Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- -9FLT4oBgHgl3EQfDS7k/content/tmp_files/2301.11979v1.pdf.txt +681 -0
- -9FLT4oBgHgl3EQfDS7k/content/tmp_files/load_file.txt +0 -0
- -9FLT4oBgHgl3EQfvi-U/content/tmp_files/2301.12160v1.pdf.txt +708 -0
- -9FLT4oBgHgl3EQfvi-U/content/tmp_files/load_file.txt +0 -0
- -NAzT4oBgHgl3EQfSvt8/content/2301.01237v1.pdf +3 -0
- .gitattributes +9 -0
- 0NE1T4oBgHgl3EQf4wUX/content/tmp_files/2301.03503v1.pdf.txt +1261 -0
- 0NE1T4oBgHgl3EQf4wUX/content/tmp_files/load_file.txt +0 -0
- 2NFRT4oBgHgl3EQfmzfK/content/tmp_files/2301.13603v1.pdf.txt +1291 -0
- 2NFRT4oBgHgl3EQfmzfK/content/tmp_files/load_file.txt +0 -0
- 39A0T4oBgHgl3EQfNf8t/content/tmp_files/2301.02146v1.pdf.txt +3499 -0
- 39A0T4oBgHgl3EQfNf8t/content/tmp_files/load_file.txt +0 -0
- 4tE2T4oBgHgl3EQf6ghP/content/tmp_files/2301.04200v1.pdf.txt +1439 -0
- 4tE2T4oBgHgl3EQf6ghP/content/tmp_files/load_file.txt +0 -0
- 6dE4T4oBgHgl3EQf1w1z/content/tmp_files/2301.05293v1.pdf.txt +968 -0
- 6dE4T4oBgHgl3EQf1w1z/content/tmp_files/load_file.txt +0 -0
- 6tAyT4oBgHgl3EQfpvgE/vector_store/index.faiss +3 -0
- 79E1T4oBgHgl3EQf7gUu/content/tmp_files/2301.03534v1.pdf.txt +1467 -0
- 79E1T4oBgHgl3EQf7gUu/content/tmp_files/load_file.txt +0 -0
- 7dE4T4oBgHgl3EQfcww5/content/2301.05085v1.pdf +3 -0
- 7dE4T4oBgHgl3EQfcww5/vector_store/index.faiss +3 -0
- 7dE4T4oBgHgl3EQfcww5/vector_store/index.pkl +3 -0
- 89E4T4oBgHgl3EQf3A3O/content/tmp_files/2301.05303v1.pdf.txt +1837 -0
- 89E4T4oBgHgl3EQf3A3O/content/tmp_files/load_file.txt +0 -0
- 8tA0T4oBgHgl3EQfOv9y/content/tmp_files/2301.02165v1.pdf.txt +1045 -0
- 8tA0T4oBgHgl3EQfOv9y/content/tmp_files/load_file.txt +0 -0
- 8tAyT4oBgHgl3EQfqPgO/content/tmp_files/2301.00537v1.pdf.txt +1396 -0
- 8tAyT4oBgHgl3EQfqPgO/content/tmp_files/load_file.txt +0 -0
- AdFIT4oBgHgl3EQf-yxb/content/tmp_files/2301.11412v1.pdf.txt +0 -0
- AdFIT4oBgHgl3EQf-yxb/content/tmp_files/load_file.txt +0 -0
- BtFAT4oBgHgl3EQfsR7g/content/2301.08658v1.pdf +3 -0
- BtFAT4oBgHgl3EQfsR7g/vector_store/index.pkl +3 -0
- C9E1T4oBgHgl3EQfpwXL/content/tmp_files/2301.03336v1.pdf.txt +1444 -0
- C9E1T4oBgHgl3EQfpwXL/content/tmp_files/load_file.txt +0 -0
- DNAyT4oBgHgl3EQfSPdR/content/tmp_files/2301.00081v1.pdf.txt +0 -0
- DNAyT4oBgHgl3EQfSPdR/content/tmp_files/load_file.txt +0 -0
- DdE0T4oBgHgl3EQfQQD8/content/tmp_files/2301.02192v1.pdf.txt +2027 -0
- DdE0T4oBgHgl3EQfQQD8/content/tmp_files/load_file.txt +0 -0
- E9E4T4oBgHgl3EQfGwxn/content/tmp_files/2301.04897v1.pdf.txt +1622 -0
- E9E4T4oBgHgl3EQfGwxn/content/tmp_files/load_file.txt +0 -0
- EtAzT4oBgHgl3EQfUPx6/vector_store/index.pkl +3 -0
- FNAyT4oBgHgl3EQf4_q8/vector_store/index.pkl +3 -0
- HNAzT4oBgHgl3EQfxf6-/content/tmp_files/2301.01740v1.pdf.txt +3023 -0
- HNAzT4oBgHgl3EQfxf6-/content/tmp_files/load_file.txt +0 -0
- INE2T4oBgHgl3EQf_Qm3/content/tmp_files/2301.04247v1.pdf.txt +2039 -0
- INE2T4oBgHgl3EQf_Qm3/content/tmp_files/load_file.txt +0 -0
- MNAzT4oBgHgl3EQfV_xV/vector_store/index.pkl +3 -0
- MtE0T4oBgHgl3EQfjQEE/content/2301.02455v1.pdf +3 -0
- MtE0T4oBgHgl3EQfjQEE/vector_store/index.faiss +3 -0
- MtE0T4oBgHgl3EQfjQEE/vector_store/index.pkl +3 -0
-9FLT4oBgHgl3EQfDS7k/content/tmp_files/2301.11979v1.pdf.txt
ADDED
@@ -0,0 +1,681 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.11979v1 [cond-mat.str-el] 27 Jan 2023
|
2 |
+
DFT, L(S)DA, LDA+U, LDA+DMFT..., whether we do approach
|
3 |
+
to a proper description of optical response for strongly correlated
|
4 |
+
systems?
|
5 |
+
A.S. Moskvin1
|
6 |
+
1Ural Federal University, Ekaterinburg, 620083 Russia
|
7 |
+
Аннотация
|
8 |
+
I present a critical overview of so-called "ab initio"DFT (density fuctional theory) based
|
9 |
+
calculation schemes for the description of the electronic structure, energy spectrum, and optical
|
10 |
+
response for strongly correlated 3d oxides, in particular, crystal-field and charge transfer transitions
|
11 |
+
as compared with an "old" cluster model that does generalize crystal-field and ligand-field theory.
|
12 |
+
As a most instructive illustration of validity of numerous calculation techniques I address the
|
13 |
+
prototypical 3d insulator NiO predicted to be a metal in frames of a standard LDA (local density
|
14 |
+
approximation) band theory.
|
15 |
+
1
|
16 |
+
|
17 |
+
INTRODUCTION
|
18 |
+
The electronic states in strongly correlated 3d oxides manifest both significant localization
|
19 |
+
and dispersional features. One strategy to deal with this dilemma is to restrict oneself to
|
20 |
+
small many-electron clusters embedded to a whole crystal, then creating model effective
|
21 |
+
lattice Hamiltonians whose spectra may reasonably well represent the energy and dispersion
|
22 |
+
of the important excitations of the full problem. Despite some shortcomings the method did
|
23 |
+
provide a clear physical picture of the complex electronic structure and the energy spectrum,
|
24 |
+
as well as the possibility of a quantitative modeling.
|
25 |
+
However, last decades the condensed matter community faced an expanding flurry of
|
26 |
+
papers with the so called ab initio calculations of electronic structure and physical properties
|
27 |
+
for strongly correlated systems such as 3d compounds based on density functional theory
|
28 |
+
(DFT). The modern formulation of the DFT originated in the work of Hohenberg and
|
29 |
+
Kohn [1], on which based the other classic work in this field by Kohn and Sham [2]. The Kohn-
|
30 |
+
Sham equation, has become a basic mathematical model of much of present-day methods for
|
31 |
+
treating electrons in atoms, molecules, condensed matter, solid surfaces, nanomaterials, and
|
32 |
+
man-made structures [3]. Of the top three most cited physicists in the period 1980-2010, the
|
33 |
+
first (Perdew: 65 757 citations) and third (Becke: 62 581 citations) were density-functional
|
34 |
+
theorists [4].
|
35 |
+
However, DFT still remains, in some sense, ill-defined: many of DFT statements were
|
36 |
+
ill-posed or not rigorously proved. Most widely used DFT computational schemes start
|
37 |
+
with a "metallic-like"approaches making use of approximate energy functionals, firstly LDA
|
38 |
+
(local density approximation) scheme, which are constructed as expansions around the
|
39 |
+
homogeneous electron gas limit and fail quite dramatically in capturing the properties of
|
40 |
+
strongly correlated systems. The LDA+U and LDA+DMFT (DMFT, dynamical mean-
|
41 |
+
field theory) [5] methods are believed to correct the inaccuracies of approximate DFT
|
42 |
+
exchange correlation functionals. The main idea of these computational approaches consists
|
43 |
+
in a selective description of the strongly correlated electronic states, typically, localized
|
44 |
+
d or f orbitals, using the Hubbard model, while all the other states continue to be
|
45 |
+
treated at the level of standard approximate DFT functionals. At present the LDA+U
|
46 |
+
and LDA+DMFT methods are addressed to be most powerful tools for the investigation
|
47 |
+
of strongly correlated electronic systems, however, these preserve many shortcomings of
|
48 |
+
2
|
49 |
+
|
50 |
+
the DFT-LDA approach. Despite many examples of a seemingly good agreement with
|
51 |
+
experimental data (photoemission and inverse-photoemission spectra, magnetic moments,...)
|
52 |
+
claimed by the DFT community, both the questionable starting point and many unsolved
|
53 |
+
and unsoluble problems give rise to serious doubts in quantitative and even qualitative
|
54 |
+
predictions made within the DFT based techniques. In a certain sense the cluster based
|
55 |
+
calculations seem to provide a better description of the overall electronic structure of
|
56 |
+
insulating 3doxides and its optical response than the DFT based band structure calculations,
|
57 |
+
mainly due to a clear physics and a better account for correlation effects (see, e.g.,
|
58 |
+
Refs. [6, 7]).
|
59 |
+
The paper is organized as follows. In Sec.II we do present a short critical overview of the
|
60 |
+
DFT and the DFT based technique with a focus on the NiO oxide. Sec.III is devoted to a
|
61 |
+
short overview of the cluster model approaches to a proper semiquantitative description of
|
62 |
+
the optical response in strongly correlated 3d oxides with a focus on the NiO oxide. A short
|
63 |
+
summary is made in Sec.IV.
|
64 |
+
SHORT OVERVIEW OF THE DFT BASED TECHNIQUE
|
65 |
+
Hohenberg-Kohn-Sham DFT
|
66 |
+
Density functional theory finds its roots in the approach which Thomas and Fermi
|
67 |
+
elaborated shortly after the creation of quantum mechanics [8, 9]. The Thomas-Fermi theory
|
68 |
+
of atoms may be interpreted as a semiclassical approximation, where the energy of a system
|
69 |
+
is written as a functional of the one-particle density.
|
70 |
+
Justifying earlier attempts directed at generalizing the Thomas-Fermi theory, Hohenberg
|
71 |
+
and Kohn [1] in 1964 advanced a theorem: "For any system of interacting particles in an
|
72 |
+
external potential v(r), the external potential is uniquely determined (except for a constant)
|
73 |
+
by the ground state density n0(r) which states that the exact ground-state energy is a
|
74 |
+
functional of the exact ground-state one-particle density. Unfortunately, it does not tell
|
75 |
+
how to construct this functional, i.e., it is an existence theorem for the energy-density
|
76 |
+
functional. This explains the fact of why so much effort has been dedicated to the task of
|
77 |
+
obtaining approximate functionals for the description of the ground-state properties of many-
|
78 |
+
particle systems. Contrary to wavefunction theory, where the objective is to approximate
|
79 |
+
3
|
80 |
+
|
81 |
+
the wavefunction, in DFT we choose to make approximations for the functional.
|
82 |
+
However, DFT still remains, in some sense, ill-defined: many of the DFT statements
|
83 |
+
were ill-posed or not rigorously proved. Indeed, the HK theorem is the constellation of two
|
84 |
+
statements: (i) the mathematically rigorous HK lemma, which demonstrates that the same
|
85 |
+
ground state density cannot correspond to two different potentials of an external field, and
|
86 |
+
(ii) the hypothesis of the existence of the universal density functional. However, the HK
|
87 |
+
lemma cannot provide justification of the universal density functional for fermions [10]. In
|
88 |
+
other words, each external field determines a unique density, and each density determines
|
89 |
+
a unique external field on the basis of the HK lemma. However, the rule for the last
|
90 |
+
correspondence can be nonuniversal, as the rule in general depends on the concrete form of
|
91 |
+
the density. The existence of this nonuniversality violates the HK theorem, although the HK
|
92 |
+
lemma is believed to be undoubtedly correct [10].
|
93 |
+
Furthermore, there are more serious critics. Sarry and Sarry [11] claim that the proof of
|
94 |
+
the HK theorem is not correct. The authors do emphasize that for a strict many-particle
|
95 |
+
calculation only the direct mapping: external potential ⇒ ground state wave function ⇒
|
96 |
+
electron density
|
97 |
+
v(r) ⇒ Ψ0(r) ⇒ ρ0(r)
|
98 |
+
is justified while the inverse mapping
|
99 |
+
ρ0(r) ⇒ Ψ0(r) ⇒ v(r)
|
100 |
+
claimed by the HK theorem can be validated only for single-particle self-consistent
|
101 |
+
calculations.
|
102 |
+
The DFT exploits the one-to-one correspondence between the single-particle electron
|
103 |
+
density and an external potential acting upon the system and relies on the existence of
|
104 |
+
a universal functional F[ρ(r)] which can be minimized in order to find the ground state
|
105 |
+
energy. However,the correspondence theorem establishes the existence of the functional only
|
106 |
+
in principle, and provides no unique practical recipe for its construction. The construction
|
107 |
+
of the functional F[ρ(r)] in the HK-DFT is equivalent to the problem of finding the N-
|
108 |
+
representability conditions of the reduced density matrix of order two [3, 12], the problem
|
109 |
+
whose solution has not been found until now. Generally speaking the functional F[ρ(r)]
|
110 |
+
must be N-dependent, namely, F[N, ρ(r)]. Another important aspect, closely related to N-
|
111 |
+
representability, is the variational character that either exact or approximate functionals
|
112 |
+
4
|
113 |
+
|
114 |
+
F[N, ρ(r)] must have in order to guarantee that the energy remains an upper bound to the
|
115 |
+
exact value.
|
116 |
+
The Kohn-Sham (KS) theory goes further in reducing the problem of calculating ground
|
117 |
+
state properties of a many-electron system in a local external single-particle potential to
|
118 |
+
solving Hartree-like one-electron KS equations. Within the framework of the HKS-DFT,
|
119 |
+
the many-body problem of interacting electrons in a static external potential is cast into
|
120 |
+
a tractable problem of non-interacting electrons moving in an effective potential. The
|
121 |
+
latter includes the external potential and the effects of the Coulomb interactions between
|
122 |
+
the electrons, i.e. the Hartree term, describing the electron-electron repulsion, and the
|
123 |
+
exchange and correlation (XC) interactions, which includes all the many-body interactions.
|
124 |
+
Modeling the XC interactions is the main difficulty of DFT. In practical calculations, the
|
125 |
+
XC contribution is approximated, and the results are only as good as the approximation
|
126 |
+
used. Actually, in HKS-DFT there exist hundreds of XC-approximations for vKS
|
127 |
+
xc (r) [3]. The
|
128 |
+
existence of so many approximations, with so little guidance, makes it ever more difficult
|
129 |
+
for non-specialists to separate the silver from the dross [13]. It is worth noting here that all
|
130 |
+
the approximate functionals do not comply with the variational principle.
|
131 |
+
The leading approximation for density functional construction is the so called local density
|
132 |
+
approximation (LDA), which is based upon exact exchange energy for a uniform electron gas
|
133 |
+
and only requires the density at each point in space. So the LDA taken from assuming that
|
134 |
+
the electron density for an atom, molecule, or solid is similarly homogeneous. But molecules
|
135 |
+
in LDA are typically overbound by about 1 eV/bond, and in the late 1980s the so-called
|
136 |
+
generalized gradient approximations (GGAs) using both the density and its gradient at
|
137 |
+
each point in space were elaborated whose accuracy seemed to be acceptable in chemical
|
138 |
+
calculations [13]. All the GGAs functionals, by definition, are corrections to the LDA, they
|
139 |
+
all revert to the uniform electron gas at zero density gradient. It should be noted that the
|
140 |
+
local nature of the standard approximations implies an exponential decay of the inter-site
|
141 |
+
interaction, in other words, the description of weak interactions such as long-range van der
|
142 |
+
Waals interactions is well beyond any conventional DFT method [13].
|
143 |
+
The DFT calculations are quite different from the usual quantum mechanical methods
|
144 |
+
where better accuracy depends on computational resources and not on limitations stemming
|
145 |
+
from the method itself. The Hartree-Fock (HF) results cannot be reproduced within the
|
146 |
+
framework of Kohn-Sham (KS) theory because the single-particle densities of finite systems
|
147 |
+
5
|
148 |
+
|
149 |
+
obtained within the HF calculations are not v-representable, i.e., do not correspond to any
|
150 |
+
ground state of a N non-interacting electron systems in a local external potential [14]. For
|
151 |
+
this reason, the KS theory, which finds a minimum on a different subset of all densities, can
|
152 |
+
overestimate the ground state energy, as compared to the HF result.
|
153 |
+
In addition to the lack of compliance with N-representability conditions and difficulties
|
154 |
+
in extending the application of the first HK theorem to finite subspaces, there are still other
|
155 |
+
problems that beset DFT. They have to do with how to properly include symmetry (i.e.,
|
156 |
+
properties of all operators commuting with the Hamiltonian of a given system). For instance,
|
157 |
+
translational symmetry in crystalline solids should be applied only to a full many-electron
|
158 |
+
function rather than to one-electron KS orbitals!
|
159 |
+
Currently, the KS-DFT is about occupied orbitals only and is far from giving a consistent
|
160 |
+
and quantitatively accurate description of open-shell spin systems, as the currently available
|
161 |
+
approximate functionals show unsystematic errors in the (inaccurate) prediction of energies,
|
162 |
+
geometries, and molecular properties.
|
163 |
+
Strictly speaking, the DFT is designed for description of ground rather than excited states
|
164 |
+
with no good scheme for excitations. Because an excited-state density does not uniquely
|
165 |
+
determine the potential, there is no general analog of HK for excited states. The standard
|
166 |
+
functionals are inaccurate both for on-site crystal field and for charge transfer excitations [13].
|
167 |
+
The DFT based approaches cannot provide the correct atomic limit and the term and
|
168 |
+
multiplet structure, which is crucial for description of the optical response for 3dcompounds.
|
169 |
+
Although there are efforts to obtain correct results for spectroscopic properties depending
|
170 |
+
on spin and orbital density this problem remains as an open one in DFT research. Clearly,
|
171 |
+
all these difficulties stem from unsolved foundational problems in DFT and are related to
|
172 |
+
fractional charges and to fractional spins. Thus, these basic unsolved issues in the HKS-DFT
|
173 |
+
point toward the need for a basic understanding of foundational issues.
|
174 |
+
In other words, given these background problems, the DFT based models should be
|
175 |
+
addressed as semi-empirical approximate ones rather than ab initio theories. M. Levy
|
176 |
+
introduced in 2010 the term DFA to define density functional approximation instead of
|
177 |
+
DFT, which is believed to quite appropriately describe contemporary DFT [3]. In chemistry,
|
178 |
+
it is traditional to refer to standard approaches as ab initio, while DFT is regarded as
|
179 |
+
empirical. Because solid-state calculations are more demanding, for many decades DFT was
|
180 |
+
the only possible approach. Thus, DFT calculations are referred to as ab initio in solid-state
|
181 |
+
6
|
182 |
+
|
183 |
+
physics and materials science [13]. Proceeding with a fixed approximate functional, the DFT
|
184 |
+
is called "first principles in the sense that the user only chooses the atoms, and the computer
|
185 |
+
predicts (correctly or not) all properties of the molecule or solid.
|
186 |
+
LSDA
|
187 |
+
Basic drawback of the spin-polarized approaches is that these start with a local density
|
188 |
+
functional in the form (see, e.g. Ref.15)
|
189 |
+
v(r) = v0[n(r)] + ∆v[n(r), m(r)](ˆσ · m(r)
|
190 |
+
|m(r)|) ,
|
191 |
+
where n(r), m(r) are the electron and spin magnetic density, respectively, ˆσ is the Pauli
|
192 |
+
matrix, that is these imply presence of a large fictious local one-electron spin-magnetic field ∝
|
193 |
+
(v↑−v↓), where v↑,↓ are the on-site LSDA spin-up and spin-down potentials. Magnitude of the
|
194 |
+
field is considered to be governed by the intra-atomic Hund exchange, while its orientation
|
195 |
+
does by the effective molecular, or inter-atomic exchange fields. Despite the supposedly
|
196 |
+
spin nature of the field it produces an unphysically giant spin-dependent rearrangement of
|
197 |
+
the charge density that cannot be reproduced within any conventional technique operating
|
198 |
+
with spin Hamiltonians. Furthermore, a direct link with the orientation of the field makes
|
199 |
+
the effect of the spin configuration onto the charge distribution to be unphysically large.
|
200 |
+
However, magnetic long-range order has no significant influence on the redistribution of
|
201 |
+
the charge density. The DFT-LSDA community needed many years to understand such a
|
202 |
+
physically clear point.
