b)
1130
+ pT
1131
+ j =
1132
+
1133
+ i∈Ij
1134
+ pimi, qT
1135
+ j =
1136
+
1137
+ i∈Ij
1138
+ qimi,
1139
+ ∀j ∈ [n]
1140
+ (17c)
1141
+ TCL temperature dynamics (2),
1142
+ ∀i ∈ [nTCL]
1143
+ (17d)
1144
+ θi ∈ [θi, θi],
1145
+ ∀i ∈ [nTCL]
1146
+ (17e)
1147
+ v = Φp(pT + pLmax) + Φq(qT + qLmax) + Φc
1148
+ (17f)
1149
+ v ≤ v,
1150
+ (17g)
1151
+ where Ij is the set of indices of TCLs connected to j and
1152
+ (17f) is the linearized power flow developed in [1]. The OPF
1153
+ benchmark is different from the proposed approach and opti-
1154
+ mal tracking controller in that it can observe the TCLs’ internal
1155
+ temperatures and directly control the TCLs’ modes. In contrast
1156
+ to the proposed approach, it has a deterministic constraint
1157
+ (17g) on network safety rather than a chance constraint.
1158
+
1159
+ 1.00
1160
+ 0.75
1161
+
1162
+ +0.50
1163
+ 0.25
1164
+ 0.00
1165
+ 1.0
1166
+ -0.5
1167
+ 0.0
1168
+ 0.5
1169
+ 1.0
1170
+ u8
1171
+ 0
1172
+ 0.5
1173
+ 1
1174
+ 1.5
1175
+ 2
1176
+ Power (MW)
1177
+ Ref Signal
1178
+ Agg Power
1179
+ Nom Power
1180
+ 13
1181
+ 13.5
1182
+ 14
1183
+ 14.5
1184
+ 15
1185
+ Time (h)
1186
+ 0.94
1187
+ 0.95
1188
+ 0.96
1189
+ 0.97
1190
+ 0.98
1191
+ Voltage (V)
1192
+ Minimum Voltage
1193
+ Lower Bound
1194
+ 13.5
1195
+ 14
1196
+ 14.5
1197
+ 15
1198
+ Time (h)
1199
+ 13.5
1200
+ 14
1201
+ 14.5
1202
+ 15
1203
+ Time (h)
1204
+ 13.5
1205
+ 14
1206
+ 14.5
1207
+ 15
1208
+ Time (h)
1209
+ Fig. 5. The reference signal and the TCLs’ aggregate power (top), and the minimum network voltage and the safe lower bound (bottom) for each algorithm.
1210
+ TABLE I
1211
+ TRACKING AND SAFETY PERFORMANCE OF EACH ALGORITHM
1212
+ Track Ctrl
1213
+ OPF
1214
+ Proposed Approach
1215
+ Benchmark
1216
+ Benchmark
1217
+ ǫ = 0.05
1218
+ ǫ = 0.02
1219
+ RMSE (kW)
1220
+ 77.05
1221
+ 168.3
1222
+ 102.8
1223
+ 118.8
1224
+ Safety Probability
1225
+ 0.908
1226
+ 1.00
1227
+ 0.981
1228
+ 0.986
1229
+ Fig. 5 illustrates the results of the comparison between the
1230
+ two benchmarks and our proposed approach with ǫ = 0.05 and
1231
+ 0.02. Table I shows the root mean squared error (RMSE) of
1232
+ the aggregate power from the reference signal, along with the
1233
+ empirical safety probability computed as the fraction of time
1234
+ steps in which under-voltage violations (computed with the
1235
+ nonlinear power flow equations) do not happen. The tracking
1236
+ controller benchmark has the best tracking performance, but
1237
+ frequently causes under-voltage violations. This demonstrates
1238
+ the need to employ network-safe DER control strategies. In
1239
+ contrast, the OPF benchmark avoids under-voltage violations,
1240
+ but has the worst tracking performance, demonstrating that
1241
+ approaches that (approximately) enforce network safety will
1242
+ at times have poor balancing service performance.
1243
+ Our approach achieves a better trade-off between tracking
1244
+ performance and network safety; specifically, it achieves better
1245
+ tracking performance than the OPF benchmark and satisfies
1246
+ the chance constraint on network safety, resulting in fewer
1247
+ under-voltage violations than the tracking controller bench-
1248
+ mark. As shown in Table I, the empirical safety probabilities
1249
+ are over the target values 1 − ǫ. The RMSE increases as ǫ
1250
+ decreases, which is expected since higher 1−ǫ results in more
1251
+ conservative bounds on the input commands.
1252
+ VI. CONCLUSION
1253
+ This paper proposed an approach to coordinate a collection
1254
+ of TCLs to provide balancing services while guaranteeing
1255
+ network safety with high probability. In particular, we pro-
1256
+ posed a constraint construction method that would allow the
1257
+ utility to constrain the input commands of an aggregator
1258
+ providing balancing services like frequency regulation. The
1259
+ approach imposes a chance constraint on network safety,
1260
+ wherein both the violation probability and confidence level are
1261
+ design parameters that can be selected by the utility. We used
1262
+ the bisection method to compute the largest possible constraint
1263
+ set, which provides the most flexibility to the aggregator.
1264
+ Future work will extend the proposed approach to incor-
1265
+ porate different types of DERs, such as stationary batteries,
1266
+ electric vehicles, and curtailable solar photovoltaics, into the
1267
+ framework; we already have some preliminary work along this
1268
+ direction [35].
1269
+ REFERENCES
1270
+ [1] E. Dall’Anese, S. Guggilam, A. Simonetto, Y. C. Chen, and S. Dhople,
1271
+ “Optimal regulation of virtual power plants,” IEEE Trans. Power Syst.,
1272
+ vol. 33, no. 2, pp. 1868–1881, 2017.
1273
+ [2] A. Bernstein and E. Dall’Anese, “Real-time feedback-based optimization
1274
+ of distribution grids: A unified approach,” IEEE Trans. Control Netw.
1275
+ Syst., vol. 6, no. 3, pp. 1197–1209, 2019.
1276
+ [3] E. Vrettos and G. Andersson, “Combined load frequency control and
1277
+ active distribution network management with thermostatically controlled
1278
+ loads,” in IEEE Int. Conf. Smart Grid Comm., 2013, pp. 247–252.
1279
+ [4] Federal
1280
+ Energy
1281
+ Regulatory
1282
+ Commission,
1283
+ “Notice
1284
+ inviting
1285
+ post-technical
1286
+ conference
1287
+ comments,”
1288
+ Tech.
1289
+ Rep.
1290
+ Docket
1291
+ No..
1292
+ RM18-9-000,
1293
+ Apr.
1294
+ 2018.
1295
+ [Online].
1296
+ Available
1297
+ :
1298
+ https://cms.ferc.gov/sites/default/files/2020-09/Notice-for-Comments-on-NOPR-RM18-9.pdf.
1299
+ [5] ——,
1300
+ “FERC
1301
+ order
1302
+ no.
1303
+ 2222:
1304
+ Participation
1305
+ of
1306
+ distributed
1307
+ energy
1308
+ resource
1309
+ aggregations
1310
+ in
1311
+ markets
1312
+ operated
1313
+ by
1314
+ regional
1315
+ transmission
1316
+ organizations
1317
+ and
1318
+ independent
1319
+ system
1320
+ operators.”
1321
+ https://www.ferc.gov/sites/default/files/2020-09/E-1 0.pdf, Sep 2020.
1322
+ [6] J. Mathieu, S. Koch, and D. S. Callaway, “State estimation and control
1323
+ of electric loads to manage real-time energy imbalance,” IEEE Trans.
1324
+ Power Syst., vol. 28, no. 1, pp. 430–440, 2012.
1325
+ [7] S. Bashash and H. K. Fathy, “Modeling and control of aggregate air
1326
+ conditioning loads for robust renewable power management,” IEEE
1327
+ Trans. Control Syst. Technol., vol. 21, no. 4, pp. 1318–1327, 2012.
1328
+ [8] W. Zhang, J. Lian, C.-Y. Chang, and K. Kalsi, “Aggregated modeling
1329
+ and control of air conditioning loads for demand response,” IEEE Trans.
1330
+ Power Syst., vol. 28, no. 4, pp. 4655–4664, 2013.
1331
+ [9] S. Tindemans, V. Trovato, and G. Strbac, “Decentralized control of
1332
+ thermostatic loads for flexible demand response,” IEEE Trans. Control
1333
+ Syst. Technol., vol. 23, no. 5, pp. 1685–1700, 2015.
1334
+ [10] S. C. Ross, N. Ozay, and J. L. Mathieu, “Coordination between an
1335
+ aggregator and distribution operator to achieve network-aware load
1336
+ control,” in PowerTech, 2019.
1337
+ [11] S. Ross and J. Mathieu, “Strategies for network-safe load control with a
1338
+ third-party aggregator and a distribution operator,” IEEE Trans. Power
1339
+ Syst., vol. 36, no. 4, pp. 3329–3339, 2021.
1340
+ [12] D. Lee, K. Turitsyn, D. K. Molzahn, and L. A. Roald, “Robust AC
1341
+ optimal power flow with robust convex restriction,” IEEE Trans. Power
1342
+ Syst., vol. 36, no. 6, pp. 4953–4966, 2021.
1343
+ [13] H. D. Nguyen, K. Dvijotham, and K. Turitsyn, “Constructing convex
1344
+ inner approximations of steady-state security regions,” IEEE Trans. on
1345
+ Power Syst., vol. 34, no. 1, pp. 257–267, 2018.
1346
+ [14] N. Nazir and M. Almassalkhi, “Grid-aware aggregation and realtime
1347
+ disaggregation of distributed energy resources in radial networks,” IEEE
1348
+ Trans. on Power Syst., vol. 37, no. 3, pp. 1706–1717, 2021.
1349
+ [15] K. Petrou, M. Z. Liu, A. T. Procopiou, L. F. Ochoa, J. Theunissen,
1350
+ and J. Harding, “Operating envelopes for prosumers in LV networks: A
1351
+ weighted proportional fairness approach,” in ISGT Europe, 2020.
1352
+ [16] Y. Yi and G. Verbiˇc, “Fair operating envelopes under uncertainty using
1353
+ chance constrained optimal power flow,” Electr. Power Syst. Res., vol.
1354
+ 213, p. 108465, 2022.
1355
+ [17] J. S. Russell, P. Scott, and A. Attarha, “Stochastic shaping of aggregator
1356
+ energy and reserve bids to ensure network security,” Electr. Power Syst.
1357
+ Res., vol. 212, p. 108418, 2022.
1358
+
1359
+ 9
1360
+ [18] J. Comden, A. S. Zamzam, and A. Bernstein, “Secure control regions
1361
+ for distributed stochastic systems with application to distributed energy
1362
+ resource dispatch,” in ACC, 2022, pp. 2208–2213.
1363
+ [19] S. C. Ross and J. L. Mathieu, “A method for ensuring a load aggregator’s
1364
+ power deviations are safe for distribution networks,” Electr. Power Syst.
1365
+ Res., vol. 189, p. 106781, 2020.
1366
+ [20] S. Jang, N. Ozay, and J. L. Mathieu, “Large-scale invariant sets for safe
1367
+ coordination of thermostatic loads,” in ACC, 2021, pp. 4163–4170.
1368
+ [21] K. Baker, E. Dall’Anese, and T. Summers, “Distribution-agnostic
1369
+ stochastic optimal power flow for distribution grids,” in NAPS, 2016.
1370
+ [22] E. Dall’Anese, K. Baker, and T. Summers, “Chance-constrained ac
1371
+ optimal power flow for distribution systems with renewables,” IEEE
1372
+ Trans. Power Syst., vol. 32, no. 5, pp. 3427–3438, 2017.
1373
+ [23] A. Hassan, Y. Dvorkin, D. Deka, and M. Chertkov, “Chance-constrained
1374
+ ADMM approach for decentralized control of distributed energy re-
1375
+ sources,” in PSCC, 2018.
1376
+ [24] K. S. Ayyagari, N. Gatsis, and A. F. Taha, “Chance constrained optimiza-
1377
+ tion of distributed energy resources via affine policies,” in GlobalSIP,
1378
+ 2017, pp. 1050–1054.
1379
+ [25] A. Hassan, R. Mieth, M. Chertkov, D. Deka, and Y. Dvorkin, “Optimal
1380
+ load ensemble control in chance-constrained optimal power flow,” IEEE
1381
+ Trans. Smart Grid, vol. 10, no. 5, pp. 5186–5195, 2018.
1382
+ [26] Y. Chen and Y. Lin, “Combining model-based and model-free methods
1383
+ for stochastic control of distributed energy resources,” Applied Energy,
1384
+ vol. 283, p. 116204, 2021.
1385
+ [27] G. W. Hart, “Nonintrusive appliance load monitoring,” Proc. IEEE,
1386
+ vol. 80, no. 12, pp. 1870–1891, 1992.
1387
+ [28] R. C. Sonderegger, Dynamic models of house heating based on equiva-
1388
+ lent thermal parameters. Ph.D. dissertation, Princeton University, 1978.
1389
+ [29] M. Baran and F. F. Wu, “Optimal sizing of capacitors placed on a radial
1390
+ distribution system,” IEEE Trans. Power Deliv., vol. 4, no. 1, pp. 735–
1391
+ 743, 1989.
1392
+ [30] W. H. Kersting, “Distribution system modeling and analysis,” in Electric
1393
+ Power Generation, Transmission, and Distribution: The Electric Power
1394
+ Engineering Handbook.
1395
+ CRC press, 2018, pp. 26–1.
1396
+ [31] R. L. Burden, J. D. Faires, and A. M. Burden, Numerical analysis.
1397
+ Cengage Learning, 2015.
1398
+ [32] M. E. Baran and F. F. Wu, “Network reconfiguration in distribution
1399
+ systems for loss reduction and load balancing,” IEEE Power Eng. Rev.,
1400
+ vol. 9, no. 4, pp. 101–102, 1989.
1401
+ [33] S. Bolognani and S. Zampieri, “On the existence and linear approxima-
1402
+ tion of the power flow solution in power distribution networks,” IEEE
1403
+ Trans. Power Syst., vol. 31, no. 1, pp. 163–172, 2015.
1404
+ [34] PJM, “RTO regulation signal data for 7.19.2019 & 7.20.2019.xls,”
1405
+ https://www.pjm.com/markets-and-operations/ancillary-services.aspx,
1406
+ accessed: 2019-10-22.
1407
+ [35] S. Jang, N. Ozay, and J. L. Mathieu, “Data-driven estimation of
1408
+ probabilistic constraints for network-safe distributed energy resource
1409
+ control,” in Allerton, 2022.
1410
+ [36] M. Mitzenmacher and E. Upfal, Probability and computing: Random-
1411
+ ization and probabilistic techniques in algorithms and data analysis.
1412
+ Cambridge University Press, 2017.
1413
+ [37] G. P. Wadsworth, J. G. Bryan, and A. C. Eringen, “Introduction to
1414
+ probability and random variables,” J. Appl. Mech., vol. 28, no. 2, p.
1415
+ 319, 1961.
1416
+ APPENDIX
1417
+ A. Proof of Theorem 1
1418
+ By Theorem 4.1 in [36], the following inequality is derived
1419
+ from the Chernoff bound for any 0 < δ ≤ 1−ν
1420
+ ν ,
1421
+ Pr(Mns ≥ (1 + δ)ν) ≤
1422
+
1423
+ 1
1424
+ 1 + δ
1425
+ �(1+δ)nsν
1426
+ eδnsν
1427
+ = ensν(δ−(1+δ) ln(1+δ)).
1428
+ (18)
1429
+ We substitute c/ν, with c ∈ [0, 1 − ν], for δ and obtain
1430
+ Pr (Mns − ν ≥ c) ≤ ens(c−(ν+c) ln(1+ c
1431
+ ν))
1432
+ ⇐⇒ Pr (ν ≥ Mns − c) ≥ 1 − ens(c−(ν+c) ln(1+ c
1433
+ ν)).
1434
+ (19)
1435
+ Hence, [ ˜mns − c, 1] is a confidence interval for ν with con-
1436
+ fidence level over 1 − ens(c−(ν+c) ln(1+ c
1437
+ ν )). Thus, if there
1438
+ exists c > 0 that satisfies ˜mns − c ≥ 1 − ǫ and 1 −
1439
+ ens(c−(ν+c) ln(1+ c
1440
+ ν )) > 1 − β, then [1 − ǫ, 1] is a confidence
1441
+ interval for ν with confidence level over 1 − β. Next, we
1442
+ show that such a c exists. First, we derive a lower bound on
1443
+ 1 − ens(c−(ν+c) ln(1+ c
1444
+ ν)). Focusing on the exponent, observe
1445
+ that
1446
+
1447
+ ∂ν
1448
+
1449
+ c − (ν + c) ln
1450
+
1451
+ 1 + c
1452
+ ν
1453
+ ��
1454
+ = − ln
1455
+
1456
+ 1 + c
1457
+ ν
1458
+
1459
+ + c
1460
+ ν .
1461
+ (20)
1462
+ If we let h1(x) := − ln(1+x)+x, the right side of (20) is equal
1463
+ to h1(c/ν). From h1(0) = 0 and ∂h1(x)/∂x = −1/(1 + x)+
1464
+ 1 ≥ 0
1465
+ ∀x ∈ [0, ∞), we have h1(x) ≥ 0 for all x ∈ [0, ∞),
1466
+ which means h1(c/ν) is non-negative. Hence, the exponent is
1467
+ increasing with respect to ν, and thus achieves its maximum
1468
+ at ν = 1. Therefore,
1469
+ Pr (ν ≥ Mns − c) ≥ 1 − ens(c−(1+c) ln(1+c)).
1470
+ (21)
1471
+ Since ν ≤ 1, (21) implies that [ ˜mns − c, 1] is a confidence in-
1472
+ terval for ν with confidence level over 1−ens(c−(1+c) ln(1+c)).
1473
+ Now, suppose that (11), (12) hold and define h2(x) :=
1474
+ x − (1 + x) ln(1 + x); the exponent on the right side of (21)
1475
+ is nsh2(c). From h2(0) = 0 and ∂h2(x)/∂x < 0 for all x ∈
1476
+ (0, ∞), we have h2(x) < 0 for all x ∈ (0, ∞). Since ˜mns −
1477
+ (1 − ǫ) > 0 by (11), ( ˜mns + ǫ − 1) − ( ˜mns + ǫ) ln( ˜mns +
1478
+ ǫ)) = h2( ˜mns − (1 − ǫ)) is negative. Also, substituting
1479
+ c with
1480
+ ˜mns − (1 − ǫ), the right side of (21) becomes
1481
+ 1 − ens(( ˜mns+ǫ−1)−( ˜mns+ǫ) ln( ˜mns+ǫ)) which is less than 1 −
1482
+ e− ln( 1
1483
+ β) = 1 − β, per (12). Hence, 1 − ens(c−(1+c) ln(1+c)) ≥
1484
+ 1 − β and, thus, the interval [1 − ǫ, 1] = [ ˜mns − c, 1] is a
1485
+ confidence interval for ν with confidence level over 1−β.
1486
+ B. Proof of Theorem 3 and supporting lemmas
1487
+ We first introduce and prove Lemma 1, which is required
1488
+ for the proof of Lemma 2. Then, we prove Lemma 2, which is
1489
+ used in the proof of Theorem 3. Finally, we prove Theorem 3.
1490
+ Lemma 1. Suppose that aw(x), bw(x) : X → R+ are non-
1491
+ negative functions with parameter w ∈ R, and {˜x1, . . . , ˜xN}
1492
+ (˜x1 ≤ . . . ≤ ˜xN) is a finite subset of the domain X. Also, as-
1493
+ sume that the following two conditions hold: 1) �j
1494
+ k=1 aw(˜xk)
1495
+ is a decreasing function with respect to w for any j ∈
1496
+ {1, . . ., N}, and 2) bw(x) is decreasing function with respect
1497
+ to both x and w. Then, g(w) := �N
1498
+ k=1 aw(˜xk)bw(˜xk) is a
1499
+ decreasing function with respect to w.
1500
+ Proof. We prove the lemma by showing that, for w ≤ w,
1501
+ �j
1502
+ k=1 aw(˜xk)bw(˜xk) ≥ �j
1503
+ k=1 aw(˜xk)bw(˜xk) for any j ∈ [N]
1504
+ and w1, w2 ∈ R as follows:
1505
+ j
1506
+
1507
+ k=1
1508
+ aw(˜xk)bw(˜xk) ≥
1509
+ j
1510
+
1511
+ k=1
1512
+ aw(˜xk)bw(˜xk)
1513
+ (22a)
1514
+ = bw(˜xj)
1515
+ j
1516
+
1517
+ k=1
1518
+ aw(˜xk) +
1519
+ j−1
1520
+
1521
+ k=1
1522
+ ∆bw(˜xk)
1523
+ k
1524
+
1525
+ l=1
1526
+ aw(˜xl)
1527
+ (22b)
1528
+ ≥ bw(˜xj)
1529
+ j
1530
+
1531
+ k=1
1532
+ aw(˜xk) +
1533
+ j−1
1534
+
1535
+ k=1
1536
+ ∆bw(˜xk)
1537
+ k
1538
+
1539
+ l=1
1540
+ aw(˜xl)
1541
+ (22c)
1542
+ =
1543
+ j
1544
+
1545
+ k=1
1546
+ aw(˜xk)bw(˜xk)
1547
+ (22d)
1548
+
1549
+ 10
1550
+ where ∆bw(˜xk) := (bw(˜xk) − bw(˜xk+1)), (22a) holds by
1551
+ condition 2 and (22c) holds by condition 1.
1552
+ Lemma 2. Suppose that Y (j)
1553
+ w
1554
+ (j ∈ [n]) is a discrete random
1555
+ variable with the finite sample space Y(j) = {´yj
1556
+ 1, . . . , ´yj
1557
+ κj}
1558
+ (´yj
1559
+ 1
1560
+ ≤ . . . ≤
1561
+ ´yj
1562
+ κj) with parameter w ∈ R having the
1563
+ following properties: 1) Y (1)
1564
+ w , · · · , Y (n)
1565
+ w
1566
+ are independent of
1567
+ each other, and 2) the cdf FY (j)(y; w) of Y (j)
1568
+ w
1569
+ is a decreasing
1570
+ function with respect to w for any y ∈ Y(j). Then, for any
1571
+ z(i) ∈ R (i ∈ [nc]) and non-negative coefficients aij ∈ R+,
1572
+ Pr
1573
+ ��nc
1574
+ i=1
1575
+ ��n
1576
+ j=1 aijY (j)
1577
+ w
1578
+ ≤ z(i)��
1579
+ monotonically decreases
1580
+ as w increases.
1581
+ Proof. Let Yw = (Y (1)
1582
+ w , . . . , Y (n)
1583
+ w
1584
+ )⊤ be a multivariate random
1585
+ variable with elements Y (j)
1586
+ w
1587
+ and P = {y | Ay ≤ z} be a
1588
+ polyhedron with elements aij. Then,
1589
+ Pr
1590
+
1591
+
1592
+ nc
1593
+
1594
+ i=1
1595
+
1596
+
1597
+ n
1598
+
1599
+ j=1
1600
+ aijY (j)
1601
+ w
1602
+ ≤ z(i)
1603
+
1604
+
1605
+
1606
+  = Pr (Yw ∈ P) .
1607
+ Note that P is a lower polyhedron in Πn
1608
+ j=1[´yj
1609
+ 1, ´yj
1610
+ κj]; if y ∈ P,
1611
+ then y′ ∈ P also holds for any y′ ≤ y. Thus, it is sufficient
1612
+ to show that Pr (Yw1 ∈ P′) ≥ Pr (Yw2 ∈ P′) ∀ w1 ≥ w2 and
1613
+ any lower polyhedron P′, which we do as follows:
1614
+ 1) Let n = 1 and P′
1615
+ 1 ⊂ [´y1
1616
+ 1, ´y1
1617
+ κ1] be a 1-dimensional lower
1618
+ polyhedron. Then, there exists y such that P′
1619
+ 1 = [´y1
1620
+ 1, y],
1621
+ and Pr(Y (1)
1622
+ w1
1623
+ ∈ P′
1624
+ 1) = FY (1)(y; w1) ≥ FY (1)(y; w2) =
1625
+ Pr(Y (1)
1626
+ w2 ∈ P′
1627
+ 1), which proves the statement for n = 1.
1628
+ 2) Let n
1629
+ =
1630
+ k and suppose Pr(Y (1:k)
1631
+ w1
1632
+
1633
+ P′
1634
+ k)
1635
+
1636
+ Pr(Y (1:k)
1637
+ w2
1638
+ ∈ P′
1639
+ k) holds ∀ w1 ≥ w2 and for any k-
1640
+ dimensional lower polyhedron P′
1641
+ k ⊂ Πk
1642
+ j=1[´yj
1643
+ 1, ´yj
1644
+ κj]. De-
1645
+ fine P−
1646
+ k (yk+1) = {(y1, . . . , yk)⊤ | (y1, . . . , yk, yk+1)⊤ ∈
1647
+ P′
1648
+ k+1}. Then, P−
1649
+ k (yk+1) is a lower polyhedron for
1650
+ any yk+1 ∈ [´yk+1
1651
+ 1
1652
+ , ´yk+1
1653
+ κk+1]. Therefore, Pr(Y (1:k+1)
1654
+ w1
1655
+
1656
+ P′
1657
+ k+1)
1658
+ =
1659
+ �κk+1
1660
+ j=1 Pr(Y (k+1)
1661
+ w1
1662
+ =
1663
+ ´yk+1
1664
+ j
1665
+ )Pr(Y (1:k)
1666
+ w1
1667
+
1668
+ P−
1669
+ k (´yk+1
1670
+ j
1671
+ )) for any k + 1-dimensional lower polyhedron
1672
+ P′
1673
+ k+1 ⊂ Πk+1
1674
+ j=1[´yj
1675
+ 1, ´yj
1676
+ κj]. This is greater than or equal to
1677
+ �κk+1
1678
+ j=1 Pr(Y (k+1)
1679
+ w2
1680
+ = ´yk+1
1681
+ j
1682
+ )Pr(Y (1:k)
1683
+ w2
1684
+ ∈ P−
1685
+ k (´yk+1
1686
+ j
1687
+ )) by
1688
+ Lemma 1, which in turn equals Pr(Y (1:k+1)
1689
+ w2
1690
+ ∈ P′
1691
+ k+1).
1692
+ This proves the statement for n = k + 1.
1693
+ Therefore, by mathematical induction, Pr (Yw1 ∈ P′)
1694
+
1695
+ Pr (Yw2 ∈ P′) holds for any lower polyhedron P′.
1696
+ Proof of Theorem 3. From (16), we obtain
1697
+ ˆV 2
1698
+ u,j(t + 1) = ˆf 2
1699
+ vj(Pu(t + 1), Qu(t + 1), v0)
1700
+ = v2
1701
+ 0 − 2
1702
+
1703
+ k∈a(j)
1704
+
1705
+ rk ˆfpb
1706
+ k(Pu(t + 1), Qu(t + 1), v0)
1707
+ + xk ˆfqb
1708
+ k(Pu(t + 1), Qu(t + 1), v0)
1709
+
1710
+ = v2
1711
+ 0 − 2
1712
+
1713
+ k∈a(j)
1714
+
1715
+ l∈d(k)
1716
+ (rkPu,l(t + 1) + xkQu,l(t + 1)) .
1717
+ (23)
1718
+ Substituting Pu,l(t+1) with P L
1719
+ l (t+1)+plN ON
1720
+ u,l (t+1), Qu,l(t+
1721
+ 1) with QL
1722
+ l (t + 1) + qlN ON
1723
+ u,l (t + 1), N ON
1724
+ u,l (t + 1) with the right
1725
+ side of (8), and leveraging (23) we obtain
1726
+ ˆVu,j(t + 1) ≥ v ⇐⇒ ˆV 2
1727
+ u,j(t + 1) ≥ v2
1728
+ ⇐⇒ gj(Cu(t + 1)) ≤ hj(R),
1729
+ where
1730
+ vector
1731
+ R
1732
+ :=
1733
+ (N ON(t)⊤, P L(t + 1)⊤, QL(t +
1734
+ 1)⊤, SON(t + 1)⊤, SOFF(t + 1)⊤)⊤ collects random variables,
1735
+ Cu(t + 1) := CON
1736
+ u (t + 1) − COFF
1737
+ u
1738
+ (t + 1) is the net number of
1739
+ TCL OFF to ON switches by the aggregator’s command, and
1740
+ the functions gj and hj are
1741
+ gj (Cu(t + 1)) := 2
1742
+
1743
+ k∈a(j)
1744
+
1745
+ l∈d(k)
1746
+ (rkpl + xkql)Cu,l(t + 1),
1747
+ hj(R) := v2
1748
+ 0 − v2 − 2
1749
+
1750
+ k∈a(j)
1751
+
1752
+ l∈d(k)
1753
+
1754
+ rkP L
1755
+ l (t + 1) + xkQL
1756
+ l (t + 1)
1757
+ + (rkpl + xkql)
1758
+
1759
+ N ON
1760
+ l
1761
+ (t) + SON
1762
+ l
1763
+ (t + 1) − SOFF
1764
+ l
1765
+ (t + 1)
1766
+ � �
1767
+ .
1768
+ Note that gj is a non-negative linear combination of Cu,l(t+1)
1769
+ for all j ∈ [n], i.e., there exist ajl ≥ 0 for any j, l ∈ [n] such
1770
+ that gj(Cu(t + 1)) is equal to �n
1771
+ l=1 ajlCu,l(t + 1).
1772
+ Let R be the sample space of R and fR be the joint
1773
+ probability density function of R. Then, we have
1774
+ ˆνu(t + 1) = Pr
1775
+
1776
+
1777
+ n
1778
+
1779
+ j=1
1780
+
1781
+ ˆVu,j(t + 1) ≥ v
1782
+
1783
+
1784
+
1785
+ =
1786
+
1787
+ ˜r∈R
1788
+ Pr
1789
+
1790
+
1791
+ n�
1792
+ j=1
1793
+ (gj(Cu(t + 1)) ≤ hj(˜r))
1794
+ ����R = ˜r
1795
+
1796
+  fR(˜r)d˜r.
1797
+ (24)
1798
+ For any realization, ˜r := (˜nON(t)⊤, ˜pL(t + 1)⊤, ˜qL(t +
1799
+ 1)⊤, ˜sON(t+1)⊤, ˜sOFF(t+1)⊤)⊤ ∈ R, Cu,l(t+1) = CON
1800
+ u (t+
1801
+ 1) when u ≥ 0, and Cu,l(t+ 1) = −COFF
1802
+ u
1803
+ (t+ 1) when u < 0.
1804
+ Thus, by (7), the conditional cdf of Cu,l(t+1) is computed as
1805
+ Pr(Cu,l(t + 1) ≤ k|R = ˜r) = FB(k; ˜nOFF
1806
+ l
1807
+ (t) − ˜sON
1808
+ l
1809
+ (t + 1), u)
1810
+ when u ≥ 0, and Pr(Cu,l(t + 1) ≤ k|R = ˜r) = 1 −
1811
+ FB(−k; ˜nON
1812
+ l
1813
+ (t) − ˜sOFF
1814
+ l
1815
+ (t + 1), −u) when u < 0. In addition,
1816
+ from [37], the cdf of a binomial random variable B(n; ν) is
1817
+ FB(k; n, ν) = (n − k)
1818
+ �n
1819
+ k
1820
+ � � 1−ν
1821
+ 0
1822
+ tn−k−1(1 − t)kdt,
1823
+ which is a monotonically decreasing function with respect to
1824
+ ν. Thus, Pr(Cu,l(t + 1) ≤ k|R = ˜r) monotonically decreases
1825
+ as u increases, and Cu,1(t+1)|˜r, . . . , Cu,n(t+1)|˜r for any ˜r ∈
1826
+ R satisfies the conditions on the random variables in Lemma 2.
1827
+ Thus, Pr
1828
+ ��n
1829
+ j=1
1830
+
1831
+ gj(Cu(t + 1)) ≤ hj(˜r)
1832
+ ����R = ˜r
1833
+ ��
1834
+ is a de-
1835
+ creasing function with respect to u. Therefore, by (24),
1836
+ ˆνu(t + 1) is also a decreasing function with respect to u.
1837
+
89E4T4oBgHgl3EQf3A3O/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8tA0T4oBgHgl3EQfOv9y/content/tmp_files/2301.02165v1.pdf.txt ADDED
@@ -0,0 +1,1045 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Towards the Resolution of a Quantized Chaotic Phase Space: The Interplay of
2
+ Dynamics with Noise
3
+ Domenico Lippolis1 and Akira Shudo2
4
+ 1
5
+ Institute for Applied Systems Analysis, Jiangsu University, Zhenjiang 212013, China; [email protected]
6
+ 2
7
+ Department of Physics, Tokyo Metropolitan University, Minami-Osawa, Hachioji, Tokyo 192-0397, Japan
8
+ Abstract—We outline formal and physical similarities between the quantum dynamics of open systems, and the
9
+ mesoscopic description of classical systems affected by weak noise. The main tool of our interest is the dissipative
10
+ Wigner equation, that, for suitable timescales, becomes analogous to the Fokker-Planck equation describing classical
11
+ advection and diffusion. This correspondence allows in principle to surmise a a finite resolution, other than the Planck
12
+ scale, for the quantized state space of the open system, particularly meaningful when the latter underlies chaotic classical
13
+ dynamics. We provide representative examples of the quantum-stochastic parallel with noisy Hopf cycles and Van der Pol
14
+ oscillators.
15
+ 1. Introduction
16
+ Efforts to reconcile classical and quantum mechanics are just about as old as quantum mechanics itself. While the
17
+ formulation in Hilbert space makes it difficult to establish a direct correspondence between the two, a projection of the
18
+ wave function to phase space may reveal some formal affinities between the quantum evolution of probability density and
19
+ the traditional Liouville formalism of classical mechanics. The closest one can get to relate the two is by projecting the
20
+ Liouville-von Neumann equation onto a suitable state space. For example, choosing the traditional phase space, we may
21
+ obtain the so-called Wigner representation, that shares similarities with the aforementioned classical density evolution.
22
+ Yet, there are also notable differences, as it stands to reason. The Wigner function, that is the projection of the density
23
+ operator onto the phase-space, may also take on negative values, its evolution is governed by an equation plagued with
24
+ an infinity of derivatives, and, as an indirect consequence of that, it may attain scales smaller than Planck’s constant [1].
25
+ This is especially true in systems whose underlying classical dynamics exhibits chaotic behavior.
26
+ In reality, however, no system is perfectly and eternally isolated, and exchange of matter or energy with the surround-
27
+ ing environment is inevitable, whether due to measurements, thermal interactions, or shot noise [2, 3, 4]. That brings
28
+ dissipation into the picture, and with that, decoherence.
29
+ The effect of the environment on the evolution of a density matrix in a phase-space representation was first studied by
30
+ Feynman and Vernon [5], who extended the path-integral formalism to dissipative quantum dynamics. Later, Caldeira and
31
+ Leggett [6] derived an equivalent partial differential equation for the density matrix, that bears diffusive and dissipative
32
+ terms, similarly to a Fokker-Planck equation. The latter analogy was then thought to hold but in the semiclassical limit,
33
+ until a new wave of contributions [7, 8, 9, 10] reexamined the problem in a quantum chaotic setting. A most remarkable
34
+ outcome of those works is the identification of a decoherence time, beyond which the Wigner equation is in all a Fokker-
35
+ Planck equation since the higher-order derivatives may be safely neglected, and the quantized phase space may be resolved
36
+ only up to a finite scale. Such resolution does not depend on the Planck constant, but rather emerges from the balance of
37
+ the phase-space contraction rate (Lyapunov exponent) with the coupling of the system with an Ohmic environment.
38
+ More recent contributions have focussed on the efficiency of Wigner evolution for general types of dissipation [11],
39
+ and on obtaining a Lindblad-based dissipative Wigner equation to tackle quantum friction [12, 13].
40
+ Once it is established that, under suitable conditions and after a sufficiently long time of evolution, the Wigner equation
41
+ has the form of a Fokker-Planck equation, the quantum dissipative problem is cast into a classical stochastic process.
42
+ Moreover, if the underlying classical dynamics of the quantum system in exam is chaotic, the limiting resolution of the
43
+ phase space postulated in refs. [8, 10] is not expected to be uniform, but it will depend on the local interplay of the
44
+ stretching/contraction with the dissipation. In the equivalent classical noisy problem, it is the ‘Brownian’ diffusion that
45
+ plays the role of the dissipation.
46
+ In the past decade, significant steps [14, 15, 17, 18, 16] were taken to determine the resolution of a chaotic state space
47
+ in the presence of weak noise, and so reduce the dynamics to a Markov process of finite degrees of freedom, in the form
48
+ of a matrix. Low-dimensional discrete-time dynamical systems such as logistic- or Hénon-type maps have been treated in
49
+ a non-Hamiltonian setting, whose quantum analogs are in principle difficult to identify. The optimal resolution hypothesis
50
+ arXiv:2301.02165v1 [quant-ph] 4 Jan 2023
51
+
52
+ should be extended to continuous-time flows as well, and the starting point of that roadmap is a thorough comprehension
53
+ of the steady-state solutions of the Fokker-Planck equation around the building blocs of chaos: periodic orbits.
54
+ Here, we intend to lay the foundation of that understanding, by solving the Fokker-Planck equation of nonlinear
55
+ paradigmatic dynamical systems, classical and with weak noise. We examine two-dimensional flows featuring nonlinear-
56
+ ities but not yet chaos, where the competition between contraction and noise around a limit cycle results in a stationary
57
+ density, which characterizes the steady state, and, as shown at the very end of the manuscript, shares common traits with
58
+ the steady-state Wigner function of a case study in quantum dissipative dynamics.
59
+ The article is structured as follows: in section 2 we review the basic tools of the phase-space representation of quantum
60
+ dynamics, both in closed and open systems. We follow up in section 3 by discussing the main issues related to the evolution
61
+ of the Wigner function in a quantum chaotic setting, the effects of dissipation, and the correspondence of the Wigner- with
62
+ the Fokker-Planck equation. In section 4 a novel methodology is introduced to evaluate the steady-state solution of the
63
+ Fokker-Planck equation around a periodic orbit, which casts the partial differential equation into an ordinary differential
64
+ equation for the covariance matrix, known as Lyapunov equation. We first present a proof of concept on the simplest limit
65
+ cycle, of circular shape as from a Hopf bifurcation, to be followed in section 5 by the treatment of the nonlinear oscillators
66
+ that are the main object of the current study. At the end of the section the results on the Fokker-Planck steady-state
67
+ densities are paralleled to those obtained for the Wigner function in a recent study of a quantum-dissipative model of the
68
+ same oscillators. Summary and discussion close the paper.
69
+ 2. Density matrix, Wigner function, and dissipation
70
+ Given a collection of physical systems, the ensemble average of an observable A is given by
71
+ ⟨A⟩ =
72
+
73
+ i
74
+ ρi⟨ψi|A|ψi⟩ ,
75
+ (1)
76
+ or, using
77
+ ρ =
78
+
79
+ i
80
+ ρi|ψi⟩⟨ψi| ,
81
+ (2)
82
+ one can simply write
83
+ ⟨A⟩ = Tr �ρ A� ,
84
+ (3)
85
+ so that, if the observable A is time-independent, knowing ρ at all times means solving the problem of dynamics. That is
86
+ the motivation for studying the density matrix ρ in the first place.
87
+ 2.1. Quantum dynamics in the phase space
88
+ Now, the density ρ evolves according to the Liouville-von Neumann equation
89
+ iℏρt = �ρ, H� ,
90
+ (4)
91
+ the quantum analog of the well-known Liouville equation
92
+ ρt = {ρ, H}
93
+ (5)
94
+ of classical dynamics, which we spell out in phase space:
95
+ ∂tρ = − p
96
+ m∂xρ +
97
+
98
+ ∂xV(x)∂p
99
+
100
+ p ,
101
+ (6)
102
+ assuming a Hamiltonian of the form H = p2
103
+ 2m + V(x).
104
+ In order to integrate the Liouville-von Neumann equation (4), we need to project it onto some basis, and several
105
+ representations are already available to us, for instance, the P- or the Q-representation (a.k.a. Husimi’s)
106
+ Q(α, α∗) = 1
107
+ π⟨α|ρ|α⟩ ,
108
+ (7)
109
+ with |α⟩ a coherent state. Studying quantum-to-classical correspondence, especially of a system that exhibits chaotic
110
+ behavior, is generally best achieved by using the Wigner representation [19]
111
+ W(x, p) =
112
+ 1
113
+ 2πℏ
114
+
115
+ e−ipy/ℏψ
116
+
117
+ x + y
118
+ 2
119
+
120
+ ψ∗ �
121
+ x − y
122
+ 2
123
+
124
+ dy ,
125
+ (8)
126
+
127
+ which can also be expressed in terms of the density matrix, as
128
+ W(x, p) = 1
129
+ πℏ
130
+
131
+ e−2ipy/ℏ⟨x − y|ρ|x + y⟩dy ,
132
+ (9)
133
+ of which ⟨x − y|ρ|x + y⟩ is called Weyl transform. An operator A may also be projected onto phase space, by applying a
134
+ Weyl transform:
135
+ ˜A(x, p) =
136
+
137
+ e−ipy/ℏ⟨x + y/2|A|x − y/2⟩dy ,
138
+ (10)
139
+ which can prove handy in the evaluation of expectation values, that is
140
+ ⟨A⟩ = Tr �ρ A� =
141
+
142
+ W(x, p) ˜A(x, p)dxdp ,
143
+ (11)
144
+ since, in general,
145
+ Tr [AB] =
146
+
147
+ ˜A(x, p) ˜B(x, p)dxdp .
148
+ (12)
149
+ Thus, expectation values of observables are determined by means of phase-space averages, and the problem of quantum
150
+ mechanics boils down to that of the time evolution of the Wigner function. It has been shown [19] that W(x, p) obeys the
151
+ Wigner equation
152
+ ∂tW(x, p) = − p
153
+ m∂xW(x, p) +
154
+
155
+
156
+ s=0
157
+ cs(−ℏ2)s∂2s+1
158
+ x
159
+ V(x)∂2s+1
160
+ p
161
+ W(x, p) ,
162
+ (13)
163
+ that, in general, bears an infinite number of terms. In reality, integrating equation (13) can already be impractical if there
164
+ are just a few nontrivial terms in the summation [20]. If the potential V(x) is at most quadratic, the Wigner equation
165
+ reduces to Liouville’s, as in (6). Otherwise, Eq. (13) is still not easy to deal with, and, importantly, it may not be truncated
166
+ in the semiclassical limit, since the terms ∂2s+1
167
+ p
168
+ W(x, p) bring down powers of ℏ−1−2s, so that
169
+ ℏ2s ·
170
+ 1
171
+ ℏ2s+1 ∼ ℏ−1 ,
172
+ (14)
173
+ and O
174
+
175
+ ℏ−1�
176
+ does grow in the limit ℏ → 0, making no terms in the Wigner equation negligible, in principle.
177
+ 2.2. Open systems
178
+ On the other hand, let us suppose the system is connected to an environment, whose interaction produces two addi-
179
+ tional terms in the right-hand side of the Wigner equation (13), that is [8]
180
+ 2γ∂p
181
+ �pW(x, p)� + D∂2
182
+ ppW(x, p) .
183
+ (15)
184
+ The first term produces relaxation, due to the exchange of energy with the environment, and γ is the relaxation rate. The
185
+ second term means diffusion, responsible for the so-called decoherence process, where one sets D = 2γMkBT, with M
186
+ mass of the system, and T temperature of the environment. The dissipation and diffusion terms are obtained from a path-
187
+ integral formulation of the system-environment interaction, that traces back to the works of Feynman and Vernon [5], and,
188
+ later, of Caldeira and Leggett [6].
189
+ If the potential V(x) is at most quadratic, one recovers the Fokker-Planck equation, that describes the classical evolu-
190
+ tion of the density of trajectories produced by a particle subject to Brownian motion:
191
+ ∂tW(x, p) = − p
192
+ m∂xW(x, p) + ∂xV(x)∂pW(x, p) + 2γ∂p
193
+ �pW(x, p)� + D∂2
194
+ ppW(x, p) .
195
+ (16)
196
+ This equation is fully quantum mechanical, and W(x, p) may take on negative values, unlike the classical phase-space
197
+ density of a Brownian particle.
198
+ Yet, for a general potential V(x), the evolution of the dissipative system is ruled by the full-fledged Wigner equa-
199
+ tion (13) plus the terms (15) due to the environment:
200
+ ∂tW(x, p) = − p
201
+ m∂xW(x, p) +
202
+
203
+
204
+ s=0
205
+ cs(−ℏ2)s∂2s+1
206
+ x
207
+ V(x)∂2s+1
208
+ p
209
+ W(x, p) + 2γ∂p
210
+ �pW(x, p)� + D∂2
211
+ ppW(x, p) .
212
+ (17)
213
+ The resulting equation is still plagued with an infinite number of derivatives, and is thus of impractical integration. In the
214
+ next section, we discuss whether and how it is safe to neglect the higher-order terms in Eq. (17), in the context of quantum
215
+ chaos.
216
+
217
+ 3. Stretching, contracting, and Zaslavsky’s time
218
+ Let us examine some aspects of the evolution of the Wigner function, when the underlying classical dynamics of the
219
+ system is chaotic. By established knowledge [21], the two main features of chaos are
220
+ 1. Nearby trajectories diverge exponentially fast, meaning that, letting x = (x, p),
221
+ λ = lim
222
+ t→∞ ln
223
+ �����
224
+ δx(t)
225
+ δx(0)
226
+ ����� > 0 ,
227
+ (18)
228
+ in other words, the difference δx(t) between any two nearby trajectories grows exponentially fast for any initial
229
+ conditions. This feature is also described as extreme sensitivity of the system to initial conditions.
230
+ 2. The number M of qualitatively distinct orbits (‘configurations’, tagged by symbolic sequences) scales exponentially
231
+ with their length, so that the topological entropy is positive:
232
+ S = lim
233
+ t→∞
234
+ 1
235
+ t ln M(t) > 0 .
236
+ (19)
237
+ 3.1. Chaos and the Wigner function
238
+ Chaos is the result of a stretching and folding process mainly due to nonlinearities. For a Hamiltonian system, volumes
239
+ in the phase space are conserved (by Liouville’s theorem), so that the amount of stretching (diverging trajectories) in some
240
+ directions must be compensated by an equal amount of contraction in others.
241
+ As a result, the inconvenient higher-order terms in the Wigner equation (13) can be estimated to evolve as
242
+ ∂2s+1
243
+ p
244
+ W(x, p) ∝ W(x, p)
245
+ δp2s+1(t) ∼
246
+ W(x, p)
247
+ δp(0) e−(2s+1)λt ,
248
+ (20)
249
+ for smooth enough W(x, p). Thus, the inherent problem is in principle not with the smoothness of the density, but rather
250
+ with the fact that the phase space contracts at an exponential rate, and therefore the contribution of higher-order derivatives
251
+ in the equation (13) is more and more important, as time proceeds. To better illustrate that, let us compare the terms in
252
+ the Poisson brackets of the Liouville equation (6) (also present in the full-fledged Wigner equation), with the higher-order
253
+ terms in Eq. (13):
254
+ ∂xV(x)∂pW(x, p)
255
+ cs∂2s+1
256
+ x
257
+ V(x)∂2s+1
258
+ p
259
+ W(x, p) ∼ 1
260
+ cs
261
+ ∂xV(x)
262
+ ∂2s+1
263
+ x
264
+ V(x)
265
+ δp2s
266
+ W2s(x, p) ∼ 1
267
+ cs
268
+ ∂xV(x)
269
+ ∂2s+1
270
+ x
271
+ V(x)
272
+ δp(0) e−2sλt
273
+ W2s(x, p) ≫ 1
274
+ (21)
275
+ is a condition for the higher-order terms to be negligible with respect to the lower-order, ‘Liouville’ terms. The above
276
+ inequality can be inverted, and turned into a condition for the time t:
277
+ t ≪ 1
278
+ λ ln
279
+ � ∂xV(x)
280
+ ∂2s+1
281
+ x
282
+ V(x)
283
+ δp(0)
284
+ csW2s(x, p)
285
+ �−1/2s
286
+ .
287
+ (22)
288
+ Identifying the quantity XV δp(0) =
289
+ ∂xV(x)δp(0)
290
+ ∂2s+1
291
+ x
292
+ V(x)W2s(x,p) with the typical action of the system, we can now understand
293
+ t∗ = 1
294
+ λ ln XV δp(0)
295
+
296
+ (23)
297
+ as the time scale within which the inconvenient higher-order terms of the Wigner equation may be neglected. Some
298
+ literature refers to t∗ as Zaslavsky’s time [22]. Its meaning is somehow related to the more commonly mentioned Ehrenfest
299
+ time, as in fact t∗ is longer the larger the ratio of the typical action to ℏ, and longest in the semiclassical limit. Still, the
300
+ basic idea of this correspondence time does not relate directly with interference or need ‘semiclassical’ dynamics, but
301
+ rather implies a finite resolution for the quantized phase space within a certain time scale, irrespective of the scale of the
302
+ action. In general, the smoother the potential V(x), the longer t∗, the larger the Lyapunov exponent λ, the shorter t∗.
303
+ 3.2. A resolution for the quantized phase space
304
+ In a simplified but physically meaningful description, that will then prove more accurate as a local model, we may rec-
305
+ ognize and estimate the competing effects of dynamical contraction on the one hand, and of dissipation-induced diffusion
306
+ on the other hand, by quantizing the Hamiltonian H = λxp. A wave packet of the form
307
+ W(x, p) ∼ e−x2/σ2−σ2p2
308
+ (24)
309
+
310
+ evolves separately along the stretching x−direction, and the contracting p−direction. In momentum space, we have the
311
+ Schrödinger equation
312
+ ∂tu(p, t) = λp∂pu(p, t) ⇒ u(p, t) = u0
313
+
314
+ peλt�
315
+ ,
316
+ (25)
317
+ that maps the wave packet in the p−direction as
318
+ e−σ2p2/2 → ee2λtσ2p2/2 ,
319
+ (26)
320
+ and thus the width σ−2 shrinks by a factor of e−2λt after time t. Identifying σ−1 with the uncertainty δp(t) of the momentum,
321
+ we may say that
322
+ δp(t) ∼ δp(0)e−λt
323
+ (27)
324
+ along the contracting direction. On the other hand, connecting the system to an environment brings about diffusion, and
325
+ ∂tu(p, t) = D∂ppu(p, t) ⇒ u(p, t) ∼ e−p2/2(δp(0)+Dt) ,
326
+ (28)
327
+ whose variance evolves as
328
+
329
+ Dt:
330
+ δp(t) ∼ �δp(0) + Dt�1/2
331
+ (29)
332
+ Then, intuitively, there must be some minimal scale in the contracting direction, set by
333
+ δpmin ∼
334
+ � D
335
+
336
+ �1/2
337
+ .
338
+ (30)
339
+ The full picture is called Ornstein-Uhlenbeck problem [23]
340
+ ∂tu(p, t) = D∂ppu(p, t) − λ∂pu(p, t) .
341
+ (31)
342
+ In particular, the larger δpmin, the closer the evolution of the Wigner function to a stochastic process. More precisely, the
343
+ regime where we may neglect the higher-order derivatives in the Wigner equation is deduced from Eq. (21) as
344
+ XV δpmin
345
+
346
+ ≫ 1 ,
347
+ (32)
348
+ and that requires a relatively smooth potential, and the coefficient of the decoherence term in Eq. (16), D, to be comparable
349
+ to the Lyapunov exponent λ. Now, if δpmin is an ‘equilibrium’ value as argued above, the chaotic contraction is no
350
+ longer shrinking the scale of phase-space probability exponentially and indefinitely as in the non-dissipative setting (
351
+ recall δp(t) ∼ δp(0)e−λt). Hence, in principle there would be no Zaslavsky’s time t∗, but rather, the quantum dissipative
352
+ evolution may be well described by the Fokker-Planck type of equation (16) at all times, provided that the initial condition
353
+ is smooth enough. Importantly, the semiclassical limit is not required for this approximation to work.
354
+ 4. Contraction vs. diffusion in stochastic dynamics
355
+ Equation (16) and the discussion from the previous section suggest that, under suitable conditions, the problem of
356
+ the dynamics of a quantum system connected to an environment may be cast into the classical evolution of a density
357
+ according to a Fokker-Planck equation. As a consequence, studying the interplay of stretching/contracting dynamics with
358
+ weak noise may also help shed light on quantum dissipation. Particularly interesting scenarios arise when the deterministic
359
+ dynamics exhibits chaotic behavior. It is in fact well known that the phase space of a chaotic system has a self-similar
360
+ (fractal) structure of infinite resolution. However, in reality, every system experiences noise, coming from experimental
361
+ uncertainties, neglected degrees of freedom, or roundoff errors, for example. No matter how weak, noise smoothens out
362
+ fractals, giving the system a finite resolution. The consequences are dramatic for the computation of long-time dynamical
363
+ averages, such as diffusion coefficients or escape rates, since infinite-dimensional operators describing the evolution of
364
+ the system (such as Fokker-Planck) effectively become finite matrices. With the aim of efficiently estimating long-time
365
+ averages of observables for a chaotic dynamical system affected by background noise, a recent endeavor carried on over
366
+ the past decade has achieved a technique to partition the chaotic phase space up to its optimal resolution, using unstable
367
+ periodic orbits. The benchmark models already treated range from one-dimensional discrete-time repellers [14], and
368
+ general unimodal maps [15], to two-dimensional chaotic attractors [18, 17]. Most importantly, a finite resolution for
369
+ the state space of these models has effectively changed the dimensionality of the Fokker-Planck operator from infinite
370
+ to inherently finite. Consequently, computations of the desired long-time averages become simpler and more efficient.
371
+ On a more intuitive note, the present results also bear physical significance because, even when the external noise is
372
+
373
+ uncorrelated, additive, isotropic, and homogenous, the interplay of noise and nonlinear dynamics always results in a
374
+ local stochastic neighborhood, whose covariance depends on both the past and the future noise integrated and nonlinearly
375
+ convolved with deterministic evolution along the trajectory. In that sense, noise is effectively never ‘white’ in nonlinearity,
376
+ and thus the optimal resolution varies from neighborhood to neighborhood and has to be computed locally.
377
+ As stated in the introduction, here we attack continuous-time dynamical systems, and begin by studying the evolution
378
+ of noisy neighborhoods of periodic orbits. The simplest yet meaningful models are two-dimensional limit cycles, that can
379
+ serve as testbed for parsing the interaction of deterministic dynamics with noise.
380
+ 4.1. The Lyapunov equation around a cycle
381
+ Consider the Fokker-Planck equation
382
+ ∂tρ(x, t) = −∂x (v(x)ρ(x, t)) + ∆∂xxρ(x, t) ,
383
+ (33)
384
+ where ∆ is the diffusion tensor, whose entries are the noise amplitudes along each direction (∆ is diagonal with identical
385
+ entries for isotropic noise). If we look at the dynamics in the neighborhood of a particular deterministic trajectory, we
386
+ may linearize the velocity field v(x) locally, and replace it with Aa(x − xa), where Aa = ∂v(x)
387
+ ∂x
388
+ ����x=xa is the so-called matrix of
389
+ variations. Moreover, we may switch to a co-moving reference frame in the desired neighborhood, say za = x − xa .
390
+ Suppose we start off with an initial density of trajectories of Gaussian shape, that is ρa(za) =
391
+ 1
392
+ Ca exp
393
+
394
+ −z⊤
395
+ a
396
+ 1
397
+ Qa za
398
+
399
+ . The
400
+ short-time solution to (33) can then be written in the path-integral form
401
+ ρa+1(za+1)
402
+ =
403
+ 1
404
+ Ca
405
+
406
+ [dza] exp
407
+
408
+ −1
409
+ 2(za+1 − (1 + Aaδt)za)⊤ 1
410
+ ∆δt (za+1 − (1 + Aaδt)za) − 1
411
+ 2z⊤
412
+ a
413
+ 1
414
+ Qa
415
+ za
416
+
417
+ =
418
+ 1
419
+ Ca+1
420
+ exp
421
+
422
+ −1
423
+ 2z⊤
424
+ a+1
425
+ 1
426
+ (1 + Aaδt)Qa(1 + Aaδt)T + ∆δt za+1
427
+
428
+ .
429
+ (34)
430
+ One can then infer the relation between input and output quadratic forms in the exponential
431
+ Qa+1 = ∆δt + (1 + Aaδt)Qa(1 + Aaδt)⊤ ,
432
+ (35)
433
+ and, neglecting terms of order δt2, recover the time-dependent Lyapunov equation
434
+ ˙Q = A(t)Q + QA⊤(t) + ∆ ,
435
+ Q(t0) = Q0 .
436
+ (36)
437
+ Following the theory of time-dependent ordinary differential equations [24], we may write the solution of (36) as
438
+ Q(t) = J(t, t0)
439
+
440
+ Q(t0) +
441
+ � t
442
+ t0
443
+ J−1(s, t0)∆
444
+
445
+ J−1(s, t0)
446
+ �⊤ds
447
+
448
+ J⊤(t, t0) .
449
+ (37)
450
+ Here J(t, t0) is the Jacobian along a flow x = x(t):
451
+ d
452
+ dt J(t, t0) = A(x)J(t, t0),
453
+ J(t0, t0) = 1 .
454
+ (38)
455
+ One can verify this by just plugging the solution above into the equation. Alternatively, one can write Eq. (37) in the
456
+ simpler form
457
+ Q(t) = J(t, t0)Q(t0)J⊤(t, t0) +
458
+ � t
459
+ t0
460
+ J(t, s)∆J⊤(t, s)ds ,
461
+ (39)
462
+ where the notation J(t, s) means that the Jacobian is computed following a trajectory that starts at time s and ends at time
463
+ t, consistently with Eq. (38).
464
+ 4.2. Noisy circle
465
+ Next, consider one of the simplest 2-dimensional dynamical systems, a pair of ODEs with a circular limit cycle of
466
+ radius rc, together with additive isotropic white noise of strength 2D:
467
+ ˙x
468
+ =
469
+ λ(rc −
470
+
471
+ x2 + y2)x − ωy +
472
+
473
+ 2Dξx
474
+ ˙y
475
+ =
476
+ λ(rc −
477
+
478
+ x2 + y2)y + ωx +
479
+
480
+ 2Dξy
481
+ (40)
482
+
483
+ �1.0
484
+ �0.5
485
+ 0.5
486
+ 1.0
487
+ x
488
+ �1.0
489
+ �0.5
490
+ 0.5
491
+ 1.0
492
+ y
493
+ Figure 1: Solution of the numerically integrated Eq. (40) without noise. Any initial condition converges to the circular
494
+ limit cycle.
495
+ where
496
+ < ξx(t)ξx(τ) >= δ(t − τ),
497
+ < ξx(t)ξy(τ) >= 0.
498
+ (41)
499
+ In polar coordinates, this is written
500
+ ˙r
501
+ =
502
+ λ(rc − r)r +
503
+
504
+ 2Dξx cos θ +
505
+
506
+ 2Dξy sin θ
507
+ ˙θ
508
+ =
509
+ ω −
510
+
511
+ 2Dξx
512
+ sin θ
513
+ r
514
+ +
515
+
516
+ 2Dξy
517
+ cos θ
518
+ r
519
+ (42)
520
+ This Langevin-type equation produces the drift and diffusion coefficients [23]
521
+ Dr
522
+ =
523
+ λ(rc − r)r + 2D
524
+ r
525
+
526
+ =
527
+ ω
528
+ Drr
529
+ =
530
+ 2D
531
+ Dθθ
532
+ =
533
+ 2D
534
+ r2
535
+ (43)
536
+ which then determine the Fokker-Planck equation for the system:
537
+ ∂tP + 1
538
+ r ∂r[λ(rc − r)rP] + ∂θωP − D
539
+ r ∂r(r∂rP) − D
540
+ r2 ∂θθP = 0
541
+ (44)
542
+ The limit cycle r = rc can be either stable or unstable depending on the sign of λ. Let us consider the stable case.
543
+ The first thing to look for is a stationary solution to the asymptotic form of (44):
544
+ ∂r[λ(rc − r)rP∞] − D∂r(r∂rP∞) = 0
545
+ (45)
546
+ A solution is
547
+ P∞(r) = Ce− λ
548
+ 2D (r−rc)2 ,
549
+ (46)
550
+ which implies that P∞ is a Gaussian of width 2 √D/λ in the neighborhood of the limit cycle. The general solution to (44)
551
+ is [23]
552
+ P(r, θ, t) = e− λ
553
+ 2D (r−rc)2
554
+
555
+
556
+ n=0
557
+
558
+
559
+ ν=−∞
560
+
561
+ ne−sν
562
+ nt(r − rc)|ν|L|ν|
563
+ n (r − rc)eiνθ
564
+ (47)
565
+ where L|ν|
566
+ n (r − rc) are generalized Laguerre polynomials and both the eigenvalues sν
567
+ n and the coefficients Aν
568
+ n can be found
569
+ numerically.
570
+
571
+ 4.2.1. Neighborhood and coordinates
572
+ This problem has an obvious symmetry, which allows us to guess the right (nonlinear!) change of coordinates, as well
573
+ as the stationary solution, that is independent of the angular coordinate. The result is that the noisy neighborhood of the
574
+ limit cycle is determined by the variance of the stationary solution (46). In general, however, we might not be so lucky,
575
+ and guessing a suitable, possibly nonlinear, change of coordinates is probably beyond our reach. One way to identify a
576
+ neighborhood for a periodic or any other orbit is to integrate the time-dependent Lyapunov equation (36) in the original
577
+ (Cartesian) coordinates, but in a co-moving frame defined by the local coordinates za = x − xa introduced in section 4.1.
578
+ Figure 2 illustrates this second approach: the forward Lyapunov equation (36) is numerically solved along an orbit that
579
+ converges to the circular limit cycle 1, and its solution (39) is sampled along the trajectory and inverted to obtain Q−1(t),
580
+ the covariance matrix of the Gaussian density, that produces a tube (in the figure in light yellow) along the orbit. The
581
+ eigenvalues of Q−1(t) are found to converge to Λ1 =
582
+ λ
583
+ 2D, consistently with the result for the width of the stationary-state
584
+ solution (46) of the full-blown radial Fokker-Planck equation (45): that determines the width of the tube, σ = √1/2Λ1.
585
+ The second eigenvalue of Q−1 is Λ2 = 0, as it appears from fig. 2(b). The latter eigenvalue is to be read as follows: while
586
+ the forward Lyapunov equation converges to a finite limit in the stable (radial) direction, where noise balances contracting
587
+ dynamics, it diverges along the marginal (tangent) direction, and therefore its inverse converges to zero, asymptotically.
588
+ As shown in Fig. 2(c)-(d), the exact solution (46) of the Fokker-Planck equation is well reproduced by piecing together
589
+ Gaussian tubes of covariance Q−1(t), each computed around a definite point of the noiseless limit cycle (the spurious
590
+ lines orthogonal to the circle in Fig. 2(d) are due to the finite sampling of the Gaussian tubes, that should ideally be a
591
+ continuum).
592
+ As we may mostly be interested in the solution of the Lyapunov equation near unstable periodic orbits (like in a chaotic
593
+ system), we then need to solve the same problem backwards in time, otherwise said by studying adjoint evolution, or the
594
+ adjoint Lyapunov equation.
595
+ 4.3. Adjoint Lyapunov equation
596
+ The backward evolution is described by the adjoint Fokker-Planck equation
597
+ ∂tρ(x, t) = v(x)∂xρ(x, t) + ∆∂xxρ(x, t) .
598
+ (48)
599
+ Following the line of thought of section 4.1, we can write the path-integral evolution of a Gaussian density in the neigh-
600
+ borhood of an orbit
601
+ ρa(za)
602
+ =
603
+ 1
604
+ Ca+1
605
+
606
+ [dza+1] exp [−1
607
+ 2(za+1 − (1 + Aaδt)za)⊤ 1
608
+ ∆δt (za+1 − (1 + Aaδt)za) − 1
609
+ 2z⊤
610
+ a+1
611
+ 1
612
+ Qa+1
613
+ za+1]
614
+ =
615
+ 1
616
+ Ca
617
+ exp
618
+
619
+ −1
620
+ 2z⊤
621
+ a
622
+ 1
623
+ Qa
624
+ za
625
+
626
+ ,
627
+ (49)
628
+ where
629
+ Qa = (1 + Aaδt)−1 (Qa+1 + ∆δt)
630
+
631
+ (1 + Aaδt)⊤�−1 .
632
+ (50)
633
+ Analogously to the forward evolution, we can take the limit of infinitesimal time intervals and get the differential equation
634
+ ˙Q = ∆ − A(t)Q − QA⊤(t) ,
635
+ (51)
636
+ the adjoint (or backward-) Lyapunov equation. Compared to the forward Lyapunov equation (36), the adjoint evolu-
637
+ tion (51) features the ‘time reversal’ operation A(t) → −A(t), and therefore we can still use Eq. (39) as a solution, as long
638
+ as the Jacobian along the orbit is computed as
639
+ d
640
+ dt J(t, t0) = −A(x)J(t, t0),
641
+ J(t0, t0) = 1 ,
642
+ (52)
643
+ and its computation follows the time reversed flow, that is the solution to the dynamical system ˙x = −v(x) .
644
+ 1Here we take the diffusion tensor ∆ =
645
+ � 2D
646
+ 0
647
+ 0
648
+ 2D
649
+
650
+
651
+ (a)
652
+ �1.0
653
+ �0.5
654
+ 0.5
655
+ 1.0
656
+ x
657
+ �1.0
658
+ �0.5
659
+ 0.5
660
+ 1.0
661
+ y
662
+ (b)
663
+ 0
664
+ 5
665
+ 10
666
+ 15
667
+ 20
668
+ 25
669
+ 30t
670
+ 0.2
671
+ 0.4
672
+ 0.6
673
+ 0.8
674
+ 1.0
675
+ Σ, �
676
+ (c)
677
+ (d)
678
+ Figure 2: (a) Solution of the numerically integrated Eq. (40), together with the eigenvectors (arrows) of the covariant
679
+ matrix Q−1, as given by the solution (39) of the forward Lyapunov equation, for noise amplitude 2D = 0.1. The light
680
+ yellow stripe is a pictorial representation of the Gaussian tube along the limit cycle (plan view); (b) The eigenvalues
681
+ Λ1 (blue dots), Λ2 (red dots) of Q−1, and the width σ (solid line) of the evolved density versus time t; (c) The exact
682
+ steady-state solution (46) to the Fokker-Planck equation for a noisy circular limit cycle; (d) The approximation to the
683
+ same steady-state, obtained by piecing together solutions (39) to the Lyapunov equation around the limit cycle.
684
+ 5. Non-circular limit cycles: Classical noise vs. quantum dissipation
685
+ We now turn our attention to non-circular limit cycles with background noise, and determine the steady-state density
686
+ distribution yielded by the Fokker-Planck equation. We do so by integrating the Lyapunov equation in the neighborhood
687
+ of a trajectory that eventually converges to the limit cycle.
688
+ The paradigmatic models of our choice both come from the nonlinear oscillator
689
+ ¨x + ω2
690
+ 0x + µ
691
+
692
+ a ˙x
693
+ 3 − b˙x
694
+
695
+ = 0 .
696
+ (53)
697
+ In what follows, we shall set a = 1, b = 3, ω0 = 1, and we will tweak µ. Equation (53) may be reduced to a dynamical
698
+ system as the Van der Pol oscillator
699
+ ˙x
700
+ =
701
+ y
702
+ ˙y
703
+ =
704
+ −µ
705
+
706
+ x2 − 3
707
+
708
+ y − x ,
709
+ (54)
710
+
711
+ yo
712
+ 0
713
+ xyo
714
+ 0
715
+ xor as the Rayleigh model
716
+ ˙x
717
+ =
718
+ y − µ
719
+ �1
720
+ 3 x3 − 3x
721
+
722
+ ˙y
723
+ =
724
+ −x .
725
+ (55)
726
+ �6
727
+ �4
728
+ �2
729
+ 2
730
+ 4
731
+ 6 x
732
+ �6
733
+ �4
734
+ �2
735
+ 2
736
+ 4
737
+ 6
738
+ y
739
+ �4
740
+ �2
741
+ 2
742
+ 4
743
+ x
744
+ �4
745
+ �2
746
+ 2
747
+ 4
748
+ y
749
+ Figure 3: Solution of the numerically integrated (a) Eq. (55), and (b) Eq. (54), without noise. Any initial condition
750
+ converges to a limit cycle.
751
+ In both classical systems, the dynamics converges to a limit-cycle of non-circular shape, which depends on the pa-
752
+ rameters, and it is characterized by fast and slow motion. One therefore expects the interplay of noise with the inherent
753
+ nonlinear contraction to be non-uniform, unlike in the circular limit cycle examined in the previous section, and to give
754
+ rise to a stationary density distribution of varying covariance along the cycle. We consider both models (54) and (55) for
755
+ different values of the parameter µ, so as to gradually increase the eccentricity of the limit cycle, from a deformed circle
756
+ [fig. 4(a)] to a nearly rectangular orbit [fig. 5(b)], where the deterministic stretching/contraction are most inhomogeneous
757
+ along the cycle. The most notable feature is the oscillation along the direction orthogonal to that of noiseless motion of the
758
+ covariance of the Gaussian solution of the linearized Fokker-Planck equation, denoted by σ in figs. 4(c)-(d) and 5(c)-(d):
759
+ the more eccentric the limit cycle, the more widely and rapidly σ oscillates. That translates to a Gaussian steady-state
760
+ density featuring a width that increasingly depends on the position along the orbit with the parameter µ, as we can see in
761
+ the three-dimensional/density plots of figs. 4(e)-(f), and 5(e)-(f). As anticipated, these monodromic Gaussian distributions
762
+ computed by means of the Lyapunov equation and portrayed in the figures would be, in a chaotic setting, the building
763
+ blocs of a partition of the noisy phase space, whose non-uniform resolution is determined by their widths.
764
+ The Gaussian solutions of the Lyapunov equation computed and illustrated here share common traits with the steady-
765
+ state Wigner function of the same two oscillators (54) and (55), as obtained from a fully quantum mechanical compu-
766
+ tation that has recently appeared in the literature [25]. In that work, the quantization is performed by means of cre-
767
+ ation/annihilation operators
768
+ ˆa = 1
769
+ 2 (ˆx + iˆy) ,
770
+ (56)
771
+ and its adjoint ˆa†, while dissipative terms are added to the Liouville-von Neumann equation (4), in the spirit of Lindblad’s
772
+ formalism:
773
+ iℏρt =
774
+
775
+ ρ, ˆa†ˆa
776
+
777
+ − γ1D
778
+
779
+ ˆa†�
780
+ − γ2D
781
+
782
+ ˆa2�
783
+ ,
784
+ (57)
785
+ where
786
+ D [ˆc] ρ = ˆcρˆc† − 1
787
+ 2 ˆc†ˆcρ − 1
788
+ 2ρˆc†ˆc .
789
+ (58)
790
+ The above equation (57) was numerically integrated, and the Wigner function was then found to eventually concentrate
791
+ around the classical limit cycles, that feature similar eccentricities to the ones considered in the present work and plotted in
792
+ figs. 4 and 5. In particular (Fig. 6), the steady-state Wigner distribution is enhanced along ‘tubes’ of varying width, as it can
793
+ be noticed in the more eccentric density plots of the Rayleigh model [Fig. 6(c)-(d)]. This feature is especially apparent in
794
+ Fig. 6(d), where the high-density region is narrower along the vertical segments of the limit cycle (faster classical motion),
795
+
796
+ (a)
797
+ �4
798
+ �2
799
+ 2
800
+ 4
801
+ x
802
+ �4
803
+ �2
804
+ 2
805
+ 4
806
+ y
807
+ (b)
808
+ �4
809
+ �2
810
+ 2
811
+ 4
812
+ x
813
+ �4
814
+ �2
815
+ 2
816
+ 4
817
+ y
818
+ (c)
819
+ 6
820
+ 8
821
+ 10
822
+ 12
823
+ 14
824
+ 16
825
+ 18t
826
+ 0.2
827
+ 0.4
828
+ 0.6
829
+ 0.8
830
+ 1.0
831
+ 1.2
832
+ Σ
833
+ (d)
834
+ 6
835
+ 8
836
+ 10
837
+ 12
838
+ 14
839
+ 16t
840
+ 0.1
841
+ 0.2
842
+ 0.3
843
+ 0.4
844
+ 0.5
845
+ 0.6
846
+ 0.7Σ
847
+ (e)
848
+ (f)
849
+ Figure 4: Top: solution of the numerically integrated Eq. (54), together with the eigenvectors (arrows) of the covariant
850
+ matrix Q−1, as given by the solution (39) of the forward Lyapunov equation. In Eq. (54), we take (a)-(c)-(e) µ = 0.03, and
851
+ (b)-(d)-(f) µ = 0.2, while the amplitude of the noise is set to 2D = 0.1. The light yellow stripe represents the width σ of
852
+ the Gaussian density around the limit cycle; Middle: width of the Lyapunov tube, determined by the nonzero eigenvalue
853
+ of Q−1(t), vs. time t. The cycle period is tp ≈ 7 time units; Bottom: Gaussian solutions of the linearized Fokker-Planck
854
+ equation along the limit cycle.
855
+
856
+ yo
857
+ S
858
+ 0
859
+ 5
860
+ xyo
861
+ -5
862
+ 0
863
+ 5
864
+ x(a)
865
+ �4
866
+ �2
867
+ 2
868
+ 4 x
869
+ �4
870
+ �2
871
+ 2
872
+ 4
873
+ y
874
+ (b)
875
+ �6
876
+ �4
877
+ �2
878
+ 2
879
+ 4
880
+ 6 x
881
+ �6
882
+ �4
883
+ �2
884
+ 2
885
+ 4
886
+ 6
887
+ y
888
+ (c)
889
+ 0
890
+ 2
891
+ 4
892
+ 6
893
+ 8
894
+ 10 12 14
895
+ t
896
+ 0.1
897
+ 0.2
898
+ 0.3
899
+ 0.4
900
+ 0.5
901
+ 0.6
902
+ 0.7
903
+ Σ
904
+ (d)
905
+ 0
906
+ 2
907
+ 4
908
+ 6
909
+ 8
910
+ t
911
+ 0.1
912
+ 0.2
913
+ 0.3
914
+ 0.4
915
+ 0.5
916
+ 0.6
917
+ 0.7
918
+ Σ
919
+ (e)
920
+ (f)
921
+ Figure 5: Top: solution of the numerically integrated Eq. (55), together with the eigenvectors (arrows) of the covariant
922
+ matrix Q−1, as given by the solution (39) of the forward Lyapunov equation. In Eq. (55), we take (a)-(c)-(e) µ = 0.3, and
923
+ (b)-(d)-(f) µ = 0.8, while the amplitude of the noise is set to 2D = 0.1. The light yellow stripe represents the width σ of
924
+ the Gaussian density around the limit cycle; Middle: width of the Lyapunov tube, determined by the nonzero eigenvalue
925
+ of Q−1(t), vs. time t. The cycle period is tp ≈ 7 time units; Bottom: Gaussian solutions of the linearized Fokker-Planck
926
+ equation along the limit cycle.
927
+
928
+ yo
929
+ .5
930
+ 0
931
+ 5
932
+ x5
933
+ yo
934
+ 0
935
+ 5
936
+ xand wider along its horizontal segments (slower classical motion). It compares directly with the Gaussian solution of the
937
+ Lyapunov equation portrayed in Fig. 5(f).
938
+ It is noted that in the cited work, the authors did not integrate the Wigner equation, but the Lindblad equation with
939
+ a full-fledged quantum-mechanical algorithm. In particular, the localization of the Wigner function around the classical
940
+ limit cycles is not to be taken for granted, and it legitimates the parallel between their steady-state solutions and the local
941
+ Gaussian tubes obtained in the present work from the noisy classical system.
942
+ On the other hand, the numerical steady-state solutions to Eq. (58) obtained by the authors of [25] are clearly not
943
+ Gaussians centered at the limit cycles (except in Fig. 6(a), the case of least eccentricity), as demonstrated by their varying
944
+ intensities along the periodic orbits. In that sense, the Gaussian Ansatz that turns the Fokker-Planck- into the Lyapunov
945
+ equation carries but limited information on the phase-space density distributions at equilibrium. Therefore, the analogy
946
+ proposed here should be taken with a grain of salt, and only considered as a hint for the noisy-classical to quantum-
947
+ dissipative correspondence in a particular system with nontrivial interplay of contraction and diffusion.
948
+ Finally, we would like to briefly comment on the difference between classical and quantum dissipation in the present
949
+ models featuring limit cycles. In the classical system the dissipation produces damping, which is then balanced by the
950
+ noise-induced diffusion. Instead, the quantum dissipation, generated by the characteristic Lindblad terms in Eq. (57), is
951
+ responsible for both the ‘friction’ that drives densities to localize along the classical limit cycles, and the diffusion that
952
+ spreads out the steady-state Wigner density distribution in the same region of the attracting orbits. This is consistent with
953
+ the more general picture of section 2.2, where the quantum dissipation brings about both a damping- and a diffusive term
954
+ in the Wigner equation.
955
+ Figure 6: Quantum Van der Pol- and Rayleigh oscillators from [25]. In the figures the steady-state Wigner function is
956
+ portrayed for increasing eccentricity parameter µ from Eqs. (54) [in (a)-(b)] and (55) [in (c)-(d)]. Reproduced with the
957
+ permission of the American Physical Society from Ref. [25].
958
+ 6. Summary and discussion
959
+ Having reviewed the parallels between the problem of dynamical evolution of a quantum system subject to dissipation
960
+ and that of a stochastic process ruled by Fokker-Planck’s equation, we have narrowed our attention down to chaos, and,
961
+ in particular, to the problem of an inherent scale resolution of the phase space. The issue is measuring the conjugated
962
+ variables down to a certain precision, which may be set by the balance of the contraction rate of the classical chaos with
963
+ the coupling to the environment, the source of dissipation.
964
+ Using the analogy with the problem of classical chaotic dynamics with background noise, we consider the Fokker-
965
+ Planck equation, and study its local solutions in the neighborhood of a periodic orbit, that effectively give the latter a
966
+ finite width, in the phase space. Solving the problem for two-dimensional limit cycles, as done here, is the starting
967
+ point: in a chaotic setting, a number of periodic tubes of finite width that proliferate exponentially with their length must
968
+ end up overlapping, and thus determine the finest resolution for the noisy/quantized state space, that is expected to be
969
+ non-uniform, as chaos interacts differently with diffusion/dissipation everywhere, in general.
970
+ The analysis performed in this venue shows that the problem is tractable, and it provides the basic technology to attack
971
+ it. Complications and obstacles are ahead for higher-dimensional systems, where stable, unstable, and marginal directions
972
+ coexist along the same orbit, and where the solution to the adjoint Fokker-Planck operator introduced here will almost
973
+ certainly be instrumental to the method. Still, the progress already achieved by periodic orbit theory in such complex
974
+ models as the Kuramoto-Sivashinsky or the Navier-Stokes equation give us confidence in the feasibility of the optimal
975
+ partition hypothesis in higher-dimensional chaos.
976
+
977
+ (a)
978
+ 5 (b)
979
+ p
980
+ 0
981
+ P o
982
+ 5
983
+ -5
984
+ -5
985
+ 0
986
+ 5
987
+ -5
988
+ 0
989
+ 5
990
+ Q
991
+ Q5 (c)
992
+ 5 (d)
993
+ P o
994
+ p 0
995
+ -5
996
+ -5
997
+ 0
998
+ 5
999
+ -5
1000
+ 0
1001
+ 5
1002
+ Q
1003
+ QReferences
1004
+ [1] Zurek, W. H. Sub-Planck structure in phase space and its relevance for quantum decoherence. Nature 2001, 412, 6848.
1005
+ [2] Breuer, H.-P.; Petruccione, F. The Theory of Open Quantum Systems, Oxford University Press: London, United
1006
+ Kingdom, 2007.
1007
+ [3] Zubairy, M. S.; Scully, M. O. Quantum Optics, Cambridge University Press: Cambridge, United Kingdom, 1997.
1008
+ [4] Gardiner, C. W.; Zoller, P. Quantum Noise, Springer: Berlin, Germany, 2004.
1009
+ [5] Feynman, R. P.; Vernon, F. L. The theory of a general quantum system interacting with a linear dissipative system.
1010
+ Ann. Phys. 1963, 24, 118.
1011
+ [6] Caldeira, A. O.; Leggett, A. J. Path integral approach to quantum brownian motion. Physica A 1983, 121, 587–616.
1012
+ [7] Dittrich, T.; Graham, R., Effects of weak dissipation on the long-time behaviour of the quantized standard map
1013
+ Europhys. Lett. 1988, 7, 287–291.
1014
+ [8] Zurek, W. H.; Paz, J. P. Decoherence, Chaos, and the Second Law. Phys. Rev. Lett. 1993, 72, 2508–2511.
1015
+ [9] Kolovsky, A. R. A remark on the problem of quantum-classical correspondence in the case of chaotic dynamics.
1016
+ Europhys. Lett. 1994, 27, 79–84.
1017
+ [10] Kolovsky, A. R. Quantum coherence, evolution of the Wigner function, and transition from quantum to classical
1018
+ dynamics for a chaotic system. Chaos 1996, 6, 534–542.
1019
+ [11] Cabrera, R.; Bondar, D. I.; Jacobs, K; Rabitz, H. A. Efficient method to generate time evolution of the Wigner
1020
+ function for open quantum systems. Phys. Rev. A 2015, 92, 042122.
1021
+ [12] Bondar, D. I.; Cabrera, R.; Campos, A.; Mukamel, S.; Rabitz, H. A. Correction to Wigner-Lindblad equations for
1022
+ quantum friction J. Phys. Chem. Lett. 2016, 7, 1632.
1023
+ [13] Carlo, G. G.; Ermann, L.; Rivas, A. M. F. Effects of chaotic dynamics on quantum friction. Phys. Rev. E 2019, 99,
1024
+ 042214.
1025
+ [14] Lippolis, D.; Cvitanovi´c, P. How well can one resolve the state space of a chaotic map?, Phys. Rev. Lett. 2010, 104,
1026
+ 014101.
1027
+ [15] Cvitanovi´c, P.; Lippolis, D. Knowing when to stop: how noise frees us from determinism, AIP Conf. Proc. 2012,
1028
+ 1468 , 82.
1029
+ [16] Heninger, J. M.; Lippolis, D.; Cvitanovi´c, P. Perturbation theory for the Fokker-Planck operator in chaos, Commun.
1030
+ Nonlinear Sci. Numer. Simulat. 2018, 55, 16.
1031
+ [17] Lippolis, D. Mapping densities in a noisy state space, IEICE Proc. Ser. 2014, 2, 318.
1032
+ [18] Heninger, J. M.; Lippolis, D.; Cvitanovi´c, P. Neighborhoods of periodic orbits and the stationary distribution of a
1033
+ noisy chaotic system, Phys. Rev. E 2015, 92, 062922.
1034
+ [19] Case, W. B. Wigner functions and Weyl transforms for pedestrians. Am. J. Phys. 2008, 76, 937.
1035
+ [20] Altland, A.; Haake, F. Quantum Chaos and Effective Thermalization. Phys. Rev. Lett. 2012, 108, 073601.
1036
+ [21] Gaspard, P. Chaos, Scattering and Statistical Mechanics; Cambridge University Press: Cambridge, United King-
1037
+ dom, 1998.
1038
+ [22] Berman, G. P.; Zaslavsky, G. M. Condition of stochasticity in quantum nonlinear systems. Physica A 1978, 91,
1039
+ 450–460.
1040
+ [23] Risken, H. The Fokker-Planck Equation, Springer: Berlin, Germany, 1996.
1041
+ [24] Amann, H. Ordinary Differential Equations: an Introduction to Nonlinear Analysis; De Gruyter: Berlin, Germany,
1042
+ 1990.
1043
+ [25] Chia, A.; Kwek, L. C.; Noh, C. Relaxation oscillations and frequency entrainment in quantum mechanics, Phys. Rev.
1044
+ E 2020, 102, 042213.
1045
+
8tA0T4oBgHgl3EQfOv9y/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
8tAyT4oBgHgl3EQfqPgO/content/tmp_files/2301.00537v1.pdf.txt ADDED
@@ -0,0 +1,1396 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Posterior Collapse and
2
+ Latent Variable Non-identifiability
3
+ Yixin Wang
4
+ University of Michigan
5
6
+ David M. Blei
7
+ Columbia University
8
9
+ John P. Cunningham
10
+ Columbia University
11
12
+ Abstract
13
+ Variational
14
+ autoencoders
15
+ model
16
+ high-dimensional
17
+ data
18
+ by
19
+ positing
20
+ low-
21
+ dimensional latent variables that are mapped through a flexible distribution
22
+ parametrized by a neural network. Unfortunately, variational autoencoders often
23
+ suffer from posterior collapse: the posterior of the latent variables is equal to its
24
+ prior, rendering the variational autoencoder useless as a means to produce mean-
25
+ ingful representations. Existing approaches to posterior collapse often attribute it
26
+ to the use of neural networks or optimization issues due to variational approxima-
27
+ tion. In this paper, we consider posterior collapse as a problem of latent variable
28
+ non-identifiability. We prove that the posterior collapses if and only if the latent
29
+ variables are non-identifiable in the generative model. This fact implies that pos-
30
+ terior collapse is not a phenomenon specific to the use of flexible distributions or
31
+ approximate inference. Rather, it can occur in classical probabilistic models even
32
+ with exact inference, which we also demonstrate. Based on these results, we pro-
33
+ pose a class of latent-identifiable variational autoencoders, deep generative mod-
34
+ els which enforce identifiability without sacrificing flexibility. This model class
35
+ resolves the problem of latent variable non-identifiability by leveraging bijective
36
+ Brenier maps and parameterizing them with input convex neural networks, with-
37
+ out special variational inference objectives or optimization tricks. Across syn-
38
+ thetic and real datasets, latent-identifiable variational autoencoders outperform ex-
39
+ isting methods in mitigating posterior collapse and providing meaningful repre-
40
+ sentations of the data.
41
+ 1
42
+ Introduction
43
+ Variational autoencoders (VAE) are powerful generative models for high-dimensional data [28, 46].
44
+ Their key idea is to combine the inference principles of probabilistic modeling with the flexibility of
45
+ neural networks. In a VAE, each datapoint is independently generated by a low-dimensional latent
46
+ variable drawn from a prior, then mapped to a flexible distribution parametrized by a neural network.
47
+ Unfortunately, VAE often suffer from posterior collapse, an important and widely studied phe-
48
+ nomenon where the posterior of the latent variables is equal to prior [6, 8, 38, 62]. This phenomenon
49
+ is also known as latent variable collapse, KL vanishing, and over-pruning. Posterior collapse ren-
50
+ ders the VAE useless to produce meaningful representations, in so much as its per-datapoint latent
51
+ variables all have the exact same posterior.
52
+ Posterior collapse is commonly observed in the VAE whose generative model is highly flexible,
53
+ leading to the common speculation that posterior collapse occurs because VAE involve flexible
54
+ neural networks in the generative model [11], or because it uses variational inference [59]. Based
55
+ on these hypotheses, many of the proposed strategies for mitigating posterior collapse thus focus on
56
+ modifying the variational inference objective (e.g. [44]), designing special optimization schemes
57
+ 35th Conference on Neural Information Processing Systems (NeurIPS 2021).
58
+ arXiv:2301.00537v1 [stat.ML] 2 Jan 2023
59
+
60
+ for variational inference in VAE (e.g. [18, 25, 32]), or limiting the capacity of the generative model
61
+ (e.g. [6, 16, 60].)
62
+ In this paper, we consider posterior collapse as a problem of latent variable non-identifiability. We
63
+ prove that posterior collapse occurs if and only if the latent variable is non-identifiable in the gen-
64
+ erative model, which loosely means the likelihood function does not depend on the latent vari-
65
+ able [40, 42, 56]. Below, we formally establish this equivalence by appealing to recent results in
66
+ Bayesian non-identifiability [40, 42, 43, 49, 58].
67
+ More broadly, the relationship between posterior collapse and latent variable non-identifiability im-
68
+ plies that posterior collapse is not a phenomenon specific to the use of neural networks or varia-
69
+ tional inference. Rather, it can also occur in classical probabilistic models fitted with exact inference
70
+ methods, such as Gaussian mixture models and probabilistic principal component analysis (PPCA).
71
+ This relationship also leads to a new perspective on existing methods for avoiding posterior collapse,
72
+ such as the delta-VAE [44] or the β-VAE [19]. These methods heuristically adjust the approximate
73
+ inference procedure embedded in the optimization of the model parameters. Though originally mo-
74
+ tivated by the goal of patching the variational objective, the results here suggest that these adjust-
75
+ ments are useful because they help avoid parameters at which the latent variable is non-identifiable
76
+ and, consequently, avoid posterior collapse.
77
+ The relationship between posterior collapse and non-identifiability points to a direct solution to the
78
+ problem: we must make the latent variable identifiable. To this end, we propose latent-identifiable
79
+ VAE, a class of VAE that is as flexible as classical VAE while also being identifiable. Latent-
80
+ identifiable VAE resolves the latent variable non-identifiability by leveraging Brenier maps [36,
81
+ 39] and parameterizing them with input-convex neural networks [2, 35]. Inference on identifiable
82
+ VAE uses the standard variational inference objective, without special modifications or optimization
83
+ tricks. Across synthetic and real datasets, we show that identifiable VAE mitigates posterior collapse
84
+ without sacrificing fidelity to the data.
85
+ Related work. Existing approaches to avoiding posterior collapse often modify the variational in-
86
+ ference objective, design new initialization or optimization schemes for VAE, or add neural network
87
+ links between each data point and their latent variables [1, 3, 6, 8, 12, 15, 16, 17, 18, 21, 25, 27, 32,
88
+ 34, 38, 44, 50, 51, 52, 55, 61, 62, 63]. Several recent papers also attempt to provide explanations
89
+ for posterior collapse. Chen et al. [8] explains how the inexact variational approximation can lead
90
+ to inefficiency of coding in VAE, which could lead to posterior collapse due to a form of informa-
91
+ tion preference. Dai et al. [11] argues that posterior collapse can be partially attributed to the local
92
+ optima in training VAE with deep neural networks. Lucas et al. [33] shows that posterior collapse
93
+ is not specific to the variational inference training objective; absent a variational approximation, the
94
+ log marginal likelihood of PPCA has bad local optima that can lead to posterior collapse. Yacoby
95
+ et al. [59] discusses how variational approximation can select an undesirable generative model when
96
+ the generative model parameters are non-identifiable. In contrast to these works, we consider poste-
97
+ rior collapse solely as a problem of latent variable non-identifiability, and not of optimization, varia-
98
+ tional approximations, or neural networks per se. We use this result to propose the identifiable VAE
99
+ as a way to directly avoid posterior collapse.
100
+ Outside VAE, latent variable identifiability in probabilistic models has long been studied in the
101
+ statistics literature [40, 42, 42, 43, 49, 56, 58]. More recently, Betancourt [5] studies the effect of
102
+ latent variable identifiability on Bayesian computation for Gaussian mixtures. Khemakhem et al.
103
+ [23, 24] propose to resolve the non-identifiability in deep generative models by appealing to auxiliary
104
+ data. Kumar & Poole [29] study how the variational family can help resolve the non-identifiability
105
+ of VAE. These works address the identifiability issue for a different goal: they develop identifia-
106
+ bility conditions for different subsets of VAE, aiming for recovering true causal factors of the data
107
+ and improving disentanglement or out-of-distribution generalization. Related to these papers, we
108
+ demonstrate posterior collapse as an additional way that the concept of identifiability, though classi-
109
+ cal, can be instrumental in modern probabilistic modeling. Considering identifiability leads to new
110
+ solutions to posterior collapse.
111
+ Contributions.
112
+ We prove that posterior collapse occurs if and only if the latent variable in the
113
+ generative model is non-identifiable. We then propose latent-identifiable VAE, a class of VAE
114
+ that are as flexible as classical VAE but have latent variables that are provably identifiable. Across
115
+ synthetic and real datasets, we demonstrate that latent-identifiable VAE mitigates posterior collapse
116
+ without modifying VAE objectives or applying special optimization tricks.
117
+ 2
118
+
119
+ 2
120
+ Posterior collapse and latent variable non-identifiability
121
+ Consider a dataset x = (x1,...,xn); each datapoint is m-dimensional. Positing n latent variables
122
+ z = (z1,..., zn), a variational autoencoder (VAE) assumes that each datapoint xi is generated by a
123
+ K-dimensional latent variable zi:
124
+ zi ∼ p(zi),
125
+ xi | zi ∼ p(xi | zi ; θ) = EF(xi | fθ(zi)),
126
+ (1)
127
+ where xi follows an exponential family distribution with parameters fθ(zi); fθ parameterizes the
128
+ conditional likelihood. In a deep generative model fθ is a parameterized neural network. Classical
129
+ probabilistic models like Gaussian mixture model [45] and probabilistic PCA [10, 47, 48, 54] are
130
+ also special cases of Eq. 1.
131
+ To fit the model, VAE optimizes the parameters θ by maximizing a variational approximation of the
132
+ log marginal likelihood. After finding an optimal ˆθ, we can form a representation of the data using
133
+ the approximate posterior q ˆφ(z|x) with variational parameters ˆφ or its expectation Eq ˆφ(z|x) [z|x].
134
+ Note that here we abstract away computational considerations and consider the ideal case where the
135
+ variational approximation is exact. This choice is sensible: if the exact posterior suffers from pos-
136
+ terior collapse then so will the approximate posterior (a variational approximation cannot “uncol-
137
+ lapse” a collapsed posterior). That said we also note that there exist in practice situations where
138
+ variational inference alone can lead to posterior collapse. A notable example is when the variational
139
+ approximating family is overly restrictive: it is then possible to have non-collapsing exact posteriors
140
+ but collapsing approximate posteriors.
141
+ 2.1
142
+ Posterior collapse ⇔ Latent variable non-identifiability
143
+ We first define posterior collapse and latent variable non-identifiability, then proving their connec-
144
+ tion.
145
+ Definition 1 (Posterior collapse [6, 8, 38, 62]). Given a probability model p(x, z; θ), a parameter
146
+ value θ = ˆθ, and a dataset x = (x1,...,xn), the posterior of the latent variables z collapses if
147
+ p(z|x; ˆθ) = p(z).
148
+ (2)
149
+ The posterior collapse phenomenon can occur in a variety of probabilistic models and with dif-
150
+ ferent latent variables. When the probability model is a VAE, it only has local latent variables
151
+ z = (z1,..., zn), and Eq. 2 is equivalent to the common definition of posterior collapse p(zi |xi ; ˆθ) =
152
+ p(zi) for all i [12, 17, 33, 44]. Posterior collapse has also been observed in Gaussian mixture mod-
153
+ els [5]; the posterior of the latent mixture weights resembles their prior when the number of mixture
154
+ components in the model is larger than that of the data generating process. Regardless of the model,
155
+ when posterior collapse occurs, it prevents the latent variable from providing meaningful summary
156
+ of the dataset.
157
+ Definition 2 (Latent variable non-identifiability [42, 56]). Given a likelihood function p(x| z; θ), a
158
+ parameter value θ = ˆθ, and a dataset x = (x1,...,xn), the latent variable z is non-identifiable if
159
+ p(x| z = ˜z′ ; ˆθ) = p(x| z = ˜z; ˆθ)
160
+ ∀˜z′, ˜z ∈ Z ,
161
+ (3)
162
+ where Z denotes the domain of z, and ˜z′, ˜z refer to two arbitrary values the latent variable z can
163
+ take. As a consequence, for any prior p(z) on z, we have the conditional likelihood equal to the
164
+ marginal p(x| z = ˜z; ˆθ) =
165
+
166
+ p(x| z; ˆθ)p(z)dz = p(x; ˆθ)
167
+ ∀˜z ∈ Z .
168
+ Definition 2 says a latent variable z is non-identifiable when the likelihood of the dataset x does
169
+ not depend on z. It is also known as practical non-identifiability [42, 56] and is closely related to
170
+ the definition of z being conditionally non-identifiable (or conditionally uninformative) given ˆθ [40,
171
+ 42, 43, 49, 58]. To enforce latent variable identifiability, it is sufficient to ensure that the likelihood
172
+ p(x| z,θ) is an injective (a.k.a. one-to-one) function of z for all θ. If this condition holds then
173
+ ˜z′ ̸= ˜z
174
+
175
+ p(x| z = ˜z′ ; ˆθ) ̸= p(x| z = ˜z; ˆθ).
176
+ (4)
177
+ Note that latent variable non-identifiability only requires Eq. 3 be true for a given dataset x and
178
+ parameter value ˆθ. Thus a latent variable may be identifiable in a model given one dataset but not
179
+ another, and at one θ but not another. See examples in Appendix A.
180
+ 3
181
+
182
+ Latent variable identifiability (Definition 2) [42, 56] differs from model identifiability [41], a related
183
+ notion that has also been cited as a contributing factor to posterior collapse [59]. Latent variable
184
+ identifiability is a weaker requirement: it only requires the latent variable z be identifiable at a
185
+ particular parameter value θ = ˆθ, while model identifiability requires both z and θ be identifiable.
186
+ We now establish the equivalence between posterior collapse and latent variable non-identifiability.
187
+ Theorem 1 (Latent variable non-identifiability ⇔ Posterior collapse). Consider a probability model
188
+ p(x, z; θ), a dataset x, and a parameter value θ = ˆθ. The local latent variables z are non-identifiable
189
+ at ˆθ if and only if the posterior of the latent variable z collapses, p(z|x) = p(z).
190
+ Proof. To prove that non-identifiability implies posterior collapse, note that, by Bayes rule,
191
+ p(z|x; ˆθ) ∝ p(z)p(x| z; ˆθ) = p(z)p(x; ˆθ) ∝ p(z),
192
+ (5)
193
+ where the middle equality is due to the definition of latent variable non-identifiability. It implies
194
+ p(z|x; ˆθ) = p(z) as both are densities. To prove that posterior collapse implies latent variable non-
195
+ identifiability, we again invoke Bayes rule. Posterior collapse implies that p(z) = p(z|x; ˆθ) ∝ p(z)·
196
+ p(x| z; ˆθ), which further implies that p(x| z; ˆθ) is constant in z. If p(x| z; ˆθ) nontrivially depends
197
+ on z, then p(z) must be different from p(z)p(x| z; ˆθ) as a function of z.
198
+ The proof of Theorem 1 is straightforward, but Theorem 1 has an important implication. It shows
199
+ that the problem of posterior collapse mainly arises from the model and the data, rather than from
200
+ inference or optimization. If the maximum likelihood parameters ˆθ of the VAE renders the latent
201
+ variable z non-identifiable, then we will observe posterior collapse. Theorem 1 also clarifies why
202
+ posteriors may change from non-collapsed to collapsed (and back) while fitting a VAE. When fitting
203
+ a VAE, Some parameter iterates may lead to posterior collapse; others may not.
204
+ Theorem 1 points to why existing approaches can help mitigate posterior collapse. Consider the β-
205
+ VAE [19], the VAE lagging encoder [18], and the semi-amortized VAE [25]. Though motivated by
206
+ other perspectives, these methods modify the optimization objectives or algorithms of VAE to avoid
207
+ parameter values θ at which the latent variable is non-identifiable. The resulting posterior may not
208
+ collapse, though the optimal parameters for these algorithms no longer approximates the maximum
209
+ likelihood estimate.
210
+ Theorem 1 can also help us understand posterior collapse observed in practice, which manifests
211
+ as the phenomenon that the posterior is approximately (as opposed to exactly) equal to the prior,
212
+ p(z|x; ˆθ) ≈ p(z). In several empirical studies of VAE (e.g. [12, 18, 25]), we observe that the
213
+ Kullback-Leibler (KL) divergence between the prior and posterior is close to zero but not exactly
214
+ zero, a property that stems from the likelihood p(x| z) being nearly constant in the latents z. In
215
+ these cases, Theorem 1 provides the intuition that the latent variable is nearly non-identifiable ,
216
+ p(x| ˜z′) ≈ p(x| ˜z),∀˜z, ˜z′ and so Eq. 2 holds approximately.
217
+ 2.2
218
+ Examples of latent variable non-identifiability and posterior collapse
219
+ We illustrate Theorem 1 with three examples. Here we discuss the example of Gaussian mixture
220
+ VAE (GMVAE). See Appendix A for probabilistic principal component analysis (PPCA) and
221
+ Gaussian mixture model (GMM).
222
+ The GMVAE [13, 51] is the following model:
223
+ p(zi) = Categorical(1/K),
224
+ p(wi | zi ; µ,Σ) = N (µzi,Σzi),
225
+ p(xi |wi ; f ,σ) = N (f (wi),σ2 · Im),
226
+ where µk’s are d-dimensional, Σk are d × d-dimensional, and the parameters are θ = (µ,Σ, f ,σ2).
227
+ Suppose the function f is fully flexible; thus f (wi) can capture any distribution of the data. The
228
+ latent variable of interest is the categorical z = (z1,..., zn). If its posterior collapses, then p(zi =
229
+ k|x) = 1/K for all k = 1,...,K.
230
+ Consider fitting a GMVAE model with K = 2 to a dataset of 5,000 samples. This dataset is drawn
231
+ from a GMVAE also with K = 2 well-separated clusters; there is no model misspecification. A GM-
232
+ VAE is typically fit by optimizing the maximum log marginal likelihood ˆθ = argmaxθ log p(x|θ).
233
+ Note there may be multiple values of θ that achieve the global optimum of this function.
234
+ We focus on two likelihood maximizers. One provides latent variable identifiability and the posterior
235
+ of zi does not collapse. The other does not provide identifiablity; the posterior collapses.
236
+ 4
237
+
238
+ 1. The first likelihood-maximizing parameter ˆθ1 is the truth; the distribution of the K fitted clusters
239
+ correspond to the K data-generating clusters. Given this parameter, the latent variable zi is
240
+ identifiable because the K data-generating clusters are different; different cluster memberships
241
+ zi must result in different likelihoods p(xi | zi ; ˆθ1). The posterior of zi does not collapse.
242
+ 2. In the second likelihood-maximizing parameter ˆθ2, however, all K fitted clusters share the
243
+ same distribution, each of which is equal to the marginal distribution of the data. Specifically,
244
+ (µ∗
245
+ k,Σ∗
246
+ k) = (0, Id) for all k, and each fitted cluster is a mixture of the K original data generating
247
+ clusters, i.e., the marginal. At this parameter value, the model is still able to fully capture the
248
+ mixture distribution of the data. However, all the K mixture components are the same, and thus
249
+ the latent variable zi is non-identifiable; different cluster membership zi do not result in differ-
250
+ ent likelihoods p(xi | zi ; ˆθ2), and hence the posterior of zi collapses. Figure 1a illustrates a fit of
251
+ this (non-identifiable) GMVAE to the pinwheel data [22]. In Section 3, we construct an latent-
252
+ identifiable VAE (LIDVAE) that avoids this collapse.
253
+ Latent variable identifiability is a function of the both the model and the true data-generating distri-
254
+ bution. Consider fitting the same GMVAE with K = 2 but to a different dataset of 5,000 samples,
255
+ this one drawn from a GMVAE with only one cluster. (There is model misspecification.) One max-
256
+ imizing parameter value ˆθ3 is where both of the fitted clusters correspond to the true data generating
257
+ cluster. While this parameter value resembles that of the first maximizer ˆθ1 above—both correspond
258
+ to the true data generating cluster—this dataset leads to a different situation for latent variable iden-
259
+ tifiability. The two fitted clusters are the same and so different cluster memberships do not result in
260
+ different likelihoods of p(xi | zi ; ˆθ3). The latent variable zi is not identifiable and its posterior col-
261
+ lapses.
262
+ Takeaways.
263
+ The GMVAE example in this section (and the PPCA and GMM examples in Ap-
264
+ pendix A) illustrate different ways that a latent variable can be non-identifiable in a model and suffer
265
+ from posterior collapse. They show that even the true posterior—without variational inference—can
266
+ collapse in non-identifiable models. They also illustrate that whether a latent variable is identifiable
267
+ can depend on both the model and the data. Posterior collapse is an intrinsic problem of the model
268
+ and the data, rather than specific to the use of neural networks or variational inference.
269
+ The equivalence between posterior collapse and latent variable non-identifiability in Theorem 1 also
270
+ implies that, to mitigate posterior collapse, we should try to resolve latent variable non-identifiability.
271
+ In the next section, we develop such a class of latent-identifiable VAE.
272
+ 3
273
+ Latent-identifiable VAE via Brenier maps
274
+ We now construct latent-identifiable VAE, a class of VAE whose latent variables are guaranteed to
275
+ be identifiable, and thus the posteriors cannot collapse.
276
+ 3.1
277
+ The latent-identifiable VAE
278
+ To construct the latent-identifiable VAE, we rely on a key observation that, to guarantee latent
279
+ variable identifiability, it is sufficient to make the likelihood function P(xi | zi ; θ) injective for all
280
+ values of θ. If the likelihood is injective, then, for any θ, each value of zi will lead to a different
281
+ distribution P(xi | zi ; θ). In particular, this fact will be true for any optimized ˆθ and so the latent zi
282
+ must be identifiable, regardless of the data. By Theorem 1, its posterior cannot collapse.
283
+ Constructing latent-identifiable VAE thus amounts to constructing an injective likelihood function
284
+ for VAE. The construction is based on a few building blocks of linear and nonlinear injective
285
+ functions, then composed into an injective likelihood p(xi | zi ; θ) mapping from Z d to X m, where
286
+ Z and X indicate the set of values zi and xi can take. For example, if xi is an m-dimensional binary
287
+ vector, then X = {0,1}m; if zi is a K-dimensional real-valued vector, then Z = Rd.
288
+ The building blocks of LIDVAE: Injective functions. For linear mappings from Rd1 to Rd2 (d2 ≥
289
+ d1), we consider matrix multiplication by a d1 × d2-dimensional matrix β. For a d1-dimensional
290
+ variable z, left multiplication by a matrix β⊤ is injective when β has full column rank [53]. For
291
+ example, a matrix with all ones in the diagonal and all other entries being zero has full column rank.
292
+ For nonlinear injective functions, we focus on Brenier maps [4, 37]. A d-dimensional Brenier map
293
+ is is the gradient of a convex function from Rd to R. That is, a Brenier map satisfies g = ∇T for
294
+ 5
295
+
296
+ some convex function T : Rd → R. Brenier maps are also known as a monotone transport map. They
297
+ are guaranteed to be bijective [4, 37] because their derivative is the Hessian of a convex T, which
298
+ must be positive semidefinite and has a nonnegative determinant [4].
299
+ To build a VAE with Brenier maps, we require a neural network parametrization of the Brenier map.
300
+ As Brenier maps are gradients of convex functions, we begin with the neural network parametrizaton
301
+ of convex functions, namely the input convex neural network (ICNN) [2, 35]. This parameterization
302
+ of convex functions will enable Brenier maps to be paramterized as the gradient of ICNN.
303
+ An L-layer ICNN is a neural network mapping from Rd to R. Given an input u ∈ Rd, its lth layer is
304
+ z0 = u,
305
+ zl+1 = hl(Wlzl +Alu+bl),
306
+ (l = 0,...,L −1),
307
+ (6)
308
+ where the last layer zL must be a scalar, {Wl} are non-negative weight matrices with W0 = 0. The
309
+ functions {hl : R → R} are convex and non-decreasing entry-wise activation functions for layer l;
310
+ they are applied element-wise to the vector (Wlzl + Alu + bl). A common choice of h0 : R → R
311
+ is the square of a leaky RELU, h0(x) = (max(α · x,x))2 with α = 0.2; the remaining hl’s are set to
312
+ be a leaky RELU, hl(x) = max(α· x,x). This neural network is called “input convex” because it is
313
+ guaranteed to be a convex function.
314
+ Input convex neural networks can approximate any convex function on a compact domain in sup
315
+ norm (Theorem 1 of Chen et al. [9].) Given the neural network parameterization of convex functions,
316
+ we can parametrize the Brenier map gθ(·) as its gradient with respect to the input gθ(u) = ∂zL/∂u.
317
+ This neural network parameterization of Brenier map is a universal approxiamtor of all Brenier maps
318
+ on a compact domain, because input convex neural networks are universal approximators of convex
319
+ functions [9].
320
+ The latent-identifiable VAE (LIDVAE). We construct injective likelihoods for LIDVAE by com-
321
+ posing two bijective Brenier maps with an injective matrix multiplication. As the composition of in-
322
+ jective and bijective mappings must be injective, the resulting composition must be injective. Sup-
323
+ pose g1,θ : RK → RK and g2,θ : RD → RD are two Brenier maps, and β is a K ×D-dimensional matrix
324
+ (D ≥ K) with all the main diagonal entries being one and all other entries being zero. The matrix
325
+ β⊤ has full column rank, so multiplication by β⊤ is injective. Thus the composition g2,θ(β⊤ g1,θ(·))
326
+ must be an injective function from a low-dimensional space RK to a high-dimensional space RD.
327
+ Definition 3 (Latent-identifiable VAE (LIDVAE) via Brenier maps). An LIDVAE via Brenier maps
328
+ generates a D-dimensional datapoint xi,∈ {1,...,n} by:
329
+ zi ∼ p(zi),
330
+ xi | zi ∼ EF(xi | g2,θ(β⊤ g1,θ(zi))),
331
+ (7)
332
+ where EF stands for exponential family distributions; zi is a K-dimensional latent variable, discrete
333
+ or continuous. The parameters of the model are θ = (g1,θ, g2,θ), where g1,θ : RK → RK and g2,θ :
334
+ RD → RD are two continuous Brenier maps. The matrix β is a K × D-dimensional matrix (D ≥ K)
335
+ with all the main diagonal entries being one and all other entries being zero.
336
+ Contrasting LIDVAE (Eq. 7) with the classical VAE (Eq. 1), the LIDVAE replaces the function
337
+ fθ : Z K → X D with the injective mapping g2,θ(β⊤ g1,θ(·)), composed by bijective Brenier maps
338
+ g1,θ, g2,θ and a zero-one matrix β⊤ with full column rank. As the likelihood functions of exponential
339
+ family are injective, the likelihood function p(xi | zi ; θ) = EF(g2,θ(β⊤ g1,θ(zi))) of LIDVAE must
340
+ be injective. Therefore, replacing an arbitrary function fθ : Z K → X D with the injective mapping
341
+ g2,θ(β⊤ g1,θ(·)) plays a crucial role in enforcing identifiability for latent variable zi and avoiding
342
+ posterior collapse in LIDVAE. As the latent zi must be identifiable in LIDVAE, its posterior does
343
+ not collapse.
344
+ Despite its injective likelihood, LIDVAE are as flexible as VAE; the use of Brenier maps and ICNN
345
+ does not limit the capacity of the generative model. Loosely, LIDVAE can model any distributions
346
+ in RD because Brenier maps can map any given non-atomic distribution in Rd to any other one in
347
+ Rd [37]. Moreover, the ICNN parametrization is a universal approximator of Brenier maps [2]. We
348
+ summarize the key properties of LIDVAE in the following proposition.
349
+ Proposition 2. The latent variable zi is identifiable in LIDVAE, i.e. for all i ∈ {1,...,n}, we have
350
+ p(xi | zi = ˜z′ ; θ) = p(xi | zi = ˜z; θ)
351
+
352
+ ˜z′ = ˜z,
353
+ ∀ ˜z′, ˜z,θ.
354
+ (8)
355
+ Moreover, for any VAE-generated data distribution, there exists an LIDVAE that can generate the
356
+ same distribution. (The proof is in Appendix B.)
357
+ 6
358
+
359
+ 15
360
+ 10
361
+ 5
362
+ 0
363
+ 5
364
+ 10
365
+ 15
366
+ 20
367
+ 15
368
+ 10
369
+ 5
370
+ 0
371
+ 5
372
+ 10
373
+ 15
374
+ (a) Non-ID GMVAE
375
+ 15
376
+ 10
377
+ 5
378
+ 0
379
+ 5
380
+ 10
381
+ 15
382
+ 20
383
+ 15
384
+ 10
385
+ 5
386
+ 0
387
+ 5
388
+ 10
389
+ 15
390
+ (b) IDGMVAE
391
+ 0
392
+ 100
393
+ 200
394
+ 300
395
+ 400
396
+ 500
397
+ Epoch
398
+ 0.1
399
+ 0.2
400
+ 0.3
401
+ 0.4
402
+ 0.5
403
+ 0.6
404
+ Accuracy
405
+ (c) Accuracy
406
+ 0
407
+ 200
408
+ 400
409
+ Epoch
410
+ 400
411
+ 350
412
+ 300
413
+ 250
414
+ Test Log Likelihood
415
+ 3-layer ID-GMVAE
416
+ 6-layer ID-GMVAE
417
+ 9-layer ID-GMVAE
418
+ 3-layer GMVAE
419
+ 6-layer GMVAE
420
+ 9-layer GMVAE
421
+ (d) Log-likelihood
422
+ Figure 1: (a)-(b): The posterior of the classical GMVAE [13, 26, 51] collapses when fit to the
423
+ pinwheel dataset; the latents predict the same value for all datapoints. The posteriors of latent-
424
+ identifiable Gaussian mixture VAE (LIDGMVAE), however, do not collapse and provide meaning-
425
+ ful representations.
426
+ (c)-(d) The latent-identifiable GMVAE produces posteriors that are substan-
427
+ tially more informative than GMVAE when fit to fashion MNIST. It also achieves higher test log
428
+ likelihood.
429
+ 3.2
430
+ Inference in LIDVAE
431
+ Performing inference in LIDVAE is identical to the classical VAE, as the two VAE differ only in
432
+ their parameter constraints. To fit an LIDVAE, we use the classical amortized inference algorithm
433
+ of VAE; we maximize the evidence lower bound (ELBO) of the log marginal likelihood [28].
434
+ In general, LIDVAE are a drop-in replacement for VAE. Both have the same capacity (Proposi-
435
+ tion 2) and share the same inference algorithm, but LIDVAE is identifiable and does not suffer from
436
+ posterior collapse. The price we pay for LIDVAE is computational: the generative model (i.e. de-
437
+ coder) is parametrized using the gradient of a neural network; its optimization thus requires calcu-
438
+ lating gradients of the gradient of a neural network, which increases the computational complex-
439
+ ity of VAE inference and can sometimes challenge optimization. While fitting classical VAE using
440
+ stochastic gradient descent has O(k · p) computational complexity, where k is the number of itera-
441
+ tions and p is the number of parameters, fitting latent-identifiable VAE may require O(k · p2) com-
442
+ putational complexity.
443
+ 3.3
444
+ Extensions of LIDVAE
445
+ The construction of LIDVAE reveals a general strategy to make the latent variables of generative
446
+ models identifiable: replacing nonlinear mappings with injective nonlinear mappings. We can em-
447
+ ploy this strategy to make the latent variables of many other VAE variants identifiable. Below we
448
+ give two examples, mixture VAE and sequential VAE.
449
+ The mixture VAE, with GMVAE as a special case, models the data with an exponential family
450
+ mixture and mapped through a flexible neural network to generate the data. We develop its latent-
451
+ identifiable counterpart using Brenier maps.
452
+ Example 1 (Latent-identifiable mixture VAE (LIDMVAE)). An LIDMVAE generates a D-
453
+ dimensional datapoint xi, i ∈ {1,...,n} by
454
+ zi ∼ Categorical(1/K),
455
+ wi | zi ∼ EF(wi |β⊤
456
+ 1 zi),
457
+ xi |wi ∼ EF(xi | g2,θ(β⊤
458
+ 2 g1,θ(wi))),
459
+ (9)
460
+ where Wi is a K-dimensional one-hot vector that indicates the cluster assignment. The parameters
461
+ of the model are θ = (g1,θ, g2,θ), where the functions g1,θ : RM → RM and g2,θ : RD → RD are two
462
+ continuous Brenier maps. The matrices β1 and β2 are a K × M-dimensional matrix (M ≥ K) and
463
+ a M × D-dimensional matrix (D ≥ M) respectively, both having all the main diagonal entries being
464
+ one and all other entries being zero.
465
+ The LIDMVAE differs from the classical mixture VAE in p(xi | zi), where we replace its neural
466
+ network mapping with its injective counterpart, i.e. a composition of two Brenier maps and a matrix
467
+ multiplication g2,θ(β⊤
468
+ 2 g1,θ(·)). As a special case, setting both exponential families in Example 1 as
469
+ Gaussian gives us LIDGMVAE, which we will use to model images in Section 4.
470
+ Next we derive the identifiable counterpart of sequential VAE, which models the data with an au-
471
+ toregressive model conditional on the latents.
472
+ 7
473
+
474
+ Fashion-MNIST
475
+ Omniglot
476
+ AU
477
+ KL
478
+ MI
479
+ LL
480
+ AU
481
+ KL
482
+ MI
483
+ LL
484
+ VAE [28]
485
+ 0.1
486
+ 0.2
487
+ 0.9
488
+ -258.8
489
+ 0.02
490
+ 0.0
491
+ 0.1
492
+ -862.1
493
+ SA-VAE [25]
494
+ 0.2
495
+ 0.3
496
+ 1.3
497
+ -252.2
498
+ 0.1
499
+ 0.2
500
+ 1.0
501
+ -853.4
502
+ Lagging VAE [18]
503
+ 0.4
504
+ 0.6
505
+ 1.6
506
+ -248.5
507
+ 0.5
508
+ 1.0
509
+ 3.6
510
+ -849.4
511
+ β-VAE [19] (β=0.2)
512
+ 0.6
513
+ 1.2
514
+ 2.4
515
+ -245.3
516
+ 0.7
517
+ 1.4
518
+ 5.9
519
+ -842.6
520
+ LIDGMVAE (this work)
521
+ 1.0
522
+ 1.6
523
+ 2.6
524
+ -242.3
525
+ 1.0
526
+ 1.7
527
+ 7.5
528
+ -820.3
529
+ Synthetic
530
+ Yahoo
531
+ Yelp
532
+ AU
533
+ KL
534
+ MI
535
+ LL
536
+ AU
537
+ KL
538
+ MI
539
+ LL
540
+ AU
541
+ KL
542
+ MI
543
+ LL
544
+ VAE [28]
545
+ 0.0
546
+ 0.0
547
+ 0.0
548
+ -46.5
549
+ 0.0
550
+ 0.0
551
+ 0.0
552
+ -519.7
553
+ 0.0
554
+ 0.0
555
+ 0.0
556
+ -635.9
557
+ SA-VAE [25]
558
+ 0.4
559
+ 0.1
560
+ 0.1
561
+ -40.2
562
+ 0.2
563
+ 1.0
564
+ 0.2
565
+ -520.2
566
+ 0.1
567
+ 1.9
568
+ 0.2
569
+ -631.5
570
+ Lagging VAE [18]
571
+ 0.5
572
+ 0.1
573
+ 0.1
574
+ -40.0
575
+ 0.3
576
+ 1.6
577
+ 0.4
578
+ -518.6
579
+ 0.2
580
+ 3.6
581
+ 0.1
582
+ -631.0
583
+ β-VAE [19] (β=0.2)
584
+ 1.0
585
+ 0.1
586
+ 0.1
587
+ -39.9
588
+ 0.5
589
+ 4.7
590
+ 0.9
591
+ -524.4
592
+ 0.3
593
+ 10.0
594
+ 0.1
595
+ -637.3
596
+ LIDSVAE
597
+ 1.0
598
+ 0.5
599
+ 0.6
600
+ -40.3
601
+ 0.8
602
+ 7.2
603
+ 1.1
604
+ -519.5
605
+ 0.7
606
+ 9.1
607
+ 0.9
608
+ -634.2
609
+ Table 1: Across image and text datasets, LIDVAE outperforms existing VAE variants in preventing
610
+ posterior collapse while achieving similar goodness-of-fit to the data.
611
+ Example 2 (Latent-identifiable sequential VAE (LIDSVAE)). An LIDSVAE generates a D-
612
+ dimensional datapoint xi, i ∈ {1,...,n} by
613
+ zi ∼ p(zi),
614
+ xi | zi,x<i ∼ EF(g2,θ(β⊤
615
+ 2 g1,θ([zi, fθ(x<i)]))),
616
+ where x<i = (x1,...,xi−1) represents the history of x before the ith dimension. The function fθ :
617
+ X<i → RH maps the history X<i into an H-dimensional vector. Finally, [zi, fθ(x<i)] is an (K+H)×1
618
+ vector that represents a row-stack of the vectors (zi)K×1 and (fθ(x<i))H×1.
619
+ Similar with mixture VAE, the LIDSVAE also differs from sequential VAE only in its use of
620
+ g2,θ(β⊤
621
+ 2 g1,θ(·)) function in p(xi | zi,x<i). We will use LIDSVAE to model text in Section 4.
622
+ 4
623
+ Empirical studies
624
+ We study LIDVAE on images and text datasets, finding that LIDVAE do not suffer from posterior
625
+ collapse as we increase the capacity of the generative model, while achieving similar fits to the data.
626
+ We further study PPCA, showing how likelihood functions nearly constant in latent variables lead
627
+ to collapsing posterior even with Markov chain Monte Carlo (MCMC).
628
+ 4.1
629
+ LIDVAE on images and text
630
+ We consider three metrics for evaluating posterior collapse:
631
+ (1) KL divergence between
632
+ the posterior and the prior, KL(q(z|x)||p(z)); (2) Percentange of active units (AU):AU =
633
+ �D
634
+ d=1 1{Covp(x)(Eq(z|x) [zd]) ≥ ϵ}, where zd = (z1d,..., znd) is the dth dimension of the latent vari-
635
+ able z for all the n data points. In calculating AU, we follow Burda et al. [7] to calculate the
636
+ posterior mean, (E [z1d |x1],...,E [znd |xn])] for all data points, and calculate the sample variance
637
+ of E [zid |xi] across i’s from this vector. The threshold ϵ is chosen to be 0.01 [7]; the theoretical
638
+ maximum of %AU is one; (3) Approximate Mutual information (MI) between xi and zi, I(x, z) =
639
+ Ex
640
+
641
+ Eq(z|x) [log(q(z|x))]
642
+
643
+ − Ex
644
+
645
+ Eq(z|x) [log(q(z))]
646
+ �. We also evaluate the model fit using the impor-
647
+ tance weighted estimate of log-likelihood on a held-out test set [7]. For mixture VAE, we also eval-
648
+ uate the predictive accuracy of the categorical latents against ground truth labels to quantify their
649
+ informativeness.
650
+ Competing methods. We compare LIDVAE with the classical VAE [28], the β-VAE (β=0.2) [19],
651
+ the semi-amortized VAE [25], and the lagging VAE [18]. Throughout the empirical studies, we use
652
+ flexible variational approximating families (RealNVPs [14] for image and LSTMs [20] for text).
653
+ Results: Images. We first study LIDGMVAE on four subsampled image datasets drawn from pin-
654
+ wheel [22], MNIST [31], Fashion MNIST [57], and Omniglot [30]. Figures 1a and 1b illustrate a
655
+ fit of the GMVAE and the LIDGMVAE to the pinwheel data [22]. The posterior of the GMVAE
656
+ 8
657
+
658
+ z1
659
+ 2
660
+ 0
661
+ 2
662
+ z2
663
+ 2
664
+ 0
665
+ 2
666
+ LL
667
+ 1e4
668
+ 8
669
+ 6
670
+ 4
671
+ 2
672
+ 0
673
+ 4
674
+ 2
675
+ 0
676
+ 2
677
+ 4
678
+ 0
679
+ 1
680
+ 2
681
+ 3
682
+ 4
683
+ 5
684
+ 6
685
+ Density
686
+ (a) σ = 0.2
687
+ z1
688
+ 2
689
+ 0
690
+ 2
691
+ z2
692
+ 2
693
+ 0
694
+ 2
695
+ LL
696
+ 1e4
697
+ 8
698
+ 6
699
+ 4
700
+ 2
701
+ 0
702
+ 4
703
+ 2
704
+ 0
705
+ 2
706
+ 4
707
+ 0
708
+ 1
709
+ 2
710
+ 3
711
+ 4
712
+ 5
713
+ 6
714
+ Density
715
+ (b) σ = 0.5
716
+ z1
717
+ 2
718
+ 0
719
+ 2
720
+ z2
721
+ 2
722
+ 0
723
+ 2
724
+ LL
725
+ 1e4
726
+ 8
727
+ 6
728
+ 4
729
+ 2
730
+ 0
731
+ 2.5
732
+ 0.0
733
+ 2.5
734
+ 0
735
+ 2
736
+ 4
737
+ 6
738
+ Density
739
+ (c) σ = 1.0
740
+ z1
741
+ 2
742
+ 0
743
+ 2
744
+ z2
745
+ 2
746
+ 0
747
+ 2
748
+ LL
749
+ 1e4
750
+ 8
751
+ 6
752
+ 4
753
+ 2
754
+ 0
755
+ 2.5
756
+ 0.0
757
+ 2.5
758
+ 0
759
+ 2
760
+ 4
761
+ 6
762
+ Density
763
+ posterior
764
+ prior
765
+ (d) σ = 1.5
766
+ Figure 2: As the noise level increases in PPCA, the latent variable becomes closer to non-
767
+ identifiable because the likelihood and more susceptible to posterior collapse. Its likelihood sur-
768
+ face becomes flatter and its posterior becomes closer to the prior. Top panel: Likelihood surface of
769
+ PPCA as a function of the two latents z1, z2. When σ increase, the likelihood surface becomes flat-
770
+ ter and the latent variables z1, z2 are closer to non-identifiable. Bottom panel: Posterior of z1 under
771
+ different σ values. When σ increase, the posterior becomes closer to the prior.
772
+ latents collapse, attributing all datapoints to the same latent cluster. In contrast, LIDGMVAE pro-
773
+ duces categorical latents faithful to the clustering structure. Figure 1 examines the LIDGMVAE
774
+ as we increase the flexibility of the generative model. Figure 1c shows that the categorical latents
775
+ of the LIDGMVAE are substantially more predictive of the true labels than their classical coun-
776
+ terparts. Moreover, its performance does not degrade as the generative model becomes more flexi-
777
+ ble. Figure 1d shows that the LIDGMVAE consistently achieve higher test log-likelihood. Table 1
778
+ compares different variants of VAE in a 9-layer generative model. Across four datasets, LIDGM-
779
+ VAE mitigates posterior collapse. It achieves higher AU, KL and MI than other variants of VAE.
780
+ It also achieves a higher test log-likelihood.
781
+ Results: Text.
782
+ We apply LIDSVAE to three subsampled text datasets drawn from a synthetic
783
+ text dataset, the Yahoo dataset, and the Yelp dataset [60]. The synthetic dataset is generated from a
784
+ classical two-layer sequential VAE with a five-dimensional latent. Table 1 compares the LIDSVAE
785
+ with the sequential VAE. Across the three text datasets, the LIDSVAE outperforms other variants
786
+ of VAE in mitigating posterior collapse, generally achieving a higher AU, KL, and MI.
787
+ 4.2
788
+ Latent variable non-identifiability and posterior collapse in PPCA
789
+ Here we show that the PPCA posterior becomes close to the prior when the latent variable becomes
790
+ close to be non-identifiable. We perform inference using Hamiltonian Monte Carlo (HMC), avoid-
791
+ ing the effect of variational approximation on posterior collapse.
792
+ Consider a PPCA with two latent dimensions, p(zi) = N (zi ; 0, I2), p(xi | zi ; θ) = N (xi ; z⊤
793
+ i w,σ2 ·
794
+ I5), where the value of σ2 is known, zi’s are the latent variables of interest, and w is the only
795
+ parameter of interest. When the noise σ2 is set to a large value, the latent variable zi may become
796
+ nearly non-identifiable. The reason is that the likelihood function p(xi | zi) becomes slower-varying
797
+ as σ2 increases. For example, Figure 2 shows that the likelihood surface becomes flatter as σ2
798
+ increases. Accordingly, the posterior becomes closer to the prior as σ2 increases. When σ = 1.5, the
799
+ posterior collapses. This non-identifiability argument provides an explanation to the closely related
800
+ phenomenon described in Section 6.2 of [33].
801
+ 5
802
+ Discussion
803
+ In this work, we show that the posterior collapse phenomenon is a problem of latent variable non-
804
+ identifiability. It is not specific to the use of neural networks or particular inference algorithms in
805
+ 9
806
+
807
+ VAE. Rather, it is an intrinsic issue of the model and the dataset. To this end, we propose a class of
808
+ LIDVAE via Brenier maps to resolve latent variable non-identifiability and mitigate posterior col-
809
+ lapse. Across empirical studies, we find that LIDVAE outperforms existing methods in mitigating
810
+ posterior collapse.
811
+ The latent variables of LIDVAE are guaranteed to be identifiable. However, it does not guarantee
812
+ that the latent variables and the parameters of LIDVAE are jointly identifiable. In other words, the
813
+ LIDVAE model may not be identifiable even though its latents are identifiable. This difference be-
814
+ tween latent variable identifiability and model identifiability may appear minor. But the tractability
815
+ of resolving latent variable identifiability plays a key role in making non-identifiability a fruitful one
816
+ perspective of posterior collapse. To enforce latent variable identifiability, it is sufficient to ensure
817
+ that the likelihood p(x| z, ˆθ) is an injective function of z. In contrast, resolving model identifiability
818
+ for the general class of VAE remains a long standing open problem, with some recent progress re-
819
+ lying on auxiliary variables [23, 24]. The tractability of resolving latent variable identifiability is a
820
+ key catalyst of a principled solution to mitigating posterior collapse.
821
+ There are a few limitations of this work. One is that the theoretical argument focuses on the collapse
822
+ of the exact posterior. The rationale is that, if the exact posterior collapses, then its variational ap-
823
+ proximation must also collapse because variational approximation of posteriors cannot “uncollapse”
824
+ a posterior. That said, variational approximation may “collapse” a posterior, i.e. the exact posterior
825
+ does not collapse but the variational approximate posterior collapses. The theoretical argument and
826
+ algorithmic approaches developed in this work does not apply to this setting, which remains an in-
827
+ teresting venue of future work.
828
+ A second limitation is that the latent-identifiable VAE developed in this work bear a higher compu-
829
+ tational cost than classical VAE. While the latent-identifiable VAE ensures the identifiability of its
830
+ latent variables and mitigates posterior collapse, it does come with a price in computation because
831
+ its generative model (i.e. decoder) is parametrized using gradients of a neural network. Fitting the
832
+ latent-identifiable VAE thus requires calculating gradients of gradients of a neural network, leading
833
+ to much higher computational complexity than fitting the classifical VAE. Developing computation-
834
+ ally efficient variants of the latent-identifiable VAE is another interesting direction for future work.
835
+ Acknowledgments.
836
+ We thank Taiga Abe and Gemma Moran for helpful discussions, and anony-
837
+ mous reviewers for constructive feedback that improved the manuscript. David Blei is supported by
838
+ ONR N00014-17-1-2131, ONR N00014-15-1-2209, NSF CCF-1740833, DARPA SD2 FA8750-18-
839
+ C-0130, Amazon, and the Simons Foundation. John Cunningham is supported by the Simons Foun-
840
+ dation, McKnight Foundation, Zuckerman Institute, Grossman Center, and Gatsby Charitable Trust.
841
+ 10
842
+
843
+ References
844
+ [1] Alemi, A. A., Poole, B., et al. (2017). Fixing a broken ELBO. arXiv preprint arXiv:1711.00464.
845
+ [2] Amos, B., Xu, L., & Kolter, J. Z. (2017). Input convex neural networks. In Proceedings of the 34th
846
+ International Conference on Machine Learning-Volume 70 (pp. 146–155).: JMLR. org.
847
+ [3] Asperti, A. (2019). Variational autoencoders and the variable collapse phenomenon. Sensors & Transduc-
848
+ ers, 234(6), 1–8.
849
+ [4] Ball, K. (2004). An elementary introduction to monotone transportation. In Geometric aspects of functional
850
+ analysis (pp. 41–52). Springer.
851
+ [5] Betancourt, M. (2017).
852
+ Identifying Bayesian mixture models.
853
+ https://mc-stan.org/users/
854
+ documentation/case-studies/identifying_mixture_models. Accessed: 2021-05-04.
855
+ [6] Bowman, S., Vilnis, L., et al. (2016). Generating sentences from a continuous space. In Proceedings of
856
+ The 20th SIGNLL Conference on Computational Natural Language Learning (pp. 10–21).
857
+ [7] Burda, Y., Grosse, R., & Salakhutdinov, R. (2015). Importance weighted autoencoders. arXiv preprint
858
+ arXiv:1509.00519.
859
+ [8] Chen, X., Kingma, D. P., et al. (2016). Variational lossy autoencoder. arXiv preprint arXiv:1611.02731.
860
+ [9] Chen, Y., Shi, Y., & Zhang, B. (2018). Optimal control via neural networks: A convex approach. arXiv
861
+ preprint arXiv:1805.11835.
862
+ [10] Collins, M., Dasgupta, S., & Schapire, R. E. (2001). A generalization of principal components analysis
863
+ to the exponential family. In Nips, volume 13 (pp.˜23).
864
+ [11] Dai, B., Wang, Z., & Wipf, D. (2019). The usual suspects? Reassessing blame for VAE posterior collapse.
865
+ arXiv preprint arXiv:1912.10702.
866
+ [12] Dieng, A. B., Kim, Y., Rush, A. M., & Blei, D. M. (2018).
867
+ Avoiding latent variable collapse with
868
+ generative skip models. arXiv preprint arXiv:1807.04863.
869
+ [13] Dilokthanakul, N., Mediano, P. A., et al. (2016). Deep unsupervised clustering with Gaussian mixture
870
+ variational autoencoders. arXiv preprint arXiv:1611.02648.
871
+ [14] Dinh, L., Sohl-Dickstein, J., & Bengio, S. (2016). Density estimation using real NVP. arXiv preprint
872
+ arXiv:1605.08803.
873
+ [15] Fu, H., Li, C., et al. (2019). Cyclical annealing schedule: A simple approach to mitigating KL vanishing.
874
+ arXiv preprint arXiv:1903.10145.
875
+ [16] Gulrajani, I., Kumar, K., et al. (2016). Pixelvae: A latent variable model for natural images. arXiv preprint
876
+ arXiv:1611.05013.
877
+ [17] Havrylov, S. & Titov, I. (2020). Preventing posterior collapse with Levenshtein variational autoencoder.
878
+ arXiv preprint arXiv:2004.14758.
879
+ [18] He, J., Spokoyny, D., Neubig, G., & Berg-Kirkpatrick, T. (2019). Lagging inference networks and poste-
880
+ rior collapse in variational autoencoders. arXiv preprint arXiv:1901.05534.
881
+ [19] Higgins, I., Matthey, L., et al. (2016). β-VAE: Learning basic visual concepts with a constrained varia-
882
+ tional framework.
883
+ [20] Hochreiter, S. & Schmidhuber, J. (1997). Long short-term memory. Neural computation, 9(8), 1735–
884
+ 1780.
885
+ [21] Hoffman, M. D. & Johnson, M. J. (2016). ELBO surgery: Yet another way to carve up the variational
886
+ evidence lower bound.
887
+ [22] Johnson, M. J., Duvenaud, D. K., Wiltschko, A., Adams, R. P., & Datta, S. R. (2016).
888
+ Composing
889
+ graphical models with neural networks for structured representations and fast inference. In Advances in
890
+ neural information processing systems (pp. 2946–2954).
891
+ [23] Khemakhem, I., Kingma, D. P., & Hyvärinen, A. (2019). Variational autoencoders and nonlinear ICA: A
892
+ unifying framework. arXiv preprint arXiv:1907.04809.
893
+ [24] Khemakhem, I., Monti, R. P., Kingma, D. P., & Hyvarinen, A. (2020). ICE-BeeM: Identifiable conditional
894
+ energy-based deep models based on nonlinear ICA.
895
+ [25] Kim, Y., Wiseman, S., Miller, A., Sontag, D., & Rush, A. (2018). Semi-amortized variational autoen-
896
+ coders. In International Conference on Machine Learning (pp. 2678–2687).
897
+ [26] Kingma, D. P., Mohamed, S., Rezende, D. J., & Welling, M. (2014). Semi-supervised learning with deep
898
+ generative models. In Advances in neural information processing systems (pp. 3581–3589).
899
+ [27] Kingma, D. P., Salimans, T., et al. (2016). Improved variational inference with inverse autoregressive
900
+ flow. In Advances in neural information processing systems (pp. 4743–4751).
901
+ 11
902
+
903
+ [28] Kingma, D. P. & Welling, M. (2014). Auto-encoding variational Bayes. In Proceedings of the Interna-
904
+ tional Conference on Learning Representations (ICLR), volume 1.
905
+ [29] Kumar, A. & Poole, B. (2020). On implicit regularization in β-vaes. In International Conference on
906
+ Machine Learning (pp. 5480–5490).: PMLR.
907
+ [30] Lake, B. M., Salakhutdinov, R., & Tenenbaum, J. B. (2015). Human-level concept learning through
908
+ probabilistic program induction. Science, 350(6266), 1332–1338.
909
+ [31] LeCun, Y., Cortes, C., & Burges, C. (2010). MNIST handwritten digit database. ATT Labs [Online].
910
+ Available: http://yann.lecun.com/exdb/mnist, 2.
911
+ [32] Li, B., He, J., Neubig, G., Berg-Kirkpatrick, T., & Yang, Y. (2019). A surprisingly effective fix for deep
912
+ latent variable modeling of text. arXiv preprint arXiv:1909.00868.
913
+ [33] Lucas, J., Tucker, G., Grosse, R. B., & Norouzi, M. (2019). Don’t blame the ELBO! A linear VAE
914
+ perspective on posterior collapse. In Advances in Neural Information Processing Systems (pp. 9403–9413).
915
+ [34] Maalø e, L., Fraccaro, M., Liévin, V., & Winther, O. (2019). BIVA: A very deep hierarchy of latent
916
+ variables for generative modeling. In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox, &
917
+ R. Garnett (Eds.), Advances in Neural Information Processing Systems, volume 32: Curran Associates, Inc.
918
+ [35] Makkuva, A. V., Taghvaei, A., Oh, S., & Lee, J. D. (2019). Optimal transport mapping via input convex
919
+ neural networks. arXiv preprint arXiv:1908.10962.
920
+ [36] McCann, R. J. et al. (1995). Existence and uniqueness of monotone measure-preserving maps. Duke
921
+ Mathematical Journal, 80(2), 309–324.
922
+ [37] McCann, R. J. & Guillen, N. (2011). Five lectures on optimal transportation: geometry, regularity and
923
+ applications. Analysis and geometry of metric measure spaces: Lecture notes of the séminaire de Mathéma-
924
+ tiques Supérieure (SMS) Montréal, (pp. 145–180).
925
+ [38] Oord, A. v. d., Vinyals, O., & Kavukcuoglu, K. (2017). Neural discrete representation learning. arXiv
926
+ preprint arXiv:1711.00937.
927
+ [39] Peyré, G., Cuturi, M., et al. (2019). Computational optimal transport. Foundations and Trends® in
928
+ Machine Learning, 11(5-6), 355–607.
929
+ [40] Poirier, D. J. (1998). Revising beliefs in nonidentified models. Econometric Theory, 14(4), 483–509.
930
+ [41] Rao, B. & Prakasa, R. (1992). Identifiability in Stochastic Models: Characterization of Probability Dis-
931
+ tributions. Probability and mathematical statistics. Academic Press.
932
+ [42] Raue, A., Kreutz, C., et al. (2009). Structural and practical identifiability analysis of partially observed
933
+ dynamical models by exploiting the profile likelihood. Bioinformatics, 25(15), 1923–1929.
934
+ [43] Raue, A., Kreutz, C., Theis, F. J., & Timmer, J. (2013).
935
+ Joining forces of Bayesian and frequentist
936
+ methodology: a study for inference in the presence of non-identifiability. Philosophical Transactions of the
937
+ Royal Society A: Mathematical, Physical and Engineering Sciences, 371(1984), 20110544.
938
+ [44] Razavi, A., Oord, A. v. d., Poole, B., & Vinyals, O. (2019). Preventing posterior collapse with delta-
939
+ VAEs. arXiv preprint arXiv:1901.03416.
940
+ [45] Reynolds, D. A. (2009). Gaussian mixture models. Encyclopedia of biometrics, 741, 659–663.
941
+ [46] Rezende, D. J., Mohamed, S., & Wierstra, D. (2014). Stochastic backpropagation and approximate infer-
942
+ ence in deep generative models. arXiv preprint arXiv:1401.4082.
943
+ [47] Roweis, S. (1998). Em algorithms for pca and spca. Advances in neural information processing systems,
944
+ (pp. 626–632).
945
+ [48] Roweis, S. & Ghahramani, Z. (1999). A unifying review of linear gaussian models. Neural computation,
946
+ 11(2), 305–345.
947
+ [49] San Martın, E. & González, J. (2010). Bayesian identifiability: Contributions to an inconclusive debate.
948
+ Chilean Journal of Statistics, 1(2), 69–91.
949
+ [50] Seybold, B., Fertig, E., Alemi, A., & Fischer, I. (2019). Dueling decoders: Regularizing variational
950
+ autoencoder latent spaces. arXiv preprint arXiv:1905.07478.
951
+ [51] Shu, R. (2016). Gaussian mixture VAE: Lessons in variational inference, generative models, and deep
952
+ nets.
953
+ [52] Sønderby, C. K., Raiko, T., Maaløe, L., Sønderby, S. K., & Winther, O. (2016). How to train deep
954
+ variational autoencoders and probabilistic ladder networks. In 33rd International Conference on Machine
955
+ Learning (ICML 2016).
956
+ [53] Strang, G., Strang, G., Strang, G., & Strang, G. (1993).
957
+ Introduction to linear algebra, volume 3.
958
+ Wellesley-Cambridge Press Wellesley, MA.
959
+ 12
960
+
961
+ [54] Tipping, M. E. & Bishop, C. M. (1999). Probabilistic principal component analysis. Journal of the Royal
962
+ Statistical Society: Series B (Statistical Methodology), 61(3), 611–622.
963
+ [55] Tomczak, J. M. & Welling, M. (2017). VAE with a VampPrior. arXiv preprint arXiv:1705.07120.
964
+ [56] Wieland, F.-G., Hauber, A. L., Rosenblatt, M., Tönsing, C., & Timmer, J. (2021). On structural and
965
+ practical identifiability. Current Opinion in Systems Biology.
966
+ [57] Xiao, H., Rasul, K., & Vollgraf, R. (2017). Fashion-MNIST: a novel image dataset for benchmarking
967
+ machine learning algorithms. CoRR, abs/1708.07747.
968
+ [58] Xie, Y. & Carlin, B. P. (2006). Measures of Bayesian learning and identifiability in hierarchical models.
969
+ Journal of Statistical Planning and Inference, 136(10), 3458–3477.
970
+ [59] Yacoby, Y., Pan, W., & Doshi-Velez, F. (2020). Characterizing and avoiding problematic global optima
971
+ of variational autoencoders.
972
+ [60] Yang, Z., Hu, Z., Salakhutdinov, R., & Berg-Kirkpatrick, T. (2017). Improved variational autoencoders for
973
+ text modeling using dilated convolutions. In Proceedings of the 34th International Conference on Machine
974
+ Learning-Volume 70 (pp. 3881–3890).
975
+ [61] Yeung, S., Kannan, A., Dauphin, Y., & Fei-Fei, L. (2017). Tackling over-pruning in variational autoen-
976
+ coders. arXiv preprint arXiv:1706.03643.
977
+ [62] Zhao, T., Lee, K., & Eskenazi, M. (2018). Unsupervised discrete sentence representation learning for
978
+ interpretable neural dialog generation. In Proceedings of the 56th Annual Meeting of the Association for
979
+ Computational Linguistics (Volume 1: Long Papers) (pp. 1098–1107).
980
+ [63] Zhao, Y., Yu, P., Mahapatra, S., Su, Q., & Chen, C. (2020). Discretized bottleneck in VAE: Posterior-
981
+ collapse-free sequence-to-sequence learning. arXiv preprint arXiv:2004.10603.
982
+ 13
983
+
984
+ Supplementary Materials
985
+ Posterior Collapse and Latent Variable Non-identifiability
986
+ A
987
+ Examples of posterior collapse continued
988
+ We present two additional examples of posterior collapse, probabilistic principal component analysis
989
+ and Gaussian mixture model.
990
+ A.1
991
+ Probabilistic principal component analysis
992
+ We consider classical probabilistic principal component analysis (PPCA) and show that its local
993
+ latent variables can suffer from posterior collapse at maximum likelihood parameter values (i.e.
994
+ global maxima of log marginal likelihood). This example refines the perspective of Lucas et al. [7],
995
+ which demonstrated that posterior collapse can occur in PPCA absent any variational approximation
996
+ but due to local maxima in the log marginal likelihood. Here we show that posterior collapse can
997
+ occur even with global maxima, absent optimization issues due to local maxima.
998
+ Consider a PPCA with two latent dimensions,
999
+ p(zi) = N (zi |0, I2),
1000
+ p(xi | zi ; θ) = N (xi | z⊤
1001
+ i w,σ2 · I5),
1002
+ where zi’s are the latent variables of interest and others θ = (w,σ2) are parameters of the model.
1003
+ Consider fitting this model to two datasets, each with 500 samples, focusing on maximum likelihood
1004
+ parameter values. Depending on the true distribution of the dataset, PPCA may or may not suffer
1005
+ from posterior collapse.
1006
+ 1. Sample the data from a one-dimensional PPCA,
1007
+ xi ∼ N (xi |N (0, I1)· ¯w1, ¯σ1 · I5).
1008
+ (10)
1009
+ (The model remains two dimensional.) The latent variables zi’s are not (fully) identifiable in this
1010
+ case. The reason is that one set of maximum likelihood parameters is ˆθ = ( ˆw, ˆσ) = ([0, ¯w1], ¯σ1),
1011
+ i.e. setting one latent dimension as zero and the other equal to the true data generating direction.
1012
+ Under this ˆθ, the likelihood function is constant in the first dimension of the latent variable, i.e.
1013
+ zi1; see Figure 3a. The posterior of zi1 thus collapses, matching the prior, while the posterior of
1014
+ zi2 stays peaked (Figure 3b).
1015
+ 2. Sample the data from from a two-dimensional PPCA,
1016
+ xi ∼ N (xi |N (0, I2)· ¯w2, ¯σ2 · I5).
1017
+ (11)
1018
+ The latent variables zi are identifiable. The likelihood function varies against both zi1 and zi2;
1019
+ the posteriors of both zi1 and zi2 are peaked (Figures 3c and 3d).
1020
+ A.2
1021
+ Gaussian mixture model
1022
+ Though we have focused on the posterior collapse of local latent variables, a model can also suffer
1023
+ from posterior collapse of its global latent variables. Consider a simple Gaussian mixture model
1024
+ (GMM) with two clusters,
1025
+ p(α) = Beta(α|5,5),
1026
+ p(xi |α; θ) = α·N (xi |µ1,σ2
1027
+ 1)+(1−α)·N (xi |µ2,σ2
1028
+ 2).
1029
+ Here α is a global latent variable and θ = (µ1,µ2,σ1,σ2) are the parameters of the model. Fit this
1030
+ model to three datasets, each with 105 samples.
1031
+ 1. Sample the data from two non-overlapping clusters,
1032
+ xi ∼ 0.15·N (−10,1)+0.85·N (10,1).
1033
+ (12)
1034
+ The latent variable α is identifiable. The two data generating clusters are substantially different,
1035
+ so the likelihood function varies across α ∈ [0,1] under the maximum likelihood (ML) parameters
1036
+ (Figure 4a). The posterior of α is also peaked (Figure 4b) and differs much from the prior.
1037
+ 1
1038
+
1039
+ 2. Sample the data from two overlapping clusters,
1040
+ xi ∼ 0.15·N (−0.5,1)+0.85·N (0.5,1).
1041
+ (13)
1042
+ The latent variable α is identifiable.
1043
+ However, it is nearly non-identifiable.
1044
+ While the two
1045
+ data generating clusters are different, they are very similar to each other because they over-
1046
+ lap. Therefore, the likelihood function p(xi |α; θ∗) is slowly varying under ML parameters
1047
+ θ∗ = (µ∗
1048
+ 1,µ∗
1049
+ 2,σ∗
1050
+ 1,σ∗
1051
+ 2) = (−0.5,0.5,1,1); see Figure 4a. Consequently, the posterior of α remains
1052
+ very close to the prior; see Figure 4b.
1053
+ 3. Sample the data from a single Gaussian distribution, xi ∼ N (−1,1). The latent variable α is non-
1054
+ identifiable. The reason is that one set of ML parameters is θ∗ = (µ∗
1055
+ 1,µ∗
1056
+ 2,σ∗
1057
+ 1,σ∗
1058
+ 2) = (−1,−1,1,1),
1059
+ i.e. setting both of the two mixture components equal to the true data generating Gaussian distri-
1060
+ bution.
1061
+ Under this θ∗, the latent variable α is non-identifiable and its likelihood function p({xi}n
1062
+ i=1 |α; θ∗)
1063
+ is constant in α because the two mixture components are equal; Figure 4a illustrates this fact.
1064
+ Moreover, the posterior of α collapses, p(α|{xi}n
1065
+ i=1 ; θ∗) = p(α). Figure 4b illustrates this fact:
1066
+ The HMC samples of the α posterior closely match those drawn from the prior. (Exact inference
1067
+ is intractable in this case, so we use HMC as a close approximation to exact inference.) This
1068
+ example demonstrates the connection between non-identifiability and posterior collapse; it also
1069
+ shows that posterior collapse is not specific to variational inference but is an issue of the model
1070
+ and the data.
1071
+ As for PPCA, these GMM examples demonstrate that whether a latent variable is identifiable in a
1072
+ probabilistic model not only depends on the model but also the data. While all three examples were
1073
+ fitted with the same GMM model, their identifiability situation differs as the samples are generated
1074
+ in different ways.
1075
+ B
1076
+ Proof of Proposition 2
1077
+ We prove a general version of Proposition 2 by establishing the latent variable identifiability and
1078
+ flexibility of the most general form of the LIDVAE. The LIDVAE, LIDMVAE, and LIDSVAE
1079
+ (Definition 4 and examples 1 and 2) will all be its special cases. Then Proposition 2 will also be a
1080
+ special case of the more general result stated below (Proposition 3).
1081
+ We first define the most general form of LIDVAE.
1082
+ Definition 4 (General LIDVAE via Brenier maps). A general LIDVAE via Brenier maps generates
1083
+ an D-dimensional data-point xi,∈ {1,...,n} by:
1084
+ (zi)K×1 ∼ p(zi),
1085
+ (14)
1086
+ (wi)M×1 | zi ∼ EF(wi |β⊤
1087
+ 1 zi),
1088
+ (15)
1089
+ (xi)D×1 |wi,x<i ∼ EF(xi |h◦ g2,θ(β⊤
1090
+ 2 g1,θ([wi, fθ(x<i)]))),
1091
+ (16)
1092
+ where EF stands for exponential family distributions; zi is a K-dimensional latent variable, discrete
1093
+ or continuous. The parameters of the model are θ = (g1,θ, g2,θ, fθ), where fθ : X<i → RH is a
1094
+ function that maps all previous data points x<i to an H-dimensional vector, g1,θ : RM+H → RM+H
1095
+ and g2,θ : RD → RD are two continuous monotone transport maps. The function h(·) is a bijective
1096
+ link function for the exponential family, e.g. the sigmoid function. The matrix β1 is a K × M-
1097
+ dimensional matrix (M ≥ K) all the main diagonal entries being one and all other entries being
1098
+ zero, and thus with full row rank. Similarly, β2 is a (M + H)× D-dimensional matrix (D ≥ M + H)
1099
+ with all the main diagonal entries being one and all other entries being zero, also with full row rank.
1100
+ Finally, [wi, fθ(x<i)] is an (M+H)×1 vector that represents a row-stack of the vectors (wi)M×1 and
1101
+ (fθ(x<i))H×1.
1102
+ The general LIDVAE differs from the classical VAE whose general form is
1103
+ (zi)K×1 ∼ p(zi),
1104
+ (17)
1105
+ (wi)M×1 | zi ∼ EF(wi |β⊤
1106
+ 1 zi),
1107
+ (18)
1108
+ (xi)D×1 |wi,x<i ∼ EF(xi |h◦ gθ([wi, fθ(x<i)])),
1109
+ (19)
1110
+ 2
1111
+
1112
+ The key difference is in Eq. 19, where the classical VAE uses an arbitrary function g : RM+H → RD
1113
+ in Eq. 19. In contrast, LIDVAE uses a composition g2,θ(β⊤
1114
+ 2 g1,θ(·)) with additional constraints in
1115
+ Eq. 16.
1116
+ General LIDVAE can handle both i.i.d. and sequential data. For i.i.d data (e.g. images), we can set
1117
+ fθ(·) to be a zero function, which implies P(xi |wi,x<i) = P(xi |wi). For sequential data (e.g. text),
1118
+ we can set fθ(·) to be an LSTM that embeds the history x<i into an H-dimensional vector.
1119
+ General LIDVAE emulate many existing VAE. Letting zi be categorical (one-hot) vectors, the dis-
1120
+ tribution EF(z⊤
1121
+ i βθ) is an exponential family mixture. The identifiable VAE then maps this mixture
1122
+ model through a flexible function gθ. When zi is real-valued, it mimics classical VAE by mapping
1123
+ an exponential family PCA through flexible functions.
1124
+ LIDGMVAE is a special case of the general LIDVAE when we set zi be categorical (one-hot)
1125
+ vectors, set the exponential family distribution EF to be Gaussian in Eqs. 15 and 16. In this case,
1126
+ wi ∼ Gaussian(z⊤
1127
+ i βθ,γθ) is a Gaussian mixture. Then, we set fθ(·) to be a zero function, which
1128
+ implies P(xi |wi,x<i) = P(xi |wi), and finally set h as the identity function.
1129
+ This general LIDVAE also subsumes the Bernoulli mixture model, which is a common variant
1130
+ of LIDGMVAE for the MNIST data. Specifically, we can set zi be categorical (one-hot) vec-
1131
+ tors, and then set the exponential family distribution EF to be Gaussian in Eq. 15, making wi ∼
1132
+ Gaussian(z⊤
1133
+ i βθ,γθ) to be a Gaussian mixture. Next we set fθ(·) to be a zero function, which im-
1134
+ plies P(xi |wi,x<i) = P(xi |wi), then set h to be the sigmoid function, and finally set the EF to be
1135
+ Bernoulli in Eq. 16.
1136
+ LIDSVAE is another special case of the general LIDVAE when we set the EF to be a point mass
1137
+ and β1,θ to be identity matrix in Eq. 15, which implies wi = zi. Then setting the EF to be a categor-
1138
+ ical distribution and h to be identity in Eq. 16 leads to a configuration that is the same as Example 2.
1139
+ LIDVAE can be made deeper with more layers by introducing additional full row-rank matrices βk
1140
+ (e.g. ones with all the main diagonal entries being one and all other entries being zero) and additional
1141
+ Brenier maps gk,θ. For example, we can expand Eq. 16 with an additional layer by setting
1142
+ (xi)D×1 |wi,x<i ∼ EF(g3,θ(β⊤
1143
+ 3 g2,θ(β⊤
1144
+ 2 g1,θ([wi, fθ(x<i)])))).
1145
+ Next we establish the latent variable identifiability and flexibility of this general class of LIDVAE,
1146
+ which will imply the identifiability and flexibility of all the special cases above.
1147
+ Proposition 3. The latent variable zi is identifiable in LIDVAE, i.e. for all i ∈ {1,...,n}, we have
1148
+ p(xi | zi = ˜z′,x<i ; θ) = p(xi | zi = ˜z,x<i ; θ)
1149
+
1150
+ ˜z′ = ˜z,
1151
+ ∀ ˜z′, ˜z,θ.
1152
+ (20)
1153
+ Moreover, for any data distribution generated by the classical VAE (Eqs. 17 to 19), there exists an
1154
+ LIDVAE that can generate the same distribution.
1155
+ Proof. We first establish the latent variable identifiability. To show that the latent variable zi is
1156
+ identifiable, it is sufficient to show that the mapping from zi to p(xi | zi ; θ) is injective for all θ.
1157
+ The injectivity holds because all the transformations (β1,β2, g1,θ, g2,θ) involved in the mapping is
1158
+ injective, and their composition must be injective: the linear transformations (β1,β2) have full row
1159
+ rank and hence are injective; the nonlinear transformations (g1,θ, g2,θ) are monotone transport maps
1160
+ and are guaranteed to be bijective [1, 9]; finally, the exponential family likelihood is injective.
1161
+ We next establish the flexibility of the LIDVAE, by proving that any VAE-generated p(x) can be
1162
+ generated by an LIDVAE. The proof proceeds in two steps: (1) we show any VAE-generated p(x)
1163
+ can be generated by a VAE with injective likelihood p(xi | zi ; θ); (2) we show any p(x) generated
1164
+ by an injective VAE can be generated by an LIDVAE.
1165
+ To prove (1), suppose β1 does not have full row rank and gθ is not injective. Then there exists some
1166
+ Z′ ∈ Rd, d < K, and injective β′
1167
+ 1,θ, g′
1168
+ θ such that the new VAE can represent the same p(x). The
1169
+ reason is that we can always turn an non-injective function into an injective one by considering its
1170
+ quotient space. In particular, we consider the quotient space with the equivalence relation between
1171
+ z, z′ defined as p(x| z; θ) = p(x| z′ ; θ)}, which induces a bijection into Rd. When p(z′) is no longer
1172
+ standard Gaussian, there must exist a bijective Brenier map ˜z = ft(z′) such that p(˜x) is standard
1173
+ Gaussian (Theorem 6 of McCann et al. [8]).
1174
+ 3
1175
+
1176
+ Pinwheel
1177
+ MNIST
1178
+ AU
1179
+ KL
1180
+ MI
1181
+ LL
1182
+ AU
1183
+ KL
1184
+ MI
1185
+ LL
1186
+ VAE [6]
1187
+ 0.2
1188
+ 1.4e-6
1189
+ 2.0e-3
1190
+ -6.2 (5e-2)
1191
+ 0.1
1192
+ 0.1
1193
+ 0.2
1194
+ -108.2 (5e-1)
1195
+ SA-VAE [5]
1196
+ 0.2
1197
+ 1.6e-5
1198
+ 2.0e-2
1199
+ -6.5 (5e-2)
1200
+ 0.4
1201
+ 0.4
1202
+ 0.6
1203
+ -106.3 (7e-1)
1204
+ Lagging VAE [3]
1205
+ 0.6
1206
+ 0.7e-3
1207
+ 1.5e0
1208
+ -6.5 (4e-2)
1209
+ 0.5
1210
+ 0.8
1211
+ 1.7
1212
+ -105.2 (5e-1)
1213
+ β-VAE [4] (β=0.2)
1214
+ 1.0
1215
+ 1.2e-3
1216
+ 2.3e0
1217
+ -6.6 (6e-2)
1218
+ 0.8
1219
+ 1.5
1220
+ 2.8
1221
+ -100.4 (6e-1)
1222
+ LIDGMVAE (this work)
1223
+ 1.0
1224
+ 1.2e-3
1225
+ 2.2e0
1226
+ -6.5 (5e-2)
1227
+ 1.0
1228
+ 1.8
1229
+ 3.9
1230
+ -95.4 (7e-1)
1231
+ Table 2: LIDGMVAE do not suffer from posterior collapse and achieves better fit than its classical
1232
+ counterpart in a 9-layer generative model. The reported number is mean (sd) over ten different
1233
+ random seeds. (Higher is better.)
1234
+ To prove (2), we show that any VAE with injective mapping can be reparameterized as a LIDVAE.
1235
+ To prove this claim, it is sufficient to show that any injective function lθ : RM+H → RD can be
1236
+ reparametrized as g2,θ(β⊤
1237
+ 2 g1,θ(·)). Below we provide such a reparametrization by solving for g1, g2
1238
+ and β in lθ(z) = g2,θ(β⊤
1239
+ 2 g1,θ(z)). We set g1,θ as an identity map, β2 as an (M + H)× D matrix with
1240
+ all the main diagonal entries being one and all other entries being zero, and g2,θ as an invertible
1241
+ Rd → Rd mapping which coincides with lθ on the (M + H)-dimensional subspace of z.
1242
+ Finally, we note that the same argument applies to the variant of VAE where wi = zi. It coincides
1243
+ with the classical VAE in Kingma & Welling [6]. Applying the same argument as above establishes
1244
+ Proposition 2.
1245
+ C
1246
+ Experiment details
1247
+ For image experiments, all hidden layers of the neural networks have 512 units. We choose the
1248
+ number of continuous latent variables as 64 and the dimensionality of categorical variables as the
1249
+ number of ground truth labels. Then we use two-layer RealNVP ([2]) as an approximating family
1250
+ to tease out the effect of variational inference.
1251
+ For text experiments, all hidden layers of the neural networks have 1024 units. We choose the
1252
+ dimensionality of the embedding as 1024. Then we use two-layer LSTM as an approximating family
1253
+ following common practice of fitting sequential VAE.
1254
+ D
1255
+ Additional experimental results
1256
+ Table 2 includes additional experimental results of LIDVAE on image datasets (Pinwheel and
1257
+ MNIST).
1258
+ 4
1259
+
1260
+ z1
1261
+ 2
1262
+ 1
1263
+ 0
1264
+ 1
1265
+ 2
1266
+ z2
1267
+ 2
1268
+ 1
1269
+ 0
1270
+ 1
1271
+ 2
1272
+ likelihood
1273
+ 3000
1274
+ 2500
1275
+ 2000
1276
+ 1500
1277
+ 1000
1278
+ 500
1279
+ (a) Likelihood (1D PPCA)
1280
+ 2
1281
+ 0
1282
+ 2
1283
+ 4
1284
+ 0.00
1285
+ 0.25
1286
+ 0.50
1287
+ 0.75
1288
+ 1.00
1289
+ 1.25
1290
+ prior of z1 and z2
1291
+ posterior of z1
1292
+ posterior of z2
1293
+ (b) Posterior (1D PPCA)
1294
+ z1
1295
+ 2
1296
+ 1
1297
+ 0
1298
+ 1
1299
+ 2
1300
+ z2
1301
+ 2
1302
+ 1
1303
+ 0
1304
+ 1
1305
+ 2
1306
+ likelihood
1307
+ 8000
1308
+ 6000
1309
+ 4000
1310
+ 2000
1311
+ (c) Likelihood (2D PPCA)
1312
+ 2
1313
+ 0
1314
+ 2
1315
+ 0.0
1316
+ 0.5
1317
+ 1.0
1318
+ 1.5
1319
+ prior of z1 and z2
1320
+ posterior of z1
1321
+ posterior of z2
1322
+ (d) Posterior (2D PPCA)
1323
+ Figure 3: Fitting PPCA with more latent dimensions than enough leads to non-identifiable local
1324
+ latent variables and collapsed posteriors. (a)-(b) Fit a two-dimensional PPCA to data drawn from a
1325
+ one-dimensional PPCA. The likelihood surface is constant in one dimension of the latent variable,
1326
+ i.e. this latent variable is non-identifiable. Hence its corresponding posterior collapses. (c)-(d) Fit
1327
+ a two-dimensional PPCA to data from a two-dimensional PPCA does not suffer from posterior
1328
+ collapse; its likelihood surface varies in all dimensions.
1329
+ 0.00
1330
+ 0.25
1331
+ 0.50
1332
+ 0.75
1333
+ 1.00
1334
+ mixture weight
1335
+ 6
1336
+ 4
1337
+ 2
1338
+ likelihood
1339
+ data
1340
+ 2 clusters (non-overlap) : ID
1341
+ 2 clusters (overlap):
1342
+ non-ID
1343
+ 1 cluster: non-ID
1344
+ (a) Likelihood function
1345
+ 0.00
1346
+ 0.25
1347
+ 0.50
1348
+ 0.75
1349
+ 1.00
1350
+ mixture weight
1351
+ 0
1352
+ 250
1353
+ 500
1354
+ 750
1355
+ 1000
1356
+ 2 clusters (non-overlap)
1357
+ 2 clusters (overlap)
1358
+ 1 cluster
1359
+ prior
1360
+ (b) Posterior histogram
1361
+ Figure 4: When a latent variable is non-identifiable (non-ID) in a model, its likelihood function
1362
+ is a constant function and its posterior is equal to the prior, i.e. its posterior collapses. Consider
1363
+ a Gaussian mixture model with two clusters x ∼ α · N (µ1,σ2
1364
+ 1) + (1 − α) · N (µ2,σ2
1365
+ 2), treating the
1366
+ mixture weight α as the latent variable and others as parameters. Fit the model to datasets generated
1367
+ respectively by one Gaussian cluster (α non-identifiable), two overlapping Gaussian clusters (α
1368
+ nearly non-identifiable), and two non-overlapping Gaussian clusters (α identifiable). Under optimal
1369
+ parameters, the likelihood function p(x|α) is (close to) a constant when the latent variable α is (close
1370
+ to) non-identifiable; its posterior is also (close to) the prior. Otherwise, the likelihood function is
1371
+ non-constant and the posterior is peaked.
1372
+ 5
1373
+
1374
+ References
1375
+ [1] Ball, K. (2004). An elementary introduction to monotone transportation. In Geometric aspects
1376
+ of functional analysis (pp. 41–52). Springer.
1377
+ [2] Dinh, L., Sohl-Dickstein, J., & Bengio, S. (2016). Density estimation using real NVP. arXiv
1378
+ preprint arXiv:1605.08803.
1379
+ [3] He, J., Spokoyny, D., Neubig, G., & Berg-Kirkpatrick, T. (2019). Lagging inference networks
1380
+ and posterior collapse in variational autoencoders. arXiv preprint arXiv:1901.05534.
1381
+ [4] Higgins, I., Matthey, L., et al. (2016). β-VAE: Learning basic visual concepts with a constrained
1382
+ variational framework.
1383
+ [5] Kim, Y., Wiseman, S., Miller, A., Sontag, D., & Rush, A. (2018). Semi-amortized variational
1384
+ autoencoders. In International Conference on Machine Learning (pp. 2678–2687).
1385
+ [6] Kingma, D. P. & Welling, M. (2014). Auto-encoding variational Bayes. In Proceedings of the
1386
+ International Conference on Learning Representations (ICLR), volume 1.
1387
+ [7] Lucas, J., Tucker, G., Grosse, R. B., & Norouzi, M. (2019). Don’t blame the ELBO! A linear
1388
+ VAE perspective on posterior collapse. In Advances in Neural Information Processing Systems
1389
+ (pp. 9403–9413).
1390
+ [8] McCann, R. J. et al. (1995). Existence and uniqueness of monotone measure-preserving maps.
1391
+ Duke Mathematical Journal, 80(2), 309–324.