|
203 |
+
In general, the LSDA method to handle a spin degree of freedom is absolutely
|
204 |
+
incompatible with a conventional approach based on the spin Hamiltonian concept. There
|
205 |
+
are some intractable problems with a match making between the conventional formalism
|
206 |
+
of a spin Hamiltonian and LSDA approach to the exchange and exchange-relativistic
|
207 |
+
effects. Visibly plausible numerical results for different exchange and exchange-relativistic
|
208 |
+
parameters reported in many LSDA investigations (see, e.g., Refs. [16]) evidence only a
|
209 |
+
potential capacity of the LSDA based models for semiquantitative estimations, rather than
|
210 |
+
for reliable quantitative data. It is worth noting that for all of these "advantageous"instances
|
211 |
+
the matter concerns the handling of certain classical N´eel-like spin configurations (ferro-,
|
212 |
+
antiferro-, spiral,...) and search for a compatibility with a mapping made with a conventional
|
213 |
+
7
|
214 |
+
|
215 |
+
quantum spin Hamiltonian. It’s quite another matter when one addresses the search of the
|
216 |
+
charge density redistribution induced by a spin configuration as, for instance, in multiferroics.
|
217 |
+
In such a case the straightforward application of the LSDA scheme can lead to an unphysical
|
218 |
+
overestimation of the effects or even to qualitatively incorrect results due to an unphysically
|
219 |
+
strong effect of a breaking of spatial symmetry induced by a spin configuration (see, e.g.
|
220 |
+
Refs. [17] and references therein).
|
221 |
+
Going beyond LSDA:LDA+U, LDA+DMFT, LDA+U+V
|
222 |
+
It is commonly accepted now that the standard DFT-LDA(GGA) approach is insufficient
|
223 |
+
to describe the electronic structure of the Mott insulators.
|
224 |
+
Apparent weaknesses of the DFT approach were exposed especially after the discovery
|
225 |
+
in 1986 of the copper-oxide superconductors, as it failed to yield the fact that the parent
|
226 |
+
compound La2CuO4 is an antiferromagnetic insulator. This difficult period for the DFT-
|
227 |
+
LDA method as many decided was partially ended in the early and mid 1990s especially
|
228 |
+
when an orbital dependent Hubbard-type U was incorporated in the exchange correlation
|
229 |
+
functional of the localized 3delectrons within the LDA+U method, while the other electrons
|
230 |
+
are still described at the LDA level [5].
|
231 |
+
Attempts to go beyond LSDA are based on the self-interaction-corrected density
|
232 |
+
functional theory SIC-DFT, the LDA+U method, and the GW approximation [5]. These
|
233 |
+
methods represent corrections of the single-particle Kohn-Sham potential in one way or
|
234 |
+
another and lead to substantial improvements over the LSDA results for the values of the
|
235 |
+
energy gap and local moment. Within the SIC-DFT and LDA+U methods the occupied and
|
236 |
+
unoccupied states are split by the Coulomb interaction U, whereas within the LSDA this
|
237 |
+
splitting is caused by the Stoner parameter J, which is typically one order of magnitude
|
238 |
+
smaller than U. Therefore, compared with the LSDA, the novel methods capture more
|
239 |
+
correctly the physics of transition-metal oxides and improve the results for the energy gap
|
240 |
+
and local moment significantly.
|
241 |
+
An important drawback of the LDA+U method is that it requires U as a starting
|
242 |
+
parameter. Even though several schemes for the determination of U exist, it is almost always
|
243 |
+
chosen such that it reproduces the experimental value of a specific property of the electronic
|
244 |
+
structure, most often the band gap. Usually the LDA+U calculations imply account of
|
245 |
+
8
|
246 |
+
|
247 |
+
the on-site d-d correlations with Udd parameter and do neglect the ligand p-p correlations
|
248 |
+
though Udd parameter is only twice as large as Upp in oxides [6, 7]. The predictive power
|
249 |
+
of the novel methods crucially relies on a reliable assessment of the interactions, however,
|
250 |
+
the value of the interaction parameters, such as Udd, Upp, depends on the choice of the
|
251 |
+
downfolded model, namely, the orbitals treated in the model as well as the basis functions
|
252 |
+
employed, as the screened interaction is determined by the various screening processes that
|
253 |
+
are not considered in the model. Therefore a careful analysis is needed to make a proper
|
254 |
+
model and choose appropriate parameters. By fitting, one usually finds higher accuracy for
|
255 |
+
systems similar to those fitted, but usually greater inaccuracies far away.
|
256 |
+
All efforts to account for the correlations beyond LDA encounter an insoluble problem
|
257 |
+
of double counting (DC) of interaction terms which had just included into Kohn-Sham
|
258 |
+
single-particle potential. A well defined analytical expression for the DC potential cannot
|
259 |
+
be formulated in the context of LDA+U or other technique going beyond LDA [18]. How to
|
260 |
+
choose the DC correction potential in a manner that is both physically sound and consistent
|
261 |
+
is unknown. Thus, one has to resort to numerical criteria to fix the value of the DC correction.
|
262 |
+
However, there is currently no universal and unambiguous expression for DC correction,
|
263 |
+
and different formulations are used for different classes of materials. Moreover, different
|
264 |
+
methods for fixing the double counting can drive the result from Mott insulating to almost
|
265 |
+
metallic [18, 19].
|
266 |
+
The LDA+DMFT approach combines band structure theory within the DFT-LDA with
|
267 |
+
many-body theory as provided by dynamical mean-field theory (DMFT) [5]. Within DMFT,
|
268 |
+
a lattice model is mapped onto an effective impurity problem embedded in a medium which
|
269 |
+
has to be determined self-consistently, e.g., by quantum Monte-Carlo (QMC) simulations.
|
270 |
+
This mapping becomes exact in the limit of infinite dimensions.
|
271 |
+
The LDA+U and LDA+DMFT methods are believed to correct the inaccuracies of
|
272 |
+
approximate DFT exchange correlation functionals. The main idea of the both computational
|
273 |
+
approaches consists in a selective description of the strongly correlated electronic states,
|
274 |
+
typically, localized d or f orbitals, using the Hubbard model, while all the other states
|
275 |
+
continue to be treated at the level of standard approximate DFT functionals. At present
|
276 |
+
the LDA+U and LDA+DMFT methods are addressed to be most powerful tools for
|
277 |
+
the investigation of strongly correlated electronic systems, however, these preserve many
|
278 |
+
shortcomings of the basic DFT-LDA approach.
|
279 |
+
9
|
280 |
+
|
281 |
+
Current theoretical studies of electronic correlations in transition metal oxides typically
|
282 |
+
only account for the local repulsion between d-electrons even if oxygen ligand p-states are
|
283 |
+
an explicit part of the effective Hamiltonian. Interatomic correlations such as Vpd between
|
284 |
+
d- and (ligand) p-electrons, as well as the on-site and inter-site interaction between p-
|
285 |
+
electrons (Upp and Vpp), are usually neglected. Strictly speaking, LDA+DMFT scheme
|
286 |
+
should incorporate both Upp, Vpp, Vpd and Vdd interactions [20]. To this end we need a
|
287 |
+
proper procedure for their calculation, however, this makes the double counting problem
|
288 |
+
significantly more sophisticated.
|
289 |
+
NiO as a main TMO system for so-called ab initio studies
|
290 |
+
An ongoing challenge during the last 60 years has been the development of a theoretical
|
291 |
+
model that could offer an accurate description of both the electric and magnetic phenomena
|
292 |
+
observed in NiO. Nickel oxide is one of the prototypical compounds that has highlighted the
|
293 |
+
importance of correlation effects in transition metal oxides (TMO). However, despite several
|
294 |
+
decades of studies there is still no literature consensus on the detailed electronic structure
|
295 |
+
of NiO. Although exhibiting a partially filled 3dband and predicted by simple band theory
|
296 |
+
to be a good conductor, NiO has a relatively large band gap (about 4 eV) that cannot be
|
297 |
+
accounted for in the LDA calculations.
|
298 |
+
NiO has long been viewed as a prototype "Mott insulator" [21] with the gap formed
|
299 |
+
by intersite cation-cation d-d charge transfer (CT) transitions, however, this view was
|
300 |
+
later replaced by that of a "CT insulator"with the gap formed by anion-cation p-d CT
|
301 |
+
transitions [22].
|
302 |
+
Strictly speaking, the DFT is designed for description of ground rather than excited
|
303 |
+
states. Nevertheless research activity in the condensed matter DFT community is focused
|
304 |
+
on the single-particle excitation properties of the TMOs, in particular, the photoemission
|
305 |
+
spectra and energy gap.
|
306 |
+
The XPS combined with bremsstrahlung-isochromat spectroscopy (BIS) shows a gap
|
307 |
+
between the top of the valence band and the bottom of the conducting band of 4.3 eV for
|
308 |
+
NiO [23]. Namely this value appears to be in the focus of the so-called ab initio DFT-LDA
|
309 |
+
based calculations for NiO. However, the later studies [24] have shown that the exact value of
|
310 |
+
this conductivity gap is subject to the band position chosen to define the highest valence and
|
311 |
+
10
|
312 |
+
|
313 |
+
lowest conducting levels, obtaining values that range from 3.20 to 5.67 eV (!). Experimental
|
314 |
+
data, in particular, oxygen x-ray emission (XES) and absorption (XAS) spectra [25] point
|
315 |
+
to strong matrix element effects, that makes reliable estimates of the energy gap to be very
|
316 |
+
ambiguous adventure.
|
317 |
+
The standard DFT-LDA band theory predicts NiO to be a metal. LSDA [26] predicts
|
318 |
+
NiO to be an insulator (with severe underestimated gap of 0.3 eV) only in antiferromagnetic
|
319 |
+
state (!?). The later GW [27] and LDA+U [28] calculations yielded the larger gap of 3.7 eV.
|
320 |
+
First LDA+DMFT calculation performed by Ren et al. [29] yielded the value of 4.3 eV. The
|
321 |
+
authors claimed: "The overall agreement between the calculated single-particle spectrum and
|
322 |
+
the experimental data is surprisingly good". However, they do neglect the matrix element
|
323 |
+
effect, p-d covalency, Upp, Vpd, and Vdd, that de facto does invalidate their conclusion. Part
|
324 |
+
of these effects, in particular, p − d covalency was taken into account later [30], but with a
|
325 |
+
severe reinterpretation of the DOS. Again, the authors claim: "...we were able to provide
|
326 |
+
a full description of the valence-band spectrum and, in particular, of the distribution of
|
327 |
+
spectral weight between the lower Hubbard band and the resonant peak at the top of the
|
328 |
+
valence band. However, to this day the LDA+DMFT results for NiO strongly depend on
|
329 |
+
the choice of the DC correction potential driving the result from Mott insulating to metallic
|
330 |
+
state [18, 19].
|
331 |
+
It is rather surprising how little attention has been paid to the DFT based calculations
|
332 |
+
of the TMO optical properties. Lets turn to a very recent paper by Roedl and Bechstedt [31]
|
333 |
+
on NiO and other TMOs, whose approach is typical for DFT community. The authors
|
334 |
+
calculated the dielectric function ǫ(ω) for NiO within the DFT-GGA+U+∆ technique and
|
335 |
+
claim:"The experimental data agree very well with the calculated curves" (!?). However,
|
336 |
+
this seeming agreement is a result of a simple fitting when the two model parameters U and
|
337 |
+
∆ are determined such (U = 3.0, ∆ = 2.0 eV) that the best possible agreement concerning the
|
338 |
+
positions and intensities of the characteristic peaks in the experimental spectra is obtained.
|
339 |
+
In addition, the authors arrive at absolutely unphysical conclusion: "The optical absorption
|
340 |
+
of NiO is dominated by intra-atomic t2g → eg transitions" (!?).
|
341 |
+
Nekrasov et al. [19] realized the DMFT calculation of the optical conductivity for NiO.
|
342 |
+
Just another correlation parameter was chosen: U = 8 eV. The authors claim a general
|
343 |
+
agreement both with optical and the X-ray experiments. In the calculations, they found
|
344 |
+
that the main contribution to optical conductivity is due to intra-orbital optical transitions.
|
345 |
+
11
|
346 |
+
|
347 |
+
Inter-orbital optical transitions give less than 5% of the optical conductivity intensity in
|
348 |
+
the frequency range used in the calculations. However, as usual they did neglect a number
|
349 |
+
of important on-site and inter-site correlation parameters and all the effects due to optical
|
350 |
+
matrix elements that does invalidate their conclusion. Furthermore, the DFT-LDA based
|
351 |
+
schemes do not provide the correct atomic limit and the term and multiplet structure. Hence
|
352 |
+
these cannot correctly describe both the d-d crystal field and p-d and d-d charge transfer
|
353 |
+
transitions. However, some authors [32] suppose that in future this problem probably can be
|
354 |
+
solved within the LDA+DMFT.
|
355 |
+
Surveying these and other literature data we can argue that the conventional DFT based
|
356 |
+
technique cannot provide a proper description of the optical response for strongly correlated
|
357 |
+
3dcompounds. As up till now, in future the optical properties of the Mott or charge transfer
|
358 |
+
insulators will be considered within the framework of cluster approaches initially based on
|
359 |
+
quantum-chemical calculations.
|
360 |
+
CLUSTER MODEL IN NIO
|
361 |
+
Cluster model approach does generalize and advance crystal-field and ligand-field theory.
|
362 |
+
The method provides a clear physical picture of the complex electronic structure and
|
363 |
+
the energy spectrum, as well as the possibility of a quantitative modelling. In a certain
|
364 |
+
sense the cluster calculations might provide a better description of the overall electronic
|
365 |
+
structure of insulating 3doxides than the band structure calculations, mainly due to a better
|
366 |
+
account for correlation effects, electron-lattice coupling, and relatively weak interactions
|
367 |
+
such as spin-orbital and exchange coupling. Cluster models have proven themselves to be
|
368 |
+
reliable working models for strongly correlated systems such as transition-metal and rare-
|
369 |
+
earth compounds. These have a long and distinguished history of application in optical and
|
370 |
+
electron spectroscopy, magnetism, and magnetic resonance. The author with colleagues has
|
371 |
+
successfully demonstrated great potential of the cluster model for description of the p-d
|
372 |
+
and d-d charge transfer transitions and their contribution to optical and magneto-optical
|
373 |
+
response in 3doxides such as ferrites, manganites, cuprates, and nickelates [33].
|
374 |
+
Cluster models do widely use the symmetry for atomic orbitals, point group symmetry,
|
375 |
+
and advanced technique such as Racah algebra and its modifications for point group
|
376 |
+
symmetry [34]. From the other hand the cluster model is an actual proving-ground for various
|
377 |
+
12
|
378 |
+
|
379 |
+
calculation technique from simple quantum chemical MO-LCAO (molecular orbital-linear-
|
380 |
+
combination-of-atomic-orbitals) method to a more elaborate LDA+MLFT (MLFT, multiplet
|
381 |
+
ligand-field theory) [35] approach.
|
382 |
+
Cluster models traditionally combined quantum chemical MO-LCAO calculations [34]
|
383 |
+
based on atomic Hartree-Fock orbitals with making use parameters fitted to experiments.
|
384 |
+
Several authors obtained model parameters by performing an LDA calculation for the cluster
|
385 |
+
and using its Kohn-Sham MOs. First comprehensive description of the electronic structure
|
386 |
+
of the NiO6 cluster was performed by Fujimori and Minami [36]. Effective transfer and
|
387 |
+
overlap integrals were evaluated from LCAO parameters of NiO found by Mattheiss [37]
|
388 |
+
by fitting their APW energy-band results. The localized approach has been shown to
|
389 |
+
successfully explain the photoemission, optical-absorption, and isochromat spectra of NiO.
|
390 |
+
Recently, Haverkort et al. [35] suggested a sort of generalization of conventional ligand-
|
391 |
+
field model with the DFT-based calculations within a so-called "ab initio"LDA+MLFT
|
392 |
+
technique. They start by performing a DFT calculation for the proper, infinite crystal
|
393 |
+
using a modern DFT code which employs an accurate density functional and basis set
|
394 |
+
[e.g., linear augmented plane waves (LAPWs)]. From the (self-consistent) DFT crystal
|
395 |
+
potential they then calculate a set of Wannier functions suitable as the single-particle basis
|
396 |
+
for the cluster calculation. The authors compared the theory with experimental spectra
|
397 |
+
(XAS, nonresonant IXS, photoemission spectroscopy) for SrTiO3, MnO, and NiO and found
|
398 |
+
overall satisfactory agreement, indicating that their ligand-field parameters are correct to
|
399 |
+
better than 10%. However, as in Ref. [36] the authors have been forced to treat on-site
|
400 |
+
correlation parameter Udd and orbitally averaged (spherical) ∆pd parameter as adjustable
|
401 |
+
ones. Comparing the novel LDA+MFLT technique with that of Fujimori and Minami [36]
|
402 |
+
one should note very similar level of their quantitative conclusions. Despite the involvement
|
403 |
+
of powerful calculation techniques the numerical results of the both approaches seem to
|
404 |
+
be more like semiquantitative ones. In such a situation we should transfer the center of
|
405 |
+
gravity of the cluster approaches more and more to elaboration of physically sound and clear
|
406 |
+
semiquantitative models that are maximally take into account all the symmetry requirements
|
407 |
+
on one hand and refer to experiment on the other.
|
408 |
+
Hereafter, we do present a most recent and most comprehensive such a cluster model
|
409 |
+
approach to the description of the p-d and d-d CT transitions in NiO [38] that nicely
|
410 |
+
illustrates great potential of the model that does combine simple physically clear ligand-
|
411 |
+
13
|
412 |
+
|
413 |
+
field analysis, its semiquantitative predictions with a regular appeal to experimental data.
|
414 |
+
We believe that such an approach should precede and accompany any detailed numerical
|
415 |
+
calculation providing its physical validation.
|
416 |
+
Starting with an octahedral NiO6 complex with the point symmetry group Oh we deal
|
417 |
+
with five Ni 3dand eighteen oxygen O 2p atomic orbitals forming both the hybrid Ni 3d-O
|
418 |
+
2p bonding and antibonding eg and t2g molecular orbitals (MO), and the purely oxygen
|
419 |
+
nonbonding a1g(σ), t1g(π), t1u(σ), t1u(π), t2u(π) orbitals. The nonbonding t1u(σ) and t1u(π)
|
420 |
+
orbitals with the same symmetry are hybridized due to the oxygen-oxygen O 2pπ - O
|
421 |
+
2pπ transfer. The relative energy position of different nonbonding oxygen orbitals is of
|
422 |
+
primary importance for the spectroscopy of the oxygen-3d-metal charge transfer. This is
|
423 |
+
firstly determined by the bare energy separation ∆ǫ2pπσ = ǫ2pπ − ǫ2pσ between O 2pπ and O
|
424 |
+
2pσ electrons. Since the O 2pσ orbital points towards the two neighboring positive 3d ions,
|
425 |
+
an electron in this orbital has its energy lowered by the Madelung potential as compared
|
426 |
+
with the O 2pπ orbitals, which are oriented perpendicular to the respective 3d-O-3d axes.
|
427 |
+
Thus, the Coulomb arguments favor the positive sign of the π − σ separation ǫpπ − ǫpσ
|
428 |
+
whose numerical value can be easily estimated in the frames of the well-known point charge
|
429 |
+
model, and appears to be of the order of 1.0 eV. In a first approximation, all the γ(π) states
|
430 |
+
t1g(π), t1u(π), t2u(π) have the same energy. However, the O 2pπ-O 2pπ transfer and overlap
|
431 |
+
yield the energy correction to the bare energies with the largest value and a positive sign for
|
432 |
+
the t1g(π) state. The energy of the t1u(π) state drops due to a hybridization with the cation
|
433 |
+
4pt1u(π) state.
|
434 |
+
The ground state of NiO610− cluster, or nominally Ni2+ ion corresponds to t6
|
435 |
+
2ge2
|
436 |
+
g
|
437 |
+
configuration with the Hund 3A2g(F) ground term. Typically for the octahedral MeO6
|
438 |
+
clusters [33] the nonbonding t1g(π) oxygen orbital has the highest energy and forms the first
|
439 |
+
electron removal oxygen state while the other nonbonding oxygen π-orbitals, t2u(π), t1u(π),
|
440 |
+
and the σ-orbital t1u(σ) have a lower energy with the energy separation ∼ 1 eV inbetween
|
441 |
+
(see Fig. 1).
|
442 |
+
The p-d CT transition in NiO10−
|
443 |
+
6
|
444 |
+
center is related to the transfer of O 2p electron to the
|
445 |
+
partially filled 3deg-subshell with the formation on the Ni-site of the (t6
|
446 |
+
2ge3
|
447 |
+
g) configuration of
|
448 |
+
nominal Ni+ ion isoelectronic to the well-known Jahn-Teller Cu2+ ion. Yet actually instead
|
449 |
+
of a single p-d CT transition we arrive at a series of O 2pγ→ Ni 3deg CT transitions
|
450 |
+
forming a complex p-d CT band. It should be noted that each single electron γ→eg p-d
|
451 |
+
14
|
452 |
+
|
453 |
+
Рис. 1: (Color online) Spectra of the intersite d-d, p-d CT transitions and on-site crystal field d-d
|
454 |
+
transitions in NiO. Strong dipole-allowed σ−σ d-d and p-d CT transitions are shown by thick solid
|
455 |
+
uparrows; weak dipole-allowed π − σ p-d transitions by thin solid uparrows; weak dipole-forbidden
|
456 |
+
low-energy transitions by thin dashed uparrows, respectively. Dashed downarrows point to different
|
457 |
+
electron-hole relaxation channels, dotted downarrows point to photoluminescence (PL) transitions,
|
458 |
+
I1,2 are doublet of very narrow lines associated with the recombination of the d-d CT exciton.