1392
+ [9] McCann, R. J. & Guillen, N. (2011). Five lectures on optimal transportation: geometry, regu-
1393
+ larity and applications. Analysis and geometry of metric measure spaces: Lecture notes of the
1394
+ séminaire de Mathématiques Supérieure (SMS) Montréal, (pp. 145–180).
1395
+ 6
1396
+
8tAyT4oBgHgl3EQfqPgO/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
AdFIT4oBgHgl3EQf-yxb/content/tmp_files/2301.11412v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
AdFIT4oBgHgl3EQf-yxb/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BtFAT4oBgHgl3EQfsR7g/content/2301.08658v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:64810ba98fbffcae7cd62e975df5e7a0ece619d60a459b10a2845c2beeebdde9
3
+ size 822893
BtFAT4oBgHgl3EQfsR7g/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:af6febca82489302c92c49b95b84b9aaa555ba2064df220eed3a341057f59e9c
3
+ size 123086
C9E1T4oBgHgl3EQfpwXL/content/tmp_files/2301.03336v1.pdf.txt ADDED
@@ -0,0 +1,1444 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03336v1 [math.FA] 8 Dec 2022
2
+ On existence theorems of a functional differential
3
+ equations in partially ordered Banach algebras
4
+ Amor Fahem(1), Aref Jeribi (1) and Najib Kaddachi (2)
5
+ (1) Department of Mathematics. University of Sfax. Faculty of Sciences of Sfax.
6
+ Soukra Road Km 3.5 B.P. 1171, 3000, Sfax, Tunisia
7
+ E-mail: [email protected]
8
+ E-mail: [email protected]
9
+ (2) University of Kairouan. Faculty of Science and Technology of Sidi Bouzid. Agricultural
10
+ University City Campus − 9100, Sidi Bouzid, Tunisia
11
+ E-mail: [email protected]
12
+ Abstract. In this paper we are concerned with existence results for a coupled system of
13
+ quadratic functional differential equations. This system is reduced to a fixed point problem
14
+ for a 2 × 2 block operator matrix with nonlinear inputs. To prove the existence we are
15
+ established some fixed point theorem of Dhage’s type for the block matrix operator acting
16
+ in partially ordered Banach algebras.
17
+ Keywords:
18
+ Partially
19
+ ordered
20
+ Banach
21
+ algebra,
22
+ Fixed
23
+ point
24
+ theory,
25
+ Partial
26
+ measure
27
+ of
28
+ noncompactness, differential equations, block Operator matrix.
29
+ Mathematics Subject Classification: 47H10, 47H08, 47H09.
30
+ 1
31
+ Introduction
32
+ The theory of fixed point is one of the most powerful and most fruitful tools of modern
33
+ mathematics and can consider a fundamental material of non-linear analysis. In recent years a
34
+ number of excellent monographs and surveys by distinguished authors about fixed point theory
35
+ have appeared such as, [1, 2, 5, 6, 9, 20]. Based on the fact that the Banach spaces are the
36
+ fundamental underlying spaces on linear and nonlinear analysis, it leads us to consider the
37
+ following problem: if a Banach space is equipped with an ordering structure, partial order or
38
+ lattice, this Banach space becomes a partially ordered Banach space. Then, when we solve
39
+ some problems on this Banach space, in addition to the topological structure and the algebraic
40
+ structure, the ordering structure will provide a new powerful tool. This important idea has
41
+ been widely used in solving integral equations [4, 7, 12, 18, 19, 21, 24, 26]. In this work, we are
42
+ 1
43
+
44
+ mainly concerned with the existence results of solutions of the following system of Quadratic
45
+ nonlinear functional differential equation (in short QFDE)
46
+
47
+
48
+
49
+
50
+
51
+
52
+
53
+
54
+
55
+
56
+
57
+
58
+
59
+
60
+
61
+ �x(t) − f1(t, x(t))
62
+ f2(t, y(t))
63
+ �′
64
+ + λ
65
+ �x(t) − f1(t, x(t))
66
+ f2(t, y(t))
67
+
68
+ = g(t, y(t))
69
+ y(t) =
70
+ 1
71
+ 1 − b(t)|x(t)| − p
72
+
73
+ t,
74
+ 1
75
+ 1 − b(t)|x(t)|
76
+
77
+ + p(t, y(t))
78
+
79
+ x(0), y(0)
80
+
81
+ = (x0, y0) ∈ R2,
82
+ (1.1)
83
+ where λ ∈ R+, b : J −→ R and f1, f2, g, p : J × R −→ R are continuous with f2 not ever
84
+ vanishing. The first equation of FDE (1.1) is general in the sense that it includes some im-
85
+ portant classes of functional differential equations. If we take x = y, f1(t, x) = φ(t, x) = 0
86
+ and f2(t, x) = f(t, x, y) and g(t, x) = g(t, x, y), then the FDE (1.1) reduces to the following
87
+ functional differential equation with a delay:
88
+
89
+
90
+
91
+
92
+
93
+
94
+
95
+
96
+ x(t)
97
+ f(t, x(t), X(t))
98
+ �′
99
+ + λ
100
+
101
+ x(t)
102
+ f(t, x(t), X(t))
103
+
104
+ = g(t, x(t), xt),
105
+ t ∈ I
106
+ x0 = φ ∈ C([−r, 0], R),
107
+ r > 0
108
+ whenever I = [0, T ], T > 0. The equation was examined in the paper [15, 17] and some special
109
+ cases of this equation were considered in [25].
110
+ Again, when f1(t, x) = φ(t, x) = 0, f2(t, x) = 1 and g(t, x) = g(t, x, y), the QFDE (1.1) reduces
111
+ to the following known nonlinear differential equation with maxima
112
+
113
+
114
+
115
+ x′(t) + λx(t) = g(t, x(t), X(t),
116
+ t ∈ I
117
+ x(0) = α0 ∈ R+.
118
+ The above nonlinear differential equation with maxima has already been discussed in [3] for
119
+ existence and uniqueness of the solutions via classical methods of Schauder and Banach fixed
120
+ point principles.
121
+ Furthermore, if f1(t, x) = f(t, x, y), f2(t, x) = 1, φ(t, x) = 0 and g(t, x) = g(t, x, y), the QFDE
122
+ (1.1) reduces to the following HDE without maxima,
123
+
124
+
125
+
126
+ (x(t) − f(t, x(t), X(t))′ + λ(x(t) − f1(t, x(t))) = g(t, x(t), X(t))
127
+ x(0)) = α0 ∈ R+,
128
+ (1.2)
129
+ which is discussed in [14] via Dhage iteration method and established the existence and approx-
130
+ imation result under some mixed partial Lipschitz and partial compactness conditions.
131
+ Note that the system (1.1) may be transformed into the following fixed point problem of
132
+ the 2 × 2 block operator matrix
133
+ � A
134
+ B · B′
135
+ C
136
+ D
137
+
138
+ ,
139
+ (1.3)
140
+ where the entries of the matrix are, in general, nonlinear operators defined on partially ordered
141
+ Banach algebras. The operators occurring in the representation (1.3) are nonlinear, and our
142
+ assumptions are as follows: A a maps nondecreasing in a partially ordered Banach algebra E
143
+ into E and B, C, D and B′ are nondecreasing and positive operators from E into E.
144
+ In this direction, the authors A. Jeribi, B. Krichen and N. Kaddachi in [22, 23] have es-
145
+ tablished some fixed point for a 2 × 2 operator matrix (1.3), when X is a Banach algebra
146
+ 2
147
+
148
+ satisfying certain condition. It is important to mention that the theoretical study was based
149
+ on the existence of a solution of the following equation
150
+ x = Ax · Bx + Cx
151
+ (1.4)
152
+ and obtained a lot of valuable results ([10, 12, 13] and the references therein). These studies
153
+ were mainly based on the closure of the bounded domain, and properties of the operators A,
154
+ B and C (cf. partially completely continuous, partially nonlinear k-set contractive, partially
155
+ condensing, and the potential tool of the axiomatic partially measure of noncompactness,...).
156
+ This paper is organized as follows. In the next section, we give some preliminary results
157
+ needed in the sequel. In Section 3, we present existence results for Equation (1.4). In Section 4,
158
+ we will deal with some fixed point results for 2 × 2 block operator matrices in partially ordered
159
+ Banach algebra. The main results of this section are Theorems 4.1 and 4.2. In Section 5, we
160
+ give an application showing the existence of solutions of the system (1.1) in partially ordered
161
+ Banach algebra.
162
+ 2
163
+ Auxiliary Results
164
+ Throughout this paper, let (E, ⪯, ∥·∥) be a partially ordered Banach algebra with zero element
165
+ θ. Two elements x and y in E are called comparable if either the relation x ⪯ y or y ⪯ x
166
+ holds. A non-empty subset C of E is called a chain or totally ordered set if all elements of
167
+ C are comparable. It is know that E is regular if {xn} a nondecreasing (resp. nonincreasing)
168
+ sequence in E and xn → x∗ as n → ∞, then xn ⪯ x∗ (resp. xn ⪰ x∗) for all n ∈ N. The
169
+ conditions guaranteeing the regularity of E many be found in Guo and Lakshmikentham [20]
170
+ and Nieto and Lopez [26] and the references therein.
171
+ At the beginning of this section, we present some basic facts concerning the partially mea-
172
+ sures of noncompactness in E. If C is a chain in E, then C′ denotes the set of all limit points
173
+ of C in E. The symbol C stands for the closure of C in E defined by C = C ∪ C′. The set C
174
+ is called a closed chain in E. Thus, C is the intersection of all closed chains containing C. In
175
+ what follows, we denote by Pcl(E), Pbd(E), Prcp(E), Pch(E), Pbd,ch(E), Prcp,ch(E), the class
176
+ of all nonempty and closed, bounded, relatively compact, chains, bounded chains and relatively
177
+ compact chains of E respectively. Recall that the notion of the partial Kuratowski measure of
178
+ noncompactness αp(.) on E by the formula:
179
+ αp(C) = inf
180
+
181
+ r > 0, C =
182
+ n�
183
+ i=1
184
+ Ci, diam(Ci) ≤ r ∀i
185
+
186
+ where diam(Ci) = sup{∥x − y∥ : x, y ∈ Ci}. For convenience we recall some basic properties of
187
+ αp(.) needed below [11, 12, 13, 15].
188
+ Definition 2.1 A mapping αp : Pbd,ch(E) −→ R+ is said to be a partially measure of noncompactness
189
+ in E if it satisfies the following conditions:
190
+ 1. ∅ ̸= (αp)−1({0}) ⊂ Prcp,ch(E),
191
+ 2. αp(C) = αp(C),
192
+ 3. αp is nondecreasing,
193
+ 4. If {Cn} is a sequence of nondecreasing closed chains from Pbd,ch(E) with lim
194
+ n→∞ αp(Cn) = 0,
195
+ then C∞ = ∩∞
196
+ n=0Cn is a nonempty set and αp(C∞) = 0,
197
+ 3
198
+
199
+ The family of sets described in 1. is said to be the kernel of the measure of noncompactness
200
+ αp and is defined as
201
+ ker αp = {C ∈ Pbd,ch(E)|αp(C) = 0}
202
+ Clearly, ker αp ⊂ Prcp,ch(E). Observe that the intersection set C∞ from condition 4. is
203
+ a member of the family kerαp. In fact, since αp(C∞) ≤ αp(Cn) for any n, we infer that
204
+ αp(C∞) = 0. This yields that αp(C∞) ∈ ker αp. This simple observation will be essential
205
+ in our further investigations.
206
+ The partially measure αp of noncompactness is called sublinear if it satisfies
207
+ 5. αp(C1 + C2) ≤ αp(C1) + αp(C2), for all C1, C2 ∈ Pbd,ch,
208
+ 6. αp(λC1) = |λ|α(C1), for all λ ∈ R,
209
+ Again, αp is said to satisfy maximum property if
210
+ 7. αp(C1 ∪ C2) = max{αp(C1), αp(C2)}.
211
+ Finally, αp is said to be full or complete if
212
+ 8. ker αp = Prcp,ch(E)
213
+
214
+ The following definitions (see [11, 12, 13] and the references therein) are frequently used in the
215
+ subsequent part of this paper.
216
+ Definition 2.2 A mapping T : E −→ E is called monotone nondecreasing if it preserves the
217
+ order relation ⪯, that is, if x ⪯ y implies T x ⪯ T y for all x, y ∈ E. Similarly, T is called
218
+ monotone nonincreasing if x ⪯ y implies T x ⪰ T y for all x, y ∈ E. A monotone mapping T is
219
+ one which is either monotone nondecreasing or monotone nonincreasing on E.
220
+
221
+ Definition 2.3 A mapping ψ : R+ −→ R+ is called a dominating function or, in short,
222
+ D-function if it is an upper semi-continuous and monotonic nondecreasing function satisfying
223
+ ψ(0) = 0
224
+
225
+ Definition 2.4 A mapping T : E −→ E is called partially nonlinear D-Lipschitzian if there
226
+ exist a D-function ψ : R+ −→ R+ satisfying
227
+ ∥T x − T y∥ ≤ ψ(∥x − y∥),
228
+ for all comparable elements x, y ∈ E where ψ(0) = 0. The function ψ is called a D-function of
229
+ T on E. If ψ(r) = kr, k > 0, then T is called partially Lipschitzian with the Lipschitz constant
230
+ k. In particular, if k < 1, then T is called a partially contraction on E with the contraction
231
+ constant k. Finally, T is called a partially nonlinear D-contraction if it is a partially nonlinear
232
+ D-Lipschitzian with ψ(r) < r for r > 0.
233
+
234
+ Remark 2.1 Obviously, every partially Lipshitzian mapping is partially nonlinear D-Lipshitizian.
235
+ the converse may be not true.
236
+ Definition 2.5 A nondecreasing mapping T : E −→ E is called partially nonlinear D-set-Lipschitzian
237
+ if there exists a D-function ψ such that
238
+ αp(T C) ≤ ψ(αp(C)),
239
+ for all bounded chain C in E. T is called partially k-set-Lipschitzian if ψ(r) = kr, k > 0. T is
240
+ called partially k-set-contraction if it is a partially k-set-Lipschitzian with k < 1. Finally, T is
241
+ called a partially nonlinear D-set-contraction if it is a partially nonlinear D-Lipschitzian with
242
+ ψ(r) < r for r > 0.
243
+
244
+ 4
245
+
246
+ Definition 2.6 A mapping T : E −→ E is called partially continuous at a point a ∈ E if
247
+ for ε > 0 there exist a δ > 0 such that ∥T x − T a∥ < ε whenever x is comparable to a and
248
+ ∥x − a∥ < δ. T called partially continuous on E if it is partially continuous at every point of
249
+ it. It is clear that if T is partially continuous on E, then it is continuous on every chain C
250
+ contained in E.
251
+
252
+ Definition 2.7 A mapping T : E −→ E is called partially bounded if T (C) is bounded for every
253
+ chain C in E. T is called uniformly partially bounded if all chains T (C) in E are bounded by
254
+ a unique constant. T is called bounded if T (E) is a bounded subset of E.
255
+
256
+ Definition 2.8 A mapping T : E −→ E is called partially compact if T (C) is a relatively
257
+ compact subset of E for all totally ordered sets or chains C in E. T is called uniformly partially
258
+ compact if T (C) is a uniformly partially bounded and partially compact on E.
259
+ T is called
260
+ partially totally bounded if for any totally ordered and bounded subset C of E, T (C) is a relatively
261
+ compact subset of E. If T is partially continuous and partially totally bounded, then it is called
262
+ partially completely continuous on E.
263
+
264
+ Remark 2.2 Note that every compact mapping on a partially normed linear space is partially
265
+ compact and every partially compactmapping is partially totally bounded, however the reverse
266
+ implications do not hold. Again, every completely continuous mapping is partially completely
267
+ continuous and every partially completely continuous mapping is partially continuous and partially
268
+ totally bounded, but the converse may not be true.
269
+
270
+ Definition 2.9 The order relation ⪯ and the metric d on a non-empty set E are said to be
271
+ compatible if {xn} is a monotone, that is, monotone nondecreasing or monotone nondecreasing
272
+ sequence in E and if a subsequence {xnk} of {xn} converges to x∗ implies that the whole
273
+ sequence {xn} to x∗. Similarly, given a partially ordered normed linear space (E, ⪯, ∥ · ∥) the
274
+ order relation ⪯ and the norm ∥ · ∥ are said to be compatible if ⪯ and the metric d defined
275
+ through the norm ∥ · ∥ are compatible.
276
+
277
+ Definition 2.10 A map T : E −→ E is called T -orbitally continuous on E if for any sequence
278
+ {xn} ⊆ O(x; T ) = {x, T x, T 2x, . . . , T nx, . . .} we have that xn → x∗ implies that T xn → T x∗
279
+ for each x ∈ E. The metric space E is called T -orbitally complete if every cauchy sequence
280
+ {xn} ⊆ O(x; T ) converses to a point x∗ ∈ E.
281
+ We need the following results in the sequel.
282
+ Let (E, ⪯, ∥ · ∥) be partially ordered Banach
283
+ algebra. Denote
284
+ E+ = {x ∈ E/x ⪰ θ} and K = {E+ ⊂ E/uv ∈ E+ for all u, v ∈ E+},
285
+ where θ is the zero element of E. The members K are called positive vectors in E.
286
+ Lemma 2.1 [15] If u1, u2, v1, v2 ∈ K are such that u1 ⪯ v1 and u2 ⪯ v2, then u1u2 ⪯ v1v2. ♦
287
+ Definition 2.11 An operator T : E −→ E is said to be positive if the range R(T ) of T is such
288
+ that R(T ) ⊆ K.
289
+
290
+ Lemma 2.2 [12] If C1 and C2 are two bounded chains in a partially ordered Banach algebra
291
+ E, then
292
+ αp(C1 · C2) ≤ ∥C2∥αp(C1) + ∥C1∥αp(C2)
293
+ where ∥C∥ = sup{∥c∥, c ∈ C}.
294
+
295
+ Theorem 2.1 [11] Let (E, ⪯, ∥.∥) be a partially ordered set and let T : E → E be a nondecreasing
296
+ mapping. Suppose that there is a metric d in X such that (E, d) is a T -orbitally complete metric
297
+ space. Assume that there exists a D-function ψ such that
298
+ d(T x, T y) ≤ ψ(d(x, y))
299
+ 5
300
+
301
+ for all comparable elements x, y ∈ E satisfying ψ(r) < r for r > 0.Further assume that either
302
+ T is T -orbitally continuous on E or E is such that if {xn} is a nondecreasing sequence with
303
+ xn → x ∈ E, then x ⪯ x for all n ∈ N. If there is an element x0 ∈ E satisfying x0 ⪯ T x0 or
304
+ x0 ⪰ T x0, then T has a fixed point which is further unique if "every pair of elements in E has
305
+ a lower and an upper bound".
306
+
307
+ Theorem 2.2 [11] Let (E, ⪯, ∥·∥) be a partially ordered Banach algebra. Let T : E −→ E be a
308
+ nondecreasing, partially compact and continuous mapping. Further if the order relation ⪯ and
309
+ the norm ∥ · ∥ in E are compatible and if there is an element x0 ∈ E satisfying x0 ⪯ T x0 or
310
+ x0 ⪰ T x0, then T has a fixed point.
311
+
312
+ Theorem 2.3 [12] Let (E, ⪯, ∥ · ∥) be a regular partially ordered complete normed linear space
313
+ such that the order relation and ⪯ the norm ∥ · ∥ are compatible.
314
+ Let T : E −→ E be a
315
+ nondecreasing, partially continuous and partially bounded mapping. If T is partially nonlinear
316
+ D-set-contraction and if there exists an element x0 ∈ E such that x0 ⪯ T x0 or x0 ⪰ T x0, then
317
+ T has a fixed point x∗ and the sequence {T nx0} of successive iterations converges monotonically
318
+ to x∗.
319
+
320
+ 3
321
+ Reformulation of Dhage’s fixed point theorems
322
+ In this section, we prove some fixed point theorems in partially ordered Banach algebras. Our
323
+ results are formulated using some Dhage’s type fixed point. Now, we establish our first fixed
324
+ point theorem by modifying some assumptions of Theorem 4.1 in [12].
325
+ Theorem 3.1 Let S be non-empty closed and partially bounded subset of a regular partially
326
+ ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ in E are
327
+ compatible. Let A : E −→ K, B : S −→ K and C : E −→ E be three nondecreasing operators
328
+ satisfying the following conditions:
329
+ (i) A and C are partially nonlinear D-Lipschitzians with D-functions ψA and ψC,
330
+ (ii) B is continuous and partially compact,
331
+ (iii) There exists x0 ∈ S such that x0 ⪯ Ax0 ·By +Cx0 or x0 ⪰ Ax0 ·By +Cx0 for each y ∈ S,
332
+ (iv) Ax · By + Cx ∈ S for all y ∈ S
333
+ (v) Every pair of elements x, y ∈ E has a lower and an upper bound in E.
334
+ Then the equation (1.4) has a fixed point in Eas soon as MψA(r) + ψC(r) < r if r > 0, where
335
+ M = ∥B(E)∥.
336
+
337
+ Proof.
338
+ Suppose that there exists x0 ∈ S such that x0 ⪯ Ax0 ·By +Cx0. Let y ∈ S and define
339
+ a mapping define a mapping Ay : S −→ S by the formula
340
+ Ay(x) = Ax · By + Cx.
341
+ Since A and B are positive and A, B and C are nondecreasing, Ay is nondecreasing Now, let
342
+ x1, x2 ∈ E be two comparable elements. Then
343
+ ∥Ay(x1) − Ay(x2)∥
344
+ =
345
+ ∥Ax1 · By + Cx1 − Ax2 · By − Cx2∥
346
+
347
+ ∥Ax1 · By − Ax2 · By∥ + ∥Cx1 − Cx2∥
348
+
349
+ ∥By∥∥Ax1 − Ax2∥ + ∥Cx1 − Cx2∥
350
+
351
+ (MψA + ψC) (∥x1 − x2∥).
352
+ This implies that the operator Ay is a partially nonlinear D-contraction. Hence, by Theorem
353
+ 2.1 there exist a unique point x∗ ∈ E such that
354
+ x∗ = Ax∗ · By + Cx∗.
355
+ 6
356
+
357
+ because the hypothesis (iv) for all y ∈ S we have x∗ ∈ S. Define a mapping
358
+ T :
359
+ S
360
+ −→ S
361
+ y
362
+ �−→ x∗,
363
+ where x∗ is the unique solution of the equation Ax∗ · By + Cx∗. Since A, B and B′ are nonde-
364
+ creasing and B and B′ are positive , T is nondecreasing. Now we show that T is continuous.
365
+ Let {yn}∞
366
+ n=0 be any sequence in B(E) converging to a point y, Since S is closed, y ∈ S. Then,
367
+ ∥T yn − T y∥
368
+ =
369
+ ∥Ax∗
370
+ n · yn + Cx∗
371
+ n − Ax · y − Cx∥
372
+
373
+ ∥Ax∗
374
+ n · yn − Ax · y∥ + ∥Cx∗
375
+ n − Cx∥
376
+
377
+ ∥Ax∗
378
+ n · yn − Ax · yn∥ + ∥Ax · yn − Ax · y∥ + ∥Cx∗
379
+ n − Cx∥
380
+
381
+ (MψA + ψc)(∥xn − x∥) + ∥Ax∥∥yn − y∥.
382
+ Hence
383
+ lim sup
384
+ n ∥T yn − T y∥ ≤ (MψA + ψc)(lim sup
385
+ n ∥xn − x∥) + ∥Ax∥ lim sup
386
+ n ∥yn − y∥.
387
+ This show that
388
+ lim
389
+ n→+∞ ∥T yn − T y∥ = 0 and the claim is approved. Next, we shows that T is
390
+ partially compact. In fact, let C be a chain in S, for any z ∈ C we have
391
+ ∥Az∥
392
+
393
+ ∥Aa∥ + ψA(∥z − a∥)
394
+
395
+ ∥Aa∥ + ∥z − a∥
396
+ M
397
+
398
+ c,
399
+ where c = ∥Aa∥ + diamC
400
+ M
401
+ for some fixed point a in C.
402
+ Let ε > 0 be given. By assumption (ii), we infer that B(C) is partially totally bounded, then
403
+ there exist a chain Y = {y1, . . . , yn} of point in C such that
404
+ B(C) ⊆
405
+ n�
406
+ i=1
407
+ Bδ(wi),
408
+ where wi = Byi and δ = 1
409
+ c(ε − (MφA(ε) + φC(ε))) and Bδ(wi) is an open ball in E centered at
410
+ wi of radius δ. Therefore, for any y ∈ C, we have yk ∈ Y such that
411
+ c∥Byi − By∥ ≤ δ.
412
+ Also, we have
413
+ ∥T yk − T y∥
414
+
415
+ ∥Ax∗
416
+ k · Byk − Ax · By∥ − ∥Cx∗
417
+ k − Cx∥
418
+
419
+ M(ψA + ψC)∥x∗
420
+ k − x∥ + ∥Ax∥∥Byk − By∥
421
+
422
+ M(ψA + ψC)∥x∗
423
+ k − x∥ + c∥Byk − By∥.
424
+ Then
425
+ (I − M(ψA + ψC))(∥T yk − T y∥) ≤ c∥Byk − By∥.
426
+ So,
427
+ ∥T (yk) − T (y)∥ < ε,
428
+ because y ∈ C is arbitrary,
429
+ T (S) ⊆
430
+ n
431
+
432
+ i=1
433
+ Bε(ki),
434
+ 7
435
+
436
+ where ki = T (yi). As a result, T (S) is partially totally bounded in E. Hence, T is is partially
437
+ compact. The order relation ⪯ and the norm ∥.∥ are compatible, so the desired conclusion
438
+ follows of Theorem 2.2 we have T has a fixed point in S.
439
+
440
+ Now, modifying same assumptions of Theorem 4.8 in [13], we have the following result.
441
+ Theorem 3.2 Let S be closed and partially bounded subset of a regular partially ordered Banach
442
+ algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ are compatible in every
443
+ compact chain C of S. Let A, B : S → K and C : S −→ E be three nondecreasing operators
444
+ satisfying the following conditions
445
+ (i) A and C are partially nonlinear D-Lipschitzians with D-functions ψA and ψC respectively,
446
+ (ii) B is partially completely continuous ,
447
+ (iii)
448
+ �I − C
449
+ A
450
+ �−1
451
+ exist on B(S) and is nondecreasing,
452
+ (iv) There exist x0 ∈ S such that x0 ⪯ Ax0 · By + Cx0 or x0 ⪰ Ax0 · By + Cx0, for each y ∈ S,
453
+ (v) Ax · By + Cx ∈ S for all y ∈ S,
454
+ Then the equation (1.4) has a fixed point in S as soon as MψA(r) + ψC(r) < r if r > 0 where
455
+ M = ∥B(S)∥.
456
+ Proof.
457
+ Suppose that there exist x0 ⪯ Ax0 · By + Cx0. It is easy to check that the vector
458
+ x ∈ E is a solution for the equation (1.4), if and only if x is a fixed point for the operator
459
+ T :=
460
+ �I − C
461
+ A
462
+ �−1
463
+ B. From assumption (iii) it follows that, for each y ∈ S there is a unique
464
+ xy ∈ E such that
465
+ �I − C
466
+ A
467
+
468
+ xy = By
469
+ or, in an equivalently way
470
+ Axy · By + Cxy = xy.
471
+ Since the assumption (v) holds, then xy ∈ S. Hence the map T : S −→ S is well define. from
472
+ assumption (iii), it follows that T is nondecreasing. Now, in view of Theorem 2.2, it suffices
473
+ to prove that T is continuous and partially compact. Indeed let {yn}∞
474
+ n=0 be any sequence in S
475
+ converging to a point y. Because S is closed, y ∈ S. Now
476
+ ∥T yn − T y∥
477
+ =
478
+ ∥Ax∗
479
+ n · Byn + Cx∗
480
+ n − Ax∗ · By − Cx∗∥
481
+
482
+ ∥Ax∗
483
+ n · Byn − Ax∗ · By∥ + ∥Cx∗
484
+ n − Cx∗∥
485
+
486
+ ∥Ax∗
487
+ n · Byn − Ax∗ · Byn∥ + ∥Ax∗ · Byn − Ax∗ · By∥ + ∥Cx∗
488
+ n − Cx∗∥
489
+
490
+ (MψA + ψC)(∥x∗
491
+ n − x∗∥) + ∥AT y∥∥Byn − By∥.
492
+ Hence,
493
+ lim
494
+ n sup ∥T yn − T y∥ ≤ (MψA + ψC) lim
495
+ n sup ∥T yn − T y∥ + ∥AT y∥ lim
496
+ n sup ∥Byn − By∥.
497
+ This shows that lim
498
+ n→∞ ∥Nyn − Ny∥ = 0 and the claim is approved. Next, we shows that T
499
+ is paritally compact. Since B is partially compact and
500
+ �I − C
501
+ A
502
+ �−1
503
+ is continuous, then the
504
+ composition mapping T =
505
+ �I − C
506
+ A
507
+ �−1
508
+ B is continuous and partially compact on E. Next, the
509
+ order relation ⪯ and the norm ∥ · ∥ in E are compatible. Hence, an application of Theorem 2.2
510
+ infer that T has, at least, one fixed point in S.
511
+
512
+ 8
513
+
514
+ 4
515
+ Application of Dhage’s fixed point to block matrix operator
516
+ In what follows, we will study the existence of a fixed point for the block matrix operators.
517
+ Theorem 4.1 Let (E, ⪯, ∥·∥) be a regular partially ordered Banach algebra such that the order
518
+ relation ⪯ and the norm ∥ · ∥ in E are compatible. Let A, C, D : E −→ E and B, B′ : E −→ K
519
+ be five nondecreasing operators satisfying the following assumptions:
520
+ (i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
521
+ ψA, ψB and ψC respectively,
522
+ (ii) (I − D)−1 exist and partially nonlinear D-Lipschitz with D-function ψφ and (I − D)−1C is
523
+ nondecreasing,
524
+ (iii) B′ is partially continuous and C is compact,
525
+ (iv) There exist x0 ∈ E, such that x0 ⪯ Ax0 + T x0 · T ′x0 or x0 ⪰ Ax0 + T x0 · T ′x0, where
526
+ T = B(I − D)−1C and T ′ = B′(I − D)−1C.
527
+ Then the operator matrix (1.3) has a fixed point in E × E, whenever Mψ(r) ≤ r if r > 0 with
528
+ ψ(r) = ψB ◦ ψφ ◦ ψC(r) + ψA(r) and M = ∥T ′(E)∥.
529
+ Proof.
530
+ Suppose that there is an element x0 ∈ E such that x0 ⪯ Ax0 + T x0 · T ′x0. Define a
531
+ mapping F : E −→ E by the formula
532
+ Fx = Ax + T x · T ′x.
533
+ Since B and B′ are positive and A, B, B′ and (I − D)−1C are nondecreasing we infer that F
534
+ is nondecreasing. Next, we claim that F is partially continuous. To do us, let {xn; n ∈ N}
535
+ be a sequence in E which converge to a point x such that xn and x are comparable. From
536
+ assumption (i), it follows that:
537
+ ∥Fxn − Fx∥
538
+ =
539
+ ∥Axn + T xn · T ′xn − Ax − T x · T ′x∥
540
+
541
+ ∥Axn − Ax∥ + ∥T xn · T ′xn − T x · T ′x∥
542
+
543
+ ∥Axn − Ax∥ + ∥T xn∥∥T ′xn − T ′
544
+ x∥ + ∥T ′x∥∥T xn − T x∥
545
+
546
+ ψA + MψB ◦ ψφ ◦ ψC(∥xn − x∥) + ∥T xn∥∥T ′xn − T ′x∥.
547
+ From the partially continuity of B′, and taking limit supremum in the aforementioned inequality
548
+ yields that
549
+ lim
550
+ n→∞ ∥Fxn − Fx∥ = 0.
551
+ This proves that F is a partially continuous operators on E. Again by assumption (iv), it is
552
+ clear that x0 ⪯ Fx0. Moreover, it easy to show that F is partially bounded. Furthermore, we
553
+ show that F is a partially nonlinear D-set-contraction on E. Let C be a bounded chain in E.
554
+ Then by definition of F, we have
555
+ F(C) ⊆ A(C) + T (C)T ′(C).
556
+ Since F is nondecreasing and partially continuous F(C) is again a bounded chain in E. Keeping
557
+ in mind the relatively compactness of T ′(C) and making use of Lemma 2.2 together with the
558
+ subadditivity of the partially Kuratowski measure of noncompactness αp, enables us to have
559
+ αp(F(C))
560
+
561
+ ∥T (C))∥αp(T ′(C)) + ∥T ′(C)∥αp(T (C)) + αp(A(C))
562
+
563
+ Mαp(T (C)) + αp(A(C))
564
+
565
+ MψB ◦ ψφ ◦ ψC(αp(C)) + ψA(αp(C))
566
+ =
567
+ ψ(αp(C)),
568
+ where ψ(r) = ψA(r) + MψB ◦ ψφ ◦ ψC(r) < r for all r > 0. This shows that F is a partially
569
+ nonlinear D-set-contraction on E. Finally the relation ⪯ and the norm ∥ · ∥ are compatible, so
570
+ the desired conclusion follows by an application of Theorem 2.3 we have x = Ax + T x · T ′x has
571
+ a solution in E. Now, use the vector y = (I − D)−1Cx to achieve the proof.
572
+
573
+ 9
574
+
575
+ Remark 4.1 If A is a contraction on S into itself with constant contraction k and B a partially
576
+ nonlinear D-lipshitzian with a D-function ψB, and C(S) ⊂ (I−D)(E), then the operator inverse
577
+ (I − A)−1B exist and partially nonlinear D-lipshiztian with a D-function ψ(r) =
578
+ 1
579
+ 1−kψB(r).
580
+ Next, we will combine Theorem 4.1 and Remark 4.1 in order to to obtain the following fixed
581
+ point theorem:
582
+ Corollary 4.1 Let (E, ⪯, ∥·∥) be a regular partially ordered Banach algebra such that the order
583
+ relation ⪯ and the norm ∥ · ∥ in E are compatible. Let A, C, D : E −→ E and B, B′ : E −→ K
584
+ are five nondecreasing operators satisfying the following assumptions:
585
+ (i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
586
+ ψA, ψB and ψC respectively,
587
+ (ii) D is a contraction with a contraction constant k and (I − D)−1C is nondecreasing,
588
+ (iii) B′ is partially continuous and C is partially compact, and C(E) ⊂ (I − D)(E)
589
+ (iv) x0 ⪯ Ax0 +T x0 ·T ′x0 or x0 ⪰ Ax0 +T x0 ·T ′x0, for some x0 ∈ E, where T = B(I −D)−1C
590
+ and T ′ = B′(I − D)−1C.
591
+ Then the operator matrix (1.3) has a fixed point in E × E, whenever Mψ(r) ≤ r if r > 0 with
592
+ ψ(r) = ψB ◦ (
593
+ 1
594
+ 1−k)ψC(r) + ψA(r) and M = ∥T ′(E)∥.
595
+ Based on the conditions C ≡ 0E and D = 1E in which 0E and 1E represents respectively the
596
+ zero and the unit element of the partially ordered Banach algebra E, we infer from Theorem
597
+ 4.1 the following result:
598
+ Corollary 4.2 [12] Let (E, ⪯, ∥ · ∥) be a regular partially ordered Banach algebra such that the
599
+ order relation ⪯ and the norm ∥ · ∥ in E are compatible. Let A : E −→ E and B, B′ : E −→ K
600
+ be five nondecreasing operators satisfying the following assumptions:
601
+ (i) A, B and are partially bounded and partially nonlinear D-Lipschitzians with D-functions
602
+ ψA, ψB respectively,
603
+ (ii) B′ is partially continuous and compact,
604
+ (ii) There exist x0 ∈ E, such that x0 ⪯ Ax0 + Bx0 · B′x0 or x0 ⪰ Ax0 + Bx0 · B′x0.
605
+ Then the operator matrix (1.3) has a fixed point in E × E, whenever Mψ(r) ≤ r if r > 0 with
606
+ ψ(r) = ψB + ψA(r) and M = ∥B′(E)∥.
607
+ Next, we can modify some assumptions of Theorem 3.2 in order to study the problem in block
608
+ operator matrix.
609
+ Theorem 4.2 Let S be a non-empty closed partially bounded subset of a regular partially
610
+ ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ are
611
+ compatible in every compact chain C of S. Let A, C : S −→ E and B, B′, D : E −→ K be five
612
+ nondecreasing operators satisfying the following assumptions:
613
+ (i) A, B and C are partially nonlinear D-Lipschitzians with D-functions ψA, ψB and ψC
614
+ respectively,
615
+ (ii) (I − D)−1 is nondecreasing and partially nonlinear D-Lipschitzian with D-functions ψφ,
616
+ (iii) B′ is continuous and C is a partially compact operator such that C(S) ⊆ (I − D)(S)
617
+ (iv) Ax + T x · T ′y ∈ S for all y ∈ S where T = B(I − D)−1C and T ′ = B′(I − D)−1C,
618
+ (v)
619
+ �I − A
620
+ T
621
+ �−1
622
+ exist on T ′(S) and nondecreasing,
623
+ (vi) x0 ⪯ Ax0 + T x0 · T ′y or x0 ⪰ Ax0 + T x0 · T ′y, for each y ∈ S,
624
+ (vii) every pair of elements x, y ∈ E has a lower and an upper bound in E.
625
+ Then the operator matrix (1.3) has a fixed point in S × S, whenever Mψ(r) ≤ r if r > 0 with
626
+ ψ(r) = ψB ◦ ψφ ◦ ψC(r) + ψA(r) and M = ∥T ′(S)∥.
627
+ Proof.
628
+ Suppose that there is an element x0 ∈ E such that x0 ⪯ Ax0 + T x0 · T ′y. From
629
+ assumption (iv), it follows that for each y ∈ S, there exist a unique point x ∈ S such that
630
+ �I − A
631
+ T
632
+
633
+ x = T ′y
634
+ 10
635
+
636
+ or, equivalently x = Ax + T x · T ′y. Because assumption (iv) hold, then x ∈ S. Therefore, we
637
+ can define F : S −→ S by the formula
638
+ F(x) =
639
+ �I − A
640
+ T
641
+ �−1
642
+ T ′x.
643
+ (4.1)
644
+ In view of assumption (v), it follows that, F is nondecreasing on E. Next, we will prove that
645
+ F is continuous. To see that, let {zn}∞
646
+ n=0 be any sequence on E such that zn → z, and let
647
+
648
+
649
+
650
+ yn = T ′(zn) and y = T ′(z)
651
+ xn =
652
+ �I − A
653
+ T
654
+ �−1
655
+ (yn) and x =
656
+ �I − A
657
+ T
658
+ �−1
659
+ (y).
660
+ Then, it easy to show that yn → y, and we have
661
+
662
+ xn
663
+ =
664
+ Axn + T xn · T ′yn
665
+ x
666
+ =
667
+ Ax + T x · T ′y.
668
+ So,
669
+ ∥xn − x∥
670
+ =
671
+ ∥Axn + T xn · T ′yn − Ax + T x · T ′y∥
672
+
673
+ ∥Axn − Ax∥ + ∥T xn · T ′yn − T x · T ′y∥
674
+
675
+ ∥Axn.yn − Ax.yn∥ + ∥Ax.yn − Ax.y∥ + ∥Cxn − Cx∥
676
+
677
+ ψA + MψB ◦ ψφ ◦ ψC(∥xn − x∥) + ∥T x∥∥yn − y∥,
678
+ where ψ(r) = ψA(r) + (MψB ◦ ψφ ◦ ψC)(r) < r for all r > 0 and the constant M exists
679
+ in view of the fact T ′ is partially bounded operator on S.
680
+ Taking limit supermum in the
681
+ aforementioned inequality yields that F is continuous. Further, from assumption (iii), we show
682
+ that B′(I − D)−1C as well as F is partially compact. Finally the relation ⪯ and the norm ∥ · ∥
683
+ are compatible. Hence, an application of Theorem 2.2 infer that F has at least, one solution in
684
+ S × S. Now, use the vector y = (I − D)−1Cx to achieve the proof.
685
+
686
+ As a consequence we have the following fixed point result.
687
+ Corollary 4.3 Let S be a non-empty closed partially bounded subset of a regular partially
688
+ ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ in E
689
+ are compatible. Let A, C : S −→ E and B, B′, D : E −→ K be five nondecreasing operators
690
+ satisfying the following assumptions:
691
+ (i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
692
+ ψA, ψB and ψC respectively,
693
+ (ii) D is contraction with a contraction constant k and C(S) ⊂ (I − D)(S),
694
+ (iii) B′ is continuous and C is a partially compact operator,
695
+ (iv) x = Ax + T x · T ′y, y ∈ S ⇒ x ∈ S where T = B(I − D)−1C and T ′ = B′(I − D)−1C,
696
+ (v)
697
+ �I − A
698
+ T
699
+ �−1
700
+ exists on T ′(S) and nondecreasing,
701
+ (vi) x0 ⪯ Ax0 + T x0 · T ′x0 or x0 ⪰ Ax0 + T x0 · T ′x0, for some x0 ∈ E,
702
+ (vii) every pair of elements x, y ∈ E has a lower and an upper bound in E.
703
+ Then the operator matrix (1.3) has a fixed point in S × S, whenever Mψ(r) ≤ r if r > 0 with
704
+ ψ(r) = ψB ◦ (
705
+ 1
706
+ 1−k)ψC(r) + ψA(r) and M = ∥T ′(S)∥.
707
+ From Theorem 4.2 and corollary 4.3 , without any hurdle we can derive the following corollary.
708
+ Corollary 4.4 Let S be a non-empty closed partially bounded subset of a regular partially
709
+ ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ in E
710
+ are compatible. Let A, C : S −→ E and B, B′, D : E −→ K be five nondecreasing operators
711
+ satisfying the following assumptions:
712
+ 11
713
+
714
+ (i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
715
+ ψA, ψB and ψC respectively,
716
+ (ii) D is contraction with a contraction constant k and C(S) ⊂ (I − D)(E),
717
+ (iii) B′ is partially completely continuous
718
+ (iv) x = Ax + T x · T ′y, y ∈ S ⇒ x ∈ S where T = B(I − D)−1C and T ′ = B′(I − D)−1C,
719
+ (v)
720
+ �I − A
721
+ T
722
+ �−1
723
+ exist on B′(E) and nondecreasing,
724
+ (vi) x0 ⪯ Ax0 + T x0 · T ′x0 or x0 ⪰ Ax0 + T x0 · T ′x0, for some x0 ∈ E,
725
+ (vii) every pair of elements x, y ∈ E has a lower and an upper bound in E.
726
+ Then the operator matrix (1.3) has a fixed point in S × E, whenever Mψ(r) ≤ r if r > 0 with
727
+ ψ(r) = ψB ◦ (
728
+ 1
729
+ 1−k)ψC(r) + ψA(r) and M = ∥T ′(E)∥.
730
+ 5
731
+ Existence solutions for a system of functional differential
732
+ equation
733
+ The FDE (1.1) is considered in the function space E = C(J, R) of continuous real-valued
734
+ functions defined on J. We define a norm ∥ · ∥ and the order relation ⪯ in C(J, R) by
735
+ ∥x∥∞ = sup
736
+ t∈J
737
+ |x(t)|
738
+ (5.1)
739
+ and
740
+ x ≤ y ⇐⇒ x(t) ≤ y(t)
741
+ (5.2)
742
+ for all t ∈ J. Clearly, C(J, R) is a Banach space with respect to above supremum norm and
743
+ also partially ordered with respect to the above partially order relation ≤. It is known that
744
+ the partially ordered Banach space C(J, R) has some nice properties with respect to the above
745
+ order relation in it. The following lemma follows by an application of Arzela-Ascolli theorem.
746
+ Lemma 5.1 [16] Let (C(J, R), ≤, ∥ · ∥) be a partially ordered Banach space with the norm ∥ · ∥
747
+ and the order relation ≤ defined by (5.1) and (5.2) respectively. Then ∥·∥ and ≤ are compatible
748
+ in every partially compact subset of C(J, R).
749
+ The purpose of this section is to apply theorem 4.1 to discuss the existence of solutions for the
750
+ following nonlinear quadratic functional differential equations QFDE (1.1).
751
+ We need the next definition in what follows.
752
+ Definition 5.1 A functions u, v ∈ C(J, R) is said to be a lower solution of the (1.1), if it
753
+ satisfies
754
+
755
+
756
+
757
+
758
+
759
+
760
+
761
+
762
+
763
+
764
+
765
+
766
+
767
+
768
+
769
+ �u(t) − f1(t, u(t))
770
+ f2(t, v(t))
771
+ �′
772
+ + λ
773
+ �u(t) − f1(t, u(t))
774
+ f2(t, v(t))
775
+
776
+ ≤ g(t, v(t))
777
+ v(t) ≤
778
+ 1
779
+ 1 − b(t)|u(t)| − p
780
+
781
+ t,
782
+ 1
783
+ 1 − b(t)|u(t)|
784
+
785
+ + p(t, v(t))
786
+
787
+ u(0), v(0)
788
+
789
+ ≤ (u0, v0) ∈ R2.
790
+ for all t ∈ J. Similarly, a functions u′, v′ ∈ C(J, R) is said to be an upper solution of the FDE
791
+ (1.1) if it satisfies the conditions above with the inequality reversed.
792
+ We consider the following set of assumptions in what follows:
793
+ (H0) The functions b : J −→ R is continuous.
794
+ (H1) The function t �−→ f1(t, 0) is bounded on J with bound F0.
795
+ 12
796
+
797
+ (H2) f2 define a function f2 : J × R −→ R+ are nondecreasing in x for all t ∈ J.
798
+ (H3) There exist two constants L, K ∈ R∗
799
+ + such that
800
+ 0 < fi(t, x(t)) − fi(t, y(t)) ≤
801
+ L(x − y)
802
+ K + (x − y)
803
+ for all t ∈ J , i = 1, 2 and x, y ∈ R with x ≥ y. Moreover, L ≤ K.
804
+ (H4) The function p : J × R −→ R is nondecreasing in x for all t ∈ J and contraction with a
805
+ constant k.
806
+ (H5) The function g : J × R −→ R+ is nondecreasing and there exist a function h ∈ L1(J) such
807
+ that
808
+ ∥g(t, x)∥ ≤ ∥h∥L1 for all t ∈ J and x ∈ R.
809
+ (H6) The QFDE (1.1) has a lower solution in C(J, R) × C(J, R)
810
+ Remark 5.1 Assume that the assumption (H6) holds.
811
+ Then a functions x ∈ C(J, R) is a
812
+ solution of (1.1) if and only if is a solution of the functional integral equation
813
+
814
+
815
+
816
+
817
+
818
+
819
+
820
+ x(t)
821
+ =
822
+ f1(t, x(t)) + f2(t, y(t))
823
+
824
+ ce−λt + e−λt
825
+ � t
826
+ 0
827
+ eλsg(s, y(s))ds
828
+
829
+ y(t)
830
+ =
831
+ 1
832
+ 1 − b(t)|x(t)| − p
833
+
834
+ t,
835
+ 1
836
+ 1 − b(t)|x(t)|
837
+
838
+ + p(t, y(t))
839
+ (5.3)
840
+ where c = x0 − f1(0, x0)
841
+ f2(0, y0)
842
+ .
843
+ Indeed, let g ∈ C(J, R). Assume first that x is a solution of the QFDE (1.1) define on J. By
844
+ definition, the function t �−→ x(t) − f1(t, x(t))
845
+ f2(t, y(t))
846
+ is continuous on J, and so, differentiable there,
847
+ whence
848
+ �x(t) − f1(t, x(t))
849
+ f2(t, y(t))
850
+ �′
851
+ is integrable on J. Applying integration to (1.1) from 0 to t, we
852
+ obtain the HIE (5.3) on J.
853
+ Conversely, assume that x satisfies Eq. (5.3). Then by direct differentiation we obtain the
854
+ first equation in QFDE (1.1). Again, substituting t = 0 in Eq. (5.3) yields
855
+ x(0) − f1(0, x(0))
856
+ f2(0, y(0))
857
+ = x0 − f1(0, x0)
858
+ f2(0, y0)
859
+ whence, (x(0), y(0)) = (x0, y0). Thus, the QFDE (1.1) holds.
860
+ Now, we are in a position to prove the following existence theorem for QFDE (1.1).
861
+ Theorem 5.1 Assume that the assumption (H0)) through (H7) hold. Furthermore, if
862
+
863
+
864
+
865
+
866
+
867
+
868
+
869
+ L
870
+ �����
871
+ x0 − f1(0, x0)
872
+ f2(0, y0)
873
+ ���� + ∥h∥L1
874
+
875
+ ≤ K
876
+ M1∥γ∥ + K ≤ 1 − k.
877
+ (5.4)
878
+ Then the system of the functional differential equations (1.1) has, at least, one solution in
879
+ C(J, R) × C(J, R).
880
+
881
+ 13
882
+
883
+ Proof.
884
+ Observe that the above problem (1.1) may be written in the following form
885
+ � x(t) = (Ax)(t) + (By)(t) · (B′y)(t)
886
+ y(t) = (Cx)(t) + (Dy)(t)
887
+ .
888
+ where A, B, C, D and B′ on C(J, R) defined by:
889
+
890
+
891
+
892
+
893
+
894
+
895
+
896
+
897
+
898
+
899
+
900
+
901
+
902
+
903
+
904
+
905
+
906
+
907
+
908
+
909
+
910
+
911
+
912
+
913
+
914
+
915
+
916
+
917
+
918
+
919
+
920
+
921
+
922
+
923
+
924
+ (Ax)(t) = f1(t, x(t))
925
+ (By)(t) = f2(t, y(t))
926
+ (Cx)(t) =
927
+ 1
928
+ 1 − b(t)|x(t)| − p
929
+
930
+ t,
931
+ 1
932
+ 1 − b(t)|x(t)|
933
+
934
+ (Dy)(t) = p(t, y(t))
935
+ (B′y)(t) = ce−λt + e−λt
936
+ � t
937
+ 0
938
+ eλsg(s, y(s))ds.
939
+ From the above assumptions and the continuity of the integral, it follows that the operators
940
+ B, B′ : E −→ K. In order to apply Theorem 4.1, we have to verify the following steps.
941
+ Step 1: A, B, C, D and B′ are nondecreasing on E.
942
+ Let x, y ∈ E be such that x ≥ y. Then x(t) ≥ y(t) for all t ∈ J. Then by assumption (H3), we
943
+ obtain
944
+ Ax(t)
945
+ =
946
+ f1(t, x(t)
947
+
948
+ f1(t, y(t)
949
+ =
950
+ Ay(t),
951
+ for all t ∈ J. This shows that the operator that the operator A is nondecreasing on E. Similarly,
952
+ by assumption (H3), we get
953
+ Bx(t)
954
+ =
955
+ f2(t, x(t)
956
+
957
+ f2(t, y(t))
958
+ =
959
+ By(t),
960
+ for all t ∈ J. This shows that the operator B is also nondecreasing on E. Furthermore, by
961
+ assumption (H5), we get C is nondecreasing operator on E. Indeed, let x, y ∈ E such that
962
+ x(t) ≥ y(t)
963
+ Cx(t)
964
+ =
965
+ 1
966
+ 1 − b(t)|x(t)| − p
967
+
968
+ t,
969
+ 1
970
+ 1 − b(t)|x(t)|
971
+
972
+
973
+ 1
974
+ 1 − b(t)|y(t)| − p
975
+
976
+ t,
977
+ 1
978
+ 1 − b(t)|y(t)|
979
+
980
+ =
981
+ Cy(t),
982
+ for all t ∈ J. This shows that the operator C is nondecreasing on E. Again, by assumption
983
+ (H4) , we obtain
984
+ Dx(t)
985
+ =
986
+ p(t, x(t)
987
+
988
+ p(t, y(t))
989
+ =
990
+ Dy(t),
991
+ for all t ∈ J. This shows that the operator D is nondecreasing on E. Finally, by assumption
992
+ (H5) , we get
993
+ B′x(t)
994
+ =
995
+ ce−λt + e−λt
996
+ � t
997
+ 0
998
+ e−λsg(s, x(s))ds
999
+
1000
+ ce−λt + e−λt
1001
+ � t
1002
+ 0
1003
+ e−λsg(s, y(s))ds
1004
+ =
1005
+ B′y(t),
1006
+ 14
1007
+
1008
+ for all t ∈ J. This shows that the operator B′ is nondecreasing on E.
1009
+ Step 2: A, B and C are partially bounded and partially D-Lipschitzians on E.
1010
+ Let x ∈ E be arbitrary. Without loss of generality we assume that x ≥ 0. Then by assumptions
1011
+ (H1) and (H2), we have
1012
+ |Ax(t)|
1013
+ =
1014
+ |f1(t, x(t))|
1015
+
1016
+ |f1(t, x(t)) − f1(t, 0)| + |f1(t, 0)|
1017
+
1018
+ L∥x∥
1019
+ K + ∥x∥ + F0
1020
+
1021
+ L + F0,
1022
+ for all t ∈ J. Taking the supremum over t in the above inequality, we obtain
1023
+ ∥Ax∥ ≤ L + F0
1024
+ for all x ∈ E. So, A is bounded. This further implies that A is partially bounded on E.
1025
+ Next, let x, y ∈ E be such that x ≥ y. Then, we have
1026
+ |Ax(t) − Ay(t)|
1027
+ =
1028
+ |f1(t, x(t)) − f1(t, y(t))|
1029
+
1030
+ L∥x − y∥
1031
+ K + ∥x − y ∥
1032
+ =
1033
+ ψA(∥x − y∥),
1034
+ for all t ∈ J, where ψA(r) =
1035
+ Lr
1036
+ K + r. Taking the supremum over t, we obtain
1037
+ ∥Ax − Ay∥ ≤ ψA(∥x − y∥),
1038
+ for all x, y ∈ E with x ≥ y.
1039
+ Hence, A is a partial nonlinear D-Lipschitzian on E with a
1040
+ D-function ψA. By using the same argument, we conclude that B is partially bounded and
1041
+ partially D-Lipschitzian on E, where ψB(r) =
1042
+ Lr
1043
+ K + r . Also, we shall show that C is partially
1044
+ bounded and partially D-Lipschitzian. Indeed, for all t ∈ J, we get
1045
+ |Cx(t)|
1046
+ =
1047
+ ����
1048
+ 1
1049
+ 1 − b(t)|x(t)| − p
1050
+
1051
+ t,
1052
+ 1
1053
+ 1 − b(t)|x(t)|
1054
+ �����
1055
+
1056
+ 1 +
1057
+ ����p
1058
+
1059
+ t,
1060
+ 1
1061
+ 1 − b(t)|x(t)|
1062
+ �����
1063
+
1064
+ 1 + k
1065
+ This means that the operator C is partially bounded. Moreover, let x, y ∈ E such that x ≥ y.
1066
+ Then we get
1067
+ |Cx(t) − C(y)(t)|
1068
+
1069
+ ����
1070
+ 1
1071
+ 1 − b(t)|x(t)| − p
1072
+
1073
+ t,
1074
+ 1
1075
+ 1 ��� b(t)|x(t)|
1076
+
1077
+
1078
+ 1
1079
+ 1 − b(t)|y(t)| − p
1080
+
1081
+ t,
1082
+ 1
1083
+ 1 − b(t)|y(t)|
1084
+ �����
1085
+
1086
+ ����
1087
+ 1
1088
+ 1 − b(t)|x(t)| −
1089
+ 1
1090
+ 1 − b(t)|y(t)|
1091
+ ���� +
1092
+ ����p
1093
+
1094
+ t,
1095
+ 1
1096
+ 1 − b(t)|x(t)|
1097
+
1098
+ − p
1099
+
1100
+ t,
1101
+ 1
1102
+ 1 − b(t)|y(t)|
1103
+ �����
1104
+
1105
+ (1 + k)
1106
+ ����
1107
+ 1
1108
+ 1 − b(t)|x(t)| −
1109
+ 1
1110
+ 1 − b(t)|y(t)|
1111
+ ����
1112
+
1113
+ (1 + k)∥b∥|x(t) − y(t)|.
1114
+ Taking the supremum over t, we obtain that C is partially nonlinear D-Lipshitzian with D-
1115
+ function ψC(r) = (1 + k)∥b∥r
1116
+ 15
1117
+
1118
+ Step 3 : (I − D)−1 is partially nonlinear D-Lipshitzian and (I − D)−1C is nondecreasing.
1119
+ Since D is contraction then (I − D)−1 exist and is a contraction with constant
1120
+ 1
1121
+ 1 − k . Conse-
1122
+ quently, (I − D)−1 is partially D-lipshitzian with D-function ψφ(r) =
1123
+ 1
1124
+ 1 − k r
1125
+ Now, we shaw that (I − D)−1C is nondecreasing. Since (I − D)−1Cx =
1126
+ 1
1127
+ 1 − b|x|, for all x ∈ E.
1128
+ Then for all x, y ∈ E such that x ≤ y we have
1129
+ (I − D)−1Cx =
1130
+ 1
1131
+ 1 − b|x| ≤
1132
+ 1
1133
+ 1 − b|y| = (I − D)−1Cy.
1134
+ Step 4 : B′ est partially continuous and C is compact.
1135
+ Let {xn}n∈N be a sequence in a chain C such that xn → x as n → ∞. Then by the dominated
1136
+ convergence theorem for integration, we obtain
1137
+ lim
1138
+ n−→∞ Bxn(t)
1139
+ =
1140
+ ce−λt + e−λt
1141
+ � t
1142
+ 0
1143
+ lim
1144
+ n−→∞ eλsg(s, xn(s))ds
1145
+ =
1146
+ ce−λt + e−λt
1147
+ � t
1148
+ 0
1149
+ eλsg(s, x(s))ds
1150
+ =
1151
+ Bx(t),
1152
+ for all t ∈ J. This shows that {Bxn} converges to Bx pointwise on J.
1153
+ Now we show that {Bxn}n∈N is an equicontinuous sequence of functions in E. Let t1, t2 ∈ J
1154
+ with t1 > t2 > 0. Then we have
1155
+ |Bxn(t2) − Bxn(t1)|
1156
+
1157
+ ��ce−λt2 − ce−λt1�� +
1158
+ ����e−λt2
1159
+ � t2
1160
+ 0
1161
+ eλsg(s, xn(s))ds
1162
+
1163
+ e−λt1 � t1
1164
+ 0 eλsg(s, xn(s))ds
1165
+ ���
1166
+
1167
+ |ce−λt2 − ce−λt1| +
1168
+ ����e−λt2
1169
+ � t2
1170
+ 0
1171
+ eλsg(s, xn(s)) ds
1172
+
1173
+ e−λt2
1174
+ � t1
1175
+ 0
1176
+ eλsg(s, xn(s))ds +e−λt2
1177
+ � t1
1178
+ 0
1179
+ eλsg(s, xn(s))ds
1180
+
1181
+ e−λt1
1182
+ � t1
1183
+ 0
1184
+ eλsg(s, xn(s))ds
1185
+ ����
1186
+
1187
+ |ce−λt2 − ce−λt1| +
1188
+ ����e−λt2
1189
+ � t2
1190
+ t1
1191
+ eλsg(s, xn(s))ds
1192
+ ����
1193
+ +
1194
+ ����(e−λt2 − e−λt1)
1195
+ � t1
1196
+ 0
1197
+ eλsg(s, xn(s))ds
1198
+ ���� .
1199
+ This implies that lim
1200
+ t1→t2 |Bxn(t2) − Bxn(t1)| = 0 and consequently B is partially continuous.
1201
+ Next, we show that C is compact. To do this, for any x ∈ J
1202
+ |Cx(t)|
1203
+ =
1204
+ ����
1205
+ 1
1206
+ 1 + b(t)|x(t)| − p
1207
+
1208
+ t,
1209
+ 1
1210
+ 1 + b(t)|x(t)|
1211
+ �����
1212
+
1213
+ 1 +
1214
+ ����p
1215
+
1216
+ t,
1217
+ 1
1218
+ 1 + b(t)|x(t)|
1219
+ �����
1220
+
1221
+ 1 + k
1222
+ this show that C is bounded. Now we show that C is equicontinuous on E. For each t1, t2 ∈ J
1223
+ 16
1224
+
1225
+ such that t2 > t1, we get
1226
+ |Cx(t2) − Cx(t1)|
1227
+ =
1228
+ ����
1229
+ 1
1230
+ 1 + b(t)|x(t2)| − p
1231
+
1232
+ t2,
1233
+ 1
1234
+ 1 + b(t2)|x(t2)|
1235
+
1236
+
1237
+ 1
1238
+ 1 + b(t1)|x(t1)| − p
1239
+
1240
+ t1,
1241
+ 1
1242
+ 1 + b(t1)|x(t1)|
1243
+ �����
1244
+
1245
+ ����
1246
+ 1
1247
+ 1 + b(t)|x(t2)| −
1248
+ 1
1249
+ 1 + b(t1)|x(t1)|
1250
+ ����
1251
+ +
1252
+ ����p
1253
+
1254
+ t2,
1255
+ 1
1256
+ 1 + b(t2)|x(t2)|
1257
+
1258
+ − p
1259
+
1260
+ t1,
1261
+ 1
1262
+ 1 + b(t1)|x(t1)|
1263
+ �����
1264
+
1265
+ ∥b∥∞
1266
+ ����
1267
+ x(t2) − x(t1)
1268
+ (1 + b(t2)|x(t2)|)(1 + b(t1)|x(t1)|)
1269
+ ����
1270
+ +k∥b∥∞
1271
+ ����
1272
+ x(t2) − x(t1)
1273
+ (1 + b(t2)|x(t2)|)(1 + b(t1)|x(t1)|)
1274
+ ����
1275
+
1276
+ (1 + k)∥b∥∞|x(t2) − x(t1)|.
1277
+ This implies that
1278
+ lim
1279
+ t2→t1 |Cx(t2) − Cx(t1)| = 0
1280
+ This means that C is equicontinuous on J. Then by the Arzela-Ascoli’s theorem [8] the closure
1281
+ of C(E) is relatively compact, consequently C is compact operator.
1282
+ Step 5: u satisfies the operator inequality u ≤ Au + B(I − D)−1Cu · B′(I − D)−1Cu.
1283
+ By assumption (H6), we have
1284
+
1285
+
1286
+
1287
+
1288
+
1289
+
1290
+
1291
+
1292
+
1293
+
1294
+
1295
+
1296
+
1297
+
1298
+
1299
+ �u(t) − f1(t, u(t))
1300
+ f2(t, v(t))
1301
+ �′
1302
+ + λ
1303
+ �u(t) − f1(t, u(t))
1304
+ f2(t, v(t))
1305
+
1306
+ ≤ g(t, v(t))
1307
+ v(t) ≤
1308
+ 1
1309
+ 1 − b(t)|u(t)| − p
1310
+
1311
+ t,
1312
+ 1
1313
+ 1 − b(t)|u(t)|
1314
+
1315
+ + p(t, v(t))
1316
+
1317
+ u(0), v(0)
1318
+
1319
+ ≤ (u0, v0) ∈ R2
1320
+ for all t ∈ J.
1321
+ Then, by Remark 2.1 we get
1322
+
1323
+
1324
+
1325
+
1326
+
1327
+
1328
+
1329
+ u(t)
1330
+
1331
+ f1(t, u(t)) + f2(t, v(t))
1332
+
1333
+ ce−λt + e−λt
1334
+ � t
1335
+ 0
1336
+ eλsg(s, v(s))ds
1337
+
1338
+ v(t)
1339
+
1340
+ 1
1341
+ 1 − b(t)|u(t)| − p
1342
+
1343
+ t,
1344
+ 1
1345
+ 1 − b(t)|u(t)|
1346
+
1347
+ + p(t, v(t))
1348
+ Hence, from definitions of the operators A, B, C, D and B′ it follows that
1349
+ u(t) ≤ Au(t) + B(I − D)−1Cu(t) · B′(I − D)−1Cu(t),
1350
+ for all t ∈ J. Taking the suprumum we have
1351
+ u ≤ Au + B(I − D)−1Cu · B′(I − D)−1Cu.
1352
+ Finally By using the assumption (H5), we have
1353
+ M
1354
+ =
1355
+ ∥T ′(E)∥
1356
+ =
1357
+ ����ce−λt + e−λt
1358
+ � t
1359
+ 0
1360
+ eλtg(s, x(s))ds
1361
+ ����
1362
+
1363
+ |c| + ∥h∥L1.
1364
+ 17
1365
+
1366
+ From equation (5.4), we infer that MψB ◦ ψφ ◦ ψC(r) + ψA(r) < r.
1367
+ Thus, the operators A, B, C, D and B′ satisfy all the requirement of Theorem 4.1 and so the
1368
+ QFDE (1.1) has a positive solution in C(J × R) × C(J × R).
1369
+
1370
+ Remark 5.2 The conclusion of Theorem 5.1 also remains true if we replace the assumption
1371
+ (H7) with the following one:
1372
+ (H′
1373
+ 7) The QFDE (1.1) has a upper solution in C(J, R) × C(J, R)
1374
+ The proof under this new assumption is similar to Theorem 5.1 and the conclusion again follows
1375
+ by an application of Theorem 4.1.
1376
+ References
1377
+ [1] R. P. Agarwal, D. O′Regan and D. R. Sahu, Fixed Point Theory for Lipschitzian type
1378
+ Mappings with Applications, Springer, New York (2009).
1379
+ [2] R. P. Agarwal and D. O′Regan, Infinite Interval Problems for Differential, Difference and
1380
+ Integral Equations, Kluwer Acad. Publ., New York (2001).
1381
+ [3] D. D. Bainov and S. Hristova, Differential equations with maxima, Chapman and Hall/CRC
1382
+ Pure and Applied Mathematics, (2011).
1383
+ [4] J. Banas and M. Lecko, Fixed points of the product of operators in Banach algebras,
1384
+ Panamer. Math. J., 12(2002), no. 2, 101-109.
1385
+ [5] F. E. Browder, Fixed point theory and nonlinear problems, Bull. AMS, 9(1983), no. 1, 1-39.
1386
+ [6] J. Caballero, B. Lopez and K. Sadarangani, Existence of nondecreasing and continuous
1387
+ solutions of an integral equation with linear modifcation of the argument, Acta Math. Sin.
1388
+ (Engl. Ser.), 23(2007), no. 9, 1719-1728
1389
+ [7] S. Carl and S. Heikkila, Fixed point theory in ordered sets and applications, Springer,
1390
+ (2011).
1391
+ [8] R. F. Curtain and A. J. Pritchard, Functional analysis in modern applied mathematics,
1392
+ Academic press, (1977).
1393
+ [9] B. C. Dhage, On a fixed point theorem in Banach algebras with applications, Appl. Math.
1394
+ Lett., 18(2005), no. 3, 273-280.
1395
+ [10] B. C. Dhage, On some nonlinear alternatives of Leray-Schauder type and functional integral
1396
+ equations, Arch. Math. (Brno), 42(2006), no. 1, 11-23.
1397
+ [11] B. C. Dhage, Hybrid fixed point theory in partially ordered normed linear spaces and
1398
+ applications to fractional integral equations, Diff. Equa. Appl., 5(2013), no. 2, 155-184.
1399
+ [12] B. C. Dhage, Partially condensing mappings in partially ordered normed linear spaces and
1400
+ applications to functional integral equations, Tamkang J. Math., 45(2014), no. 4, 397-426.
1401
+ [13] B. C. Dhage, Nonlinear D-set-contraction mappings in partially ordered normed linear
1402
+ spaces and applications to functional hybrid integral equations, Malaya J. Mat., 3(2015),
1403
+ no. 1, 62-85.
1404
+ [14] B.C. Dhage, Dhage Iteration Method for Nonlinear First Order Hybrid Differential
1405
+ Equations with a Linear Perturbation of Second Type, Int. J. Anal. Appl., 12(2016), no. 1,
1406
+ 49-61.
1407
+ 18
1408
+
1409
+ [15] B. C. Dhage, Dhage iteration method for approximating positive solutions of quadratic
1410
+ functional differential equations, Malays. J. Mat. Sci., 6(2018), no. 1, 1-13
1411
+ [16] B.C. Dhage, S.B. Dhage, Approximating solutions of nonlinear pbvps of hybrid differential
1412
+ equations via hybrid fixed point theory, Indian J. Math. 57(2015), 103-119.
1413
+ [17] B. C. Dhage, S. B. Dhage and J. R. Graef, Dhage iteration method for approximationg the
1414
+ positive solution of IVPS for nonlinear first order quadratic neutral function differential
1415
+ equations with delay and maxima, Inter. J. Appl. Math., 31(2018), no. 1, 1-21
1416
+ [18] A. Fahem,
1417
+ A. Jeribi and N. Kaddachi,
1418
+ Existence of Solutions for a System of
1419
+ Chandrasekhar’s Equations in Banach algebras under weak topology,
1420
+ Filomat, 33(2019),
1421
+ no. 18, 5949-5957.
1422
+ [19] D. Guo, Partial order methods in nonlinear analysis, Shandong Academic Press, (1997).
1423
+ [20] D. Guo and V. Lakshmikantham, Nonlinear problems in abstract cones. Academic Press,
1424
+ New York, (1988)
1425
+ [21] A. Jeribi and B. Krichen, Nonlinear functional analysis in Banach spaces and Banach
1426
+ algebras. Fixed point theory under weak topology for nonlinear operators and block operator
1427
+ matrices with applications, Monographs and Research Notes in Mathematics. CRC Press,
1428
+ (2015).
1429
+ [22] A. Jeribi, N. Kaddachi and B. Krichen, Existence results for a system of nonlinear integral
1430
+ equations in Banach algebras under weak topology, Fixed Point Theory, 18(2017), no. 1,
1431
+ 247-267
1432
+ [23] N. Kaddachi, A. Jeribi and B. Krichen, Fixed point theorems of block operator matrices on
1433
+ Banach algebras and an application to functional integral equations, Math. Methods Appl.
1434
+ Sci., 36(2013), no. 6, 659-673.
1435
+ [24] J. L. Li, Existence of continuous solutions of nonlinear Hammerstein integral equations
1436
+ proved by fixed point theorems on posets. J. Nonlinear Convex Anal., 17(2016), no. 7,
1437
+ 1311-1323.
1438
+ [25] D. V. Mule and B. R. Ahirrao, Approximating solution of an initial and periodic boundary
1439
+ value problems for first order quadratic functional differential equations, Int. J. Pure Appl.
1440
+ Math., 113(2017), no. 2, 251-271.
1441
+ [26] J. J. Nieto and R. R. Lopez, Contractive mapping theorems in partially ordered sets and
1442
+ applications to ordinary differential equations, Order, 22(2005), no. 3, 223-239.
1443
+ 19
1444
+
C9E1T4oBgHgl3EQfpwXL/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DNAyT4oBgHgl3EQfSPdR/content/tmp_files/2301.00081v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
DNAyT4oBgHgl3EQfSPdR/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
DdE0T4oBgHgl3EQfQQD8/content/tmp_files/2301.02192v1.pdf.txt ADDED
@@ -0,0 +1,2027 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Families of bosonic suppression laws beyond the permutation symmetry principle
2
+ M. E. O. Bezerra and V. S. Shchesnovich
3
+ Centro de Ciˆencias Naturais e Humanas, Universidade Federal do ABC, Santo Andr´e, SP, 09210-170 Brazil
4
+ (Dated: January 6, 2023)
5
+ Exact cancellation of quantum amplitudes in multiphoton interferences with Fock states at input,
6
+ the so-called suppression or zero transmission laws generalizing the Hong-Ou-Mandel dip, are useful
7
+ tool in quantum information and computation. It was recently suggested that all bosonic suppression
8
+ laws follow from a common permutation symmetry in the input quantum state and the unitary
9
+ matrix of interferometer.
10
+ By using the recurrence relations for interference of Fock states, we
11
+ find a wealth of suppression laws on the beamsplitter and tritter which are not explained by the
12
+ permutation symmetry principle. Our results reveal that in interference with Fock states on unitary
13
+ multiports there are whole families of suppression laws for arbitrary total number of bosons even on
14
+ asymmetric unitary multiports, beyond the previously formulated permutation symmetry principle.
15
+ Introduction.– One of the most distinctive features of
16
+ quantum theory is the superposition principle which, un-
17
+ der appropriate conditions, leads to the existence of to-
18
+ tally destructive interference in multi-path scenario, with
19
+ the probability of some outcomes being exactly zero.
20
+ When two single photons become indistinguishable they
21
+ bunch at the output of a balanced beamsplitter [1], which
22
+ is the consequence of destructive interferences in the co-
23
+ incidence outcomes.
24
+ This is the well-known Hong-Ou-
25
+ Mandel dip, which has found numerous applications such
26
+ as characterization of photon indistinguishability [2, 3],
27
+ generation and detection of entanglement [4–6] and de-
28
+ sign of efficient quantum gates [7] for all-optical compu-
29
+ tations. The exact cancellation be understood as the con-
30
+ sequence of a symmetry in the setup: the beamsplitter is
31
+ balanced and the Fock state of indistinguishable photons
32
+ is symmetric under the transposition of the input modes.
33
+ The totally destructive multiphoton interference for more
34
+ than two photons was found in many subsequent works,
35
+ including the even-odd number suppression events and
36
+ four-photon enhancement on a beamsplitter [8, 10], the
37
+ Hong-Ou-Mandel type effect in the coincidence counting
38
+ on the symmetric Bell (a.k.a. Fourier) multiports [13],
39
+ for which the conditions for all possible zero transmis-
40
+ sion laws were formulated [14] and generalized to both
41
+ bosons and fermions [16], and a series of experiments
42
+ with various numbers of photons [17, 18, 20–23]. These
43
+ works pointed on a connection between the suppression
44
+ laws and some underlying symmetry in the setup. Such
45
+ a connection was formulated as one common symmetry
46
+ principle [24, 25], which seemed to explain all previously
47
+ known suppression laws, for bosons and fermions, and
48
+ generalize them to a wide class of and unitary multiports
49
+ and input states.
50
+ In this work we reveal the existence of whole families
51
+ of suppression laws in quantum interferences with Fock
52
+ states on unitary multiports, which are not explained by
53
+ the common permutation symmetry principle.
54
+ Recurrence relation for quantum amplitudes.– We start
55
+ by demonstrating that the quantum amplitudes from
56
+ multi-photon interference on a linear unitary multiport
57
+ can be calculated by using the generating functions
58
+ method. Let ˆa†
59
+ k be the creation operator of optical mode
60
+ in input port k of a unitary multiport of size M and
61
+ consider the M-mode unnormalized coherent state in
62
+ y = (y1, . . . , yM)
63
+ |y⟩a = exp
64
+ � M
65
+
66
+ k=1
67
+ ykˆa†
68
+ k
69
+
70
+ |0⟩ =
71
+
72
+ m
73
+ M
74
+
75
+ k=1
76
+ ymk
77
+ k
78
+ √mk!|m⟩a (1)
79
+ where |m⟩a is a Fock state in M input modes m =
80
+ (m1, . . . , mM).
81
+ Introduce also analogous state |x⟩b,
82
+ where x = (x1, . . . , xM), for the output modes ˆb†
83
+ k, k =
84
+ 1, . . . , M, related to the input modes by an unitary mul-
85
+ tiport U as follows
86
+ a†
87
+ k =
88
+ M
89
+
90
+ l=1
91
+ Uklb†
92
+ l .
93
+ (2)
94
+ The N-photon quantum amplitude b⟨n|m⟩a between the
95
+ input and output Fock states can be found from the gen-
96
+ erating function G(x, y) ≡ b⟨x|y⟩a:
97
+ b⟨n|m⟩a =
98
+ M
99
+
100
+ k=1
101
+ 1
102
+ √mk!nk!
103
+ ∂mk
104
+ ∂ymk
105
+ k
106
+ ∂nk
107
+ ∂xnk
108
+ k
109
+ G(x, y)
110
+ �����
111
+ x=y=0
112
+ . (3)
113
+ Using the Baker-Campbell-Hausdorff formula for the
114
+ product of two exponents as in Eq.(1) we obtain
115
+ G(x, y) = exp
116
+
117
+
118
+ M
119
+
120
+ k,l=1
121
+ ykUklxl
122
+
123
+ � .
124
+ (4)
125
+ The expression in Eq.
126
+ (3) admits many recurrence
127
+ relations between the quantum amplitudes for different
128
+ total number of photons N. For instance, by fixing the
129
+ input state (computing the derivatives over y in Eq.(3))
130
+ and taking one derivative over xl we get
131
+ b⟨n|m⟩a =
132
+ M
133
+
134
+ k=1
135
+ �mk
136
+ nl
137
+ Ukl b⟨n − 1l|m − 1k⟩a
138
+ (5)
139
+ arXiv:2301.02192v1 [quant-ph] 3 Jan 2023
140
+
141
+ 2
142
+ FIG. 1: Representation of the two interferometers that are
143
+ considered to exemplify our method: a) Beamsplitter, that
144
+ transforms two input modes into two output modes; b) Trit-
145
+ ter, that is a composition of three different beamsplitters B1,
146
+ B2, B3 and a control phase shifter θ. Here, each mk denotes
147
+ the number of photons in the input mode k and nl denotes
148
+ the number of photons in the output mode l.
149
+ where 1k ≡ (0, . . . , 0, 1, 0, . . . , 0), etc.
150
+ Eq.
151
+ (5) is also
152
+ a consequence of the fact that the quantum amplitude
153
+ is given by the symmetrization of a product of the cor-
154
+ responding N matrix elements of U, called the matrix
155
+ permanent, and its properties [26].
156
+ Let us now focus on a single output port l = 1, setting
157
+ n = (n1, nS), where nS = (n2, ..., nM).
158
+ Reusing the
159
+ recurrence relation of Eq. (5) repeatedly nl times for the
160
+ output modes l = 2, . . . , M we get the amplitude b⟨n|m⟩a
161
+ as a linear combination of the amplitudes b⟨n1, 0S|m′⟩a,
162
+ where m′ is the input configuration with fewer photons
163
+ that appears in each term of the expansion due to the
164
+ use of the recurrence relation. The latter can be easily
165
+ calculated directly. In the end we get the amplitude in
166
+ the form (see details in [28])
167
+ b⟨n|m⟩a =
168
+
169
+ n1!
170
+ nS!m!
171
+ � M
172
+
173
+ k=1
174
+ U mk−|nS|
175
+ k1
176
+
177
+ f n
178
+ m(U),
179
+ (6)
180
+ where f n
181
+ m(U) is some polynomial in the matrix elements
182
+ of U, which we call suppression function. This polyno-
183
+ mial allows to find zero transmission laws, which are their
184
+ roots.
185
+ Below we restrict ourselves to small numbers of pho-
186
+ tons in M −1 output ports (i.e., the power of the polyno-
187
+ mial f n
188
+ m(U) in Eq. (6)), setting |nS| = 1, 2 and illustrate
189
+ our method on beamsplitter and tritter, given in Fig. 1.
190
+ We will say that there is a “family of suppression
191
+ laws” on the M-dimensional interferometer if for the in-
192
+ put m and output n configurations of a given form, e.g.,
193
+ m = (m, m) and n = (n1, 1) for a beamsplitter, and an
194
+ arbitrary compatible total number of bosons there is a
195
+ suppression law for the interferometer matrix with the
196
+ elements given by the input and output configurations.
197
+ Families of suppression laws for beamsplitter.– Let us
198
+ first test the method using a beamsplitter, illustrated in
199
+ Fig.1(a), with matrix
200
+ B =
201
+
202
+
203
+
204
+
205
+ √τ
206
+ −√ρe−iϕ
207
+ √ρeiϕ
208
+ √τ
209
+
210
+
211
+
212
+
213
+ (7)
214
+ where τ = 1−ρ. In this case nS = n2. When considering
215
+ beamsplitter we can neglect the arbitrary phase ϕ as it
216
+ can be scaled out (however, when considering the tritter
217
+ decomposition, as in Fig. 1(b), this phase is an important
218
+ parameter).
219
+ First, for n2 = 1 the recurrence in Eq. (6) has the
220
+ following function
221
+ f (n1,1)
222
+ (m1,m2)(B) = (m1 + m2)τ − m1
223
+ (8)
224
+ which predicts that the following quantum amplitude
225
+ b⟨n1, 1|m1, m2⟩a = 0 for an arbitrary n1 ≥ 1 and the
226
+ transmission
227
+ τ (1) =
228
+ m1
229
+ m1 + m2
230
+ .
231
+ (9)
232
+ This suppression law coincides with the previous result
233
+ [27], obtained by another method. This family reduces
234
+ to the HOM effect [1] for the symmetric beamsplitter for
235
+ m1 = m2 = 1.
236
+ For n2 = 2 we get the suppression function
237
+ f (n1,2)
238
+ (m1,m2)(B) = (m1 + m2 − 1)(m1 + m2)
239
+
240
+ τ 2
241
+
242
+ 2m1
243
+ m1 + m2
244
+ τ +
245
+ m1(m1 − 1)
246
+ (m1 + m2)(m1 + m2 − 1)
247
+
248
+ , (10)
249
+ which predicts another (previously unknown) suppres-
250
+ sion law ⟨n1, 2|m1, m2⟩ = 0 for the transmission
251
+ τ (2) =
252
+ m1
253
+ m1 + m2
254
+
255
+ �1 ±
256
+
257
+ m2/m1
258
+ m1 + m2 − 1
259
+
260
+ � .
261
+ (11)
262
+ This family of suppression laws contains also to the sym-
263
+ metric beamsplitter τ (2) = 1/2 for specific inputs, e.g.,
264
+ for four input photons b⟨2, 2|1, 3⟩a = 0 [8, 10]. Only such
265
+ cases can be explained by the permutation symmetry ap-
266
+ proach [14, 16, 24, 25] (in the above case transposition
267
+ symmetry of the output ports with n1 = n2 = 2).
268
+ The above approach allows one to derive all possible
269
+ the suppression laws for the beamsplitter. The compu-
270
+ tations, however, become quite involved as the minimum
271
+ number of bosons in the input and output ports scales up
272
+ (see [28] for more details). Nevertheless, general conclu-
273
+ sions are allowed by the fact that quantum amplitudes
274
+ b⟨n1, n2|m1, m2⟩a on a beamsplitter can be made real-
275
+ valued functions of its transmission τ by removing the
276
+ overall phase. Numerical simulations with various dis-
277
+ tributions of bosons (i.e., Fock states) reveal that the
278
+ number of zeros in such a quantum amplitude is given
279
+
280
+ a)
281
+ b)
282
+ m1
283
+ n2
284
+ B1
285
+ B3
286
+ 0
287
+ m1
288
+ n3
289
+ B
290
+ B2
291
+ m2
292
+ n1
293
+ m3
294
+ 0
295
+ 0.1
296
+ 0.2
297
+ 0.3
298
+ 0.4
299
+ 0.5
300
+ 0.6
301
+ 0.7
302
+ 0.8
303
+ 0.9
304
+ 1
305
+ -1
306
+ -0.5
307
+ 0
308
+ 0.5
309
+ n1,n2|m1m2
310
+ FIG. 2:
311
+ Typical behavior of the quantum amplitudes on a
312
+ beamsplitter and the interlaced zeros (the suppression laws).
313
+ Here we plot b⟨n1, n2|9, 4⟩a as functions of the beamsplitter
314
+ transmission τ for n1 = 3 (solid line), n1 = 4 (dash-dotted
315
+ line), and n1 = 5 (dashed line).
316
+ by the minimum number of bosons min(nl, mk) in the
317
+ four ports. Moreover, two quantum amplitudes related
318
+ by the exchange of a single boson have interlaced zeros:
319
+ between two zeros of one of them there is one zero of the
320
+ other, see also Fig. 2 (at the end points, τ = 0 and τ = 1,
321
+ a real-valued quantum amplitude is either equal to zero
322
+ or to ±1, which allows for the above bound on the total
323
+ number of zeros).
324
+ Families of suppression laws for tritter.– We now con-
325
+ sider the suppression laws on the tritter obtained by
326
+ an arrangement of three beamsplitters according to the
327
+ setup in Fig. 1(b) [9, 11]. Here each beamsplitter has
328
+ matrix Bj similar to that of Eq. (7) and has the trans-
329
+ mitivity τj and the phase ϕj. Moreover, an additional
330
+ phase plate θ is inserted in one of the optical paths. Our
331
+ tritter has in total seven free parameters, which is hard
332
+ to analyze in general. We will therefore focus on two spe-
333
+ cific families each having only two free parameters. For
334
+ the first family we set: τ2 = 2/3, τ3 = 1/2, ϕj = π/2,
335
+ leaving us with the free parameters τ1 and θ. It has the
336
+ following matrix
337
+ T (1) =
338
+ =
339
+ 1
340
+
341
+ 6
342
+
343
+
344
+
345
+
346
+
347
+
348
+
349
+
350
+ 2√τ1, −√τ1eiθ − i√3ρ1, −√τ1eiθ + i√3ρ1
351
+ 2√ρ1, −√ρ1eiθ + i√3τ1, −√ρ1eiθ − i√3τ1
352
+
353
+ 2,
354
+
355
+ 2eiθ,
356
+
357
+ 2eiθ
358
+
359
+
360
+
361
+
362
+
363
+
364
+
365
+
366
+ .
367
+ (12)
368
+ For the second family we set: τ1 = τ3 = 1/2 and ϕj =
369
+ π/2 leaving us with the free parameters τ2 and θ. It has
370
+ the following matrix
371
+ T (2) = 1
372
+ 2
373
+
374
+
375
+
376
+
377
+
378
+
379
+
380
+
381
+ √2τ2, −i − √ρ2eiθ,
382
+ i − √ρ2eiθ
383
+ √2τ2,
384
+ i − √ρ2eiθ,
385
+ −i − √ρ2eiθ
386
+ 2√ρ2,
387
+ √2τ2eiθ,
388
+ √2τ2eiθ
389
+
390
+
391
+
392
+
393
+
394
+
395
+
396
+
397
+ .
398
+ (13)
399
+ The above tritter families reduce to the well-known sym-
400
+ metric tritter (i.e., Bell multiport) when θ = 0 and, in
401
+ the first case, τ1 = 1/2 or, in the second case, τ2 = 2/3.
402
+ For tritter, in contrast to beamsplitter, two input
403
+ mode occupations can vary for a given total number
404
+ of bosons.
405
+ We will focus below on the following two
406
+ particular families of input states m(I) = (n1, 1, 1) and
407
+ m(II) = (m, m, m), where n1 ≥ 1 and m ≥ 1 and oth-
408
+ erwise arbitrary.
409
+ This choice of specific inputs is dic-
410
+ tated by the need to compare with the suppression laws
411
+ due to permutation symmetry.
412
+ For |nS| = 1 we have
413
+ found suppression laws for the outputs n = (n1, 1, 0) and
414
+ n = (n1, 0, 1), considering only the inputs m(II). In ad-
415
+ dition, for |nS| = 2 we have found suppression laws for
416
+ the outputs n = (n1, 1, 1) and n = (n1, 2, 0), consider-
417
+ ing both of the previous inputs m(I) and m(II).
418
+ The
419
+ expressions for the corresponding suppression function
420
+ f n
421
+ m(T) are too complicated to be presented here (see de-
422
+ tails in [28]). Instead we give the results in Fig. 3 with
423
+ the explicit expressions for the tritter parameters given
424
+ in Table I. Note that Table I contains only some of all
425
+ possible suppression laws for the chosen inputs/outputs,
426
+ e.g., m = (m, 0, 1) or m = (m, 1, 0) also correspond to
427
+ other two families of suppression laws.
428
+ Suppression laws from the permutation symmetry.–
429
+ Only a fraction of the suppression laws discussed above
430
+ (given by the red circles on the dashed line in Fig. 3),
431
+ corresponding to the input m = (m, m, m) and out-
432
+ put n = (n1, 2, 0) (with n1 = 3m − 2), is explained by
433
+ the “general permutation symmetry principle” of Refs.
434
+ [24, 25] (see for more details Ref. [28]). These appear for
435
+ the symmetric tritter, with the three-dimensional Fourier
436
+ matrix
437
+ Ts =
438
+ 1
439
+
440
+ 3
441
+
442
+
443
+
444
+
445
+
446
+
447
+
448
+
449
+ 1 − 1+i
450
+
451
+ 3
452
+ 2
453
+ −1+i
454
+
455
+ 3
456
+ 2
457
+ 1
458
+ −1+i
459
+
460
+ 3
461
+ 2
462
+ − 1+i
463
+
464
+ 3
465
+ 2
466
+ 1
467
+ 1
468
+ 1
469
+
470
+
471
+
472
+
473
+
474
+
475
+
476
+
477
+ ,
478
+ (14)
479
+ which results by setting either τ1 = 1/2 in Eq. (12) or
480
+ τ2 = 2/3 in Eq. (13) and θ = 0, see also Fig. 1(b). Such
481
+ suppression laws also correspond to some symmetry of
482
+ the suppression function f n
483
+ m(U) in Eq. (6): the roots do
484
+ not depend on n1 and m. Interestingly, we have found
485
+ a new symmetric tritter �Ts with the suppression laws
486
+ obeying the same property. This new tritter corresponds
487
+
488
+ 4
489
+ TABLE I: Suppression laws for tritter
490
+ θ = 0, π
491
+ θ = ± π
492
+ 2
493
+ θ = 0, π
494
+ θ = ± π
495
+ 2
496
+ b⟨n|m⟩a
497
+ τ1
498
+ τ1
499
+ τ2
500
+ τ2
501
+ b⟨n1, 1, 0|m, m, m⟩a
502
+ 1
503
+ 2
504
+ 1
505
+ 2
506
+ 2
507
+ 3
508
+ 2
509
+ 3
510
+ b⟨n1, 1, 1|n1, 1, 1⟩a
511
+ 3n1(n1−1)
512
+ 2(n1+1)(n1+2)
513
+ 3n1
514
+ 4(n1+1) , n1 ̸= 1 a
515
+ 2n1(n1−1)
516
+ (n1+1)(n1+2)
517
+ 4n1
518
+ (n1+1)(n1+2)
519
+ b⟨n1, 2, 0|n1, 1, 1⟩a
520
+ 1
521
+ 2 , n1 = 1, 2
522
+ (too long, see [28])
523
+ 2
524
+ 3 , n1 = 1, 2
525
+ (too long, see [28])
526
+ b⟨n1, 1, 1|m, m, m⟩a
527
+ 1
528
+ 2
529
+
530
+ 1 ±
531
+ 1
532
+ √m
533
+
534
+ 1
535
+ 2
536
+ 2m−1
537
+ 3m−1 ±
538
+
539
+ 12(4m−1)
540
+ 6(3m−1)
541
+ 2
542
+ 3,
543
+ 2m
544
+ 3m−1
545
+ b⟨n1, 2, 0|m, m, m⟩a
546
+ 1
547
+ 2
548
+ (too long, see [28])
549
+ 2
550
+ 3 ,
551
+ 2m
552
+ 3m−1
553
+ 2m−1
554
+ 3m−1 ±
555
+
556
+ 12(4m−1)
557
+ 6(3m−1)
558
+ aFor n1 = 1 and θ = ±π/2 there is a suppression law for the
559
+ tritter T (1) with an arbitrary τ1.
560
+ FIG. 3: Non-trivial suppression laws for outputs n = (n1, 1, 1)
561
+ and n = (n1, 2, 0).
562
+ Here the suppression laws for τj = 0
563
+ or τj = 1 are called trivial and then, are removed from the
564
+ graph. For the tritter T (1) we have the suppression laws for
565
+ inputs: a) m(I) = (n1, 1, 1) and b) m(II) = (m, m, m). For
566
+ the tritter T (2) we have the suppression laws for inputs: c)
567
+ m(I) = (n1, 1, 1) and d) m(II) = (m, m, m). The dashed line
568
+ corresponds to the symmetric tritter τ1 = 1/2 and τ2 = 2/3
569
+ for θ = 0.
570
+ to an orthogonal matrix, which has the form of Ts in Eq.
571
+ (14), as follows
572
+ �Ts =
573
+ 1
574
+
575
+ 3
576
+
577
+
578
+
579
+
580
+
581
+
582
+
583
+
584
+ 1 − 1+
585
+
586
+ 3
587
+ 2
588
+ −1+
589
+
590
+ 3
591
+ 2
592
+ 1
593
+ −1+
594
+
595
+ 3
596
+ 2
597
+ − 1+
598
+
599
+ 3
600
+ 2
601
+ 1
602
+ 1
603
+ 1
604
+
605
+
606
+
607
+
608
+
609
+
610
+
611
+
612
+ .
613
+ (15)
614
+ The tritter �Ts is obtained by setting either τ1 = 1/2 in
615
+ Eq. (12) or τ2 = 2/3 in Eq. (13) and θ = π/2 (factoring
616
+ out the unimportant total phases in the output modes,
617
+ i.e., a diagonal unitary from the right with (1, i, i) on
618
+ the main diagonal). The tritter of Eq. (15) shares one
619
+ of the symmetries with that of Eq. (14): it is invariant
620
+ under the simultaneous permutation of rows 1 and 2 and
621
+ columns 2 and 3 (a different type of symmetry used in
622
+ the formulation of the “general permutation symmetry
623
+ principle” of Refs. [24, 25]). The suppression laws on the
624
+ symmetric tritter of Eq. (15) corresponding to the input
625
+ m(II) = (m, m, m) and output n = (n1, 1, 1) are due to
626
+ the roots of the suppression function f n
627
+ m(U) in Eq. (6)
628
+ that do not dependent on n1 and m (given by the blue
629
+ points on the dashed line in Fig. 3).
630
+ The symmetric tritter in Eq.
631
+ (15) can also be real-
632
+ ized by successive application of the transposition oper-
633
+ ation of the first and the third inputs (P13), followed by
634
+ a balanced beamsplitter on the second and third inputs
635
+ (B(τs)), and by the inverse of the symmetric tritter Ts,
636
+ i.e., we have
637
+ �Ts = P13 (1 � B(τs)) T †
638
+ s , where the beam-
639
+ splitter is given by Eq. (7) with τs = (
640
+
641
+ 3 + i)/4. The
642
+ suppression laws for �Ts cannot be explained by the “gen-
643
+ eral permutation symmetry principle” of Refs. [24, 25]
644
+ which is applicable only to the standard symmetric trit-
645
+ ter Ts (see details in Ref. [28]).
646
+ In addition to the results discussed above, we also
647
+ have found the suppression functions for the amplitudes
648
+
649
+ 1.0
650
+ 0.9
651
+ 0.8
652
+ 0.7
653
+ 0.6
654
+ F0.5
655
+ 000000000
656
+ 0.4
657
+ 0.3
658
+ 0.2
659
+ a)
660
+ b)
661
+ 0.1
662
+ 0.0
663
+ 9 10
664
+ 8
665
+ 910
666
+ 8
667
+ 1
668
+ 2
669
+ m
670
+ n1
671
+ 1.0
672
+ 0.9
673
+ 0.8
674
+ 0.7
675
+ 0.6
676
+ 0.5
677
+ 0.4
678
+ 0.3
679
+ 0.2
680
+ c)
681
+ d)
682
+ 0.1
683
+ 0.0
684
+ 910
685
+ 9 10
686
+ 3
687
+ 4.
688
+ 5
689
+ 6
690
+ 8
691
+ 1
692
+ 5
693
+ 6
694
+ n1
695
+ m
696
+ n=(nl,l,l),θ=0,π
697
+ n=(nl,2,0),θ= ±π/2
698
+ n=(n1,1,1),θ= ±π/2
699
+ n=(n1,2,0),θ= +π/2
700
+ n=(n1,2,0),θ=0,π
701
+ n =(n1,2, 0),θ= π/25
702
+ b⟨n1, 1, 0|m, m, m⟩a and b⟨n1, 0, 1|m, m, m⟩a. These am-
703
+ plitudes are zero only for the case of symmetric tritters
704
+ τ1 = 1/2 or τ1 = 2/3, as shown in the first row of Table I.
705
+ Considering the permutation symmetry of Refs. [24, 25],
706
+ this result is already known only for the tritter Ts.
707
+ Conclusion.– We have found several families of sup-
708
+ pression laws on beamsplitter and on tritter for arbitrary
709
+ total number of photons, which are not explained by
710
+ the permutation symmetry principle advanced in Refs.
711
+ [14, 16, 24, 25]. We have given only a fraction of new
712
+ suppression laws on tritter for specific input/output con-
713
+ figurations, numerical simulations reveal the existence of
714
+ further families of the suppression laws not related to
715
+ the permutation symmetry principle.
716
+ Similar suppres-
717
+ sion laws, not explained by the permutation symmetry
718
+ principle, are expected to appear for multiports of any
719
+ size, since by using our generation function approach
720
+ one can, in principle, obtain all the suppression laws
721
+ for a multiport of any size (though this is impractical
722
+ by the complexity of the calculations which involve find-
723
+ ing roots of higher-order polynomials). One can, on the
724
+ other hand, explore the suppression laws experimentally,
725
+ since recently there has been breakthrough in controlled
726
+ production of Fock states with specified number of pho-
727
+ tons. The recent methods that are able to generate these
728
+ states include using heralded Fock states from a SPDC
729
+ process [33], the interaction of a coherent state with two-
730
+ level atoms [34], and by converting a coherent state into
731
+ a Fock state inside a resonator by radiation losses [35].
732
+ Our results also beg the important general question: Can
733
+ the discovered families of suppression laws follow from a
734
+ more general common symmetry principle? This could
735
+ be the direction for future work.
736
+ Acknowledgements.–
737
+ M.E.O.B.
738
+ was
739
+ supported
740
+ by
741
+ the S˜ao Paulo Research Foundation (FAPESP), grant
742
+ 2021/03251-0 and V.S. was supported by the National
743
+ Council for Scientific and Technological Development
744
+ (CNPq) of Brazil, grant 307813/2019-3.
745
+ [1] C. K. Hong, Z. Y. Ou, and L. Mandel, Measurement
746
+ of subpicosecond time intervals between two photons by
747
+ interference, Phys. Rev. Lett. 59, 2044 (1987).
748
+ [2] Z. Y. Ou, Temporal distinguishability of an N-photon
749
+ state and its characterization by quantum interference,
750
+ Phys. Rev. A 74, 063808 (2006).
751
+ [3] F. W. Sun and C. W. Wong, Indistinguishability of inde-
752
+ pendent single photons , Phys. Rev. A 79, 013824 (2009).
753
+ [4] M. Zukowski, A. Zeilinger, M. A. Horne, Realizable
754
+ higher-dimensional two-particle entanglement via multi-
755
+ port beam splitters, Phys. Rev. A 55, 2564 (1997)
756
+ [5] X. B. Zou, K. Pahlke, and W. Mathis, Generation of
757
+ entangled photon states by using linear optical elements,
758
+ Phys. Rev. A 66, 014102 (2002).
759
+ [6] Y. Liang Lim and A. Beige, Multiphoton entanglement
760
+ through a Bell-multiport beam splitter, Phys. Rev. A 71,
761
+ 06231 (2005).
762
+ [7] S. Scheel, K. Nemoto, W. J. Munro, and P. L. Knight,
763
+ Measurement-induced nonlinearity in linear optics, Phys.
764
+ Rev. A 68, 032310 (2003).
765
+ [8] R. A. Campos, B. E. A. Saleh, M. C. Teich, Quantum-
766
+ mechanical lossless beam splitter: SU(2) symmetry and
767
+ photon statistics, Phys. Rev. A 40, 1371 (1989).
768
+ [9] M. Reck, A. Zeilinger, H. J. Bernstein, and P. Bertani,
769
+ Experimental realization of any discrete unitary opera-
770
+ tor, Phys. Rev. Lett. 73, 58 (1994).
771
+ [10] Z. Y. Ou, J.-K. Rhee, and L. J. Wang, Observation of
772
+ Four-Photon Interference with a Beam Splitter by Pulsed
773
+ Parametric Down-Conversion, Phys. Rev. Lett. 83, 959
774
+ (1999).
775
+ [11] R. A. Campos, Three-photon Hong-Ou-Mandel interfer-
776
+ ence at a multiport mixer, Phys. Rev. A 62, 013809
777
+ (2000)
778
+ [12] X.-L. Niu, Y.-X. Gong, B.-H. Liu, Y.-F. Huang, G.-C.
779
+ Guo, Observation of a generalized bunching effect of six
780
+ photons, Opt. Lett. 34, 1297 (2009).
781
+ [13] Y. Liang Lim and A. Beige, Generalized Hong-Ou-
782
+ Mandel experiments with bosons and fermions, New J.
783
+ of Physics 7, 155 (2005).
784
+ [14] M. C. Tichy, M. Tiersch, F. Melo, F. Mintert, A. Buch-
785
+ leitner, Zero-Transmission law for multiport beam split-
786
+ ters, Phys. Rev. Lett. 104, 220405 (2010).
787
+ [15] A. Crespi, Suppression laws for multiparticle interference
788
+ in Sylvester interferometers, Phys. Rev. A 91, 013811
789
+ (2015)
790
+ [16] M. C. Tichy, M. Tiersch, F. Mintert, and A. Buchleit-
791
+ ner, Many-particle interference beyond many-boson and
792
+ many-fermion statistics, New J. of Physics 14, 093015
793
+ (2012).
794
+ [17] Z.-E. Su, Y. Li, P. P. Rohde, H.-L. Huang, X.-L. Wang,
795
+ L. Li, N.-L. Liu, J. P. Dowling, C.-Y. Lu, and J.-W. Pan,
796
+ Multiphoton Interference in Quantum Fourier Transform
797
+ Circuits and Applications to Quantum Metrology, Phys.
798
+ Rev. Lett. 119, 080502 (2017).
799
+ [18] A. Crespi, R. Osellame, R. Ramponi, M. Bentivegna, F.
800
+ Flamini, N. Spagnolo, N. Viggianiello, L. Innocenti, P.
801
+ Mataloni, and F. Sciarrino, Suppression law of quantum
802
+ states in a 3D photonic fast Fourier transform chip, Nat.
803
+ Commun. 7, 10469 (2016).
804
+ [19] N. Spagnolo, C. Vitelli, L. Aparo, P. Mataloni, F. Scia-
805
+ rrino, A. Crespi, R. Ramponi, and R. Osellame, Three-
806
+ photon bosonic coalescence in an integrated tritter, Nat.
807
+ Commun. 4, 1606 (2013).
808
+ [20] M. Tillmann, S.-H. Tan, S. E. Stoeckl, B. C. Sanders,
809
+ H. de Guise, R. Heilmann, S. Nolte, A. Szameit, and
810
+ P. Walther, Generalized Multiphoton Quantum Interfer-
811
+ ence, Phys. Rev. X 5, 041015 (2015).
812
+ [21] J. Carolan, C. Harrold, C. Sparrow, E. Mart´ın-L´opez, N.
813
+ J. Russell, J. W. Silverstone, P. J. Shadbolt, N. Matsuda,
814
+ M. Oguma, M. Itoh, G. D. Marshall, M. G. Thompson,
815
+ J. C. F. Matthews, T. Hashimoto, J.L. O’Brien, and A.
816
+ Laing, Universal Linear Optics, Science 349, 711 (2015).
817
+ [22] A. J. Menssen, A. E. Jones, B. J. Metcalf, M. C. Tichy,
818
+ S. Barz, W. S. Kolthammer, and I. A. Walmsley, Distin-
819
+ guishability and many-particle interference, Phys. Rev.
820
+ Lett. 118, 153603 (2017).
821
+ [23] S. Agne, J. Jin, J. Z. Salvail, K. J. Resch, T. Kauten, E.
822
+ Meyer-Scott, D. R. Hamel, G. Weihs, and T. Jennewein,
823
+ Observation of genuine three-photon interference, Phys.
824
+ Rev. Lett. 118, 153602 (2017).
825
+
826
+ 6
827
+ [24] C. Dittel, G. Dufour, M. Walschaers, Totally destructive
828
+ many-particle interference, Phys. Rev. Lett. 120, 240404
829
+ (2018).
830
+ [25] C. Dittel, G. Dufour, M. Walschaers, G. Weihs, A.
831
+ Buchleitner, R. Keil, Totally destructive interference for
832
+ permutation-symmetric many-particle states, Phys. Rev.
833
+ A 97, 062116 (2018).
834
+ [26] H. Minc, Permanents, Encyclopedia of Mathematics and
835
+ Its Applications, Vol. 6 (Addison-Wesley Publ. Co.,
836
+ Reading, Mass., 1978).
837
+ [27] M. G. Jabbour, N. J. Cerf, Multiparticle quantum
838
+ interference
839
+ in
840
+ Bogoliubov
841
+ bosonic
842
+ transformations,
843
+ Phys.Rev.Res. 3, 043065 (2021).
844
+ [28] See the Supplemental Material.
845
+ [29] V. S. Shchesnovich, Partial indistinguishability theory
846
+ for multiphoton experiments in multiport devices, Phys.
847
+ Rev. A 91, 013844 (2015).
848
+ [30] M. C. Tichy, Sampling of partially distinguishable bosons
849
+ and the relation to the multidimensional permanent,
850
+ Phys. Rev. A 91, 022316 (2015).
851
+ [31] V. S. Shchesnovich, Assymptotic evaluation of bosonic
852
+ probability amplitudes in linear unitary networks in the
853
+ case of large number of bosons, Int. J. Quantum Inf. 11,
854
+ 1350045 (2013).
855
+ [32] T. Engl., J. D. Urbina, K. Richter, Boson Sampling as
856
+ a canonical transformation: a semiclassical approach in
857
+ Fock state, Annalen der Physik 527, 737 (2015)
858
+ [33] J. Tiedau, T. J. Bartley, G. Harder, A. E. Lita, S. W.
859
+ Nam, T. Gerrits, C. Silberhorn, Scalability of parametric
860
+ down-conversion for generating higher-order Fock states,
861
+ Phys. Rev. A 100, 041802 (2019).
862
+ [34] M. Uria , P. Solano, C. Hermann-Avigliano, Determin-
863
+ istic Generation of Large Fock States, Phys. Rev. Lett.
864
+ 125, 093603 (2020).
865
+ [35] N. Rivera, J. Sloan, Y. Salamin, J. D. Joannopoulos,
866
+ M. Soljacic, Creating large Fock states and massively
867
+ squeezed states in optics using systems with nonlinear
868
+ bound states in the continuum, Arxiv: 2211.01514
869
+
870
+ Supplementar material for
871
+ “Families of bosonic suppression laws beyond the permutation symmetry principle”
872
+ M. E. O. Bezerra and V. S. Shchesnovich
873
+ Centro de Ciˆencias Naturais e Humanas, Universidade Federal do ABC, Santo Andr´e, SP, 09210-170 Brazil
874
+ THE MATRIX OF THE TRITTER
875
+ The tritter is a three-mode interferometer that can be built in the triangular arrangement of three beamsplitters,
876
+ one mirror, and in our case, an additional phase plate. Let us consider Bj the matrices of each beamsplitter acting on
877
+ the input modes defined in Fig. 1(b) in the main text. We set the reflection phases of each beamsplitter as ϕj = π/2,
878
+ then the matrices of these beamsplitters are
879
+ B1 =
880
+
881
+
882
+
883
+
884
+
885
+
886
+
887
+
888
+ √τ1
889
+ i√ρ1 0
890
+ i√ρ1
891
+ √τ1
892
+ 0
893
+ 0
894
+ 0
895
+ 1
896
+
897
+
898
+
899
+
900
+
901
+
902
+
903
+
904
+ , B2 =
905
+
906
+
907
+
908
+
909
+
910
+
911
+
912
+
913
+ √τ2
914
+ 0 i√ρ2
915
+ 0
916
+ 1
917
+ 0
918
+ i√ρ2 0
919
+ √τ2
920
+
921
+
922
+
923
+
924
+
925
+
926
+
927
+
928
+ , B3 =
929
+
930
+
931
+
932
+
933
+
934
+
935
+
936
+
937
+ 1
938
+ 0
939
+ 0
940
+ 0
941
+ √τ3
942
+ i√ρ3
943
+ 0 i√ρ3
944
+ √τ3
945
+
946
+
947
+
948
+
949
+
950
+
951
+
952
+
953
+ ,
954
+ (1)
955
+ where ρk = 1 − τk for each k = 1, 2, 3. In addition, we need to define the matrices related to the additional phase
956
+ shifter Pθ = diag(1, 1, eiθ) and the ones related to the reflection phase in the first mode M1 = diag(−1, 1, 1), second
957
+ mode M2 = diag(1, −1, 1) and third mode M3 = diag(1, 1, −1).
958
+ Finally, the matrix of the tritter, denoted by T, is built by the sequence action of these matrices
959
+ T = M1B1M2B2PθB3M3
960
+ =
961
+
962
+
963
+
964
+
965
+
966
+
967
+
968
+
969
+ −√τ1τ2
970
+ i√ρ1τ3 + √τ1ρ2ρ3eiθ
971
+ √ρ1ρ3 + i√τ1ρ2τ3eiθ
972
+ i√ρ1τ2
973
+ −√τ1τ3 − i√ρ1ρ2ρ3eiθ
974
+ i√τ1ρ3 + √ρ1ρ2τ3eiθ
975
+ i√ρ2
976
+ i√τ2ρ3eiθ
977
+ −√τ2τ3eiθ
978
+
979
+
980
+
981
+
982
+
983
+
984
+
985
+
986
+ ,
987
+ (2)
988
+ where in our notation, the rows are related to the input modes and the columns with the output modes, in contrast
989
+ to Ref. [1]. From Eq.(2), we arrive in the matrix T (1) of the main text by taking τ2 = 2/3 and τ3 = 1/2, preserving τ1
990
+ and θ as free parameters, and factoring a diagonal matrix diag(i, 1, 1) from the left and diag(i, i, −1) from the right.
991
+ Moreover, we arrive in the matrix T (2) by taking τ1 = τ3 = 1/2, preserving τ2 and θ as free parameters, and factoring
992
+ the same diagonal matrices of the previous one.
993
+ In the main text, we defined two types of symmetric tritters, denoted by Ts and �Ts. These tritters are obtained by
994
+ setting τ1 = τ3 = 1/2 and τ2 = 2/3 in Eq.(2), and are built explicitly from the following construction:
995
+ Ts(θ) =
996
+
997
+
998
+
999
+
1000
+
1001
+
1002
+
1003
+
1004
+ − 1
1005
+
1006
+ 2
1007
+ i
1008
+
1009
+ 2
1010
+ 0
1011
+ i
1012
+
1013
+ 2
1014
+ − 1
1015
+
1016
+ 2 0
1017
+ 0
1018
+ 0
1019
+ 1
1020
+
1021
+
1022
+
1023
+
1024
+
1025
+
1026
+
1027
+
1028
+
1029
+
1030
+
1031
+
1032
+
1033
+
1034
+
1035
+
1036
+
1037
+ 2
1038
+ 3 0
1039
+ i
1040
+
1041
+ 3
1042
+ 0
1043
+ 1
1044
+ 0
1045
+ i
1046
+
1047
+ 3
1048
+ 0
1049
+
1050
+ 2
1051
+ 3
1052
+
1053
+
1054
+
1055
+
1056
+
1057
+
1058
+
1059
+
1060
+
1061
+
1062
+
1063
+
1064
+
1065
+
1066
+
1067
+
1068
+ 1 0
1069
+ 0
1070
+ 0 1
1071
+ 0
1072
+ 0 0 eiθ
1073
+
1074
+
1075
+
1076
+
1077
+
1078
+
1079
+
1080
+
1081
+
1082
+
1083
+
1084
+
1085
+
1086
+
1087
+
1088
+
1089
+ 1
1090
+ 0
1091
+ 0
1092
+ 0
1093
+ 1
1094
+
1095
+ 2 − i
1096
+
1097
+ 2
1098
+ 0
1099
+ i
1100
+
1101
+ 2 − 1
1102
+
1103
+ 2
1104
+
1105
+
1106
+
1107
+
1108
+
1109
+
1110
+
1111
+
1112
+ ,
1113
+ (3)
1114
+ where we have Ts(0) = Ts and Ts(π/2) = �Ts, after factoring the appropriate diagonal matrices that do not contribute
1115
+ to the interference.
1116
+ SUPPRESSION FUNCTIONS
1117
+ It was proved in the main text that, when N photons enter a linear interferometer of dimension M in the M-mode
1118
+ input Fock state |m⟩a and are detected in the M-mode output Fock state |n⟩b, the corresponding amplitude is given
1119
+ arXiv:2301.02192v1 [quant-ph] 3 Jan 2023
1120
+
1121
+ 2
1122
+ by
1123
+ b⟨n|m⟩a =
1124
+ M
1125
+
1126
+ k=1
1127
+ 1
1128
+ √mk!nk!
1129
+ ∂mk
1130
+ ∂ymk
1131
+ k
1132
+ ∂nk
1133
+ ∂xnk
1134
+ k
1135
+ G(x, y)
1136
+ �����
1137
+ x=y=0
1138
+ , G(x, y) = exp
1139
+
1140
+
1141
+ M
1142
+
1143
+ k,l=1
1144
+ ykUklxl
1145
+
1146
+ � ,
1147
+ (4)
1148
+ where U is a unitary matrix related to the interferometer. For simplicity, since the number of photons is fixed at
1149
+ the input, we can take all the derivatives over the input variables yk in the generating function G(x, y) obtaining the
1150
+ following expression
1151
+ b⟨n|m⟩a =
1152
+ M
1153
+
1154
+ k=1
1155
+ 1
1156
+ √nk!
1157
+ ∂nk
1158
+ ∂xnk
1159
+ k
1160
+ Gm(x)
1161
+ �����
1162
+ x=0
1163
+ , Gm(x) =
1164
+ M
1165
+
1166
+ k=1
1167
+ 1
1168
+ √mk!
1169
+ � M
1170
+
1171
+ l=1
1172
+ Uklxl
1173
+ �mk
1174
+ ,
1175
+ (5)
1176
+ where here, we have defined a generating function for each input configuration m.
1177
+ Taking the derivative over the output variable xl we obtain the following recurrence relation for this new generating
1178
+ function
1179
+
1180
+ ∂xl
1181
+ Gm(x) =
1182
+ M
1183
+
1184
+ k=1
1185
+ √mkUklGm−1k(x) ,
1186
+ (6)
1187
+ where 1k is a vector of dimension M with the k-th element being 1 and the others being zero, i.e.
1188
+ 1k ≡
1189
+ (0, . . . , 0, 1, 0, . . . , 0). Then, replacing Eq.(6) in Eq.(5), we arrive in the recurrence for the amplitudes
1190
+ b⟨n|m⟩a =
1191
+ M
1192
+
1193
+ k=1
1194
+ �mk
1195
+ nl
1196
+ Ukl b⟨n − 1l|m − 1k⟩a .
1197
+ (7)
1198
+ As assumed in the main text, we focus on the mode l = 1, which can have an arbitrary number of photons
1199
+ n1 ≥ 1, and considered that the other modes have a small number of photons. Denoting the output configurations
1200
+ as n = (n1, nS), with nS = (n2, ..., nM), we can remove the photons in each mode of nS by using the recurrence
1201
+ relation of Eq. (7) repeatedly nl times for each output modes l = 2, . . . , M. Following this procedure, we obtain the
1202
+ amplitude b⟨n|m⟩a as a linear combination of the simple ones
1203
+ b⟨n1, 0S|m′⟩a =
1204
+ 1
1205
+ √n1!
1206
+ ∂n1
1207
+ ∂xn1
1208
+ 1
1209
+ Gm′(x1, 0, ..., 0)
1210
+ ����
1211
+ x1=0
1212
+ =
1213
+
1214
+ n1!
1215
+ m′! U m′
1216
+ k
1217
+ k1 ,
1218
+ (8)
1219
+ where m′ is the input configuration with fewer photons that appears in each term of the expansion due to the use of
1220
+ the recurrence relation. Finally, factoring m! = m1!...mM! and the smallest order of Ukl, i.e. mk − |nS|, we obtain
1221
+ the amplitude in the form
1222
+ b⟨n|m⟩a =
1223
+
1224
+ n1!
1225
+ nS!m!
1226
+ � M
1227
+
1228
+ k=1
1229
+ U mk−|nS|
1230
+ k1
1231
+
1232
+ f n
1233
+ m(U),
1234
+ (9)
1235
+ where the function f n
1236
+ m(U) is called suppression function and is obtained by collecting the matrix elements that appear
1237
+ from the Eqs. (7),(8) and the terms remaining in the factorization. This function is a polynomial in the parameters
1238
+ of the interferometers √ρj and √τ j.
1239
+ Beamsplitter
1240
+ Outputs |n1, 1⟩b and |n1, 2⟩b
1241
+ First of all, we want to find suppression laws for the amplitudes with less photons in the output mode l = 2 by
1242
+ using the recurrence relation given by Eq.(7) to remove all the photons in this mode. Then, using this method for
1243
+
1244
+ 3
1245
+ the output mode l = 2 one and two times, respectively, we arrive in the recurrence relations
1246
+ b⟨n|m⟩a =
1247
+ �m1
1248
+ n2
1249
+ U12 b⟨n − 12|m − 11⟩a +
1250
+ �m2
1251
+ n2
1252
+ U22 b⟨n − 12|m − 12⟩a,
1253
+ (10)
1254
+ b⟨n|m⟩a =
1255
+
1256
+ m1(m1 − 1)
1257
+ n2(n2 − 1) U 2
1258
+ 12 b⟨n − 212|m − 211⟩a +
1259
+
1260
+ m2(m2 − 1)
1261
+ n2(n2 − 1) U 2
1262
+ 22 b⟨n − 212|m − 212⟩a +
1263
+ +2
1264
+
1265
+ m1m2
1266
+ n2(n2 − 1)U12U22 b⟨n − 212|m − 11 − 12⟩a,
1267
+ (11)
1268
+ The first recurrence removes the photons n2 of the amplitudes b⟨n1, 1|m1, m2⟩a and the second of the amplitudes
1269
+ b⟨n1, 2|m1, m2⟩a. Then, we can use Eq.(8) obtaining Eq.(9) with the suppression functions
1270
+ f (n1,1)
1271
+ (m1,m1)(B) = m1B12B21 + m2B11B22
1272
+ = (m1 + m2)τ − m1,
1273
+ (12)
1274
+ f (n1,2)
1275
+ (m1,m2)(B) = m1(m1 − 1)B2
1276
+ 12B2
1277
+ 21 + 2m1m2B11B12B21B22 + m2(m2 − 1)B2
1278
+ 11B2
1279
+ 22
1280
+ = (m1 + m2)(m1 + m2 − 1)
1281
+
1282
+ τ 2 −
1283
+ 2m1
1284
+ m1 + m2
1285
+ τ +
1286
+ m1(m1 − 1)
1287
+ (m1 + m2)(m1 + m2 − 1)
1288
+
1289
+ .
1290
+ (13)
1291
+ where we have considered the matrix of the beamsplitter B as our unitary matrix U. The roots of the these functions
1292
+ are the suppression laws found for the beamsplitter and are shown in Eqs.(9),(11) in the main text.
1293
+ Outputs |1, n2⟩b and |2, n2⟩b
1294
+ In addition to the considered in the main text, we also can find suppression laws for the amplitude that have fewer
1295
+ photons in the mode l = 1. For this case, we need to use Eq.(7) for this mode one and two times, respectively,
1296
+ obtaining the recurrence relations:
1297
+ b⟨n|m⟩a =
1298
+ �m1
1299
+ n1
1300
+ U11 b⟨n − 11|m − 11⟩a +
1301
+ �m2
1302
+ n1
1303
+ U21 b⟨n − 11|m − 12⟩a,
1304
+ (14)
1305
+ b⟨n|m⟩a =
1306
+
1307
+ m1(m1 − 1)
1308
+ n1(n1 − 1) U 2
1309
+ 11 b⟨n − 211|m − 211⟩a +
1310
+
1311
+ m2(m2 − 1)
1312
+ n1(n1 − 1) U 2
1313
+ 21 b⟨n − 211|m − 212⟩a +
1314
+ +2
1315
+
1316
+ m1m2
1317
+ n1(n1 − 1)U11U21 b⟨n − 211|m − 11 − 12⟩a,
1318
+ (15)
1319
+ and similarly to the previous case, these equations remove the photons in n1 of the amplitudes b⟨1, n2|m1, m2⟩a and
1320
+ b⟨2, n2|m1, m2⟩a respectively. Finally, we can use Eq.(8) obtaining Eq.(9) with the suppression functions
1321
+ f (1,n2)
1322
+ (m1,m1)(B) = m1B11B22 + m2B21B12
1323
+ = (m1 + m2)τ − m2,
1324
+ (16)
1325
+ f (2,n2)
1326
+ (m1,m2)(B) = m1(m1 − 1)B2
1327
+ 11B2
1328
+ 22 + 2m1m2B11B12B21B22 + m2(m2 − 1)B2
1329
+ 21B2
1330
+ 12
1331
+ = (m1 + m2)(m1 + m2 − 1)
1332
+
1333
+ τ 2 −
1334
+ 2m2
1335
+ m1 + m2
1336
+ τ +
1337
+ m2(m2 − 1)
1338
+ (m1 + m2)(m1 + m2 − 1)
1339
+
1340
+ .
1341
+ (17)
1342
+ Note that, these functions have the same form as those of Eqs.(12),(13), however with m1 and m2 interchanged.
1343
+ Tritter
1344
+ Outputs |n1, 1, 0⟩b and |n1, 0, 1⟩b
1345
+ For the tritter, the simplest suppression laws are those with |nS| = 1, corresponding to the output configurations
1346
+ with nS = (1, 0) and nS = (0, 1). Then, for the first one, we need to use the recurrence once for l = 1, and for the
1347
+
1348
+ 4
1349
+ second one, once for l = 2, obtaining respectively
1350
+ b⟨n|m⟩a =
1351
+ �m1
1352
+ n2
1353
+ U12 b⟨n − 12|m − 11⟩a +
1354
+ �m2
1355
+ n2
1356
+ U22 b⟨n − 12|m − 12⟩a +
1357
+ �m3
1358
+ n2
1359
+ U32 b⟨n − 12|m − 13⟩a,
1360
+ (18)
1361
+ b⟨n|m⟩a =
1362
+ �m1
1363
+ n3
1364
+ U13 b⟨n − 13|m − 11⟩a +
1365
+ �m2
1366
+ n3
1367
+ U23 b⟨n − 13|m − 12⟩a +
1368
+ �m3
1369
+ n3
1370
+ U33 b⟨n − 13|m − 13⟩a
1371
+ (19)
1372
+ where the first removes the photons in n2 of the amplitudes b⟨n1, 1, 0|m1, m2, m3⟩a and the second, the photons n3 of
1373
+ the amplitudes b⟨n1, 0, 1|m1, m2, m3⟩a. Then, from Eqs.(8),(9) we obtain the general expression for the suppression
1374
+ functions
1375
+ f (n1,1,0)
1376
+ m
1377
+ (U) = m1U12U21U31 + m2U11U22U31 + m3U11U21U32,
1378
+ (20)
1379
+ f (n1,0,1)
1380
+ m
1381
+ (U) = m1U13U21U31 + m2U11U23U31 + m3U11U21U33
1382
+ (21)
1383
+ Finally, considering our families of tritters T (1) and T (2) as the unitary transformation U of the previous equation,
1384
+ we have
1385
+ f (n1,1,0)
1386
+ m,m,m (T (1)) = −f (n1,0,1)
1387
+ m,m,m (T (1)) = m
1388
+ 3 (2τ1 − 1),
1389
+ (22)
1390
+ f (n1,1,0)
1391
+ m,m,m (T (2)) = f (n1,0,1)
1392
+ m,m,m (T (2)) = m
1393
+
1394
+ 2
1395
+ 4
1396
+ (3τ2 − 2)√τ2eiθ
1397
+ (23)
1398
+ whose non-trivial roots are τ1 = 1/2 or τ2 = 2/3, which correspond to the symmetric tritters. These suppression laws
1399
+ are shown in the first row of Table I in the main text.
1400
+ Outputs |n1, 1, 1⟩b
1401
+ Now, for |nS| = 2 we will first consider the outputs with nS = (1, 1). Using Eq.(7) for the modes l = 2 and l = 3
1402
+ symultaneously we obtain the recurrence relation
1403
+ b⟨n|m⟩a =
1404
+ =
1405
+ �m1m2
1406
+ n2n3
1407
+ (U12U23 + U22U13) b⟨n − 11 − 12|m − 11 − 12⟩a +
1408
+
1409
+ m3(m3 − 1)
1410
+ n2n3
1411
+ U32U33 b⟨n − 11 − 12|m − 213⟩a +
1412
+ +
1413
+ �m1m3
1414
+ n2n3
1415
+ (U12U33 + U32U13) b⟨n − 11 − 12|m − 11 − 13⟩a +
1416
+
1417
+ m2(m2 − 1)
1418
+ n2n3
1419
+ U22U23 b⟨n − 11 − 12|m − 212⟩a +
1420
+ +
1421
+ �m2m3
1422
+ n2n3
1423
+ (U22U33 + U32U23) b⟨n − 11 − 12|m − 12 − 13⟩a +
1424
+
1425
+ m1(m1 − 1)
1426
+ n2n3
1427
+ U12U13 b⟨n − 11 − 12|m − 211⟩a,
1428
+ (24)
1429
+ which removes the photons in n2 and n3 of the amplitudes b⟨n1, 1, 1|m1, m2, m3⟩a. Then, using Eqs.(8),(9), we found
1430
+ the corresponding suppression function
1431
+ f (n1,1,1)
1432
+ m
1433
+ (U) =
1434
+ = U11U21U31
1435
+
1436
+ m1m2 (U12U23 + U22U13) U31 + m1m3 (U12U33 + U32U13) U21 + m2m3 (U22U33 + U32U23) U11
1437
+
1438
+ +
1439
+ +
1440
+
1441
+ m1(m1 − 1)U12U13U 2
1442
+ 21U 2
1443
+ 31 + m2(m2 − 1)U22U23U 2
1444
+ 11U 2
1445
+ 31 + m3(m3 − 1)U32U33U 2
1446
+ 11U 2
1447
+ 21
1448
+
1449
+ .
1450
+ (25)
1451
+ The previous equation has too many parameters: the input configurations mk, the tritter parameters ρj and θ. To
1452
+ find suppression laws it is convenient to consider inputs with only one parameter, in our case m(I) = (n1, 1, 1) and
1453
+ m(II) = (m, m, m), and our families of tritters T (1) and T (2) as the unitary transformation U. Then, for which one
1454
+ of these cases, the suppression functions of Eq.(25) are given by:
1455
+ f (n1,1,1)
1456
+ (n1,1,1) (T (1)) =
1457
+
1458
+ 2
1459
+ 18
1460
+ � �
1461
+ 4ei2θ + 3(1 + ei2θ)n1 + (3 − ei2θ)n2
1462
+ 1
1463
+
1464
+ τ1 − 3n1(n1 − 1)
1465
+ �√
1466
+ 1 − τ1,
1467
+ (26)
1468
+
1469
+ 5
1470
+ f (n1,1,1)
1471
+ (n1,1,1) (T (2)) =
1472
+
1473
+ 2
1474
+ 4
1475
+
1476
+ ei2θ �
1477
+ 2 + 3n1 + n2
1478
+ 1
1479
+
1480
+ τ2 + (3 − ei2θ)n1 − (1 + ei2θ)n2
1481
+ 1
1482
+ ��
1483
+ τ2(1 − τ2),
1484
+ (27)
1485
+ f (n1,1,1)
1486
+ (m,m,m)(T (1)) = m
1487
+ 9
1488
+
1489
+ 2(2m + ei2θ − 1)(τ1 − 1)τ1 + m − 1
1490
+
1491
+ ,
1492
+ (28)
1493
+ f (n1,1,1)
1494
+ (m,m,m)(T (2)) = m
1495
+ 8
1496
+
1497
+ 3(3m − 1)ei2θτ 2
1498
+ 2 − 2
1499
+
1500
+ (6m − 2)ei2θ − 1
1501
+
1502
+ τ2 + (4m − 2)ei2θ − 2
1503
+
1504
+ τ2,
1505
+ (29)
1506
+ The roots of the four previous equations given the suppression laws for the amplitudes b⟨n1, 1, 1|n1, 1, 1⟩a and
1507
+ b⟨n1, 1, 1|m, m, m⟩a. These results are shown in blue in Fig. 3 in the main text, where the non-trivial suppression
1508
+ laws are ignored (i.e. those that τ1, τ2 = 0, 1).
1509
+ Outputs |n1, 2, 0⟩b
1510
+ Furthermore, for |nS| = 2 we also considered the outputs with nS = (2, 0). In this case, we need to use Eq.(7) two
1511
+ times for l = 2, obtaining the recurrence relation
1512
+ b⟨n|m⟩a =
1513
+ =
1514
+
1515
+ m1(m1 − 1)
1516
+ n2(n2 − 1) U 2
1517
+ 12 b⟨n − 212|m − 211⟩a +
1518
+
1519
+ m2(m2 − 1)
1520
+ n2(n2 − 1) U 2
1521
+ 22 b⟨n − 212|m − 212⟩a +
1522
+ +
1523
+
1524
+ m3(m3 − 1)
1525
+ n2(n2 − 1) U 2
1526
+ 32 b⟨n − 212|m − 213⟩a + 2
1527
+
1528
+ m1m2
1529
+ n2(n2 − 1)U12U22 b⟨n − 212|m − 11 − 12⟩a
1530
+ +2
1531
+
1532
+ m1m3
1533
+ n2(n2 − 1)U12U32 b⟨n − 212|m − 11 − 13⟩a + 2
1534
+
1535
+ m2m3
1536
+ n2(n2 − 1)U22U32 b⟨n − 212|m − 12 − 13⟩a,
1537
+ (30)
1538
+ which removes the photons in n2 of the amplitudes b⟨n1, 2, 0|m1, m2, m3⟩a. Then, using Eqs.(8),(9), we found the
1539
+ corresponding suppression function
1540
+ f (n1,2,0)
1541
+ m
1542
+ (U) = 2U11U21U31
1543
+
1544
+ m1m2U12U22U31 + m1m3U12U32U21 + m2m3U22U32U11
1545
+
1546
+ +
1547
+ +m1(m1 − 1)U 2
1548
+ 12U 2
1549
+ 21U 2
1550
+ 31 + m2(m2 − 1)U 2
1551
+ 22U 2
1552
+ 11U 2
1553
+ 31 + m3(m3 − 1)U 2
1554
+ 32U 2
1555
+ 11U 2
1556
+ 21,
1557
+ (31)
1558
+ Finally, keeping only the parameters of interest, we have
1559
+ f (n1,2,0)
1560
+ (n1,1,1) (T (1)) =
1561
+
1562
+ 2
1563
+ 18
1564
+
1565
+ (4ei2θ − 3(ei2θ − 1)n1 − (3 + ei2θ)n2
1566
+ 1)τ1 − 3n1(1 − n1)
1567
+ � √
1568
+ 1 − τ1 +
1569
+ +
1570
+
1571
+ 6
1572
+ 9 ieiθ �
1573
+ n1(2 − n1) − (2 + n1 − n2
1574
+ 1)τ1
1575
+ � √τ1,
1576
+ (32)
1577
+ f (n1,2,0)
1578
+ (n1,1,1) (T (2)) =
1579
+
1580
+ 2
1581
+ 4
1582
+
1583
+ (2 + 3n1 + n2
1584
+ 1)ei2θτ2 −
1585
+
1586
+ 3 + ei2θ + (ei2θ − 1)n1
1587
+
1588
+ n1
1589
+ � �
1590
+ τ2(1 − τ2) +
1591
+ + 1
1592
+
1593
+ 2ieiθ(1 − n1) [n1 − (1 + n1)τ2] √τ2,
1594
+ (33)
1595
+ f (n1,2,0)
1596
+ (m,m,m)(T (1)) = m
1597
+ 9
1598
+
1599
+ (4m − 2 − 2ei2θ)(1 − τ1)τ1 − m + 1
1600
+
1601
+ + 2m
1602
+ 27 ieiθ(2τ1 − 1)
1603
+
1604
+ 3τ1(1 − τ1),
1605
+ (34)
1606
+ f (n1,2,0)
1607
+ (m,m,m)(T (2)) = m
1608
+ 8
1609
+
1610
+ (9m − 3)ei2θτ 2
1611
+ 2 − 2
1612
+
1613
+ (6m − 2)ei2θ + 1
1614
+
1615
+ τ2 + 2
1616
+
1617
+ (2m − 1)ei2θ + 1
1618
+ ��
1619
+ τ2,
1620
+ (35)
1621
+ Now, the roots of the four previous equations give the suppression laws for the amplitudes b⟨n1, 2, 0|n1, 1, 1⟩a and
1622
+ b⟨n1, 2, 0|m, m, m⟩a. These results are shown in red in Fig. 3, where the non-trivial suppression laws are also ignored.
1623
+
1624
+ 6
1625
+ Suppression laws with constant solutions
1626
+ In addition, in Fig. 3 in the main text, we note four constant suppression laws for the reflectivities ρ2 = 1/3 and
1627
+ ρ1 = 1/2. It occurs because for these values the corresponding suppression functions are factorized in such a way that
1628
+ one of the terms does not depend on m, which corresponds to these constant solutions, as follows:
1629
+ f (n1,1,1)
1630
+ (m,m,m)(T (1))
1631
+ θ=±π/2
1632
+ =
1633
+ m(m − 1)
1634
+ 9
1635
+ (2τ1 − 1)2,
1636
+ (36)
1637
+ f (n1,1,1)
1638
+ (m,m,m)(T (2))
1639
+ θ=±π/2
1640
+ =
1641
+ m
1642
+ 8
1643
+
1644
+ (3m − 1)τ2 − 2m
1645
+
1646
+ (3τ2 − 2)τ2,
1647
+ (37)
1648
+ f (n1,2,0)
1649
+ (m,m,m)(T (1))
1650
+ θ=0,π
1651
+ =
1652
+ m
1653
+ 27
1654
+
1655
+ 3(m − 1)(2τ1 − 1) + 2i
1656
+
1657
+ 3(1 − τ1)τ1
1658
+
1659
+ (2τ1 − 1),
1660
+ (38)
1661
+ f (n1,2,0)
1662
+ (m,m,m)(T (2))
1663
+ θ=0,π
1664
+ =
1665
+ −m
1666
+ 8 [(3m ��� 1)τ2 − 2m] (3τ2 − 2)τ2,
1667
+ (39)
1668
+ Here, we note that the suppression functions of Eqs. (36)(38) have a common constant root τ1 = 1/2, and those of
1669
+ Eqs. (37),(39) the common constant root τ2 = 2/3. These suppression laws are plotted in Fig. 3(b),(d) in the main
1670
+ text as the points and circles on the dashed line. Here, only the suppression laws obtained from Eqs. (38),(39) are
1671
+ related to the symmetry principle of Refs. [2, 3].
1672
+ SUPPRESSION LAWS FROM PERMUTATION SYMMETRY
1673
+ In Refs. [2, 3] were developed suppression laws for interferometers related to some input symmetries. Now we will
1674
+ show that only a part of the suppression laws we found are related to these symmetries. First of all, denoting SM as
1675
+ the group of permutations of M elements and σ their elements, we define the action of the permutation operator Pσ
1676
+ in a M-dimensional vector as follows
1677
+
1678
+
1679
+
1680
+
1681
+
1682
+
1683
+
1684
+
1685
+
1686
+ x1
1687
+ ...
1688
+ xM
1689
+
1690
+
1691
+
1692
+
1693
+
1694
+
1695
+
1696
+
1697
+ =
1698
+
1699
+
1700
+
1701
+
1702
+
1703
+
1704
+
1705
+
1706
+ xσ−1(1)
1707
+ ...
1708
+ xσ−1(M)
1709
+
1710
+
1711
+
1712
+
1713
+
1714
+
1715
+
1716
+
1717
+ ,
1718
+ (40)
1719
+ Let an input configuration which is symmetric under the operation σ(m) = m and an interferometer U that satisfies:
1720
+ PσU = ZUΛ,
1721
+ (41)
1722
+ where Z is a diagonal unitary matrix related to external phases and Λ a diagonal matrix that contains the eigenvectors
1723
+ of Pσ. Then, according to [2], the outputs n satisfying λn1
1724
+ 1 ...λnM
1725
+ M
1726
+ ̸= 1 are suppressed and considering our choice of
1727
+ input/outputs, these laws are shown in Table I (a). Similarly, if we have outputs symmetrical under the operation
1728
+ σ(n) = n and an interferometer satisfying
1729
+ UP †
1730
+ σ = Λ∗UZ∗,
1731
+ (42)
1732
+ we have suppression for inputs m such that λm1
1733
+ 1 ...λmM
1734
+ M
1735
+ ̸= 1. These suppression laws are shown in Table I (b) for our
1736
+ choice of inputs/outputs.
1737
+ For the interference in a beamsplitter, we need to consider the group S2 = {I, (12)}. From our results, only the
1738
+ suppression laws for the amplitudes b⟨n1, 1|m, m⟩a are related to the symmetry principle, since they are zero for
1739
+ τ = 1/2, which corresponds to the beamsplitter symmetrical under the permutation (12).
1740
+ For the interference in a tritter, we need to consider the permutation group S3 = {I, (12), (13), (23), (123), (132)}.
1741
+ From our method, the suppression laws obtained for the amplitudes b⟨n1, 2, 0|m, m, m⟩a are related to the symmetry
1742
+ principle, since they are zero for the tritter Ts, which is symmetric under the permutations (123) and (321). Our
1743
+ tritters also can recover the suppression laws due to the permutations (12) and (23), however, these results are the
1744
+ trivial cases, where some τj = 0 or τj = 1. Now, denoting our tritters by T (k) = T (k)(τk, θ), these last suppression
1745
+ laws are shown in Table I.
1746
+
1747
+ 7
1748
+ TABLE I: Suppression laws for tritter from permutation symmetry
1749
+ a) Output suppression configurations for symmetric inputs Pσ(m) = m
1750
+ σ
1751
+ U
1752
+ Z
1753
+ Λ
1754
+ Suppressions from Eq.(41)
1755
+ Suppressions from f n
1756
+ m(U)
1757
+ (12)
1758
+ T (2)(1, θ)
1759
+ diag(−1, −1, 1)
1760
+ diag(−1, 1, 1)
1761
+ ⟨n1, 1, 1|m, m, m⟩ and
1762
+ ⟨n1, 2, 0|m, m, m⟩ for odd n1
1763
+ ⟨1, 1, 1|1, 1, 1⟩ and
1764
+ ⟨1, 2, 0|1, 1, 1⟩
1765
+ (12)
1766
+ T (2)(0, 0)
1767
+ diag(i, −i, 1)
1768
+ diag(1, −1, 1)
1769
+ ⟨n1, 1, 1|m, m, m⟩ for any n1
1770
+ Same
1771
+ (12)
1772
+ T (2)(0, π)
1773
+ diag(i, −i, 1)
1774
+ diag(1, 1, −1)
1775
+ ⟨n1, 1, 1|m, m, m⟩ for any n1
1776
+ Same
1777
+ (123)
1778
+ Ts
1779
+ I
1780
+ diag(1, ei2π/3, ei4π/3)
1781
+ ⟨n1, 2, 0|m, m, m⟩ for any n1
1782
+ Same
1783
+ (321)
1784
+ Ts
1785
+ I
1786
+ diag(1, ei4π/3, ei2π/3)
1787
+ ⟨n1, 2, 0|m, m, m⟩ for any n1
1788
+ Same
1789
+ b) Input suppression configurations for symmetric outputs Pσ(n) = n
1790
+ σ
1791
+ U
1792
+ Z
1793
+ Λ
1794
+ Suppressions from Eq.(42)
1795
+ Suppressions from f n
1796
+ m(U)
1797
+ (23)
1798
+ T (1)(1, θ)
1799
+ I
1800
+ diag(1, −1, 1)
1801
+ ⟨n1, 1, 1|n1, 1, 1⟩ and
1802
+ ⟨n1, 1, 1|m, m, m⟩ for any n1
1803
+ Same
1804
+ (23)
1805
+ T (1)(0, θ)
1806
+ I
1807
+ diag(−1, 1, 1)
1808
+ ⟨n1, 1, 1|n1, 1, 1⟩ and
1809
+ ⟨n1, 1, 1|m, m, m⟩ for odd n1
1810
+ ⟨1, 1, 1|1, 1, 1⟩
1811
+ (23)
1812
+ T (2)(1, θ)
1813
+ diag(1, −1, −1)
1814
+ diag(1, 1, −1)
1815
+ ⟨n1, 1, 1|n1, 1, 1⟩ and
1816
+ ⟨n1, 1, 1|m, m, m⟩ for any n1
1817
+ Same
1818
+ SUPPRESSION LAWS AND PARTIAL DISTINGUISHABILITY
1819
+ Photons are partially distinguishable due to degrees of freedom not acted upon by the interferometer, which are
1820
+ called the internal states. In Ref. [4] it has been conjectured that the zero probability in the output of multi-photon
1821
+ interference with partially distinguishable photons is invariably the result of an exact cancellation of the quantum
1822
+ amplitudes of only the completely indistinguishable photons. This conjecture generalizes the well-known HOM effect
1823
+ [5] to more than two photons and arbitrary interferometer (and also to non-ideal detectors) and the observations made
1824
+ in Ref. [6]. It has been confirmed by all suppression laws in Refs. [2, 3]. Thus, by the conjecture, any suppression
1825
+ law which is not broken by partial the distinguishability of photons needs other suppression laws for smaller total
1826
+ numbers of photons.
1827
+ Now, this effect will be illustrated for a simple case. Let an experimental setup where N photons are prepared
1828
+ from independent sources in either N pure internal states |φi⟩, i = 1, . . . , N. If, for instance, an input has one mode
1829
+ occupied by one photon and this photon is partially distinguishable from the rest of N − 1 photons, we can use just
1830
+ two internal states |1⟩ and |2⟩, with |φk⟩ = |1⟩ for 1 ≤ k ≤ N − 1 and |φN⟩ = cosα|1⟩ + sinα|2⟩. Note that, the last
1831
+ photon becomes indistinguishable from the others when α = 0 and distinguishable when α = π/2. Therefore, we have
1832
+ the following state at the input:
1833
+ ˆρm = 1
1834
+ m!
1835
+ N−1
1836
+
1837
+ i=1
1838
+ ˆa†
1839
+ ki,1ˆa†
1840
+ kN,φN |0⟩⟨0|
1841
+ N−1
1842
+
1843
+ i=1
1844
+ ˆaki,1ˆakN,φN , m! = m1!m2!...mM!,
1845
+ (43)
1846
+ where the first index of the creation/annihilation operators is related to the spatial mode and the second index to the
1847
+ internal state. The creation operator of the N-th photon is then given by:
1848
+ ˆa†
1849
+ kN,φN = cosα ˆa†
1850
+ kN,1 + sinα ˆa†
1851
+ kN,2,
1852
+ (44)
1853
+ We define a set of POVMs ˆΠn related to the detection of the photons in the configurations n at the output:
1854
+ ˆΠn = 1
1855
+ n!
1856
+
1857
+ j
1858
+ N
1859
+
1860
+ i=1
1861
+ ˆb†
1862
+ li,ji|0⟩⟨0|
1863
+ N
1864
+
1865
+ i=1
1866
+ ˆbli,ji , n! = n1!n2!...nM!,
1867
+ (45)
1868
+
1869
+ 8
1870
+ where the sum in j is over the internal states ji = 1, 2. Then, after some calculations we can get the following
1871
+ expression for the probability:
1872
+ P(n|m, α) =
1873
+
1874
+ j
1875
+ Tr
1876
+
1877
+ ˆρm ˆΠn
1878
+
1879
+ =
1880
+ 1
1881
+ m!n!
1882
+
1883
+ j
1884
+ �����⟨0|
1885
+ N
1886
+
1887
+ i=1
1888
+ ˆbli,ji
1889
+ N−1
1890
+
1891
+ i=1
1892
+ ˆa†
1893
+ ki,1
1894
+
1895
+ cosα ˆa†
1896
+ kN,1 + sinα ˆa†
1897
+ kN,2
1898
+
1899
+ |0⟩
1900
+ �����
1901
+ 2
1902
+ = cos2α
1903
+ m!n!
1904
+ ���⟨0
1905
+ �����
1906
+ N
1907
+
1908
+ i=1
1909
+ ˆbli,1
1910
+ N
1911
+
1912
+ i=1
1913
+ ˆa†
1914
+ ki,1|0⟩
1915
+ �����
1916
+ 2
1917
+ + sin2α
1918
+ m!n!
1919
+
1920
+ j
1921
+ �����⟨0|
1922
+ N
1923
+
1924
+ i=1
1925
+ ˆbli,ji
1926
+ N−1
1927
+
1928
+ i=1
1929
+ ˆa†
1930
+ ki,1ˆakN,2|0⟩
1931
+ �����
1932
+ 2
1933
+ = cos2α |b⟨n|m⟩a|2 + sin2α
1934
+ m!n!
1935
+
1936
+ j
1937
+ �����⟨0|
1938
+ N
1939
+
1940
+ i=1
1941
+ ˆbli,ji
1942
+ N−1
1943
+
1944
+ i=1
1945
+ ˆa†
1946
+ ki,1
1947
+ � M
1948
+
1949
+ l=1
1950
+ Uklˆb†
1951
+ l,2
1952
+
1953
+ |0⟩
1954
+ �����
1955
+ 2
1956
+ = cos2α |b⟨n|m⟩a|2 + sin2α
1957
+ M
1958
+
1959
+ l=1
1960
+ |Ukl|2 |b⟨n − 1l|m − 1k⟩a|2 .
1961
+ (46)
1962
+ In the previous equation, we have developed suppression laws for the amplitudes b⟨n|m⟩a in the main text. However,
1963
+ in principle, the other terms b⟨n − 1l|m − 1k⟩a are non zero and then we need to use another sequence of recurrence
1964
+ relations to eliminate the photons at n − 1l.
1965
+ Let us focus on the distinguishable projection of the previous equation. The sum over l has M non-zero terms, each
1966
+ one being a product of two probabilities: a probability of the transition of one distinguishable photon to one output
1967
+ mode l (such that nl > 0 in n) multiplied by the probability of detecting the remaining N −1 indistinguishable photons
1968
+ to the reduced output n − 1l. Except the trivial case of the single-photon probability being zero, all probabilities of
1969
+ detecting N − 1 photons in the outputs n − 1l should be zero for zero output probability of such N photons.
1970
+ To illustrate this effect in our results, let us consider the simple example, where have m1 + m2 photons interfer-
1971
+ ing in a beamsplitter and we want to calculate the probability P(n1, 1|m1, m2, α). Considering that the partially
1972
+ distinguishable photon is injected at the input mode k = 1, we arrive at the following probability:
1973
+ P(n1, 1|m1, m2, α) = cos2α|b⟨n|m⟩a|2 +
1974
+ + sin2α
1975
+
1976
+ |U11|2|b⟨n1 − 1, 1|m1 − 1, m2⟩a|2 + |U12|2|b⟨n1, 0|m1 − 1, m2⟩a|2�
1977
+ ,
1978
+ (47)
1979
+ where the first term is zero for τ = m1/(m1 +m2), according to the main text. However, ignoring the trivial solutions
1980
+ τ = 0, 1, the second term is zero when τ = (m1 − 1)/(m1 + m2 − 1) and the last is zero only for trivial solutions.
1981
+ Therefore the suppression law is broken, as the probability P(n1, 1|m1, m2, α) is no longer zero, because the three
1982
+ terms cannot be simultaneously zero for τ ̸= 0, 1.
1983
+ Now, let us consider the interference in the tritter T (1), with phase θ = π/2, and the probability P(n1, 1, 1|n1, 1, 1, α).
1984
+ If the partially distinguishable photon is injected at k = 1, we have
1985
+ P(n1, 1, 1|n1, 1, 1, α) = cos2α|b⟨n|m⟩a|2 + sin2α
1986
+
1987
+ |U11|2|b⟨n1 − 1, 1, 1|n1, 1, 0⟩a|2 +
1988
+ +|U12|2|b⟨n1, 0, 1|n1, 1, 0⟩a|2 + |U13|2|b⟨n1, 1, 0|n1, 1, 0⟩a|2�
1989
+ ,
1990
+ (48)
1991
+ where the first term is zero for τ1 = 3n1/(4n1 + 1), according to the Table I in the main text. The other three need
1992
+ to satisfy respectively the following equations
1993
+ (n1 + 1)
1994
+
1995
+ τ1(1 − τ1) +
1996
+
1997
+ 3(n1 + 1)τ1 −
1998
+
1999
+ 3n1 = 0,
2000
+ (n1 + 1)
2001
+
2002
+ τ1(1 − τ1) −
2003
+
2004
+ 3(n1 + 1)τ1 +
2005
+
2006
+ 3n1 = 0,
2007
+ 4(n1 + 1)τ1
2008
+
2009
+ 1 − τ1 − 3
2010
+
2011
+ 1 − τ1 = 0.
2012
+ (49)
2013
+ where the last lead to τ1 = 1 or τ1 = 3/4(n1 + 1), which are not solutions of the first two equations. Therefore, the
2014
+ probability P(n1, 1, 1|n1, 1, 1, α) cannot be zero.
2015
+ [1] R. A. Campos, Three-photon Hong-Ou-Mandel interference at a multiport mixer, Phys. Rev. A 62, 013809 (2000)
2016
+
2017
+ 9
2018
+ [2] C. Dittel, G. Dufour, M. Walschaers, Totally destructive many-particle interference, Phys. Rev. Lett. 120, 240404 (2018).
2019
+ [3] C. Dittel, G. Dufour, M. Walschaers, G. Weihs, A. Buchleitner, R. Keil, Totally destructive interference for permutation-
2020
+ symmetric many-particle states, Phys. Rev. A 97, 062116 (2018).
2021
+ [4] V. S. Shchesnovich, Partial indistinguishability theory for multiphoton experiments in multiport devices, Phys. Rev. A 91,
2022
+ 013844 (2015).
2023
+ [5] C. K. Hong, Z. Y. Ou, and L. Mandel, Measurement of subpicosecond time intervals between two photons by interference,
2024
+ Phys. Rev. Lett. 59, 2044 (1987).
2025
+ [6] M. C. Tichy, Sampling of partially distinguishable bosons and the relation to the multidimensional permanent, Phys. Rev.
2026
+ A 91, 022316 (2015).
2027
+
DdE0T4oBgHgl3EQfQQD8/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
E9E4T4oBgHgl3EQfGwxn/content/tmp_files/2301.04897v1.pdf.txt ADDED
@@ -0,0 +1,1622 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04897v1 [gr-qc] 12 Jan 2023
2
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE
3
+ SPACETIME
4
+ ABSOS ALI SHAIKH1, FAIZUDDIN AHMED2 AND BISWA RANJAN DATTA3
5
+ Abstract. The objective of the paper is to study the geometric properties of the point-
6
+ like global monopole (briefly, PGM) spacetime, which is a static and spherically symmetric
7
+ solution of Einstein field equation. It is shown that PGM spacetime admits various types of
8
+ pseudosymmetric structures, such as, pseudosymmetry due to Weyl conformal curvature tensor,
9
+ pseudosymmetry due to concircular curvature tensor, pseudosymmetry due to conharmonic
10
+ curvature tensor, Ricci generalized conformal pseudosymmetric due to projective curvature
11
+ tensor, Ricci generalized projective pseudosymmetric etc. Moreover, it is proved that PGM
12
+ spacetime is 2-quasi Einstein, generalized quasi-Einstein, Einstein manifold of degree 2 and
13
+ its Weyl conformal curvature 2-forms are recurrent. It is also shown that the stress energy
14
+ momentum tensor of the PGM spacetime realizes several types of pseudosymmetry, and its Ricci
15
+ tensor is compatible for Riemann curvature, Weyl conformal curvature, projective curvature,
16
+ conharmonic curvature and concircular curvature. Further, it is shown that PGM spacetime
17
+ admits motion, curvature collineation and Ricci collineation. Also, the notion of curvature
18
+ inheritance (resp., curvature collineation) for the (1,3)-type curvature tensor is not equivalent
19
+ to the notion of curvature inheritance (resp., curvature collineation) for the (0,4)-type curvature
20
+ tensor as it is shown that such distinctive properties are possessed by PGM spacetime. Hence
21
+ the notions of curvature inheritance defined by Duggal [1] and Shaikh and Datta [2] are not
22
+ equivalent.
23
+ 1. Introduction
24
+ Let M be a smooth and connected manifold of dimension n (≥ 3) equipped with a semi-
25
+ Riemannian metric g of signature (δ, n−δ), 0 ≤ δ ≤ n. If δ = 1 or n−1 (resp., δ = 0 or n), then
26
+ M is known as a Lorentzian (resp., Riemannian) manifold, and spacetimes are the mathemati-
27
+ cal models of 4-dimensional connected Lorentzian manifolds. Throughout the paper ∇, R, S, κ
28
+ respectively denote the Levi-Civita connection, Riemann curvature tensor of type (0, 4), Ricci
29
+ tensor of type (0, 2) and the scalar curvature of M.
30
+ Date: January 13, 2023.
31
+ 2020 Mathematics Subject Classification. 53B20, 53B25, 53B30, 53B50, 53C15, 53C25, 53C35, 83C15.
32
+ Key words and phrases. Point-like global monopole metric, Einstein field equation, semisymmetric type
33
+ tensor, Weyl conformal curvature tensor, pseudosymmetric type curvature condition, 2-quasi-Einstein manifold.
34
+ 1
35
+
36
+ 2
37
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
38
+ To understand the symmetry of a semi-Riemannian manifold, curvature rigorously perform
39
+ a crucial role as in 1926 Cartan introduced the notion of locally symmetry [3] by the relation
40
+ ∇R = 0 and the notion of semisymmetry [4] by the relation R · R = 0 in 1946 (later classified
41
+ by Szab´o [5–7]). During last eight decades, several differential geometers and physicists debil-
42
+ itated such curvature conditions to generalize the concept of symmetry in various directions,
43
+ which infers different generalized notions of symmetry, such as, pseudosymmetric manifolds
44
+ by Chaki [8, 9], pseudosymmetric manifolds by Adam´ow and Deszcz [10], weakly symmetric
45
+ manifolds by Tam´assy and Binh [11, 12], recurrent manifolds by Ruse [13–16], curvature 2-
46
+ forms of recurrent manifolds [17,18], several kinds of generalized recurrent manifolds by Shaikh
47
+ et al. [19–24] etc. We note that Som-Raychaudhuri spacetime [25], Robertson-Walker space-
48
+ time [26,27], G¨odel spacetime [28], Siklos spacetime [29], Robinson-Trautman spacetime [30] and
49
+ Reissner-Nordstr¨om spacetime [31] admit different pseudosymmetric type geometric structures.
50
+ There are two major aspects of geometric structures of a certain spacetime, one is for geom-
51
+ etry and another is its physical nature due to the Einstein field equation (briefly, EFE). The
52
+ main moto of this paper is to explore the geometric structures of PGM spacetime in terms of
53
+ curvatures appearing by means of first order as well as higher order covariant derivatives.
54
+ Again, to constitute gravitational potentials satisfying EFE, imposing of symmetry is a vital
55
+ tool, which implies that the geometrical symmetries play a crucial role in the theory of general
56
+ relativity. A geometric quantity is preserved along a vector field if the Lie derivative of certain
57
+ tensor vanishes with respect to that vector field, and the vanishing Lie derivative illustrates ge-
58
+ ometrical symmetries. Motion, curvature collineation, Ricci collineation etc. are the notions of
59
+ such symmetries. Katzin et al. [32,33] rigorously investigated the role of curvature collineation
60
+ in general relativity. In 1992, Duggal [1] introduced the notion of curvature inheritance general-
61
+ izing the concept of curvature collineation for the (1,3)-type curvature tensor. Recently, Shaikh
62
+ and Datta [2] introduced the concept of generalized curvature inheritance, which is a general-
63
+ ization of curvature collineation as well as curvature inheritance for the (0,4)-type curvature
64
+ tensor. During last three decades, a plenty of papers (see, [2,34–45]) appeared in the literature
65
+ regarding the investigations of such kinds of symmetries. In this papar, it is also found that
66
+ the PGM spacetime admits several symmetries, such as, motion, curvature collineation, Ricci
67
+ collineation and curvature inheritance. Also, it is shown that the notions of curvature inheri-
68
+ tance as well as curvature collineation for the (1,3)-type curvature tensor by Duggal [1] and for
69
+ the (0,4)-type curvature tensor by Shaikh and Datta [2] are not equivalent as PGM spacetime
70
+
71
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
72
+ 3
73
+ realizes such distinctive properties.
74
+ Some Grand Unified Theories suggested that topological defects may have been produced
75
+ during the phase transition in the early universe through a spontaneous symmetry breaking
76
+ mechanism [46, 47]. There are different kinds of topological defects, and among them, cosmic
77
+ strings [48, 49] and global monopoles [50–53] have been widely studied in the literature. A
78
+ global monopole is a heavy object characterized by spherically symmetry and divergent mass.
79
+ The gravitational field of a static global monopole was found by Barriola et al. [50] and is
80
+ expected to be stable against spherical as well as polar perturbation.
81
+ The line element of PGM spacetime, which is a static and spherically symmetric metric in
82
+ (t, r, , θ, φ) coordinates, is described by [50]
83
+ ds2 = −dt2 + dr2
84
+ α2 + r2 (dθ2 + sin2 θ dφ2),
85
+ (1.1)
86
+ where α2 =
87
+
88
+ 1 − 8πη2
89
+ 0
90
+
91
+ < 1 depends on the energy scale η0. The parameter η0 represents the
92
+ dimensionless volumetric mass density of the PGM defect. Here, the different coordinates are
93
+ in the ranges −∞ < t < +∞,
94
+ 0 ≤ r < ∞,
95
+ 0 ≤ θ ≤ π
96
+ 2, and 0 ≤ φ < 2 π. The PGM spacetime
97
+ reveals some interesting features delineated as follows:
98
+ (i) it is not globally flat, and possesses a naked curvature singularity on the axis given by
99
+ the Ricci scalar κ = 2 (α2−1)
100
+ r2
101
+ ,
102
+ (ii) the area of a sphere of radius r in this manifold is not 4 π r2 but rather it is equal to
103
+ 4 π α2 r2,
104
+ (iii) the surface θ = π
105
+ 2 presents the geometry of a cone with the deficit angle ∇ φ = 8 π2 η2
106
+ 0
107
+ and
108
+ (iv) there is no Newtonian-like gravitational potential: gtt = −1.
109
+ Furthermore, in this topological defect space-time geometry the solid angle of a sphere of
110
+ radius r is 4 π2 r2 α2 which is smaller than 4 π2 r2, and hence, there is a solid angle deficit
111
+ ∇ Ω = 32 π2 η2
112
+ 0. Other interesting features of this PGM spacetime have been given in details
113
+ in [54]. If α → 1, one can obtain the spherically symmetric Minkowski flat space line element.
114
+ The effects of global monopole in quantum mechanical systems have been studied in the liter-
115
+ ature (see, [54–80]).
116
+ The present paper exhibits several curvature properties of PGM spacetime accomplished by
117
+ the metric (1.1), such as, pseudosymmetry due to Weyl conformal curvature, pseudosymme-
118
+ try due to concircular curvature, pseudosymmetry due to conharmonic curvature etc. Also,
119
+
120
+ 4
121
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
122
+ it is neither Einstein nor quasi-Einstein but it is an Einstein manifold of level 2, generalized
123
+ quasi Einstein, 2-quasi-Einstein manifold and conformal curvature 2-forms are recurrent, etc.
124
+ Moreover, it is shown that this metric is Ricci generalized conformal pseudosymmetric due to
125
+ projective curvature tensor, Ricci generalized projective pseudosymmetric etc. Ricci tensor is
126
+ neither Codazzi type nor cyclic parallel. Additionally, it is shown that the energy momentum
127
+ tensor also admits several types of pseudosymmetric structures and Ricci tensor is compatible
128
+ for Riemann, conformal, projective, concircular and conharmonic curvature tensors. Finally, it
129
+ is shown that with respect to certain vector fields the PGM spacetime reveals motion, curvature
130
+ collineation, Ricci collineation and curvature inheritance. Also, by exhibiting some distinctive
131
+ properties of PGM spacetime, it is shown that the notions of curvature inheritance for (1,3)-
132
+ type curvature tensor and the (0,4)-type curvature tensor are not equivalent.
133
+ The paper is organized in the following way: in Section 2 we have discussed various rudi-
134
+ mentary facts regarding various curvature tensors and their derivatives, which are essential
135
+ throughout the paper to investigate the geometric properties of PGM spacetime. Section 3 is
136
+ devoted to the study of several geometric structures of PGM spacetime and several interesting
137
+ findings are obtained. In Section 4, we determine some geometric structures due to energy
138
+ momentum tensor of the spacetime. In Section 5 it is shown that the PGM spacetime admits
139
+ some symmetries, such as, motion, curvature collineation, Ricci collineation and curvature in-
140
+ heritance. Also, the distinctness of the notions of curvature inheritance for (1,3)-type curvature
141
+ tensor and for (0,4)-type curvature tensor, has been exhibited for a PGM spacetime. Finally,
142
+ the last section consists of the conclusion of the paper briefly.
143
+ 2. Preliminaries
144
+ The aim of this section is to explain different kinds of geometric structures originated by
145
+ appointing restrictions on the curvatures and their covariant derivatives, which are effective to
146
+ elaborate the symmetry of the PGM spacetime having certain geometric meanings. Also, the
147
+ notions of motion, curvature inheritance, Ricci inheritance are illustrated in this section.
148
+ For two symmetric second order covariant tensors ν1 and ν2, the Kulkarni-Nomizu product
149
+ ν1 ∧ ν2 is defined by (see, [81–83])
150
+ (ν1 ∧ ν2)(η1, η2, ι1, ι2)
151
+ =
152
+ ν1(η1, ι2)ν2(η2, ι1) + ν1(η2, ι1)ν2(η1, ι2)
153
+
154
+ ν1(η1, ι1)ν2(η2, ι2) − ν1(η2, ι2)ν2(η1, ι1),
155
+
156
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
157
+ 5
158
+ where η1, η2, ι1, ι2 ∈ χ(M), the Lie algebra of all smooth vector fields on M. Now, We define
159
+ some endomorphisms given as follows: (see, [28,31,81,82,84,85])
160
+ (η1 ∧ν η2)ι
161
+ =
162
+ ν(η2, ι)η1 − ν(η1, ι)η2,
163
+ IR(η1, η2)
164
+ =
165
+ [∇η1, ∇η2] − ∇[η1,η2],
166
+ IC(η1, η2)
167
+ =
168
+ IR(η1, η2) −
169
+ 1
170
+ n − 2
171
+ ×
172
+
173
+ E η1 ∧g η2 + η1 ∧g E η2 −
174
+ κ
175
+ n − 1η1 ∧g η2
176
+
177
+ ,
178
+ IK(η1, η2)
179
+ =
180
+ IR(η1, η2) −
181
+ 1
182
+ n − 2 (E η1 ∧g η2 + η1 ∧g E η2) ,
183
+ IW(η1, η2)
184
+ =
185
+ IR(η1, η2) −
186
+ κ
187
+ n(n − 1) η1 ∧g η2,
188
+ IP(η1, η2)
189
+ =
190
+ IR(η1, η2) −
191
+ 1
192
+ n − 1 η1 ∧S η2,
193
+ where ν is a (0,2) type symmetric tensor and E is the Ricci operator defined by S(η1, η2) =
194
+ g(η1, E (η2)).
195
+ Throughout this study we suppose that the smooth vector fields η, η1, η2 · · · ,
196
+ ι, ι1, ι2 · · · ∈ χ(M). Now, corresponding to an endomorphism I(ι1, ι2), a (0, 4)-tensor I can be
197
+ defined as
198
+ I(ι1, ι2, ι3, ι4) = g(I(ι1, ι2)ι3, ι4).
199
+ If the corresponding endomorphism I is replaced by IR (resp., IC, IK, IW and IP), the (0, 4)-
200
+ tensor I turns into the Riemann curvature tensor R (resp., conformal curvature C, conharmonic
201
+ curvature K, concircular curvature W and projective curvature P).
202
+ On a (0, r)-tensor ζ, r ≥ 1, we simulate an endomorphism I(ι1, ι2) to define (0, r + 2)-type
203
+ tensor I · ζ given as follows ( [25,86–89]):
204
+ (I · ζ)(η1, η2, · · · , ηr, ι1, ι2)
205
+ =
206
+ (I(ι1, ι2)ζ)(η1, η2, · · · , ηr)
207
+ =
208
+ −ζ(I(ι1, ι2)η1, η2, · · · , ηr) − · · · − ζ(η1, η2, · · · , I(ι1, ι2)ηr).
209
+ If we take I(ι1, ι2) = ι1 ∧ν ι2, then the (0, r + 2)-type tensor Q(ν, ζ) is known as Tachibana
210
+ tensor defined as ( [89–92])
211
+ Q(ν, ζ)(η1, η2, · · · , ηr, ι1, ι2) = ((ι1 ∧ν ι2)ζ)(η1, η2, · · · , ηr)
212
+ = ν(ι1, ι1)ζ(ι2, η2, · · · , ηr) + · · · + ν(ι1, ιr)ζ(η1, η2, · · · , ι2)
213
+ −ν(ι2, η1)ζ(ι1, η2, · · · , ηr) − · · · − ν(ι2, ηr)ζ(η1, η2, · · · , ι1).
214
+
215
+ 6
216
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
217
+ In terms of the local coordinates, the tensor I · ζ and the Tachibana tensor Q(ν, ζ) can be
218
+ rewritten as
219
+ (I · ζ)b1b2...brαβ
220
+ =
221
+ −guv[Iαβb1vζub2...br + · · · + Iαβblvζb1b2...u],
222
+ Q(ν, ζ)b1b2...brαβ
223
+ =
224
+ νb1βζαb2...br + · · · + νbrβζb1b2...α
225
+
226
+ νb1αζβb2...br − · · · − νbrαζb1b2...β.
227
+ Definition 2.1. [10, 91, 93–99] If the condition I · ζ = fζQ(g, ζ) holds for a smooth scalar
228
+ function fζ on M, i.e., the tensors I · ζ and Q(g, ζ) are linearly dependent on M, then M is
229
+ called a ζ-pseudosymmetric manifold due to the tensor I. Also, if the tensors I · ζ and Q(S, ζ)
230
+ are linearly dependent by the relation I · ζ = �fζQ(S, ζ) with a smooth scalar function �fζ on
231
+ M, then M is called a Ricci generalized ζ-pseudosymmetric manifold due to the tensor I. In
232
+ particular, a ζ-semisymmetric manifold due to the tensor I is defined by the relation I · ζ = 0.
233
+ In the relation I · ζ = fζQ(g, ζ) if I = ζ = R, then M is simply called a pseudosymmetric
234
+ manifold and for I = R and ζ = K (resp., S, P, W and C), it is called conharmonic (resp.,
235
+ Ricci, projective, concircular and conformal) pseudosymmetric manifold.
236
+ Similarly, various
237
+ types of Ricci generalized pseudosymmetric and semisymmetric manifolds can be obtained by
238
+ considering I and ζ as others curvature tensors.