|
459 |
+
The spectrum of the crystal field d-d transitions is reproduced from Ref. [45]. The right hand side
|
460 |
+
reproduces a fragment of the RIXS spectra for NiO [41].
|
461 |
+
CT transition starting with the oxygen γ-orbital gives rise to several many-electron CT
|
462 |
+
states. For γ=t1,2 these are the singlet and triplet terms 1,3T1, 1,3T2 for the configurations
|
463 |
+
t6
|
464 |
+
2ge3
|
465 |
+
gt1,2, where t1,2 denotes the oxygen hole. The complex p-d CT band starts with the
|
466 |
+
dipole-forbidden t1g(π)→eg, or 3A2g→1,3T1g, 1,3T2g transitions, then includes two formally
|
467 |
+
dipole-allowed the so-called π→σ p-d CT transitions, the weak t2u(π)→eg, and relatively
|
468 |
+
strong t1u(π)→eg CT transitions, respectively, each giving rise to 3A2g→3T2u transitions.
|
469 |
+
15
|
470 |
+
|
471 |
+
Finally the main p-d CT band is ended by the strongest dipole-allowed σ→σ t1u(σ)→
|
472 |
+
eg (3A2g→3T2u) CT transition. The above estimates predict the separation between the
|
473 |
+
partial p-d bands to be ∼ 1 eV. Thus, if the most intensive CT band with a maximum
|
474 |
+
around 7 eV observed in the RIXS spectra [39–41] to attribute to the strongest dipole-
|
475 |
+
allowed O 2pt1u(σ)→Ni 3deg CT transition then one should expect the low-energy p-d
|
476 |
+
CT counterparts with the maxima around 4, 5, and 6 eV respectively, which are related
|
477 |
+
to the dipole-forbidden t1g(π)→eg, the weak dipole-allowed t2u(π)→eg, and relatively strong
|
478 |
+
dipole-allowed t1u(π)→eg CT transitions, respectively (see Fig. 1). It is worth noting that
|
479 |
+
the π→σ p-d CT t1u(π)−eg transition borrows a portion of the intensity from the strongest
|
480 |
+
dipole-allowed σ→σ t1u(σ)→eg CT transition because the t1u(π) and t1u(σ) states of the
|
481 |
+
same symmetry are partly hybridized due to the p-p covalency and overlap.
|
482 |
+
Thus, the overall width of the p-d CT bands with the final t6
|
483 |
+
2ge3
|
484 |
+
g configuration occupies
|
485 |
+
a spectral range from ∼ 4 up to ∼ 7 eV. The left hand side of Fig. 1 summarizes the
|
486 |
+
main semiquantitative results of the cluster model predictions for the energy and relative
|
487 |
+
intensities of the p-d CT transitions. Interestingly this assignment finds a strong support in
|
488 |
+
the reflectance (4.9, 6.1, and 7.2 eV for the allowed p-d CT transitions) spectra of NiO [42]. A
|
489 |
+
rather strong p(π)-d CT band peaked at 6.3 eV is clearly visible in the absorption spectra of
|
490 |
+
MgO:Ni [43]. The electroreflectance spectra [44] which detect the dipole-forbidden transitions
|
491 |
+
clearly point to a low-energy forbidden transition peaked near 3.7 eV missed in the reflectance
|
492 |
+
and absorption spectra [42, 43, 45], which thus defines a p-d character of the optical CT gap
|
493 |
+
and can be related to the onset transition for the whole complex p-d CT band. It should
|
494 |
+
be noted that a peak near 3.8 eV has been also observed in the nonlinear absorption spectra
|
495 |
+
of NiO [46]. At variance with the bulk NiO a clearly visible intensive CT peak near 3.6-
|
496 |
+
3.7 eV has been observed in the absorption spectra of NiO nanoparticles [47]. This strongly
|
497 |
+
supports the conclusion that the 3.7 eV band is related to the bulk-forbidden CT transition
|
498 |
+
which becomes the partially allowed one in the nanocrystalline state [38]. It is worth noting
|
499 |
+
that the hole-type photoconductivity threshold in bulk NiO has been observed also at this
|
500 |
+
"magic" energy 3.7 eV [48], that is the t1g(π)→eg p-d CT transition is believed to produce
|
501 |
+
itinerant holes. Indeed, the p-d CT transitions in NiO6 cluster are of so-called "anti-Jahn-
|
502 |
+
Teller" type, that is these are transitions from orbitally nondegenerate state to the final p-d
|
503 |
+
CT state state formed by two orbitally degenerate states that points to strong electron-lattice
|
504 |
+
effects in excited state. The final Ni1+ 3d9(t6
|
505 |
+
2ge3
|
506 |
+
g) configuration is isoelectronic to Cu2+ ion in
|
507 |
+
16
|
508 |
+
|
509 |
+
cubic crystal field and presents a well-known textbook example of a Jahn-Teller center that
|
510 |
+
implies a strong trend to the localization, while a photo-generated hole can move more or
|
511 |
+
less itinerantly in the O 2p valence band determining the hole-like photoconductivity [48]. It
|
512 |
+
should be noted that any oxygen π-holes have a larger effective mass than the σ-holes, that
|
513 |
+
results in a different role of the p(π)-d and p(σ)-d CT transitions both in photoconductivity
|
514 |
+
and, probably, the luminescence stimulation.
|
515 |
+
A spectral feature near 6 eV, clearly visible in the NiO photoluminescence excitation
|
516 |
+
(PLE) spectra [38] can be certainly attributed to a rather strong p(π)-d (t1u(π) → eg) CT
|
517 |
+
transition while the spectral feature near 5 eV to a weaker p(π)-d (t2u(π) → eg) CT transition.
|
518 |
+
Interestingly the strongest p(σ)-d (t1u(σ) → eg) CT transition at ∼ 7 eV is actually inactive
|
519 |
+
in the PLE spectra, most likely, due to a dominating nonradiative relaxation channel for the
|
520 |
+
oxygen t1u(σ) holes.
|
521 |
+
However, the p-d CT model cannot explain the main low-energy spectral feature, clearly
|
522 |
+
visible in the PLE spectra near 4 eV [38], thus pointing to manifestation of another CT-type
|
523 |
+
mechanism. Indeed, along with the p-d CT transitions an important contribution to the
|
524 |
+
optical response of the strongly correlated 3doxides can be related to the strong dipole-
|
525 |
+
allowed d-d CT, or Mott transitions [33]. In NiO one expects a strong d-d CT transition
|
526 |
+
related to the σ − σ-type eg − eg charge transfer t6
|
527 |
+
2ge2
|
528 |
+
g + t6
|
529 |
+
2ge2
|
530 |
+
g→ t6
|
531 |
+
2ge3
|
532 |
+
g + t6
|
533 |
+
2ge1
|
534 |
+
g between nnn
|
535 |
+
Ni sites with the creation of electron NiO611− and hole NiO69− centers (nominally Ni+ and
|
536 |
+
Ni3+ ions, respectively) thus forming a bound electron-hole dimer, or d-d CT exciton.
|
537 |
+
The strong dipole-allowed Franck-Condon d(eg)-d(eg) CT transition in NiO manifests
|
538 |
+
itself as a strong spectral feature near 4.5 eV clearly visible in the absorption of thin
|
539 |
+
NiO films [49], RIXS spectra [39, 41], the reflectance spectra (4.3 eV) [42]. Such a strong
|
540 |
+
absorption near 4.5 eV is beyond the predictions of the p-d CT model and indeed is lacking
|
541 |
+
in the absorption spectra of MgO:Ni [43]. It should be noticed that, unlike all the above
|
542 |
+
mentioned structureless spectra, the nonlinear absorption spectra [46] of NiO films do reveal
|
543 |
+
an anticipated "fine" structure of the d-d CT exciton with the two narrow peaks at 4.075
|
544 |
+
and 4.33 eV preceding a strong absorption above 4.575 eV. Interestingly the separation 0.2-
|
545 |
+
0.3 eV between the peaks is typical for the exchange induced splittings in NiO (see, e.g.,
|
546 |
+
the "0.24 eV" optical feature [45]). Accordingly, the 4.1 eV peak in the PLE spectra can be
|
547 |
+
unambiguously assigned to the d-d CT transition [38].
|
548 |
+
The charge, spin, and orbital degeneracy of the final state of this unique double anti-
|
549 |
+
17
|
550 |
+
|
551 |
+
Jahn-Teller transition 3A2g + 3A2g→2Eg + 2Eg results in a complex band observed at 4.2-4.5
|
552 |
+
eV [38]. The exchange tunnel reaction Ni++Ni3+↔Ni3++Ni+ due to a two-electron transfer
|
553 |
+
gives rise to the two symmetric (S- and P-) excitons having s- and p-symmetry, respectively,
|
554 |
+
with the energy separation δ0 = 2|t| and δ1 =
|
555 |
+
2
|
556 |
+
3|t| for the spin singlet and spin triplet
|
557 |
+
excitons, where t is the two-electron transfer integral whose magnitude is of the order of the
|
558 |
+
Ni2+-Ni2+ exchange integral: t ≈ Innn. Interestingly the P-exciton is dipole-allowed while
|
559 |
+
the S-exciton is dipole-forbidden. The anti-Jahn-Teller d-d CT exciton is prone to be self-
|
560 |
+
trapped in the lattice due to the electron-hole attraction and a particularly strong double
|
561 |
+
Jahn-Teller effect for both the electron and hole centers. Recombination transitions for such
|
562 |
+
excitons produce a bulk luminescence with puzzling well isolated doublet of very narrow
|
563 |
+
lines with close energies near 3.3 eV [38] that corresponds to a reasonable Stokes shift of 1
|
564 |
+
eV. To the best of our knowledge it is the first observation of the self-trapping for the d-d
|
565 |
+
CT excitons.
|
566 |
+
Thus, we see that a simple cluster model is able to provide a semiquantitative description
|
567 |
+
of a large body of experimental spectroscopic data, including subtle effects beyond the reach
|
568 |
+
of any "ab initio"DFT technique. We have shown that the prototype 3doxide NiO, similar
|
569 |
+
to perovskite manganites RMnO3 or parent cuprates such as La2CuO4 [33], should rather
|
570 |
+
be sorted neither into the CT insulator nor the Mott-Hubbard insulator in the Zaanen-
|
571 |
+
Sawatzky-Allen scheme [22].
|
572 |
+
SUMMARY
|
573 |
+
There are still a lot of people who think the Hohenberg-Kohn-Sham DFT within the
|
574 |
+
LDA has provided a very successful ab initio framework to successfully tackle the problem
|
575 |
+
of the electronic structure of materials. However, both the starting point and realizations
|
576 |
+
of the DFT approach have raised serious questions. The HK "theorem"of the existence of
|
577 |
+
a mythical universal density functional that can resolve everything looks like a way into
|
578 |
+
Neverland, the DFT heaven is probably unattainable. Various DFAs, density functional
|
579 |
+
approximations, local or nonlocal, will never be exact. Users are willing to pay this price
|
580 |
+
for simplicity, efficacy, and speed, combined with useful (but not yet chemical or physical)
|
581 |
+
accuracy [4, 13].
|
582 |
+
The most popular DFA fail for the most interesting systems, such as strongly correlated
|
583 |
+
18
|
584 |
+
|
585 |
+
oxides. The standard approximations over-delocalize the d-electrons, leading to highly
|
586 |
+
incorrect descriptions. Some practical schemes, in particular, DMFT can correct some of
|
587 |
+
these difficulties, but none has yet become a universal tool of known performance for such
|
588 |
+
systems [13].
|
589 |
+
Any comprehensive physically valid description of the electron and optical spectra for
|
590 |
+
strongly correlated systems, as we suggest, should combine simple physically clear cluster
|
591 |
+
ligand-field analysis with a numerical calculation technique such as LDA+MLFT [35], and
|
592 |
+
a regular appeal to experimental data.
|
593 |
+
The research was supported by the Ministry of Education and Science of the Russian
|
594 |
+
Federation, project FEUZ-2020-0054.
|
595 |
+
[1] H. Hohenberg and W. Kohn, Phys. Rev. 136, B864 (1964).
|
596 |
+
[2] W. Kohn and J.L. Sham, Phys. Rev. 140, A1133 (1965).
|
597 |
+
[3] E.S. Kryachko, E.V. Ludena, Physics Reports 544 (2014) 123239.
|
598 |
+
[4] A.D. Becke, J. Chem. Phys. 140, 18A301 (2014).
|
599 |
+
[5] G. Kotliar, S.Y. Savrasov, K. Haule, V.S. Oudovenko, O. Parcollet, and C.A. Marianetti, Rev.
|
600 |
+
Mod. Phys. 78, 865 (2006); V.I. Anisimov and Yu.A. Izyumov, Electronic Structure of Strongly
|
601 |
+
Correlated Materials (Springer Verlag, Berlin, 2010).
|
602 |
+
[6] H. Eskes, L.H. Tjeng, and G.A. Sawatzky, Phys. Rev. B 41, 288 (1990).
|
603 |
+
[7] J. Ghijsen, L.H. Tjeng, J. van Elp, H. Eskes, J. Westerink, G.A. Sawatzky, and M.T. Czyzyk,
|
604 |
+
Phys. Rev. B 38, 11322 (1988).
|
605 |
+
[8] L.H. Thomas, Proc. Cambr. Phil. Soc. 23, 542 (1926).
|
606 |
+
[9] E. Fermi, Rend. Ac. Lincei 6, 602 (1927).
|
607 |
+
[10] V.B. Bobrov, S.A. Trigger, JETP 143 , 729 (2013).
|
608 |
+
[11] A.M. Sarry, M.F. Sarry, Phys. Solid State, 54(6), 1315 (2012).
|
609 |
+
[12] Eduardo V. Ludena, J. Mol. Structure (Theochem) 709 25 (2004).
|
610 |
+
[13] K. Burke, J. Chem. Phys. 136, 150901 (2012).
|
611 |
+
[14] M.Ya. Amusia, A.Z. Msezane, V.R. Shaginyan, D. Sokolovski, Phys. Lett. A330:1-2 (2004),
|
612 |
+
10-15.
|
613 |
+
[15] L.M. Sandratskii, Phys. Rev. B 64, 134402 (2001).
|
614 |
+
19
|
615 |
+
|
616 |
+
[16] V.V. Mazurenko and V.I. Anisimov, Phys. Rev. B 71, 184434 (2005); M.I. Katsnelson, Y.O.
|
617 |
+
Kvashnin, V.V. Mazurenko, and A.I. Lichtenstein, Phys. Rev. B 82, 100403(R) (2010).
|
618 |
+
[17] A.S. Moskvin and S.-L. Drechsler, Phys. Rev. B 78, 024102 (2008); Eur. Phys. J. B 71, 331
|
619 |
+
(2009); A.S. Moskvin, Yu.D. Panov, S.-L. Drechsler, Phys. Rev. B 79, 104112 (2009).
|
620 |
+
[18] M. Karolak, G. Ulm, T. O. Wehling, V. Mazurenko, A. Poteryaev, and A. I. Lichtenstein, J.
|
621 |
+
Electron Spectrosc. Relat. Phenom. 181, 11 (2010).
|
622 |
+
[19] I.A. Nekrasov, N.S. Pavlov, and M.V. Sadovskii, JETP Lett. 95(11), 581 (2012); JETP 116(4),
|
623 |
+
620 (2013).
|
624 |
+
[20] H.J. Kulik and N. Marzari, J. Chem. Phys. 134, 094103 (2011); P. Hansmann, N. Parragh, A.
|
625 |
+
Toschi, G. Sangiovanni, and K. Held, arXiv:1312.2757v1, 2013.
|
626 |
+
[21] B. Brandow, Adv. Phys. 26, 651 (1977); S. H¨ufner, Adv. Phys. 43, 183 (1994).
|
627 |
+
[22] J. Zaanen, G. A. Sawatzky, and J W. Allen, Phys. Rev. Lett. 55, 418 (1985).
|
628 |
+
[23] G.A. Sawatzky, J.W. Allen, Phys. Rev. Lett. 53, 2239 (1984).
|
629 |
+
[24] S. H¨ufner, P. Steiner, I. Sander, F. Reinert, and H. Schmitt, Z. Phys. B - Condensed Matter
|
630 |
+
86, 207-215 (1992).
|
631 |
+
[25] E. Z. Kurmaev, R. G. Wilks, A. Moewes, L. D. Finkelstein, S. N. Shamin, and Kuneˇs, PRB
|
632 |
+
77, 165127 (2008).
|
633 |
+
[26] K. Terakura, T. Oguchi, A.R. Williams, and J. Kubler, Phys. Rev. B 30, 4734 (1984).
|
634 |
+
[27] S. Massidda, A. Continenza, M. Posternak, and A. Baldereschi, Phys. Rev. B 55, 13494 (1997).
|
635 |
+
[28] V.I. Anisimov, I.V. Solovyev, M.A. Korotin, M.T. Czyzyk, and G.A. Sawatzky, Phys. Rev. B
|
636 |
+
48, 16929 (1993).
|
637 |
+
[29] X. Ren, I. Leonov, G. Keller, M. Kollar, I. Nekrasov, and D. Vollhardt, Phys. Rev. B 74,
|
638 |
+
195114 (2006).
|
639 |
+
[30] J. Kunes, V.I. Anisimov, A.V. Lukoyanov, and D. Vollhardt, Phys.Rev. B 75, 165115 (2007).
|
640 |
+
[31] C. Roedl and F. Bechstedt, Phys. Rev. B 86, 235122 (2012).
|
641 |
+
[32] M.I. Katsnelson, A.I. Lichtenstein, J. Phys. Cond. Matter. 22, 382201 (2010).
|
642 |
+
[33] A. S. Moskvin, A. V. Zenkov, E. I. Yuryeva, V. A. Gubanov, Physica B, 168,186 (1991); A. S.
|
643 |
+
Moskvin, A. V. Zenkov, E. A. Ganshina, G. S. Krinchik, and M. M. Nishanova, J. Phys. Chem.
|
644 |
+
Solids, 54, 101 (1993); A.V. Zenkov, A.S. Moskvin, J.Phys.Cond. Matter 14 6957 (2002); A. S.
|
645 |
+
Moskvin, Phys. Rev. B 65, 205113 (2002); A.S. Moskvin, R. Neudert, M. Knupfer, J. Fink,
|
646 |
+
and R. Hayn, Phys. Rev. B 65, 180512(R) (2002); A.S. Moskvin, J. M´alek, M. Knupfer, R.
|
647 |
+
20
|
648 |
+
|
649 |
+
Neudert, J. Fink, R. Hayn, S.-L. Drechsler, N. Motoyama, H. Eisaki, and S. Uchida, Phys.
|
650 |
+
Rev. Lett. 91, 037001 (2003); R. V. Pisarev, A. S. Moskvin, A. M. Kalashnikova, A. A. Bush,
|
651 |
+
and Th. Rasing, Phys. Rev. B 74, 132509 (2006); A. S. Moskvin, R. V. Pisarev, Phys. Rev.
|
652 |
+
B 77, 060102(R) (2008); A.S. Moskvin, R.V. Pisarev, Low Temp. Phys. 36 613 (2010); A. S.
|
653 |
+
Moskvin, A. A. Makhnev, L. V. Nomerovannaya, N. N. Loshkareva, and A. M. Balbashov, Phys.
|
654 |
+
Rev. B 82, 035106 (2010); A. S. Moskvin, Optics and Spectroscopy, 111, 403 (2011).
|
655 |
+
[34] S. Sugano, Y. Tanabe and H. Kamimura, Multiplets of Transition-Metal Ions in Crystals
|
656 |
+
(Academic, New York, 1970).
|
657 |
+
[35] M.W. Haverkort, M. Zwierzycki, and O.K. Andersen, Phys. Rev. B 85, 165113 (2012).
|
658 |
+
[36] A. Fujimori and F. Minami, Phys. Rev. B 30, 957 (1984).
|
659 |
+
[37] L.F. Mattheiss, Phys. Rev. B 5, 290 (1972).
|
660 |
+
[38] V.I. Sokolov, V.A. Pustovarov, V.N. Churmanov et al., JETP Letters, 95, 528 (2012); Phys.
|
661 |
+
Rev. B 86, 115128 (2012); V.I. Sokolov, V.A. Pustovarov, V.N. Churmanov et al., IOP Conf.
|
662 |
+
Series: Materials Science and Engineering 38, 012007 (2012).
|
663 |
+
[39] N. Hiraoka, H. Okamura, H. Ishii, I. Jarrige, K.D. Tsuei, and Y.Q. Cai, Eur. Phys. J. B 70,
|
664 |
+
157 (2009).
|
665 |
+
[40] M. Magnuson, S.M. Butorin, A. Agui, and J. Nordgren, J. Phys.: Condens. Matter 14, 3669
|
666 |
+
(2002).
|
667 |
+
[41] L.-C. Duda, T. Schmitt, M. Magnuson, J. Forsberg, A. Olsson, J. Nordgren, K. Okada and A.
|
668 |
+
Kotani, Phys. Rev. Lett. 96, 067402 (2006); B.C. Larson, Wei Ku, J.Z. Tischler, Chi-Cheng
|
669 |
+
Lee, O.D. Restrepo, A.G. Eguiluz, P. Zschack, and K.D. Finkelstein, Phys. Rev. Lett. 99,
|
670 |
+
026401 (2007).
|
671 |
+
[42] R.J. Powell and W.E. Spicer, Phys. Rev. B 2, 2182 (1970).
|
672 |
+
[43] K.W. Blazey, Physica 89B, 47 (1977).
|
673 |
+
[44] J.L. McNatt, Phys. Rev. Lett. 23, 915 (1969); R. Glosser, W.C. Walker, Solid State Commun,
|
674 |
+
9, 1599 (1971).
|
675 |
+
[45] R. Newman and R.M. Chrenko, Phys. Rev. 114, 1507 (1959).
|
676 |
+
[46] S.I. Shablaev, and R.V. Pisarev, Physics of the Solid State 45, 1742 (2003).
|
677 |
+
[47] V.V. Volkov, Z.L. Wang, and B.S. Zou, Chemical Phys. Lett. 337, 117 (2001).
|
678 |
+
[48] Ja.M. Ksendzov and I.A. Drabkin, Sov. Phys. Solid State, 7, 1519 (1965).
|
679 |
+
[49] C.E. Rossi and W. Paul, J. Phys. Chem. Solids 30, 2295 (1969).
|
680 |
+
21
|
681 |
+
|
-9FLT4oBgHgl3EQfDS7k/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
-9FLT4oBgHgl3EQfvi-U/content/tmp_files/2301.12160v1.pdf.txt
ADDED
@@ -0,0 +1,708 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.12160v1 [physics.optics] 28 Jan 2023
|
2 |
+
Polarization-independent second-order photonic topological corner states
|
3 |
+
Linlin Lei,1 Shuyuan Xiao,2, 3 Wenxing Liu,1 Qinghua Liao,1, ∗ Lingjuan He,1 and Tianbao Yu1, †
|
4 |
+
1School of Physics and Materials Science,
|
5 |
+
Nanchang University, Nanchang 330031, China
|
6 |
+
2Institute for Advanced Study, Nanchang University, Nanchang 330031, China
|
7 |
+
3Jiangxi Key Laboratory for Microscale Interdisciplinary Study,
|
8 |
+
Nanchang University, Nanchang 330031, China
|
9 |
+
1
|
10 |
+
|
11 |
+
Abstract
|
12 |
+
Recently, much attention has been paid to second-order photonic topological insulators (SPTIs), because
|
13 |
+
of their support for highly localized corner states with excellent robustness. SPTIs have been implemented
|
14 |
+
in either transverse magnetic (TM) or transverse electric (TE) polarizations in two-dimensional (2D) pho-
|
15 |
+
tonic crystals (PCs), and the resultant topological corner states are polarization-dependent, which limits
|
16 |
+
their application in polarization-independent optics. However, to achieve polarization-independent corner
|
17 |
+
states is not easy, since they are usually in-gap and the exact location in the topological bandgap is not
|
18 |
+
known in advance. Here, we report on a SPTI based on a 2D square-lattice PC made of an elliptic metama-
|
19 |
+
terial, and whether the bandgap is topological or trivial depends on the choice of the unit cell. It is found that
|
20 |
+
locations of topological bandgaps of TM and TE polarizations in the frequency spectrum can be indepen-
|
21 |
+
dently controlled by the out-of-plane permittivity ε⊥ and in-plane permittivity ε∥, respectively, and more
|
22 |
+
importantly, the location of in-gap corner states can also be separately manipulated by them. From this, we
|
23 |
+
achieve topological corner states for both TM and TE polarizations with the same frequency in the PC by
|
24 |
+
adjusting ε⊥ and ε∥, and their robustness against disorders and defects are numerically demonstrated. The
|
25 |
+
proposed SPTI provides a potential application scenario for polarization-independent topological photonic
|
26 |
+
devices.
|
27 |
+
I.
|
28 |
+
INTRODUCTION
|
29 |
+
Recently, the concept of higher-order topological insulators (HOTIs) has been extended from
|
30 |
+
electronic waves into classic waves[1–12]. It has been shown that HOTIs do not obey the usual
|
31 |
+
bulk-edge correspondence but comply with the bulk-edge-corner correspondence[13–15]. For
|
32 |
+
instance, a two-dimensional (2D) second-order topological insulator possesses one-dimensional
|
33 |
+
(1D) gapped edge states and zero-dimensional (0D) in-gap corner states. In addition to the charac-
|
34 |
+
teristics of strong field localization and small mode volume, 0D corner states also show excellent
|
35 |
+
robustness against fabrication flaws[16–18]. On this basis, they have enormous application value
|
36 |
+
in the topological cavity[18, 19], lasing[20, 21], non-linear optics[22, 23], and sensing[24]. How-
|
37 |
+
ever, for photonic crystals (PCs), the two kinds of polarization, transverse magnetic (TM) and
|
38 |
+
transverse electric (TE) modes, are usually studied in a separate way. One reason is either of the
|
39 | |
40 | |
41 |
+
2
|
42 |
+
|
43 |
+
two modes can be excited independently, each with its own band structure, and the other is that
|
44 |
+
forming a common band gap (CBG) is not easy, especially the topological one. Past researches
|
45 |
+
have shown the polarization-independent optics is potentially useful in polarization-independent
|
46 |
+
waveguides relying full bandgaps[25], enhanced nonlinear optical effects[26], and polarization
|
47 |
+
division multiplexing[27]. Topologically protected polarization-independent optics would give
|
48 |
+
them additional resistance to perturbation. It is worth noting that dual-polarization second-order
|
49 |
+
photonic topological states have been proposed by Chen et al. recently, based on a topologically
|
50 |
+
optimized geometric structure within a square-lattice[28]. However, eigenfrequencies of topolog-
|
51 |
+
ical states for the two polarizations are not the same, despite they have a common topological
|
52 |
+
bandgap.
|
53 |
+
In this paper, a 2D second-order photonic topological insulator (SPTI) is proposed, of which the
|
54 |
+
topological states are polarization-independent. The square-lattice PC having a fishnet structure is
|
55 |
+
made by an elliptic metamaterial. The permittivity is anisotropic and nevertheless, the geometry
|
56 |
+
structure is rather simple compared with the previously proposed topologically optimized struc-
|
57 |
+
ture. That the CBG is either trivial or topological depends on the choice of the unit cell (UC) for
|
58 |
+
both TM and TE modes. The proposed SPTI can host topological edge states and corner states
|
59 |
+
for the two modes at the same time. Our results show polarization-independent topological cor-
|
60 |
+
ner states based a SPTI is not guaranteed by a common topological bandgap. However, we find
|
61 |
+
that locations of bandgaps and corner states in the frequency spectrum can be manipulated inde-
|
62 |
+
pendently by the out-of-plane permittivity ε⊥ and in-plane permittivity ε∥ for TM and TE modes,
|
63 |
+
respectively, which gives an effective way to achieve overlapped corner states for the two modes.
|
64 |
+
On this basis, corner states independent of polarization can be realized by choosing appropriate
|
65 |
+
ε⊥ and ε∥. Numerical simulations further show the corner states are topologically protected, with
|
66 |
+
strong robustness to disorders and defects. Our work shows potential applications in polarization-
|
67 |
+
independent topological photonic devices.
|
68 |
+
II.
|
69 |
+
STRUCTURE DESIGN AND BAND TOPOLOGY
|
70 |
+
For PCs, it is well known that TM bandgaps are favored in dielectric rods, while TE bandgaps
|
71 |
+
prefer dielectric veins[29]. From this, the proposed square-lattice PC is constructed by thin dielec-
|
72 |
+
tric veins with dielectric rods located at lattice sites, as shown in Fig. 1(a). a is the lattice constant,
|
73 |
+
and the circle radius r and vein width d are 0.3a and 0.18a, respectively. The dielectric material is
|
74 |
+
3
|
75 |
+
|
76 |
+
anisotropic, an elliptic metamaterial with the permittivity ε = (ε∥, ε∥, ε⊥) = (16.9, 16.9, 10). Gen-
|
77 |
+
erally, topological corner states lie in a topological bandgap[13], and hence a topological CBG
|
78 |
+
of TM and TE polarizations is the prerequisite for polarization-independent topological corner
|
79 |
+
states. The choice of the elliptic metamaterial is based on the consideration that bandgap locations
|
80 |
+
of TM and TE polarizations in the frequency spectrum can be manipulated independently by ε⊥
|
81 |
+
and ε∥, respectively. In practical, we can use the multilayer model to construct the anisotropic
|
82 |
+
permittivity[30]. The multilayer consists of two alternative dielectrics with high and low permit-
|
83 |
+
tivity, and it is placed horizontally in the x-y plane. According to the formulisms (16) and (17)
|
84 |
+
proposed in ref[31], the PC slab with permittivity (16.9,16.9,10) can be approximately built by
|
85 |
+
the high dielectric with the permittivity of 17.67 and the air layer when the filling ratio of high
|
86 |
+
dielectric is 0.954. Herein, the calculation of band structures and numerical simulations are based
|
87 |
+
on the finite element method using the commercial software COMSOL Multiphysics.
|
88 |
+
FIG. 1. (a) Fishnet PC and two kinds of unit cells (UC), UC1 and UC2. (b) Band structures of TM and
|
89 |
+
TE modes, denoted by red and blue dot-lines, respectively. Even and odd parities of UC1 (UC2) at high
|
90 |
+
symmetric points are indicated by plus and minus symbols, colored in red and blue for TM and TE modes,
|
91 |
+
respectively. (c) Ez field patterns of the two TM bands at the X point for UC1 and UC2. (d) Hz field patterns
|
92 |
+
of the two TE bands at the X point for UC1 and UC2.
|
93 |
+
4
|
94 |
+
|
95 |
+
(a)
|
96 |
+
(b)
|
97 |
+
0.4
|
98 |
+
TM
|
99 |
+
TE
|
100 |
+
Frequency(c/a)
|
101 |
+
0.3
|
102 |
+
+
|
103 |
+
+(-)
|
104 |
+
UC1
|
105 |
+
(+)
|
106 |
+
0.2
|
107 |
+
+(-)
|
108 |
+
-(+)
|
109 |
+
0.1
|
110 |
+
0.0
|
111 |
+
X(Y)
|
112 |
+
M
|
113 |
+
(c)
|
114 |
+
(d)
|
115 |
+
TM
|
116 |
+
TE
|
117 |
+
UC1
|
118 |
+
UC1
|
119 |
+
UC2
|
120 |
+
UC2
|
121 |
+
1st
|
122 |
+
2nd
|
123 |
+
1st
|
124 |
+
2nd
|
125 |
+
+1
|
126 |
+
-1
|
127 |
+
+1
|
128 |
+
-1
|
129 |
+
Ez
|
130 |
+
HzBased on the common square lattice, two kinds of unit cells (UCs), UC1 and UC2, are selected
|
131 |
+
in Fig. 1(a). Note that the two UCs are consistent with each other after shifting the center of one
|
132 |
+
of the UCs by half of the period along x and y directions. Therefore, they share the same band
|
133 |
+
structure as plotted in Fig. 1(b), with red and blue dot-lines denoting the TM and TE modes, re-
|
134 |
+
spectively. One can find that there is a CBG indicated by the gray region lying between the first
|
135 |
+
and second bands of TM modes. However, for the two UCs, the CBG possesses different topo-
|
136 |
+
logical behaviors characterized by the 2D Zak phase [see Appendix A], which has the following
|
137 |
+
form[32–34]:
|
138 |
+
θZak
|
139 |
+
j
|
140 |
+
=
|
141 |
+
�
|
142 |
+
dkxdkyTr[ ˆA j(kx, ky)],
|
143 |
+
(1)
|
144 |
+
where j = x or y, and the Berry connection ˆA j = i⟨u(k)|∇kj|u(k)⟩ with u(k) being the periodic part
|
145 |
+
of the Bloch function. The 2D Zak phase can also be understood by the 2D bulk polarization via
|
146 |
+
θZak
|
147 |
+
j
|
148 |
+
= 2πP j with
|
149 |
+
P j = 1
|
150 |
+
2(
|
151 |
+
�
|
152 |
+
n
|
153 |
+
qn
|
154 |
+
j mod 2),
|
155 |
+
(−1)qn
|
156 |
+
j = η(X j)
|
157 |
+
η(Γ)
|
158 |
+
(2)
|
159 |
+
where P j is determined by the parity η associated with π rotation at Γ and X(Y) points and the
|
160 |
+
summation is over all the occupied bands below the bandgap. Here, Px is equal to Py, namely,
|
161 |
+
Px = Py, due to the C4 symmetry[35, 36]. Eigenfield patterns at the X point of the two bands
|
162 |
+
for TM and TE modes are shown in Figs. 1(c) and 1(d), respectively, with the monopole an even
|
163 |
+
parity and dipole an odd parity. As can be seen, the parities of the two bands at the X point have an
|
164 |
+
inversion between UC1 and UC2 for both the two modes, whereas the parities at the Γ point stay
|
165 |
+
the same. Moreover, parities of the same UC at the X point are opposite for TM and TE modes,
|
166 |
+
which gives the same UC distinct topological properties for the two modes. Concretely, for TM
|
167 |
+
modes, the distinct parties of UC1 at the X and Γ points give the 2D bulk polarization (Px, Py) a
|
168 |
+
value of (0, 0) and the 2D Zak phase (θZak
|
169 |
+
x , θZak
|
170 |
+
y ) a value of (0, 0), while the same parity of UC2 at
|
171 |
+
the X and T points makes (Px, Py) = (1
|
172 |
+
2, 1
|
173 |
+
2) and (θZak
|
174 |
+
x , θZak
|
175 |
+
y ) = (π, π). The opposite is true for the TE
|
176 |
+
modes. As a result, the bandgap of UC1 is trivial and of UC2 is topological for TM modes, and it
|
177 |
+
is reversed for TE modes.
|
178 |
+
5
|
179 |
+
|
180 |
+
FIG. 2. Projected band structures of (a) TM and (b) TE modes, with edge modes colored in red and blue,
|
181 |
+
respectively. Eigenfields at kx = 0 show the edge modes can be well confined at the interface between
|
182 |
+
UC1s and UC2s for both TM and TE modes. (c) Dependence of bandgaps and eigenfrequencies of one of
|
183 |
+
the corner states on ε⊥ and ε∥ for the two modes. The area shaded in light red indicates TM bandgaps,
|
184 |
+
while the area shaded in light blue indicates TE bandgaps. The red and blue lines denote one of the corner
|
185 |
+
states of TM and TE modes, respectively. (d) TM corner states (colored in red) and TE corner states
|
186 |
+
(colored in blue) under any combination of ε⊥ and ε∥ in the same parameter range of (c). The yellow
|
187 |
+
intersecting line denotes the combinations that have overlapped corner states. The yellow points on the
|
188 |
+
intersecting line is two of the combinations, and their anisotropic permittivity (ε∥, ε∥, ε⊥) are (16.9,16.9,10)
|
189 |
+
and (16.375,16.375,9.7), respectively. The green points are the two points that share the same anisotropic
|
190 |
+
permittivity (16.7,16.7,10.4) but have different eigenfrequencies.
|
191 |
+
III.
|
192 |
+
POLARIZATION-INDEPENDENT TOPOLOGICAL CORNER STATES
|
193 |
+
The topological distinction between UC1 and UC2 ensures the existence of topological edge
|
194 |
+
states[37–40]. To show this, we construct a supercell composed of five UC1s and five UC2s along
|
195 |
+
the y direction, and projected band structures are shown in Figs. 2(a) and 2(b) for TM and TE
|
196 |
+
modes, respectively. In the calculation, periodic boundary conditions are applied to the x direction.
|
197 |
+
6
|
198 |
+
|
199 |
+
a
|
200 |
+
0.3
|
201 |
+
(b)
|
202 |
+
0.3
|
203 |
+
Frequency(c/a)
|
204 |
+
0.2
|
205 |
+
0.2
|
206 |
+
0.1
|
207 |
+
0.1
|
208 |
+
+1
|
209 |
+
TM
|
210 |
+
TE
|
211 |
+
0.0
|
212 |
+
0.0
|
213 |
+
0
|
214 |
+
1
|
215 |
+
-1
|
216 |
+
0
|
217 |
+
k(π/a)
|
218 |
+
k,=0
|
219 |
+
kx(元/a)
|
220 |
+
k,=0
|
221 |
+
(c)
|
222 |
+
16.4 16.6 16.8 17.0 17.2 174
|
223 |
+
(d)
|
224 |
+
TMcornerstates
|
225 |
+
0.28
|
226 |
+
0.266
|
227 |
+
TEcornerstates
|
228 |
+
0.264
|
229 |
+
Frequency(c/a)
|
230 |
+
0.27
|
231 |
+
0.262
|
232 |
+
(e)
|
233 |
+
0.260
|
234 |
+
Frequency(c/
|
235 |
+
0.26
|
236 |
+
0.258
|
237 |
+
0.256
|
238 |
+
0.25
|
239 |
+
0.254
|
240 |
+
TM bandgap
|
241 |
+
(16.375,9.7)
|
242 |
+
TM corner state
|
243 |
+
0.252
|
244 |
+
0.24
|
245 |
+
TE bandgap
|
246 |
+
(16.9,10)
|
247 |
+
TE corner state
|
248 |
+
(16.7,10.4)
|
249 |
+
3
|
250 |
+
9.4
|
251 |
+
9.6
|
252 |
+
9.8
|
253 |
+
10.010.210.410.6
|
254 |
+
81FIG. 3. (a) Schematic of the finite-size box-shaped PC, with 15×15 UC1s surrounded by 6-layer UC2s. (b)
|
255 |
+
Eigenfrequencies of the box-shaped PC. TM and TE modes are denoted by pentagons and circles, with their
|
256 |
+
corner states colored in red and blue, respectively. Edge modes are shown as cyan. (c) Eigenfields of the
|
257 |
+
overlapped edge and corner modes.
|
258 |
+
FIG. 4. (a) Box-shaped PC with four disorders (red dots) around four corners of the internal PC composed
|
259 |
+
UC1s. The enlarged view shows one of the four disorders, with 10% decrease in radius and 0.1a deviation
|
260 |
+
from the lattice site along x and y directions. Eigenfields of four corner modes of (b) TM and (c) TE modes,
|
261 |
+
under the influence of the disorders.
|
262 |
+
As can be seen, there is one in-gap edge state for both the two modes, which does not occupy the
|
263 |
+
7
|
264 |
+
|
265 |
+
(a)
|
266 |
+
(b
|
267 |
+
EC1
|
268 |
+
EC2
|
269 |
+
0.25895(c/a)
|
270 |
+
0.25897(c/a)
|
271 |
+
TEC3
|
272 |
+
TEC4
|
273 |
+
0.25876(c/a
|
274 |
+
0.25897(c/a)
|
275 |
+
0.25897(c/a)
|
276 |
+
O
|
277 |
+
Ez
|
278 |
+
Hz(a)
|
279 |
+
(b)
|
280 |
+
0.28
|
281 |
+
TM bulk
|
282 |
+
TE bulk
|
283 |
+
6-layer Uc2s
|
284 |
+
TM edge
|
285 |
+
TEedge
|
286 |
+
0.27
|
287 |
+
★
|
288 |
+
TMcorner
|
289 |
+
TE corner
|
290 |
+
requency(c/a)
|
291 |
+
0.26
|
292 |
+
0.25883(c/a)
|
293 |
+
L5x15UC1s
|
294 |
+
0.25
|
295 |
+
★
|
296 |
+
0.24
|
297 |
+
0.23
|
298 |
+
0
|
299 |
+
10
|
300 |
+
20
|
301 |
+
30
|
302 |
+
40
|
303 |
+
50
|
304 |
+
60
|
305 |
+
Solution number
|
306 |
+
(c)
|
307 |
+
TMC2
|
308 |
+
+1
|
309 |
+
5209(c/a
|
310 |
+
0.25883
|
311 |
+
5883
|
312 |
+
-1
|
313 |
+
TEC1
|
314 |
+
TEC2
|
315 |
+
TEC3
|
316 |
+
TEC4
|
317 |
+
+1
|
318 |
+
OHz
|
319 |
+
0.25883(c/a)
|
320 |
+
-1
|
321 |
+
0.24836(c/a)
|
322 |
+
0.25881(c/a)
|
323 |
+
0.25883(c/a)
|
324 |
+
0.25883(c/a)FIG. 5. (a) Box-shaped PC with defects produced by removing five UC1s in the center and four UC2s near
|
325 |
+
the edge of the PC. Eigenfields of four corner modes of (b) TM and (c) TE modes, under the influence of
|
326 |
+
the defects.
|
327 |
+
whole bulk bandgap and canbe confined at the interface between UC1s and UC2s. Since therer is a
|
328 |
+
C4 symmetry for the PC, we can define a corner topological index: Qc = 1
|
329 |
+
4([X1] + 2[M1] + 3[M2]),
|
330 |
+
where [Πp] = #Πp − #Γp and #Πp is defined as the number of bands below the bandgap with
|
331 |
+
rotation eigenvalues Πn
|
332 |
+
p = e[2πi(p−1)/n] for p=1, 2, 3, 4. For the nontrivial TM and TE cases, they
|
333 |
+
both have [X1] = −1, [M1] = −1, [M2] = 0. Therefore, the corner topological index is Qc = 1
|
334 |
+
4
|
335 |
+
for both the two modes, indicating 1
|
336 |
+
4 fractionalized corner states at each of the four corners[40]. It
|
337 |
+
is noteworthy that the existence of polarization-independent corner states is not guaranteed by the
|
338 |
+
CBG. In Fig. 2(c), we change ε⊥ and ε∥ in the certain range near (16.9, 16.9, 10) to solely adjust
|
339 |
+
the positions of supercell bandgaps in the frequency spectrum for TM and TE modes, respectively.