239
+ Again, if the Ricci tensor S is proportional to the metric tensor g on M, i.e., S = κ
240
+ ng, then M is
241
+ said to be an Einstein manifold [17], and the manifold M is called m-quasi-Einstein [85,100–102]
242
+ if the rank of (S−αg) is m for some scalar α, and in this case Ricci tensor locally takes the form
243
+ S = αg +βΓ⊗Γ with some scalars α, β and 1-form Γ. Also if α = 0, then the m-quasi-Einstein
244
+ manifold turns into a Ricci simple manifold.
245
+ We note that Morris-Thorne spacetime [103]
246
+ and G¨odel spacetime [28] are Ricci simple manifolds, Robertson-Walker spacetime [26] and
247
+ Siklos spacetime [29] are quasi-Einstein manifolds, Kantowski-Sachs spacetime [84] and Som-
248
+ Raychaudhuri spacetime [25] are 2-quasi Einstein manifolds and Kaigorodov spacetime [29] is
249
+ an Einstein manifold. For curvature properties of Robinson-Trautman metric, Melvin magnetic
250
+ metric and generalized pp-wave metric, etc., we refer the reader to see [30,104–106].
251
+ Definition 2.2. [107] The manifold M is said to be generalized quasi-Einstein if
252
+ S = αg + βΘ ⊗ Θ + γ(Θ ⊗ Σ + Σ ⊗ Θ)
253
+ holds for some smooth scalar functions α, β, γ and mutually orthogonal 1-forms Θ and Σ.
254
+
255
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
256
+ 7
257
+ In the literature, there are other notions of generalized quasi-Einstein manifolds (see, Shaikh
258
+ [100]). But throughout the paper we will consider the generalized quasi-Einstein manifold by
259
+ Chaki [107] as given in Definition 2.2.
260
+ Definition 2.3. ( [17, 85, 91, 108]) If S2, S3, S4, defined by Sλ+1(ι1, ι2) = Sλ(ι1, E ι2) with
261
+ λ = 1, 2, 3, are linearly dependent by the relation
262
+ ℵ1g + ℵ2S + ℵ3S2 + ℵ4S3 + S4 = 0
263
+ (resp.,
264
+ ℵ5g + ℵ6S + ℵ7S2 + S3 = 0 and ℵ8g + ℵ9S + S2 = 0)
265
+ on M for some scalar functions ℵi (1 ≤ i ≤ 9), then M is called an Ein(4) (resp., Ein(3) and
266
+ Ein(2)) manifold.
267
+ It is noteworthy to mention that Melvin magnetic spacetime [109] and Siklos spacetime [29]
268
+ are Ein(2) manifolds, while Lifshitz spacetime [110] and Som-Raychaudhuri spacetime [25] are
269
+ Ein(3) manifolds.
270
+ Definition 2.4. [25, 85, 89, 111–114] If the Riemann-Christoffel curvature tensor R can be
271
+ expressed as a linear combination of the tensors g ∧g, g ∧S, S ∧S, g ∧S2, S ∧S2 and S2 ∧S2,
272
+ given by
273
+ R = (B1S2 + B2S + B3g) ∧ S2 + (B4S + B5g) ∧ S + B6(g ∧ g)
274
+ (resp.,
275
+ R = (B7S + B8g) ∧ S + B9g ∧ g)
276
+ for some scalars Bi, 1 ≤ i ≤ 9, then M is called a generalized Roter type (resp., Roter
277
+ type [86,114–117]) manifold.
278
+ We mention that Vaidya-Bonner spacetime [106] and Lifshitz spacetime [110] are generalized
279
+ Roter type manifold, and Nariai spacetime [105] and Melvin magnetic spacetime [109] are Roter
280
+ type manifold.
281
+ Definition 2.5. [11,12] A manifold M is called a weakly symmetric in the sense of Tam´assy
282
+ and Binh if the covariant derivative of Riemann curvature tensor R can be expressed in the
283
+ form
284
+ (∇XR)(η1, η2, η3, η4)
285
+ =
286
+ Π(X) ⊗ R(η1, η2, η3, η4) + Φ(η4) ⊗ R(η1, η2, η3, X)
287
+ +
288
+ Φ(η3) ⊗ R(η1, η2, X, η4) + Ψ(η2) ⊗ R(η1, X, η3, η4)
289
+ +
290
+ Ψ(η1) ⊗ R(X, η2, η3, η4),
291
+
292
+ 8
293
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
294
+ where Π, Φ and Ψ are associated 1-forms on M. In particular, if Π = 2Φ = 2Ψ, it is a Chaki
295
+ pseudosymmetric manifold [8,9].
296
+ Definition 2.6. The Ricci tensor of a manifold M is cyclic parallel (see, [118–121]) if
297
+ (∇η1S)(η2, η3) + (∇η2S)(η3, η1) + (∇η3S)(η1, η2) = 0
298
+ holds and Codazzi type if the Ricci tensor realizes the relation (see, [122,123])
299
+ (∇η1S)(η2, η3) = (∇η2S)(η1, η3).
300
+ We note that the Ricci tensor of G¨odel spacetime [28] is cyclic parallel and the Ricci tensor
301
+ of (t − z)-type plane wave metric [104] is of Codazzi type.
302
+ Definition 2.7. ( [87,90,111,124–127])
303
+ Let ζ be a (0, 4)-type tensor on M. Then a symmetric (0,2)-type tensor ν corresponding to
304
+ the endomorphism Iν is said to be ζ-compatible if
305
+ ζ(Iνη1, ι, η2, η3) + ζ(Iνη2, ι, η3, η1) + ζ(Iνη3, ι, η1, η2) = 0,
306
+ holds on M. Again, if ϕ ⊗ ϕ is ζ-compatible for an 1-form ϕ, then ϕ is called a ζ-compatible.
307
+ Replacing ζ by the curvature tensor R (resp., C, W, P and K), the Riemann (resp., confor-
308
+ mal, concircular, projective and conharmonic) compatibility of ν can be obtained.
309
+ Definition 2.8. For a tensor I of type (0, 4), the curvature 2-forms Ωm
310
+ (I)l [128] are called
311
+ recurrent [18,129–131] if
312
+ S
313
+ η1,η2,η3(∇η1I)(η2, η3, ι, η) =
314
+ S
315
+ η1,η2,η3 σ(η1)I(η2, η3, ι, η)
316
+ holds on M, where S is the cyclic sum over η1, η2, η3 and for a (0, 2) tensor field ν, the 1-forms
317
+ ∧(ν)l ( [128]) are called recurrent if (∇η1ν)(η2, ι) − (∇η2ν)(η1, ι) = σ(η1)ν(η2, ι) − σ(η2)ν(η1, ι),
318
+ for some 1-form σ.
319
+ Definition 2.9. ( [25,132,133]) For a (0, 4)-type tensor I if M admits the relation
320
+ S
321
+ η1,η2,η3 σ(η1) ⊗ I(η2, η3, ι, η) = 0,
322
+ where S is the cyclic sum over η1, η2, η3 and L(M) is the vector space of all 1-forms with
323
+ dimension ≥ 1, then M is called I-space by Venzi.
324
+ Now, we give some definitions of geometrical symmetries, such as, motion, curvature collineation,
325
+ curvature inheritance, Ricci collineation and Ricci inheritance, which are originated from the
326
+ Lie derivatives of several tensors.
327
+
328
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
329
+ 9
330
+ Definition 2.10. A manifold M admits motion with respect to some vector field η if £ηg = 0,
331
+ where £η represents the Lie derivative with respect to η.
332
+ In 1969, Katzin et al. [32, 33] defined the notion of curvature collineation by vanishing Lie
333
+ derivative of the Riemann curvature tensor with respect to some vector field. Again, in 1992,
334
+ Duggal [1] generalizes the concept of curvature collineation by introducing the notion of curva-
335
+ ture inheritance.
336
+ Definition 2.11. ( [1]) A manifold M possesses curvature inheritance if there is a vector field
337
+ η which satisfies
338
+ £η �R = λ �R,
339
+ where λ is a scalar function and the (1,3)-type curvature tensor �R is associated with the (0,4)-
340
+ type curvature tensor R by the relation R(ι1, ι2, ι3, ι4) = g( �R(ι1, ι2)ι3, ι4). In particular, if λ = 0,
341
+ i.e., £η �R = 0, then it turns into curvature collineation [32,33].
342
+ Definition 2.12. ( [1]) A manifold M admits Ricci inheritance if it realizes the relation
343
+ £ηS = λS
344
+ for some vector field η and scalar function λ. Further, if λ = 0, it turns into Ricci collineation
345
+ (i.e., £ηS = 0).
346
+ Again, recently Shaikh and Datta [2] introduced the notion of generalized curvature inheri-
347
+ tance, which is defined as follows:
348
+ Definition 2.13. ( [2]) A manifold M admits generalized curvature inheritance if there is a
349
+ vector field η which possesses
350
+ £ηR = λR + λ1g ∧ g + λ2g ∧ S + λ3S ∧ S,
351
+ where λ, λ1, λ2, λ3 are the scalar functions. In particular, if λi = 0 for i = 1, 2, 3, then it M
352
+ admits curvature inheritance. Further, if λ = 0 = λi for i = 1, 2, 3, then it turns into curvature
353
+ collineation.
354
+ In this paper, it is shown that the notions of curvature inheritance in Definition 2.11 and
355
+ Definition 2.13 are not equivalent as shown by PGM spacetime.
356
+
357
+ 10
358
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
359
+ 3. Global monopole spacetime admitting geometric structures
360
+ In static and spherical coordinates (t, r, θ, φ) the line element of PGM spacetime is given by
361
+ (c = ℏ = G)
362
+ ds2 = −dt2 + dr2
363
+ α2 + r2 (dθ2 + sin2 θ dφ2),
364
+ (3.1)
365
+ which can be written as ds2 = gµν dxµ dxν, where g11 = −1, g22 =
366
+ 1
367
+ α2, g33 = r2, g44 = r2 sin2 θ
368
+ and gij = 0, i ̸= j for i, j = 1, 2, 3, 4.
369
+ The non-vanishing components Γγ
370
+ µν of the Christoffel symbols of the second kind are given by
371
+ Γ3
372
+ 23 = 1
373
+ r = Γ4
374
+ 24,
375
+ Γ2
376
+ 33 = −rα2,
377
+ Γ4
378
+ 34 = cot θ,
379
+ Γ2
380
+ 44 = −rα2 sin2 θ,
381
+ Γ3
382
+ 44 = − cos θ sin θ.
383
+ The non-vanishing components (upto symmetry) of Riemann curvature tensor Rµνσλ and the
384
+ Ricci tensor of Sµν are obtained as follows:
385
+ R3434 = −r2(−1 + α2) sin2 θ;
386
+ (3.2)
387
+ S33 = −1 + α2, S44 = (−1 + α2) sin2 θ.
388
+ (3.3)
389
+ The scalar curvature κ is given by κ = 2(−1+α2)
390
+ r2
391
+ .
392
+ This leads to the following:
393
+ Proposition 3.1. The PGM spacetime (3.1) is neither Einstein nor quasi-Einstein manifold
394
+ but
395
+ (i) it is an Einstein manifold of degree 2, i.e., it fulfills the condition S2 = (−1+α2)
396
+ r2
397
+ S,
398
+ (ii) it is 2-quasi Einstein and generalized quasi-Einstein manifold,
399
+ (iii) its Riemann curvature can be decomposed by R =
400
+ r2
401
+ 2(−1+α2)S ∧ S,
402
+ (iv) its Ricci tensor is Riemann compatible, conharmonic compatible, concircular compatible,
403
+ projective compatible and conformal compatible.
404
+ Let V1 = ∇R and V2 = ∇S. Then the non-vanishing components (upto symmetry) of the
405
+ covariant derivatives of the Riemann curvature tensor R and the Ricci tensor S are given by
406
+ V1
407
+ 2334,4 = −r(−1 + α2) sin2 θ = −V1
408
+ 2434,3, V1
409
+ 3434,2 = 2r(−1 + α2) sin2 θ,
410
+ V2
411
+ 23,3 = 1−α2
412
+ r , V2
413
+ 24,4 = −(−1+α2) sin2 θ
414
+ r
415
+ , V2
416
+ 33,2 = 2−2α2
417
+ r
418
+ , V2
419
+ 44,2 = −2(−1+α2) sin2 θ
420
+ r
421
+ .
422
+
423
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
424
+ 11
425
+ The components (upto symmetry) other than zero of the conformal curvature tensor C are
426
+ given below:
427
+ C1212 = −1+α2
428
+ 3r2α2 , C1313 = 1−α2
429
+ 6 , C1414 = −(−1+α2) sin2 θ
430
+ 6
431
+ ,
432
+ C2323 = 1
433
+ 6 −
434
+ 1
435
+ 6α2, C2424 = (−1+α2) sin2 θ
436
+ 6α2
437
+ , C3434 = −r2(−1+α2) sin2 θ
438
+ 3
439
+ .
440
+ The components (upto symmetry) other than zero of the projective curvature tensor P are
441
+ shown as follows:
442
+ P1331 = −1+α2
443
+ 3
444
+ , P1441 = 1
445
+ 3(−1 + α2) sin2 θ, P2442 = −(−1+α2) sin2 θ
446
+ 3α2
447
+ ,
448
+ P2332 = 1
449
+ 3(−1 +
450
+ 1
451
+ α2), P3434 = −2
452
+ 3r2(−1 + α2) sin2 θ = −P3443.
453
+ If V3 = ∇C, then the components other than zero of the covariant derivative of conformal
454
+ curvature tensor C are given by
455
+ V3
456
+ 1212,2 = −2(−1+α2)
457
+ 3r3α2
458
+ , V3
459
+ 1213,3 = −1+α2
460
+ 2r
461
+ , V3
462
+ 1214,4 = (−1+α2) sin2 θ
463
+ 2r
464
+ ,
465
+ V3
466
+ 1313,2 = −1+α2
467
+ 3r
468
+ , V3
469
+ 1414,2 = (−1+α2) sin2 θ
470
+ 3r
471
+ , V3
472
+ 2323,2 = −−1+α2
473
+ 3rα2 , V3
474
+ 2424,2 = −(−1+α2) sin2 θ
475
+ 3rα2
476
+ ,
477
+ V3
478
+ 2334,4 = −r(−1+α2) sin2 θ
479
+ 2
480
+ = −V3
481
+ 2434,3, V3
482
+ 3434,2 = 2r(−1+α2) sin2 θ
483
+ 3
484
+ .
485
+ From the above tensor components, we can state the following:
486
+ Proposition 3.2. The PGM spacetime (3.1) realizes the following:
487
+ (i) its Ricci 1-forms are recurrent, i.e., ∇η1S(η2, η3) − ∇η2S(η1, η3) = ϑ(η1) ⊗ S(η2, η3) −
488
+ ϑ(η2) ⊗ S(η1, η3) for ϑ =
489
+
490
+ 0, −1
491
+ r, 0, 0
492
+
493
+ ,
494
+ (ii) its conformal curvature C is recurrent for the 1-form
495
+
496
+ 0, 1
497
+ r, 0, 0
498
+
499
+ ,
500
+ (iii) it is a R-space by Venzi for {0, 0, 1, 1},
501
+ (iv) it is Chaki pseudosymmetric for the 1-form Π =
502
+
503
+ 0, −1
504
+ r, 0, 0
505
+
506
+ ,
507
+ (v) it is semisymmetric as R · R = 0. Therefore, it is Ricci semisymmetric, conharmonic
508
+ semisymmetric, projective semisymmetric, concircular semisymmetric and conformal
509
+ semisymmetric, and hence it is also pseudosymmetric, Ricci pseudosymmetric, confor-
510
+ mal pseudosymmetic in the sense of Deszcz.
511
+ Let Z1 = C · R, Z2 = C · C, Z3 = P · C, H1 = Q(g, R), H2 = Q(g, C) and H3 = Q(S, C).
512
+ Then the components other than zero of Z1, Z2, Z3, H1, H2 and H3 are computed as follows:
513
+ Z1
514
+ 1434,13 = −(−1+α2)2 sin2 θ
515
+ 6
516
+ = −Z1
517
+ 1334,14, Z1
518
+ 2434,23 = (−1+α2)2 sin2 θ
519
+ 6α2
520
+ = −Z1
521
+ 2334,24;
522
+ Z2
523
+ 1223,13 = −(−1+α2)2
524
+ 12r2α2
525
+ = −Z2
526
+ 1213,23, Z2
527
+ 1434,13 = −(−1+α2)2 sin2 θ
528
+ 12
529
+ = −Z2
530
+ 1334,14,
531
+ Z2
532
+ 1224,14 = −(−1+α2)2 sin2 θ
533
+ 12r2α2
534
+ = −Z2
535
+ 1214,24, Z2
536
+ 2434,23 = (−1+α2)2 sin2 θ
537
+ 12α2
538
+ = −Z2
539
+ 2334,24;
540
+
541
+ 12
542
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
543
+ Z3
544
+ 1223,13 = −(−1+α2)2
545
+ 9r2α2
546
+ = −Z3
547
+ 1213,23, Z3
548
+ 1434,13 = −(−1+α2)2 sin2 θ
549
+ 18
550
+ = −Z3
551
+ 1334,14,
552
+ Z3
553
+ 1224,14 = −(−1+α2)2 sin2 θ
554
+ 9r2α2
555
+ = −Z3
556
+ 1214,24, Z3
557
+ 2434,23 = (−1+α2)2 sin2 θ
558
+ 18α2
559
+ = −Z3
560
+ 2334,24,
561
+ Z3
562
+ 1223,31 = (−1+α2)2
563
+ 9r2α2
564
+ = −Z3
565
+ 1213,32, Z3
566
+ 1434,31 = (−1+α2)2 sin2 θ
567
+ 18
568
+ = −α2Z3
569
+ 2434,32,
570
+ Z3
571
+ 1224,41 = (−1+α2)2 sin2 θ
572
+ 9r2α2
573
+ = −Z3
574
+ 1214,42, Z3
575
+ 1334,41 = −(−1+α2)2 sin2 θ
576
+ 18
577
+ = −α2Z3
578
+ 2334,42;
579
+ H1
580
+ 1434,13 = r2(−1 + α2) sin2 θ = −H1
581
+ 1334,14, H1
582
+ 2434,23 = −r2(−1+α2) sin2 θ
583
+ α2
584
+ = −H1
585
+ 2334,24;
586
+ H2
587
+ 1223,13 = 1
588
+ 2 −
589
+ 1
590
+ 2α2 = −H2
591
+ 1213,23, H2
592
+ 1434,13 = r2(−1+α2) sin2 θ
593
+ 2
594
+ = −H2
595
+ 1334,14,
596
+ H2
597
+ 1224,14 = (−1+α2) sin2 θ
598
+ 2α2
599
+ = −H2
600
+ 1214,24, H2
601
+ 2434,23 = −r2(−1+α2) sin2 θ
602
+ 2α2
603
+ = −H2
604
+ 2334,24;
605
+ H3
606
+ 1223,13 = (−1+α2)2
607
+ 3r2α2
608
+ = −H3
609
+ 1213,23, H3
610
+ 1434,13 = (−1+α2)2 sin2 θ
611
+ 6
612
+ = −H3
613
+ 1334,14,
614
+ H3
615
+ 1224,14 = (−1+α2)2 sin2 θ
616
+ 3r2α2
617
+ = −H3
618
+ 1214,24, H3
619
+ 2434,23 = −(−1+α2)2 sin2 θ
620
+ 6α2
621
+ = −H3
622
+ 2334,24.
623
+ The above calculation of tensors leads to the following:
624
+ Proposition 3.3. The PGM spacetime (3.1) satifies the pseudosymmetric type curvature con-
625
+ ditions
626
+ C · R = −(−1 + α2)
627
+ 6r2
628
+ Q(g, R),
629
+ C · C = −(−1 + α2)
630
+ 6r2
631
+ Q(g, C) and P · C = −1
632
+ 3Q(S, C),
633
+ i.e., it is pseudosymmetric due to conformal curvature tensor, pseudosymmetric Weyl curvature
634
+ tensor and also Ricci generalized conformal peudosymmetric due to projective curvature tensor.
635
+ The components other than zero of the concircular curvature tensor W of PGM spacetime
636
+ are given by
637
+ W1212 = −(−1+α2)
638
+ 6r2α2 , W1313 = −(−1+α2)
639
+ 6
640
+ , W1414 = −(−1+α2) sin2 θ
641
+ 6
642
+ ,
643
+ W2323 = 1
644
+ 6 −
645
+ 1
646
+ 6α2, W2424 = (−1+α2) sin2 θ
647
+ 6α2
648
+ , W3434 = −5r2(−1+α2) sin2 θ
649
+ 6
650
+ .
651
+ If V4 = ∇W, then the components other than zero of the covariant derivative of concircular
652
+ curvature tensor W are given by
653
+ V4
654
+ 1212,2 = −1+α2
655
+ 3r3α2 , V4
656
+ 1313,2 = −1+α2
657
+ 3r
658
+ , V4
659
+ 1414,2 = (−1+α2) sin2 θ
660
+ 3r
661
+ ,
662
+ V4
663
+ 2323,2 = −(−1+α2)
664
+ 3rα2 , V4
665
+ 2334,4 = −r(−1 + α2) sin2 θ = −V4
666
+ 2434,3, V4
667
+ 2424,2 = −(−1+α2) sin2 θ
668
+ 3rα2
669
+ ,
670
+ V4
671
+ 3434,2 = 5(−1+α2)r sin2 θ
672
+ 3
673
+ .
674
+ Let Z4 = W · R, Z5 = P · W, H4 = Q(S, W). Then the components other than zero of the
675
+ tensor Z4, Z5, H4 are given as follows:
676
+ Z4
677
+ 1434,13 = −(−1+α2)2 sin2 θ
678
+ 6
679
+ = −Z4
680
+ 1334,14, Z4
681
+ 2434,23 = (−1+α2)2 sin2 θ
682
+ 6α2
683
+ = −Z4
684
+ 2334,24;
685
+
686
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
687
+ 13
688
+ Z5
689
+ 1223,13 = (−1+α2)2
690
+ 18r2α2
691
+ = Z5
692
+ 1213,32, Z5
693
+ 1434,13 = −(−1+α2)2 sin2 θ
694
+ 18
695
+ = Z5
696
+ 1334,41,
697
+ Z5
698
+ 1224,14 = (−1+α2)2 sin2 θ
699
+ 18r2α2
700
+ = −Z5
701
+ 1214,42, Z5
702
+ 1334,14 = (−1+α2)2 sin2 θ
703
+ 18
704
+ = Z5
705
+ 1434,31,
706
+ Z5
707
+ 1213,23 = −(−1+α2)2
708
+ 18r2α2
709
+ = Z5
710
+ 1223,31, Z5
711
+ 2434,23 = (−1+α2)2 sin2 θ
712
+ 18α2
713
+ = −Z5
714
+ 2334,42,
715
+ Z5
716
+ 1214,24 = −(−1+α2)2 sin2 θ
717
+ 18r2α2
718
+ = Z5
719
+ 1224,41, Z5
720
+ 2334,23 = −(−1+α2)2 sin2 θ
721
+ 18α2
722
+ = Z5
723
+ 2434,32,
724
+ H4
725
+ 1223,13 = −(−1+α2)2
726
+ 6r2α2
727
+ = −H4
728
+ 1213,23, H4
729
+ 1434,13 = (−1+α2)2 sin2 θ
730
+ 6
731
+ = −H4
732
+ 1334,14,
733
+ H4
734
+ 1224,14 = −(−1+α2)2 sin2 θ
735
+ 6r2α2
736
+ = −H4
737
+ 1214,24, H4
738
+ 2434,23 = −(−1+α2)2 sin2 θ
739
+ 6α2
740
+ = −H4
741
+ 2334,24.
742
+ From the above calculation of tensors we can infer the following:
743
+ Proposition 3.4. The PGM spacetime fulfills the curvature conditions
744
+ W · R = −(−1 + α2)
745
+ 6r2
746
+ Q(g, R)
747
+ and
748
+ P · W = −1
749
+ 3Q(S, W)
750
+ i.e., the spacetime is pseudosymmetric due to concircular curvature tensor and also Ricci gen-
751
+ eralized concircular peudosymmetric due to projective curvature tensor.
752
+ The components other than zero of the conharmonic curvature tensor K of PGM spacetime
753
+ are given below:
754
+ K1313 = 1−α2
755
+ 2 , K1414 = −(−1+α2) sin2 θ
756
+ 2
757
+ ,
758
+ K2323 = 1
759
+ 2 −
760
+ 1
761
+ 2α2, K2424 = (−1+α2) sin2 θ
762
+ 2α2
763
+ .
764
+ If V5 = ∇K, then the components other than zero of the covariant derivative of conharmonic
765
+ curvature tensor K are given by
766
+ V5
767
+ 1213,3 = −1+α2
768
+ 2r
769
+ , V5
770
+ 1214,4 = (−1+α2) sin2 θ
771
+ 2r
772
+ = 1
773
+ 2V5
774
+ 1414,2, V5
775
+ 1313,2 = −1+α2
776
+ r
777
+ ,
778
+ V5
779
+ 2323,2 = −
780
+ 1+ 1
781
+ α2
782
+ r
783
+ , V5
784
+ 2334,4 = −1
785
+ 2r(−1 + α2) sin2 θ = −V5
786
+ 2434,3, V5
787
+ 2424,2 = −(−1+α2) sin2 θ
788
+ rα2
789
+ .
790
+ Let Z6 = K · R, Z7 = P · K, Z8 = P · P, H5 = Q(S, K) and H6 = Q(S, P). Then the
791
+ components other than zero of the tensors Z6, Z7, Z8, H5 and H6 are computed as follows:
792
+ Z6
793
+ 1434,13 = −(−1+α2)2 sin2 θ
794
+ 2
795
+ = −Z6
796
+ 1334,14, Z6
797
+ 2434,23 = (−1+α2)2 sin2 θ
798
+ 2α2
799
+ = −Z6
800
+ 2334,24;
801
+ Z7
802
+ 1434,13 = −(−1+α2)2 sin2 θ
803
+ 6
804
+ = −Z7
805
+ 1334,14, Z7
806
+ 2434,23 = (−1+α2)2 sin2 θ
807
+ 6α2
808
+ = −Z7
809
+ 2334,24,
810
+ Z7
811
+ 1434,31 = (−1+α2)2 sin2 θ
812
+ 6
813
+ = −Z7
814
+ 1334,41, Z7
815
+ 2434,32 = −(−1+α2)2 sin2 θ
816
+ 6α2
817
+ = −Z7
818
+ 2334,42;
819
+ Z8
820
+ 1333,13 = (−1+α2)2
821
+ 9
822
+ = −Z8
823
+ 1333,31, Z8
824
+ 1443,13 = (−1+α2)2 sin2 θ
825
+ 9
826
+ = Z8
827
+ 3441,13 = Z8
828
+ 1334,14 = Z8
829
+ 3431,41,
830
+ Z8
831
+ 1444,14 = (−1+α2)2 sin4 θ
832
+ 9
833
+ = −Z8
834
+ 1444,41, Z8
835
+ 3431,14 = −(−1+α2)2 sin2 θ
836
+ 9
837
+ = Z8
838
+ 1443,31 = Z8
839
+ 3441,31 = Z8
840
+ 1334,41,
841
+ Z8
842
+ 2333,23 = −(−1+α2)2
843
+ 9α2
844
+ = −Z8
845
+ 2333,32, Z8
846
+ 2443,23 = −(−1+α2)2 sin2 θ
847
+ 9α2
848
+ = Z8
849
+ 3442,23 = Z8
850
+ 2334,24 = Z8
851
+ 3432,24,
852
+ Z8
853
+ 2444,24 = −(−1+α2)2 sin4 θ
854
+ 9α2
855
+ = −Z8
856
+ 2444,42, Z8
857
+ 3432,24 = (−1+α2)2 sin2 θ
858
+ 9α2
859
+ = Z8
860
+ 2443,32 = Z8
861
+ 3442,32 = Z8
862
+ 2334,42;
863
+ H5
864
+ 1434,13 = (−1+α2)2 sin2 θ
865
+ 2
866
+ = −H5
867
+ 1334,14, H5
868
+ 2434,23 = −(−1+α2)2 sin2 θ
869
+ 2α2
870
+ = −H5
871
+ 2334,24;
872
+
873
+ 14
874
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
875
+ H6
876
+ 1333,13 = −(−1+α2)2
877
+ 3
878
+ , H6
879
+ 1443,13 = −(−1+α2)2 sin2 θ
880
+ 3
881
+ = H6
882
+ 3441,13 = H6
883
+ 1334,14 = −H6
884
+ 3431,14,
885
+ H6
886
+ 1444,14 = −(−1+α2)2 sin4 θ
887
+ 3
888
+ , H6
889
+ 2333,23 = (−1+α2)2
890
+ 3α2
891
+ ,
892
+ H6
893
+ 2443,23 = (−1+α2)2 sin2 θ
894
+ 3α2
895
+ = H6
896
+ 3442,23 = H6
897
+ 2334,24 = −H6
898
+ 3432,24,
899
+ H6
900
+ 2444,24 = (−1+α2)2 sin4 θ
901
+ 3α2
902
+ ;
903
+ The above computation of tensors leads to the following:
904
+ Proposition 3.5. The PGM spacetime (3.1) fulfills the following pseudosymmetric type cur-
905
+ vature conditions:
906
+ K · R = −(−1 + α2)
907
+ 2r2
908
+ Q(g, R),
909
+ P · K = −1
910
+ 3Q(S, K) and
911
+ P · P = −1
912
+ 3Q(S, P),
913
+ i.e., the spacetime is pseudosymmetric due to conharmonic curvature tensor, Ricci generalized
914
+ conharmonic peudosymmetric due to projective curvature tensor and Ricci generalized projective
915
+ pseudosymmetric.
916
+ From the above propositions, we can state that the PGM spacetime (3.1) admits the following
917
+ curvature restricted geometric properties:
918
+ Theorem 3.1. The PGM spacetime (3.1) reveals the following curvature properties:
919
+ (i) it is pseudosymmetric due to conformal curvature tensor as C · R = −(−1+α2)
920
+ 6r2
921
+ Q(g, R).
922
+ Hence C · S = −(−1+α2)
923
+ 6r2
924
+ Q(g, S), C · C = −(−1+α2)
925
+ 6r2
926
+ Q(g, C) (i.e., pseudosymmetric Weyl
927
+ conformal curvature tensor), C · W = −(−1+α2)
928
+ 6r2
929
+ Q(g, W), C · P = −(−1+α2)
930
+ 6r2
931
+ Q(g, P) and
932
+ C · K = −(−1+α2)
933
+ 6r2
934
+ Q(g, K),
935
+ (ii) it realizes pseudosymmetry due to concircular curvature tensor as W·R = −(−1+α2)
936
+ 6r2
937
+ Q(g, R).
938
+ Hence W · S = −(−1+α2)
939
+ 6r2
940
+ Q(g, S), W · C = −(−1+α2)
941
+ 6r2
942
+ Q(g, C), W · W = −(−1+α2)
943
+ 6r2
944
+ Q(g, W),
945
+ W · P = −(−1+α2)
946
+ 6r2
947
+ Q(g, P) and W · K = −(−1+α2)
948
+ 6r2
949
+ Q(g, K),
950
+ (iii) it admits pseudosymmetry due to conharmonic curvature tensor as K·R = −(−1+α2)
951
+ 2r2
952
+ Q(g, R).
953
+ Hence K · S = −(−1+α2)
954
+ 2r2
955
+ Q(g, S), K · C = −(−1+α2)
956
+ 2r2
957
+ Q(g, C), K · W = −(−1+α2)
958
+ 2r2
959
+ Q(g, W),
960
+ K · P = −(−1+α2)
961
+ 2r2
962
+ Q(g, P) and K · K = −(−1+α2)
963
+ 2r2
964
+ Q(g, K),
965
+ (iv) it is Ricci generalized conformal pseudosymmetric due to projective curvature tensor as
966
+ P · C = −1
967
+ 3Q(S, C). Hence P · P = −1
968
+ 3Q(S, P), P · W = −1
969
+ 3Q(S, W) and P · K =
970
+ −1
971
+ 3Q(S, K),
972
+ (v) it is a Venzi space for {0, 0, 1, 1}, hence its curvature 2-forms are recurrent,
973
+ (vi) its conformal curvature 2-forms are recurrent for the 1-form
974
+
975
+ 0, 1
976
+ r, 0, 0
977
+
978
+ ,
979
+ (vii) its Ricci 1-forms are recurrent for the 1-form
980
+
981
+ 0, −1
982
+ r, 0, 0
983
+
984
+ ,
985
+ (viii) it is Chaki pseudosymmetric for the 1-form
986
+
987
+ 0, −1
988
+ r, 0, 0
989
+
990
+ ,
991
+ (ix) it is Chaki pseudo Ricci symmetric for the 1-form
992
+
993
+ 0, −1
994
+ r, 0, 0
995
+
996
+ ,
997
+
998
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
999
+ 15
1000
+ (x) its Riemann curvature can be decomposed as R =
1001
+ r2
1002
+ 2(−1+α2)S ∧ S. Hence, it is an Ein(2)
1003
+ spacetime with S2 = (−1+α2)
1004
+ r2
1005
+ S,
1006
+ (xi) it is a generalized quasi-Einstein manifold for α = 1
1007
+ 2(r2+
1008
+
1009
+ 4 + r4), β = 1
1010
+ 2(r2−
1011
+
1012
+ 4 + r4),
1013
+ γ = 1, Θ=
1014
+
1015
+
1016
+
1017
+ (2+r4+r2√
1018
+ 4+r4)
1019
+
1020
+ 2
1021
+ , 1, 0, 0
1022
+
1023
+ and Σ=
1024
+
1025
+ (r2−
1026
+
1027
+ 4+r4)√
1028
+ (2+r4+r2√
1029
+ 4+r4)
1030
+ 2
1031
+
1032
+ 2
1033
+ , 0, 0, 0
1034
+
1035
+ and
1036
+ (xii) its Ricci tensor is compatible for the curvature R, C, K, W and P.
1037
+ Corollary 3.1. The PGM spacetime is Chaki pseudosymmetric and hence it is weakly symmet-
1038
+ ric in the sense of Tam´assy and Binh for the associated 1-forms Π=
1039
+
1040
+ 0, −2
1041
+ r, 0, 0
1042
+
1043
+ , Ψ=
1044
+
1045
+ 0, −1
1046
+ r, 0, 0
1047
+
1048
+ and Φ=
1049
+
1050
+ 0, −1
1051
+ r, 0, 0
1052
+
1053
+ .
1054
+ Remark 3.1. From the calculation with various tensors, it can be mentioned that the PGM
1055
+ spacetime (3.1) does not admit certain geometric structures, which are described as follows:
1056
+ (i) it is neither recurrent nor recurrent for C, P, W, K,
1057
+ (ii) its Ricci tensor is neither of Codazzi type nor cyclic parallel,
1058
+ (iii) it is not a Venzi space for C, P, W, K,
1059
+ (iv) it is not Ricci generalized pseudosymmetric (i.e., R · R and Q(S, R) are linearly inde-
1060
+ pendent),
1061
+ (v) it is neither Einstein nor quasi-Einstein and
1062
+ (vi) its curvature 2-forms are not recurrent for K, P and W.
1063
+ 4. Energy momentum tensor of PGM spacetime
1064
+ From the EFE the stress energy momentum tensor T of a spacetime is given by
1065
+ T = 1
1066
+ τ
1067
+
1068
+ S −
1069
+ ���
1070
+ 2 − Λ
1071
+
1072
+ g
1073
+
1074
+ ,
1075
+ where τ = 8πG
1076
+ c4 , c is the velocity of light in vacuum, Λ is the cosmological constant and G is
1077
+ the gravitational constant. The only non-vanishing components (upto symmetry) of the energy
1078
+ momentum tensor T are given by
1079
+ T11 = −1+α2
1080
+ 8r2 , T22 = −(−1+α2)
1081
+ 8r2α2 .
1082
+ Hence the non-vanishing components of covariant derivative of the energy momentum tensor
1083
+ T are given by
1084
+ T11,2 = −(−1+α2)
1085
+ 4r3
1086
+ , T22,2 = (−1+α2)
1087
+ 4r3α2 ,
1088
+ T23,3 = −(−1+α2)
1089
+ 8r
1090
+ , T24,4 = −(−1+α2) sin2 θ
1091
+ 8r
1092
+ .
1093
+ Let C · T = C1, W · T = W1, K · T = K1 and Q(g, T) = Q1. Then the components other
1094
+ than zero of the tensor C1, W1, K1 and Q1 are calculated as follows:
1095
+ C1
1096
+ 1313 = (−1+α2)2
1097
+ 48r2
1098
+ =
1099
+ 1
1100
+ sin2 θC1
1101
+ 1414,
1102
+ C1
1103
+ 2323 = −(−1+α2)2
1104
+ 48r2α2
1105
+ =
1106
+ 1
1107
+ sin2 θC1
1108
+ 2424;
1109
+
1110
+ 16
1111
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
1112
+ W1
1113
+ 1313 = (−1+α2)2
1114
+ 48r2
1115
+ =
1116
+ 1
1117
+ sin2 θW1
1118
+ 1414,
1119
+ W1
1120
+ 2323 = −(−1+α2)2
1121
+ 48r2α2
1122
+ =
1123
+ 1
1124
+ sin2 θW1
1125
+ 2424;
1126
+ K1
1127
+ 1313 = (−1+α2)2
1128
+ 16r2
1129
+ =
1130
+ 1
1131
+ sin2 θK1
1132
+ 1414,
1133
+ K1
1134
+ 2323 = −(−1+α2)2
1135
+ 16r2α2
1136
+ =
1137
+ 1
1138
+ sin2 θK1
1139
+ 2424;
1140
+ Q1
1141
+ 1313 = −(−1+α2)
1142
+ 8
1143
+ =
1144
+ 1
1145
+ sin2 θQ1
1146
+ 1414,
1147
+ Q1
1148
+ 2323 = (−1+α2)
1149
+ 8α2
1150
+ =
1151
+ 1
1152
+ sin2 θQ1
1153
+ 2424.
1154
+ From the above calculations we can state the following:
1155
+ Theorem 4.1. The PGM spacetime (3.1) admits certain pseudosymmetric type curvature con-
1156
+ ditions for the energy momentum tensor T given as follows:
1157
+ (i) C ·T = −(−1+α2)
1158
+ 6r2
1159
+ Q(g, T), i.e., the nature of the energy momentum tensor is conformally
1160
+ pseudosymmetric,
1161
+ (ii) W·T = −(−1+α2)
1162
+ 6r2
1163
+ Q(g, T), i.e., the nature of the energy momentum tensor is concircularly
1164
+ pseudosymmetric,
1165
+ (iii) K · T = −(−1+α2)
1166
+ 2r2
1167
+ Q(g, T), i.e., the nature of the energy momentum tensor is conhar-
1168
+ monically pseudosymmetric,
1169
+ (iv) the energy momentum tensor T is compatible for Riemann, projective, conharmonic,
1170
+ conformal and concircular curvature tensors.
1171
+ 5. Curvature inheritance realized by PGM spacetime
1172
+ Let χ(M) be the Lie algebra of all smooth vector fields on an n-dimensional smooth semi-
1173
+ Riemannian manifold M. Then the Lie subalgebra K(M) of all Killing vector fields contains at
1174
+ most n(n+1)/2 linearly independent Killing vector fields. If M is of constant scalar curvature,
1175
+ K(M) consists of exactly n(n+1)/2 linearly independent vector fields. In Section 3 it has been
1176
+ shown that the PGM spacetime possesses non-constant scalar curvature κ given by 2(α2−1)/r2.
1177
+ In this section some Killing vector fields on PGM spacetime are exhibited and it is shown that
1178
+ the PGM spacetime admits curvature collineation, Ricci collineation and curvature inheritance
1179
+ for some non-Killing vector fields.
1180
+ Proposition 5.1. The PGM spacetime admits motion for the vector fields
1181
+
1182
+ ∂t and
1183
+
1184
+ ∂φ, i.e., the
1185
+ vector fields
1186
+
1187
+ ∂t and
1188
+
1189
+ ∂φ on PGM spacetime are Killing (£ ∂
1190
+ ∂tg = 0 and £ ∂
1191
+ ∂φ g = 0).
1192
+ Corollary 5.1. As
1193
+
1194
+ ∂t and
1195
+
1196
+ ∂φ are Killing vector fields, the vector field λ ∂
1197
+ ∂t + µ ∂
1198
+ ∂φ is also Killing
1199
+ for any constants λ and µ, i.e., £λ ∂
1200
+ ∂t +µ ∂
1201
+ ∂φg = 0 for all real numbers λ and µ.
1202
+ In this section we have considered the non-Killing vector fields
1203
+
1204
+ ∂r,
1205
+
1206
+ ∂θ, λ ∂
1207
+ ∂r + µ ∂
1208
+ ∂θ (λ and µ
1209
+ are constants), in the direction of which the Lie derivative of various tensors are computed.
1210
+ The non-zero components of the (1,3)-type curvature tensor �R are given as follows:
1211
+ �R3
1212
+ 434 = (1 − α2) sin2 θ,
1213
+ �R3
1214
+ 334 = −(1 − α2)
1215
+ (5.1)
1216
+
1217
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
1218
+ 17
1219
+ and the non-vanishing components of the (0,4)-type curvature tensor R are given in (3.2). From
1220
+ the components of �R provided in (5.1), we have £ ∂
1221
+ ∂r �R = 0, which leads to the following:
1222
+ Proposition 5.2. The PGM spacetime admits curvature collineation for the non-Killing vector
1223
+ field ξ =
1224
+
1225
+ ∂r as it possesses £ξ �R = 0.
1226
+ Again, Duggal (Theorem 3, [1]) proved that if a manifold admits curvature inheritance, it
1227
+ also realizes Ricci inheritance, and hence the above proposition implies the following:
1228
+ Corollary 5.2. The PGM spacetime realizes Ricci collineation for the non-Killing vector field
1229
+ ξ =
1230
+
1231
+ ∂r, i.e., £ξS = 0.
1232
+ For the non-Killing vector field η =
1233
+
1234
+ ∂θ, the non-vanishing components of £η �R and £ηS, are
1235
+ computed as follows:
1236
+ (£η �R)3
1237
+ 434 = (1 − α2) sin 2θ = −(£η �R)3
1238
+ 443,
1239
+ (5.2)
1240
+ (£ηS)44 = −(1 − α2) sin 2θ.
1241
+ (5.3)
1242
+ From the tensor components in (5.2) and (5.3), we note the following remarks:
1243
+ Remark 5.1. For the non-Killing vector field η =
1244
+
1245
+ ∂θ, there exists no scalar function λ such
1246
+ that the PGM spacetime possesses the relation £η �R = λ �R, i.e., with respect to the non-
1247
+ Killing vector field
1248
+
1249
+ ∂θ the PGM spacetime admits neither curvature collineation nor curvature
1250
+ inheritance (in sense of Definition 2.11) for the (1,3)-type curvature tensor �R.
1251
+ Remark 5.2. For the non-Killing vector field η =
1252
+
1253
+ ∂θ, there exists no scalar function λ such
1254
+ that the PGM spacetime realizes £ηS = ��S, i.e., with respect to the non-Killing vector field
1255
+
1256
+ ∂θ the PGM spacetime possesses neither Ricci collineation nor Ricci inheritance.
1257
+ Now, for the non-Killing vector fields ξ =
1258
+
1259
+ ∂r and η =
1260
+
1261
+ ∂θ, the non-vanishing components of
1262
+ £ξR and £ηR, are calculated as follows:
1263
+ (£ξR)3434 = (£ξR)4343 = −2(α2 − 1)r sin2 θ = −(£ξR)3443 = −(£ξR)4334,
1264
+ (£ηR)3434 = (£ηR)4343 = −(α2 − 1)r2 sin 2θ = −(£ηR)3443 = −(£ηR)4334,
1265
+ This leads to the following:
1266
+ Proposition 5.3. The PGM spacetime admits curvature inheritance (in the sense of Definition
1267
+ 2.13) for the vector fields ξ =
1268
+
1269
+ ∂r and η =
1270
+
1271
+ ∂θ as it realizes the relations
1272
+ £ξR = 2
1273
+ rR
1274
+ and
1275
+ £ηR = 2 cot θ R.
1276
+
1277
+ 18
1278
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
1279
+ If λ and µ are any non-zero constants, the non-zero components of £ξR for the vector field
1280
+ V = λ ∂
1281
+ ∂r + µ ∂
1282
+ ∂θ are given as follows:
1283
+ (£V R)3434 = (£V R)4343 = −2(α2 − 1)r sin θ(µr cos θ + λ sin θ) = −(£V R)3443 = −(£V R)4334.
1284
+ The above components of £λ ∂
1285
+ ∂r +µ ∂
1286
+ ∂θ R lead to the following:
1287
+ Proposition 5.4. For the vector field ξ = λ ∂
1288
+ ∂r + µ ∂
1289
+ ∂θ, the PGM spacetime possesses curvature
1290
+ inheritance (Definition 2.13) in the sense of Shaikh and Datta [2] as it satisfy the relation
1291
+ £ξR = 2(λ + µr cot θ)
1292
+ r
1293
+ R.
1294
+ Incorporating the above propositions and their consequences, we can state the following:
1295
+ Theorem 5.1. The PGM spacetime reveals the following symmetry properties:
1296
+ (i) it admits motion for the vector fields
1297
+
1298
+ ∂t and
1299
+
1300
+ ∂φ,
1301
+ (ii) if λ, µ are any non-zero constants, it possesses motion for the vector field λ ∂
1302
+ ∂t + µ ∂
1303
+ ∂φ,
1304
+ (iii) it admits curvature collineation (in the sense of Definition 2.11) and hence Ricci collineation
1305
+ with respect to the non-Killing vector field
1306
+
1307
+ ∂r, in fact, £ ∂
1308
+ ∂r �R = 0 and £ ∂
1309
+ ∂r S = 0,
1310
+ (iv) it admits curvature inheritance (in the sense of Definition 2.13) for the non-Killing
1311
+ vector fields
1312
+
1313
+ ∂r and
1314
+
1315
+ ∂θ, in fact,
1316
+ £ ∂
1317
+ ∂r R = 2
1318
+ rR
1319
+ and
1320
+ £ ∂
1321
+ ∂θ R = 2 cot θ R,
1322
+ (v) for any non-zero constants λ, µ it realizes curvature inheritance (in the sense of Defini-
1323
+ tion 2.13) for the non-Killing vector field λ ∂
1324
+ ∂r + µ ∂
1325
+ ∂θ, in fact,
1326
+ £λ ∂
1327
+ ∂r +µ ∂
1328
+ ∂θ R = 2(λ + µr cot θ)
1329
+ r
1330
+ R.
1331
+ Remark 5.3. It is interesting to note that the PGM spacetime with respect to the non-Killing
1332
+ vector field
1333
+
1334
+ ∂r, admits curvature collineation for the (1,3)-type curvature tensor �R. But it does
1335
+ not realize curvature collineation for the (0,4)-type curvature tensor R, whereas it possesses
1336
+ curvature inheritance for the (0,4)-type curvature tensor R. Also, we mention that with respect
1337
+ to the non-Killing vector field ∂
1338
+ ∂θ, the PGM spacetime admits curvature inheritance for the (0,4)-
1339
+ type curvature tensor R, but it realizes neither curvature collineation nor curvature inheritance
1340
+ for the (1,3)-type curvature tensor �R. Hence it follows that the notion of curvature inheritance
1341
+ (resp., curvature collineation) for (1,3)-type curvature tensor (Definition 2.11) in the sense of
1342
+ Duggal [1] and the notion of curvature inheritance (resp., curvature collineation) for (0,4)-type
1343
+ curvature tensor (Definition 2.13) in the sense of Shaikh and Datta [2] are not equivalent.
1344
+
1345
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
1346
+ 19
1347
+ 6. Conclusions
1348
+ In this paper, we have investigated various curvature restricted geometric properties of PGM
1349
+ spacetime. It is proved that the spacetime is not Ricci generalized pseudosymmetric, but it
1350
+ admits various type of pseudosymmetric type curvature conditions, such as, pseudosymmetry
1351
+ due to Weyl conformal curvature tensor, pseudosymmetry due to conharmonic curvature tensor,
1352
+ Ricci generalized conformal pseudosymmetry due to projective curvature tensor. Also, it is
1353
+ proved that the spacetime is Einstein manifold of degree 2, generalized quasi-Einstein and
1354
+ 2-quasi Einstein manifold (see, Theorem 3.1).
1355
+ Moreover, the energy momentum tensor of
1356
+ PGM spacetime satisfies several pseudosymmetric type curvature conditions, and both of its
1357
+ Ricci tensor and energy momentum tensor are compatible for Riemann, conformal, projective,
1358
+ conharmonic and concircular curvature (see, Theorem 4.1). Finally, it is shown that the PGM
1359
+ spacetime admits curvature collineation, Ricci collineation for the (1,3)-curvature tensor and
1360
+ curvature inheritance for the (0,4) curvature tensor with respect to certain non-Killing vector
1361
+ fields (see, Theorem 5.1). Also, some non-Killing vector fields are exhibited (see, Remark 5.3),
1362
+ with respect to which it is shown that the notions of curvature inheritance (also, of curvature
1363
+ collineation) for the (1,3)-type curvature tensor by Duggal [1] and for the (0,4)-type curvature
1364
+ tensor by Shaikh and Datta [2] are distinct (see, Remark 5.1 and Remark 5.3).
1365
+ Acknowledgment
1366
+ B. R. Datta is grateful to the Council of Scientific and Industrial Research (CSIR File No.:
1367
+ 09/025(0253)/2018-EMR-I), Govt. of India, for the award of SRF (Senior Research Fellow-
1368
+ ship). All the algebraic computations of Section 3 to 5 are performed by a program in Wolfram
1369
+ Mathematica.
1370
+ References
1371
+ [1] Duggal, K. L., Curvature inheritance symmetry in Riemannian spaces with applications to fluid space times,
1372
+ J. Math. Phys., 33(9) (1992), 2989–2997.
1373
+ [2] Shaikh, A. A. and Datta, B. R., Ricci solitons and curvature inheritance on Robinson-Trautman spacetimes
1374
+ (2022) arXiv preprint arXiv:2209.03749.
1375
+ [3] Cartan, ´E., Sur une classe remarquable d’espaces de Riemannian, Bull. Soc. Math. France, 54 (1926), 214-
1376
+ 264.
1377
+ [4] Cartan, ´E., Le¸cons sur la g´eom´etrie des espaces de Riemann, 2nd ed., Paris, 1946.
1378
+ [5] Szab´o, Z. I., Structure theorems on Riemannian spaces satisfying R(X, Y ) · R = 0, I. The local version, J.
1379
+ Diff. Geom., 17 (1982), 531–582.
1380
+ [6] Szab´o, Z. I., Classification and construction of complete hypersurfaces satisfying R(X, Y )·R = 0, Acta Sci.
1381
+ Math., 47 (1984), 321–348.
1382
+
1383
+ 20
1384
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
1385
+ [7] Szab´o, Z. I., Structure theorems on Riemannian spaces satisfying R(X, Y ) · R = 0, II, The global version,
1386
+ Geom. Dedicata, 19 (1985), 65–108.
1387
+ [8] Chaki, M. C., On pseudosymmetric manifolds, An. S¸tiint¸. Univ. AL. I. Cuza Ia¸si. Mat. (N.S.) Sect. Ia,
1388
+ 33(1) (1987), 53–58.
1389
+ [9] Chaki, M. C., On pseudo Ricci symmetric manifolds, Bulgarian J. Phys., 15 (1988), 526–531.
1390
+ [10] Adam´ow, A. and Deszcz, R., On totally umbilical submanifolds of some class of Riemannian manifolds,
1391
+ Demonstratio Math., 16 (1983), 39–59.
1392
+ [11] T´amassy, L. and Binh, T. Q., On weakly symmetric and weakly projective symmetric Riemannian manifolds,
1393
+ Colloq. Math. Soc. J. Bolyai, 50 (1989), 663–670.
1394
+ [12] Tam´assy, L. and Binh, T. Q., On weak symmetries of Einstein and Sasakian manifolds, Tensor (N. S.), 53
1395
+ (1993), 140–148.
1396
+ [13] Ruse, H. S., On simply harmonic spaces, J. London Math. Soc., 21 (1946), 243–247.
1397
+ [14] Ruse, H. S., On simply harmonic ‘kappa spaces’ of four dimensions, Proc. London Math. Soc., 50 (1949),
1398
+ 317–329.
1399
+ [15] Ruse, H. S., Three dimensional spaces of recurrent curvature, Proc. London Math. Soc., 50 (1949), 438–446.
1400
+ [16] Walker, A. G., On Ruse’s spaces of recurrent curvature, Proc. London Math. Soc., 52 (1950), 36–64.
1401
+ [17] Besse, A. L., Einstein Manifolds, Springer-Verlag, Berlin, Heidelberg, 1987.
1402
+ [18] Lovelock, D. and Rund, H., Tensors, differential forms and variational principles, Courier Dover ublica-
1403
+ tions, 1989.
1404
+ [19] Shaikh, A. A., Al-Solamy, F. R. and Roy, I., On the existence of a new class of semi-Riemannian manifolds,
1405
+ Mathematical Sciences, 7 (2013), 46.
1406
+ [20] Shaikh, A. A. and Patra, A., On a generalized class of recurrent manifolds, Arch. Math. (BRNO), 46
1407
+ (2010), 71–78.
1408
+ [21] Shaikh, A. A. and Roy, I., On quasi generalized recurrent manifolds, Math. Pannon, 21(2) (2010), 251–263.
1409
+ [22] Shaikh, A. A. and Roy, I., On weakly generalized recurrent manifolds, Ann. Univ. Sci. Budapest, E¨otv¨os
1410
+ Sect. Math., 54 (2011), 35–45.
1411
+ [23] Shaikh, A. A., Roy, I. and Kundu, H., On the existence of a generalized class of recurrent manifolds, An.
1412
+ S¸tiint¸. Univ. Al. I. Cuza Ia¸si. Mat. (N. S.), LXIV(2) (2018), 233–251.
1413
+ [24] Shaikh, A. A., Roy, I. and Kundu, H., On some generalized recurrent manifolds, Bull. Iranian Math. Soc.,
1414
+ 43(5) (2017), 1209–1225.
1415
+ [25] Shaikh, A. A. and Kundu, H., On warped product generalized Roter type manifolds, Balkan J. Geom. Appl.,
1416
+ 21(2) (2016), 82–95.
1417
+ [26] Arslan, K., Deszcz, R., Ezenta¸s, R., Hotlo´s, M. and Murathan, C., On generalized Robertson-Walker
1418
+ spacetimes satisfying some curvature condition, Turkish J. Math., 38(2) (2014), 353–373.
1419
+ [27] Deszcz, R. and Kucharski, M., On curvature properties of certain generalized Robertson-Walker spacetimes,
1420
+ Tsukuba J. Math., 23(1) (1999), 113–130.
1421
+ [28] Deszcz, R., Hotlo´s, M., Je�lowicki, J., Kundu, H. and Shaikh, A. A., Curvature properties of G¨odel metric,
1422
+ Int. J. Geom. Methods Mod. Phys., 11 (2014), 1450025. Erratum: Curvature properties of G¨odel metric,
1423
+ Int. J. Geom. Methods Mod. Phys., 16 (2019), 1992002.
1424
+ [29] Shaikh, A. A., Das, L., Kundu, H. and Chakraborty, D., Curvature properties of Siklos metric, Diff. Goem.-
1425
+ Dyn. Syst., 21 (2019), 167–180.
1426
+ [30] Shaikh, A. A., Ali, M. and Ahsan, Z., Curvature properties of Robinson-Trautman metric, J. Geom., 109(2)
1427
+ (2018), 1–20. DOI: 10.1007/s00022-018-0443-1
1428
+
1429
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
1430
+ 21
1431
+ [31] Kowalczyk, D., On the Reissner-Nordstr¨om-de Sitter type spacetimes, Tsukuba J. Math., 30(2) (2006),
1432
+ 363–381.
1433
+ [32] Katzin, G. H., Livine, J. and Davis, W. R., Curvature collineations: A fundamental symmetry property
1434
+ of the space-times of general relativity defined by the vanishing Lie derivative of the Riemann curvature
1435
+ tensor, J. Math. Phys., 10(4) (1969), 617–629.
1436
+ [33] Katzin, G. H., Livine, J. and Davis, W. R., Groups of curvature collineations in Riemannian space-times
1437
+ which admit fields of parallel vectors, J. Math. Phys., 11 (1970), 1578–1580.
1438
+ [34] Ahsan, Z., Algebra of space-matter tensor in general relativity, Indian J. Pure Appl. Math., 8(9) (1977),
1439
+ 1055–1061.
1440
+ [35] Ahsan, Z., On the Nijenhuis tensor for null electromagnetic field, J. Math. Phys. Sci., 21(5) (1987), 515–
1441
+ 526.
1442
+ [36] Ahsan, Z., Symmetries of the Electromagnetic Fields in General Relativity, Acta Phys. Sinica, 4 (1995),
1443
+ 337.
1444
+ [37] Ahsan, Z., A symmetry property of the space-time of general relativity in terms of the space-matter tensor,
1445
+ Braz. J. Phys. 26(3) (1996), 572-576.
1446
+ [38] Ahsan, Z., On a geometrical symmetry of the space-time of General Relativity, Bull. Call. Math. Soc.,
1447
+ 97(3) (2005), 191.
1448
+ [39] Ahsan, Z. and Ali, M., On some properties of W-curvature tensor, Palestine J. Math., 3(1) (2014), 61–69.
1449
+ [40] Ahsan, Z. and Ali, M., Symmetries of Type D Pure Radiation Fields, Int. J. Theo. Phys., 51 (2012),
1450
+ 2044-2055.
1451
+ [41] Ahsan, Z. and Husain, S. I., Null electromagnetic fields, total gravitational radiation and collineations in
1452
+ general relativity, Annali di Mathematical Pura ed Applicata, 126 (1980), 379396.
1453
+ [42] Ali, M. and Ahsan Z., Ricci Solitons and Symmetries of Spacetime Manifold of General Relativity Global
1454
+ J. Adv. Research Classical Mod. Geom., 1(2) (2012), 75–84.
1455
+ [43] Shaikh, A. A., Ali, M., Salman, M. and Zengin, F. O., Curvature inheritance symmetry on M-projectively
1456
+ flat spacetimes, Int. J. Geom. Methods Mod. Phys., (accepted).
1457
+ [44] Ahsan, Z., Collineation in electromagnetic field in general relativity- The null field case, Tamkang J. Maths.,
1458
+ 9(2) (1978), 237.
1459
+ [45] Ahsan, Z., Algebraic classification of space-matter tensor in general relativity, Indian J. Pure Appl. Math.,
1460
+ 8(2) (1977), 231–237
1461
+ [46] T. W. B. Kibble, Phys. Rep. 67, 183 (1980).
1462
+ [47] A. Vilenkin, Phys. Rep. 121, 263 (1985).
1463
+ [48] W. A. Hiscock, Phys. Rev. D 31, 3288 (1985).
1464
+ [49] S. Zare, H. Hassanabadi and M. de Montigny, Gen. Relativ. Grav. 52, 25 (2020).
1465
+ [50] M. Barriola and A. Vilenkin, Phys. Rev. Lett. 63, 341 (1989).
1466
+ [51] D. P. Bennett and S. H. Rhie, Phys. Rev. Lett. 65, 1709 (1990).
1467
+ [52] T. R. P. Carames, J. C. Fabris, E. R. Bezzera de Mello and H. Belich, Eur. Phys. J. C 77, 496 (2017).
1468
+ [53] E. R. Bezerra de Mello and C. Furtado, Phys. Rev. D 56, 1345 (1997).
1469
+ [54] E. R. Bezerra de Mello, Braz. J. Phys. 31, 211 (2001).
1470
+ [55] C. Furtado and F. Moraes, J. Phys. A: Math. Gen. 33, 5513 (2000).
1471
+ [56] A. L. C. de Oliveira and E. R. B. de Mello, Int. J. Mod. Phys. A 18, 3175 (2003).
1472
+ [57] E. R. B. de Mello and C. Furtado, Phys. Rev. D 56, 1345 (1997).
1473
+ [58] A. L. Cavalcanti de Oliveira and E. R. B. de Mello, Int. J. Mod. Phys. A 18, 2051 (2003).
1474
+
1475
+ 22
1476
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
1477
+ [59] A. Boumali and H. Aounallah, Adv. High Energy Phys. 2018, 1031763 (2018).
1478
+ [60] E. A. F. Braganca, R. L. L. Vit´oria, H. Belich and E. R. Bezerra de Mello, Eur. Phys. J. C 80, 206 (2020).
1479
+ [61] M. de Montigny, H. Hassanabadi, J. Pinfold and S. Zare, Eur. Phys. J. Plus 136, 788 (2021).
1480
+ [62] M. de Montigny, J. Pinfold, S. Zare and H. Hassanabadi, Eur. Phys. J. Plus 137, 54 (2022).
1481
+ [63] E. R. Bezerra de Mello, A. A. Saharian, Class. Quantum Grav. 29, 135007 (2012).
1482
+ [64] E. R. Bezerra de Mello and A. A. Saharian, Class. Quantum Grav. 24, 2389 (2007).
1483
+ [65] D. Barbosa, U. de Freitas and E. R. Bezerra de Mello, Class. Quantum Grav. 28, 065009 (2011).
1484
+ [66] F. C. Carvalho and E. R. Bezerra de Mello, Class. Quantum Grav. 18, 1637 (2001).
1485
+ [67] F. C. Carvalho and E. R. B. de Mello, Class. Quantum Grav. 18, 5455 (2001).
1486
+ [68] E. R. B. de Mello, Class. Quantum Grav. 19, 5141 (2002).
1487
+ [69] A. L. Cavalcanti de Oliveira and E R Bezerra de Mello, Class. Quantum Grav. 23, 5249 (2006).
1488
+ [70] K. Jusufi, M. C. Werner, A. Banerjee and A. ¨Ovg¨un, Phys. Rev. D 95, 104012 (2017).
1489
+ [71] T. Ono, A. Ishihara H. Asada, Phys. Rev. D 99, 124030 (2019).
1490
+ [72] J. Morris, Phys. Rev. D 49, 1105 (1994).
1491
+ [73] F. Ahmed, Sci. Rep. 12, 8794 (2021).
1492
+ [74] R. L. L. Vitoria and H. Belich, Phys. Scr. 94, 125301 (2019).
1493
+ [75] Geusa de A. Marques and Valdir B. Bezerra, Class. Quantum Gravit. 19, 985 (2002).
1494
+ [76] P. Nwabuzor, C. Edet, A. N. Ikot, U. Okorie, M. Ramantswana, R. Horchani, A. H. A.-Aty, G. Rampho,
1495
+ Entropy 23 (8), 1060 (2021).
1496
+ [77] F. Ahmed, Phys. Scr. 98, 015403 (2023).
1497
+ [78] F. Ahmed, Mol. Phys. 120, 2124935 (2022).
1498
+ [79] F. Ahmed, arXiv:2209.13490[quant-ph].
1499
+ [80] F. Ahmed, arXiv:2210.04617[hep-th].
1500
+ [81] Deszcz, R., G�logowska, M., Hotlo´s, M. and Sawicz, K., A Survey on Generalized Einstein Metric Conditions,
1501
+ Advances in Lorentzian Geometry, Proceedings of the Lorentzian Geometry Conference in Berlin, AMS/IP
1502
+ Studies in Advanced Mathematics, 49, S.-T. Yau (series ed.), M. Plaue, A.D. Rendall and M. Scherfner
1503
+ (eds.), 2011, 27-46.
1504
+ [82] G�logowska, M., Semi-Riemannian manifolds whose Weyl tensor is a Kulkarni-Nomizu square, Publ. Inst.
1505
+ Math. (Beograd) (N.S.), 72(86) (2002), 95–106.
1506
+ [83] Shaikh, A. A., Kundu, H. and Ali, Md. S., On warped product super generalized recurrent manifolds, An.
1507
+ S¸tiint¸. Univ. Al. I. Cuza Ia¸si. Mat. (N. S.), LXIV(1) (2018), 85–99.
1508
+ [84] Shaikh, A. A. and Chakraborty, D., Curvature properties of Kantowski-Sachs metric, J. Geom. Phys., 160
1509
+ (2021), 103970. DOI: 10.1016/j.geomphys.2020.103970
1510
+ [85] Shaikh, A. A. and Kundu, H, On generalized Roter type manifolds, Kragujevac J. Math., 43(3) (2019),
1511
+ 471–493.
1512
+ [86] Deszcz, R. and G�logowska, M., Some examples of nonsemisymmetric Ricci-semisymmetric hypersurfaces,
1513
+ Colloq. Math., 94 (2002), 87–101.
1514
+ [87] Deszcz, R., G�logowska, M., Hotlo´s, M. and S.ent¨urk, Z., On certain quasi-Einstein semi-symmetric hyper-
1515
+ surfaces, Ann. Univ. Sci. Budapest E¨otv¨os Sect. Math., 41 (1998), 151–164.
1516
+ [88] Deszcz, R. and Hotlo´s, M., On hypersurfaces with type number two in spaces of constant curvature, Ann.
1517
+ Univ. Sci. Budapest E¨otv¨os Sect. Math., 46 (2003), 19–34.
1518
+ [89] Shaikh, A. A., Deszcz, R., Hotlo´s, M., Je�lowicki, J. and Kundu, H., On pseudosymmetric manifolds, Publ.
1519
+ Math. Debrecen, 86(3-4) (2015), 433-456.
1520
+
1521
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
1522
+ 23
1523
+ [90] Deszcz, R., G�logowska, M., Plaue, M., Sawicz, K. and Scherfner, M., On hypersurfaces in space forms
1524
+ satisfying particular curvature conditions of Tachibana type, Kragujevac J. Math., 35 (2011), 223–247.
1525
+ [91] Shaikh, A. A. and Kundu, H., On equivalency of various geometric structures, J. Geom., 105 (2014),
1526
+ 139–165. DOI: 10.1007/s00022-013-0200-4
1527
+ [92] Tachibana, S., A Theorem on Riemannian manifolds of positive curvature operator, Proc. Japan Acad., 50
1528
+ (1974), 301–302.
1529
+ [93] Deszcz, R., On pseudosymmetric spaces, Bull. Belg. Math. Soc., Ser. A, 44 (1992), 1–34.
1530
+ [94] Deszcz, R., Curvature properties of a pseudosymmetric manifolds, Colloq. Math., 62 (1993), 139–147.
1531
+ [95] Deszcz, R., Glogowska, M., Hotlo´s, M. and Sawicz, K., Hypersurfaces in space forms satisfying a particular
1532
+ roter type equation, https://doi.org/10.48550/arXiv.2211.06700
1533
+ [96] Deszcz, R., G�logowska, M., Hotlo´s, M. and Zafindratafa, G., On some curvature conditions of pseudosym-
1534
+ metric type, Period. Math. Hungarica, 70(2) (2015), 153–170.
1535
+ [97] Deszcz, R., G�logowska, M., Hotlo´s, M., Zafindratafa, G., Hypersurfaces in space forms satisfying some
1536
+ curvature conditions, J. Geom. Phys., 99 (2016), 218–231.
1537
+ [98] Shaikh, A. A. and Kundu, H., On some curvature restricted geometric structures for projective curvature
1538
+ tensor, Int. J. Geom. Methods Mod. Phys., 15 (2018), 1850157.
1539
+ [99] Shaikh, A. A. and Kundu, H., On warped product manifolds satisfying some pseudosymmetric type condi-
1540
+ tions, Diff. Geom. - Dyn. Syst., 19 (2017), 119–135.
1541
+ [100] Shaikh, A. A., On pseudo quasi-Einstein manifolds, Period. Math. Hungarica, 59(2) (2009), 119–146.
1542
+ [101] Shaikh, A. A., Kim, Y. H. and Hui, S. K., On Lorentzian quasi Einstein manifolds, J. Korean Math.
1543
+ Soc., 48 (2011), 669–689. Erratum: On Lorentzian quasi Einstein manifolds, J. Korean Math. Soc., 48(6)
1544
+ (2011), 1327–1328.
1545
+ [102] Shaikh, A. A., Yoon, D. W. and Hui, S. K.,
1546
+ On quasi-Einstein spacetimes, Tsukuba J. Math., 33(2)
1547
+ (2009), 305–326.
1548
+ [103] Eyasmin, S., Chakraborty, D. and Sarkar, M., Curvature properties of Morris-Thorne Wormhole metric,
1549
+ J. Geom. Phys., 174(2) (2022), 104457.
1550
+ [104] Eyasmin, S. and Chakraborty, D., Curvature properties of (t-z)-type plane wave metric, J. Geom. Phys.,
1551
+ 160 (2021), 104004.
1552
+ [105] Shaikh, A. A., Ali, A., Alkhaldi, A. H. and Chakraborty, D., Curvature properties of Nariai spacetimes,
1553
+ Int. J. Geom. Methods Mod. Phys., 17(03) (2020), 2050034. DOI: 10.1142/S0219887820500346
1554
+ [106] Shaikh, A. A., Datta, B. R. and Chakraborty, D., On some curvature properties of Vaidya-Bonner metric,
1555
+ Int. J. Geom. Methods. Phys., https://doi.org/10.1142/S0219887821502054.
1556
+ [107] Chaki, M. C., On generalized quasi-Einstein manifolds, Publ. Math. Debrecen, 58 (2001), 683–691.
1557
+ [108] Shaikh, A. A. and Kundu, H., On curvature properties of Som-Raychaudhuri spacetime, J. Geom., 108(2)
1558
+ (2016), 501–515.
1559
+ [109] Shaikh, A. A., Ali, A., Alkhaldi, A. H. and Chakraborty, D., Curvature properties of Melvin magnetic
1560
+ metric, J. Geom. Phys., 150 (2020), 103593. DOI: 10.1016/j.geomphys.2019.103593.
1561
+ [110] Shaikh, A. A., Srivastava, S. K. and Chakraborty, D., Curvature properties of anisotropic scale invariant
1562
+ metrics, Int. J. Geom. Meth. Mod. Phys., 16 (2019), 1950086.
1563
+ [111] Deszcz, R., G�logowska, M., Je�lowicki, L., Petrovi´c-Torga˘sev, M. and Zafindratafa, G., On Riemann and
1564
+ Weyl compatible tensors, Publ. Inst. Math. (Beograd) (N.S.), 94(108) (2013), 111–124.
1565
+ [112] Deszcz, R., G�logowska, M., Je�lowicki, J. and Zafindratafa, Z., Curvature properties of some class of warped
1566
+ product manifolds, Int. J. Geom. Methods Mod. Phys., 13 (2016), 1550135.
1567
+
1568
+ 24
1569
+ A. A. SHAIKH, F. AHMED & B. R. DATTA
1570
+ [113] Deszcz, R., G�logowska, M., Petrovi´c-Torga˘sev, M. and Verstraelen, L., Curvature properties of some class
1571
+ of minimal hypersurfaces in Euclidean spaces, Filomat, 29 (2015), 479–492.
1572
+ [114] Deszcz, R., On Roter type manifolds, 5-th Conference on Geometry and Topology of Manifolds, April 27
1573
+ - May 3, 2003, Krynica, Poland.
1574
+ [115] Deszcz, R., Plaue, M. and Scherfner, M., On Roter type warped products with 1-dimensional fibres, J.
1575
+ Geom. Phys., 69 (2013), 1–11.
1576
+ [116] G�logowska, M., On Roter type manifolds, Pure and Applied Differential Geometry- PADGE, (2007),
1577
+ 114–122.
1578
+ [117] Deszcz, R., G�logowska, M., Petrovi´c-Torga˘sev, M. and Verstraelen, L., On the Roter type of Chen ideal
1579
+ submanifolds, Results Math., 59 (2011), 401–413.
1580
+ [118] Shaikh, A. A. and Binh, T. Q., On some class of Riemannian manifolds, Bull. Transilv. Univ., 15(50)
1581
+ (2008), 351–362.
1582
+ [119] Shaikh, A. A. and Jana, S. K., On weakly cyclic Ricci symmetric manifolds, Ann. Pol. Math., 89(3)
1583
+ (2006), 139–146.
1584
+ [120] Shaikh, A. A. and Jana, S. K., On quasi-conformally flat weakly Ricci symmetric manifolds, Acta Math.
1585
+ Hungar., 115(3) (2007), 197–214.
1586
+ [121] Gray, A., Einstein-like manifolds which are not Einstein, Geom. Dedicata, 7 (1978), 259–280.
1587
+ [122] Simon, U., Codazzi tensors, Glob. Diff. Geom. and Glob. Ann., Lecture notes, 838, Springer-Verlag, 1981,
1588
+ 289–296.
1589
+ [123] Ferus, D., A remark on Codazzi tensors on constant curvature space, Glob. Diff. Geom. Glob. Ann.,
1590
+ Lecture notes 838, Springer, 1981.
1591
+ [124] Mantica, C. A. and Molinari, L. G., Extended Derdzinski-Shen theorem for curvature tensors, Colloq.
1592
+ Math., 128 (2012), 1–6.
1593
+ [125] Mantica, C. A. and Molinari, L. G., Weyl compatible tensors, Int. J. Geom. Methods Mod. Phys., 11(08)
1594
+ (2014), 1450070.
1595
+ [126] Defever, F. and Deszcz, R., On semi-Riemannian manifolds satisfying the condition R · R = Q(S, R),
1596
+ in:Geometry and Topology of Submanifolds III, World Sci., River Edge, NJ, (1991), 108-130.
1597
+ [127] Mantica, C. A. and Molinari, L. G., Riemann compatible tensors, Colloq. Math., 128 (2012), 197–210.
1598
+ [128] Suh, Y. J., Kwon, J-H. and Pyo, Y. S., On semi-Riemannian manifolds satisfying the second Bianchi
1599
+ identity, J. Korean Math. Soc., 40(1) (2003), 129–167.
1600
+ [129] Mantica, C. A. and Suh, Y. J., The closedness of some generalized curvature 2-forms on a Riemannian
1601
+ manifold I, Publ. Math. Debrecen, 81(3-4) (2012), 313–326.
1602
+ [130] Mantica, C. A. and Suh, Y. J., The closedness of some generalized curvature 2-forms on a Riemannian
1603
+ manifold II, Publ. Math. Debrecen, 82(1) (2013), 163–182.
1604
+ [131] Mantica, C. A. and Suh, Y. J., Recurrent conformal 2-forms on pseudo-Riemannian manifolds, Int. J.
1605
+ Geom. Methods Mod. Phy., 11(6) (2014), 1450056 (29 pages).
1606
+ [132] Prvanovi´c, M., On weakly symmetric Riemannian manifolds, Publ. Math. Debrecen, 46(1-2) (1995),
1607
+ 19–25.
1608
+ [133] Venzi, P., Una generalizzazione degli spazi ricorrenti, Rev. Roumaine Math. Pures Appl., 30 (1985),
1609
+ 295–305.
1610
+
1611
+ GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
1612
+ 25
1613
+ 1,3 Department of Mathematics,
1614
+ University of Burdwan, Golapbag,
1615
+ Burdwan-713104, West Bengal, India
1616
1617
+ Email address: [email protected]
1618
+ 2 Department of Physics,
1619
+ University of Science & Technology Meghalaya,
1620
+ Ri-Bhoi, Meghalaya-793101, India,
1621
1622
+
E9E4T4oBgHgl3EQfGwxn/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
EtAzT4oBgHgl3EQfUPx6/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:254aca6501f60b4e66d9ba6d7dfa5fde2fb68404c8cd5a05722f7bebea2e57ac
3
+ size 180977
FNAyT4oBgHgl3EQf4_q8/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7be12527da67621f06f40aa9d7877bccfa82f633d214163eb77e2336915c556a
3
+ size 205798
HNAzT4oBgHgl3EQfxf6-/content/tmp_files/2301.01740v1.pdf.txt ADDED
@@ -0,0 +1,3023 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Ground state of superheavy elements with 120 ≤ Z ≤ 170: systematic study of the
2
+ electron-correlation, Breit, and QED effects
3
+ I. M. Savelyev,1 M. Y. Kaygorodov,1 Y. S. Kozhedub,1 A. V. Malyshev,1 I. I. Tupitsyn,1 and V. M. Shabaev1, 2
4
+ 1Department of Physics, St.
5
+ Petersburg State University,
6
+ 7/9 Universitetskaya nab., 199034 St.
7
+ Petersburg, Russia
8
+ 2National Research Centre “Kurchatov Institute” B.P. Konstantinov Petersburg
9
+ Nuclear Physics Institute, Gatchina, Leningrad district 188300, Russia
10
+ (Dated: January 5, 2023)
11
+ For superheavy elements with atomic numbers 120 ≤ Z ≤ 170, the concept of the ground-state
12
+ configuration is being reexamined. To this end, relativistic calculations of the electronic structure
13
+ of the low-lying levels are carried out by means of the Dirac-Fock and configuration-interaction
14
+ methods. The magnetic and retardation parts of the Breit interaction as well as the QED effects are
15
+ taken into account. The influence of the relativistic, QED, and electron-electron correlation effects
16
+ on the determination of the ground-state is analyzed.
17
+ I.
18
+ INTRODUCTION
19
+ Mendeleev’s Periodic Table is an empirically sup-
20
+ ported scheme which allows one to categorize the phys-
21
+ ical and chemical properties of the elements by linking
22
+ them with the rule of the successive occupation of the
23
+ atomic orbitals. With increasing the atomic number Z,
24
+ relativistic effects grow substantially. They can signifi-
25
+ cantly alter various properties of the elements as com-
26
+ pared with their lighter homologues. A classical example
27
+ of the relativistic effects is the yellow color of gold [1–3].
28
+ In the region of the superheavy elements (SHEs) belong-
29
+ ing to the 7th period of the Table, the interplay between
30
+ the relativistic and electron-electron correlation effects
31
+ gives rise to the trends of deviation from the periodic
32
+ law [4–8]. Some of these deviations, such as a different
33
+ ground-state configuration of Lr (Z = 103) relative to
34
+ its lighter homologue Lu (Z = 71), are confirmed exper-
35
+ imentally [9], the others, like a positive electron affinity
36
+ in Og (Z = 118), are predicted only theoretically [10–
37
+ 14]. Whether the 8th-period SHEs (with Z > 118) fit
38
+ the Periodic Table and obey the periodic law is an open
39
+ intriguing question. For instance, this period brings into
40
+ play the previously-never-met 5g shell, and the corre-
41
+ sponding electronic-structure feature no doubt must be
42
+ presented in possible extensions of the Periodic Table. In
43
+ addition, the influence of the quantum-electrodynamics
44
+ (QED) effects on the SHE ground states has not been
45
+ investigated systematically so far.
46
+ A review of the current status of the problem and
47
+ an extension of the Periodic Table up to Z = 172 based
48
+ on the Dirac-Fock (DF) calculations, also known as the
49
+ relativistic Hartree-Fock ones, are presented in Ref. [15],
50
+ see also a very recent review [16]. This upper bound is
51
+ determined by the fact that at higher values of Z the
52
+ lowest (1s) Dirac level “dives” into the negative-energy
53
+ continuum, provided a reasonable model for the nuclear
54
+ charge distribution is employed [17–28].
55
+ The key point for the description of the SHE prop-
56
+ erties is determination of the ground-state configuration.
57
+ The first attempts to advance the study of the SHEs be-
58
+ yond the 7th period and to conjecture on their chemical
59
+ and physical properties were undertaken in the 1970s [29–
60
+ 34]. Throughout the years, the issue was addressed by
61
+ using various one-configuration methods [35, 36]. It soon
62
+ became clear that in many cases the total energies of var-
63
+ ious configurations differ very little from each other, and
64
+ more sophisticated configuration-interaction calculations
65
+ are necessary. Taking into account the correlation effects
66
+ may lead to a change in the ground-state configuration.
67
+ Some SHEs from the 8th period were studied within
68
+ the many-configuration approaches [37–46]. The only pa-
69
+ per that went beyond the one-configuration approxima-
70
+ tion for all the 8th period elements is Ref. [47].
71
+ The
72
+ multiconfiguration Dirac–Fock method was used there to
73
+ account for the interaction between energetically close
74
+ configurations in the SHEs with Z ≤ 164. As a result, in
75
+ about 50% of cases the ground-state configurations found
76
+ in Ref. [47] differ from the ones obtained in the previous
77
+ Dirac-Fock-Slater calculations [34], where no electron-
78
+ electron correlation effects were considered. In Ref. [47],
79
+ only the ground-state configurations were reported with-
80
+ out any information on the level structure. The stability
81
+ of the obtained results with respect to the accuracy of
82
+ the correlation treatment was not discussed in that work
83
+ as well.
84
+ There are also some other issues that need to be clar-
85
+ ified when discussing the SHE ground states. Does the
86
+ one-configuration description remain valid for so com-
87
+ plex systems possessing quite a large number of valence
88
+ shells with, in particular, the 5g one among them? In
89
+ other words, it seems reasonable that the ground-state
90
+ arXiv:2301.01740v1 [physics.atom-ph] 4 Jan 2023
91
+
92
+ 2
93
+ level of the SHEs generally can not be found without
94
+ taking into account the electron-correlation effects, but
95
+ is it possible, in principle, to describe with a sufficient
96
+ accuracy this state using a single configuration?
97
+ Can
98
+ previously unaccounted QED effects change the ground
99
+ state of the SHEs? The present paper aims to investigate
100
+ these points in the framework of the relativistic Dirac-
101
+ Fock method and the configuration-interaction method in
102
+ the basis of the Dirac-Fock-Sturm orbitals [48–50]. In our
103
+ calculations, in order to investigate a possible influence
104
+ of the QED effects on the electronic structure and the
105
+ ground-state configuration, both the methods are paired
106
+ with the model-QED-operator approach [51, 52] which
107
+ has been recently extended to the region 120 ≤ Z ≤ 170
108
+ in Ref. [53].
109
+ The paper is organized as follows.
110
+ In Sec. II, an
111
+ overview of the methods and their main implementation
112
+ features are presented.
113
+ The numerical details and the
114
+ particular aspects of the calculation procedure are given
115
+ in Sec. III. We discuss the obtained results and compare
116
+ them with the previous calculations in Sec. IV. Sec. V
117
+ concludes the paper with a brief summary.
118
+ The atomic units are used throughout the paper.
119
+ II.
120
+ THEORETICAL APPROACHES AND
121
+ METHODS
122
+ In the present work, to explore the SHE ground
123
+ states we use the Dirac-Fock (DF) and configuration-
124
+ interaction (CI) methods. The issue is studied from the
125
+ different perspectives using the one- as well as the many-
126
+ configuration approaches.
127
+ We consider a relativistic configuration K defined
128
+ by the occupation numbers {qa}Ns
129
+ a=1, where the index a
130
+ enumerates the relativistic shells. For the list of the rela-
131
+ tivistic shells (n1l1j1)q1 . . . (nNslNsjNs)qNs (n is the prin-
132
+ cipal quantum number, l and j are the orbital and total
133
+ angular momenta, respectively), we first determine the
134
+ DF energy obtained within the relativistic-configuration-
135
+ average (RAV) approximation, also known in the litera-
136
+ ture as the jj-average one [54]. The corresponding total
137
+ DF energy can be formally written as
138
+ EDF
139
+ RAV(K) = 1
140
+ Nd
141
+
142
+ α∈K
143
+ ⟨α| ˆHDC|α⟩ ,
144
+ (1)
145
+ where α ≡ detα{ϕDF
146
+ i
147
+ } are the Slater determinant con-
148
+ structed from the one-electron DF orbitals ϕDF
149
+ i
150
+ belong-
151
+ ing to the configuration K, Nd is the number of these de-
152
+ terminants, and ˆHDC ≡ ˆHD + ˆV C is the many-electron
153
+ Dirac-Coulomb Hamiltonian. In the DF-RAV approxi-
154
+ mation, the summation in the functional (1), which can
155
+ be performed analytically, is equivalent to the summa-
156
+ tion over the relativistic terms J of the configuration K
157
+ taking into account their multiplicities [55, 56]. The DF
158
+ equations can be derived by varying Eq. (1) with the ev-
159
+ ident constraints due to the orthonormality conditions.