|
340 |
+
Specifically, for the TM band gap, we increase ε⊥ from 9.4 to 10.6 and keep ε∥ at any value, while
|
341 |
+
for the TE band gap, we increase ε∥ from 16.3 to 17.5 and keep ε⊥ at an arbitrary value. As can
|
342 |
+
be seen, the positions of the two bandgaps descend as the corresponding permittivity increases,
|
343 |
+
and the TM bandgap (light red area) is completely embedded in the TE bandgap (light blue area),
|
344 |
+
forming the CBG. We also calculate the eigenfrequencies of TM (red line) and TE (blue line)
|
345 |
+
corner states from the finite-size box-shaped PC shown in Fig. 3(a), and find that they are in
|
346 |
+
the CBG and the variation trend of the corner states with the permittivity is the same as that of
|
347 |
+
the bandgaps. Since the two kinds of polarized corner states are independent of each other, in
|
348 |
+
order to search for the overlapped ones, we plot their eigenfrequencies under any combination of
|
349 |
+
ε⊥ and ε∥ in Fig. 2(d). It can be observed that corner states of the two modes do not coincide
|
350 |
+
with each other except on the yellow intersecting line. The yellow points on the intersecting
|
351 |
+
8
|
352 |
+
|
353 |
+
(a)
|
354 |
+
(b)
|
355 |
+
EC1
|
356 |
+
EC2
|
357 |
+
0.25881(c/a)
|
358 |
+
0.25883(c/a)
|
359 |
+
TEC3
|
360 |
+
TEC4
|
361 |
+
0.25883(c/a)
|
362 |
+
0.25883(c/a)
|
363 |
+
+1
|
364 |
+
E7
|
365 |
+
Hzline are two of the combinations that have the overlapped corner states, and the corresponding
|
366 |
+
anisotropic permittivities (ε∥, ε∥, ε⊥) are (16.9,16.9,10) and (16.375,16.375,9.7). As a contrast,
|
367 |
+
green points are the two points that share the same anisotropic permittivity (16.7,16.7,10.4) but
|
368 |
+
have different eigenfrequencies. Therefore, the anisotropic permittivity provides an additional
|
369 |
+
freedom to manipulate the location of corner states of the two modes, making the corner states
|
370 |
+
either polarization-independent or polarization-separable [see Appendix B].
|
371 |
+
To verify the existence of the polarization-independent corner states, a box-shaped PC of finite
|
372 |
+
size is constructed, which is composed of 15 × 15 UC1s surrounded by six-layer UC2s, as shown
|
373 |
+
in Fig. 3(a). The calculated eigenfrequencies of TM and TE modes based on the anisotropic per-
|
374 |
+
mittivity (16.9,16.9,10) are shown in Fig. 3(b). As can be seen, both of them show gapped edge
|
375 |
+
modes and four in-gap corner modes. Red and blue dotted lines go through the overlapped cor-
|
376 |
+
ner and edge states, respectively. In Fig. 3(c), eigenfields of these topological states indicate that
|
377 |
+
the edge modes can be well confined along the whole interface between UC1s and UC2s, while
|
378 |
+
the corner states are highly localized at the corners of the internal PC formed by the UC1s. Re-
|
379 |
+
markably, topological corner states for the two modes do share the same eigenfrequencies, and the
|
380 |
+
common eigenfrequency of the corner states is 0.25883(c/a). This is different from the previously
|
381 |
+
reported dual-polarization topological corner states, which possess the topological CBG, but their
|
382 |
+
eigenfrequencies are not overlapped at all[28].
|
383 |
+
FIG. 6. (a) Eigenfrequencies of the box-shaped PC with an anisotropic permittivity of (16.375,16.375,9.7),
|
384 |
+
showing overlapped corner states of TM and TE modes. Pentagons and circles denote TM and TE modes,
|
385 |
+
and their corner states are colored in red and blue, respectively. (b). Eigenfields of the corner states of TM
|
386 |
+
modes. (c) Eigenfields of the corner states of TE modes.
|
387 |
+
The polarization-independent photonic corner states are topologically protected due to their
|
388 |
+
9
|
389 |
+
|
390 |
+
(b)
|
391 |
+
(c)
|
392 |
+
2
|
393 |
+
0.28
|
394 |
+
M
|
395 |
+
TEC1
|
396 |
+
TEC2
|
397 |
+
★
|
398 |
+
TM bulk/edge
|
399 |
+
★
|
400 |
+
TM corner
|
401 |
+
TE bulk/edge
|
402 |
+
a
|
403 |
+
0.27
|
404 |
+
TEcorner
|
405 |
+
0.26247(c/a)
|
406 |
+
0.26244(c/a)
|
407 |
+
0.26247(c/a)
|
408 |
+
0.26247(c/a)
|
409 |
+
★食鱼食★★★★
|
410 |
+
★★★★★
|
411 |
+
FMC3
|
412 |
+
FMC4
|
413 |
+
TEC3
|
414 |
+
TEC4
|
415 |
+
0.25
|
416 |
+
0
|
417 |
+
2
|
418 |
+
4
|
419 |
+
6
|
420 |
+
8
|
421 |
+
10
|
422 |
+
12
|
423 |
+
14
|
424 |
+
0.26252(c/a)
|
425 |
+
0.26256(c/a)
|
426 |
+
0.26247(c/a)
|
427 |
+
0.26247(c/a)
|
428 |
+
Solution number
|
429 |
+
+1
|
430 |
+
+1
|
431 |
+
0
|
432 |
+
-1
|
433 |
+
Ez
|
434 |
+
HzFIG. 7. (a) Box-shaped PC with a disorder (red dot) located at the left bottom corner of the internal PC
|
435 |
+
composed UC1s. The enlarged view shows the single disorder, with 10% decrease in radius and 0.1a
|
436 |
+
deviation from the lattice site along x and y directions. Eigenfields of four corner modes of (b) TM and (c)
|
437 |
+
TE modes, under the influence of the disorder.
|
438 |
+
FIG. 8. (a) Eigenfrequencies of the box-shaped PC with an anisotropic permittivity of (16.7,16.7,10.4),
|
439 |
+
which shows corner states of TM and TE modes are not overlapped. Pentagons and circles denote TM and
|
440 |
+
TE modes, and their corner states are colored in red and blue, respectively. (b). Eigenfields of the corner
|
441 |
+
states of TM modes. (c) Eigenfields of the corner states of TE modes.
|
442 |
+
topology origin[41, 42]. To verify this, we introduce four disorders marked by red dots around
|
443 |
+
the four corners into the instead perfect PC, as shown in Fig. 4(a). The enlarged view in Fig. 4(a)
|
444 |
+
exhibits the single disorder, with 10% decrease in radius and 0.1a deviation from the lattice site
|
445 |
+
along x and y directions. Eigenfields of the corner states of TM and TE modes are shown in
|
446 |
+
Figs. 4(b) and 4(c), respectively, from which we can see that the corner states still exist with
|
447 |
+
negligible offsets of the eigenfrequencies. Beyond that, defects, produced by removing five UC1s
|
448 |
+
10
|
449 |
+
|
450 |
+
(b)
|
451 |
+
(c)
|
452 |
+
0.28
|
453 |
+
TEC1
|
454 |
+
TEC2
|
455 |
+
TM bulk/edge
|
456 |
+
★
|
457 |
+
TM corner
|
458 |
+
TEbulk/edge
|
459 |
+
0.27
|
460 |
+
TE corner
|
461 |
+
0.25416(c/a)
|
462 |
+
025411c3
|
463 |
+
0.26017(c/a)
|
464 |
+
0.26020(c/a)
|
465 |
+
TMC3
|
466 |
+
TEC3
|
467 |
+
M4
|
468 |
+
TEC4
|
469 |
+
★
|
470 |
+
0.25
|
471 |
+
0
|
472 |
+
2
|
473 |
+
4
|
474 |
+
6
|
475 |
+
8
|
476 |
+
10
|
477 |
+
12
|
478 |
+
14
|
479 |
+
0.25416(c/a
|
480 |
+
0.25423(c/
|
481 |
+
0.26020(c/a)
|
482 |
+
0.26020(c/a
|
483 |
+
Solution number
|
484 |
+
+1
|
485 |
+
+1
|
486 |
+
O
|
487 |
+
-1
|
488 |
+
Ez
|
489 |
+
Hz(a)
|
490 |
+
(b)
|
491 |
+
(c)
|
492 |
+
TMC1
|
493 |
+
TEC1
|
494 |
+
TEC2
|
495 |
+
0.26225(c/a)
|
496 |
+
0.26245(c/a)
|
497 |
+
0.26244(c/a)
|
498 |
+
0.26247(c/a)
|
499 |
+
TMC3
|
500 |
+
TMC4
|
501 |
+
TEC3
|
502 |
+
TEC4
|
503 |
+
0.26249(c/a)
|
504 |
+
0.26255(c/a)
|
505 |
+
0.26247(c/a)
|
506 |
+
0.26427(c/a)
|
507 |
+
+1
|
508 |
+
O1
|
509 |
+
+1
|
510 |
+
0
|
511 |
+
-1
|
512 |
+
Ez
|
513 |
+
Hzand four UC2s in the center and near the edge of the PC respectively, are also introduced, as shown
|
514 |
+
in Fig. 5(a). As can be seen in Figs. 5(b) and 5(c), since the defects are far away from the corners,
|
515 |
+
the eigenfrequencies of the corner states for the TM and TE modes remain unchanged, although
|
516 |
+
the defects have a more destructive effect on the PC structure[43].
|
517 |
+
IV.
|
518 |
+
CONCLUSION
|
519 |
+
In summary, a polarization-independent SPTI is achieved, based on a 2D square-lattice PC. The
|
520 |
+
dielectric is an elliptic metamaterial, and the geometric structure is rather simple nevertheless. By
|
521 |
+
selecting appropriate geometric parameters and anisotropic permittivity, a CBG is can be obtained
|
522 |
+
for TM and TE modes. That the CBG of a certain UC is either trivial or topological depends on the
|
523 |
+
polarization modes. Topological corner states of TM and TE modes can coexist in the CBG, but
|
524 |
+
only the combinations of in-plane permittivity ε∥ and out-of-plane permittivity ε⊥ that lie on the
|
525 |
+
intersecting line in the eigenfrequency-permittivity space can make them overlapped. Numerical
|
526 |
+
simulations further show they have strong robustness to disorders and defects. The proposed
|
527 |
+
scheme can also be extended to corner states induced by the quadrupole topological phase in
|
528 |
+
square-lattices, pseudo-spin and valley-spin degrees of freedom. Our work would pave the way
|
529 |
+
toward designing high-performance polarization-independent topological photonic devices, such
|
530 |
+
as the polarization-independent topological laser and coupled cavity-waveguide.
|
531 |
+
ACKNOWLEDGMENTS
|
532 |
+
The work was jointly supported by the National Natural Science Foundation of China (12064025,
|
533 |
+
12264028) and Natural Science Foundation of Jiangxi Province (20212ACB202006) and Major
|
534 |
+
Discipline Academic and Technical Leaders Training Program of Jiangxi Province (20204BCJ22012).
|
535 |
+
Appendix A: Tight-binding model
|
536 |
+
The tight-binding model gives the topological phase transition between the UC1 and UC2 a
|
537 |
+
well description, in which one can take the dielectric rods as lattice sites for TM modes while the
|
538 |
+
air holes act the part for TE modes. The Hamiltonain has the following form,
|
539 |
+
11
|
540 |
+
|
541 |
+
H = −
|
542 |
+
�
|
543 |
+
ij
|
544 |
+
tijc†
|
545 |
+
i cj,
|
546 |
+
(A1)
|
547 |
+
where tij is the hopping amplitude between the nearest lattice sites and c†
|
548 |
+
i (cj) is the creation (an-
|
549 |
+
nihilation) operator. As there is only one lattice cite in UCs, the one band below the photonic
|
550 |
+
bandgap can be expressed as
|
551 |
+
E = −t0(eikx + e−ikx + eiky + e−iky) = −2t0(cos kx + cos ky).
|
552 |
+
(A2)
|
553 |
+
Look at TM modes first, for UC1, the lattice site choosed as the inversion center is at the center
|
554 |
+
of the UC1, and the inversion operator is I = 1. Hence, parities at Γ and X points are the same.
|
555 |
+
For UC2, lattice sites are at the four corners and the inversion operator I = e±i(kx+ky) hinges on
|
556 |
+
which lattice site is referenced. Thus, the parity is +1 at the Γ = (0, 0) point, while it is -1 at the
|
557 |
+
X = (π, 0) point[34].
|
558 |
+
For TE modes, lattice sites of UC1 choosed as the inversion center are at the four corners, since
|
559 |
+
the air holes instead of the dielectric rods act the role of lattice sites. For UC2, the lattice site
|
560 |
+
choosed as the inversion center is at the center of UC2. As a consequence, parities at Γ and X
|
561 |
+
points are oppostie for UC1, while they are the same for the UC2. The results are consistence with
|
562 |
+
parities showed in Fig. 1(b).
|
563 |
+
Appendix B: Switch between polarization-independent and polarization-separable corner states
|
564 |
+
Here, we would like to show another anisotropic permittivity lying on the intersecting line that
|
565 |
+
can achieve polarization-independent topological corner states. The anisotropic permittivity is
|
566 |
+
(16.375, 16.375, 9.7), as indicated in the Fig. 2(e). Fig. 6(a) shows the calculated eigenfrequencies,
|
567 |
+
from which we can see that the corner states of the two modes can be overlapped under this
|
568 |
+
permittivity. Eigenfrequencies and eigenfields of the corner states are shown in Figs. 6(b) and
|
569 |
+
6(c), and one can see the overlapped eigenfrequency is 0.26247(c/a). In Fig. 7, if we introduce a
|
570 |
+
single disorder into the box-shaped PC, the corner states still survive with litte frequency shit, but
|
571 |
+
monopole and quadrupole of TM modes no longer exist due to the broken of the C4 symmetry of
|
572 |
+
the box-shaped PC.
|
573 |
+
Noting that if the anisotropic permittivity is off the intersecting line, polarization-independent
|
574 |
+
corner states will be changed into polarization-separable corner states. As shown in the Fig. 2(e),
|
575 |
+
12
|
576 |
+
|
577 |
+
if the anisotropic permittivity is (16.7,16.7,10.4), eigenfrequencies of the corner states of the two
|
578 |
+
modes are apart from each other. In detail, we plot the eigenfrequencies in Fig. 8(a), and one can
|
579 |
+
find that none of the four corner states of the two modes are the same, and the maximum frequency
|
580 |
+
difference between the two modes is 0.00606(c/a) as shown in Figs. 8(b) and 8(c).
|
581 |
+
[1] C. W. Peterson, W. A. Benalcazar, T. L. Hughes, and G. Bahl, Nature 555, 346 (2018).
|
582 |
+
[2] H. R. Xue, Y. H. Yang, F. Gao, Y. D. Chong, and B. L. Zhang, Nature Materials 18, 108 (2019).
|
583 |
+
[3] S. Y. Huo, H. B. Huang, L. Y. Feng, and J. J. Chen, Applied Physics Express 12, 094003 (2019).
|
584 |
+
[4] Y. T. Yang,
|
585 |
+
Z. Y. Jia,
|
586 |
+
Y. J. Wu,
|
587 |
+
R. C. Xiao,
|
588 |
+
Z. H. Hang,
|
589 |
+
H. Jiang, and X. Xie,
|
590 |
+
Science Bulletin 65, 531 (2020).
|
591 |
+
[5] Z. Z. Yang, X. Li, Y. Y. Peng, X. Y. Zou, and J. C. Cheng, Phys. Rev. Lett. 125, 255502 (2020).
|
592 |
+
[6] H. M. Mu, B. Liu, T. Y. Hu, and Z. F. Wang, Nano Letters 22, 1122 (2022).
|
593 |
+
[7] S. G. Marc, V. Peri, R. S¨usstrunk, R. B. Osama, L. Tom, L. G. Villanueva, and D. H. Sebastian, Nature
|
594 |
+
555, 342 (2018).
|
595 |
+
[8] X. Ni, M. Weiner, A. Al`u, and A. B. Khanikaev, Nature Materials 18, 113 (2019).
|
596 |
+
[9] L. He, Z. Addison, E. J. Mele, and B. Zhen, Nature Communications 11, 3119 (2020).
|
597 |
+
[10] W. A. Benalcazar, B. A. Bernevig, and T. L. Hughes, Science 357, 61 (2017).
|
598 |
+
[11] S. W. An, T. Liu, H. Y. Fan, H. Gao, Z. M. Gu, S. J. Liang, S. B. Huang, Y. Zheng, Y. F. Chen,
|
599 |
+
L. Cheng, and J. Zhu, International Journal of Mechanical Sciences 224, 107337 (2022).
|
600 |
+
[12] B. Y. Xie, H. F. Wang, H. X. Wang, X. Y. Zhu, J. H. Jiang, M. H. Lu, and Y. F. Chen,
|
601 |
+
Phys. Rev. B 98, 205147 (2018).
|
602 |
+
[13] Z. G. Chen, C. Q. Xu, J. R. Al, J. Mei, and Y. Wu, Phys. Rev. B 100, 075120 (2019).
|
603 |
+
[14] M. Li, D. Zhirihin, M. Gorlach, X. Ni, D. Filonov, A. Slobozhanyuk, A. Al`u, and A. B. Khanikaev,
|
604 |
+
Nature Photonics 14, 89 (2020).
|
605 |
+
[15] X. Zhang, H.-X. Wang, Z.-K. Lin, Y. Tian, B. Xie, M.-H. Lu, Y.-F. Chen, and J.-H. Jiang,
|
606 |
+
Nature Physics 15, 582 (2019).
|
607 |
+
[16] A. Q. Shi, B. Yan, R. Ge, J. L. Xie, Y. C. Peng, H. Li, W. E. I. Sha, and J. J. Liu,
|
608 |
+
Opt. Lett. 46, 1089 (2021).
|
609 |
+
[17] X.
|
610 |
+
D.
|
611 |
+
Chen,
|
612 |
+
W.
|
613 |
+
M.
|
614 |
+
Deng,
|
615 |
+
F.
|
616 |
+
L.
|
617 |
+
Shi,
|
618 |
+
F.
|
619 |
+
L.
|
620 |
+
Zhao,
|
621 |
+
M.
|
622 |
+
Chen,
|
623 |
+
and
|
624 |
+
J.
|
625 |
+
W.
|
626 |
+
Dong,
|
627 |
+
Phys. Rev. Lett. 122, 233902 (2019).
|
628 |
+
13
|
629 |
+
|
630 |
+
[18] O. Yasutomo, L. Feng, K. Ryota, W. Katsuyuki, W. Katsunori, A. Yasuhiko, and I. Satoshi,
|
631 |
+
Optica 6, 786 (2019).
|
632 |
+
[19] X. Xie, W. Zhang, X. He, S. Wu, J. Dang, K. Peng, F. Song, L. Yang, H. Ni, Z. Niu, C. Wang, K. Jin,
|
633 |
+
X. Zhang, and X. Xu, Laser & Photonics Reviews 14, 1900425 (2020).
|
634 |
+
[20] H. R. Kim, M. S. Hwang, D. Smirnova, K. Y. Jeong, Y. Kivshar, and H. G. Park, Nature Communica-
|
635 |
+
tions 11, 5758 (2020).
|
636 |
+
[21] H. Zhong, Y. V. Kartashov, A. Szameit, Y. Li, C. Liu, and Y. Zhang, APL Photonics 6, 040802 (2021).
|
637 |
+
[22] Z. Hu, D. Bongiovanni, D. Juki´c, E. Jajti´c, S. Xia, D. Song, J. Xu, R. Morandotti, H. Buljan, and
|
638 |
+
Z. Chen, Light: Science & Applications 10, 164 (2021).
|
639 |
+
[23] S. S. Kruk, W. Gao, D.-Y. Choi, T. Zentgraf, S. Zhang, and Y. Kivshar, Nano Letters 21, 4592 (2021).
|
640 |
+
[24] M. H. Chao, Q. S. Liu, W. J. Zhang, L. Y. Zhuang, and G. F. Song, Opt. Express 30, 29258 (2022).
|
641 |
+
[25] H. Wu, D. S. Citrin, L. Y. Jiang, and X. Y. Li, IEEE Photonics Technology Letters 27, 840 (2015).
|
642 |
+
[26] Y. N. Zhang, W. M. Murray, B. B. Lan, and L. Marko, Opt. Lett. 34, 2694 (2009).
|
643 |
+
[27] D. X. Dai and J. E. Bowers, Nanophotonics 3, 283 (2014).
|
644 |
+
[28] Y. F. Chen, F. Meng, Z. H. Lan, B. H. Jia, and X. D. Huang, Phys. Rev. Applied 15, 034053 (2021).
|
645 |
+
[29] Y. F. Chau, F. L. Wu, Z. H. Jiang, and H. Y. Li, Opt. Express 19, 4862 (2011).
|
646 |
+
[30] J. R. Wang, X. D. Chen, F. L. Zhao, and J. W. Dong, Scientific Reports 6, 22739 (2016).
|
647 |
+
[31] D. L. X. Z. Z. L. Lorenzo Ferrari, Chihhui Wu, Progress in Quantum Electronics 40, 1 (2015).
|
648 |
+
[32] Y. F. Chen, Z. H. Lan, and J. Zhu, Phys. Rev. Applied 17, 054003 (2022).
|
649 |
+
[33] F. Liu and K. Wakabayashi, Phys. Rev. Lett. 118, 076803 (2017).
|
650 |
+
[34] Y. F. Chen, Z. H. Lan, and J. Zhu, Nanophotonics 11, 1345 (2022).
|
651 |
+
[35] X. T. He, M. Y. Li, H. Y. Qiu, W. S. Ruan, L. D. Zhou, L. Liu, X. D. Chen, W. J. Chen, F. L. Zhao,
|
652 |
+
and J. W. Dong, Photon. Res. 9, 1423 (2021).
|
653 |
+
[36] Z. J. Zhang, J. B. Yang, T. Du, and X. P. Jiang, Photon. Res. 10, 855 (2022).
|
654 |
+
[37] L. Liu, Y. K. Wang, F. X. Zheng, and T. Sang, Opt. Lett. 47, 2634 (2022).
|
655 |
+
[38] H.
|
656 |
+
Zhong,
|
657 |
+
Y.
|
658 |
+
V.
|
659 |
+
Kartashov,
|
660 |
+
A.
|
661 |
+
Szameit,
|
662 |
+
Y.
|
663 |
+
D.
|
664 |
+
Li,
|
665 |
+
C.
|
666 |
+
L.
|
667 |
+
Liu,
|
668 |
+
and
|
669 |
+
Y.
|
670 |
+
Q.
|
671 |
+
Zhang,
|
672 |
+
APL Photonics 6, 040802 (2021).
|
673 |
+
[39] G. C. Ma, M. Xiao, and C. T. Chan, Nature Reviews Physics 1, 281 (2019).
|
674 |
+
[40] B. Y. Xie, G. X. Su, H. F. Wang, H. Su, X. P. Shen, P. Zhan, M. H. Lu, Z. L. Wang, and Y. F. Chen,
|
675 |
+
Phys. Rev. Lett. 122, 233903 (2019).
|
676 |
+
[41] M. Proctor, P. A. Huidobro, B. Bradlyn, M. B. de Paz, M. G. Vergniory, D. Bercioux, and A. Garc´ıa-
|
677 |
+
14
|
678 |
+
|
679 |
+
Etxarri, Phys. Rev. Research 2, 042038 (2020).
|
680 |
+
[42] S. Wu, B. Jiang, Y. Liu, and J.-H. Jiang, Photon. Res. 9, 668 (2021).
|
681 |
+
[43] Z. W. Zhang, H. Y. Long, C. Liu, C. Shao, Y. Cheng, X. J. Liu, and J. Christensen,
|
682 |
+
Advanced Materials 31, 1904682 (2019).
|
683 |
+
15
|
684 |
+
|
685 |
+
This figure "fig_1.png" is available in "png"� format from:
|
686 |
+
http://arxiv.org/ps/2301.12160v1
|
687 |
+
|
688 |
+
This figure "fig_2.png" is available in "png"� format from:
|
689 |
+
http://arxiv.org/ps/2301.12160v1
|
690 |
+
|
691 |
+
This figure "fig_3.png" is available in "png"� format from:
|
692 |
+
http://arxiv.org/ps/2301.12160v1
|
693 |
+
|
694 |
+
This figure "fig_4.png" is available in "png"� format from:
|
695 |
+
http://arxiv.org/ps/2301.12160v1
|
696 |
+
|
697 |
+
This figure "fig_5.png" is available in "png"� format from:
|
698 |
+
http://arxiv.org/ps/2301.12160v1
|
699 |
+
|
700 |
+
This figure "fig_6.png" is available in "png"� format from:
|
701 |
+
http://arxiv.org/ps/2301.12160v1
|
702 |
+
|
703 |
+
This figure "fig_7.png" is available in "png"� format from:
|
704 |
+
http://arxiv.org/ps/2301.12160v1
|
705 |
+
|
706 |
+
This figure "fig_8.png" is available in "png"� format from:
|
707 |
+
http://arxiv.org/ps/2301.12160v1
|
708 |
+
|
-9FLT4oBgHgl3EQfvi-U/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
-NAzT4oBgHgl3EQfSvt8/content/2301.01237v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:0c8cf0a8bfda9f4ff0476d4691e51d43897843e51d480f024d5a5f34270d5d60
|
3 |
+
size 7071049
|
.gitattributes
CHANGED
@@ -260,3 +260,12 @@ hNE4T4oBgHgl3EQfrQ2w/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -tex
|
|
260 |
QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf filter=lfs diff=lfs merge=lfs -text
|
261 |
ptAzT4oBgHgl3EQf5v4s/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
262 |
1tAzT4oBgHgl3EQf8_4M/content/2301.01911v1.pdf filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
260 |
QNAzT4oBgHgl3EQfIvuz/content/2301.01068v1.pdf filter=lfs diff=lfs merge=lfs -text
|
261 |
ptAzT4oBgHgl3EQf5v4s/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
262 |
1tAzT4oBgHgl3EQf8_4M/content/2301.01911v1.pdf filter=lfs diff=lfs merge=lfs -text
|
263 |
+
-NAzT4oBgHgl3EQfSvt8/content/2301.01237v1.pdf filter=lfs diff=lfs merge=lfs -text
|
264 |
+
pNE0T4oBgHgl3EQf9AKq/content/2301.02796v1.pdf filter=lfs diff=lfs merge=lfs -text
|
265 |
+
BtFAT4oBgHgl3EQfsR7g/content/2301.08658v1.pdf filter=lfs diff=lfs merge=lfs -text
|
266 |
+
7dE4T4oBgHgl3EQfcww5/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
267 |
+
7dE4T4oBgHgl3EQfcww5/content/2301.05085v1.pdf filter=lfs diff=lfs merge=lfs -text
|
268 |
+
MtE0T4oBgHgl3EQfjQEE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
269 |
+
qdFRT4oBgHgl3EQfejci/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
270 |
+
MtE0T4oBgHgl3EQfjQEE/content/2301.02455v1.pdf filter=lfs diff=lfs merge=lfs -text
|
271 |
+
6tAyT4oBgHgl3EQfpvgE/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
0NE1T4oBgHgl3EQf4wUX/content/tmp_files/2301.03503v1.pdf.txt
ADDED
@@ -0,0 +1,1261 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.03503v1 [hep-th] 9 Jan 2023
|
2 |
+
IPARCOS-23-001
|
3 |
+
Embedding Unimodular Gravity in String Theory
|
4 |
+
Luis J. Garay∗
|
5 |
+
Departamento de F´ısica Te´orica and IPARCOS,
|
6 |
+
Universidad Complutense de Madrid, 28040 Madrid, Spain
|
7 |
+
Gerardo Garc´ıa-Moreno†
|
8 |
+
Instituto de Astrof´ısica de Andaluc´ıa (IAA-CSIC),
|
9 |
+
Glorieta de la Astronom´ıa, 18008 Granada, Spain
|
10 |
+
Abstract
|
11 |
+
Unimodular Gravity is a theory displaying Weyl rescalings of the metric and transverse (volume-
|
12 |
+
preserving) diffeomorphisms as gauge symmetries, as opposed to the full set of diffeomorphisms
|
13 |
+
displayed by General Relativity. Recently, we presented a systematic comparison of both theories,
|
14 |
+
concluding that both of them are equivalent in everything but the behaviour of the cosmological
|
15 |
+
constant under radiative corrections. A careful study of how Unimodular Gravity can be embedded
|
16 |
+
in the string theory framework has not been provided yet and was not analyzed there in detail.
|
17 |
+
In this article, we provide such an explicit analysis, filling the gap in the literature. We restrict
|
18 |
+
ourselves to the unoriented bosonic string theory in critical dimension for the sake of simplicity,
|
19 |
+
although we argue that no differences are expected for other string theories. Our conclusions are
|
20 |
+
that both a Diff and a WTDiff invariance principle are equally valid for describing the massless
|
21 |
+
excitations of the string spectrum.
|
22 | |
23 | |
24 |
+
1
|
25 |
+
|
26 |
+
CONTENTS
|
27 |
+
I. Introduction
|
28 |
+
2
|
29 |
+
II. Unimodular Gravity and General Relativity: Matching global degrees of freedom
|
30 |
+
5
|
31 |
+
III. String perturbation theory in trivial backgrounds
|
32 |
+
10
|
33 |
+
IV. Strings in general backgrounds
|
34 |
+
16
|
35 |
+
A. Determination of the Weyl anomaly
|
36 |
+
17
|
37 |
+
B. Including string-loop corrections
|
38 |
+
21
|
39 |
+
C. EFTs for the theory
|
40 |
+
23
|
41 |
+
V. Conclusions
|
42 |
+
25
|
43 |
+
Acknowledgments
|
44 |
+
26
|
45 |
+
References
|
46 |
+
27
|
47 |
+
I.
|
48 |
+
INTRODUCTION
|
49 |
+
Unimodular gravity (UG) is a theory which is so similar to General Relativity (GR) that
|
50 |
+
one may wonder to what extent both of them are equivalent. Recently we presented a sys-
|
51 |
+
tematic comparison of both theories in all the regimes and situations in which a potential
|
52 |
+
difference might appear, which was still lacking [1]. We concluded that for all of the possible
|
53 |
+
regimes analyzed there, both theories are equivalent except for the behaviour of the cosmo-
|
54 |
+
logical constant. Whereas the cosmological constant is radiatively stable in UG [2] (it is
|
55 |
+
simply an integration constant of the equations of motion), in GR it is radiatively unstable.
|
56 |
+
In this way, if one uses technical naturalness in the sense introduced by ’t Hooft [1, 3, 4] as
|
57 |
+
a guiding principle toward building theories, UG theories are much more desirable than GR
|
58 |
+
theories since the cosmological constant is technically natural.
|
59 |
+
There are mainly three arguments used to argue that the low-energy limit of string theory
|
60 |
+
is given by the effective field theory (EFT) consisting of GR coupled to some other fields.
|
61 |
+
First of all, when one analyzes the massless spectrum (leaving aside the tachyon field) of
|
62 |
+
bosonic string theory propagating on top of flat spacetime one finds that for oriented strings
|
63 |
+
2
|
64 |
+
|
65 |
+
it contains a graviton, a Kalb-Ramond field, and a dilaton; and for unoriented strings
|
66 |
+
it contains only a graviton and a dilaton.
|
67 |
+
In principle, for computing observables only
|
68 |
+
involving massless states, one expects that one can write down an effective action which
|
69 |
+
simply involves fields that account for these massless excitations, i.e., a graviton-field hµν,
|
70 |
+
(possibly) a Kalb-Ramond field Bµν, and a dilaton field Φ.
|
71 |
+
As usual, the fundamental
|
72 |
+
observable considered is the S-matrix.
|
73 |
+
Now, we come to the arguments used to argue that GR “emerges naturally” as the low-
|
74 |
+
energy description of such degrees of freedom. First of all, it has been argued that the only
|
75 |
+
self-consistent way of coupling the graviton (massless spin-2 representation of the Poincar´e
|
76 |
+
group) to itself is through GR. In that way, having a massless spin-2 field in the spectrum,
|
77 |
+
one necessarily guesses that the non-linear structure of the theory needs to be GR up to
|
78 |
+
potential higher-derivative corrections arising in the EFT. However, we argued [1, 5] that
|
79 |
+
the self-coupling of UG gravitons (those displaying linerarized WTDiff gauge-invariance) to
|
80 |
+
themselves also gives rise to the full non-linear UG in a consistent way, although the coupling
|
81 |
+
of the graviton to itself is through the traceless part of the energy-momentum tensor, instead
|
82 |
+
of the full one. Hence, this first argument does not allow one to discern whether UG or GR
|
83 |
+
is preferred from the string point of view since one is as legitimate as the other.
|
84 |
+
The second argument comes from the analysis of string scattering amplitudes, which was
|
85 |
+
already revisited in [1]. One can compute within string perturbation theory the scattering
|
86 |
+
amplitudes for graviton asymptotic states. The result is that, to the lowest order in α′ and
|
87 |
+
at string tree level, one obtains the same scattering amplitudes obtained in GR. The point is
|
88 |
+
that UG scattering amplitudes are exactly the same as the GR scattering amplitudes [6, 7].
|
89 |
+
In that sense, GR is not preferred over UG from the point of view of scattering amplitudes
|
90 |
+
either, as it was concluded in [1].
|
91 |
+
The final argument comes from analyzing perturbatively in α′ the non-linear sigma model
|
92 |
+
that arises from coupling the string degrees of freedom to an arbitrary background metric (or
|
93 |
+
conformal structure), Kalb-Ramond field, and dilaton field generated by the string degrees
|
94 |
+
of freedom themselves. For such a model, the Weyl symmetry of the worldsheet, which is
|
95 |
+
potentially anomalous, needs to be handled carefully. However, although in flat spacetime
|
96 |
+
and zero background fields it simply constrains the dimension of spacetime to be 26 (critical
|
97 |
+
dimension), in this case constraints also appear for the spacetime fields entering the sigma
|
98 |
+
model construction. Such constraints arise from imposing a cancellation of the Weyl anomaly
|
99 |
+
3
|
100 |
+
|
101 |
+
to make it a sensible theory.
|
102 |
+
The equations that arise are basically Einstein equations,
|
103 |
+
although interpreted as β-functionals. Both GR and UG give rise to Einstein equations,
|
104 |
+
hence from this point of view we show that it is possible to write both a GR and UG-like
|
105 |
+
EFT for the massless degrees of freedom of the string. Moreover, both actions are also
|
106 |
+
consistent with the previous argument since they reproduce all the scattering amplitudes
|
107 |
+
involving massless states of the string. The only difference that seems to appear, is that,
|
108 |
+
whereas in the GR EFT the cosmological constant is a coupling constant that needs to be
|
109 |
+
set to zero, in the UG EFT it is an integration constant that needs to be set to zero. In
|
110 |
+
other words, UG contains the space of theories which is GR with all possible values of the
|
111 |
+
cosmological constant within a single theory.
|
112 |
+
The α′-expansion on its own points toward a zero cosmological constant. However, once
|
113 |
+
we include string loop corrections, the situation changes.
|
114 |
+
We will revisit the Fischler-
|
115 |
+
Susskind approach [8–10]towards including the lowest order string loop correction in the
|
116 |
+
picture. In this way, an arbitrary cosmological constant is generated through the string-
|
117 |
+
loop corrections in the EFT. In this way, the EFT that we need to write down within the
|
118 |
+
GR EFT to include the string-loop corrections contains an arbitrary cosmological constant,
|
119 |
+
which is exactly what happens with the UG EFT, although in the former case it is a coupling
|
120 |
+
constant whereas in the latter it is an integration constant. In this way, we conclude that
|
121 |
+
both the UG and the GR EFTs can account for the low-energy description of massless string
|
122 |
+
states with the only difference arising in the nature of the cosmological constant.
|
123 |
+
It is worth remarking that this analysis gives further evidence for UG as a sensible classical
|
124 |
+
theory of gravitation according to the criteria invoked by Weinberg in [11]. According to
|
125 |
+
Weinberg, one of the key aspects that needs to be addressed to regard UG as a reasonable
|
126 |
+
classic theory of gravitation is to understand whether it can be obtained as a low energy
|
127 |
+
limit of a quantum theory of gravitation. By embedding UG within the framework of string
|
128 |
+
theory, here we answer here in the affirmative.
|
129 |
+
The remain of this article is structured as follows. In Section II we introduce the frame-
|
130 |
+
work of UG, making special emphasis on the existence of a priviliged background volume
|
131 |
+
form and the existence of an additional global degree of freedom with respect to GR. Then,
|
132 |
+
we introduce a modification of GR in which a new global degree of freedom, precisely the
|
133 |
+
cosmological constant is assigned to a (D+1)-form field, to make clear the difference between
|
134 |
+
UG and the standard formulation of GR. In Sec. III we review the basics of the quantiza-
|
135 |
+
4
|
136 |
+
|
137 |
+
tion of strings in flat spacetimes and explain why UG and GR are both valid as the low
|
138 |
+
energy description of string theory from the point of view of scattering amplitudes involving
|
139 |
+
massless particles. In Sec. IV we move on to analyze strings in general backgrounds. In
|
140 |
+
Subsec. IV A we rederive the consistency conditions (Weyl anomaly cancellation) from the
|
141 |
+
perturbative α′ expansion of the sigma model. Some of the details of the computation that
|
142 |
+
are well explained in the literature and not relevant for our purposes are skipped and we
|
143 |
+
refer the reader to the literature at those points. In Subsec. IV B we introduce the Susskind-
|
144 |
+
Fischler approach for cancelling some of the divergences arising from string loops, with the
|
145 |
+
divergences of the sigma model on the trivial genus worldsheet. The main novelty that this
|
146 |
+
mechanism introduces is a cosmological-constant-like term in the β functions. We close this
|
147 |
+
section by analyzing in Subsec. IV C how these consistency conditions can be derived from
|
148 |
+
an effective action once they are interpreted as equations of motion for the background fields.
|
149 |
+
We emphasize the consistency of this approach when computing scattering amplitudes in-
|
150 |
+
volving the massless excitations. we close this section. In Sec. V we summarize the results
|
151 |
+
and draw the conclusions that can be taken from our analysis. We also point interesting
|
152 |
+
future lines of work that seem promising in virtue of our analysis presented here.
|
153 |
+
Notation and conventions: Our convention for the signature of the metric is (−, +, ..., +)
|
154 |
+
for the (D+1)-dimensional target space metric and (−, +) for the worldsheet metric. Tensor
|
155 |
+
objects will be represented by bold symbols, whereas their components in a given basis will
|
156 |
+
be written with the same (not bold) symbol and indices, e.g., the Minkowski metric η
|
157 |
+
will be represented in components as ηµν. We will use Greek letters for spacetime indices
|
158 |
+
(µ, ν, ...) whereas we will reserve lower case latin indices (a, b, ...) for the worldsheet indices.
|
159 |
+
Curvature quantities like the Riemann tensor are defined following Misner-Thorne-Wheeler’s
|
160 |
+
conventions [12] and we will specify explicitly the metric it depends on, e.g. Rα
|
161 |
+
βγδ(g). We
|
162 |
+
also represent the (D + 1)-dimensional Newton’s constant as κ2 = 16πG.
|
163 |
+
II.
|
164 |
+
UNIMODULAR GRAVITY AND GENERAL RELATIVITY: MATCHING
|
165 |
+
GLOBAL DEGREES OF FREEDOM
|
166 |
+
It is well accepted that metric theories of gravity, those in which the fundamental object
|
167 |
+
describing the gravitational field at a given point is a metric, are suitable for describing
|
168 |
+
gravitational experiments to great accuracy [13]. The metric at a given point of the spacetime
|
169 |
+
5
|
170 |
+
|
171 |
+
is completely specified by the lightcone at that point up to a conformal factor. Although
|
172 |
+
the conformal structure of the spacetime is allowed to fluctuate both in UG and GR, the
|
173 |
+
difference arises in the conformal factor. Whereas in UG the conformal factor is fixed to be
|
174 |
+
a fiducial (non-dynamical) volume form that we represent as ω =
|
175 |
+
1
|
176 |
+
(D+1)!ω(x)dx0 ∧ ... ∧ dxD
|
177 |
+
and hence it does not have any dynamics, in GR it is also dynamical like the lightcone itself.
|
178 |
+
Naively, one could conclude that this reduction in the number of independent components
|
179 |
+
of the metric may lead to a reduction of the independent degrees of freedom of the theory.
|
180 |
+
However, it reduces the gauge symmetries of the theory to only transverse diffeomorphisms
|
181 |
+
(those preserving the background volume form) and hence it is not surprising that the theory
|
182 |
+
displays the same number of local degrees of freedom as GR does. Actually, it displays
|
183 |
+
an additional global degree of freedom associated with the cosmological constant. In this
|
184 |
+
section we will introduce the basic formulation of UG, emphasizing the presence of this new
|
185 |
+
additional global degree of freedom. Furthermore, we will present a formulation of GR closer
|
186 |
+
in spirit to UG, since the cosmological constant appears as a combination of an arbitrary
|
187 |
+
integration constant and the renormalized cosmological constant entering the action and we
|
188 |
+
still have the invariance under the full set of diffeomorphisms.
|
189 |
+
Let us begin with the standard formulation of UG. UG is a theory in which the group of
|
190 |
+
gauge transformations is WTDiff (Weyl rescalings of the metric and Transverse Diffeomor-
|
191 |
+
phisms) instead of the whole group of Diffs (Diffeomorphisms), see [1] for further details. In
|
192 |
+
order to define such a theory, we need to use the non-dynamical volume form that we have
|
193 |
+
already introduced ω. It is useful to introduce the Weyl-invariant auxiliary metric
|
194 |
+
˜gµν = gµν
|
195 |
+
�ω2
|
196 |
+
|g|
|
197 |
+
�
|
198 |
+
1
|
199 |
+
D+1
|
200 |
+
.
|
201 |
+
(1)
|
202 |
+
In this way, every curvature scalar built from the auxiliary metric ˜gµν inherits the invariance
|
203 |
+
under Weyl rescalings and is also invariant under transverse-diffeomorphism transformations
|
204 |
+
by construction. The simplest action principle that one can think for an UG-like theory is
|
205 |
+
the UG version of the Einstein-Hilbert action:
|
206 |
+
SUG =
|
207 |
+
1
|
208 |
+
2κ2
|
209 |
+
�
|
210 |
+
dD+1xωR (g) .