160
+ The DF orbitals ϕDF
161
+ i
162
+ and the energy EDF
163
+ RAV(K) are then
164
+ obtained by solving the corresponding DF equations. We
165
+ note that only the Coulomb-interaction operator ˆVC is in-
166
+ cluded self-consistently into the DF equations.
167
+ The Breit-interaction correction to the average en-
168
+ ergy EDF
169
+ RAV(K) of the configuration K is evaluated per-
170
+ turbatively as
171
+ ∆EB
172
+ RAV(K) = 1
173
+ Nd
174
+
175
+ α∈K
176
+ ⟨α| ˆV B|α⟩ ,
177
+ (2)
178
+ where the determinants α are constructed from ϕDF
179
+ i
180
+ and
181
+ ˆV B is the Breit-interaction operator.
182
+ The QED cor-
183
+ rections are treated using the model-QED-operator ap-
184
+ proach developed in Refs. [51–53].
185
+ We mention also
186
+ some alternative methods to approximately account for
187
+ the QED effects in many-electron systems, see, e.g.,
188
+ Refs. [40, 44, 57–62]. For very recent applications and de-
189
+ velopments of the model-QED-operator methods, which
190
+ include the calculations of the QED effects in molecules,
191
+ we refer to Refs. [63–67]. Like the Breit-interaction con-
192
+ tribution, the QED correction in the RAV approximation
193
+ is calculated as the relativistic-configuration-average ex-
194
+ pectation value of the model-QED operator ˆV Q,
195
+ ∆EQ
196
+ RAV(K) = 1
197
+ Nd
198
+
199
+ α∈K
200
+ ⟨α| ˆV Q|α⟩ .
201
+ (3)
202
+ Finally, for the configuration K, we consider the average
203
+ energy including the Breit correction and QED effects,
204
+ EDCBQ
205
+ RAV (K) = EDF
206
+ RAV(K) + ∆EB
207
+ RAV(K) + ∆EQ
208
+ RAV(K) .
209
+ (4)
210
+ Hereinafter, this scheme is referred to as the DCBQ-RAV
211
+ one.
212
+ To resolve the level structure for the configura-
213
+ tion K, one can try to find a single-configuration DF wave
214
+ function and corresponding energy for the jj-coupling
215
+ term using the energy functional constructed for a given
216
+ value of J. However, if this approach is employed for an
217
+ open-shell system possessing a complex level structure, it
218
+ often proves impossible to adequately select a proper lin-
219
+ ear combination of many-electron wave functions solely
220
+ from symmetry considerations. It turns out that most
221
+ of the SHEs have several open shells, and, therefore, this
222
+ straightforward scheme may result in a wrong level struc-
223
+ ture. In the present work, the level structure of the con-
224
+ figuration K is resolved by means of the CI approach
225
+ for the Dirac-Coulomb-Breit (DCB) Hamiltonian sup-
226
+ plemented with the model-QED operator. The DCBQ
227
+
228
+ 3
229
+ Hamiltonian reads as
230
+ ˆHDCBQ = Λ+ �
231
+ ˆHD + ˆV C + ˆV B + ˆV Q�
232
+ Λ+ ,
233
+ (5)
234
+ where Λ+ is the product of one-electron projectors on
235
+ the positive-energy solutions of the DF-RAV equations.
236
+ The eigenvalue problem induced by the Hamiltonian (5)
237
+ in the space of all the determinants α arising from the
238
+ single relativistic configuration (SRC) K describes the
239
+ splitting of the levels,
240
+ ˆHDCBQΨSRC(K, JM) = EDCBQ
241
+ SRC
242
+ ΨSRC(K, JM) ,
243
+ (6)
244
+ where M means the projection of J.
245
+ However, in case of energetically close configura-
246
+ tions, their strong interaction and mixing may result in
247
+ changes of the level structure. To account for the corre-
248
+ lation effects, we consider a larger CI problem,
249
+ ˆHDCBQΨCI(JM) = EDCBQ
250
+ CI
251
+ (J)ΨCI(JM) ,
252
+ (7)
253
+ in the space spanned by the Slater determinants gener-
254
+ ated not only from the configuration K but also from a
255
+ given list of relativistic configurations (see details in the
256
+ next section). In the present calculations, the CI method
257
+ in the basis of the Dirac-Fock-Sturm orbitals is used (CI-
258
+ DFS) [48–50]. At the CI level, the Breit and QED cor-
259
+ rections are taken into account, according to Eqs. (5) –
260
+ (7), by including the corresponding terms into the Dirac-
261
+ Coulomb Hamiltonian.
262
+ Finally, we emphasize that the main goal of the
263
+ present study is not to obtain the most accurate the-
264
+ oretical predictions for the SHE energy-level structure,
265
+ since in the cases of complex configurations this can be
266
+ a separate extremely complicated task. Instead, we aim
267
+ at a reliable determination of the ground-state levels and
268
+ the configurations they belong to within a series of the
269
+ adequate relativistic calculations.
270
+ Having discussed the methods, let us proceed to de-
271
+ tails of their application in the scope of the present work.
272
+ III.
273
+ DETAILS OF THE CALCULATIONS
274
+ In the present work, all the calculations of the en-
275
+ ergy levels of SHE are performed employing the Fermi
276
+ model for the nuclear-charge distribution.
277
+ The root-
278
+ mean-square radius of the nucleus (in fm) is given by
279
+ R =
280
+
281
+ 3
282
+ 5Rsphere,
283
+ Rsphere = 1.2A1/3,
284
+ (8)
285
+ where for the nucleon number A we use the approximate
286
+ formula from Ref. [20],
287
+ A = 0.00733Z2 + 1.30Z + 63.6.
288
+ (9)
289
+ The value of A obtained from Eq. (9) is rounded to the
290
+ nearest integer. This choice of the nuclear size is consis-
291
+ tent with the one made in Ref. [53].
292
+ The SHE ground-state configuration is a priori un-
293
+ known. As described in the previous section, we use three
294
+ schemes to define the ground-state configuration. The
295
+ first scheme is based on the DF-RAV method. Probing
296
+ various configurations K, we determine the ground-state
297
+ one as the configuration K∗ with the lowest average en-
298
+ ergy EDCBQ
299
+ RAV (K∗).
300
+ For each Z, the list of all possible
301
+ configuration-candidates for the role of the ground one
302
+ is constructed by distributing Ne = Z − Ncore valence
303
+ electrons over the valence relativistic shells. The number
304
+ of the core-shell electrons Ncore and the list of the va-
305
+ lence shells are presented in Table I. We consider as the
306
+ valence shells those ones which, according to our prelim-
307
+ inary calculations, are most likely to be occupied in the
308
+ ground state.
309
+ TABLE I. The list of the relativistic shells used to generate
310
+ the relativistic configurations for which the DF-RAV equa-
311
+ tions are solved.
312
+ The absence of the lower index j in the
313
+ column “Core shells” means that all relativistic orbitals cor-
314
+ responding to the nonrelativistic one are fully occupied. The
315
+ probe configurations are generated according to the following
316
+ rule: the core shells are fully occupied, the Z − Ncore valence
317
+ electrons are distributed over the valence shells. The nota-
318
+ tions [Rn] and [Og] represent the closed-shell configurations
319
+ of radon and oganesson atoms, respectively.
320
+ Z
321
+ Core shells
322
+ Ncore
323
+ Valence shells
324
+ 120 – 121
325
+ [Rn]5f 6d 7s 7p1/2
326
+ 114
327
+ 7p3/2 8s 8p1/2 7d3/2
328
+ 122 – 123
329
+ [Og]
330
+ 118
331
+ 8s 8p1/2 7d3/2 6f5/2
332
+ 124 – 133
333
+ [Og]8s
334
+ 120
335
+ 8p1/2 6f5/2 7d3/2 5g7/2
336
+ 134 – 144
337
+ [Og]8s 5g7/2
338
+ 128
339
+ 8p1/2 6f5/2 7d3/2 5g9/2
340
+ 145 – 146
341
+ [Og]8s 8p1/2 5g7/2
342
+ 130
343
+ 6f5/2 7d3/2 5g9/2 9s
344
+ 147 – 155
345
+ [Og]8s 8p1/2 5g
346
+ 140
347
+ 6f5/2 7d3/2 6f7/2 9s
348
+ 156 – 160
349
+ [Og]8s 8p1/2 5g 6f5/2
350
+ 146
351
+ 6f7/2 7d3/2 9s 7d5/2
352
+ 161 – 165
353
+ [Og]8s 8p1/2 5g 6f
354
+ 154
355
+ 7d3/2 7d5/2 9s 8p3/2
356
+ 166 – 168
357
+ [Og]8s 8p1/2 5g 6f 7d3/2
358
+ 158
359
+ 7d5/2 9s 8p3/2 9p1/2
360
+ 169 – 170
361
+ [Og]8s 8p1/2 5g 6f 7d
362
+ 164
363
+ 9s 8p3/2 9p1/2 7f5/2
364
+ As an example, in Table II for the SHEs with Z =
365
+ 125 and Z = 140, seven configurations K with the lowest
366
+ relativistic-configuration-average energies EDF
367
+ RAV(K) are
368
+ presented.
369
+ For each configuration K given relative to
370
+ the closed-shell one, the total DF-RAV energy and the
371
+ energies obtained by successively adding the Breit and
372
+ QED corrections are placed in the fourth, fifth, and sixth
373
+ columns of Table II, respectively. The configurations are
374
+ sorted in ascending order of the energy EDF
375
+ RAV(K), i.e.,
376
+ the first entry corresponds to the configuration with the
377
+ lowest energy. The relative changes in the order of the
378
+ configurations after addition of the corrections are indi-
379
+ cated by the symbols ▽ (down) and △ (up). The absence
380
+
381
+ 4
382
+ of these symbols corresponds to the case when the con-
383
+ figuration position in the sorted list does not change.
384
+ TABLE II. The relativistic-configuration-average energies for the SHEs with Z = 125 and Z = 140 evaluated for the configura-
385
+ tions K using the DF method, EDF
386
+ RAV, with the addition of the Breit-interaction correction, +∆EB
387
+ RAV, and with the additional
388
+ accounting for the QED correction, +∆EQ
389
+ RAV, (a.u.). The configurations are presented relative to the closed-shell configuration
390
+ and sorted in the ascending order of the energy EDF
391
+ RAV. In the last two columns, the symbols ▽ (down) and △ (up) indicate the
392
+ change in the order of the configurations relative to the order in the preceding column. The absence of these symbols means
393
+ that there is no change in the position of the configuration. In particular, the QED effects do not affect the order.
394
+ Z
395
+ Closed Shells
396
+ K
397
+ EDF
398
+ RAV
399
+ +∆EB
400
+ RAV
401
+ +∆EQ
402
+ RAV
403
+ 125
404
+ [Og]8s2
405
+ 1/2
406
+ 8p1
407
+ 1/26f 4
408
+ 5/2
409
+ −64 846.3116
410
+ −64 718.7639 ▽3
411
+ −64 627.5323
412
+ 8p1
413
+ 1/26f 3
414
+ 5/25g1
415
+ 7/2
416
+ −64 846.3061
417
+ −64 718.7781 △1
418
+ −64 627.5496
419
+ 8p1
420
+ 1/27d1
421
+ 3/26f 2
422
+ 5/25g1
423
+ 7/2
424
+ −64 846.3033
425
+ −64 718.7718 △1
426
+ −64 627.5421
427
+ 8p2
428
+ 1/26f 2
429
+ 5/25g1
430
+ 7/2
431
+ −64 846.3007
432
+ −64 718.7680 △1
433
+ −64 627.5377
434
+ 7d1
435
+ 3/26f 4
436
+ 5/2
437
+ −64 846.2769
438
+ −64 718.7300 ▽1
439
+ −64 627.4988
440
+ 8p1
441
+ 1/27d1
442
+ 3/26f 3
443
+ 5/2
444
+ −64 846.2697
445
+ −64 718.7182 ▽1
446
+ −64 627.4854
447
+ 7d1
448
+ 3/26f 3
449
+ 5/25g1
450
+ 7/2
451
+ −64 846.2680
452
+ −64 718.7408 △2
453
+ −64 627.5127
454
+ 140
455
+ [Og]8s2
456
+ 1/28p2
457
+ 1/25g8
458
+ 7/2
459
+ 7d2
460
+ 3/26f 2
461
+ 5/25g6
462
+ 9/2
463
+ −93 548.8504
464
+ −93 320.7516 ▽1
465
+ −93 179.0799
466
+ 7d1
467
+ 3/26f 3
468
+ 5/25g6
469
+ 9/2
470
+ −93 548.8479
471
+ −93 320.7539 △1
472
+ −93 179.0837
473
+ 7d1
474
+ 3/26f 4
475
+ 5/25g5
476
+ 9/2
477
+ −93 548.7928
478
+ −93 320.6719 ▽1
479
+ −93 178.9986
480
+ 7d3
481
+ 3/26f 1
482
+ 5/25g6
483
+ 9/2
484
+ −93 548.7738
485
+ −93 320.6697 ▽1
486
+ −93 178.9965
487
+ 6f 4
488
+ 5/25g6
489
+ 9/2
490
+ −93 548.7689
491
+ −93 320.6791 △2
492
+ −93 179.0103
493
+ 6f 5
494
+ 5/25g5
495
+ 9/2
496
+ −93 548.7559
497
+ −93 320.6398
498
+ −93 178.9679
499
+ 7d2
500
+ 3/26f 3
501
+ 5/25g5
502
+ 9/2
503
+ −93 548.7488
504
+ −93 320.6229
505
+ −93 178.9480
506
+ As one can see from the examples given in Ta-
507
+ ble II, the Breit-interaction correction can change the
508
+ ground-state configuration within the RAV approxima-
509
+ tion.
510
+ For Z = 125, Table II demonstrates that when
511
+ only the Coulomb interaction is taken into account the
512
+ ground-state configuration is 8p1
513
+ 1/26f 4
514
+ 5/2. However, when
515
+ we add the Breit-interaction correction evaluated accord-
516
+ ing to Eq. (2), the configuration 8p1
517
+ 1/26f 3
518
+ 5/25g1
519
+ 7/2 turns
520
+ out to be the lowest-energy one. All the other six con-
521
+ figurations change their order as well.
522
+ A similar con-
523
+ figuration reordering occurs for the SHE with Z = 140
524
+ as well.
525
+ However, in the latter case some configu-
526
+ rations retain their positions.
527
+ Without the Breit in-
528
+ teraction, the ground-state configuration for Z = 140
529
+ is 7d2
530
+ 3/26f 2
531
+ 5/25g6
532
+ 9/2, but with this correction taken into ac-
533
+ count the lowest-energy configuration is 7d1
534
+ 3/26f 3
535
+ 5/25g6
536
+ 9/2.
537
+ For both demonstrated cases, the QED correction does
538
+ not change the ground-state configuration and the sorted
539
+ configuration list as a whole.
540
+ After the configurations with the lowest average en-
541
+ ergies EDCBQ
542
+ RAV (K) are found, we explore their level struc-
543
+ ture using the DCBQ-SRC approach. To determine the
544
+ ground-state level, we choose seven configurations with
545
+ the lowest DCBQ-RAV energies and for each level belong-
546
+ ing to these configurations solve the DCBQ-SRC prob-
547
+ lem (6). The configuration with the lowest DCBQ-SRC
548
+ energy is considered to be the ground-state configura-
549
+ tion in the DCBQ-SRC approach, and the corresponding
550
+ level gives the ground-state level. Since for most SHEs, a
551
+ few selected DCBQ-RAV energies are close to each other,
552
+ we bear in mind that the DCBQ-SRC consideration can
553
+ change the ground-state configuration.
554
+ -64627.65
555
+ -64627.60
556
+ -64627.55
557
+ -64627.50
558
+ -64627.45
559
+ -64627.40
560
+ 8p1
561
+ 1/26f3
562
+ 5/25g1
563
+ 7/2
564
+ RAV
565
+ 8p1
566
+ 1/27d1
567
+ 3/26f2
568
+ 5/25g1
569
+ 7/2
570
+ RAV
571
+ J = 13/2
572
+ J = 17/2
573
+ EDCBQ (a.u.)
574
+ FIG. 1.
575
+ Relativistic-configuration-average energies EDCBQ
576
+ RAV
577
+ calculated
578
+ for
579
+ the
580
+ configurations
581
+ 8p1
582
+ 1/26f 3
583
+ 5/25g1
584
+ 7/2
585
+ (left)
586
+ and 8p1
587
+ 1/27d1
588
+ 3/26f 2
589
+ 5/25g1
590
+ 7/2 (right) of the SHE with Z = 125
591
+ and all the possible levels which contribute to these average
592
+ energies. For the lowest DCBQ-SRC levels the total angular
593
+ momentum quantum numbers J are shown.
594
+
595
+ 5
596
+ The last statement is illustrated in Fig. 1, where the
597
+ average energies EDCBQ
598
+ RAV (K) of the SHE with Z = 125
599
+ are presented for two configurations having the lowest
600
+ average energies: K = 8p1
601
+ 1/26f 3
602
+ 5/25g1
603
+ 7/2 (left) and ˜K =
604
+ 8p1
605
+ 1/27d1
606
+ 3/26f 2
607
+ 5/25g1
608
+ 7/2 (right). For each configuration, we
609
+ show all the levels EDCBQ
610
+ SRC
611
+ (K, J) contributing to the
612
+ relativistic-configuration-average energy.
613
+ For the low-
614
+ est DCBQ-SRC levels, the total angular momenta J
615
+ are presented.
616
+ One can see, that the average energy
617
+ of the configuration K is lower than the energy of the
618
+ configuration ˜K by about EDCBQ
619
+ RAV ( ˜K) − EDCBQ
620
+ RAV (K) =
621
+ 0.0065 a.u. (see also Table II). However, the lowest
622
+ level J = 17/2 of the configuration ˜K lies lower than
623
+ the lowest level J = 13/2 of the configuration K by
624
+ about EDCBQ
625
+ SRC
626
+ (K, 13/2) − EDCBQ
627
+ SRC
628
+ ( ˜K, 17/2) = 0.0245 a.u.
629
+ This kind of behavior is not a specific feature of the SHE
630
+ with Z = 125, but rather an example of some general
631
+ trend observed for many other SHEs as well.
632
+ The DCBQ-RAV and DCBQ-SRC schemes are one-
633
+ configuration approaches and therefore they do not take
634
+ into account the electron-correlation effects i.e. mixing of
635
+ the different configurations. Below, we discuss the influ-
636
+ ence of the electron-electron correlations on the order of
637
+ the SHE lowest levels. To this end, for each Z we perform
638
+ the independent CI-DFS calculations for seven reference
639
+ configurations with the lowest DCBQ-RAV energies se-
640
+ lected at the previous stage. For each configuration, we
641
+ evaluate the three lowest levels and determine their to-
642
+ tal angular momenta J. The level with the lowest en-
643
+ ergy EDCBQ
644
+ CI
645
+ (J) is the ground-state level. Within this ap-
646
+ proach, the ground-state level depends on how accurately
647
+ we solve the CI problem. We investigate the dependence
648
+ of the level order on the number of virtual orbitals by
649
+ performing two different CI-DFS calculations referred to
650
+ as “DCBQ-CI1” and “DCBQ-CI2”. In both schemes, the
651
+ single (S) and double (D) excitations from the reference
652
+ configuration determined at the DCBQ-RAV stage are
653
+ considered. The DCBQ-CI1 scheme can be thought of
654
+ as a CI problem with a relatively small number of the
655
+ virtual orbitals, whereas the DCBQ-CI2 scheme includes
656
+ more virtual orbitals. The list of the active and virtual
657
+ orbitals used in both CI calculations is presented in Ta-
658
+ ble III. The occupied orbitals, which are not mentioned
659
+ in the table, are treated as the frozen core. The active
660
+ orbitals as well as the virtual orbitals, which are involved
661
+ in the most important configurations, are taken as the
662
+ solutions of the DF equations, whereas the other virtual
663
+ orbitals are obtained from the solutions of the DFS equa-
664
+ tions.
665
+ TABLE III. The list of the active and virtual relativistic shells employed in the “DCBQ-CI1” and “DCBQ-CI2” calculations.
666
+ The absence of the lower index indicates that for a given l both the relativistic orbitals with l − 1/2 and l + 1/2 are included
667
+ in the CI problem.
668
+ Z
669
+ Active valence shells
670
+ Virtual shells
671
+ DCBQ-CI1
672
+ DCBQ-CI2
673
+ 120 – 121
674
+ 7p3/28s1/28p1/27d3/2
675
+ 8p3/27d5/2
676
+ 9s1/29p8d6f5g
677
+ 122 – 123
678
+ 8s1/28p1/27d3/26f5/2
679
+ 8p3/27d5/26f7/2
680
+ 9s1/29p8d7f5g
681
+ 124 – 133
682
+ 8p1/26f5/27d3/25g7/2
683
+ 8p3/27d5/26f7/25g9/2
684
+ 9s1/29p8d7f6g
685
+ 134 – 144
686
+ 8p1/26f5/27d3/25g9/2
687
+ 8p3/26f7/27d5/2
688
+ 9s1/29p1/28d3/27f5/26g7/2
689
+ 145 – 146
690
+ 6f5/27d3/25g9/29s1/2
691
+ 8p3/26f7/27d5/2
692
+ 10s1/29p8d7f6g
693
+ 147 – 155
694
+ 6f5/27d3/26f7/29s1/2
695
+ 8p3/27d5/2
696
+ 10s1/29p8d7f6g
697
+ 156 – 160
698
+ 6f7/27d3/29s1/27d5/2
699
+ 8p3/2
700
+ 10s1/29p8d7f6g
701
+ 161 – 165
702
+ 7d3/27d5/29s1/28p3/2
703
+ 10s1/29p8d7f6g
704
+ 166 – 168
705
+ 7d3/27d5/29s1/28p3/29p1/2
706
+ 9p3/2
707
+ 10s1/210p8d7f6g
708
+ 169 – 170
709
+ 7d5/29s1/28p3/29p1/27f5/2
710
+ 7f7/29p3/2
711
+ 10s1/210p8d8f6g
712
+ The correlation effects can result in exotic scenarios
713
+ for the level structure. An example is presented in Ta-
714
+ ble IV, where the lowest levels with J = 0, 1, 2, 3 and
715
+ the related configurations of the SHE with Z = 168
716
+ are shown.
717
+ One can see that within the DCBQ-SRC
718
+ approximation, when the electron-electron correlations
719
+ are neglected, the level with J = 1, EDCBQ
720
+ SRC
721
+ (J = 1) =
722
+ −202904.8013 a.u., lies below the levels with J = 2,
723
+ EDCBQ
724
+ SRC
725
+ (J = 2)
726
+ =
727
+ −202904.7871 a.u. and J
728
+ =
729
+ 0,
730
+ EDCBQ
731
+ SRC
732
+ (J = 0) = −202904.7789 a.u.
733
+ If we account
734
+ for the electronic correlations by means of the DCBQ-
735
+ CI1 scheme, the level with J = 1 rises above the level
736
+ with J = 2 and exceeds it by about 0.025 a.u. When we
737
+ improve the description of the electron-electron correla-
738
+ tions using the DCBQ-CI2 scheme, the level with J = 1
739
+ becomes the lowest one again and the level with J = 0
740
+ falls below the level with J = 2. In this case, the dif-
741
+ ference between the levels with J = 0 and J = 1 consti-
742
+ tutes about 0.01 a.u. This demonstrates that with the
743
+
744
+ 6
745
+ improvement of the correlation treatment the changes in
746
+ the ground-state levels may occur. More importantly, the
747
+ dominant configurations of levels with J = 0, 1, 2 do not
748
+ coincide with each other. Therefore, one can expect that
749
+ not only levels which belong to the same configuration
750
+ can interchange, but also the rearrangements involving
751
+ the levels of other configurations are possible.
752
+ TABLE IV. The lowest-level energies EDCBQ(J) for levels J = 0, 1, 2, 3 calculated by means of the DCBQ-SRC, DCBQ-CI1,
753
+ and DCBQ-CI2 schemes for the SHE with Z = 168 (a.u.). For the DCBQ-SRC values, the configurations of these levels are
754
+ presented. For the DCBQ-CI1 and DCBQ-CI2 results, the configurations contributing with the weights of at least 0.05 are
755
+ given.
756
+ J
757
+ DCBQ-SRC
758
+ DCBQ-CI1
759
+ DCBQ-CI2
760
+ K
761
+ EDCBQ
762
+ SRC
763
+ (K, J)
764
+ K
765
+ EDCBQ
766
+ CI
767
+ (J)
768
+ K
769
+ EDCBQ
770
+ CI
771
+ (J)
772
+ 0
773
+ 9s2
774
+ 1/29p2
775
+ 1/2
776
+ −202904.7789
777
+ 0.87 · 9s2
778
+ 1/29p2
779
+ 1/2+
780
+ 0.07 · 9s2
781
+ 1/28p2
782
+ 3/2+
783
+ 0.05 · 8p2
784
+ 3/29p2
785
+ 1/2
786
+ −202904.8206
787
+ 0.91 · 9s2
788
+ 1/29p2
789
+ 1/2
790
+ −202904.9561
791
+ 1
792
+ 9s2
793
+ 1/28p1
794
+ 3/29p1
795
+ 1/2 −202904.8013
796
+ 0.92 · 9s2
797
+ 1/28p1
798
+ 3/29p1
799
+ 1/2+
800
+ 0.07 · 8p3
801
+ 3/29p1
802
+ 1/2
803
+ −202904.8247
804
+ 0.94 · 9s2
805
+ 1/28p1
806
+ 3/29p1
807
+ 1/2
808
+ −202904.9652
809
+ 2
810
+ 9s1
811
+ 1/28p2
812
+ 3/29p1
813
+ 1/2 −202904.7871
814
+ 0.55 · 9s1
815
+ 1/28p2
816
+ 3/29p1
817
+ 1/2+
818
+ 0.24 · 9s1
819
+ 1/28p1
820
+ 3/29p2
821
+ 1/2+
822
+ 0.20 · 9s1
823
+ 1/28p3
824
+ 3/2
825
+ −202904.8491
826
+ 0.81 · 9s1
827
+ 1/28p2
828
+ 3/29p1
829
+ 1/2+
830
+ 0.09 · 9s1
831
+ 1/28p1
832
+ 3/29p2
833
+ 1/2+
834
+ 0.07 · 9s1
835
+ 1/28p3
836
+ 3/2
837
+ −202904.9542
838
+ 3
839
+ 9s1
840
+ 1/28p2
841
+ 3/29p1
842
+ 1/2 −202904.7319
843
+ 0.99 · 9s1
844
+ 1/28p2
845
+ 3/29p1
846
+ 1/2
847
+ −202904.7385
848
+ 0.96 · 9s1
849
+ 1/28p2
850
+ 3/29p1
851
+ 1/2
852
+ −202904.8835
853
+ IV.
854
+ RESULTS
855
+ To begin with, we calculate the average energies of
856
+ the configurations including the Breit interaction and
857
+ QED effects within the DCBQ-RAV method.
858
+ For all
859
+ the SHEs in the range 120 ≤ Z ≤ 170, the configura-
860
+ tions with the lowest average energy are presented in Ta-
861
+ ble V. The ground-state configurations are shown rela-
862
+ tive to the closed-shell configurations given in the sec-
863
+ ond column.
864
+ Our results (the column “DCBQ-RAV”)
865
+ are compared with the results of Ref. [34], where the
866
+ calculations were performed using the Dirac-Fock-Slater
867
+ method for Z up to 173, the results of Ref. [29], where
868
+ the DF method was employed for Z up to 131, and, fi-
869
+ nally, the results of Ref. [35], where the calculations were
870
+ based on the relativistic density functional theory and
871
+ 121 ≤ Z ≤ 131 were considered. We note that in Ref. [29]
872
+ the Gaunt-interaction correction was taken into account
873
+ perturbatively, while the Coulomb electron-electron in-
874
+ teraction was treated self-consistently within the density
875
+ functional theory.
876
+ Moreover, since the non-relativistic
877
+ notations were used in Refs. [29, 35], we retain them in
878
+ Table V without any changes.
879
+ Within the DCBQ-RAV approximation, the general
880
+ trend of the occupation rule with the growth of Z is as
881
+ follows: after the 8s1/2 shell is filled for Z = 120, the elec-
882
+ trons begin to occupy the 8p1/2, 7d3/2, and 6f5/2 shells.
883
+ According to our calculations, the first electron in the
884
+ 5g7/2 shell appears for Z = 125.
885
+ Starting from this
886
+ atomic number, the 5g series begins.
887
+ For Z = 126,
888
+ the 8p1/2 shell becomes the closed one.
889
+ With a fur-
890
+ ther increase for Z, the 5g7/2 and 5g9/2 shells are subse-
891
+ quently occupied with the electrons. The partially occu-
892
+ pied 7d3/2 and 6f5/2 shells remain the valence ones and
893
+ their occupation numbers exhibit little changes. This 5g-
894
+ occupation process is completed at Z = 144 which has
895
+ the fully occupied 5g7/2 and 5g9/2 shells and partially
896
+ occupied 7d3/2 and 6f5/2 shells.
897
+ After both the relativistic 5g shells are filled, the
898
+ 6f shells begin to be occupied quite systematically: 6f5/2
899
+ and 6f7/2 become fully occupied for Z
900
+ = 148 and
901
+ Z = 155, respectively.
902
+ The 7d3/2 shell is unoccupied
903
+ for Z = 155 and it remains partially occupied for the
904
+ other Z in this region becoming closed only for Z = 158.
905
+ Finally, the SHE with Z
906
+ = 164 has the configura-
907
+ tion [Og]8s2
908
+ 1/28p2
909
+ 1/25g8
910
+ 7/25g10
911
+ 9/26f 6
912
+ 5/26f 8
913
+ 7/27d4
914
+ 3/27d6
915
+ 5/2 with
916
+ all the relativistic shells being occupied.
917
+ Notably, the 8p3/2 shell is not filled along the se-
918
+ quence Z = 120 − 166 that is due to a large spin-orbital
919
+ splitting of the 8p shell.
920
+ The DF-RAV calculations
921
+
922
+ 7
923
+ TABLE V. The ground-state configurations of superheavy elements with atomic numbers 120 ≤ Z ≤ 170 evaluated within the
924
+ DCBQ-RAV method, taking into account the Breit interaction and QED effects. The configurations are shown relative to the
925
+ closed-shell ones, which are presented in the column “Closed shells”. [Og] corresponds to the configuration of the oganesson
926
+ atom. The succeeding records in this column show the relativistic orbitals which have to be added to the previous ones to
927
+ obtain the closed-shell configurations for heavier atoms. The results of the present work, “DCBQ-RAV”, are compared with the
928
+ results of Refs. [29, 34, 35].
929
+ Z
930
+ Closed shells
931
+ DCBQ-RAV
932
+ Fricke and Soff [34]
933
+ Mann and Waber [29]
934
+ Umemoto and Saito [35]
935
+ 120
936
+ [Og]
937
+ 8s2
938
+ 1/2
939
+ 8s2
940
+ 1/2
941
+ 8s2
942
+ 121
943
+ +8s2
944
+ 1/2
945
+ 8p1
946
+ 1/2
947
+ 8p1
948
+ 1/2
949
+ 8p1
950
+ 8p1
951
+ 122
952
+ 8p1
953
+ 1/2 7d1
954
+ 3/2
955
+ 8p1
956
+ 1/2 7d1
957
+ 3/2
958
+ 8p17d1
959
+ 8p2
960
+ 123
961
+ 8p1
962
+ 1/2 7d1
963
+ 3/2 6f 1
964
+ 5/2
965
+ 8p1
966
+ 1/2 7d1
967
+ 3/2 6f 1
968
+ 5/2
969
+ 8p17d16f 1
970
+ 8p17d16f 1
971
+ 124
972
+ 8p1
973
+ 1/2 6f 3
974
+ 5/2
975
+ 8p1
976
+ 1/2 6f 3
977
+ 5/2
978
+ 8p16f 3
979
+ 8p26f 2
980
+ 125
981
+ 8p1
982
+ 1/2 6f 3
983
+ 5/2 5g1
984
+ 7/2
985
+ 8p1
986
+ 1/2 6f 3
987
+ 5/2 5g1
988
+ 7/2
989
+ 8p16f 35g1
990
+ 8p16f 4
991
+ 126
992
+ 8p2
993
+ 1/2 6f 2
994
+ 5/2 5g2
995
+ 7/2
996
+ 8p1
997
+ 1/2 7d1
998
+ 3/2 6f 2
999
+ 5/2 5g2
1000
+ 7/2
1001
+ 8p26f 25g2
1002
+ 8p16f 45g1
1003
+ 127
1004
+ +8p2
1005
+ 1/2
1006
+ 6f 2
1007
+ 5/2 5g3
1008
+ 7/2
1009
+ 6f 2
1010
+ 5/2 5g3
1011
+ 7/2
1012
+ 8p26f 25g3
1013
+ 8p26f 35g2
1014
+ 128
1015
+ 6f 2
1016
+ 5/2 5g4
1017
+ 7/2
1018
+ 6f 2
1019
+ 5/2 5g4
1020
+ 7/2
1021
+ 8p26f 25g4
1022
+ 8p26f 35g3
1023
+ 129
1024
+ 6f 2
1025
+ 5/2 5g5
1026
+ 7/2
1027
+ 6f 2
1028
+ 5/2 5g5
1029
+ 7/2
1030
+ 8p26f 25g5
1031
+ 8p26f 35g4
1032
+ 130
1033
+ 6f 2
1034
+ 5/2 5g6
1035
+ 7/2
1036
+ 6f 2
1037
+ 5/2 5g6
1038
+ 7/2
1039
+ 8p26f 25g6
1040
+ 8p26f 35g5
1041
+ 131
1042
+ 6f 2
1043
+ 5/2 5g7
1044
+ 7/2
1045
+ 6f 2
1046
+ 5/2 5g7
1047
+ 7/2
1048
+ 8p26f 25g7
1049
+ 8p26f 35g6
1050
+ 132
1051
+ 7d1
1052
+ 3/2 6f 1
1053
+ 5/2 5g8
1054
+ 7/2
1055
+ 6f 2
1056
+ 5/2 5g8
1057
+ 7/2
1058
+ 133
1059
+ +5g8
1060
+ 7/2
1061
+ 6f 3
1062
+ 5/2
1063
+ 6f 3
1064
+ 5/2
1065
+ 134
1066
+ 6f 4
1067
+ 5/2
1068
+ 6f 4
1069
+ 5/2
1070
+ 135
1071
+ 6f 4
1072
+ 5/2 5g1
1073
+ 9/2
1074
+ 6f 4
1075
+ 5/2 5g1
1076
+ 9/2
1077
+ 136
1078
+ 6f 4
1079
+ 5/2 5g2
1080
+ 9/2
1081
+ 6f 4
1082
+ 5/2 5g2
1083
+ 9/2
1084
+ 137
1085
+ 7d1
1086
+ 3/2 6f 3
1087
+ 5/2 5g3
1088
+ 9/2
1089
+ 7d1
1090
+ 3/2 6f 3
1091
+ 5/2 5g3
1092
+ 9/2
1093
+ 138
1094
+ 7d1
1095
+ 3/2 6f 3
1096
+ 5/2 5g4
1097
+ 9/2
1098
+ 7d1
1099
+ 3/2 6f 3
1100
+ 5/2 5g4
1101
+ 9/2
1102
+ 139
1103
+ 7d1
1104
+ 3/2 6f 3
1105
+ 5/2 5g5
1106
+ 9/2
1107
+ 7d2
1108
+ 3/2 6f 2
1109
+ 5/2 5g5
1110
+ 9/2
1111
+ 140
1112
+ 7d1
1113
+ 3/2 6f 3
1114
+ 5/2 5g6
1115
+ 9/2
1116
+ 7d1
1117
+ 3/2 6f 3
1118
+ 5/2 5g6
1119
+ 9/2
1120
+ 141
1121
+ 7d2
1122
+ 3/2 6f 2
1123
+ 5/2 5g7
1124
+ 9/2
1125
+ 7d2
1126
+ 3/2 6f 2
1127
+ 5/2 5g7
1128
+ 9/2
1129
+ 142
1130
+ 7d2
1131
+ 3/2 6f 2
1132
+ 5/2 5g8
1133
+ 9/2
1134
+ 7d2
1135
+ 3/2 6f 2
1136
+ 5/2 5g8
1137
+ 9/2
1138
+ 143
1139
+ 7d2
1140
+ 3/2 6f 2
1141
+ 5/2 5g9
1142
+ 9/2
1143
+ 7d2
1144
+ 3/2 6f 2
1145
+ 5/2 5g9
1146
+ 9/2
1147
+ 144
1148
+ 7d3
1149
+ 3/2 6f 1
1150
+ 5/2 5g10
1151
+ 9/2
1152
+ 7d3
1153
+ 3/2 6f 1
1154
+ 5/2 5g10
1155
+ 9/2
1156
+ 145
1157
+ +5g10
1158
+ 9/2
1159
+ 7d2
1160
+ 3/2 6f 3
1161
+ 5/2
1162
+ 7d2
1163
+ 3/2 6f 3
1164
+ 5/2
1165
+ 146
1166
+ 7d2
1167
+ 3/2 6f 4
1168
+ 5/2
1169
+ 7d2
1170
+ 3/2 6f 4
1171
+ 5/2
1172
+ 147
1173
+ 7d2
1174
+ 3/2 6f 5
1175
+ 5/2
1176
+ 7d2
1177
+ 3/2 6f 5
1178
+ 5/2
1179
+ 148
1180
+ 7d2
1181
+ 3/2 6f 6
1182
+ 5/2
1183
+ 7d2
1184
+ 3/2 6f 6
1185
+ 5/2
1186
+ 149
1187
+ +6f 6
1188
+ 5/2
1189
+ 7d3
1190
+ 3/2
1191
+ 7d3
1192
+ 3/2
1193
+ 150
1194
+ 7d4
1195
+ 3/2
1196
+ 7d4
1197
+ 3/2
1198
+ 151
1199
+ 7d3
1200
+ 3/2 6f 2
1201
+ 7/2
1202
+ 7d3
1203
+ 3/2 6f 2
1204
+ 7/2
1205
+ 152
1206
+ 7d3
1207
+ 3/2 6f 3
1208
+ 7/2
1209
+ 7d3
1210
+ 3/2 6f 3
1211
+ 7/2
1212
+ 153
1213
+ 7d2
1214
+ 3/2 6f 5
1215
+ 7/2
1216
+ 7d2
1217
+ 3/2 6f 5
1218
+ 7/2
1219
+ 154
1220
+ 7d2
1221
+ 3/2 6f 6
1222
+ 7/2
1223
+ 7d2
1224
+ 3/2 6f 6
1225
+ 7/2
1226
+ 155
1227
+ 9s1
1228
+ 1/2 6f 8
1229
+ 7/2
1230
+ 7d2
1231
+ 3/2 6f 7
1232
+ 7/2
1233
+ 156
1234
+ +6f 8
1235
+ 7/2
1236
+ 7d2
1237
+ 3/2
1238
+ 7d2
1239
+ 3/2
1240
+ 157
1241
+ 7d3
1242
+ 3/2
1243
+ 7d3
1244
+ 3/2
1245
+ 158
1246
+ 7d4
1247
+ 3/2
1248
+ 7d4
1249
+ 3/2
1250
+ 159
1251
+ +7d4
1252
+ 3/2
1253
+ 9s1
1254
+ 1/2
1255
+ 9s1
1256
+ 1/2
1257
+ 160
1258
+ 7d1
1259
+ 5/2 9s1
1260
+ 1/2
1261
+ 7d1
1262
+ 5/2 9s1
1263
+ 1/2
1264
+ 161
1265
+ 7d2
1266
+ 5/2 9s1
1267
+ 1/2
1268
+ 7d2
1269
+ 5/2 9s1
1270
+ 1/2
1271
+ 162
1272
+ 7d4
1273
+ 5/2
1274
+ 7d4
1275
+ 5/2
1276
+ 163
1277
+ 7d5
1278
+ 5/2
1279
+ 7d5
1280
+ 5/2
1281
+ 164
1282
+ 7d6
1283
+ 5/2
1284
+ 7d6
1285
+ 5/2
1286
+ 165
1287
+ +7d6
1288
+ 5/2
1289
+ 9s1
1290
+ 1/2
1291
+ 9s1
1292
+ 1/2
1293
+ 166
1294
+ 9s2
1295
+ 1/2
1296
+ 9s2
1297
+ 1/2
1298
+ 167
1299
+ +9s2
1300
+ 1/2
1301
+ 8p1
1302
+ 3/2
1303
+ 9p1
1304
+ 1/2
1305
+ 168
1306
+ 8p1
1307
+ 3/2 9p1
1308
+ 1/2
1309
+ 9p2
1310
+ 1/2
1311
+ 169
1312
+ 8p1
1313
+ 3/2 9p2
1314
+ 1/2
1315
+ 8p1
1316
+ 3/2 9p2
1317
+ 1/2
1318
+ 170
1319
+ 8p2
1320
+ 3/2 9p2
1321
+ 1/2
1322
+ 8p2
1323
+ 3/2 9p2
1324
+ 1/2
1325
+
1326
+ 8
1327
+ for Z = 166 shows that the spin-orbital splitting of the
1328
+ 8p shell is about 80 eV. The first 8p3/2 electron appears in
1329
+ the SHE with Z = 167, after the 9s1/2 shell becomes the
1330
+ closed one. However, for Z = 168 the 9p1/2 shell turns
1331
+ out to be more energetically advantageous than the 8p3/2
1332
+ one. The 8p3/2 shell is not fully occupied even for the last
1333
+ considered SHE with Z = 170. Another remarkable ob-
1334
+ servation found in our DCBQ-RAV calculations is that
1335
+ for Z = 155 the configuration with the valence 9s1/2 elec-
1336
+ tron turn out to be more energetically beneficial than
1337
+ the configuration with 7d3/2 electrons, whereas its neigh-
1338
+ bors — Z = 154 and Z = 156 — have two electrons in
1339
+ the 7d3/2 shell. Next time the 9s1/2 electron appears in
1340
+ the series Z = 159 – 161, and, finally, the 9s1/2 shell es-
1341
+ tablishes on the regular basis starting from the element
1342
+ with Z = 165.
1343
+ Throughout the calculations we found that the
1344
+ ground-state configuration may change due to the Breit-
1345
+ interaction corrections, see the discussion in Sec. III. This
1346
+ kind of changes is observed for Z = 125 and Z = 140 and
1347
+ never occurs for the other values of Z. Concerning the
1348
+ QED corrections, we deduce that within the DCBQ-RAV
1349
+ approach they never change the ground-state configura-
1350
+ tion for the SHEs under consideration. In general, our
1351
+ DCBQ-RAV ground-state configurations coincide with
1352
+ the DF-RAV ones, obtained without the Breit and QED
1353
+ corrections, in all cases except for Z = 125 and Z = 140.
1354
+ Our DCBQ-RAV results for Z = 120 – 131 are in
1355
+ full agreement with the results of Ref. [29]. The obtained
1356
+ ground-state configurations agree with the related results
1357
+ of Ref. [35] for the SHEs with 121 ≤ Z ≤ 123, but differ
1358
+ for the other available values of Z. Our DF-RAV results
1359
+ differ from the results of Ref. [34] obtained without the
1360
+ Breit and QED corrections for eight of the considered
1361
+ SHEs, namely, for Z = 125, 126, 132, 139, 140, 155, 167,
1362
+ and 168.
1363
+ For Z = 155, our results predict that 9s1/2
1364
+ electron unexpectedly jumps in the 6f7/2-occupation se-
1365
+ quence.
1366
+ Perhaps the configuration with the valence
1367
+ 9s1/2 electron was not considered in Ref. [34].
1368
+ As
1369
+ for the other discrepancies, they seem to have a non-
1370
+ systematical nature and might be due to the Slater
1371
+ exchange-interaction approximation used in Ref. [34].
1372
+ Nevertheless, the real reasons for these deviations remain
1373
+ unclear to us.
1374
+ Proceeding with the analysis, we are aimed at find-
1375
+ ing the configuration of the lowest-energy level.
1376
+ We
1377
+ employ the CI-DFS method using the one-configuration
1378
+ scheme DCBQ-SRC as well as the more elaborated
1379
+ schemes DCBQ-CI1 and DCBQ-CI2. As in the DCBQ-
1380
+ RAV approach, in these schemes the Breit and QED cor-
1381
+ rections are included, however, in the non-perturbative
1382
+ manner. The thorough description of the CI calculations
1383
+ is presented in Sec. III.
1384
+ In Table VI, we give the levels with the lowest DCBQ
1385
+ energies for the SHEs with 120 ≤ Z ≤ 170 obtained in
1386
+ three considered CI schemes. Additionally, the quantum
1387
+ numbers J of these levels are listed. For the DCBQ-SRC
1388
+ results, the configurations which the ground-state levels
1389
+ belong to are given. The DCBQ-CI1 and DCBQ-CI2 re-
1390
+ sults include the electron-electron correlation effects. For
1391
+ these data, we list the configurations contributing to the
1392
+ ground levels with the weight of at least 0.05. Following
1393
+ the structure of the previous table, the configurations are
1394
+ given relative to the closed-shell ones. The obtained re-
1395
+ sults are compared with the results of the previous mul-
1396
+ ticonfiguration Dirac-Fock calculations [47].
1397
+ The non-
1398
+ relativistic notations of Ref. [47] are retained.
1399
+ A comparison of Tables V and VI shows that the
1400
+ configurations of the ground levels obtained within the
1401
+ SRC approach differ from the RAV ground-state config-
1402
+ urations in almost half of the cases (for convenience, the
1403
+ corresponding values of Z are typed in a bold font). This
1404
+ result indicates the complex level structure of the SHEs,
1405
+ which is discussed in details for Z = 125 in Sec. III.
1406
+ The subsequent discussion consists of two parts. At
1407
+ first, we identify general trends for the results of the
1408
+ many-configuration calculations and compare them with
1409
+ the single-configuration ones. We note, that the DCBQ-
1410
+ CI1 and DCBQ-CI2 results are, in general, not much
1411
+ different. Therefore, in this part we often drop the in-
1412
+ dices "1" or "2" and use the generalized designation
1413
+ "DCBQ-CI" for the many-configuration calculations. In
1414
+ the second part, we compare the results obtained by the
1415
+ configuration-interaction method CI1 and CI2 with each
1416
+ other.
1417
+ Exactly as the DCBQ-RAV scheme predicts, our
1418
+ many-configuration DCBQ-CI results detect the first ap-
1419
+ pearance of the 5g electron in the ground state for the
1420
+ SHE with Z = 125. However, in contrast to the DCBQ-
1421
+ RAV results, the DCBQ-CI schemes predict that the 5g
1422
+ shell becomes closed for Z = 145 instead of Z = 144. In
1423
+ the range Z = 125 – 132, the many-configuration calcula-
1424
+ tions reveal that the dominant configurations of the ob-
1425
+ tained ground-state levels in all eight cases differ from the
1426
+ ones obtained within the DCBQ-RAV approach. More-
1427
+ over, a configuration mixing in the ground states takes
1428
+ place for some SHEs in range Z = 125 – 145 as the 5g
1429
+ shells are gradually occupied.
1430
+ In most of the consid-
1431
+ ered cases, the weights of the dominant configurations
1432
+ lie in range 0.80 – 0.90. The configurations with the dif-
1433
+ ferent occupation numbers for the 8p1/2, 7d3/2, 6f5/2,
1434
+ and 5g7/2,9/2 shells are admixed. The DCBQ-CI schemes
1435
+ show that starting from Z = 130 the dominant con-
1436
+ figuration of the ground-state level has the 8p1/2 shell
1437
+ fully occupied. However, the configurations with the par-
1438
+ tially occupied 8p1/2 shell contribute (with the weights
1439
+
1440
+ 9
1441
+ about 0.05 or higher) to these levels up approximately
1442
+ Z ≈ 135 − 137.
1443
+ A mixture of the configurations with the partially oc-
1444
+ cupied 7d3/2 and 6f5/2 shells occurs also in the range Z =
1445
+ 147 – 151. The situation with the ground states becomes
1446
+ more clear starting from the SHE with Z = 152, when the
1447
+ 6f5/2 shell turns out to be fully occupied. Up to Z = 165,
1448
+ the weights of the dominant configurations are larger
1449
+ than 0.90, and in most of the cases the dominant con-
1450
+ figurations of the ground-state levels coincide with the
1451
+ ground-state configurations obtained within the DCBQ-
1452
+ RAV approach.
1453
+ In particular, the fact that the SHE
1454
+ with Z = 164 possesses the ground-state configuration
1455
+ with all the relativistic shells closed is confirmed by the
1456
+ more elaborated methods.
1457
+ The SHEs with Z = 168
1458
+ and Z = 169 demonstrate within the DCBQ-CI1 scheme
1459
+ poorly resolved dominant configurations of the ground-
1460
+ state levels. For instance, the DCBQ-CI1 weight of the
1461
+ dominant configuration for Z = 168 is only 0.55, which
1462
+ was not the case even for the SHEs with the open 5g7/2
1463
+ and 5g9/2 shells. However, increasing the number of the
1464
+ active orbitals remedies the situation, and for Z = 168
1465
+ the DCBQ-CI2 scheme yields the dominant-configuration
1466
+ weight equal to 0.92. This is due to the fact that the levels
1467
+ interchange, see the corresponding discussion in Sec. III.
1468
+ The
1469
+ overall
1470
+ trends
1471
+ obtained
1472
+ in
1473
+ our
1474
+ many-
1475
+ configuration calculations are the following.
1476
+ First,
1477
+ the configurations which have the lowest levels within
1478
+ the DCBQ-SRC approach are the dominant ones con-
1479
+ tributing to the ground-state levels within the DCBQ-CI
1480
+ approach in about 80% of the considered cases. Second,
1481
+ the ground-state levels obtained without the electronic
1482
+ correlations using the DCBQ-SRC scheme in about 75%
1483
+ of the cases coincide with the ones obtained by means
1484
+ of the DCBQ-CI approach. The deviations are mainly
1485
+ concentrated in the range Z = 131 − 138, where the
1486
+ 5g7/2 and 5g9/2 shells are partially occupied and strong
1487
+ interaction between several configurations takes place.
1488
+ The simultaneous change of the dominant configuration
1489
+ and the ground-state level when passing from the DCBQ-
1490
+ SRC to the DCBQ-CI method occurs for, e.g., Z = 131.
1491
+ In this case the first scheme yields JSRC
1492
+ =
1493
+ 25/2
1494
+ of the configuration KSRC
1495
+ =
1496
+ 8p1
1497
+ 1/27d1
1498
+ 3/26f 3
1499
+ 5/25g6
1500
+ 7/2,
1501
+ whereas the second scheme predicts the lowest level
1502
+ to be JCI
1503
+ = 21/2 with the dominant configuration
1504
+ being KCI
1505
+ =
1506
+ 8p2
1507
+ 1/26f 3
1508
+ 5/25g6
1509
+ 7/2
1510
+ with the weight of
1511
+ about 0.82 − 0.85.
1512
+ Now we proceed to contrast of the two DCBQ-CI
1513
+ schemes results. Compared to the DCBQ-CI1 data, the
1514
+ more accurate treatment of the electron-electron corre-
1515
+ lations by means of the DCBQ-CI2 approach results in
1516
+ the changes of the ground-state level in 4 of 51 cases.
1517
+ In 3 of these 4 cases, the configuration which gives the
1518
+ maximum contribution to the ground-state level changes
1519
+ as well. These SHEs, which need particular attention,
1520
+ are the ones with Z = 130, 137, 143, and 168. For in-
1521
+ stance, for Z = 130, the level J = 14 of the dom-
1522
+ inant configuration K = 8p1
1523
+ 1/27d1
1524
+ 3/26f 3
1525
+ 5/25g5
1526
+ 7/2 is pre-
1527
+ dicted to be the ground-state one in both DCBQ-SRC
1528
+ and DCBQ-CI1 schemes: KSRC = KCI1 = K.
1529
+ How-
1530
+ ever, the electronic correlations evaluated by means of the
1531
+ DCBQ-CI2 scheme change the ground-state level, and it
1532
+ becomes J = 12 with the dominant configuration be-
1533
+ ing KCI2 = 8p2
1534
+ 1/26f 3
1535
+ 5/25g5
1536
+ 7/2 ̸= K.
1537
+ We compare our DCBQ-CI2 results with the only
1538
+ available systematic many-configuration calculations of
1539
+ Ref. [47] where the Breit interaction was taken into ac-
1540
+ count as well. Since the quantum numbers J which char-
1541
+ acterize the ground-state levels are not presented in that
1542
+ paper, we are able to compare only the configurations.
1543
+ We found a disagreement in the configurations contribut-
1544
+ ing to the ground states for the SHEs with Z = 123 – 128,
1545
+ Z = 130, Z = 136 – 137, Z = 143 – 144, Z = 152 – 156,
1546
+ and Z = 163. It is difficult to reveal a possible reason
1547
+ of the discrepancy due to the lack of the computational
1548
+ details given in Ref. [47].
1549
+ The changes of the ground-state levels in transition
1550
+ from the DCBQ-CI1 to the DCBQ-CI2 calculations and
1551
+ the deviations from the previous results raise the fol-
1552
+ lowing question: can hypothetical larger CI calculations
1553
+ change the obtained ground states as the DCBQ-CI2
1554
+ scheme changes the ground states in comparison with
1555
+ the DCBQ-CI1 one?
1556
+ A comprehensive answer can be
1557
+ given only within the scope of the corresponding large-
1558
+ scale CI calculations.
1559
+ However, to get an idea of the
1560
+ cases for which the correlation effects may change the
1561
+ dominant configuration of the ground-state level, we in-
1562
+ vestigate the behavior of the energy difference between
1563
+ the ground-state level and the closest level belonging to a
1564
+ different dominant configuration for both our DCBQ-CI
1565
+ calculations. This study allows us to determine whether
1566
+ the ground-state level is in some sense isolated from levels
1567
+ of other configurations and whether the electronic corre-
1568
+ lations break down this isolation. The absolute values of
1569
+ the corresponding differences are presented in Table VII.
1570
+ The SHE with Z = 120 is omitted in Table VII, since it
1571
+ possesses the ground-state configuration K∗ = [Og]8s2
1572
+ 1/2
1573
+ that causes no doubt.
1574
+ As it is seen from Table VII, some SHEs have
1575
+ a clear separation of the ground-state level from lev-
1576
+ els of other configurations which almost does not de-
1577
+ pend on the correlation-treatment scheme. For instance,
1578
+ for Z = 121, the separations of the levels in the DCBQ-
1579
+
1580
+ 10
1581
+ TABLE VII. The absolute values of the energy difference between the ground-state level of the dominant configuration K∗
1582
+ and the closest excited level belonging to the dominant configuration which is different from K∗ for the SHEs in the range
1583
+ 121 ≤ Z ≤ 170 (a.u.). The results are presented for the DCBQ-CI1 and DCBQ-CI2 schemes.
1584
+ Z
1585
+ CI1
1586
+ CI2
1587
+ Z
1588
+ CI1
1589
+ CI2
1590
+ Z
1591
+ CI1
1592
+ CI2
1593
+ Z
1594
+ CI1
1595
+ CI2
1596
+ Z
1597
+ CI1
1598
+ CI2
1599
+ 121
1600
+ 0.0399
1601
+ 0.0378
1602
+ 131
1603
+ 0.0047
1604
+ 0.0069
1605
+ 141
1606
+ 0.0195
1607
+ 0.0106
1608
+ 151
1609
+ 0.0176
1610
+ 0.0114
1611
+ 161
1612
+ 0.0103
1613
+ 0.0059
1614
+ 122
1615
+ 0.0127
1616
+ 0.0107
1617
+ 132
1618
+ 0.0083
1619
+ 0.0118
1620
+ 142
1621
+ 0.0143
1622
+ 0.0046
1623
+ 152
1624
+ 0.0059
1625
+ 0.0122
1626
+ 162
1627
+ 0.0094
1628
+ 0.0016
1629
+ 123
1630
+ 0.0299
1631
+ 0.0351
1632
+ 133
1633
+ 0.0254
1634
+ 0.0204
1635
+ 143
1636
+ 0.0015
1637
+ 0.0116
1638
+ 153
1639
+ 0.0062
1640
+ 0.0129
1641
+ 163
1642
+ 0.0111
1643
+ 0.0176
1644
+ 124
1645
+ 0.0050
1646
+ 0.0046
1647
+ 134
1648
+ 0.0313
1649
+ 0.0270
1650
+ 144
1651
+ 0.0013
1652
+ 0.0129
1653
+ 154
1654
+ 0.0107
1655
+ 0.0008
1656
+ 164
1657
+ 0.0492
1658
+ 0.0542
1659
+ 125
1660
+ 0.0062
1661
+ 0.0057
1662
+ 135
1663
+ 0.0165
1664
+ 0.0125
1665
+ 145
1666
+ 0.0539
1667
+ 0.0376
1668
+ 155
1669
+ 0.0108
1670
+ 0.0257
1671
+ 165
1672
+ 0.0424
1673
+ 0.0443
1674
+ 126
1675
+ 0.0106
1676
+ 0.0126
1677
+ 136
1678
+ 0.0062
1679
+ 0.0095
1680
+ 146
1681
+ 0.0352
1682
+ 0.0273
1683
+ 156
1684
+ 0.0136
1685
+ 0.0110
1686
+ 166
1687
+ 0.0153
1688
+ 0.0305
1689
+ 127
1690
+ 0.0070
1691
+ 0.0089
1692
+ 137
1693
+ 0.0011
1694
+ 0.0043
1695
+ 147
1696
+ 0.0398
1697
+ 0.0349
1698
+ 157
1699
+ 0.0208
1700
+ 0.0212
1701
+ 167
1702
+ 0.0022
1703
+ 0.0096
1704
+ 128
1705
+ 0.0116
1706
+ 0.0123
1707
+ 138
1708
+ 0.0248
1709
+ 0.0303
1710
+ 148
1711
+ 0.0715
1712
+ 0.0760
1713
+ 158
1714
+ 0.0529
1715
+ 0.0555
1716
+ 168
1717
+ 0.0244
1718
+ 0.0091
1719
+ 129
1720
+ 0.0071
1721
+ 0.0034
1722
+ 139
1723
+ 0.0370
1724
+ 0.0322
1725
+ 149
1726
+ 0.0583
1727
+ 0.0568
1728
+ 159
1729
+ 0.0568
1730
+ 0.0581
1731
+ 169
1732
+ 0.0066
1733
+ 0.0087
1734
+ 130
1735
+ 0.0022
1736
+ 0.0009
1737
+ 140
1738
+ 0.0237
1739
+ 0.0088
1740
+ 150
1741
+ 0.0295
1742
+ 0.0300
1743
+ 160
1744
+ 0.0308
1745
+ 0.0285
1746
+ 170
1747
+ 0.0287
1748
+ 0.0324
1749
+ CI1 and DCBQ-CI2 schemes constitute 0.0399 a.u.
1750
+ and 0.0378 a.u., respectively. In other cases, the ground-
1751
+ state level becomes more isolated from the levels of other
1752
+ configurations as the correlation treatment is improved.
1753
+ So, for Z = 155, the separation increases from 0.0108 a.u.
1754
+ in the DCBQ-CI1 scheme to 0.0257 a.u. in the DCBQ-
1755
+ CI2 one. In spite of this, it is difficult to formulate for
1756
+ all the systems under consideration a reliable criteria to
1757
+ determine if the dominant configuration contributing to
1758
+ the ground-state level does change with increase of the
1759
+ configuration-space. From this point of view, the most
1760
+ suspicious SHEs are the ones which have a small (less
1761
+ than a few thousandths of a.u.) separation between the
1762
+ considered levels within the DCBQ-CI2 scheme. In addi-
1763
+ tion, we also include in this category the cases where the
1764
+ separation between the levels significantly decreases in
1765
+ the DCBQ-CI2 scheme compared to the DCBQ-CI1 re-
1766
+ sults. Analyzing the data in Table VII, we consider the
1767
+ SHEs with Z = 129, 130, 137, 140, 142, 154, 161, 162, 168,
1768
+ and 169 as those that can possibly have a different domi-
1769
+ nant configuration of the ground-state level than the one
1770
+ obtained within the DCBQ-CI2 scheme. These elements
1771
+ have to be studied within the more elaborated electron-
1772
+ correlation calculations.
1773
+ V.
1774
+ CONCLUSION
1775
+ In the scope of the present paper, we have performed
1776
+ the extensive relativistic study of the ground states of
1777
+ the superheavy elements in the range 120 ≤ Z ≤ 170.
1778
+ The Breit interaction is rigorously taken into in the cal-
1779
+ culations, and the QED effects are considered within
1780
+ the model-QED-operator approach [51–53]. The ground-
1781
+ state configurations are first determined by means of
1782
+ the Dirac-Fock method in the relativistic-configuration-
1783
+ average approximation. It is deduced that the QED ef-
1784
+ fects can not change the ground-state configuration in
1785
+ contrast to the Breit interaction.
1786
+ To resolve the level structure of the configurations,
1787
+ the ground-state levels are found using the configuration-
1788
+ interaction method in the basis of the Dirac-Fock-Sturm
1789
+ orbitals. We study the general trends in the order of oc-
1790
+ cupation of orbitals in the SHE. We obtain that in spite of
1791
+ the complex electronic structure of the considered SHEs,
1792
+ the ground-state levels have distinct dominant configura-
1793
+ tions with the weights exceeding 0.85. Finally, we demon-
1794
+ strate that the electron-correlation effects can change the
1795
+ dominant configuration of the ground-state level.
1796
+ For
1797
+ some SHEs, the large-scale calculations are needed in or-
1798
+ der to more reliably determine the ground states and
1799
+ the structure of low-lying energy levels.
1800
+ Nevertheless,
1801
+ the ground-state configurations of the SHEs obtained in
1802
+ the present work within the many-configuration approach
1803
+ can be used as a solid basis for accurate calculations of
1804
+ various atomic properties of these elements as well as
1805
+ to examine the role of the electron-electron correlations,
1806
+ QED, and relativistic effects on the Periodic Law.
1807
+ VI.
1808
+ ACKNOWLEDGEMENTS
1809
+ We thank Yu. Ts. Oganessian for stimulating dis-
1810
+ cussions. Valuable conversations with E. Eliav, V. Per-
1811
+ shina, and A. V. Titov are also gratefully acknowl-
1812
+ edged. The work was supported by the Ministry of Sci-
1813
+ ence and Higher Education of the Russian Federation
1814
+ within Grant No. 075-10-2020-117.
1815
+
1816
+ 11
1817
+ [1] P. Pyykkö and J. P. Desclaux, Accounts of Chemical Re-
1818
+ search 12, 276 (1978).
1819
+ [2] P. Pyykkö, Chemical Reviews 88, 563 (1988).
1820
+ [3] P. Pyykkö, Chemical Reviews 112, 371 (2012).
1821
+ [4] Y. T. Oganessian and V. K. Utyonkov, Reports on
1822
+ Progress in Physics 78, 036301 (2015).
1823
+ [5] Y. T. Oganessian, A. Sobiczewski, and G. M. Ter-
1824
+ Akopian, Physica Scripta 92, 023003 (2017).
1825
+ [6] V. Pershina, Nuclear Physics A 944, 578 (2015).
1826
+ [7] V. Pershina, Radiochimica Acta 107, 833 (2019).
1827
+ [8] S. A. Giuliani, Z. Matheson, W. Nazarewicz, E. Olsen, P.-
1828
+ G. Reinhard, J. Sadhukhan, B. Schuetrumpf, N. Schunck,
1829
+ and P. Schwerdtfeger, Reviews of Modern Physics 91,
1830
+ 011001 (2019).
1831
+ [9] T. K. Sato, M. Asai, A. Borschevsky, T. Stora, N. Sato,
1832
+ Y. Kaneya, K. Tsukada, C. E. Düllmann, K. Eber-
1833
+ hardt, E. Eliav, S. Ichikawa, U. Kaldor, J. V. Kratz,
1834
+ S. Miyashita, Y. Nagame, K. Ooe, A. Osa, D. Renisch,
1835
+ J. Runke, M. Schädel, P. Thörle-Pospiech, A. Toyoshima,
1836
+ and N. Trautmann, Nature 520, 209 (2015).
1837
+ [10] E. Eliav, U. Kaldor, Y. Ishikawa, and P. Pyykkö, Physical
1838
+ Review Letters 77, 5350 (1996).
1839
+ [11] I. Goidenko, L. Labzowsky, E. Eliav, U. Kaldor, and
1840
+ P. Pyykkö, Physical Review A 67, 020102 (2003).
1841
+ [12] B. G. C. Lackenby, V. A. Dzuba, and V. V. Flambaum,
1842
+ Physical Review A 98, 042512 (2018).
1843
+ [13] Y. Guo, L. F. Pašteka, E. Eliav, and A. Borschevsky,
1844
+ Advances in Quantum Chemistry 83, 107 (2021).
1845
+ [14] M. Y. Kaygorodov, L. V. Skripnikov, I. I. Tupitsyn,
1846
+ E. Eliav, Y. S. Kozhedub, A. V. Malyshev, A. V. Oleyn-
1847
+ ichenko, V. M. Shabaev, A. V. Titov, and A. V. Zait-
1848
+ sevskii, Physical Review A 104, 012819 (2021).
1849
+ [15] P. Pyykkö, Physical Chemistry Chemical Physics 13, 161
1850
+ (2011).
1851
+ [16] O. R. Smits, P. Indelicato, W. Nazarewicz, M. Piibeleht,
1852
+ and P. Schwerdtfeger, hal-03884148 (2022).
1853
+ [17] I. Pomeranchuk and J. Smorodinsky, J. Phys. USSR 9,
1854
+ 97 (1945).
1855
+ [18] V. Voronkov and N. Kolesnikov, Zh. Eksp. Teor. Fiz. 39,
1856
+ 189 (1961), [Sov. Phys. JETP 12, 136 (1961)].
1857
+ [19] S. S. Gershtein and Y. B. Zel’dovich, Zh. Eksp. Teor. Fiz.
1858
+ 57, 654 (1969), [Sov. Phys. JETP 30, 358 (1970)]; Lett.
1859
+ Nuovo Cimento 1, 835 (1969).
1860
+ [20] W. Pieper and W. Greiner, Z. Phys. 218, 327 (1969).
1861
+ [21] Y. B. Zel’dovich and V. S. Popov, Usp. Fiz. Nauk 105,
1862
+ 403 (1971), [Sov. Phys. Usp. 14, 673 (1972)].
1863
+ [22] W.
1864
+ Greiner,
1865
+ B.
1866
+ Müller,
1867
+ and
1868
+ J.
1869
+ Rafelski,
1870
+ Quantum Electrodynamics of Strong Fields,
1871
+ 1st
1872
+ ed.,
1873
+ Theoretical and Mathematical Physics (Springer Berlin,
1874
+ Heidelberg, 1985).
1875
+ [23] V. S. Popov, Yad. Fiz. 64, 421 (2001), [Phys. At. Nucl.
1876
+ 64, 367 (2001)].
1877
+ [24] S. I. Godunov, B. Machet, and M. I. Vysotsky, The Eu-
1878
+ ropean Physical Journal C 77, 782 (2017).
1879
+ [25] J. Rafelski, J. Kirsch, B. Müller, J. Reinhardt, and
1880
+ W. Greiner, Probing QED Vacuum with Heavy Ions
1881
+ (Springer, Cham, 2017) pp. 211–251.
1882
+ [26] R. V. Popov, V. M. Shabaev, D. A. Telnov, I. I. Tupitsyn,
1883
+ I. A. Maltsev, Y. S. Kozhedub, A. I. Bondarev, N. V.
1884
+ Kozin, X. Ma, G. Plunien, T. Stöhlker, D. A. Tumakov,
1885
+ and V. A. Zaytsev, Phys. Rev. D 102, 076005 (2020).
1886
+ [27] D. N. Voskresensky, Universe 7, 104 (2021).
1887
+ [28] A. Krasnov and K. Sveshnikov, Modern Physics Letters
1888
+ A 37, 2250136 (2022).
1889
+ [29] J. B. Mann and J. T. Waber, The Journal of Chemical
1890
+ Physics 53, 2397 (1970).
1891
+ [30] C. Lu, T. Carlson, F. Malik, T. Tucker, and C. Nestor,
1892
+ Atomic Data and Nuclear Data Tables 3, 1 (1971).
1893
+ [31] B. Fricke, W. Greiner, and J. T. Waber, Theoretica chim-
1894
+ ica acta 21, 235 (1971).
1895
+ [32] B. Fricke and J. T. Waber, The Journal of Chemical
1896
+ Physics 57, 371 (1972).
1897
+ [33] J. Desclaux, Atomic Data and Nuclear Data Tables 12,
1898
+ 311 (1973).
1899
+ [34] B. Fricke and G. Soff, Atomic Data and Nuclear Data
1900
+ Tables 19, 83 (1977).
1901
+ [35] K. Umemoto and S. Saito, Journal of the Physical Society
1902
+ of Japan 65, 3175 (1996).
1903
+ [36] Z. Zhou, J. Kas, J. Rehr, and W. Ermler, Atomic Data
1904
+ and Nuclear Data Tables 114, 262 (2017).
1905
+ [37] E. Eliav, S. Shmulyian, U. Kaldor, and Y. Ishikawa, The
1906
+ Journal of Chemical Physics 109, 3954 (1998).
1907
+ [38] E. Eliav, A. Landau, Y. Ishikawa, and U. Kaldor, Journal
1908
+ of Physics B: Atomic, Molecular and Optical Physics 35,
1909
+ 1693 (2002).
1910
+ [39] I. S. Lim, P. Schwerdtfeger, B. Metz, and H. Stoll, The
1911
+ Journal of Chemical Physics 122, 104103 (2005).
1912
+ [40] P. Indelicato, J. P. Santos, S. Boucard, and J.-P. De-
1913
+ sclaux, The European Physical Journal D 45, 155 (2007).
1914
+ [41] P. Indelicato, J. Bieroń, and P. Jönsson, Theoretical
1915
+ Chemistry Accounts 129, 495 (2011).
1916
+ [42] L. V. Skripnikov, N. S. Mosyagin, and A. V. Titov, Chem-
1917
+ ical Physics Letters 555, 79 (2013).
1918
+ [43] A. Borschevsky, V. Pershina, E. Eliav, and U. Kaldor,
1919
+ The Journal of Chemical Physics 138, 124302 (2013).
1920
+ [44] J. S. M. Ginges and J. C. Berengut, Physical Review A
1921
+ 93, 052509 (2016); Journal of Physics B: Atomic, Molec-
1922
+ ular and Optical Physics 49, 095001 (2016).
1923
+ [45] A. V. Zaitsevskii, Y. A. Demidov, N. S. Mosyagin, L. V.
1924
+ Skripnikov, and A. V. Titov, Rad. Applic. 1, 132 (2016).
1925
+ [46] I. I. Tupitsyn, A. V. Malyshev, D. A. Glazov, M. Y.
1926
+ Kaygorodov, Y. S. Kozhedub, I. M. Savelyev, and V. M.
1927
+ Shabaev, Optika i Spektroskopiya 129, 841 (2021), [Opt.
1928
+ Spectrosc. 129, 1038 (2021)].
1929
+ [47] V. I. Nefedov, M. B. Trzhaskovskaya, and V. G. Yarzhem-
1930
+ skii, Doklady Physical Chemistry 408, 149 (2006).
1931
+ [48] I. I. Tupitsyn, V. M. Shabaev, J. R. Crespo López-
1932
+ Urrutia, I. Draganić, R. Soria Orts, and J. Ullrich, Phys-
1933
+ ical Review A 68, 022511 (2003).
1934
+
1935
+ 12
1936
+ [49] I. I. Tupitsyn, A. V. Volotka, D. A. Glazov, V. M.
1937
+ Shabaev,
1938
+ G. Plunien,
1939
+ J. R. Crespo López-Urrutia,
1940
+ A. Lapierre, and J. Ullrich, Physical Review A 72, 062503
1941
+ (2005).
1942
+ [50] I. I. Tupitsyn, N. A. Zubova, V. M. Shabaev, G. Plunien,
1943
+ and T. Stöhlker, Physical Review A 98, 022517 (2018).
1944
+ [51] V. M. Shabaev, I. I. Tupitsyn, and V. A. Yerokhin, Phys-
1945
+ ical Review A 88, 012513 (2013).
1946
+ [52] V. M. Shabaev, I. I. Tupitsyn, and V. A. Yerokhin, Com-
1947
+ puter Physics Communications 189, 175 (2015); 223, 69
1948
+ (2018).
1949
+ [53] A. V. Malyshev, D. A. Glazov, V. M. Shabaev, I. I. Tupit-
1950
+ syn, V. A. Yerokhin, and V. A. Zaytsev, Physical Review
1951
+ A 106, 012806 (2022).
1952
+ [54] I. Lindgren and A. Rosen, Case Studies in Atomic Physics
1953
+ IV 4, 93 (1975).
1954
+ [55] I. P. Grant, Proceedings of the Royal Society of London.
1955
+ Series A. Mathematical and Physical Sciences 262, 555
1956
+ (1961).
1957
+ [56] I. Grant, Advances in Physics 19, 747 (1970).
1958
+ [57] P. Indelicato and J. P. Desclaux, Physical Review A 42,
1959
+ 5139 (1990).
1960
+ [58] P. Pyykkö and L.-B. Zhao, Journal of Physics B: Atomic,
1961
+ Molecular and Optical Physics 36, 1469 (2003).
1962
+ [59] I. Draganić, J. R. Crespo López-Urrutia, R. DuBois,
1963
+ S. Fritzsche, V. M. Shabaev, R. S. Orts, I. I. Tupit-
1964
+ syn, Y. Zou, and J. Ullrich, Physical Review Letters 91,
1965
+ 183001 (2003).
1966
+ [60] V. V. Flambaum and J. S. M. Ginges, Physical Review
1967
+ A 72, 052115 (2005).
1968
+ [61] C. Thierfelder and P. Schwerdtfeger, Physical Review A
1969
+ 82, 062503 (2010).
1970
+ [62] I. I. Tupitsyn and E. V. Berseneva, Optika i Spek-
1971
+ troskopiya 114, 743 (2013), [Opt. Spectrosc. 114, 682
1972
+ (2013)].
1973
+ [63] L. V. Skripnikov, The Journal of Chemical Physics 154,
1974
+ 201101 (2021).
1975
+ [64] L. V. Skripnikov, D. V. Chubukov, and V. M. Shakhova,
1976
+ The Journal of Chemical Physics 155, 144103 (2021).
1977
+ [65] A. Sunaga and T. Saue, Molecular Physics 119, e1974592
1978
+ (2021).
1979
+ [66] A. Sunaga, M. Salman, and T. Saue, The Journal of
1980
+ Chemical Physics 157, 164101 (2022).
1981
+ [67] A. V. Oleynichenko, A. V. Zaitsevskii, N. S. Mosyagin,
1982
+ A. N. Petrov, E. Eliav, and A. V. Titov, Preprints 2022,
1983
+ 2022120530 (2022).
1984
+
1985
+ 13
1986
+ TABLE VI: The levels with lowest total energies, the main configurations contributing to them, and the total angular momenta
1987
+ J evaluated by means of the DCBQ-SRC, DCBQ-CI1, and DCBQ-CI2 schemes for the SHEs with the atomic numbers 120 ≤
1988
+ Z ≤ 170. For the DCBQ-CI1 and DCBQ-CI2 results, the configurations with weights of at least 0.05 are presented. The
1989
+ configurations obtained are given relative to the closed-shell configurations listed in the column “Closed shells”. In the first
1990
+ column, the values of Z typed in the bold font indicate the cases when the ground-state configurations obtained within the
1991
+ DCBQ-RAV and DCBQ-SRC methods differ. In addition, the following notations around Z are adopted to assist the reader
1992
+ in navigation through the table. The underline “
1993
+ ” means that the ground-state JSRC level evaluated using the DCBQ-SRC
1994
+ approach differs from the JCI1 one calculated by means of the DCBQ-CI1 approach, JSRC ̸= JCI1. The left vertical line “|
1995
+
1996
+ signalizes that the configuration KSRC which the ground-state SRC level belongs to differs from the dominant configuration KCI1
1997
+ of the ground-state CI1 level, KSRC ̸= KCI1. The overline “
1998
+ ” represents the fact that JCI1 ̸= JCI2. Finally, the right vertical
1999
+ line “
2000
+ |” stands for the case KCI1 ̸= KCI2. The obtained ground-state levels are compared with the results of Ref. [47]. The
2001
+ non-relativistic notation of Ref. [47] are retained.
2002
+ Z
2003
+ Closed
2004
+ DCBQ-SRC
2005
+ JSRC
2006
+ DCBQ-CI1
2007
+ JCI1
2008
+ DCBQ-CI2
2009
+ JCI2
2010
+ Ref. [47]
2011
+ Shells
2012
+ 120
2013
+ [Og]
2014
+ 8s2
2015
+ 1/2
2016
+ 0
2017
+ 0.94 · 8s2
2018
+ 1/2
2019
+ 0
2020
+ 0.93 · 8s2
2021
+ 1/2
2022
+ 0
2023
+ 8s2
2024
+ 121
2025
+ 8s2
2026
+ 1/28p1
2027
+ 1/2
2028
+ 1/2
2029
+ 0.92 · 8s2
2030
+ 1/28p1
2031
+ 1/2
2032
+ 1/2
2033
+ 0.91 · 8s2
2034
+ 1/28p1
2035
+ 1/2
2036
+ 1/2
2037
+ 8s28p1
2038
+ 122
2039
+ 8s2
2040
+ 1/28p1
2041
+ 1/27d1
2042
+ 3/2
2043
+ 2
2044
+ 0.85 · 8s2
2045
+ 1/28p1
2046
+ 1/27d1
2047
+ 3/2+
2048
+ 0.09 · 8s1
2049
+ 1/28p1
2050
+ 1/27d2
2051
+ 3/2
2052
+ 2
2053
+ 0.84 · 8s2
2054
+ 1/28p1
2055
+ 1/27d1
2056
+ 3/2+
2057
+ 0.07 · 8s1
2058
+ 1/28p1
2059
+ 1/27d2
2060
+ 3/2
2061
+ 2
2062
+ 7d18p1
2063
+ 123
2064
+ 8s2
2065
+ 1/28p1
2066
+ 1/27d1
2067
+ 3/26f1
2068
+ 5/2
2069
+ 9/2
2070
+ 0.83 · 8s2
2071
+ 1/28p1
2072
+ 1/27d1
2073
+ 3/26f1
2074
+ 5/2+
2075
+ 0.14 · 8s1
2076
+ 1/28p1
2077
+ 1/27d2
2078
+ 3/26f1
2079
+ 5/2
2080
+ 9/2
2081
+ 0.82 · 8s2
2082
+ 1/28p1
2083
+ 1/27d1
2084
+ 3/26f1
2085
+ 5/2+
2086
+ 0.09 · 8s1
2087
+ 1/28p1
2088
+ 1/27d2
2089
+ 3/26f1
2090
+ 5/2
2091
+ 9/2
2092
+ 6f28p1
2093
+ |124
2094
+ +8s2
2095
+ 8p1
2096
+ 1/27d1
2097
+ 3/26f2
2098
+ 5/2
2099
+ 6
2100
+ 0.83 · 8p1
2101
+ 1/26f3
2102
+ 5/2+
2103
+ 0.10 · 8p1
2104
+ 1/26f2
2105
+ 5/26f1
2106
+ 7/2
2107
+ 5
2108
+ 0.85 · 8p1
2109
+ 1/26f3
2110
+ 5/2+
2111
+ 0.07 · 8p1
2112
+ 1/26f2
2113
+ 5/26f1
2114
+ 7/2
2115
+ 5
2116
+ 6f28p2
2117
+ 125
2118
+ 8p1
2119
+ 1/27d1
2120
+ 3/26f2
2121
+ 5/25g1
2122
+ 7/2 17/2
2123
+ 0.96 · 8p1
2124
+ 1/27d1
2125
+ 3/26f2
2126
+ 5/25g1
2127
+ 7/2
2128
+ 17/2
2129
+ 0.94 · 8p1
2130
+ 1/27d1
2131
+ 3/26f2
2132
+ 5/25g1
2133
+ 7/2
2134
+ 17/2
2135
+ 0.81 · 5g16f28p2+
2136
+ 0.17 · 5g16f17d28p1+
2137
+ 0.02 · 6f37d18p1
2138
+ 126
2139
+ 8p1
2140
+ 1/27d1
2141
+ 3/26f2
2142
+ 5/25g2
2143
+ 7/2
2144
+ 10
2145
+ 0.93 · 8p1
2146
+ 1/27d1
2147
+ 3/26f2
2148
+ 5/25g2
2149
+ 7/2
2150
+ 10
2151
+ 0.92 · 8p1
2152
+ 1/27d1
2153
+ 3/26f2
2154
+ 5/25g2
2155
+ 7/2
2156
+ 10
2157
+ 0.998 · 5g26f38p1+
2158
+ 0.002 · 5g26f28p2
2159
+ 127
2160
+ 8p1
2161
+ 1/27d1
2162
+ 3/26f2
2163
+ 5/25g3
2164
+ 7/2 27/2
2165
+ 0.95 · 8p1
2166
+ 1/27d1
2167
+ 3/26f2
2168
+ 5/25g3
2169
+ 7/2
2170
+ 27/2
2171
+ 0.94 · 8p1
2172
+ 1/27d1
2173
+ 3/26f2
2174
+ 5/25g3
2175
+ 7/2
2176
+ 27/2
2177
+ 0.88 · 5g36f28p2+
2178
+ 0.12 · 5g36f17d28p1
2179
+ 128
2180
+ 8p1
2181
+ 1/27d1
2182
+ 3/26f2
2183
+ 5/25g4
2184
+ 7/2
2185
+ 14
2186
+ 0.80 · 8p1
2187
+ 1/27d1
2188
+ 3/26f2
2189
+ 5/25g4
2190
+ 7/2+
2191
+ 0.14 · 8p1
2192
+ 1/27d1
2193
+ 3/26f2
2194
+ 5/25g3
2195
+ 7/25g1
2196
+ 9/2
2197
+ 14
2198
+ 0.81 · 8p1
2199
+ 1/27d1
2200
+ 3/26f2
2201
+ 5/25g4
2202
+ 7/2+
2203
+ 0.13 · 8p1
2204
+ 1/27d1
2205
+ 3/26f2
2206
+ 5/25g3
2207
+ 7/25g1
2208
+ 9/2
2209
+ 14
2210
+ 0.88 · 5g46f28p2+
2211
+ 0.12 · 5g46f17d28p1
2212
+ 129
2213
+ 8p1
2214
+ 1/27d1
2215
+ 3/26f3
2216
+ 5/25g4
2217
+ 7/2 29/2
2218
+ 0.93 · 8p1
2219
+ 1/27d1
2220
+ 3/26f3
2221
+ 5/25g4
2222
+ 7/2+
2223
+ 0.06 · 8p1
2224
+ 1/27d1
2225
+ 3/26f2
2226
+ 5/25g4
2227
+ 7/26f1
2228
+ 7/2
2229
+ 29/2
2230
+ 0.94 · 8p1
2231
+ 1/27d1
2232
+ 3/26f3
2233
+ 5/25g4
2234
+ 7/2
2235
+ 29/2
2236
+ 5g46f37d18p1
2237
+ 130|
2238
+ 8p1
2239
+ 1/27d1
2240
+ 3/26f3
2241
+ 5/25g5
2242
+ 7/2
2243
+ 14
2244
+ 0.92 · 8p1
2245
+ 1/27d1
2246
+ 3/26f3
2247
+ 5/25g5
2248
+ 7/2+
2249
+ 0.06 · 8p1
2250
+ 1/27d1
2251
+ 3/26f2
2252
+ 5/25g5
2253
+ 7/26f1
2254
+ 7/2
2255
+ 14
2256
+ 0.85 · 8p2
2257
+ 1/26f3
2258
+ 5/25g5
2259
+ 7/2+
2260
+ 0.06 · 7d2
2261
+ 3/26f3
2262
+ 5/25g5
2263
+ 7/2
2264
+ 12
2265
+ 5g56f37d18p1
2266
+ |131
2267
+ 8p1
2268
+ 1/27d1
2269
+ 3/26f3
2270
+ 5/25g6
2271
+ 7/2 25/2
2272
+ 0.82 · 8p2
2273
+ 1/26f3
2274
+ 5/25g6
2275
+ 7/2+
2276
+ 0.06 · 7d2
2277
+ 3/26f3
2278
+ 5/25g6
2279
+ 7/2+
2280
+ 0.06 · 8p1
2281
+ 1/27d2
2282
+ 3/26f2
2283
+ 5/25g6
2284
+ 7/2+
2285
+ 0.05 · 8p2
2286
+ 1/26f2
2287
+ 5/25g6
2288
+ 7/26f1
2289
+ 7/2
2290
+ 21/2
2291
+ 0.85 · 8p2
2292
+ 1/26f3
2293
+ 5/25g6
2294
+ 7/2+
2295
+ 0.05 · 7d2
2296
+ 3/26f3
2297
+ 5/25g6
2298
+ 7/2
2299
+ 21/2
2300
+ 0.86 · 5g66f38p2+
2301
+ 0.14 · 5g66f27d28p1
2302
+ |132
2303
+ 8p1
2304
+ 1/27d1
2305
+ 3/26f3
2306
+ 5/25g7
2307
+ 7/2
2308
+ 10
2309
+ 0.84 · 8p2
2310
+ 1/26f3
2311
+ 5/25g7
2312
+ 7/2+
2313
+ 0.08 · 8p1
2314
+ 1/27d2
2315
+ 3/26f2
2316
+ 5/25g7
2317
+ 7/2+
2318
+ 0.06 · 7d2
2319
+ 3/26f3
2320
+ 5/25g7
2321
+ 7/2
2322
+ 6
2323
+ 0.87 · 8p2
2324
+ 1/26f3
2325
+ 5/25g7
2326
+ 7/2+
2327
+ 0.05 · 7d2
2328
+ 3/26f3
2329
+ 5/25g7
2330
+ 7/2
2331
+ 6
2332
+ 5g76f38p2
2333
+
2334
+ 14
2335
+ TABLE VI. (Continuation.)