|
211 |
+
(2)
|
212 |
+
We can also add a coupling to some matter fields which need to couple to the auxiliary metric,
|
213 |
+
i.e., the matter action will be of the form Sm (˜g, Φ), so that it remains Weyl-invariant (note
|
214 |
+
that the matter fields are not affected by Weyl transformations). The equations of motion
|
215 |
+
6
|
216 |
+
|
217 |
+
of this theory are the traceless Einstein equations:
|
218 |
+
Rµν(˜g) −
|
219 |
+
1
|
220 |
+
D + 1R(˜g)˜gµν = κ2
|
221 |
+
�
|
222 |
+
Tµν(˜g) −
|
223 |
+
1
|
224 |
+
D + 1T(˜g)˜gµν
|
225 |
+
�
|
226 |
+
.
|
227 |
+
(3)
|
228 |
+
Upon using the Bianchi identities, they become Einstein equations with the cosmological
|
229 |
+
constant entering as an integration constant [1]
|
230 |
+
Rµν(˜g) − 1
|
231 |
+
2R(˜g)˜gµν + Λ˜gµν = κ2Tµν(˜g),
|
232 |
+
(4)
|
233 |
+
provided that ˜∇µT µν (˜g) = 0.
|
234 |
+
It is clear that the Weyl invariance is trivial in the sense that its gauge fixing is trivial,
|
235 |
+
we simply need to fix the volume form given by the determinant of the metric
|
236 |
+
�
|
237 |
+
|g| to be
|
238 |
+
the background volume form. Actually, this can be done also at the level of the action. The
|
239 |
+
result is still a local action for the metric which does not contain any mention to the Weyl
|
240 |
+
symmetry. In that sense, the resulting action is the most minimalistic action that one can
|
241 |
+
conceive for a metric field. If one tried to make a gauge fixing of the remaining degrees of
|
242 |
+
freedom, one would end up with a non-local action for the actual physical degrees of freedom
|
243 |
+
encoded in the field gµν.
|
244 |
+
In this way, it seems clear that both theories display the same number of local degrees
|
245 |
+
of freedom of GR, except for the cosmological constant that we will analyze now. To put
|
246 |
+
it in other words, leaving aside the cosmological constant, from the point of view of initial
|
247 |
+
conditions, the same amount of initial data are needed to specify a solution to the equations.
|
248 |
+
The cosmological constant in this case appears with a difference, it is an additional global
|
249 |
+
degree of freedom. The simplest way to see this is from the point of view of such constant
|
250 |
+
being an integration constant. This means that it is a constant that parametrizes the space
|
251 |
+
of solutions, which is separate from the initial data required in GR. In that sense, it is a
|
252 |
+
constant to be fixed by initial conditions which makes the space of solutions of UG bigger
|
253 |
+
than the GR space of solutions, precisely by this cosmological constant as an integration
|
254 |
+
constant. This analysis can be made much more precise by making a Hamiltonian analysis
|
255 |
+
of the theory, as it has been done in [14], reaching the same conclusions.
|
256 |
+
We have concluded that UG is equivalent to GR, up to a global degree of freedom which
|
257 |
+
is precisely playing the role of the cosmological constant. To make it more explicit, we will
|
258 |
+
introduce now an additional field in GR that accounts for this global degree of freedom, to
|
259 |
+
sharpen the difference. We need to introduce a (D +1)-form field which is the differential of
|
260 |
+
7
|
261 |
+
|
262 |
+
a D-form [15, 16]. Explicitly, we want to introduce a D + 1 form F which is the differential
|
263 |
+
of a D-form A. In components, this reads:
|
264 |
+
Fµ0...µD = ∇[µ0Aµµ1...µD ].
|
265 |
+
(5)
|
266 |
+
We can write down the action principle which is the Einstein-Hilbert action with an arbitrary
|
267 |
+
cosmological constant and a Maxwell-like term for F , namely:
|
268 |
+
S =
|
269 |
+
1
|
270 |
+
2κ2
|
271 |
+
�
|
272 |
+
dD+1x√−g
|
273 |
+
�
|
274 |
+
−2Λ + R(g) −
|
275 |
+
K
|
276 |
+
(D + 1)!Fµ0...µDF µ0...µD
|
277 |
+
�
|
278 |
+
,
|
279 |
+
(6)
|
280 |
+
where K is simply a coupling constant which can be both positive or negative. The equations
|
281 |
+
of motion for the F -field are
|
282 |
+
∇µ0F µ0...µD = 0.
|
283 |
+
(7)
|
284 |
+
In a (D + 1)-dimensional manifold, a completely antisymmetric volume form like F needs
|
285 |
+
to be proportional to the ǫ pseudotensor. Hence, the equations of motion simply fixed the
|
286 |
+
proportionality function to be a constant, i.e.
|
287 |
+
Fµ0...µD = c√−gǫµ0...µD.
|
288 |
+
(8)
|
289 |
+
From the point of view of the initial value problem, this constant c is precisely a global degree
|
290 |
+
of freedom that needs to be fixed in terms of initial conditions. From that point of view, it
|
291 |
+
is akin to the cosmological constant in UG, since it is completely fixed in terms of the initial
|
292 |
+
conditions. We can sharpen the analogy by examining how does this constant c enter the
|
293 |
+
equations of motion for the metric. The energy-momentum tensor once we evaluate the F
|
294 |
+
form on shell, behaves exactly as a cosmological constant [15, 16]. Assuming the existence of
|
295 |
+
additional matter fields, the equations of motion for the gravitational field take the following
|
296 |
+
form:
|
297 |
+
Rµν(g) − 1
|
298 |
+
2R(g)gµν + Λeffgµν = κ2Tµν(g),
|
299 |
+
(9)
|
300 |
+
where the constant Λeff is expressed in terms of the action as
|
301 |
+
Λeff = Λ + NDKc2,
|
302 |
+
(10)
|
303 |
+
with ND an irrelevant numerical factor depending on the spacetime dimension. In this way,
|
304 |
+
the cosmological constant entering the equations of motion for the metric are a combination
|
305 |
+
of an initial condition c and the cosmological constant Λ entering the action.
|
306 |
+
8
|
307 |
+
|
308 |
+
From a purely classical point of view, we have presented a theory akin to GR, exhibiting
|
309 |
+
the whole set of diffeomorphisms as gauge symmetries and containing an additional global
|
310 |
+
degree of freedom encoded in a (D + 1)-form. The equations of motion for this volume form
|
311 |
+
enforce that it is proportional to the Levi-Civita pseudotensor, with the proportionality
|
312 |
+
constant been called here c. The constant of proportionality enters the equations of motion
|
313 |
+
for the metric as an effective cosmological constant. In this way, it plays a similar role to
|
314 |
+
the one played by the global degree of freedom of UG. Independently of the value that we
|
315 |
+
assign to the cosmological constant entering the action Λ, the resulting effective cosmological
|
316 |
+
constant entering Einstein equations Λeff is given by a combination of Λ and c. In terms of
|
317 |
+
the initial conditions, it is possible to adjust c in order to make Λeff take any desired value.
|
318 |
+
This formulation of GR with the additional (D + 1) form field is equivalent to UG, in the
|
319 |
+
sense that it displays the same amount of degrees of freedom, both local and global, and the
|
320 |
+
global degree of freedom plays the role of a cosmological constant.
|
321 |
+
At the quantum level, both formulations seem to be different from the point of view of
|
322 |
+
radiative corrections. The reason behind this mismatch is that, whereas in UG the cos-
|
323 |
+
mological constant does not receive any radiative corrections and this makes it technically
|
324 |
+
natural [1, 2]1, in this formulation of GR, the cosmological constant in the action Λ does re-
|
325 |
+
ceive radiative corrections, and hence it is not technically natural. However, the cosmological
|
326 |
+
constant relevant for the dynamics is the effective one Λeff that combines the renormalized
|
327 |
+
Λ with the initial value constant c. It is possible to obtain any value for the cosmological
|
328 |
+
constant Λeff independently of the potentially huge radiative corrections that Λ may receive.
|
329 |
+
The equivalence once quantum corrections are included into the picture is unclear. Whether
|
330 |
+
this formulation is then completely equivalent to UG at the semiclassical level is something
|
331 |
+
that deserves a separate and detailed study on its own.
|
332 |
+
Our point here was mainly to introduce a formulation within the GR setup that is close
|
333 |
+
to the UG version, so that both theories can be compared easily. We have made explicit
|
334 |
+
the difference existing in the global degrees of freedom of UG and GR (UG contains the
|
335 |
+
whole space of GR with arbitrary values of the cosmological constant coupling). This only
|
336 |
+
difference in the two theories, will be also the only difference appearing from the point of
|
337 |
+
1 We note that technical naturalness is a definition that only applies to coupling constants appearing in
|
338 |
+
the action. In that sense it is not completely legitimate to say that in UG the cosmological constant is
|
339 |
+
technically natural since it is not a coupling constant. However, making an abuse of language we find it
|
340 |
+
convenient to say that it is technically natural.
|
341 |
+
9
|
342 |
+
|
343 |
+
view of regarding UG as the low energy EFT for massless string states.
|
344 |
+
III.
|
345 |
+
STRING PERTURBATION THEORY IN TRIVIAL BACKGROUNDS
|
346 |
+
This section contains a review of the quantization of strings in a flat background as well
|
347 |
+
as the computation of string scattering amplitudes for gravitons from string theory. This is
|
348 |
+
well-known material that can be found in any textbook [17, 18]. Also we think that a reader
|
349 |
+
unfamiliarized with string theory might find here a quick introduction to the arguments
|
350 |
+
presented in the literature leading to the conclusion that GR is the EFT describing the
|
351 |
+
excitation in massless degrees of freedom. We find convenient to make such introduction
|
352 |
+
here to expand the discussion presented in [1] about how the scattering amplitudes can be
|
353 |
+
equivalently obtained from a GR and a UG-like EFT.
|
354 |
+
The starting point of our discussion of perturbative string theory is the action describing
|
355 |
+
relativistic strings propagating in flat spacetime. For relativistic free particles it is natural to
|
356 |
+
consider the action to be the proper time of the particle trajectory i.e., the embedding of the
|
357 |
+
worldline in the target space. In the same way, for strings it is natural to consider the area
|
358 |
+
swept out by the worldsheet to replace the proper time of the particle trajectory. For that
|
359 |
+
purpose, let us introduce a coordinate system in the worldsheet, a pair σa (a = 0, 1) which
|
360 |
+
correspond to the time coordinate σ0 ∈ (−∞, ∞) and a spatial coordinate σ1. Furthermore,
|
361 |
+
we will restrict our attention to closed strings (those giving rise to graviton excitations) in
|
362 |
+
which the points at σ1 and σ1 + 2π are identified. If we endow the (D + 1) dimensional flat
|
363 |
+
spacetime with coordinates Xµ, we look for an action such that the area density swept by
|
364 |
+
the string is expressed in terms of derivatives of the embedding Xµ(τ, σ). We notice that
|
365 |
+
the induced metric on the worldsheet is given by
|
366 |
+
hab = ηµν∂aXµ∂bXν.
|
367 |
+
(11)
|
368 |
+
If we take the action to be the area swept out by the string, we write down the Nambu-Goto
|
369 |
+
action as
|
370 |
+
SNG[X] = −
|
371 |
+
1
|
372 |
+
2πα′
|
373 |
+
�
|
374 |
+
d2σ
|
375 |
+
√
|
376 |
+
−h.
|
377 |
+
(12)
|
378 |
+
The constant α′ represents the string tension, i.e., the energy density per unit length. Al-
|
379 |
+
though this action is perfectly reasonable classically, from the point of view of quantization
|
380 |
+
10
|
381 |
+
|
382 |
+
is problematic. This is because it is not quadratic in its variables: we have a square root
|
383 |
+
appearing explicitly in the action.
|
384 |
+
To circumvent this problem, one can work with the
|
385 |
+
Polyakov action, which is given by
|
386 |
+
SP[X, γ] = −
|
387 |
+
1
|
388 |
+
4πα′
|
389 |
+
�
|
390 |
+
d2σ√−γγab∂aXµ∂bXνηµν.
|
391 |
+
(13)
|
392 |
+
In this action, there is an additional configuration variable γab which is a metric in the
|
393 |
+
worldsheet. Now, this action is clearly quadratic in the Xµ variables over which we will
|
394 |
+
path-integrate to quantize the theory. To see the equivalence among these two actions, we
|
395 |
+
can compute the equations of motion for the γab variable. Actually, following the standard
|
396 |
+
conventions, we can define a two-dimensional energy-momentum tensor as the variation of
|
397 |
+
the Polyakov action with respect to the worldsheet metric, i.e. γab:
|
398 |
+
Tab = −
|
399 |
+
1
|
400 |
+
√−γ
|
401 |
+
δSP
|
402 |
+
δγab =
|
403 |
+
1
|
404 |
+
4πα′
|
405 |
+
�
|
406 |
+
∂aXµ∂bXν − 1
|
407 |
+
2γabγad∂cXµ∂dXν
|
408 |
+
�
|
409 |
+
ηµν.
|
410 |
+
(14)
|
411 |
+
The Polyakov action does not contain any derivatives of the metric γab, and hence the
|
412 |
+
equations of motion for the metric can be regarded as a constraint Tab = 0 (as a consequence,
|
413 |
+
strictly speaking it is not a dynamical variable). Actually, this constraint can be used to
|
414 |
+
solve γab in terms of the Xµ variables. When we plug the result back into the Polyakov
|
415 |
+
action, we find the Nambu-Goto action we began with.
|
416 |
+
It is worth pausing at this point and discussing the continuous symmetries of the theory:
|
417 |
+
• Poincar´e invariance. This is a global symmetry on the worldsheet
|
418 |
+
Xµ → Λµ
|
419 |
+
νXν + c��.
|
420 |
+
(15)
|
421 |
+
• Reparametrization invariance or diffeomorphism invariance in the worldsheet σa →
|
422 |
+
˜σa(σ). Whereas the Xµ fields transform as worldsheet scalars, γab transforms as a
|
423 |
+
two-index covariant tensor:
|
424 |
+
Xµ(σ) → Xµ(˜σ) = Xµ(σ),
|
425 |
+
(16)
|
426 |
+
γab(σ) → ˜γab(˜σ) = ∂σc
|
427 |
+
∂˜σa
|
428 |
+
∂σd
|
429 |
+
∂˜σb γcd(σ).
|
430 |
+
(17)
|
431 |
+
• Weyl invariance of the worldsheet metric γab. This transformation leaves invariant the
|
432 |
+
Xµ coordinates and the metric gets a local rescaling
|
433 |
+
Xµ(σ) → Xµ(σ),
|
434 |
+
(18)
|
435 |
+
γab(σ) → e2φ(σ)γab(σ).
|
436 |
+
(19)
|
437 |
+
11
|
438 |
+
|
439 |
+
We can distinguish now between oriented and unoriented strings. The former have a well
|
440 |
+
defined transformation law under the parity transformation σ1 → 2π − σ1. We will focus on
|
441 |
+
the unoriented strings for the sake of simplicity.
|
442 |
+
Not all the symmetries that we have introduced are directly preserved through the process
|
443 |
+
of quantization. Actually, the Weyl symmetry is anomalous, as it is well known. However,
|
444 |
+
in this case the Weyl symmetry is a gauge symmetry that we must insist on preserving
|
445 |
+
at the quantum level to remove unphysical states. We will further discuss this point later
|
446 |
+
when we deal with strings in general backgrounds. For the time being, let us focus on the
|
447 |
+
quantization of the theory through a path-integral procedure.
|
448 |
+
Let us illustrate the quantization of the theory through a path-integral procedure as
|
449 |
+
well as the spectrum that the theory displays.
|
450 |
+
Let us define the generating functional
|
451 |
+
following the usual Faddeev-Popov procedure. First of all, we would write down the action
|
452 |
+
in Euclidean space, in order to make the quantization procedure sensible. We write down
|
453 |
+
the generating functional as
|
454 |
+
Z =
|
455 |
+
1
|
456 |
+
V (gauge)
|
457 |
+
�
|
458 |
+
DγDXe−SP [X,γ],
|
459 |
+
(20)
|
460 |
+
where V (gauge) represents the volume of the gauge group. We recall that we have the Weyl
|
461 |
+
rescalings of the metric and diffeomorphisms as gauge symmetries of our theory. Hence,
|
462 |
+
we need to avoid counting more than once physical configurations and that is the reason
|
463 |
+
for taking the quotient by the volume of the gauge group. As usual, we will introduce a
|
464 |
+
Faddeev-Popov determinant ∆F P[γ] to take this volume into account.
|
465 |
+
The integral over the gauge orbits cancels with the volume of the gauge group and we
|
466 |
+
reach the expression for the generating functional which is
|
467 |
+
Z[γ] =
|
468 |
+
�
|
469 |
+
DX∆F P[γ]e−SP [X,γ].
|
470 |
+
(21)
|
471 |
+
Choosing a convenient normalization for the action, we can rewrite the Faddeev-Popov
|
472 |
+
determinant as
|
473 |
+
∆F P[γ] =
|
474 |
+
�
|
475 |
+
DbDce−Sg[b,c],
|
476 |
+
(22)
|
477 |
+
where b and c are ghosts Grassman-values that anticommute and
|
478 |
+
Sg = 1
|
479 |
+
2π
|
480 |
+
�
|
481 |
+
d2σ√γbab∇acb.
|
482 |
+
(23)
|
483 |
+
12
|
484 |
+
|
485 |
+
At this point, we have reduced the evaluation of the path integral for the bosonic string
|
486 |
+
theory to the evaluation of the path integral:
|
487 |
+
Z =
|
488 |
+
�
|
489 |
+
DbDcDXe−SP [γ,X]−Sg[γ,b,c],
|
490 |
+
(24)
|
491 |
+
which is the CFT of D + 1 scalar fields (the Xµ) and the bc-ghost system [17, 19]. If the
|
492 |
+
theory is going to preserve the Weyl invariance, we need the theory to have a total zero
|
493 |
+
central charge. This is precisely the consistency condition that we mentioned would appear.
|
494 |
+
Weyl invariance means that the trace of the two-dimensional energy momentum tensor needs
|
495 |
+
to vanish. In two-dimensions, the trace of the energy-momentum tensor is determined by
|
496 |
+
the central charge and the trace anomaly
|
497 |
+
⟨T a
|
498 |
+
a⟩ = − c
|
499 |
+
12R [γ] .
|
500 |
+
(25)
|
501 |
+
The system of the Xµ-scalars and the bc-ghost system is linear, and hence the total central
|
502 |
+
charge is the sum of the central charges of the two systems independently:
|
503 |
+
c = cg + cX.
|
504 |
+
(26)
|
505 |
+
The bc-ghost system [17] has a central charge cg = −26 while each scalar field gives a
|
506 |
+
contribution of 1 to the central charge cX = D + 1. Ensuring Weyl-invariance means that
|
507 |
+
we need the spacetime dimension to be 26. This is the well-known way in which the critical
|
508 |
+
dimension of bosonic string theory emerges.
|
509 |
+
Now that we have ensured how to preserve the gauge invariance at the quantum level in
|
510 |
+
order to make the theory consistent, it is time to talk about the spectrum of the strings.
|
511 |
+
Our point is simply to illustrate that the spectrum of the closed unoriented bosonic string
|
512 |
+
contains a tachyon, a dilaton, and a graviton. Hence, for this purpose, we can skip the
|
513 |
+
detailed BRST analysis and focus only on the states generated by the X-fields which are
|
514 |
+
the “physical fields”.
|
515 |
+
In order to characterize the spectrum, the simplest way to do it is to use the so called
|
516 |
+
state-operator map for CFTs [20, 21], in which states are replaced by operator insertions
|
517 |
+
that generate them by acting in a neighbourhood of the vacuum. For this purpose, it is
|
518 |
+
first easier to use complex coordinates σ → (z, ¯z) on the worldsheet. Furthermore, we now
|
519 |
+
need the operators to be gauge invariant. The diffeomorphism invariance can be ensured
|
520 |
+
by integrating local operators O(z, ¯z) over the worldsheet, i.e. constructing operators of the
|
521 |
+
13
|
522 |
+
|
523 |
+
form
|
524 |
+
V =
|
525 |
+
�
|
526 |
+
d2zO(z, ¯z),
|
527 |
+
(27)
|
528 |
+
with V standing for vertex operators. Weyl invariance is ensured by choosing the operators
|
529 |
+
O to transform adequately under Weyl rescalings, i.e., having a suitable weight. The measure
|
530 |
+
of integration, d2z has a conformal weight (−1, −1) under such rescalings. Hence, O needs
|
531 |
+
to be a primary operator of the CFT with weight (+1, +1) to compensate it.
|
532 |
+
The kind of operators that give rise to the lowest energy states of the string are eip·X
|
533 |
+
and Pµν∂Xµ∂Xνeip·X, with p a given momentum that we endow the string with and Pµν
|
534 |
+
the polarization tensor [17, 18].
|
535 |
+
The operator eip·X gives rise to the tachyon, since we
|
536 |
+
need to impose that −p2 = −4/α′ < 0 for the operator to be Weyl invariant. The operator
|
537 |
+
Pµν∂Xµ∂Xνeip·X corresponds to the dilaton (pure trace part of Pµν) and the symmetric part
|
538 |
+
of Pµν gives rise to the graviton, since p2 = 0 (massless condition) and pµPµν = 0 (transverse
|
539 |
+
condition) needs to be imposed to ensure the Weyl invariance. The antisymmetric part does
|
540 |
+
not appear for unoriented strings since it corresponds to the Kalb-Ramond excitation [17].