2336
+ Z
2337
+ Closed
2338
+ DCBQ-SRC
2339
+ JSRC
2340
+ DCBQ-CI1
2341
+ JCI1
2342
+ DCBQ-CI2
2343
+ JCI2
2344
+ Ref. [47]
2345
+ Shells
2346
+ |133
2347
+ 8p1
2348
+ 1/27d1
2349
+ 3/26f3
2350
+ 5/25g8
2351
+ 7/2 13/2
2352
+ 0.83 · 8p2
2353
+ 1/26f3
2354
+ 5/25g8
2355
+ 7/2+
2356
+ 0.09 · 8p1
2357
+ 1/27d2
2358
+ 3/26f2
2359
+ 5/25g8
2360
+ 7/2
2361
+ 9/2
2362
+ 0.87 · 8p2
2363
+ 1/26f3
2364
+ 5/25g8
2365
+ 7/2
2366
+ 9/2
2367
+ 5g86f38p2
2368
+ |134 +5g8
2369
+ 7/2
2370
+ 8p1
2371
+ 1/27d1
2372
+ 3/26f4
2373
+ 5/2
2374
+ 6
2375
+ 0.82 · 8p2
2376
+ 1/26f4
2377
+ 5/2+
2378
+ 0.07 · 8p1
2379
+ 1/27d2
2380
+ 3/26f3
2381
+ 5/2+
2382
+ 0.06 · 7d2
2383
+ 3/26f4
2384
+ 5/2
2385
+ 4
2386
+ 0.84 · 8p2
2387
+ 1/26f4
2388
+ 5/2+
2389
+ 0.05 · 8p1
2390
+ 1/27d2
2391
+ 3/26f3
2392
+ 5/2+
2393
+ 0.05 · 7d2
2394
+ 3/26f4
2395
+ 5/2
2396
+ 4
2397
+ 5g86f48p2
2398
+ |135
2399
+ 8p2
2400
+ 1/27d1
2401
+ 3/26f3
2402
+ 5/25g1
2403
+ 9/2 13/2
2404
+ 0.82 · 8p2
2405
+ 1/26f4
2406
+ 5/25g1
2407
+ 9/2+
2408
+ 0.08 · 8p1
2409
+ 1/27d2
2410
+ 3/26f3
2411
+ 5/25g1
2412
+ 9/2+
2413
+ 0.05 · 7d2
2414
+ 3/26f4
2415
+ 5/25g1
2416
+ 9/2
2417
+ 5/2
2418
+ 0.85 · 8p2
2419
+ 1/26f4
2420
+ 5/25g1
2421
+ 9/2+
2422
+ 0.06 · 8p1
2423
+ 1/27d2
2424
+ 3/26f3
2425
+ 5/25g1
2426
+ 9/2
2427
+ 5/2
2428
+ 5g96f48p2
2429
+ 136
2430
+ 8p2
2431
+ 1/27d1
2432
+ 3/26f3
2433
+ 5/25g2
2434
+ 9/2
2435
+ 3
2436
+ 0.91 · 8p2
2437
+ 1/27d1
2438
+ 3/26f3
2439
+ 5/25g2
2440
+ 9/2+
2441
+ 0.05 · 7d3
2442
+ 3/26f3
2443
+ 5/25g2
2444
+ 9/2
2445
+ 4
2446
+ 0.89 · 8p2
2447
+ 1/27d1
2448
+ 3/26f3
2449
+ 5/25g2
2450
+ 9/2
2451
+ 4
2452
+ 5g106f48p2
2453
+ |137|
2454
+ 8p2
2455
+ 1/27d1
2456
+ 3/26f3
2457
+ 5/25g3
2458
+ 9/2 19/2
2459
+ 0.80 · 8p2
2460
+ 1/26f4
2461
+ 5/25g3
2462
+ 9/2+
2463
+ 0.11 · 8p1
2464
+ 1/27d2
2465
+ 3/26f3
2466
+ 5/25g3
2467
+ 9/2
2468
+ 13/2
2469
+ 0.89 · 8p2
2470
+ 1/27d1
2471
+ 3/26f3
2472
+ 5/25g3
2473
+ 9/2
2474
+ 17/2
2475
+ 5g116f48p2
2476
+ 138
2477
+ +8p2
2478
+ 1/2
2479
+ 7d1
2480
+ 3/26f3
2481
+ 5/25g4
2482
+ 9/2
2483
+ 6
2484
+ 0.91 · 7d1
2485
+ 3/26f3
2486
+ 5/25g4
2487
+ 9/2
2488
+ 7
2489
+ 0.89 · 7d1
2490
+ 3/26f3
2491
+ 5/25g4
2492
+ 9/2
2493
+ 7
2494
+ 5g126f37d18p2
2495
+ 139
2496
+ 7d1
2497
+ 3/26f3
2498
+ 5/25g5
2499
+ 9/2
2500
+ 13/2
2501
+ 0.92 · 7d1
2502
+ 3/26f3
2503
+ 5/25g5
2504
+ 9/2
2505
+ 13/2
2506
+ 0.91 · 7d1
2507
+ 3/26f3
2508
+ 5/25g5
2509
+ 9/2
2510
+ 13/2
2511
+ 5g136f37d18p2
2512
+ |140
2513
+ 7d2
2514
+ 3/26f2
2515
+ 5/25g6
2516
+ 9/2
2517
+ 6
2518
+ 0.90 · 7d1
2519
+ 3/26f3
2520
+ 5/25g6
2521
+ 9/2+
2522
+ 0.05 · 7d1
2523
+ 3/26f2
2524
+ 5/25g6
2525
+ 9/26f1
2526
+ 7/2
2527
+ 6
2528
+ 0.90 · 7d1
2529
+ 3/26f3
2530
+ 5/25g6
2531
+ 9/2
2532
+ 6
2533
+ 5g146f37d18p2
2534
+ 141
2535
+ 7d2
2536
+ 3/26f2
2537
+ 5/25g7
2538
+ 9/2
2539
+ 9/2
2540
+ 0.93 · 7d2
2541
+ 3/26f2
2542
+ 5/25g7
2543
+ 9/2
2544
+ 9/2
2545
+ 0.91 · 7d2
2546
+ 3/26f2
2547
+ 5/25g7
2548
+ 9/2
2549
+ 9/2
2550
+ 5g156f27d28p2
2551
+ 142
2552
+ 7d2
2553
+ 3/26f2
2554
+ 5/25g8
2555
+ 9/2
2556
+ 2
2557
+ 0.91 · 7d2
2558
+ 3/26f2
2559
+ 5/25g8
2560
+ 9/2
2561
+ 2
2562
+ 0.89 · 7d2
2563
+ 3/26f2
2564
+ 5/25g8
2565
+ 9/2
2566
+ 2
2567
+ 5g166f27d28p2
2568
+ 143
2569
+ 7d2
2570
+ 3/26f3
2571
+ 5/25g8
2572
+ 9/2
2573
+ 5/2
2574
+ 0.93 · 7d2
2575
+ 3/26f3
2576
+ 5/25g8
2577
+ 9/2
2578
+ 3/2
2579
+ 0.92 · 7d2
2580
+ 3/26f3
2581
+ 5/25g8
2582
+ 9/2
2583
+ 1/2
2584
+ 5g176f27d28p2
2585
+ 144
2586
+ 7d2
2587
+ 3/26f3
2588
+ 5/25g9
2589
+ 9/2
2590
+ 7
2591
+ 0.96 · 7d2
2592
+ 3/26f3
2593
+ 5/25g9
2594
+ 9/2
2595
+ 7
2596
+ 0.94 · 7d2
2597
+ 3/26f3
2598
+ 5/25g9
2599
+ 9/2
2600
+ 7
2601
+ 0.95 · 5g176f27d38p2+
2602
+ 0.05 · 5g176f47d18p2
2603
+ 145
2604
+ 7d2
2605
+ 3/26f3
2606
+ 5/25g10
2607
+ 9/2
2608
+ 13/2
2609
+ 0.96 · 7d2
2610
+ 3/26f3
2611
+ 5/25g10
2612
+ 9/2
2613
+ 13/2
2614
+ 0.93 · 7d2
2615
+ 3/26f3
2616
+ 5/25g10
2617
+ 9/2
2618
+ 13/2
2619
+ 5g186f37d28p2
2620
+ 146
2621
+ +5g10
2622
+ 9/2
2623
+ 7d2
2624
+ 3/26f4
2625
+ 5/2
2626
+ 6
2627
+ 0.95 · 7d2
2628
+ 3/26f4
2629
+ 5/2
2630
+ 6
2631
+ 0.91 · 7d2
2632
+ 3/26f4
2633
+ 5/2
2634
+ 6
2635
+ 6f47d28p2
2636
+ 147
2637
+ 7d2
2638
+ 3/26f5
2639
+ 5/2
2640
+ 7/2
2641
+ 0.89 · 7d2
2642
+ 3/26f5
2643
+ 5/2+
2644
+ 0.07 · 7d2
2645
+ 3/26f4
2646
+ 5/26f1
2647
+ 7/2
2648
+ 9/2
2649
+ 0.88 · 7d2
2650
+ 3/26f5
2651
+ 5/2+
2652
+ 0.05 · 7d2
2653
+ 3/26f4
2654
+ 5/26f1
2655
+ 7/2
2656
+ 9/2
2657
+ 6f57d28p2
2658
+ 148
2659
+ 7d2
2660
+ 3/26f6
2661
+ 5/2
2662
+ 2
2663
+ 0.94 · 7d2
2664
+ 3/26f6
2665
+ 5/2
2666
+ 2
2667
+ 0.93 · 7d2
2668
+ 3/26f6
2669
+ 5/2
2670
+ 2
2671
+ 6f67d28p2
2672
+ 149
2673
+ 7d3
2674
+ 3/26f6
2675
+ 5/2
2676
+ 3/2
2677
+ 0.96 · 7d3
2678
+ 3/26f6
2679
+ 5/2
2680
+ 3/2
2681
+ 0.93 · 7d3
2682
+ 3/26f6
2683
+ 5/2
2684
+ 3/2
2685
+ 6f67d38p2
2686
+ 150
2687
+ 7d3
2688
+ 3/26f6
2689
+ 5/26f1
2690
+ 7/2
2691
+ 2
2692
+ 0.85 · 7d3
2693
+ 3/26f6
2694
+ 5/26f1
2695
+ 7/2+
2696
+ 0.11 · 7d3
2697
+ 3/26f5
2698
+ 5/26f2
2699
+ 7/2
2700
+ 2
2701
+ 0.89 · 7d3
2702
+ 3/26f6
2703
+ 5/26f1
2704
+ 7/2+
2705
+ 0.06 · 7d3
2706
+ 3/26f5
2707
+ 5/26f2
2708
+ 7/2
2709
+ 2
2710
+ 6f77d38p2
2711
+ 151
2712
+ 7d3
2713
+ 3/26f6
2714
+ 5/26f2
2715
+ 7/2
2716
+ 9/2
2717
+ 0.89 · 7d3
2718
+ 3/26f6
2719
+ 5/26f2
2720
+ 7/2+
2721
+ 0.09 · 7d3
2722
+ 3/26f5
2723
+ 5/26f3
2724
+ 7/2
2725
+ 9/2
2726
+ 0.89 · 7d3
2727
+ 3/26f6
2728
+ 5/26f2
2729
+ 7/2+
2730
+ 0.06 · 7d3
2731
+ 3/26f5
2732
+ 5/26f3
2733
+ 7/2
2734
+ 9/2
2735
+ 6f87d38p2
2736
+ 152 +6f6
2737
+ 5/2
2738
+ 7d2
2739
+ 3/26f4
2740
+ 7/2
2741
+ 6
2742
+ 0.95 · 7d2
2743
+ 3/26f4
2744
+ 7/2
2745
+ 6
2746
+ 0.92 · 7d2
2747
+ 3/26f4
2748
+ 7/2
2749
+ 6
2750
+ 6f97d38p2
2751
+ 153
2752
+ 7d2
2753
+ 3/26f5
2754
+ 7/2
2755
+ 11/2
2756
+ 0.96 · 7d2
2757
+ 3/26f5
2758
+ 7/2
2759
+ 11/2
2760
+ 0.93 · 7d2
2761
+ 3/26f5
2762
+ 7/2
2763
+ 11/2
2764
+ 6f107d38p2
2765
+
2766
+ 15
2767
+ TABLE VI. (Continuation.)
2768
+ Z
2769
+ Closed
2770
+ DCBQ-SRC
2771
+ JSRC
2772
+ DCBQ-CI1
2773
+ JCI1
2774
+ DCBQ-CI2
2775
+ JCI2
2776
+ Ref. [47]
2777
+ Shells
2778
+ 154
2779
+ 7d2
2780
+ 3/26f6
2781
+ 7/2
2782
+ 6
2783
+ 0.98 · 7d2
2784
+ 3/26f6
2785
+ 7/2
2786
+ 6
2787
+ 0.95 · 7d2
2788
+ 3/26f6
2789
+ 7/2
2790
+ 6
2791
+ 6f117d38p2
2792
+ |155
2793
+ 7d2
2794
+ 3/26f7
2795
+ 7/2
2796
+ 7/2
2797
+ 0.99 · 9s1
2798
+ 1/26f8
2799
+ 7/2
2800
+ 1/2
2801
+ 0.94 · 9s1
2802
+ 1/26f8
2803
+ 7/2
2804
+ 1/2
2805
+ 6f127d38p2
2806
+ 156
2807
+ 7d2
2808
+ 3/26f8
2809
+ 7/2
2810
+ 2
2811
+ 0.97 · 7d2
2812
+ 3/26f8
2813
+ 7/2
2814
+ 2
2815
+ 0.97 · 7d2
2816
+ 3/26f8
2817
+ 7/2
2818
+ 2
2819
+ 6f137d38p2
2820
+ 157
2821
+ +6f8
2822
+ 7/2
2823
+ 7d3
2824
+ 3/2
2825
+ 3/2
2826
+ 0.96 · 7d3
2827
+ 3/2
2828
+ 3/2
2829
+ 0.96 · 7d3
2830
+ 3/2
2831
+ 3/2
2832
+ 6f147d38p2
2833
+ 158
2834
+ 7d4
2835
+ 3/2
2836
+ 0
2837
+ 0.98 · 7d4
2838
+ 3/2
2839
+ 0
2840
+ 0.96 · 7d4
2841
+ 3/2
2842
+ 0
2843
+ 6f147d48p2
2844
+ 159 +7d4
2845
+ 3/2
2846
+ 9s1
2847
+ 1/2
2848
+ 1/2
2849
+ 0.98 · 9s1
2850
+ 1/2
2851
+ 1/2
2852
+ 0.96 · 9s1
2853
+ 1/2
2854
+ 1/2
2855
+ 6f147d48p29s1
2856
+ 160
2857
+ 7d1
2858
+ 5/29s1
2859
+ 1/2
2860
+ 3
2861
+ 0.96 · 7d1
2862
+ 5/29s1
2863
+ 1/2
2864
+ 3
2865
+ 0.95 · 7d1
2866
+ 5/29s1
2867
+ 1/2
2868
+ 3
2869
+ 6f147d58p29s1
2870
+ 161
2871
+ 7d2
2872
+ 5/29s1
2873
+ 1/2
2874
+ 9/2
2875
+ 0.97 · 7d2
2876
+ 5/29s1
2877
+ 1/2
2878
+ 9/2
2879
+ 0.92 · 7d2
2880
+ 5/29s1
2881
+ 1/2
2882
+ 9/2
2883
+ 6f147d68p29s1
2884
+ 162
2885
+ 7d3
2886
+ 5/29s1
2887
+ 1/2
2888
+ 5
2889
+ 0.98 · 7d3
2890
+ 5/29s1
2891
+ 1/2
2892
+ 5
2893
+ 0.96 · 7d3
2894
+ 5/29s1
2895
+ 1/2
2896
+ 5
2897
+ 6f147d78p29s1
2898
+ 163
2899
+ 7d5
2900
+ 5/2
2901
+ 5/2
2902
+ 0.96 · 7d5
2903
+ 5/2
2904
+ 5/2
2905
+ 0.95 · 7d5
2906
+ 5/2
2907
+ 5/2
2908
+ 6f147d88p29s1
2909
+ 164
2910
+ 7d6
2911
+ 5/2
2912
+ 0
2913
+ 0.98 · 7d6
2914
+ 5/2
2915
+ 0
2916
+ 0.96 · 7d6
2917
+ 5/2
2918
+ 0
2919
+ 6f147d108p2
2920
+ 165 +7d6
2921
+ 5/2
2922
+ 9s1
2923
+ 1/2
2924
+ 1/2
2925
+ 0.98 · 9s1
2926
+ 1/2
2927
+ 1/2
2928
+ 0.96 · 9s1
2929
+ 1/2
2930
+ 1/2
2931
+ 166
2932
+ 9s2
2933
+ 1/2
2934
+ 0
2935
+ 0.84 · 9s2
2936
+ 1/2 + 0.10 · 8p2
2937
+ 3/2
2938
+ 0
2939
+ 0.90 · 9s2
2940
+ 1/2
2941
+ 0
2942
+ |167
2943
+ 9s1
2944
+ 1/28p1
2945
+ 3/29p1
2946
+ 1/2
2947
+ 3/2
2948
+ 0.88 · 9s2
2949
+ 1/28p1
2950
+ 3/2 + 0.06 · 8p3
2951
+ 3/2
2952
+ 3/2
2953
+ 0.91 · 9s2
2954
+ 1/28p1
2955
+ 3/2
2956
+ 3/2
2957
+ |168|
2958
+ 9s2
2959
+ 1/28p1
2960
+ 3/29p1
2961
+ 1/2
2962
+ 1
2963
+ 0.55 · 9s1
2964
+ 1/28p2
2965
+ 3/29p1
2966
+ 1/2+
2967
+ 0.24 · 9s1
2968
+ 1/28p1
2969
+ 3/29p2
2970
+ 1/2+
2971
+ 0.20 · 9s1
2972
+ 1/28p3
2973
+ 3/2
2974
+ 2
2975
+ 0.94 · 9s2
2976
+ 1/28p1
2977
+ 3/29p1
2978
+ 1/2
2979
+ 1
2980
+ 169
2981
+ 9s2
2982
+ 1/28p2
2983
+ 3/29p1
2984
+ 1/2
2985
+ 3/2
2986
+ 0.76 · 9s2
2987
+ 1/28p2
2988
+ 3/29p1
2989
+ 1/2+
2990
+ 0.16 · 9s2
2991
+ 1/28p1
2992
+ 3/29p2
2993
+ 1/2+
2994
+ 0.06 · 9s2
2995
+ 1/28p3
2996
+ 3/2
2997
+ 3/2
2998
+ 0.83 · 9s2
2999
+ 1/28p2
3000
+ 3/29p1
3001
+ 1/2+
3002
+ 0.07 · 9s2
3003
+ 1/28p1
3004
+ 3/29p2
3005
+ 1/2
3006
+ 3/2
3007
+ 170
3008
+ 9s2
3009
+ 1/28p2
3010
+ 3/29p2
3011
+ 1/2
3012
+ 2
3013
+ 0.96 · 9s2
3014
+ 1/28p2
3015
+ 3/29p2
3016
+ 1/2
3017
+ 2
3018
+ 0.93 · 9s2
3019
+ 1/28p2
3020
+ 3/29p2
3021
+ 1/2
3022
+ 2
3023
+
HNAzT4oBgHgl3EQfxf6-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
INE2T4oBgHgl3EQf_Qm3/content/tmp_files/2301.04247v1.pdf.txt ADDED
@@ -0,0 +1,2039 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.04247v1 [math.OA] 10 Jan 2023
2
+ Projective Hilbert modules and sequential approximations
3
+ Lawrence G. Brown and Huaxin Lin
4
+ January 12, 2023
5
+ Abstract
6
+ We show that, when A is a separable C∗-algebra, every countably generated Hilbert
7
+ A-module is projective (with bounded module maps as morphisms).
8
+ We also study the
9
+ approximate extensions of bounded module maps. In the case that A is a σ-unital simple
10
+ C∗-algebra with strict comparison and every strictly positive lower semicontinuous affine
11
+ function on quasitraces can be realized as the rank of an element in Cuntz semigroup, we show
12
+ that the Cuntz semigroup is the same as unitarily equivalent class of countably generated
13
+ Hilbert A-modules if and only if A has stable rank one.
14
+ 1
15
+ Introduction
16
+ We study Hilbert module over a C∗-algebra A. A Hilbert A -module H is said to be projective
17
+ (with bounded module maps as morphisms) if, for any Hilbert A-modules H1 and H2, any
18
+ bounded module map ϕ : H → H1 and any surjective bounded module map s : H2 → H1, there
19
+ is always a bounded module map ψ : H → H2 such that ϕ = s ◦ ψ. It is easy to see that, when
20
+ A is a unital C∗-algebra, a direct sum A(n) of n copies of A is a projective Hilbert A-module.
21
+ However, it is not known that this holds for non-unital C∗-algebras. One observes that, for a
22
+ non-unital C∗-algebra A, it itself is not algebraically finitely generated as an A-module. The
23
+ characterization of projective Hilbert modules over a C∗-algebra A seems to remain elusive for
24
+ decades. Evidence, on the other hand, suggests that most countably generated Hilbert modules
25
+ are projective.
26
+ In this paper, we will confirm that, for any separable C∗-algebra A, every
27
+ countably generated Hilbert A-module is projective.
28
+ It is attempting to classify countably generated Hilbert A-modules. It was shown in [11] that,
29
+ when A has stable rank one, unitary equivalence classes of Hilbert A-modules are determined by
30
+ the Cuntz semigroup of A. One might prefer a more quantified description of Hilbert A-modules
31
+ using some version of dimension functions. Indeed, in the case that A is a separable simple
32
+ C∗-algebra such that its purely non-compact elements in the Cuntz semigroup are determined
33
+ by strictly positive lower semicontinuous affine functions on its quasitraces, then one wishes to
34
+ use the same functions to described those Hilbert A-modules which are not algebraically finitely
35
+ generated. We show that in this case, Cuntz equivalence classes are the same as unitary equiva-
36
+ lence classes of countably generated Hilbert A-modules if and only if A has tracial approximate
37
+ oscillation zero, or equivalently, in this case, A has stable rank one. This is a partial converse
38
+ of the theorem in [11] mentioned above.
39
+ Injective Hilbert A-modules were studied in [33]. If A is not an AW ∗-algebra, then A itself
40
+ is not an injective Hilbert A-module (with bounded module maps as morphisms) (see Theorem
41
+ 3.14 of [33]). Even if we only consider bounded module maps with adjoints, there are only very
42
+ few injective Hilbert modules. It was shown in [33] that a countably generated Hilbert A-module
43
+ is *-injective if only if it is orthogonal complementary. Let H be a countably generated Hilbert
44
+ A-module. Suppose that H0 ⊂ H1 are Hilbert A-modules and ϕ : H0 → H is a bounded module
45
+ 1
46
+
47
+ map.
48
+ As we mentioned ϕ may not be extended to a bounded module map from H1 to H.
49
+ However, we show that one may find a sequence of bounded module maps ϕn : H1 → H with
50
+ ∥ϕn∥ ≤ ∥ϕ∥ such that limn→∞ ∥ϕn(x) − ϕ(x)∥ = 0 for all x ∈ H0 (note that H0 is not assumed
51
+ to be separable). This result may be stated as every countably generated Hilbert module over
52
+ a σ-unital C∗-algebra A is “sequentially approximately injective”. With the same spirit, we
53
+ show that every countably generated Hilbert module over a σ-unital C∗-algebra is “sequentially
54
+ approximately projective”.
55
+ The paper is organized as follows: Section 2 collects some easy facts about projective Hilbert
56
+ modules and algebraically finitely generated Hilbert modules over a C∗-algebra. Section 3 dis-
57
+ cusses some basic results about countably generated Hilbert A-modules. In Section 4, we show
58
+ that, under the assumption that A is a σ-unital simple C∗-algebra with strict comparison and
59
+ the canonical (dimension function) map Γ from Cuntz semigroup to lower semi-continuous affine
60
+ functions on quasitraces �
61
+ QT(A) is surjective, countably generated (but not algebraically gener-
62
+ ated) Hilbert A-modules can be classified by these lower semi-continuous affine functions if and
63
+ only if A has stable rank one. This is a partial converse of a theorem in [11]. We also show that,
64
+ assume that A is a σ-unital simple C∗-algebra with finite radius of comparison, then a countably
65
+ generated Hilbert A-module with infinite quasitrace is unitarily equivalent to l2(A). In section
66
+ 5, we show that every countably generated Hilbert module over a separable C∗-algebra A is
67
+ always projective. Section 6 shows that every Hilbert A-module is “approximately injective,”
68
+ and every countably generated Hilbert module over a σ-unital C∗-algebra A is “approximately
69
+ projective”.
70
+ Acknowledgement: This work is based on a preprint [35] of 2010. A draft of the current
71
+ paper was formed in 2014. The second named author was partially supported by a NSF grant
72
+ (DMS-1954600). Both authors would like to acknowledge the support during their visits to the
73
+ Research Center of Operator Algebras at East China Normal University which is partially sup-
74
+ ported by Shanghai Key Laboratory of PMMP, Science and Technology Commission of Shanghai
75
+ Municipality (#13dz2260400 and #22DZ2229014).
76
+ 2
77
+ Easy facts about projective Hilbert modules
78
+ Definition 2.1. Let A be a C∗-algebra. For an integer n ≥ 1, denote by A(n) the (right) Hilbert
79
+ A-module of orthogonal direct sum of n copies of A. If x = (a1, a2, ..., an), y = (b1, b2, ..., bn),
80
+ then
81
+ ⟨x, y⟩ =
82
+ n
83
+
84
+ i=1
85
+ a∗
86
+ nbn.
87
+ Denote by HA, or l2(A), the standard countably generated Hilbert A-module
88
+ HA = {{an} :
89
+ k
90
+
91
+ n=1
92
+ a∗
93
+ nan converges in norm as k → ∞},
94
+ where the inner product is defined by
95
+ ⟨{an}, {bn}⟩ =
96
+
97
+
98
+ n=1
99
+ a∗
100
+ nbn.
101
+ Let H be a Hilbert A-module. denote by H♯ the set of all bounded A-module maps from H
102
+ to A. For each y ∈ H, define ˆy(x) = ⟨y, x⟩ for all x ∈ H. Then ˆy ∈ H♯. We say H is self-dual, if
103
+ every f ∈ H♯ has the form ˆy for some y ∈ H.
104
+ 2
105
+
106
+ If H1, H2 are Hilbert A-modules, denote by B(H1, H2) the space of all bounded module maps
107
+ from H1 to H2. If T ∈ B(H1, H2), denote by T ∗ : H2 → H♯
108
+ 1 the bounded module maps defined
109
+ by
110
+ T ∗(y)(x) = ⟨y, Tx⟩ for all x ∈ H1 and y ∈ H2.
111
+ If T ∗ ∈ B(H2, H1), one says that T has an adjoint T ∗. Denote by L(H1, H2) the set of all
112
+ bounded A-module maps in B(H1, H2) with adjoints. Let H be a Hilbert A-module. In what
113
+ follows, denote B(H) = B(H, H) and L(H) = L(H, H). B(H) is a Banach algebra and L(H) is
114
+ a C∗-algebra.
115
+ For x, y ∈ H, define θx,y ∈ L(H) by θx,y(z) = x⟨y, z⟩ for all z ∈ H. Denote by F(H) the linear
116
+ span of those module maps with the form θx,y, where x, y ∈ H. Denote by K(H) the closure of
117
+ F(H). K(H) is a C∗-algebra. It follows from a result of Kasparov ([26]) that L(H) = M(K(H)),
118
+ the multiplier algebra of K(H), and, by [31], B(H) = LM(K(H)), the left multiplier algebra of
119
+ K(H).
120
+ Suppose that H1 and H2 are Hilbert A-submodules of a Hilbert A-module H. Then K(Hi)
121
+ is a hereditary C∗-subalgebra of K(H), i = 1, 2, (see Lemma 2.13 [33]). Denote by K(H1, H2)
122
+ the subspace of K(H) consists of module maps of the form STL, where S ∈ K(H2), T ∈ B(H)
123
+ and L ∈ K(H1), where K(H2) and K(H1) are viewed as hereditary C∗-subalgebras of K(H).
124
+ Note that K(H1, H2) is the closure of the linear span of those module maps with the form θx,y,
125
+ where x ∈ H2 and y ∈ H1.
126
+ It is convenient to have an example that H ̸= H♯. Let A be a C∗-algebra with a sequence
127
+ {dn} of mutually orthogonal positive elements with ∥dn∥ = 1. Define f({an}) = �∞
128
+ n=1 dnan for
129
+ all {an} ∈ HA. Then f is a bounded module map but f ̸∈ H.
130
+ Two Hilbert A-modules are said to be unitarily equivalent, or isomorphic, if there is an
131
+ invertible map U ∈ B(H1, H2) such that
132
+ ⟨U(x1), U(x2)⟩ = ⟨x1, x2⟩ for all x1, x2 ∈ H1.
133
+ (see [41] for further basic information).
134
+ Definition 2.2. Let A be a C∗-algebra and H a Hilbert A-module and H1 the A∗∗-Hilbert
135
+ module extension of H constructed in Section 4 of [41], Denote by H∼ the self-dual Hilbert A∗∗-
136
+ module H♯
137
+ 1 (see Section 4 of [41]). Every bounded module map in B(H, H♯) can be uniquely
138
+ extended to a bounded module map in B(H∼). (This easily follows from the construction of H∼
139
+ and 3.6 of [41]. See also 1.3 of [31].) If H is self-dual, then B(H) = L(E) (see 3.5 of [41]). Thus
140
+ M(K(H)) = LM(K(H)) = QM(K(H)). If in addition, A is a W ∗-algebra, B(H) is also a W ∗
141
+ -algebra. In particular, B(H∼) is a W ∗-algebra. Since all maps in B(H, H♯) can be uniquely
142
+ extended to a maps in B(H∼), we conclude that B(H∼) is a W ∗ -algebra containing K(H),
143
+ M(K(H)), LM(K(H) and QM(K(H)).
144
+ Definition 2.3. Let H be a Hilbert A-module and F ⊂ H be a subset. We say that H is
145
+ generated by F (as a Hilbert A-module), if the linear combination of elements of the form
146
+ {za : z ∈ F, a ∈ A} is dense in H.
147
+ We say H is algebraically generated by F, if every element x ∈ H is a linear combination of
148
+ elements of the form {za : z ∈ F, a ∈ ˜A}. Note that we write a ∈ ˜A instead a ∈ A to include the
149
+ element z. H is algebraically finitely generated if H is algebraically generated by a finite subset
150
+ F. See Corollary 2.13 for some clarification.
151
+ Now we turn to the projectivity of Hilbert modules.
152
+ Definition 2.4. Let A be a C∗-algebra and H be a Hilbert A-module.
153
+ We say that H is
154
+ ∗-projective, if, for any Hilbert A-modules H1 and H2, any module map ϕ ∈ L(H, H2) and any
155
+ 3
156
+
157
+ surjective module map s ∈ L(H1, H2), there exists a module map ψ ∈ L(H, H1) such that
158
+ s ◦ ψ = ϕ.
159
+ (e 2.1)
160
+ Note here we assume that s, ϕ and ψ have adjoint module maps.
161
+ Theorem 2.5. Let A be a C∗-algebra.
162
+ (1) Suppose that H and H1 are Hilbert A-modules and s ∈ L(H1, H) is surjective. Then
163
+ there is ψ1 ∈ L(H, H1) such that
164
+ s ◦ ψ1 = idH.
165
+ (e 2.2)
166
+ Moreover, ψ1(H) is an orthogonal summand of H1 and ψ1(H) is unitarily equivalent to H.
167
+ (2) Every Hilbert A-module is ∗-projective.
168
+ Proof. For (1), let s be as described. We note that s has a closed range. Define T : H1 ⊕ H →
169
+ H1⊕H by T(h1 ⊕h) = 0⊕s(h1) for h1 ∈ H1 and h ∈ H. Then T ∈ L(H1⊕H) = M(K(H1⊕H))
170
+ (see Theorem 1.5 of [31]). It follows from Lemma 2.4 of [33] that
171
+ H1 ⊕ H = kerT ⊕ |T|(H1 ⊕ H).
172
+ (e 2.3)
173
+ Let T = V |T| be the polar decomposition in (K(H1 ⊕ H))∗∗. Note that the proof of Lemma
174
+ 2.4 of [33] shows that 0 is an isolated point of |T| or |T| is invertible. So the same holds for
175
+ (T ∗T), and hence the same holds for (TT ∗). Let S = (TT ∗)−1, where the inverse is taken in the
176
+ hereditary C∗-subalgebra L(H) ⊂ L(H1 ⊕ H). Since s is surjective,
177
+ |TT ∗|(H) = H.
178
+ (e 2.4)
179
+ Note that T ∗ = |T|V ∗, V |T|V ∗ = |TT ∗|1/2 and V ∗|TT ∗|1/2 = T ∗. Hence
180
+ L1 := V ∗(TT ∗)−1/2 = V ∗(TT ∗)1/2S = T ∗S ∈ L(H1 ⊕ H).
181
+ (e 2.5)
182
+ This also implies that L1(H) = V ∗((TT ∗)−1/2(H)) = V ∗(H) is closed. Moreover, V ∗ gives a
183
+ unitary equivalence of H and L1(H). One then checks that
184
+ TL1 = V |T|V ∗(TT ∗)−1/2 = P,
185
+ (e 2.6)
186
+ where P is the range projection of (TT ∗)1/2 which gives the identity map on H. Since both T
187
+ and L1 are in L(H1 ⊕ H), so is P. One then defines ψ1 = L1P|H : H → H1. Thus s ◦ ψ1 = idH.
188
+ Next we note that H ⊂ kerT and |T|(H1⊕H) = |T|(H1) ⊂ H1. It follows that kerT = H0⊕H.
189
+ By (e 2.3) again, H1 ⊕ H = H0 ⊕ H ⊕ |T|(H1). It follows that |T|(H) is an orthogonal summand
190
+ of H1.
191
+ On the other hand, since ψ1(H) = L1(H) = V ∗(H), ψ1(H) is closed. But we also have
192
+ ψ1(H) = T ∗S(H) = T ∗T(H1) = |T|(H1). As we have shown that L1(H) is unitarily equivalent
193
+ to H, this proves the “Moreover” part of (1).
194
+ To show that every Hilbert A-module H is ∗-projective, let H1 and H2 be Hilbert A-modules,
195
+ ϕ : H → H1 and s : H2 → H1 be bounded module maps with adjoints, where s is surjective.
196
+ We now apply the statement of (1).
197
+ Note that (1) holds for any Hilbert A-module, in particular, it holds for H1 (in place of H).
198
+ Since s is surjective, we obtain ψ1 ∈ L(H1, H2) such that
199
+ s ◦ ψ1 = idH1.
200
+ (e 2.7)
201
+ Define ψ = ψ1 ◦ ϕ : H → H2. Then s ◦ ψ = s ◦ ψ1 ◦ ϕ = ϕ.
202
+ 4
203
+
204
+ Remark 2.6. (i) It is probably worth noting that, in part (1) of Theorem 2.5, ∥ψ∥ = ∥|ss∗|−1/2∥
205
+ (the inverse is taken in L(H)), and, for the second part, ∥ψ∥ = ∥|ss∗|−1/2 ◦ ϕ∥. This, probably,
206
+ may not be improved.
207
+ The next three propositions are easy facts, but perhaps, not entirely trivial. We include
208
+ here for the clarity of our further discussion. After an earlier version ([35]) of this note was first
209
+ posted (in 2010), Leonel Robert informed us that, using Proposition 2.5 above, he has a proof
210
+ that the converse of the following also holds, i.e., if H is algebraically finitely generated, then
211
+ K(H) has an identity (see Proposition 2.11).
212
+ Proposition 2.7. Let A be a C∗-algebra and H be a Hilbert A-module. Suppose that 1H ∈
213
+ K(H). Then H is algebraically finitely generated.
214
+ Proof. Let F(H) be the linear span of rank one module maps of the form θξ,ζ for ξ, ζ ∈ H. Since
215
+ F(H) is dense in K(H), there is T ∈ F(H) such that
216
+ ∥1H − T∥ < 1/4.
217
+ (e 2.8)
218
+ It follows that T is invertible. There are ξ1, ξ2, ..., ξn, ζ1, ζ2, ..., ζn ∈ H such that
219
+ T(ξ) =
220
+ n
221
+
222
+ j=1
223
+ ξj < ζj, ξ > for all ξ ∈ H.
224
+ (e 2.9)
225
+ But TH = H. This implies that �n
226
+ j=1 ξjA = H.
227
+ Definition 2.8. Let A be a C∗-algebra and H be a Hilbert A-module. We say H is projective
228
+ (with bounded module maps as morphisms), if for any Hilbert modules H1 and H2 and any
229
+ bounded surjective module map s : H2 → H1 and any bounded module map ϕ : H → H1,
230
+ there is a bounded module map ψ : H → H2 such that s ◦ ψ = ϕ. So we have the following
231
+ commutative diagram:
232
+ H
233
+ H1
234
+ H2
235
+ ϕ
236
+ ψ
237
+ s
238
+ (e 2.10)
239
+ Proposition 2.9. Let A be a C∗-algebra and H be a Hilbert A-module for which K(H) has an
240
+ identity. Then H is a projective Hilbert A-module.
241
+ Proof. Denote by ˜A the minimum unitization of A. Note that H is a Hilbert ˜A-module. We
242
+ may write ˜A(N) = e1 ˜A ⊕ e2 ˜A ⊕ · · · ⊕ eN ˜A, where ⟨ei, ei⟩ = 1 ˜
243
+ A. Let us first show that ˜A(N) is a
244
+ projective Hilbert ˜A-module.
245
+ Suppose that H1 and H2 are Hilbert ˜A-modules, s : H2 → H1 is a surjective bounded
246
+ module map and ϕ : ˜A(N) → H1 is a bounded module map. Let xi = ϕ(ei), 1 ≤ i ≤ N. Since s
247
+ is surjective, one chooses yi ∈ H2 such that
248
+ s(yi) = xi, 1 ≤ i ≤ N.
249
+ (e 2.11)
250
+ Define a module map ψ : ˜A(N) → H1
251
+ ψ(h) =
252
+ N
253
+
254
+ i=1
255
+ yi⟨ei, h⟩ for all h = ⊕N
256
+ i=1ai,
257
+ 5
258
+
259
+ where ai ∈ A, 1 ≤ i ≤ N. Then ϕ ∈ K(H, H2). Moreover
260
+ s ◦ ψ(ei) = xi⟨ei, ei⟩ = xi = ϕ(ei), 1 ≤ i ≤ N.
261
+ (e 2.12)
262
+ It follows that s ◦ ψ = ϕ.
263
+ Now we consider the general case. From 2.7, H is algebraically finitely generated. Therefore,
264
+ a theorem of Kasparov ([26]) shows that H = PH ˜
265
+ A for some projection P ∈ L(H ˜
266
+ A). The fact
267
+ that 1H ∈ K(H) implies that P ∈ K(H ˜
268
+ A). Therefore there is an integer N ≥ 1 and a projection
269
+ P1 ∈ MN( ˜A) such that PH is unitarily equivalent to P1H ˜
270
+ A. In other words, one may assume
271
+ that H is a direct summand of ˜A(N).
272
+ Write ˜A(N) = H ⊕ H′ for some Hilbert ˜A-module H′. Let H0 and H1 be Hilbert A-modules,
273
+ s : H0 → H1 be a surjective bounded module map and ϕ : H → H1 be another bounded module
274
+ map. We view them as ˜A-modules and ˜A-module maps. Let ι : H → H ⊕ H′ be the embedding
275
+ and j : H ⊕ H′ → H be the projection. Then j ◦ ι = idH. We then have the following diagram:
276
+ H
277
+ ←j
278
+ H ⊕ H′
279
+ ←ι H
280
+ ↓ϕ
281
+ H1
282
+ ևs
283
+ H0
284
+ Recall that these are Hilbert ˜A-modules and bounded ˜A-module maps. Since we have shown
285
+ H ⊕ H′ = ˜A(N) is projective, we obtain a bounded module map ψ1 : H ⊕ H′ → H1 such that
286
+ the following commutes:
287
+ H
288
+ ←j
289
+ H ⊕ H′
290
+ ←ι H
291
+ ↓ϕ
292
+ ↓ψ1
293
+ H1
294
+ ևs
295
+ H0
296
+ So s ◦ ψ1 = ϕ ◦ j. Define ψ = ψ1 ◦ ι. So s ◦ ψ = s ◦ ψ1 ◦ ι = ϕ ◦ j ◦ ι = ϕ.
297
+ Remark 2.10. (1) One may notice that we do not provide an estimate of ∥ψ∥ in Proposition
298
+ 2.9. Note that s induces a one-to one and surjective Banach module map ˜s : H2/kers → H1.
299
+ Therefore its inverse ˜s−1 is bounded. In the proof, for any ǫ > 0, one may choose yi ∈ H2 such
300
+ that ∥yi∥ ≤ ∥˜s−1 ◦ ϕ∥ + ǫ/
301
+
302
+ N. Then one may be able to estimate that ∥ψ∥ ≤
303
+
304
+ N∥˜s−1 ◦ ϕ∥ + ǫ.
305
+ It is not clear one can do better than that in these lines of proof.
306
+ (2) The fact that ⟨ei, ei⟩ = 1 ˜
307
+ A is crucial in the proof. It should be noted that, when A is
308
+ not unital, the argument in the proof of Proposition 2.9 does not imply that A(n) is projective
309
+ (with bounded module maps as morphisms). However, we do not assume that A is unital in
310
+ Proposition 2.9 (but K(H) is unital). On the other hand, one should be warned that, if A is not
311
+ unital and H = A(n), then K(H) = Mn(A) which is never unital. There are projective Hilbert
312
+ modules for which K(H) is not unital. In fact, in Theorem 5.3 below, we show that A(n) is
313
+ always projective when A is separable.
314
+ (3) Let H1 = xA and H2 = yA. Define a module map ψ : xA → yA by ϕ(xa) = ya for all
315
+ a ∈ A. In general such a module map may not be bounded. Consider A = C([0, 1]) and x(t) = t
316
+ and y = 1A. Let ψ : xA → yA be defined by ψ(xf) = f for all f ∈ C([0, 1]). This module map
317
+ is not bounded. We do not know that A(n) is projective in general when A is not unital and not
318
+ separable (see Lemma 6.7).
319
+ (4) One may also mention that if H1, H2, ..., Hn are projective Hilbert A-modules then
320
+ �n
321
+ i=1 Hi is also projective.
322
+ Proposition 2.11 (L. Robert). Let A be a C∗-algebra and H be an algebraically finitely gen-
323
+ erated Hilbert A-module. Then K(H) is unital and H is self-dual.
324
+ 6
325
+
326
+ Proof. Write H = �n
327
+ i=1 ξi ˜A (where ξi ∈ H). Put H1 = ˜A(n). We view both H and H1 as Hilbert
328
+ ˜A-modules. Write H1 = �n
329
+ i=1 ei ˜A, where ei = 1 ˜
330
+ A, 1 ≤ i ≤ n. Define a module map s : H1 → H
331
+ by s(ei) = ξi, 1 ≤ i ≤ n. Then
332
+ s(h) =
333
+ n
334
+
335
+ i=1
336
+ ξi⟨ei, h⟩ for all h ∈ H1.
337
+ (e 2.13)
338
+ In other words s = �n
339
+ i=1 θξi,ei ∈ K(H1, H). In particular, s ∈ L(H1, H). Since H is algebraically
340
+ generated by {ξ1, ξ2, .., ξn}, s is surjective. We then proceed the same proof of Theorem 2.5
341
+ to obtain the bounded module map L1 = T ∗S. Note, in this case, T ∈ K(H1 ⊕ H) and hence
342
+ L1 ∈ K(H1 ⊕ H). It follows that s ◦ ψ1 ∈ K(H) (with notation in the proof of 2.5). Since
343
+ s ◦ ψ1 = idH, we conclude that K(H) is unital.
344
+ By Theorem 2.5, ψ1(H) is an orthogonal summand of H1 = ˜A(n). Let U : H → ψ1(H) be a
345
+ bounded module map which implements the unitary equivalence. Note that U ∈ L(H, ψ1(H)).
346
+ Let Q : H1 → ψ1(H) be the projection of H1 onto the orthogonal summand ψ1(H).
347
+ Suppose that f ∈ H♯, i.e., f : H → A is a bounded module map. Define ˜f : H1 → A
348
+ by ˜f(h) = f ◦ U −1 ◦ Q(h)) for all h ∈ H1. Note that f(x) = ˜f(U(x)) for all x ∈ H. Since
349
+ H1 = ˜A(n) is self-dual, there is g ∈ H1 such that ˜f(h) = ⟨g, h⟩ for all h ∈ H1. If x ∈ H, then
350
+ f(x) = ˜f(U(x)) = ⟨g, Q(U(x))⟩. Hence f(x) = ⟨(QU)∗(g), x⟩ for all x ∈ H. Since (QU)∗(g) ∈ H,
351
+ this shows that H = H♯ and H is self-dual.
352
+ Lemma 2.12 (cf. Proposition 1.4.5 of [42]). Let A be a C∗-algebra and H a Hilbert A-module
353
+ and x ∈ H. Then, for any 0 < α < 1/2, there exists y ∈ xA ⊂ H with ⟨y, y⟩1/2 = ⟨x, x⟩1/2−α
354
+ such that x = y · ⟨x, x⟩α.
355
+ Proof. We first consider Hilbert ˜A module x ˜A. Put a = ⟨x, x⟩, an = (1/n + a)−α and xn =
356
+ x · (1/n + a)−α, n ∈ N. We will show that {xn} is a Cauchy sequence.
357
+ Put βn,m = (1/n + a)−α − (1/m + a)−α, n, m ∈ N. Then
358
+ ∥xβn,m∥ = ∥(βn,m⟨x, x⟩βn,m)1/2∥ = ∥a1/2βn,m∥.
359
+ Since a1/2(1/n+a)−α converges to a1/2−α in norm. we conclude that ∥xβn,m∥ → 0 as n, m → ∞.
360
+ It follows that xn → yα for some yα ∈ H. Hence xn⟨x, x⟩α → yα⟨x, x⟩α. Moreover, ⟨yα, yα⟩1/2 =
361
+ limn→∞ a1/2an = a1/2−α (converge in norm).
362
+ Similarly, limn→∞ ∥x − xanaα∥ = limn→∞ ∥a1/2(1 − anaα)∥ = 0. Since xnaα = xanaα,
363
+ we obtain that limn→∞ xnaα = x. It follows that x = yα⟨x, x⟩α. Choose α < α′ < 1/2. Then
364
+ (1/n+a)−α′aα′−α ∈ A. Since limn→∞ x(1/n+a)−α′aα′−α = limn→∞ x(1/n+a)−α′(1/n+a)α′−α =
365
+ limn→∞ x(1/n + a)−α = yα, yα ∈ xA.
366
+ Let us end this section with the following clarification on Definition 2.3.
367
+ Corollary 2.13. Let H be a Hilbert A-module and F ⊂ H be a subset.
368
+ (1) Then F ⊂ {z · a : z ∈ F, a ∈ A}.
369
+ (2) If H is algebraically finitely generated, then there are x1, x2, ..., xn ∈ H such that H =
370
+ {�n
371
+ i=1 xiai : ai ∈ A} (see Definition 2.3).
372
+ Proof. For (1), let z ∈ F. By Lemma 2.12, we may write z = y⟨z, z⟩α for some 0 < α < 1/2 and
373
+ y ∈ H. Let {eλ} ⊂ A be an approximate identity. Then zeλ = y⟨z, z⟩αeλ → y⟨z, z⟩ = z. Hence
374
+ z ∈ {z · a : z ∈ F, a ∈ A} (So in Definition 2.3, F is in the closure of {za : z ∈ F and a ∈ A}.)
375
+ For (2), suppose that H = �n
376
+ i=1 xi ˜A. By Lemma 2.12, we may write xi = yi⟨xi, xi⟩α for
377
+ some 0 < α < 1/2 and yi ∈ H, 1 ≤ i ≤ n. Let H0 = �n
378
+ i=1 yiA ⊂ H. Since xi = yi⟨xi, xi⟩α ∈ H0,
379
+ H ⊂ H0. It follows that H = �n
380
+ i=1 yiA.
381
+ 7
382
+
383
+ 3
384
+ Countably generated Hilbert modules
385
+ Let A be a C∗-algebra and H1 and H2 be a pair of Hilbert A-modules. In this section we discuss
386
+ the question when H1 is unitarily equivalent to a Hilbert A-submodule of H2. The main result
387
+ of this section is Theorem 3.6 which provide some answer to the question. For the connection
388
+ to Cuntz semigroup, see Corollary 3.9.
389
+ Lemma 3.1. Let A be a C∗-algebra and H a Hilbert A-module. Let {Eλ} be an approximate
390
+ identity for K(H). Then, for any ǫ > 0 and any finite subset F ⊂ H, there is λ0 such that, for
391
+ all λ ≥ λ0,
392
+ ∥Eλ(x) − x∥ < ǫ.
393
+ (e 3.14)
394
+ Proof. Let F = {ξ1, ξ2, ..., ξk} and ǫ > 0. Without loss of generality, we may assume that
395
+ 0 ̸= ∥ξi∥ ≤ 1, 1 ≤ i ≤ k. There is 1/3 < α < 1/2 such that
396
+ ∥⟨ξi, ξi⟩1−α − ⟨ξi, ξi⟩α∥ = ∥⟨ξi, ξi⟩α(⟨ξi, ξi⟩1−2α − 1)∥ < ǫ/3, 1 ≤ i ≤ k.
397
+ (e 3.15)
398
+ By Lemma 2.12, write ξi = ζi⟨ξi, ξi⟩α with ⟨ζi, ζi⟩ = ⟨ξi, ξi⟩1−2α, 1 ≤ i ≤ k. Put Si = θζi,ζi,
399
+ 1 ≤ i ≤ k. Then, for 1 ≤ i ≤ k,
400
+ ∥Si(ξi) − ξi∥ = ∥ζi⟨ζi, ξi⟩ − ξi∥ = ∥ζi⟨ξi, ξi⟩1−α − ζi⟨ξi, ξi⟩α∥ < ǫ/3.
401
+ There exists λ0 such that, for all λ ≥ λ0,
402
+ ∥EλSi − Si∥ < ǫ/3, 1 ≤ i ≤ k.
403
+ (e 3.16)
404
+ It follows that, for all λ ≥ λ0,
405
+ ∥Eλ(ξi) − ξi∥
406
+
407
+ ∥Eλ(ξi) − EλSi(ξi)∥ + ∥EλSi(ξi) − Si(ξi)∥ + ∥Si(ξi) − ξi∥
408
+ <
409
+ ∥Eλ∥∥ξi − Si(ξi)∥ + ǫ/3 + ǫ/3 < ǫ,
410
+ 1 ≤ i ≤ k.
411
+ At least part of the following is known, in fact, (1) ⇔ (2) is known as Corollary 1.5 of [39].
412
+ We also think that the rest of them are known. Note that even H is countably generated it may
413
+ not be separable when A is not separable.
414
+ Proposition 3.2 (cf. Corollary 1.5 of [39]). Let A be a C∗-algebra and H be a Hilbert A-module.
415
+ Then the following are equivalent.
416
+ (1) H is countably generated,
417
+ (2) K(H) is σ-unital and
418
+ (3) There exists an increasing sequence of module maps En ∈ K(H)+ with ∥En∥ ≤ 1 such
419
+ that
420
+ lim
421
+ n→∞ ∥Enx − x∥ = 0 for all x ∈ H.
422
+ (e 3.17)
423
+ Proof. As mentioned above, by Corollary 1.5 of [39], (1) ⇔ (2).
424
+ (1) ⇒ (3): Let {xn} be a sequence of elements in the unit ball of H such that H is generated
425
+ by {xn} as Hilbert A-module. Let Fn be the set of those elements with the form xia, 1 ≤ i ≤ n
426
+ and a ∈ A with ∥a∥ ≤ n. Note that ∪∞
427
+ n=1span(Fn) is dense in H. Warning: Fn is not a finite
428
+ subset.
429
+ 8
430
+
431
+ For each n ∈ N, there exists 0 < 1/3 < αn < 1/2 such that, for any 0 ≤ b ≤ 1 in A,
432
+ ∥b1/2−αn(1 − b1−2αn)bαn∥ ≤ 1/n2.
433
+ (e 3.18)
434
+ By Lemma 2.12, choose ξi,n ∈ xiA such that xi = ξi,n⟨xi, xi⟩αn with ⟨ξi,n, ξi,n⟩ = ⟨xi, xi⟩1−2αn.
435
+ Put bi = ⟨xi, xi⟩, n ∈ N. Then
436
+ θξi,n,ξi,n(xia) = ξi,n⟨ξi,n, ξi,nbαn
437
+ i ⟩a = ξi,n⟨ξi,n, ξi,n⟩bαn
438
+ i a = ξi,nb1−αn
439
+ i
440
+ a.
441
+ Then, for any ∥a∥ ≤ n and i, n ∈ N, by (e 3.18),
442
+ ∥θξi,n,ξi,n(xia) − xia∥2
443
+ =
444
+ ∥ξi,n(b1−αn
445
+ i
446
+ − bαn
447
+ i )a∥2 = ∥ξi,n(b1−2αn
448
+ i
449
+ − 1)bαn
450
+ i a∥2
451
+ (e 3.19)
452
+ =
453
+ ∥a∗bαn
454
+ i (b1−2αn
455
+ i
456
+ − 1)⟨ξi,n, ξi,n⟩(b1−2αn
457
+ i
458
+ − 1)bαn
459
+ i a∥
460
+ (e 3.20)
461
+ =
462
+ ∥b1/2−αn
463
+ i
464
+ (1 − b1−2αn
465
+ i
466
+ )bαn
467
+ i a∥2 ≤ (1/n)4∥a∥2 < 1/n2. (e 3.21)
468
+ By using an approximate identity of K(H), we obtain an increasing sequence of {En} ∈ A+
469
+ with ∥En∥ ≤ 1 such that
470
+ ∥Enθξi,nξi,n − θξi,n,ξi,n∥ < 1/n2, 1 ≤ i ≤ n.
471
+ (e 3.22)
472
+ It follows that, for any m ≥ n and a ∈ A with ∥a∥ ≤ n, by (e 3.21) and (e 3.22),
473
+ ∥Em(xia) − xia∥
474
+
475
+ ∥Em(xia − θξi,m,ξi,m(xia))∥ + ∥Em ◦ θξi,m,ξi,m(xia) − θξi,m,ξi,m(xia)∥
476
+ +∥θξi,mξi,m(xia) − xia∥
477
+ <
478
+ 1/m + ∥xa∥/m2 + 1/m2 < 2/m + 1/m2.
479
+ (e 3.23)
480
+ Since ∪∞
481
+ i=1span(Fi) is dense in H, this proves (3).
482
+ (3) ⇒ (2): Let {En} be an increasing sequence in K(H)+ with ∥En∥ ≤ 1 such that
483
+ lim
484
+ n→∞ ∥En(x) − x∥ = 0 for all x ∈ H.
485
+ (e 3.24)
486
+ Fix x1, x2, ..., xN, y1, y2, ..., yN ∈ H. Let S = �N
487
+ j=1 θxj,yj and
488
+ M = N · max ∥{∥yj∥; 1 ≤ j ≤ N}.
489
+ For any ǫ > 0, there exists n0 ∈ N such that
490
+ ∥Em(xj) − xj∥ <
491
+ ǫ
492
+ (M + 1), 1 ≤ j ≤ N.
493
+ (e 3.25)
494
+ whenever m ≥ n0. Then, for any m ≥ n0 and, for any z ∈ H,
495
+ ∥EmS(z) − S(z)∥ = ∥
496
+ N
497
+
498
+ j=1
499
+ (Emxj − xj)⟨yj, z⟩∥ ≤ (
500
+ ǫ
501
+ (M + 1))
502
+ m
503
+
504
+ j=1
505
+ ∥yj∥∥z∥ < ∥z∥ǫ.
506
+ (e 3.26)
507
+ It follows that limn→∞ ∥EmS − S∥ = 0. Since F(H) is dense in K(H), this implies that K(H)
508
+ is σ-unital.
509
+ Definition 3.3. Let H be a Hilbert A-module and G ⊂ H be a subset. We say G is A-weakly
510
+ dense in H, if, for any finite subset F ⊂ H, ǫ > 0, and any x ∈ H, there is g ∈ G such that
511
+ ∥⟨(x − g), z⟩∥ < ǫ for all z ∈ F.
512
+ (e 3.27)
513
+ (see Remark 6.2).
514
+ 9
515
+
516
+ One may compare the next proposition with Lemma 1.3 of [39].
517
+ Proposition 3.4. Let A be a σ-unital C∗-algebra and H be a Hilbert A-module.
518
+ (1) Let s ∈ K(H)+. Then s is a strictly positive element of K(H) if s(H) is A-weakly dense
519
+ in H, and, if s is a strictly positive element of K(H), then s(H) is dense in H.
520
+ (2) Let H1 and H2 be Hilbert A-modules and T ∈ K(H1, H2) such that T(H1) is A-weakly
521
+ dense in H2, then TT ∗ ∈ K(H2) is a strictly positive element of K(H2).
522
+ Proof. For (1), we note that, by Lemma 1.3 of [39], s is a strictly positive element if and only
523
+ s(H) is dense in H.
524
+ We now suppose that s(H) is A-weakly dense in H. Without loss of generality, we may
525
+ assume that ∥s∥ ≤ 1. Let p be the open projection associated with s, i.e., s1/n ր p. Put
526
+ ηn = ∥s1/ns − s∥, n ∈ N. Then limn→∞ ηn = 0.
527
+ Fix ǫ > 0. Let x, y ∈ H such that ∥x∥, ∥y∥ ≤ 1. Choose ξ1, ξ2 ∈ H such that ∥ξ1∥, ∥ξ2∥ ≤ 1.
528
+ Then, there is ξ ∈ H such that
529
+ ∥⟨s(ξ) − ξ1, y⟩∥ < ǫ/2.
530
+ (e 3.28)
531
+ Then
532
+ ∥⟨θξ1,ξ2(x) − θs(ξ),ξ2(x), y⟩∥ = ∥⟨ξ1⟨ξ2, x⟩, y⟩ − ⟨s(ξ)⟨ξ2, x⟩, y⟩∥
533
+ (e 3.29)
534
+ = ∥⟨ξ2, x⟩∗⟨ξ1 − s(ξ), y⟩∥ < ǫ/2.
535
+ (e 3.30)
536
+ We estimate that
537
+ ∥⟨s1/nθξ1,ξ2(x) − θξ1,ξ2(x), y⟩∥
538
+ =
539
+ ∥⟨s1/n(θξ1,ξ2 − θs(ξ),ξ2)(x), y⟩∥
540
+ +∥⟨(θs1/ns(ξ),ξ2(x) − θs(ξ1),ξ2(x)), y⟩∥ + ∥⟨(θs(ξ),ξ2(x) − θξ1,ξ2(x)), y⟩∥
541
+ <
542
+ ∥s1/n∥∥(θξ1,ξ2 − θs(ξ),ξ2)(x), y⟩∥ + ηn + ǫ/2
543
+ <
544
+ ǫ + ηn.
545
+ (e 3.31)
546
+ Fix n ∈ N, let ǫ → 0. We obtain that
547
+ ∥⟨s1/nθξ1,ξ2(x) − θξ1,ξ2(x), y⟩∥ ≤ ηn.
548
+ This holds for all y ∈ H with ∥y∥ ≤ 1. It follows that
549
+ ∥s1/nθξ1,ξ2(x) − θξ1,ξ2(x)∥ < ηn, n ∈ N.
550
+ (e 3.32)
551
+ Since (e 3.32) holds for every x ∈ H with ∥x∥ ≤ 1, we obtain that
552
+ ∥s1/nθξ1,ξ2 − θξ1,ξ2∥ < ηn, n ∈ N.
553
+ (e 3.33)
554
+ Since linear combinations of module maps of the form θξ1,ξ2 is dense in K(H), we obtain, for
555
+ any k ∈ K(H),
556
+ lim
557
+ n→∞ ∥s1/nk − k∥ = 0 = lim
558
+ n→∞ ∥k1/2(1 − s1/n)k1/2∥.
559
+ (e 3.34)
560
+ It follows that ∥k1/2(1 − p)k1/2∥ = 0, or pk = k for all k ∈ K(H). Thus p is the open projection
561
+ associated with the hereditary C∗-subalgebra K(H) (see Lemma 2.13 of [33]). It then follows
562
+ that s is a strictly positive element of K(H).
563
+ For (2), let H = H1 ⊕ H2. Define ˜T ∈ K(H) by ˜T(h1 ⊕ h2) = 0 ⊕ T(h1) for h1 ∈ H1 and
564
+ h2 ∈ H2. Let ˜T = V ( ˜T ∗ ˜T)1/2 be the polar decomposition of ˜T in K(H)∗∗. Then we may write
565
+ T = ˜T|H1 = V (T ∗T)1/2. Since T ∈ K(H1, H2), T ∗ ∈ K(H2, H1).
566
+ 10
567
+
568
+ Recall that T ∗ = |T|V ∗, V |T|V ∗ = |TT ∗|1/2 and V ∗|TT ∗|1/2 = T ∗. Hence T = (TT ∗)1/2V.
569
+ We then write T = (TT ∗)1/4(TT ∗)1/4V. Note that (TT ∗)1/4V ∈ K(H) and (TT ∗)1/4V (H) ⊂ H2.
570
+ It follows that (TT ∗)1/4(H2) is A -weakly dense in H2, as T(H) = (TT ∗)1/4((TT ∗)1/4V (H)) is
571
+ A-weakly dense in H2. By (1), this implies that (TT ∗)1/4 is a strictly positive element of K(H2).
572
+ Hence TT ∗ is a strictly positive element of K(H2).
573
+ 3.5. Let A be a C∗-algebra, H1, H2 be Hilbert A-modules and T ∈ B(H1, H2). Note T ∗ ∈
574
+ B(H2, H♯
575
+ 1) and, for any y ∈ H1, T ∗(y)(x) = ⟨y, Tx⟩ for all x ∈ H1. We may view H1 ⊂ H♯
576
+ 1. We
577
+ say T ∗(H2) is dense in H1, if T ∗(H2) ⊃ H1 (even though T ∗(H2) may not be in H1). Recall that
578
+ TK∗
579
+ 0 ∈ K(H1, H2), for any K0 ∈ K(H1) which has an adjoint (TK∗
580
+ 0)∗ = K0T ∗ ∈ K(H2, H1). If
581
+ we write T ∈ LM(K(H1, H2)), then, in general, T ∗ ∈ RM(K(H2, H1)). In particular, K0T ∗ ∈
582
+ K(H2, H1) for all K0 ∈ K(H1). These will be used in the next theorem.
583
+ The equivalence of (a) and (d) in part (2) of next theorem is known (see Theorem 4.1 of
584
+ [19]).
585
+ Theorem 3.6. Let A be a C∗-algebra and H1 and H2 be Hilbert A-modules. Suppose that H2
586
+ is countably generated.
587
+ (1) Then H2 is unitarily equivalent to a Hilbert A-submodule of H1 if and only if there is
588
+ bounded module map T : H1 → H2 such that T(H1) is A-weakly dense in H2.
589
+ (2) Suppose that H1 is also countably generated. Then the following are equivalent:
590
+ (a) H1 and H2 are unitarily equivalent as Hilbert A-module;
591
+ (b) there exists a bounded module map T ∈ B(H1, H2) such that T(H1) is A-weakly dense in
592
+ H2 and (K0T ∗)(H2) is A-weakly dense in H1 for any strictly positive element K0 ∈ K(H1);
593
+ (c) there exists a bounded module map T ∈ B(H1, H2) such that T(H1) is dense in H2 and
594
+ T ∗(H2) is dense in H1 (see 3.5);
595
+ (d) There is an invertible bounded module map T ∈ B(H1, H2).
596
+ Proof. For (1), the “only if” part is clear. Let us assumes that there is T ∈ B(H1, H2) whose
597
+ range is A-weakly dense in H2.
598
+ Suppose that H2 is generated by {x1, x2, ..., xn, ...}. For each n ∈ N, there exists a sequence
599
+ {yn,k} in H2 such that,
600
+ ∥⟨T(yn,k) − xn, xi⟩∥ < (
601
+ 1
602
+ k + n) max{∥xi∥ : 1 ≤ i ≤ n + k}, 1 ≤ i ≤ n + k.
603
+ Hence, for any fixed n and, any y ∈ H, limk→∞ ∥⟨T(yn,k) − xn, y⟩∥ = 0. It follows that the set
604
+ of linear combinations of elements in {T(yn,k)a : n, k ∈ N, a ∈ A} is A-weakly dense in H2. Let
605
+ H3 ⊂ H1 be the closure of A-submodule generated by {yn,k : k, n ∈ N}. Then H3 is a countably
606
+ generated Hilbert A-submodule of H1 such that T(H3) is A-weakly dense in H2.
607
+ Put H = H3 ⊕ H2. In what follows we may identify T with the map ˜T(h3 ⊕ h2) = 0 ⊕ T(h3)
608
+ for h3 ∈ H3 and h2 ∈ H2, whenever it is convenient. We may also view K(H2) and K(H3) as
609
+ hereditary C∗-subalgebras of K(H) (see Lemma 2.13 of [33]).
610
+ Applying Corollary 1.5 of [39] (see Lemma 3.2 above for convenience), we obtain strictly
611
+ positive elements K0 ∈ K(H3) ⊂ K(H) and L ∈ K(H2) ⊂ K(H), respectively. If follows from
612
+ (1) of Proposition 3.4 that K0(H3) is dense in H3. Thus TK0(H3) is A-weakly dense in H2.
613
+ Applying part (2) of Proposition 3.4, we conclude that S = (TK0)(TK0)∗ is a strictly positive
614
+ element of K(H2).
615
+ Therefore the range projection Ps of S in K(H3)∗∗ is the same as the range projection
616
+ of L. Write (TK0)∗ = US1/2 in the polar decomposition of (TK0)∗ in K(H)∗∗. Note that
617
+ (TK0)∗ = K1/2
618
+ 0
619
+ (TK1/2
620
+ 0
621
+ )∗ = US1/2. It follows that U(S1/2(H)) ⊂ H3. Since S1/2 is a strictly
622
+ 11
623
+
624
+ positive element of K(H2), H2 = S1/2H2. Hence U(H2) ⊂ H3. Note that UY ∈ K0 · K(H) for
625
+ any Y ∈ K(H). In particular, US′U ∗ ∈ K0 · K(H) · K0 = K(H3) for all S′ ∈ K(H2). We also
626
+ have UH2 ⊂ H3. Moreover
627
+ US1/nU ∗ ր UPsU ∗ = Q,
628
+ (e 3.35)
629
+ where Ps is the range projection of S (in K(H)∗∗) and Q is an open projection of K(H)∗∗, and
630
+ QUPs = U. It follows that U ∗U = Ps and UH2 ⊂ H3 is unitarily equivalent to H2. This proves
631
+ (1)
632
+ For (2). Let us first show that (b) ⇒ (a). We keep the notation used in the proof of part (1).
633
+ But since H1 is now assumed to be countably generated, we choose H3 = H1. In particular, K0
634
+ is a strictly positive element of K(H1). With notation in (1), it suffices to show that U(H2) is
635
+ dense in H1. Since K0T ∗(H) is A-weakly dense in H1, by Proposition 3.4, K0T ∗TK0 is a strictly
636
+ positive element in K(H1). By (1) of Proposition 3.4, K0T ∗TK0(H1) is dense in H1. Because
637
+ TK0(H1) ⊂ H2, this implies that K0T ∗(H2) is actually dense in H2.
638
+ Since K0T ∗ = US1/2, and K0T ∗(H2) is dense in H1, U(S1/2(H2)) is dense in H1. As in the
639
+ proof of (1) above, S1/2(H2) ⊂ H2. Hence, indeed, U(H2) is dense in H1.
640
+ Now consider (c) ⇒ (b). It suffices to show that K0T ∗(H2) is dense in H1.
641
+ Fix z ∈ H1. Since K0 is a strictly positive element, by Proposition 3.4, K0(H1) is dense in
642
+ H1. There exists a sequence zn ∈ H1 such that
643
+ lim
644
+ n→∞ ∥K0(zn) − z∥ = 0
645
+ (e 3.36)
646
+ By the assumption of (c), for each n ∈ N, there exists a sequence of elements yn,k ∈ H2 such
647
+ that (we do not assume that T ∗(yn,k) ∈ H1)
648
+ lim
649
+ k→∞ ∥T ∗(yn,k) − zn∥ = 0.
650
+ (e 3.37)
651
+ Thus, one obtain a subsequence {ym(n)} ⊂ {yn,k : k, n ∈ N} such that
652
+ lim
653
+ n→∞ ∥K0T ∗(ym(n)) − z∥ = 0.
654
+ (e 3.38)
655
+ This shows that K0T ∗(H2) is dense in H1, as desired.
656
+ It is clear that (a) ⇒ (b), (a) ⇒ (c) and (a) ⇒ (d).
657
+ It remains to show that (d) ⇒ (b). We will apply the proof of (1) first. But since H1 is
658
+ countably generated, choose H3 = H1. Let K0 be a strictly positive element of K(H1). Since T
659
+ is invertible, T(H1) is dense in H2. Therefore, it suffices to show that K0T ∗(H2) is A-weakly
660
+ dense in H1. Let H = H1 ⊕ H2. We will view K(H1) and K(H2) as hereditary C∗-subalgebras
661
+ of K(H). So T is identified with the bounded module map (h1 ⊕ h2) �→ 0 ⊕ T(h1) and T −1
662
+ is identified with the bounded module map (h1 ⊕ h2) �→ T −1(h2) ⊕ 0. In what follows, we
663
+ use the fact that (T −1)∗ = (T ∗)−1 and we will also work in H∼, if necessary (see Definition
664
+ 2.2). In this way, we may write T ∗, (T −1)∗ ∈ RM(K(H)). Hence, if E ∈ K(H2) ⊂ K(H),
665
+ E(T ∗)−1 = E(T −1)∗ ∈ K(H).
666
+ Let {En} be an approximate identity for K(H2). For any finite subset F ⊂ H2 in the unit
667
+ ball of H2, and ǫ > 0, by Lemma 3.1, there is n0 ∈ N such that, for all n ≥ n0,
668
+ ∥T −1En(x) − T −1(x)∥ < ǫ/(∥T ∗∥ + 1)(∥K0∥ + 1) for all x ∈ F.
669
+ (e 3.39)
670
+ It follows that, for any y ∈ H1 with ∥y∥ ≤ 1,
671
+ ∥⟨(En(T ∗)−1 − (T ∗)−1)(y), x⟩∥
672
+ =
673
+ ∥⟨y, (T −1En − T −1)(x)⟩∥
674
+ (e 3.40)
675
+
676
+ ∥y∥∥∥T −1En(x) − T −1(x)∥
677
+ (e 3.41)
678
+ <
679
+ ǫ/(∥T ∗∥ + 1)(∥K0∥ + 1)
680
+ (e 3.42)
681
+ 12
682
+
683
+ for all x ∈ F. Thus
684
+ ∥⟨T ∗En(T ∗)−1(y) − y, x⟩∥
685
+ =
686
+ ∥⟨T ∗En(T ∗)−1(y) − T ∗(T ∗)−1(y), x⟩∥
687
+ (e 3.43)
688
+ <
689
+ ǫ/(∥K0∥ + 1).
690
+ (e 3.44)
691
+ Hence
692
+ ∥⟨K0T ∗En(T ∗)−1(y) − K0(y), x⟩∥ < ǫ.
693
+ (e 3.45)
694
+ Since En(T ∗)−1 = En(T −1)∗ ∈ K(H), we have En(T ∗)−1(H1) ⊂ H2. Also, by (1) of Lemma 3.4,
695
+ K0(H1) is dense in H1. It follows from (e 3.45) that K0T ∗(H2) is A-weakly dense in H1.
696
+ Remark 3.7. Theorem 3.6 may provide a correction to 2.2 of [33] (which was not used there).
697
+ As the reader may expect that Theorem 3.6 will lead some discussion about the Cuntz
698
+ semigroups. Indeed we will discuss this in next section. But let us end this section with the
699
+ following corollary.
700
+ Definition 3.8. Let A be a C∗-algebra and b ∈ A+. Denote by Her(b) = bAb the hereditary
701
+ C∗-subalgebra of A. Suppose also a ∈ A+. Let us write a
702
+ ∼< b if there is x ∈ A such that x∗x = a
703
+ and xx∗ ∈ Her(b) (see [15] and this notation in [32]).
704
+ Corollary 3.9. Let A be a C∗-algebra and let a, b ∈ A+. Suppose that H1 = aA and H2 = bA.
705
+ Then a
706
+ ∼< b, if there is T ∈ B(H2, H1) whose range is A-weakly dense, and if a
707
+ ∼< b, then there
708
+ is T ∈ B(H2, H1) which has dense range.
709
+ Proof. Suppose that a
710
+ ∼< b, i.e., there is x ∈ A such that
711
+ x∗x = a and xx∗ ∈ Her(b) = bAb.
712
+ (e 3.46)
713
+ Then, for any c ∈ A, (x∗bc)(x∗bc)∗ = x∗bcc∗bx ∈ aAa. It follows that x∗bc ∈ aA = H2 for all
714
+ c ∈ A. Define T : H2 → H1 by T(bc) = x∗bc for all c ∈ A. Then T ∈ B(H2, H1). Since x∗x = a,
715
+ by Dini’s theorem, x∗b1/nx converges to a in norm. Since T is a bounded module map, we
716
+ conclude that T(H2) is dense in H1.
717
+ Now we assume that there is T ∈ B(H2, H1) whose range is A-weakly dense in H1. Note
718
+ that a is a strictly positive element of K(H1) and b is a strictly positive element of K(H2),
719
+ respectively. By Proposition 3.4, b(H2) is dense in H2. It follows that Tb(H2) is A-weakly dense
720
+ in H1. By (2) of Proposition 3.4, c = (Tb)(Tb)∗ is a strictly positive element of Her(a). Write
721
+ (Tb)∗ = uc1/2 as polar decomposition in A∗∗. Then uy ∈ A for all y ∈ aA. Put x = ua1/2. Then
722
+ x∗x = a and xx∗ ∈ K(H2) = Her(b).
723
+ (e 3.47)
724
+ 4
725
+ Equivalence classes of Hilbert modules and stable rank one
726
+ Now let us discuss the possibility to use quasitraces to measure Hilbert A-modules. We will
727
+ consider the question stated in 4.5. Moreover, we will discuss the case that unitary equivalence
728
+ classes of Hilbert A-submodules can be determined by the Cuntz semigroup.
729
+ Definition 4.1. Let A be a σ-unital C∗-algebra. Then one may identify A ⊗ K with K(HA).
730
+ Denote by CH(A) the unitary equivalence classes [H] of countably generated Hilbert A-modules
731
+ (where H is a countably generated Hilbert A-module).
732
+ 13
733
+
734
+ One may define [H1] + [H2] to be the unitarily equivalent class [H1 ⊕ H2]. Then CH(A)
735
+ becomes a semigroup.
736
+ Let a, b ∈ (A ⊗ K)+. We write a≈∼b, if there exists x ∈ A ⊗ K such that x∗x = a and xx∗ is
737
+ a strictly positive element of Her(b). In the terminology of [40], a ≈∼ b is the same as a ∼ b′ ∼= b
738
+ in [40].
739
+ Next proposition states that “≈∼” is an equivalence relation.
740
+ Let a ∈ (A ⊗ K)+. Define Ha = a(HA). Let H be a countably generated Hilbert A-module.
741
+ Then by [39] (see Proposition 3.2, for convenience), K(H) is σ-unital. We may view H as a
742
+ Hilbert A-submodule of HA = l2(A). Let b ∈ K(H) be a strictly positive element of K(H).
743
+ Then, by Proposition 3.4, Hb := bHA = bH = H. If c ∈ K(H) is another strictly positive
744
+ element, then Hc = Hb.
745
+ Let pa, pb be the open projections corresponding to a and b (in (A ⊗ K)∗∗), respectively.
746
+ Define pa ≈cu pb if there is v ∈ (A ⊗ K)∗∗ such that v∗v = pa and vv∗ = pb and, for any
747
+ c ∈ Her(a) and d ∈ Her(b), vc, v∗d ∈ A ⊗ K. See also [15] and [16].
748
+ We would like to remind the reader of the following statement.
749
+ Proposition 4.2 (Proposition 4.3 and 4.2 of [40]). Let A be a σ-unital C∗-algebra and a, b ∈
750
+ (A ⊗ K)+. Then the following are equivalent.
751
+ (1) a ≈∼ b;
752
+ (2) pa ≈cu pb and
753
+ (3) [Ha] = [Hb] in CH(A).
754
+ Moreover, “ ≈∼ ” is an equivalence relation.
755
+ 4.3. By subsection 4 of [9], there are examples of stably finite and separable C∗-algebras A
756
+ which contain positive elements a ∼ b in Cu(A) but a ̸≈∼ b.
757
+ 4.4. (1) Let A be a σ-unital C∗-algebra of stable rank one. By Theorem 3 of [11], a ∼ b in
758
+ Cu(A) if and only if Ha and Hb are unitarily equivalent. One may ask whether the converse
759
+ holds. Theorem 4.9 provides a partial answer to the question.
760
+ (2) Let A be a σ-unital simple C∗-algebra and Ped(A) be its Pedersen ideal.
761
+ Let a ∈
762
+ Ped(A) ∩ A+. Then Her(a) ⊗ K ∼= A ⊗ K, by Brown’s stable isomorphism theorem ([4]). One
763
+ notes that Her(a) is algebraically simple. To study the Cuntz semigroup of A, or the semigroup
764
+ CH(A), one may consider Her(a) instead of A.
765
+ (3) Let us now assume that A is algebraically simple. Let �
766
+ QT(A) be the set of all 2-quasi-
767
+ traces defined on the Pedersen ideal of A⊗K. Let QT(A) be the set of 2-quasi-traces τ ∈ �
768
+ QT(A)
769
+ such that ∥τ|A∥ = 1. Let us assume that QT(A) ̸= ∅. It follows from Proposition 2.9 of [20] that
770
+ 0 ̸∈ QT(A)
771
+ w. Recall that QT(A)
772
+ w is a compact set (see Proposition 2.9 of [20]).
773
+ Denote by Aff+(QT(A)
774
+ w) the set of all continuous affine functions f on the compact con-
775
+ vex set QT(A)
776
+ w such that f = 0, or f(τ) > 0 for all τ ∈ QT(A)
777
+ w. Let LAff+(QT(A)
778
+ w)
779
+ be the set of those lowe-semi-continuous affine functions f on QT(A)
780
+ w such that there are
781
+ fn ∈ Aff+(QT(A)
782
+ w) such that fn ր f (point-wisely). We allow f has value ∞.
783
+ (4) In what follows, for any 0 < δ < 1, denote by fδ a function in C([0, ∞)) with 0 ≤ fδ(t) ≤ 1
784
+ for all t ∈ [0, ∞), fδ(t) = 0 if t ∈ [0, δ/2], fδ(t) = 1 if t ∈ [δ, ∞) and fδ(t) is linear on (δ/2, δ).
785
+ Let a, b ∈ (A ⊗ K)+. Define
786
+ dτ(a) = lim
787
+ n→∞ τ(f1/n(a)) for all τ ∈ �
788
+ QT(A).
789
+ Note f1/n(a) ∈ Ped(A)+ for each n ∈ N.
790
+ 14
791
+
792
+ (5) Let A be an algebraically simple C∗-algebra with QT(A) ̸= ∅. We say A has strict
793
+ comparison (of Blackdar, see [3]), if, for any a, b ∈ (A ⊗ K)+, dτ(a) < dτ(b) for all τ ∈ QT(A)
794
+ w
795
+ implies that a ≲ b in Cu(A).
796
+ (6) A is said to have finite radius of comparison, if there is 0 < r < ∞ such that, for any
797
+ a, b ∈ (A ⊗ K)+, a ≲ b, whenever dτ(a) + r < dτ(b) for all τ ∈ QT(A)
798
+ w (see [50]).
799
+ If A is σ-unital simple which is not algebraically simple, we may pick a nonzero element
800
+ e ∈ Ped(A)+ and consider Her(a) ⊗ K ∼= A ⊗ K. Then we say that A has strict comparison (or
801
+ has finite radius comparison), if Her(e) does. It should be noted that this definition does not
802
+ depend on the choice of e. Note that, in both cases above, we always assume that �
803
+ QT(A) ̸= {0}.
804
+ 4.5. In this section, we will consider the following question: Suppose that dτ(b) is much larger
805
+ than dτ(a) for all τ ∈ QT(A)
806
+ w. Does it follow that a
807
+ ∼< b?, or equivalently, that Ha is unitarily
808
+ equivalent to a Hilbert A-submodule of Hb?
809
+ 4.6. (7) Define a map Γ : Cu(A) → LAff+(QT(A)
810
+ w) by Γ([a])(τ) = �
811
+ [a](τ) = dτ(a) for all
812
+ τ ∈ QT(A)
813
+ w.
814
+ (8) It is proved by M. Rordam [46] that, for a unital finite simple C∗-algebra A, if A
815
+ is Z-stable then A has stable rank one. Robert [44] showed that any σ-unital simple stably
816
+ projectionless Z-stable C∗-algebra A has almost stable rank one. Recently, it is shown that,
817
+ any σ-unital finite simple Z-stable C∗-algebra has stable rank one (see [21]).
818
+ A part of the Toms-Winter conjecture states that, for a separable amenable simple C∗-
819
+ algebra A, A is Z-stable if and only if A has strict comparison. It follows from [46] and [18]
820
+ that if A is Z-stable, then A has strict comparison and Γ is surjective. The remaining open
821
+ question is whether a separable amenable simple C∗-algebra A with strict comparison is always
822
+ Z-stable. There are steady progresses to resolve the remaining problem ([28], [47], [52], [55],
823
+ [48], [14], [36] and [37], for example).
824
+ Since strict comparison is a property for Cu(A), one may ask the question whether a separable
825
+ amenable simple C∗-algebra A whose Cu(A) behaves like a separable simple Z-stable C∗-algebra
826
+ is in fact Z-stable. To be more precise, let us assume that A is a separable simple C∗-algebra
827
+ such that Cu(A) = V (A) ⊔ (LAff+(�
828
+ QT(A)) \ {0}) = CH(A), where V (A) is the sub-semigroup
829
+ of Cu(A) whose elements are represented by projections, i.e., A has strict comparison, Γ is
830
+ surjective and Cu(A) = CH(A). The question is whether such A is Z-stable, if we also assume A
831
+ is amenable. Theorem 4.9 shows that such C∗-algebras always have stable rank one, by showing
832
+ that these C∗-algebras have tracial approximate oscillation zero (see 4.7). It should be also
833
+ mentioned that if A is a separable unital simple C∗-algebra with stable rank one, then Γ is
834
+ surjective (see [48] and [2]).
835
+ To state the next lemma, let us recall the definition of tracial approximate oscillation zero.
836
+ Definition 4.7. Let A be a C∗-algebra with �
837
+ QT(A) \ {0} ̸= ∅. Let S ⊂ �
838
+ QT(A) be a compact
839
+ subset. Define, for each a ∈ (A ⊗ K)+,
840
+ ω(a)|S
841
+ =
842
+ lim
843
+ n→∞ sup{dτ(a) − τ(f1/n(a)) : τ ∈ S}
844
+ (e 4.48)
845
+ (see A1 of [17] and Definition 4.1 of [20]). We will assume that A is algebraically simple and only
846
+ consider the case that S = QT(A)
847
+ w, and in this case, we will write ω(a) instead of ω(a)|QT(A)
848
+ w,
849
+ in this paper. It should be mentioned that ω(a) = 0 if and only if dτ(a) is continuous (and
850
+ finite) on QT(A)
851
+ w.
852
+ In this case, (when ∥a∥
853
+ 2,QT (A)w < ∞, for example, a ∈ Ped(A ⊗ K)), we write ΩT(a) =
854
+ ΩT (a)|S = 0, if there is a sequence bn ∈ Ped(A ⊗ K) ∩ Her(a)+ such that ∥bn∥ ≤ ∥a∥,
855
+ lim
856
+ n→∞ ω(bn) = 0 and
857
+ lim
858
+ n→∞ ∥a − bn∥
859
+ 2,QT (A)w = 0,
860
+ (e 4.49)
861
+ 15
862
+
863
+ where ∥x∥
864
+ 2,QT (A)w = sup{τ(x∗x)1/2 : τ ∈ QT(A)
865
+ w} (see Proposition 4.8 of [20]). If ω(a) = 0,
866
+ then ΩT (a) = 0 (see the paragraph after Definition 4.7 of [20]).
867
+ Even if A is not algebraically simple (but σ-unital and simple), we may fix a nonzero element
868
+ e ∈ Ped(A) ∩ A+ (so that Her(e) ⊗ K ∼= A ⊗ K) and choose S = QT(Her(e))
869
+ w. Then, for any
870
+ a ∈ (A ⊗ K)+ with ∥a∥2,S < ∞, we write ΩT (a) = 0 if ΩT (a)|S = 0 (this does not depend on the
871
+ choice of e, see Proposition 4.9 of [20]).
872
+ A σ-unital simple C∗-algebra A is said to have tracial approximate oscillation zero, if ΩT (a) =
873
+ 0 for every positive element a ∈ Ped(A ⊗ K).
874
+ Lemma 4.8. Let A be a σ-untal algebraically simple C∗-algebra with QT(A) ̸= ∅, strict com-
875
+ parison and surjective Γ. For any a ∈ (A ⊗ K)+, there is b ∈ (A ⊗ K)+, such that Γ([a]) = Γ([b])
876
+ in Cu(A) such that ΩT(b) = 0.
877
+ Proof. Recall that we assume that QT(A) ̸= ∅. Let g ∈ LAff+(QT(A)
878
+ w) be such that �
879
+ [a] = g.
880
+ There is a sequence of increasing gn ∈ Aff+(QTA) such that gn ր g (pointwisely).
881
+ Put f1 = g1 − (1/4)g1 ∈ Aff+(QT(A)
882
+ w) and α1 = 1/4. Then g2(τ) > f1(τ) for all τ ∈
883
+ QT(A)
884
+ w. Choose 0 < α2 < 1/22+1 such that (1 − α2)g2(τ) > f1(τ) for all τ ∈ QT(A)
885
+ w.
886
+ Put f2 = (1 − α2)g2. Suppose that 0 < αi < 1/22+i is chosen, i = 1, 2, ..., n, such that (1 −
887
+ αi+1)gi+1(τ) > (1−αi)gi(τ) for all τ ∈ QT(A)
888
+ w, i = 1, 2, ..., n−1. Then gn+1(τ) > (1−αn)gn(τ)
889
+ for all τ ∈ QT(A)
890
+ w. Choose 0 < αn+1 < 1/22+n such that (1 − αn+1)gn+1(τ) > (1 − αn)gn(τ)
891
+ for all τ ∈ QT(A)
892
+ w. Define fn+1 = (1 − αn+1)gn+1 ∈ Aff+(QT(A)
893
+ w). By induction, we obtain a
894
+ strictly increasing sequence fn ∈ Aff+(QT(A)
895
+ w) such that fn ր g.
896
+ Define h1 = f1 and hn = fn − fn−1 for n ≥ 2. Then hn ∈ Aff+(QT(A)
897
+ w) and g = �∞
898
+ n=1 hn
899
+ (converges point-wisely). Since Γ is surjective, there are an ∈ (A ⊗ K)+ such that �
900
+ [an](τ) =
901
+ dτ(an) = hn, n ∈ N. We may assume that aiaj = 0 if i ̸= j. Define b ∈ (A ⊗ K)+ by b =
902
+ �∞
903
+ n=1 an/n.
904
+ Then �[b] = g. In other words, Γ([a]) = Γ([b]).
905
+ For each m ∈ N, since �
906
+ [an] is continuous on QT(A)
907
+ w, (by Lemma 4.5 of [20]), choose en,m ∈
908
+ Her(an) with 0 ≤ en,m ≤ 1 such that {en,m}m∈N forms an approximate identity (for Her(an)),
909
+ dτ(an) − τ(en,m) < 1/2n+m for all τ ∈ QT(A)
910
+ w, and ω(en,m) < 1/2n+m.
911
+ (e 4.50)
912
+ Define en = �n
913
+ j=1 ej,n. Since aiaj = 0, if i ̸= j, we have that 0 ≤ en ≤ 1, and {en} forms an
914
+ approximate identity for Her(b). By (2) of Proposition 4.4 of [20], we compute that
915
+ ω(en) ≤
916
+ n
917
+
918
+ j=1
919
+ ω(ej,n) <
920
+ n
921
+
922
+ j=1
923
+ 1/2j+n = 1/2n.
924
+ (e 4.51)
925
+ Hence limn→∞ ω(en) = 0 and, by Proposition 5.7 of [20], ΩT (b) = 0.
926
+ Theorem 4.9. Let A be a σ-unital simple C∗-algebra with strict comparison and surjective Γ
927
+ (which is not purely infinite). Then the following are equivalent:
928
+ (1) for any a, b ∈ (A ⊗ K)+, [a] = [b] in Cu(A) if and only if a ≈∼ b;
929
+ (2) A has stable rank one;
930
+ (3) Cu(A) = CH(A);
931
+ (4) for any a, b ∈ (A ⊗ K)+, [a] = [b] in Cu(A) if and only if Hilbert A-module Ha and Hb
932
+ are unitarily equivalent.
933
+ Proof. (2) ⇒ (3) follows from Theorem 3 of [11].
934
+ (3) ⇔ (4) follows from the definition.
935
+ 16
936
+
937
+ (1) ⇔ (4) follows from Proposition 4.2.
938
+ (3) ⇒ (2): We will show that A has tracial approximate oscillation zero (see Definition 5.1
939
+ of [20]).
940
+ Let a ∈ (Ped(A ⊗ K)) with 0 ≤ a ≤ 1. Suppose that Γ([a]) is continuous. Then ω([a]) = 0.
941
+ Hence ΩT (a) = 0. Now suppose that Γ([a]) is not continuous.
942
+ In particular, [a] cannot be
943
+ represented by a projection. By Lemma 4.8, there exists b ∈ (A ⊗ K)+ such that ΩT(b) = 0 and
944
+ Γ([a]) = Γ([b]). Since we now assume that Γ([a]) is not continuous neither is Γ([b]). Hence both
945
+ [a] and [b] are not represented by projections. As we assume that A has strict comparison, this
946
+ implies that [a] = [b].
947
+ Since (3) holds, a(HA) is unitarily equivalent to b(HA). We have shown (3) ⇔ (4) and (1) ⇔
948
+ (4). By Proposition 4.2, there is a partial isometry v ∈ (A⊗K)∗∗ such that v∗cv ∈ a(A ⊗ K)a for
949
+ all c ∈ b(A ⊗ K)b and v∗bv is a strict positive element of a(A ⊗ K)a. It follows that ΩT(a) = 0.
950
+ Since this holds for every a ∈ Ped(A ⊗ K), A has tracial approximate oscillation zero.
951
+ By
952
+ Theorem 9.4 of [20], A has stable rank one, i.e., (2) holds.
953
+ Let us end this section with the following partial answer to the question in 4.5. Note that
954
+ dτ(b) is as large as one can possibly have.
955
+ Theorem 4.10. Let A be a σ-unital simple C∗-algebra with finite radius of comparison. Suppose
956
+ that a, b ∈ (A ⊗ K)+ such that dτ(b) = ∞ for all τ ∈ �
957
+ QT(A) \ {0}. Then
958
+ (1) a
959
+ ∼< b and Ha is unitarily equivalent to an orthogonal summand of Hb,
960
+ (2) Hb ∼= HA as Hilbert A-module, and
961
+ (3) Her(b) ∼= A ⊗ K.
962
+ Proof. Put B = b(A ⊗ K)b. Let us show that B is stable.
963
+ We will use the characterization
964
+ of stable C∗-algebras of [25].
965
+ Moreover, we use the following fact: If A has finite radius of
966
+ comparison and c, b ∈ (A ⊗ K)+ such that dτ(d) < ∞ and dτ(b) = ∞ for all τ ∈ �
967
+ QT(A) \ {0},
968
+ then d ≲ b.
969
+ Let c ∈ B+ such that there exists e ∈ B+ such that ec = c. Working in the commutative
970
+ C∗-subalgebra generated by c and e, we conclude that, if 0 < δ < 1/2, fδ(e)c = c.
971
+ Let b1 := (1 − f1/8(e))1/2b(1 − f1/8(e))1/2. Then
972
+ b1c = cb1 = 0.
973
+ (e 4.52)
974
+ Note that f1/16(e) ∈ Ped(A ⊗ K)+. Therefore
975
+ dτ(f1/8(e)) ≤ τ(f1/16(e)) < ∞ for all τ ∈ �
976
+ QT(A).
977
+ We also have
978
+ b ≲ b1/2(1 − f1/8(e))b1/2 ⊕ b1/2f1/8(e)b1/2.
979
+ (e 4.53)
980
+ Since b1/2f1/8(e)b1/2 ≲ f1/8(e), then dτ(b1/2f1/8(e)b1/2) < ∞ for all τ ∈ �
981
+ QT(A). Hence
982
+ dτ(b1) = dτ(b1/2(1 − f1/8(e))b1/2) = ∞ for all τ ∈ �
983
+ QT(A) \ {0}.
984
+ (e 4.54)
985
+ Since A has finite radius of comparison, as mentioned above, we have that
986
+ f1/8(e) ≲ b1.
987
+ (e 4.55)
988
+ There is, by Lemma 2.2 of [45], x ∈ A ⊗ K such that
989
+ x∗x = f1/16(f1/8(e)) and xx∗ ∈ Her(b1).
990
+ (e 4.56)
991
+ 17
992
+
993
+ Let x = v|x| be the polar decomposition of x in A∗∗. Then ϕ : Her(f1/6(f1/8(e))) → Her(b1) de-
994
+ fined by ϕ(d) = vdv∗ for all d ∈ Her(f1/6(f1/8(e))) is homomorphism. Note that f1/6(f1/8(e)) ≤
995
+ f1/4(e) and f1/4(e)c = c. Put y = vc1/2. Then y ∈ A ⊗ K and y∗y = c and yy∗ ∈ Her(b1). Hence
996
+ c = yy∗ and c ⊥ yy∗.
997
+ (e 4.57)
998
+ Since c is chosen arbitrarily in B+ with the property that there is e ∈ B+ such that ec = c, it
999
+ follows from Theorem 2.1 of [25] that B is stable. By Brown’s stable isomorphism theorem ([4]),
1000
+ B ∼= A ⊗ K. This proves (3).
1001
+ Since B is stable, there is a sequence of mutually orthogonal nonzero elements b0,n ∈ B+
1002
+ (n ∈ N) such that b0,1
1003
+ ≈∼ b0,n for all n ∈ N and b0 = �∞
1004
+ n=1 b0,n/n ∈ B is a strictly positive
1005
+ element. We have Hb0,n ∼= Hb0,m for all n, m ∈ N. It follows that Hb = Hb0 ∼= l2(Hb0) as Hilbert
1006
+ A-modules. By Proposition 7.4 of [29], l2(Hb0) ∼= l2(A) = HA as Hilbert A-module. This proves
1007
+ (2).
1008
+ For (1), since we have shown that Hb ∼= HA, we may apply Kasparov’s absorbing theorem
1009
+ ([26]).
1010
+ 5
1011
+ Projective Hilbert Modules
1012
+ The main result of this section is Theorem 5.6 which states that, for separable C∗-algebra A,
1013
+ every countably generated Hilbert A-module is projective.
1014
+ Note that in the following statement, we use the fact that B(H) = LM(H) (see Theorem
1015
+ 1.5 of [33]).
1016
+ Lemma 5.1. Let A be a C∗-algebra and H be Hilbert A-modules. Suppose that T ∈ B(H) is
1017
+ a bounded module map such that T(H) is a Hilbert A-submodule of H and L ∈ LM(K(H)) the
1018
+ corresponding left multiplier. Then LK(H) = K(T(H)).
1019
+ Proof. Let H1 = T(H) and F(H) be the linear span of bounded module maps of the form θx,y
1020
+ for x, y ∈ H. Note that Lb(x) = Tb(x) for all b ∈ K(H) and x ∈ H.
1021
+ Let ξ, ζ ∈ H1 ⊂ H. Since T : H → H1 is surjective, there is x ∈ H such that T(x) = ξ. Then
1022
+ T ◦ θx,ζ = θξ,ζ. This implies that LF(H) = F(H1). Let H0 = kerT be as a Hilbert submodule of
1023
+ H. Then K(H0) ⊂ K(H) is a hereditary C∗-subalgebra of K(H) (see Lemma 2.13 of [33]). Let
1024
+ p be the open projection in K(H)∗∗ corresponding to K(H0). Then (working in H∼ if necessary)
1025
+ Lp = 0 and Lb = L(1 − p)b for all b ∈ K(H). We identify H/H0 with (1 − p)H (⊂ H∼). Let
1026
+ ˜T : (1 − p)H → H1 be the bounded module map induced by T which has a bounded inverse
1027
+ ˜T −1 as T is surjective. Note that ˜T −1(T(z)) = (1 − p)z for all z ∈ H.
1028
+ To show that T(K(H)) = K(H1), fix S ∈ K(H1). Let Sn ∈ F(H1) be such that
1029
+ limn→∞ ∥Sn − S∥ = 0. Since LF(H) = F(H1), we may choose Fn ∈ F(H) such that LFn = Sn,
1030
+ n ∈ N. Then, for any x ∈ H, ˜T −1(LFn(x)) = (1 − p)Fn(x).
1031
+ We claim that {(1 − p)Fn} converges in norm to an element of the form (1 − p)b for some
1032
+ b ∈ K(H). Note that, for any n, m ∈ N, and any x ∈ H,
1033
+ ∥(1 − p)Fn(x) − (1 − p)Fm(x)∥ = ∥ ˜T −1(LFn(x) − LFm(x))∥ ≤ ∥ ˜T −1∥∥Sn − Sm∥∥x∥.
1034
+ This implies that {(1−p)Fn} is Cauchy in norm and it must converges to an element of the form
1035
+ (1 − p)b for some b ∈ K(H), as (1 − p)K(H) is closed. It then follows that, for any b ∈ K(H),
1036
+ Lb = L(1 − p)b = lim
1037
+ n→∞ L(1 − p)Fn = lim
1038
+ n→∞ Sn = S.
1039
+ This shows that LK(H) = K(H1).
1040
+ 18
1041
+
1042
+ Definition 5.2. Let H and H1 be Hilbert A-modules and T : H1 → H be a surjective bounded
1043
+ module map. Then T induces an invertible bounded map ˜T : H1/kerT → H from Banach A-
1044
+ modules H1/kerT onto H. Denote by ˜T −1 : H → H1/kerT the inverse (which is also bounded).
1045
+ Theorem 5.3. Let A be a σ-unital C∗-algebra.
1046
+ For any countably generated Hilbert A-modules H1, H2, H3, any bounded module maps T1 :
1047
+ H1 → H3 and T2 : H2 → H3. Suppose that T1 is surjective, then there is a bounded module map
1048
+ T3 : H2 → H1 such that
1049
+ T1 ◦ T3 = T2.
1050
+ Moreover, ∥T3∥ = ∥ ˜T −1
1051
+ 1
1052
+ ◦ T2∥.
1053
+ Proof. Without loss of generality, we may assume that ∥T2∥ = 1. Let H4 = H1 ⊕ HA, H5 =
1054
+ H2 ⊕ HA and H6 = H3 ⊕ HA. Let T4 = T1 ⊕ idHA : H4 → H6 and T5 = T2 ⊕ idHA : H5 → H6.
1055
+ Suppose T1 is surjective. Then T4 is surjective. Suppose that there is a bounded module map
1056
+ T ′ : H5 → H4 such that
1057
+ T4 ◦ T ′ = T5 and ∥T ′∥ = ∥ ˜T −1
1058
+ 4
1059
+ ◦ T5∥
1060
+ One computes that
1061
+ ∥ ˜T −1
1062
+ 4
1063
+ ◦ T5∥ = ∥ ˜T −1
1064
+ 1
1065
+ ◦ T2∥.
1066
+ One also has that
1067
+ T4 ◦ T ′|H2 = T5|H2 = T2.
1068
+ Since range(T2) ⊂ H3, T4(T ′(H2)) = T5(H2) ⊂ H3. Let P1 : H4 → H1, PHA : H4 → HA
1069
+ and P3 : H6 → H3 be the orthogonal projections.
1070
+ Then P3 ◦ T4 ◦ T ′|H2 = T2. Write T ′ =
1071
+ P1T ′ + (1H4 − P1)T ′. Note that 1H4 − P1 = PHA and P3T4(1H4 − P1) = 0. Then
1072
+ P3 ◦ T4 ◦ T ′|H2
1073
+ =
1074
+ P3 ◦ T4 ◦ P1 ◦ T ′|H2 + P3 ◦ T4 ◦ (1H4 − P1) ◦ T ′|H2
1075
+ (e 5.58)
1076
+ =
1077
+ P3 ◦ T4 ◦ P1 ◦ T ′|H2 + 0
1078
+ (e 5.59)
1079
+ =
1080
+ T1 ◦ P1 ◦ T ′|H2.
1081
+ (e 5.60)
1082
+ Define T = P1 ◦ T ′|H2. Then, by (e 5.60),
1083
+ T1 ◦ T = T2 and ∥T∥ = ∥P1 ◦ T ′|H2∥ = ∥ ˜T −1
1084
+ 1
1085
+ ◦ T2∥.
1086
+ (e 5.61)
1087
+ Therefore, without loss of generality, we may assume that H1 ∼= H2 ∼= H3 = HA. Put B =
1088
+ A⊗K. B is a σ-unital C∗-algebra. We view T1 as a bounded module map from HA onto HA. Let
1089
+ H0 = ker T1. Then H0 is a Hilbert A-submodule of HA and K(H0) ⊂ K(HA) = B is a hereditary
1090
+ C∗-subalgebra (see Lemma 2.13 of [33]). Let p ∈ B∗∗ be the open projection corresponding to
1091
+ the hereditary C∗-subalgebra K(H0). Let L1 ∈ LM(B) be given by the bounded module map
1092
+ T1 (see Theorem 1.5 of [31]). Note that L1b(z) = T1(b(z)) for all z ∈ HA and b ∈ B. For any
1093
+ a ∈ K(H0) ⊂ B, L1a = 0. It follows that L1p = 0 and L1(1 − p) = L1.
1094
+ Let J = K(H0)B be the right ideal of K(HA) = B. Consider the quotient Banach B-
1095
+ module B/J. Note that the module map ¯b �→ (1 − p)b is an isometry.
1096
+ So we may identify
1097
+ B/J with (1 − p)B. Define ˜L1 : B/J → B by ˜L1((1 − p)b) = L1b for b ∈ B. Viewing B
1098
+ as a Hilbert B-module, one has K(B) = B. By Lemma 5.1, viewing B as Hilbert B-module,
1099
+ L1B = L1K(B) = K(B) = B. It follows that ˜L1 is also a surjective map and hence has bounded
1100
+ inverse as a bounded linear map.
1101
+ Denote its inverse as ˜L−1
1102
+ 1 . Note that ˜L−1
1103
+ 1 L1b = (1 − p)b
1104
+ for b ∈ B (recall that L1 is surjective).
1105
+ In particular, ˜L−1
1106
+ 1
1107
+ is a bounded module map from
1108
+ K(HA) = B to (1 − p)B.
1109
+ We may also use the identification HA/H0 = (1 − p)HA. Now T1 induces a bounded module
1110
+ map ˜T1 from (1 − p)HA onto HA which has a bounded inverse ˜T −1
1111
+ 1 . Let L2 ∈ LM(B) be given
1112
+ 19
1113
+
1114
+ by the bounded module map T2. Then the map L2 : B → B given by L2(b) = L2b for all b ∈ B
1115
+ is a bounded B-module map from B into B = K(HA).
1116
+ Consider the bounded B-module map ˜L−1
1117
+ 1
1118
+ ◦ L2 : B → B/J. Then, by 3.11 of [6], there exists
1119
+ a bounded module map L : B → B such that
1120
+ (1 − p)L = ˜L−1
1121
+ 1
1122
+ ◦ L2 and ∥L∥ = ∥˜L−1
1123
+ 1
1124
+ ◦ L2∥.
1125
+ (e 5.62)
1126
+ It follows that ˜L1(1 − p)L = L2. Recall that ˜L1(1 − p) = L1. Therefore
1127
+ L1 ◦ L = L2.
1128
+ (e 5.63)
1129
+ We identify L with a left multiplier in LM(B) (see Theorem 1.5 of [31]). Let T : H1 = HA →
1130
+ HA = H3 be the bounded module map given by L (see again Theorem 1.5 of [31]). Then we
1131
+ obtain that
1132
+ T1 ◦ T = T2 and ∥T∥ = ∥ ˜T −1
1133
+ 1
1134
+ ◦ T2∥.
1135
+ (e 5.64)
1136
+ The commutative diagrams on B level may be illustrated as follows (with π : B → B/J the
1137
+ quotient map given by (1 − p))
1138
+ B
1139
+ ↓L2
1140
+ ցL
1141
+ B
1142
+ ևL1
1143
+ B
1144
+ �L−1
1145
+ 1
1146
+ ↕�L1
1147
+ ւπ
1148
+ B/J
1149
+ and
1150
+ B
1151
+ −→L
1152
+ B
1153
+ �L−1
1154
+ 1
1155
+ L2 ↓
1156
+ ւπ
1157
+ B/J
1158
+ .
1159
+ Corollary 5.4. Let A be a σ-unital C∗-algebra and let
1160
+ 0 → H1 →ι H2 →s H3 → 0
1161
+ be a short exact sequence of countably generated Hilbert A-modules. Then it splits. Moreover,
1162
+ the splitting map j : H3 → H2 has ∥j∥ = ∥˜s−1∥.
1163
+ Proof. Consider the diagram:
1164
+ H2
1165
+ ↓s
1166
+ H3
1167
+ idH3
1168
+ ։
1169
+ H3
1170
+ By Theorem 5.3, there is a bounded module map T : H3 → H2 such that
1171
+ s ◦ T = idH3 and ∥T∥ = ∥˜s−1∥.
1172
+ We need the following lemma which the authors could not locate a reference.
1173
+ Lemma 5.5. Let X be a Banach space and let H be a separable Banach space. Suppose that
1174
+ T : X → H is a surjective bounded linear map. Then there is a separable subspace Y ⊂ X such
1175
+ that TX = H.
1176
+ 20
1177
+
1178
+ Proof. Note that the Open Mapping Theorem applies here. From the open mapping theorem
1179
+ (or a proof of it), there is δ > 0 for which T(B(0, a)) is dense in O(0, aδ) for any a > 0, where
1180
+ B(0, a) = {x ∈ X : ∥x∥ ≤ a} and O(0, b) = {h ∈ H : ∥h∥ < b}. For each rational number r > 0,
1181
+ since H is separable, one may find a countable set Er ⊂ B(0, r) such that T(Er) is dense in
1182
+ O(0, rδ). Let Y be the closed subspace generated by ∪r∈Q+Er.
1183
+ Let d = δ/2 and let y0 ∈ O(0, d). Then T(Y ∩ B(0, 1/2)) is dense in O(0, d). Choose ξ1 ∈
1184
+ Y ∩ B(0, 1/2) such that
1185
+ ∥y0 − Tξ1∥ < δ/22.
1186
+ (e 5.65)
1187
+ In particular,
1188
+ y1 = y0 − Tξ1 ∈ O(0, δ/22).
1189
+ (e 5.66)
1190
+ Since T(Y ∩ B(0, 1/22)) is dense in O(0, δ/22), one obtains ξ2 ∈ Y ∩ B(0, 1/22) such that
1191
+ ∥y1 − Tξ2∥ < δ/23.
1192
+ (e 5.67)
1193
+ In other words,
1194
+ y2 = y1 − Tξ2 = y0 − (Tξ1 + Tξ2) ∈ O(0, δ/23).
1195
+ (e 5.68)
1196
+ Continuing this process, one obtains a sequence of elements {ξn} ⊂ Y for which ξn ∈ B(0, 1/2n)
1197
+ and
1198
+ ∥y0 − (Tξ1 + Tξ2 + · · · + Tξn)∥ < δ/2n+1, n = 1, 2, ....
1199
+ (e 5.69)
1200
+ Define ξ0 = �∞
1201
+ n=1 ξn. Note that the sum converges in norm and therefore ξ0 ∈ Y. By the
1202
+ continuity of T,
1203
+ Tξ0 = y0.
1204
+ (e 5.70)
1205
+ This implies that T(Y ) ⊃ O(0, d). It follows that T(Y ) = H.
1206
+ Theorem 5.6. Let A be a separable C∗-algebra. Then every countably generated Hilbert A-
1207
+ module is projective in the following sense:
1208
+ For any Hilbert A-modules H1, H2, H3, any bounded module maps T1 : H1 → H3 and T2 :
1209
+ H2 → H3. Suppose that T1 is surjective and H2 is countably generated, then there is a bounded
1210
+ module map T3 : H2 → H1 such that
1211
+ T1 ◦ T3 = T2.
1212
+ Moreover, ∥T3∥ = ∥ ˜T −1
1213
+ 1
1214
+ ◦ T2∥.
1215
+ The statement above may be illustrated as follows:
1216
+ H2
1217
+ H3
1218
+ H1
1219
+ T2
1220
+ T3
1221
+ T1
1222
+ (e 5.71)
1223
+ 21
1224
+
1225
+ Proof. Let H′
1226
+ 3 be the Hilbert A-module generated by T2(H2). Since H2 is countably generated,
1227
+ so is H′
1228
+ 3. Since A is separable, H′
1229
+ 3 is separable. Let H′
1230
+ 1 = T −1(H′
1231
+ 3), the pre-image of H′
1232
+ 3 under
1233
+ T1. So T1|H′
1234
+ 1 : H′
1235
+ 1 → H′
1236
+ 3 is surjective. Then, by Lemma 5.5, there is a separable Banach subspace
1237
+ of S ⊂ H′
1238
+ 1 such that T1(S) = H′
1239
+ 3. Let {xn} be a dense subset of S. Define H′′
1240
+ 1 to be the closure of
1241
+ span{xna : a ∈ A, n = 1, 2, ....}. Then H′′
1242
+ 1 is a countably generated Hilbert A-module. Moreover,
1243
+ S ⊂ H′′
1244
+ 1 ⊂ H′
1245
+ 1 ⊂ H1. But T1(S) = H′
1246
+ 3. Therefore T1(H′′
1247
+ 1 ) = H′
1248
+ 3. We have the following diagram:
1249
+ H2
1250
+ H′′
1251
+ 3
1252
+ H′′
1253
+ 1
1254
+ T2
1255
+ T1
1256
+ (e 5.72)
1257
+ Now H′
1258
+ 1, H2 and H′′
1259
+ 3 are all countably generated. By 5.3, there exists T3 : H2 → H′′
1260
+ 1 ⊂ H1 such
1261
+ that
1262
+ T1 ◦ T3 = T2 and ∥T3∥ = ∥ ˜T −1
1263
+ 1
1264
+ ◦ T2∥.
1265
+ (e 5.73)
1266
+ Corollary 5.7. Let A be a separable C∗-algebra and let
1267
+ 0 → H1 →ι H2 →s H3 → 0
1268
+ be a short exact sequence of Hilbert A-modules. Suppose that H3 is countably generated. Then
1269
+ the short exact sequence splits. Moreover, the splitting map j : H3 → H2 has ∥j∥ = ∥˜s−1∥.
1270
+ Corollary 5.8. Let A be a separable C∗-algebra.
1271
+ (1) Suppose that H is a countably generated Hilbert A-module. Then, for any short exact
1272
+ sequence of Hilbert A-modules
1273
+ 0 → H0
1274
+ j→ H1
1275
+ s→ H2 → 0,
1276
+ one has the following short exact sequence:
1277
+ 0 → B(H, H0)
1278
+ j∗
1279
+ → B(H, H1) s∗
1280
+ → B(H, H2) → 0,
1281
+ where j∗(ϕ) = j ◦ ϕ for ϕ ∈ B(H, H0) and s∗(ψ) = s ◦ ψ for ψ ∈ B(H, H1).
1282
+ (2) Suppose that H2 is countably generated. Then, for any Hilbert A-module H, and any
1283
+ short exact sequence of Hilbert A-modules:
1284
+ 0 → H0
1285
+ j→ H1
1286
+ s→ H2 → 0,
1287
+ One has the splitting short exact sequence
1288
+ 0 → B(H, H0)
1289
+ j∗
1290
+ → B(H, H1) s∗
1291
+ → B(H, H2) → 0,
1292
+ (e 5.74)
1293
+ Proof. For (1), let us only show that s∗ is surjective. Let ψ ∈ B(H, H2). Since s : H1 → H2 is
1294
+ surjective, by Theorem 5.6, H is projective. There is ˜ψ ∈ B(H, H1) such that s ◦ ˜ψ = ψ. This
1295
+ implies that s∗ is surjective.
1296
+ For (2), by Corollary 5.7, there exists ψ : H2 → H1 such that s ◦ ψ = idH2. For each
1297
+ T ∈ B(H, H2), define ψ ◦ T : H → H1. Then s ◦ (ψ ◦ T) = T. Hence s∗ is surjective. This
1298
+ implies that (e 5.74) is a short exact. Moreover, map ψ above also gives a splitting map ψ∗ :
1299
+ B(H, H2) → B(H, H1).
1300
+ 22
1301
+
1302
+ Definition 5.9. A finitely generated free Hilbert A-module is a Hilbert A-module with the form
1303
+ H = e1A⊕e2A⊕· · · ⊕enA, where ⟨ei, ei⟩ = pi is a projection in A, i = 1, 2, ..., n. Such a module
1304
+ is always self-dual (see, for example, Proposition 2.11).
1305
+ There is a notion of torsion free modules. Every Hilbert A-module is torsion free in the
1306
+ following sense. Let x ∈ H be a non-zero element and xa = 0 for some a ∈ A. Then a must be
1307
+ a left zero divisor. In fact, if xa = 0, then a⟨x, x⟩a = 0, or ⟨x, x⟩1/2a = 0. Then a must be a left
1308
+ zero divisor.
1309
+ One may define a Hilbert A-module H to be flat, if, for any bounded module map T : F → H,
1310
+ where F is a finitely generated free Hilbert A-module, there exists a free Hilbert A-module G
1311
+ and a bounded module map ϕ : F → G and a bounded module map ψ : G → H such that
1312
+ ϕ(kerT) = 0 and ψ ◦ ϕ = T as described as the following commutative diagram:
1313
+ G
1314
+ րϕ
1315
+ ցψ
1316
+ kerT ֒→
1317
+ F
1318
+ T
1319
+ −→
1320
+ H
1321
+ ϕ(kerT) = 0
1322
+ This is equivalent to say the following: for any x1, x2, ..., xm ∈ H, if there are ai ∈ A, 1 ≤ i ≤ m,
1323
+ such that �m
1324
+ i=1 xiai = 0, there must be some integer n, yj ∈ H, 1 ≤ j ≤ m and bi,j ∈ A,
1325
+ 1 ≤ j ≤ m, 1 ≤ i ≤ n, such that �m
1326
+ i=1 aibi,j = 0 and xi = �n
1327
+ j=1 ai,jyj, 1 ≤ i ≤ m.
1328
+ Proposition 5.10. Let A be a σ-unital C∗-algebra and H be any Hilbert A-module. Suppose
1329
+ that F is a self-dual Hilbert A-module and T ∈ B(F, H). Then there are bounded module maps
1330
+ ϕ : F → F and ψ : F → H such that ψ ◦ ϕ = T and ϕ|kerT = 0. In particular, every Hilbert
1331
+ A-module is flat.
1332
+ Proof. Since F is self-dual, Therefore T ∗ maps H into F (instead into F ♯), or T ∗ ∈ B(H, F). In
1333
+ other words, T ∈ L(F, H). Put H1 = F ⊕ H. Define S ∈ B(H1) by
1334
+ S(f ⊕ h) = 0 ⊕ T(f) for all ∈ F and h ∈ H.
1335
+ Then S∗ ∈ B(H1). Let S = V |S| be the polar decomposition of S in L(H)∗∗. Then V |S|1/2, |S|1/2 ∈
1336
+ L(H1). In other words, |T|1/2 ∈ L(F) and V |T|1/2 ∈ L(F, H).
1337
+ Now define ϕ : F → F by ϕ = |T|1/2 and ψ : F → H by ψ = V |T|1/2. Then ϕ|kerT = 0 and
1338
+ ψ ◦ ϕ = V |T| = T.
1339
+ If F is a finitely generated free Hilbert A-module, then F is self-dual. So the above applies.
1340
+ Consequently H is flat.
1341
+ 6
1342
+ Sequential approximation
1343
+ Let A be a C∗-algebra and H0 ⊂ H be Hilbert A-modules. Suppose that ϕ : H0 → A is a
1344
+ bounded module map. Consider the Hahn-Banach type of extension question: whether there
1345
+ is a bounded module map ψ : H → A such that ψ|H0 = ϕ (and ∥ψ∥ = ∥ϕ∥). If H0 ⊂ H is
1346
+ an arbitrary pair of Hilbert A-modules. This is to ask whether A is an injective Hilbert A-
1347
+ module with bounded module maps as morphisms. By Theorem 3.8 of [33], if A is a monotone
1348
+ complete C∗-algebra, then A is an injective Hilbert A-module. Conversely, if A is an injective
1349
+ Hilbert A-module, then A must be an AW ∗-algebra (see Theorem 3.14 of [33]). In fact, injective
1350
+ Hilbert A-modules are rare. It may never happen when A is a separable but infinite dimensional
1351
+ C∗-algebra (see [33] for some further discussion).
1352
+ In what follows, when x, y ∈ H and ǫ > 0, we may write x ≈ǫ y if ∥x − y∥ < ǫ.
1353
+ 23
1354
+
1355
+ Let H be a Hilbert A-module and H♯ = B(H, A), the Banach A-module of all bounded
1356
+ A-module maps from H to A. Recall that H♯ ̸= H in general (see the end of 2.1). However, let
1357
+ us include the following approximation result.
1358
+ Theorem 6.1. Let H be a Hilbert A-module and ϕ : H → A be a bounded module map. Then,
1359
+ for any finite subset F ⊂ H, and any ǫ > 0, there exists x ∈ H such that
1360
+ ∥ϕ(ξ) − ⟨x, ξ⟩∥ < ǫ for all ξ ∈ F and ∥x∥ ≤ ∥ϕ∥.
1361
+ (e 6.75)
1362
+ Proof. We may assume that ∥ϕ∥ ̸= 0. Let H1 = H ⊕ A and P1, PA ∈ L(H1) be the projections
1363
+ from H1 onto H and onto A, respectively. Define T ∈ B(H1) by T = ϕ ◦ P1. Note that, for
1364
+ x ∈ H, T(x) = ϕ(x) and ∥T∥ = ∥ϕ∥.
1365
+ Let F = {ξ1, ξ2, ..., ξk} ⊂ H and ǫ > 0. Without loss of generality, we may assume that
1366
+ 0 ̸= ∥ξi∥ ≤ 1, 1 ≤ i ≤ k. Let {Eλ} be an approximate identity for K(H). By Lemma 3.1, there
1367
+ exists λ0 such that, for all λ ≥ λ0,
1368
+ ∥Eλ(x) − x∥ < ǫ/4(∥ϕ∥ + 1) for all x ∈ F
1369
+ (e 6.76)
1370
+ Fix λ ≥ λ0. Applying Theorem 1.5 of [31], B(H1) = LM(K(H1)). It follows that TEλP1 ∈
1371
+ K(H1). Note also that ∥TEλP1∥ ̸= 0. Therefore, there are y′
1372
+ 1, y′
1373
+ 2, ..., y′
1374
+ m, z1, z2, ..., zm ∈ H1 such
1375
+ that
1376
+ ∥TEλP1 −
1377
+ m
1378
+
1379
+ j=1
1380
+ θy′
1381
+ j,zj∥ < ǫ/8, 1 ≤ j ≤ m.
1382
+ Then
1383
+
1384
+ m
1385
+
1386
+ j=1
1387
+ θy′
1388
+ j,zj∥ ≤ ∥TEλP1∥ + ǫ/8.
1389
+ (e 6.77)
1390
+ Put β =
1391
+ ∥TEλP1∥
1392
+ ∥TEλP1∥+ǫ/8 and yj = βy′
1393
+ j, 1 ≤ j ≤ m. Then
1394
+ m
1395
+
1396
+ j=1
1397
+ θyj,zj = β
1398
+ m
1399
+
1400
+ j=1
1401
+ θy′
1402
+ j,zj and ∥
1403
+ m
1404
+
1405
+ j=1
1406
+ θyj,zj∥ ≤ ∥TEλP1∥ ≤ ∥ϕ∥.
1407
+ (e 6.78)
1408
+ Moreover,
1409
+ ∥TEλP1 −
1410
+ m
1411
+
1412
+ j=1
1413
+ θyj,zj∥ ≤ ∥TEλP1 −
1414
+ m
1415
+
1416
+ j=1
1417
+ θy′
1418
+ j,z′
1419
+ j∥ + (1 − β)∥
1420
+ m
1421
+
1422
+ j=1
1423
+ θy′
1424
+ j,z′
1425
+ j∥
1426
+ (e 6.79)
1427
+ < ǫ/8 + (1 − β)(∥TEλP1∥ + ǫ/8) = ǫ/8 + ǫ/8 = ǫ/4.
1428
+ (e 6.80)
1429
+ Denote L = �m
1430
+ j=1 θyj,zj. Then, by (e 6.78), ∥L∥ ≤ ∥ϕ∥. Note that P1 ∈ L(H1). Therefore, for
1431
+ all z ∈ H, θyj,zjP1(z) = yj⟨zj, P1z⟩ = yj⟨P1zj, z⟩ = θyj,P1zj(z), 1 ≤ j ≤ m. By replacing zj by
1432
+ P1zj, we may assume that zj ∈ H. Recall PATEλP1 = TEλP1. Hence PAyj ∈ A, 1 ≤ j ≤ m.
1433
+ Put aj = (P1yj)∗, 1 ≤ j ≤ m. Then, by (e 6.76), (e 6.80),
1434
+ ϕ(ξi) = T(ξi) ≈ǫ/4 TEλP1(ξi) ≈ǫ/4 L(ξi) =
1435
+ m
1436
+
1437
+ j=1
1438
+ a∗
1439
+ j⟨zj, ξi⟩.
1440
+ (e 6.81)
1441
+ Choose x = �m
1442
+ j=1 zjaj. Then L(ξi) = ⟨x, ξi⟩, i ∈ N. Hence
1443
+ ∥ϕ(ξi) − ⟨x, ξi⟩∥ < ǫ,
1444
+ i = 1, 2, ..., k.
1445
+ (e 6.82)
1446
+ 24
1447
+
1448
+ It remains to show that ∥x∥ ≤ ∥ϕ∥. However, we have
1449
+ ∥x∥ = ∥⟨x, x/∥x∥⟩∥ = ∥L(x/∥x∥)∥ ≤ ∥L∥ ≤ ∥ϕ∥.
1450
+ (e 6.83)
1451
+ Remark 6.2. Theorem 6.1 also shows that H may not be A-weakly closed, in the case that
1452
+ H ̸= H♯ (see 3.3).
1453
+ In the following statement, note that, H may not be a separable Banach space when A is
1454
+ not separable.
1455
+ Theorem 6.3. Let H be a countably generated Hilbert A-module and ϕ : H → A be a bounded
1456
+ module map. Then, there exists xn ∈ H, n ∈ N, such that ∥xn∥ ≤ ∥ϕ∥ and
1457
+ lim
1458
+ n→∞ ∥ϕ(ξ) − ⟨xn, ξ⟩∥ = 0 for all ξ ∈ H.
1459
+ (e 6.84)
1460
+ Proof. We need to modify the proof of Theorem 6.1. Let {En} be an approximate identity
1461
+ for K(H) (by Theorem 3.2). Let H1 = H ⊕ A, P1, PA and T be as in the proof of Theorem
1462
+ 6.1. Consider TEnP1 ∈ K(H). As in the proof of Theorem 6.1, we obtain Ln ∈ K(H) with
1463
+ ∥Ln∥ ≤ ∥TEnP1∥ ≤ ∥ϕ∥ such that
1464
+ ∥TEnP1 − Ln∥ < 1/2n,
1465
+ (e 6.85)
1466
+ where Ln = �m(n)
1467
+ j=1 θxn,j,yn,j. Put PA(xn,j) = a∗
1468
+ n,j, 1 ≤ j ≤ m(n), n ∈ N. For any ǫ > 0 and any
1469
+ z ∈ H, we may choose n(x) such that, for all n ≥ n(x),
1470
+ ∥EnP1(z) − z∥ < ǫ/2(∥ϕ∥ + 1).
1471
+ (e 6.86)
1472
+ Then, if n ≥ n(x),
1473
+ ϕ(z) ≈ǫ/2 TEnP1(y) ≈∥z∥/2n Ln(z) =
1474
+ m(n)
1475
+
1476
+ j=1
1477
+ a∗
1478
+ n,j⟨yn,j, z⟩.
1479
+ (e 6.87)
1480
+ Choose xn = �m(n)
1481
+ j=1 yn,jan,j, n ∈ N. The same proof as the end of the proof of Theorem 6.1
1482
+ shows that, for all n ≥ n(x),
1483
+ ϕ(z) ≈ǫ/2+∥z∥/2n L(z) = ⟨xn, z⟩ and ∥xn∥ ≤ ∥ϕ∥.
1484
+ (e 6.88)
1485
+ The theorem then follows.
1486
+ As mentioned at the beginning of this section, injective Hilbert A-modules are rare. However,
1487
+ one may have some approximate extensions of bounded module maps. Let B0, B1 and C be C∗-
1488
+ algebras and ϕ : B0 → C be a contractive completely positive linear map. If C is amenable (or
1489
+ B0 is), then, for any ǫ > 0 and any finite subset F ⊂ B0, there exists a contractive completely
1490
+ positive linear map ψ : B → C such that
1491
+ ∥ϕ(b) − ψ(b)∥ < ǫ for all b ∈ F.
1492
+ It is very useful feature of amenable C∗-algebras.
1493
+ With the same spirit, let us present the
1494
+ following approximate extension result:
1495
+ 25
1496
+
1497
+ Theorem 6.4. Let A be a C∗-algebra, H0, H1, H be Hilbert A-modules such that H0 ⊂ H1 and
1498
+ ϕ : H0 → H be a bounded module map.
1499
+ Then, for any ǫ > 0 and any finite subset F ⊂ H0, there exists a bounded module map
1500
+ ψ : H1 → H such that ∥ψ∥ ≤ ∥ϕ∥ and
1501
+ ∥ψ(x) − ϕ(x)∥ < ǫ for all x ∈ F.
1502
+ (e 6.89)
1503
+ The above may be illustrated as follows:
1504
+ H1
1505
+ H0
1506
+ H
1507
+ ψ
1508
+ ⟲ε
1509
+ ϕ
1510
+ on F.
1511
+ (e 6.90)
1512
+ If, in addition, H0 is countably generated, then there exists ψn : H1 → H, n ∈ N, such that
1513
+ ∥ψn∥ ≤ ∥ϕ∥ and
1514
+ lim
1515
+ n→∞ ∥ψn(x) − ϕ(x)∥ = 0 for all x ∈ H0.
1516
+ (e 6.91)
1517
+ Proof. We may assume that ∥ϕ∥ ̸= 0. Let H2 = H0 ⊕ H and H3 = H1 ⊕ H. We view H2
1518
+ as a Hilbert A-submodule of H3. Let P0 ∈ L(H2) be the projection from H2 onto H0, and let
1519
+ P1, PH ∈ L(H3) be the projections from H3 onto H1 and onto H, respectively. Define T ∈ B(H2)
1520
+ by T = ϕ ◦ P0. Let F ⊂ H0 be a finite subset and ǫ > 0.
1521
+ Let {Eλ} be an approximate identity for K(H0). By Lemma 3.1, there exists λ0 such that,
1522
+ for all λ ≥ λ0,
1523
+ ∥Eλ(x) − x∥ < ǫ/(∥ϕ∥ + 1) for all x ∈ F.
1524
+ (e 6.92)
1525
+ Applying Theorem 1.5 of [31], we have that B(H2) = LM(K(H2)). It follows that (for a fixed
1526
+ λ ≥ λ0) TEλP0 ∈ K(H2). Applying Lemma 2.13 of [33], we obtain Tλ ∈ K(H3) such that
1527
+ ∥Tλ∥ = ∥TEλP0∥ and Tλ|H2 = TEλP0.
1528
+ (e 6.93)
1529
+ Put ψ = PHTλ. Note that (recall that T(H2) ⊂ H)
1530
+ ∥ψ∥ = ∥TEλP0∥ and ψ|H2 = TEλP0.
1531
+ (e 6.94)
1532
+ We may view ψ as a bounded module map from H1 to H with ∥ψ∥ ≤ ∥T∥ = ∥ϕ∥. We estimate
1533
+ that, for x ∈ F, by (e 6.92) and (e 6.94),
1534
+ ∥ψ(x) − ϕ(x)∥
1535
+ =
1536
+ ∥ψ(x) − T(x)∥ = ∥ψ(x) − TEλP0(x)∥ + ∥TEλP0(x) − T(x)∥
1537
+ <
1538
+ 0 + ∥T∥∥Eλ(x) − x∥ < ǫ.
1539
+ (e 6.95)
1540
+ This proves the first part of the theorem.
1541
+ For the second part of the theorem, by Theorem 3.2, let {En} be an approximate identity
1542
+ for K(H0) with En+1En = En, n ∈ N. Replacing Eλ by En, we obtain Tn ∈ K(H3) such that
1543
+ ∥Tn∥ = ∥TEnP0∥ and Tn|H2 = TEnP0.
1544
+ (e 6.96)
1545
+ Put ψn = PHTn, n ∈ N. Then
1546
+ ∥ψn∥ ≤ ∥ϕ∥ and ψn|H2 = TEnP0, n ∈ N.
1547
+ (e 6.97)
1548
+ We then use the fact that limn→∞ ∥En(x) − x∥ = 0 for all x ∈ H0 (see again Theorem 3.2).
1549
+ 26
1550
+
1551
+ Corollary 6.5. Let A be a C∗-algebra and H0 ⊂ H be Hilbert A-modules. Suppose that there
1552
+ is a bounded module map ϕ : H0 → A. Then, for any ǫ > 0 and any finite subset F ⊂ H0, there
1553
+ exists a bounded module map ψ : H → A such that
1554
+ ∥ϕ(x) − ψ(x)∥ < ǫ for all x ∈ F and ∥ψ∥ ≤ ∥ϕ∥.
1555
+ (e 6.98)
1556
+ If, in addition, H0 is countably generated Hilbert A-module, then there exists a sequence of
1557
+ bounded module maps ψn : H → A such that
1558
+ lim
1559
+ n→∞ ∥ψn(x) − ϕ(x)∥ = 0 for all x ∈ H and ∥ψn∥ ≤ ∥ϕ∥ for all n ∈ N.
1560
+ (e 6.99)
1561
+ Remark 6.6. In the light of Theorem 6.4, one may think that every Hilbert A-module is
1562
+ “approximately injective”. Next, let us turn to “approximate projectivity”.
1563
+ Lemma 6.7. Let A be a σ-unital C∗-algebra and H = A(k) (for some k ∈ N). Suppose that
1564
+ H1, H2 are Hilbert A-modules, ϕ : H → H1 is a bounded module map and s : H2 → H1 is a
1565
+ surjective bounded module map. Then there exists a sequence of bounded module maps ψn : H →
1566
+ H2 and an increasing sequence of Hilbert A-submodules Xn ⊂ H such that ∪∞
1567
+ n=1Xn = H,
1568
+ s ◦ ψm|Hn = ϕ|Hn
1569
+ for all m ≥ n.
1570
+ (e 6.100)
1571
+ Moreover there exists a sequence of module maps Tn : H → Xn such that ∥Tn∥ ≤ 1 and
1572
+ lim
1573
+ n→∞ ∥Tn(h) − h∥ = 0, T2n+j|Hn = idHn, n, j ∈ N,
1574
+ (e 6.101)
1575
+ and s ◦ ϕn(h) = ϕ(Tn(h)) for all h ∈ H.
1576
+ (e 6.102)
1577
+ In particular,
1578
+ lim
1579
+ n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
1580
+ (e 6.103)
1581
+ Proof. Fix a strictly positive element e ∈ A. Write A(n) = e1A⊕e2A⊕· · ·⊕enA, where ei = e1/2
1582
+ (1 ≤ i ≤ n). Let f1/n ∈ C([0, ∞)) be defined in (4) of 4.4, n ∈ N.
1583
+ For each n ∈ N, define Xn = �k
1584
+ i=1 f1/n(ei)A. Note that Xn ⊂ Xn+1, n ∈ N, and ∪∞
1585
+ n=1Xn =
1586
+ A(k) = H.
1587
+ Let xn,i = ϕ(f1/2n(ei)), 1 ≤ i ≤ k, and n ∈ N. Choose ym,i ∈ H2 such that s(ym.i) = xm,i,
1588
+ 1 ≤ i ≤ m and m ∈ N. Define ψn : H → H2 by
1589
+ ψn(h) =
1590
+ k
1591
+
1592
+ i=1
1593
+ yn,i⟨f1/2n(ei), h⟩ for all h ∈ H.
1594
+ (e 6.104)
1595
+ It follows that ψn ∈ K(H, H2). If h = �k
1596
+ i=1 f1/n(e)ai, where ai ∈ A, then
1597
+ ψn(h) =
1598
+ k
1599
+
1600
+ i=1
1601
+ yn,if1/n(e)ai.
1602
+ (e 6.105)
1603
+ 27
1604
+
1605
+ Hence, for h = �k
1606
+ i=1 f1/n(ei)ai, where ai ∈ A (1 ≤ i ≤ k), and for any j ≥ 0,
1607
+ s(ψn+j(
1608
+ k
1609
+
1610
+ i=1
1611
+ f1/n(ei)ai))
1612
+ =
1613
+ s(
1614
+ k
1615
+
1616
+ i=1
1617
+ yn+j,if1/n(e)ai)
1618
+ (e 6.106)
1619
+ =
1620
+ k
1621
+
1622
+ i=1
1623
+ ϕ(f1/2(n+j)(ei))f1/n(e)ai
1624
+ (e 6.107)
1625
+ =
1626
+ k
1627
+
1628
+ i=1
1629
+ ϕ(f1/2(n+j)(ei)f1/n(e))ai
1630
+ (e 6.108)
1631
+ =
1632
+ k
1633
+
1634
+ i=1
1635
+ ϕ(f1/n(ei))ai = ϕ(
1636
+ k
1637
+
1638
+ i=1
1639
+ f1/n(ei)ai).
1640
+ (e 6.109)
1641
+ It follows that, for any m ≥ n,
1642
+ s ◦ ψm|Hn = ϕ|Hn.
1643
+ (e 6.110)
1644
+ Next consider the module map Tn : H → Xn defined by Tn(h) = �k
1645
+ i=1 f1/n(ei)⟨f1/n(ei), h⟩
1646
+ for all h ∈ H. In other words, Tn ∈ K(H, H2) and Tn(�k
1647
+ i=1 ai) = �k
1648
+ i=1 f1/n(e)2ai for any
1649
+ �k
1650
+ i=1 ai ∈ A(k). Hence ∥Tn∥ = 1. Moreover (for any ai ∈ A),
1651
+ T2n+j(
1652
+ k
1653
+
1654
+ i=1
1655
+ f1/n(e)ai)
1656
+ =
1657
+ k
1658
+
1659
+ i=1
1660
+ f1/(2n+j)(e)2f1/n(e)ai
1661
+ (e 6.111)
1662
+ =
1663
+ k
1664
+
1665
+ i=1
1666
+ f1/n(e)ai.
1667
+ (e 6.112)
1668
+ Hence
1669
+ T2n+j|Xn = idXn, n, j ∈ N.
1670
+ (e 6.113)
1671
+ It follows, for any h = �k
1672
+ i=1 ai, also by (e 6.104), that
1673
+ s ◦ ψn+j(h)
1674
+ =
1675
+ k
1676
+
1677
+ i=1
1678
+ xn+j,i⟨f1/2(n+j)(ei), ai⟩
1679
+ (e 6.114)
1680
+ =
1681
+ k
1682
+
1683
+ i=1
1684
+ ϕ(f1/2(n+j)(ej))f1/2(n+j)(e)ai) = ϕ(Tn+j(h)).
1685
+ (e 6.115)
1686
+ To see the last part of the lemma, fix h = �k
1687
+ i=1 ai ∈ A(k). Let ǫ > 0. Choose n ∈ N such
1688
+ that
1689
+ ∥f1/n(e)2ai − ai∥ < ǫ/k(∥ϕ∥ + 1), 1 ≤ i ≤ k.
1690
+ (e 6.116)
1691
+ Hence, for any j ∈ N,
1692
+ ∥ϕ(Tn+j(h)) − ϕ(h)∥ < ǫ
1693
+ (e 6.117)
1694
+ It follows that, for this h and for any j ∈ N,
1695
+ ∥s ◦ ψn+j(h) − ϕ(h)∥
1696
+
1697
+ ∥s ◦ ψn+j(h) − ϕ(Tn+j(h))∥ + ∥ϕ(Tn+j(h)) − ϕ(h)∥
1698
+ =
1699
+ 0 + ǫ.
1700
+ 28
1701
+
1702
+ From (e 6.116), we also have
1703
+ lim
1704
+ n→∞ ∥Tn(h) − h∥ = 0 for all h ∈ H.
1705
+ (e 6.118)
1706
+ Theorem 6.8. Let A be a σ-unital C∗-algebra and H a countably generated Hilbert A-module.
1707
+ Suppose that H1 and H2 are Hilbert A-modules, and ϕ : H → H1 is a bounded module map
1708
+ and s : H2 → H1 is a surjective bounded module map. Then there exists a sequence of bounded
1709
+ module maps ψn : H → H2 such that
1710
+ lim
1711
+ n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
1712
+ (e 6.119)
1713
+ The following approximately commutative diagram may illustrate the statement of Theorem
1714
+ 6.8 (with ǫn → 0):
1715
+ H
1716
+ H1
1717
+ H2 .
1718
+ ψn
1719
+ ϕ
1720
+ ⟲εn
1721
+ s
1722
+ (e 6.120)
1723
+ Proof. We first prove the theorem for H = HA = l2(A).
1724
+ So now we assume that H = l2(A). Put Yn = A(n), n ∈ N. We view Yn ⊂ Yn+1 as an
1725
+ increasing sequence of Hilbert A-submodules of H = l2(A) and the closure of the union is H.
1726
+ By applying Lemma 6.7, we obtain, for each n ∈ N, an increasing sequence of Hilbert A-
1727
+ submodules Xn,j ⊂ Xn,j+1 such that ∪∞
1728
+ j=1Xn,j = Yn, and there exists a sequence of bounded
1729
+ module maps ψn,j : Yn → H2 and module maps Tn,j : Yn → Xn,j with ∥Tn,j∥ ≤ 1 such that
1730
+ s ◦ ψn,j+i|Xn,j = ϕ|Xn,j, j, i ∈ N,
1731
+ (e 6.121)
1732
+ Tn,2j+i|Xn,j = id|Xn,j, j, i ∈ N, and
1733
+ (e 6.122)
1734
+ lim
1735
+ j→∞ ∥Tn,j(h) − h∥ = 0 for all h ∈ Yn and
1736
+ (e 6.123)
1737
+ s ◦ ψn,j(h) = ϕ(Tn,j(h)) for all h ∈ Yn and j ∈ N.
1738
+ (e 6.124)
1739
+ Note that Yn = A(n) ⊂ A(n+1) = Yn+1, n ∈ N, therefore we may arrange so that
1740
+ Xn,j ⊂ Xn+1,j for all j ∈ N and n ∈ N.
1741
+ (e 6.125)
1742
+ Define Pn : H → Yn by Pn(�∞
1743
+ n=1 an) = �n
1744
+ i=1 ai, where �∞
1745
+ n=1 a∗
1746
+ nan converges, i.e, �∞
1747
+ n=1 an ∈
1748
+ l2(A) = H. Then Pn is a projection from H = HA onto A(n).
1749
+ Now define
1750
+ ψn = ψn,2n ◦ Pn : H → H2, n ∈ N.
1751
+ (e 6.126)
1752
+ We will verify that ψn meets the requirements.
1753
+ Fix h = �∞
1754
+ n=1 an ∈ l2(A) = H. There is n0 ∈ N such that, for all n ≥ m ≥ n0,
1755
+ ∥Pm(h) − h∥ < ǫ/6(∥ϕ∥ + 1) and ∥Pn(h) − Pm(h)∥ < ǫ/6(∥ϕ∥ + 1).
1756
+ (e 6.127)
1757
+ For Pn0(h) ∈ A(n0), there is n1 ∈ N such that, for all n ≥ n1
1758
+ ∥Tn0,n(Pn0(h)) − Pn0(h)∥ < ǫ/6(∥ϕ∥ + 1).
1759
+ (e 6.128)
1760
+ Since Tn0,n(Pn0(h)) ∈ Xn0,n ⊂ Xn,n (see (e 6.125)), by (e 6.122),
1761
+ Tn,2n(Tn0,n(Pn0(h))) = Tn0,n(Pn0(h)).
1762
+ (e 6.129)
1763
+ 29
1764
+
1765
+ Hence, if n ≥ n1 + n0, by (e 6.129) and by (e 6.128),
1766
+ ∥Tn,2n(Pn0(h)) − Pn0(h)∥ = ∥Tn,2n(Pn0(h)) − Tn,2n(Tn0,n(Pn0(h)))∥
1767
+ (e 6.130)
1768
+ +∥Tn,2n((Tn0,n(Pn0(h)))) − Pn0(h)∥
1769
+ (e 6.131)
1770
+
1771
+ ∥Tn,2n∥∥Pn0(h) − Tn0,n(Pn0(h))∥ + ∥Tn0,n(Pn0(h)) − Pn0(h)∥
1772
+ (e 6.132)
1773
+ <
1774
+ ǫ/6(∥ϕ∥ + 1) + ǫ/6(∥ϕ∥ + 1)
1775
+ (e 6.133)
1776
+ =
1777
+ ǫ/3(∥ϕ∥ + 1).
1778
+ (e 6.134)
1779
+ We also estimate that, if n ≥ n1 +n0, by both parts of (e 6.127) and the inequalities right above,
1780
+ ∥Tn,2n(Pn(h)) − h∥
1781
+
1782
+ ∥Tn,2n(Pn(h)) − Pn0(h)∥ + ∥Pn0(h) − h∥
1783
+ <
1784
+ ∥Tn,2n(Pn(h) − Pn0(h))∥ + ∥Tn,2n(Pn0(h)) − Pn0(h)∥ + ǫ/6(∥ϕ∥ + 1)
1785
+ <
1786
+ ∥Tn,2n∥(ǫ/3(∥ϕ∥ + 1)) + ǫ/3(∥ϕ∥ + 1)) + ǫ/3(∥ϕ∥ + 1)
1787
+ =
1788
+ ǫ/(∥ϕ∥ + 1).
1789
+ (e 6.135)
1790
+ We then have, by (e 6.126), (e 6.124) and (e 6.135),
1791
+ ∥s ◦ ψn(h) − ϕ(h)∥
1792
+
1793
+ ∥s ◦ ψn,2n(P 2
1794
+ n(h)) − ϕ(Tn,2n(Pn(h)))∥ + ∥ϕ(Tn,2n(Pn(h))) − ϕ(h)∥
1795
+ < 0 + ǫ.
1796
+ Next we consider the general case that H is an arbitrary countably generated Hilbert A-
1797
+ module. By Kasparov’s absorbing theorem ([26]), there is a Hilbert module isomorphism U :
1798
+ H⊕l2(A) → l2(A). Define j : H → H⊕l2(A) to be the obvious embedding and p : H⊕l2(A) → H
1799
+ the projection. Thus p◦j = idH. Define Φ = ϕ◦p◦U −1 : l2(A) → H1. Then we have the following
1800
+ commutative diagram:
1801
+ l2(A)
1802
+ U ↕U−1
1803
+ ցΦ
1804
+ H ⊕ l2(A)
1805
+ ϕ◦p
1806
+ −→
1807
+ H1.
1808
+ In particular, Φ ◦ U(x) = ϕ(x) for all x ∈ H. By what have been proved above, there exists a
1809
+ sequence of module maps Ψn : l2(A) → H2 such that
1810
+ lim
1811
+ n→∞ ∥s ◦ Ψn(z) − Φ(z)∥ = 0 for all z ∈ l2(A).
1812
+ (e 6.136)
1813
+ Define ψn : H → H2 by ψn(x) = Ψn ◦ U(x) for all x ∈ H. It follows that
1814
+ , lim
1815
+ n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = lim
1816
+ n→∞ ∥s ◦ Ψn(U(x)) − Φ(U(x))∥ = 0.
1817
+ (e 6.137)
1818
+ Remark 6.9. Note that, in Lemma 6.7, for any ǫ > 0, we may choose ∥yn∥ ≤ ∥˜s−1 ◦ ϕ∥ + ǫ. So
1819
+ we may estimate that ∥ψn∥ ≤
1820
+
1821
+ k(∥˜s−1 ◦ ϕ∥ + ǫ), which unfortunately depends on k. Therefore
1822
+ we do not have an estimate on the norm of ψn in Theorem 6.8. This is also the reason that the
1823
+ proof seems a little more involved than expected (as we need a complicated statement in Lemma
1824
+ 6.7). If {∥ψn∥} were, at least, uniformly bounded, then the proof would be much shorter.
1825
+ However, under the assumption that A has real rank zero, in the next statement, we then
1826
+ have a better estimate on the norm on ψn.
1827
+ 30
1828
+
1829
+ Theorem 6.10. Let A be a σ-unital C∗-algebra of real rank zero and H a countably generated
1830
+ Hilbert A-module. Suppose that ϕ : H → H1 is a bounded module map and s : H2 → H1 is a
1831
+ surjective bounded module map. Then there exists a sequence of module maps ψn : H → H2
1832
+ such that
1833
+ ∥ψn∥ ≤ ∥˜s−1 ◦ ϕ∥ and
1834
+ lim
1835
+ n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
1836
+ (e 6.138)
1837
+ Proof. Since H is countably generated, by Corollary 1.5 of [39] (see (Lemma 3.2, for convenience),
1838
+ K(H) is a σ-unital hereditary C∗-subalgebra of A ⊗ K (see also Lemma 2.13 of [33]). Let {Pm}
1839
+ be an approximate identity for K(H) consisting of projections.
1840
+ Put H0,m = Pm(H). Then
1841
+ K(H0,m) = PmK(H)Pm is unital. It follows from Proposition 2.7 that H0,m is algebraically
1842
+ finitely generated, say, by {ξm,i : 1 ≤ i ≤ d(m)}, where ∥ξm,i∥ = 1. It is important to note that
1843
+ H0,m ⊂ H0,m′ if m < m′.
1844
+ Fix m ∈ N. Let H1,m be the Hilbert A-submodule of H1 generated by {xm,i = ϕ(ξm,i) : 1 ≤
1845
+ i ≤ d(m)}. Since H0,m ⊂ H0,m′, H1,m ⊂ H1,m′, if m < m′.
1846
+ Then K(H1,m) is a σ-unital hereditary C∗-subalgebra of A ⊗ K (see Lemma 3.2), m ∈ N.
1847
+ Since A has real rank zero, so is K(H1,m), m ∈ N. Let {pm,k}∞
1848
+ k=1 be an approximate identity
1849
+ for K(H1,m). Let H1,m,k = pm,k(H1,m), k, m ∈ N. Since H1,m ⊂ H1,m′, if m ≤ m′, K(H1,m) ⊂
1850
+ K(H1,m′) (see Lemma 2.13 of [33]). So we may assume that
1851
+ ∥pm+1,kpm,k − pm,k∥ <
1852
+ 1
1853
+ 2k+m+1(∥ϕ∥ + 1), k, m ∈ N.
1854
+ (e 6.139)
1855
+ Note that K(H1,m,k) = pm,kK(H1,m)pm,k which is unital. It follows from Proposition 3.2
1856
+ that H1,m,k is algebraically finitely generated, say, by zm,k,1, zm,k,2, ..., zm,k,r(m,k) as A-module.
1857
+ Choose ym,k,j ∈ H2 such that s(ym,k,j) = zm,k,j, 1 ≤ j ≤ r(m, k), k, m ∈ N. Let H2,m,k be the
1858
+ Hilbert A-submodule of H2 generated by {ym,k,j : 1 ≤ k = j ≤ r(m, k)} as Hilbert A-module.
1859
+ Then, since H1,m,k is algebraically generated by zm,k,1, zm,k,2, ..., zm,k,r(i,k) as A-module,
1860
+ s(H2,m,k) = H1,m,k. In other words, s|H2,m,k is surjective (onto H1,m,k).
1861
+ Fix an integer m ∈ N. Define ϕm,k : H → H1,m,k by
1862
+ ϕm,k(x) = pm,k ◦ ϕ(Pm(x))
1863
+ (e 6.140)
1864
+ for all x ∈ H. Note that ∥ϕm,k∥ ≤ ∥ϕ∥, m, k ∈ N.
1865
+ Now H2,m,k is countably generated, it follows from Theorem 5.3 that there is a module map
1866
+ ψm,k : H → H2,m,k such that
1867
+ s ◦ ψm,k = ϕm,k for all k, m ∈ N, and
1868
+ (e 6.141)
1869
+ ∥ψm,k∥ ≤ ∥˜s−1 ◦ ϕm,k∥ ≤ ∥˜s−1 ◦ ϕ∥.
1870
+ (e 6.142)
1871
+ Define ψn = ψn,n, n ∈ N. Then ∥ψn∥ ≤ ∥˜s−1 ◦ ϕ∥ for all n ∈ N. We will check that
1872
+ lim
1873
+ n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
1874
+ (e 6.143)
1875
+ To check this, let ǫ > 0 and x ∈ H with ∥x∥ ≤ 1. Let M = (∥s∥ + 1)(∥˜s−1 ◦ ϕ∥ + 1). By Lemma
1876
+ 3.1 , there is n0 ∈ N such that
1877
+ ∥x − Pm(x)∥ < ǫ/8M and ∥Pm(x) − Pm′(x)∥ < ǫ/8M for all m′, m ≥ n0.
1878
+ (e 6.144)
1879
+ There is also k0 ∈ N with 1/k0 < ǫ/4 such that, for any k ≥ k0,
1880
+ ∥pn0,k(ϕ(Pn0(x))) − ϕ(Pn0(x))∥ < ǫ/4.
1881
+ (e 6.145)
1882
+ 31
1883
+
1884
+ If n ≥ n0 and for all k ∈ N, we have, if k ≥ k0 + n0, by (e 6.145) and (e 6.139),
1885
+ pk,k(ϕ(Pn0(x)))
1886
+ ≈ǫ/4
1887
+ pk,kpn0,k0(ϕ(Pn0(x)))
1888
+ (e 6.146)
1889
+ ≈1/2k0
1890
+ pn0,k0(Pn0(x)) ≈ǫ/4 Pn0(x).
1891
+ (e 6.147)
1892
+ Then (recall that H0,n0 ⊂ H0,n, if n0 < n), by (e 6.144), (e 6.140), (e 6.141) and (e 6.146), when
1893
+ n ≥ n0 + k0 + (4/ǫ),
1894
+ ∥s ◦ ψn(x) − ϕ(x)∥
1895
+
1896
+ ∥s ◦ ψn(x) − s ◦ ψn,n(Pn0(x))∥ + ∥s ◦ ψn,n(Pn0(x)) − ϕ(x)∥
1897
+ <
1898
+ ∥s ◦ ψn∥∥x − Pn0(x)∥ + ∥s ◦ ψn,n(Pn0(x)) − ϕ(Pn0(x))∥ +
1899
+ +∥ϕ(Pn0(x)) − ϕ(x)∥
1900
+ (e 6.148)
1901
+ <
1902
+ ǫ/8 + ∥s ◦ ψn,n(Pn0(x)) − ϕn,n(Pn0(x))∥
1903
+ +∥pn,n(ϕ(Pn0(x))) − ϕ(Pn0(x))∥ + ǫ/4
1904
+ (e 6.149)
1905
+ <
1906
+ ǫ/8 + 0 + (1/2k0 + ǫ/2) + ǫ/8 < ǫ.
1907
+ Remark 6.11. This paper was based on a preprint [35] of 2010. However, some of the original
1908
+ part of [35] have been out of dated. A draft of the current version was made in 2014 including
1909
+ improved results in section 5. Parts of section 4 and section 6 are added recently.
1910
+ References
1911
+ [1] C. Akemann and F. Shultz, Perfect C∗-algebras, Mem. Amer. Math. Soc. 55 (1985), no.
1912
+ 326, xiii+117 pp
1913
+ [2] R. Antoine, F. Perera, L. Robert, and H. Thiel, C∗-algebras of stable rank one and their
1914
+ Cuntz semigroups, Duke Math. J., to appear. arXiv:1809.03984.
1915
+ [3] B. Blackadar, Comparison theory for simple C∗-algebras. Operator algebras and applica-
1916
+ tions, Vol. 1, 21–54, London Math. Soc. Lecture Note Ser., 135, Cambridge Univ. Press,
1917
+ Cambridge, 1988.
1918
+ [4] L. G. Brown, Stable isomorphism of hereditary subalgebras of C∗-algebras, Pacific J. Math.
1919
+ 71 (1977), 335–348.
1920
+ [5] L. G. Brown, Close hereditary C∗-subalgebra and the structure of quasi-multipliers, Proc.
1921
+ Royal Soc. Edinburgh, 147A (2017), 263–292, DOI:10.1017/S0308210516000172.
1922
+ [6] L. G. Brown, Semicontinuity and multipliers of C∗-algebras, Can J. Math., 40 (1988),
1923
+ 865-988.
1924
+ [7] L. G. Brown, Homotopy of projection in C∗-algebras of stable rank one, Recent advances
1925
+ in operator algebras (Orlans, 1992). Astrisque No. 232 (1995), 115–120.
1926
+ [8] L. G. Brown and G. K. Pedersen, On the geometry of the unit ball of a C∗-algebra, J.
1927
+ Reine Angew. Math. 469 (1995), 113–147.
1928
+ [9] N. Brown and A. Ciuperca, Isomorphism of Hilbert modules over stably finite C∗-algebras,
1929
+ J. Funct. Anal. 257 (2009), 332–339.
1930
+ [10] N. Brown, F. Perera and A. Toms, The Cuntz semigroup, the Elliott conjecture, and
1931
+ dimension functions on C∗-algebras, J. Reine Angew. Math. 621 (2008), 191–211.
1932
+ 32
1933
+
1934
+ [11] K. Coward, G. Elliott and C. Ivanescu, The Cuntz semigroup as an invariant for C∗-
1935
+ algebras, J. Reine Angew. Math. 623 (2008), 161–193.
1936
+ [12] J. Castillejos, S. Evington, A. Tikuisis, S. White, W. Winter, Nuclear dimension of simple
1937
+ C∗-algebras, Invent. Math. 224 (2021), 245–290.
1938
+ [13] J. Castillejos and S. Evington, Nuclear dimension of simple stably projectionless C∗-
1939
+ algebras, Anal. PDE 13 (2020), 2205–2240.
1940
+ [14] J. Castillejos, S. Evington, A. Tikuisis, and S. White, Uniform property Γ, Int. Math. Res.
1941
+ Not., to appear.
1942
+ [15] J. Cuntz, The structure of multiplication and addition in simple C∗-algebras, Math. Scand.
1943
+ 40 (1977), 215–233.
1944
+ [16] J. Cuntz, Dimension functions on simple C∗-algebras, Math. Ann. 233 (1978), 145–153.
1945
+ [17] G. A. Elliott, G. Gong, H. Lin and Z. Niu, The classification of simple separable KK-
1946
+ contractible C∗-algebras with finite nuclear dimension, J. Geom. Phys. 158 (2020), 103861,
1947
+ 51 pp.
1948
+ [18] G. A. Elliott, L. Robert, and L. Santiago, The cone of lower semicontinuous traces on a
1949
+ C*-algebra, Amer. J. Math 133 (2011), 969–1005.
1950
+ [19] M. Frank, Geometrical aspects of Hilbert C∗-modules, Positivity 3 (1999), 215–243.
1951
+ [20] X.
1952
+ Fu
1953
+ and
1954
+ H.
1955
+ Lin,
1956
+ Tracial
1957
+ approximate
1958
+ oscillation
1959
+ zero
1960
+ and
1961
+ stable
1962
+ rank
1963
+ one,
1964
+ arXiv:2112.14007.
1965
+ [21] X. Fu, K. Li, and H. Lin, Tracial approximate divisibility and stable rank one. J. London
1966
+ Math. Soc. 106 (2022), 3008–3042, https://doi.org/10.1112/jlms.12654.
1967
+ [22] G. Gong, C. Jiang, L. Li, Hausdorffified algebraic K1-groups and invariants for C∗-algebras
1968
+ with the ideal property, Ann. K-Theory 5 (2020), 43–78.
1969
+ [23] G. Gong and H. Lin, Almost multiplicative morphisms and K-theory, Internat. J. Math.
1970
+ 11 (2000), 983–1000.
1971
+ [24] G. Gong and H. Lin, On classification of simple non-unital amenable C*-algebras, III: the
1972
+ range and the reduction, Ann. K-Theory 7 (2022), 279–384.
1973
+ [25] J. v. B. Hjelmborg and M. Rørdam, On stability of C∗-algebras, J. Funct. Anal. 155 (1998),
1974
+ 153–170.
1975
+ [26] G. Kasparov, Hilbert C∗-modules: theorems of Stinespring and Voiculescu, J. Operator
1976
+ Theory 4 (1980), 133–150.
1977
+ [27] E. Kirchberg and M. Rørdam, Non-simple purely infinite C∗-algebras, Amer. J. Math. 122
1978
+ (2000), 637–666.
1979
+ [28] E. Kirchberg and M. Rørdam, Central sequence C∗-algebras and tensorial absorption of
1980
+ the Jiang-Su algebra, J. Reine Angew. Math., 695 (2014), 175–214.
1981
+ [29] E. C. Lance, Hilbert C∗-Modules, A Toolkit for Operator Algebraists, London Math. Soc.
1982
+ Lecture Note Ser., vol. 210, Cambridge University Press, Cambridge, 1995.
1983
+ 33
1984
+
1985
+ [30] H. Lin, Equivalent open projections and corresponding hereditary C∗-subalgebras, J. Lon-
1986
+ don Math. Soc. 41 (1990), 295–301.
1987
+ [31] H. Lin, Bounded module maps and pure completely positive maps, J. Operator Theory 26
1988
+ (1991), 121–138.
1989
+ [32] H. Lin, Simple C∗-algebras with continuous scales and simple corona algebras, Proc. Amer.
1990
+ Math. Soc. 112 (1991), 871–880.
1991
+ [33] H. Lin, Injective Hilbert C∗-modules, Pacific J. Math. 154 (1992), 131–164.
1992
+ [34] H. Lin, An introduction to the classification of amenable C∗-algebras, World Scientific
1993
+ Publishing Co., Inc., River Edge, NJ, 2001. xii+320 pp. ISBN: 981-02-4680-3.
1994
+ [35] H. Lin, Cuntz semigroups of C∗-algebras of stable rank one and projective Hilbert modules,
1995
+ arXiv:1001.4558, 2010.
1996
+ [36] H. Lin, Hereditary uniform property Γ, Sci. China, Math. to appear,
1997
+ https://doi.org/10.1007/s11425-022-2005-x.
1998
+ [37] H. Lin Tracial approximation and Z-stability, preprint, arXiv:2205.04013
1999
+ [38] H. Lin and P. Ng, Extensions of C∗-algebras by a small ideal, Inter. Math. Res. Not., pp.
2000
+ 1-89, rnac115, https://doi.org/10.1093/imrn/rnac115, May 2022.
2001
+ [39] J. Mingo and W . Phillips, Equivariant triviality theorems for Hilbert C∗-modules, Proc.
2002
+ Amer. Math. Soc, 91 (1984), 225–236.
2003
+ [40] E. Ortega, M. Rørdam, Mikael and H. Thiel, The Cuntz semigroup and comparison of
2004
+ open projections, J. Funct. Anal. 260 (2011), 3474–3493.
2005
+ [41] W. Paschke, Inner product modules over B∗-algebras, Trans. Amer. Math. Soc, 182 (1973),
2006
+ 443–468.
2007
+ [42] G. K. Pedersen, C∗-algebras and their Automorphism Group, L.M.S monographs, Aca-
2008
+ demic Press, London, New York, San Francisco, 1979.
2009
+ [43] G. K. Pedersen, Unitary extensions and polar decompositions in a C∗-algebra, J. Operator
2010
+ Theory 17 (1987), 357–364.
2011
+ [44] L. Robert, Remarks on Z-stable projectionless C∗-algebras. Glasg. Math. J. 58 (2016),
2012
+ no. 2, 273–277.
2013
+ [45] M. Rørdam, On the structure of simple C∗-algebras tensored with a UHF-algebra. II, J.
2014
+ Funct. Anal. 107 (1992), 255–269.
2015
+ [46] M. Rørdam, The stable and the real rank of Z-absorbing C∗-algebras. Internat. J. Math.
2016
+ 15 (2004), no. 10, 1065–1084.
2017
+ [47] Y. Sato, Trace spaces of simple nuclear C∗-algebras with finite-dimensional extreme bound-
2018
+ ary, preprint 2012, http://arxiv.org/abs/1209.3000.
2019
+ [48] H. Thiel, Ranks of operators in simple C∗-algebras with stable rank one, Comm. Math.
2020
+ Phys. 377 (2020), 37–76.
2021
+ [49] A. Tikuisis, Nuclear dimension, Z-stability, and algebraic simplicity for stably projection-
2022
+ less C*-algebras, Math. Ann. 358 (2014), nos. 3-4, 729–778.
2023
+ 34
2024
+
2025
+ [50] A. S. Toms. Flat dimension growth for C∗-algebras, J. Funct. Anal., 238 (2006), 678–708.
2026
+ [51] A. Toms, On the classification problem for nuclear C∗-algebras. Ann. of Math. 167 (2008),
2027
+ 1029–1044.
2028
+ [52] A. Toms, S. White and W. Winter, Z-stability and finite dimensional tracial boundaries,
2029
+ Int. Math. Res. Not. IMRN 2015, no. 10, 2702–2727.
2030
+ [53] W. Winter, Nuclear dimension and Z-stability of pure C*-algebras, Invent. Math. 187
2031
+ (2012), no. 2, 259–342.
2032
+ [54] S. Zhang, Certain C∗-algebras with real rank zero and their corona and multiplier algebras.
2033
+ I, Pacific J. Math. 155 (1992), 169–197
2034
+ [55] W. Zhang, Tracial state space with non-compact extreme boundary, J. Funct. Anal. 267
2035
+ (2014) 2884–2906.
2036
2037
2038
+ 35
2039
+
INE2T4oBgHgl3EQf_Qm3/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
MNAzT4oBgHgl3EQfV_xV/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ad0e617cdd21db26bae78eacf863ddf5505e4f258def820f9a3b537c612156b9
3
+ size 80647
MtE0T4oBgHgl3EQfjQEE/content/2301.02455v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:31459e6057eb6bf5d9e1cb11317e7b4f4471e03d757b3f036b2b79ba37e2c9e8
3
+ size 433232
MtE0T4oBgHgl3EQfjQEE/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:2c94a2860a9f0f66ca77f91fbe042a7987c6b351c649cea6add5c88762b9103f
3
+ size 1638445
MtE0T4oBgHgl3EQfjQEE/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d6aca197acd1e5655236fb1c2a4ce3692bbfdf6ea620b72095f1e8915aeac0f8
3
+ size 74722