|
541 |
+
Up to this point, we have analyzed the spectrum of the closed unoriented bosonic string
|
542 |
+
theory and found that the massless states correspond to the dilaton and the graviton. The
|
543 |
+
Polyakov action per se does not give rise to interactions. We will now make a small digression
|
544 |
+
on how interactions among the massless states arise in string theory. There is a term that we
|
545 |
+
can add to the Polyakov action which is an Einstein-Hilbert term that is purely topological
|
546 |
+
in two-dimensions
|
547 |
+
Sint = λ
|
548 |
+
4π
|
549 |
+
�
|
550 |
+
d2σ√γR(γ) = 2λ(1 − g),
|
551 |
+
(28)
|
552 |
+
being g the genus of the worldsheet and λ a coupling constant which we assume to be small
|
553 |
+
in order to do perturbation theory. Hence, if we add this term to the string action, we will
|
554 |
+
get
|
555 |
+
Z =
|
556 |
+
�
|
557 |
+
topologies
|
558 |
+
�
|
559 |
+
DXDγe−SP −Sint =
|
560 |
+
∞
|
561 |
+
�
|
562 |
+
g=0
|
563 |
+
e−2λ(1−g)
|
564 |
+
�
|
565 |
+
DXDγe−SP .
|
566 |
+
(29)
|
567 |
+
If we call eλ = gs, as it is common, this gives a good expansion as long as gs ≪ 1. The whole
|
568 |
+
series is known to be a divergent series as the standard perturbative series in QFT [22]. In
|
569 |
+
addition to this problem, there is a harder problem which is the finiteness of each of the
|
570 |
+
terms in the series, i.e., the path integral over the different geometries. For a fixed topology,
|
571 |
+
14
|
572 |
+
|
573 |
+
the path integral with the Polyakov action requires to compute a sum over the moduli
|
574 |
+
of conformally inequivalent surfaces.
|
575 |
+
In general, for higher loop orders (i.e.
|
576 |
+
non-trivial
|
577 |
+
topologies) this requires to perform an integral over a moduli space that is not obviously
|
578 |
+
convergent, although some results in the literature point toward its finiteness [23].
|
579 |
+
Now it comes to the point of computing some observables. The observable to compute
|
580 |
+
in string theory is the string S-matrix. This means, we plug some “in” state of the free
|
581 |
+
string spectrum and compute the probability amplitude of generating another “out” state of
|
582 |
+
free string spectrum. These states are generated by introducing their corresponding vertex
|
583 |
+
operators.
|
584 |
+
For our purposes of analyzing how GR or UG might emerge from string theory, we are
|
585 |
+
interested in computing the scattering amplitude involving m gravitons with momenta pi and
|
586 |
+
polarization tensors ei which we represent as A(m)(p1, e1; p2, e2; ...pm, em). This is computed
|
587 |
+
as a suitable path integral for the Polyakov action SP that schematically reads [17, 18]
|
588 |
+
A(m)(1h1, 2h2, ..., mhm) = 1
|
589 |
+
g2s
|
590 |
+
1
|
591 |
+
Vgauge
|
592 |
+
�
|
593 |
+
DXDg e−SP[X,g]
|
594 |
+
m
|
595 |
+
�
|
596 |
+
i=1
|
597 |
+
Vi(pi, hi),
|
598 |
+
(30)
|
599 |
+
where Vi represents the vertex operator associated with a graviton insertion with a given
|
600 |
+
spin and momentum. To begin with, we particularize the amplitude for three gravitons and
|
601 |
+
we find
|
602 |
+
A(p1, e1; p2, e2; p3, e3) = igs(α′)6
|
603 |
+
2
|
604 |
+
(2π)26δ26 (p1 + p2 + p3) e1µνe2αβe3γδT µαγT νβδ,
|
605 |
+
(31)
|
606 |
+
where
|
607 |
+
T µαγ = pµ
|
608 |
+
23ηαγ + pα
|
609 |
+
31ηγµ + pγ
|
610 |
+
12ηµα + α′
|
611 |
+
8 pµ
|
612 |
+
23pα
|
613 |
+
31pγ
|
614 |
+
12,
|
615 |
+
(32)
|
616 |
+
pµ
|
617 |
+
ij = pµ
|
618 |
+
i − pµ
|
619 |
+
j . The terms of order O(α′) in T µαγ contribute as O(p4) to the amplitude.
|
620 |
+
If we focus just on the lowest order terms O(p2), this amplitude is equivalent to the ones
|
621 |
+
computed at tree level from the Einstein-Hilbert action upon the identification κ = gs(α′)6.
|
622 |
+
The same agreement is found with amplitudes involving an arbitrary number of gravitons:
|
623 |
+
if we neglect the higher-order contribution from the string amplitude, they agree with those
|
624 |
+
computed from the Einstein-Hilbert action [17, 18], with the same identification of κ and
|
625 |
+
the string constants.
|
626 |
+
As it has been already discussed in the literature [6, 7], the tree-level scattering amplitudes
|
627 |
+
of gravitons computed in GR and UG are identical.
|
628 |
+
Hence, from the point of view of
|
629 |
+
15
|
630 |
+
|
631 |
+
scattering amplitudes, string theory does not point toward GR in a univocal way: both UG
|
632 |
+
and GR are equivalent from a low-energy effective field theory point of view. This result
|
633 |
+
was already advanced in [1] and we have reproduced here the analysis in more detail for the
|
634 |
+
sake of completeness. We will come back to this analysis later, when we introduce the low
|
635 |
+
energy EFTs for the massless degrees of freedom of the string: both the UG and the GR-like
|
636 |
+
actions.
|
637 |
+
IV.
|
638 |
+
STRINGS IN GENERAL BACKGROUNDS
|
639 |
+
Up to now, we have only considered strings propagating in flat spacetime. However, the
|
640 |
+
spectrum of the strings contains some excitations which typically interact among themselves
|
641 |
+
and could lead to the generation of a non-trivial background. In particular, it contains a
|
642 |
+
graviton and, necessarily, gravitons need to interact gravitationally. At low energies, all the
|
643 |
+
excitations that matter are the massless ones. In the same way a laser is a coherent state of
|
644 |
+
photons, we expect that a coherent state of gravitons might look like a curved background
|
645 |
+
and a string propagating on top of it needs to be described appropiately. The same comment
|
646 |
+
applies to the dilaton field. As such, we can write down the most general renormalizable
|
647 |
+
action including those fields, which is the following non-linear σ-model
|
648 |
+
S[X, γ] = SP[X, γ] + SD[X, γ] = −
|
649 |
+
1
|
650 |
+
4πα′
|
651 |
+
�
|
652 |
+
d2σ√−γ
|
653 |
+
�
|
654 |
+
γabGµν(X)∂aXµ∂bXν + α′R (γ) Φ(X)
|
655 |
+
�
|
656 |
+
,
|
657 |
+
(33)
|
658 |
+
where Gµν(X) represents a metric (graviton excitations), Φ(X) represents the dilaton back-
|
659 |
+
ground field, and R[γ] represents the Ricci-scalar of the two-dimensional metric. This term
|
660 |
+
breaks explicitly the Weyl invariance in the worldsheet. This term is of a higher dimension
|
661 |
+
than the Weyl-invariant terms, and it does not require to be normalized with a dimensionful
|
662 |
+
constant. In virtue of the expansion in α′ that we will perform, we will cancel the tree-level
|
663 |
+
contribution to the anomaly of this last term with the one-loop contribution of the classically
|
664 |
+
Weyl-invariant terms. The result of this procedure is a reasonable effective field theory for
|
665 |
+
the massless degrees of freedom of the string.
|
666 |
+
There are two missing terms that still give rise to a renormalizable theory. The first of
|
667 |
+
these terms is the coupling to the Kalb-Ramond field. However, if we focus on unoriented
|
668 |
+
strings, we can skip it since the divergences of the rest of the terms do not require this term
|
669 |
+
16
|
670 |
+
|
671 |
+
to be renormalized. In case we deal with oriented strings, this term gives a contribution to
|
672 |
+
the conformal anomaly [17].
|
673 |
+
The additional term that we can add to the action corresponds to a coupling to the
|
674 |
+
background tachyon field T(X)
|
675 |
+
ST = 1
|
676 |
+
4π
|
677 |
+
�
|
678 |
+
d2σ√−γT (X) .
|
679 |
+
(34)
|
680 |
+
In principle this term is needed to cancel some of the quadratic divergences arising from
|
681 |
+
vacuum to vacuum diagrams. However, if we use a renormalization scheme such that those
|
682 |
+
divergences are absent (for example, dimensional regularization), we can safely skip those
|
683 |
+
terms. Hence, we will work with a renormalization scheme fullfilling this property. Fur-
|
684 |
+
thermore, it is worth mentioning that supersymmetry in the worldsheet ensures that those
|
685 |
+
quadratic divergences are absent in superstrings due to the characteristic cancellation among
|
686 |
+
fermionic and bosonic degrees of freedom, with independence of the renormalization scheme.
|
687 |
+
A.
|
688 |
+
Determination of the Weyl anomaly
|
689 |
+
Anomalies always appear when there are two symmetries that the theory displays at the
|
690 |
+
classical level, but it is not possible to quantize such theory preserving both of them. This
|
691 |
+
means, there is a trade-off between the two symmetries and it is only possible to preserve
|
692 |
+
one of them in the process. For example, the chiral anomaly is a trade-off between the vector
|
693 |
+
and axial currents for massless fermion fields. If we use a regularization procedure which
|
694 |
+
automatically preserves one of those currents, then straightforwardly the other current will
|
695 |
+
be anomalous.
|
696 |
+
In the case of the chiral anomaly, it is standard to use a regularization
|
697 |
+
scheme that preserves gauge invariance and hence yields to the conservation of the vector
|
698 |
+
current, leading to an anomalous axial current. In the case of Weyl invariance for strings, we
|
699 |
+
are using a regularization scheme that preserves diffeomorphism invariance, while the Weyl
|
700 |
+
symmetry becomes potentially anomalous. We need to ensure that the non-linear sigma
|
701 |
+
model is chosen in such a way that it gives rise to a Weyl-invariant theory. In a language
|
702 |
+
closer to particle physics, this means that we need to choose our theory in such a way that
|
703 |
+
we cancel the potential gauge anomalies, which in this case corresponds to choosing the
|
704 |
+
background fields in such a way that the theory is not Weyl-anomalous.
|
705 |
+
In the case of
|
706 |
+
the Standard Model, since it corresponds to a chiral gauge theory, arbitrary matter fields
|
707 |
+
17
|
708 |
+
|
709 |
+
would lead to an anomalous theory. However, the matter content is such that the potential
|
710 |
+
anomaly is absent. This is precisely what we have done in the previous section to fix the
|
711 |
+
target space dimension to be 26; otherwise, the Weyl-symmetry becomes anomalous. In
|
712 |
+
this case, we expect constraints also on the background fields entering the non-linear sigma
|
713 |
+
models, i.e., constraints that the Gµν(X) and the Φ(X) fields need to obey.
|
714 |
+
We want now to write down the most general form that the Weyl anomaly can display.
|
715 |
+
Following D’Hoker [24], it is possible to show that the structure of the anomaly for unoriented
|
716 |
+
strings in a curved background needs to be of the form
|
717 |
+
⟨T a
|
718 |
+
a ⟩ = βG
|
719 |
+
µν(X)∂aXµ∂bXνγab + βΦ (X) R (γ) + βV
|
720 |
+
µ (X)gabD∗
|
721 |
+
a∂bXµ,
|
722 |
+
(35)
|
723 |
+
where D∗
|
724 |
+
a represents the covariant derivative on the product space of the cotangent space
|
725 |
+
of the worldsheet and the tangent space of the target space, and it can be explicitly written
|
726 |
+
down as
|
727 |
+
D∗
|
728 |
+
a∂bXµ = ∂a∂bXµ − Γc
|
729 |
+
ab∂cXµ + Γµ
|
730 |
+
νρ∂aXν∂bXρ,
|
731 |
+
(36)
|
732 |
+
where Γc
|
733 |
+
ab are the Christoffel symbols of the metric γab and Γµ
|
734 |
+
νρ represent the Christoffel
|
735 |
+
symbols of the metric Gµν. The last term in the Weyl anomaly, βV can be removed through
|
736 |
+
a transformation on the Xµ fields, since we are always able to perform a local transformation
|
737 |
+
on the Xµ fields at the same time that we perform a Weyl-rescaling of the metric. This
|
738 |
+
leaves only two independent β functionals: βG and βΦ2.
|
739 |
+
Hence we need to determine the β functionals obtained from the action (33). We want
|
740 |
+
to study perturbatively this action order by order in the α′ expansion, which is done by
|
741 |
+
assuming that the background fields Gµν(X), Φ(X) vary smoothly with respect to the scale
|
742 |
+
α′. It is conventional to do the computations in the background field formalism. In this for-
|
743 |
+
malism, we decompose the fields Xµ in a background part Xµ
|
744 |
+
0 and its quantum fluctuations
|
745 |
+
Y µ
|
746 |
+
Xµ (σ) = Xµ
|
747 |
+
0 (σ) + Y µ (σ) ,
|
748 |
+
(37)
|
749 |
+
where the integration is now performed with respect to the quantum fluctuations instead of
|
750 |
+
Xµ. We define the effective action Γ[X0, g] following [25] as
|
751 |
+
e−Γ[X0,g] =
|
752 |
+
�
|
753 |
+
DY e
|
754 |
+
−
|
755 |
+
�
|
756 |
+
S(X0,Y )−S(X0)−� d2σY µ(σ) δS
|
757 |
+
δXµ
|
758 |
+
0
|
759 |
+
�
|
760 |
+
,
|
761 |
+
(38)
|
762 |
+
2 For oriented strings there will be another β-functional associated with the Kalb-Ramond field.
|
763 |
+
18
|
764 |
+
|
765 |
+
which is the generating functional of the Feynman diagrams relevant for the computation of
|
766 |
+
the β-functionals.
|
767 |
+
At this point, it is better to pause and mention a crucial step in the computations. The
|
768 |
+
coordinate difference does not transform in a covariant way under changes of coordinates.
|
769 |
+
Hence, in order to obtain results that are manifestly covariant, it is better to do the com-
|
770 |
+
putation in variables that are manifestly covariant at intermediate steps. This can be done
|
771 |
+
as follows. Imagine that the coordinates Xµ
|
772 |
+
0 correspond to a given point p0 and the coor-
|
773 |
+
dinates Xµ = Xµ
|
774 |
+
0 + Y µ to a point p. If both points are close enough, there exists only one
|
775 |
+
geodesic with respect to Gµν connecting both of them. Hence, we can replace the coordinate
|
776 |
+
difference Y µ which characterizes the point p by the tangent vector tµ of the geodesic at the
|
777 |
+
point p0, which transforms covariantly under changes of coordinates. Hence, it is better to
|
778 |
+
use this vector as the integration variable in the path integral.
|
779 |
+
In fact, we can use this tangent vector tµ to perform a covariant Taylor expansion based
|
780 |
+
on Xµ
|
781 |
+
0 of an arbitrary tensor living in the target manifold. To put it explicitly, any tensor
|
782 |
+
Tµ1...µn(X) can be expanded as
|
783 |
+
Tµ1...µn(X0 + t) =
|
784 |
+
∞
|
785 |
+
�
|
786 |
+
k=0
|
787 |
+
T (k)
|
788 |
+
µ1...µnν1...νk(X0)tν1 . . . tνk,
|
789 |
+
(39)
|
790 |
+
where each of the terms T (k)
|
791 |
+
µ1...µnν1...νk is a combination of covariant derivatives of the tensor
|
792 |
+
Tµ1...µn and contractions with curvature tensors evaluated at X0. This expansion can be
|
793 |
+
achieved with the help of the normal coordinate expansion although we emphasize that it
|
794 |
+
remains valid in an arbitrary coordinate system since it is a tensor expression. We are inter-
|
795 |
+
ested in the expansion of the tensors Gµν, Φ(X) (the latter is a trivial tensor, i.e. a scalar),
|
796 |
+
and the object ∂a (Xµ
|
797 |
+
0 + Y µ). These expansions can be obtained after a straightforward
|
798 |
+
computation, see [25] for details:
|
799 |
+
Gµν(X) = Gµν(X0) + 1
|
800 |
+
3Rµρσνtρtσ + ...,
|
801 |
+
(40)
|
802 |
+
Φ(X) = Φ(X0) + ∇µΦ(X0)tµ + 1
|
803 |
+
2∇µ∇νΦ(X0)tµtν + ...,
|
804 |
+
(41)
|
805 |
+
∂a (Xµ
|
806 |
+
0 + Y µ) = ∂aXµ
|
807 |
+
0 + ∇atµ + 1
|
808 |
+
3Rµ
|
809 |
+
νρσ∂aXσ
|
810 |
+
0 tνtρ + ...,
|
811 |
+
(42)
|
812 |
+
where Rµ
|
813 |
+
νρσ represents the Riemann tensor associated with Gµν.
|
814 |
+
We are not ready to perform the diagrammatic computation yet. There is a problem
|
815 |
+
arising from the fact that the term that gives us the propagator for the quantum fields over
|
816 |
+
19
|
817 |
+
|
818 |
+
which we integrate, tµ, contains an arbitrary metric in front of it, i.e. we need to invert
|
819 |
+
a term that looks like Gµν(X0)∇atµ∇btν. The way to deal with this problem and obtain a
|
820 |
+
simple propagator is to introduce a vielbein eA
|
821 |
+
µ(X0) which fulfills the property
|
822 |
+
eA
|
823 |
+
µ(X0)eB
|
824 |
+
ν(X0)ηAB = Gµν(X0),
|
825 |
+
(43)
|
826 |
+
with ηAB a Lorentzian metric. In this way, we can rewrite all the vector expressions in the
|
827 |
+
non-holonomic basis eA
|
828 |
+
µ and get a trivial propagator for the tA = eA
|
829 |
+
µtµ fields. This comes
|
830 |
+
with a subtlety, because now the derivatives ∇a involve the spin-connection of the spacetime
|
831 |
+
ω AB
|
832 |
+
µ
|
833 |
+
; for example,
|
834 |
+
∇atA = ∂atA + ω AB
|
835 |
+
µ
|
836 |
+
∂aXµ
|
837 |
+
0 tCηBC.
|
838 |
+
(44)
|
839 |
+
Obtaining a trivial propagator means breaking the SO(D, 1) invariance that the theory
|
840 |
+
displays, but since we are working in a formalism that is explicitly gauge covariant, we
|
841 |
+
automatically know that there will always be contributions in the diagrammatic expansion
|
842 |
+
that make the theory explicitly gauge covariant in intermediate steps. Up to this point,
|
843 |
+
collecting all the information, we have performed the following expansion for the Polyakov
|
844 |
+
piece of the action:
|
845 |
+
SP = SP[X0] +
|
846 |
+
1
|
847 |
+
2πα′
|
848 |
+
�
|
849 |
+
d2σ√γγabGµν(X0)∂aXµ
|
850 |
+
0 ∇btν
|
851 |
+
(45)
|
852 |
+
+
|
853 |
+
1
|
854 |
+
4πα′
|
855 |
+
�
|
856 |
+
d2σ√γγab �
|
857 |
+
ηAB∇atA∇btB�
|
858 |
+
(46)
|
859 |
+
+
|
860 |
+
1
|
861 |
+
3πα′
|
862 |
+
�
|
863 |
+
d2σ√γγabRµABC∂aXµ
|
864 |
+
0 tAtB∇btC
|
865 |
+
(47)
|
866 |
+
+
|
867 |
+
1
|
868 |
+
12πα′
|
869 |
+
�
|
870 |
+
d2σ√γγabRABCDtBtC∇a∇atA∇btD,
|
871 |
+
(48)
|
872 |
+
and for the dilaton part we have the trivial structure:
|
873 |
+
SD[X0 + t] =SD[X0] − 1
|
874 |
+
8π
|
875 |
+
�
|
876 |
+
d2σ√γ∇AΦ(X0)tA
|
877 |
+
(49)
|
878 |
+
−
|
879 |
+
1
|
880 |
+
16π
|
881 |
+
�
|
882 |
+
d2σ√γ∇A∇BΦ(X0)tAtB + ... .
|
883 |
+
(50)
|
884 |
+
We recall that we can safely impose the equations of motion for the classical fields and safely
|
885 |
+
drop the linear terms. This is tantamount to a legitimate field redefinition.
|
886 |
+
Now we can determine the trace anomaly, see Eq. (35) from the effective action introduced
|
887 |
+
above. The computation requires to go to the next higher order in loops in the dilaton field,
|
888 |
+
20
|
889 |
+
|
890 |
+
since the piece of the action for the dilaton field α′ comes with an additional α′ with respect
|
891 |
+
to the other field. The computation is rather lengthy and hence we do not reproduce it
|
892 |
+
here [25]. We simply write down the result as
|
893 |
+
βG
|
894 |
+
µν = Rµν (G) − ∇µ∇νΦ + O(α′),
|
895 |
+
(51)
|
896 |
+
βΦ = D − 26
|
897 |
+
6
|
898 |
+
+ α′ �
|
899 |
+
−R (G) + 2∇2Φ + (∇Φ)2�
|
900 |
+
+ O
|
901 |
+
�
|
902 |
+
α′2�
|
903 |
+
.
|
904 |
+
(52)
|
905 |
+
A comment is in order now. If we are dealing with a flat worldsheet, the vanishing of βG
|
906 |
+
is enough to ensure the Weyl invariance at the quantum level, as long as we are working in
|
907 |
+
D = 26 dimensions, the critical dimension (see Eq. (35). Hence, in principle, we expect that
|
908 |
+
the same applies to non-flat worldsheets, i.e. that the condition βΦ = 0 is not independent
|
909 |
+
of βG = 0. Actually, we have a non-trivial constraint coming from the Bianchi identity
|
910 |
+
∇µ
|
911 |
+
�
|
912 |
+
Rµν (G) − 1
|
913 |
+
2R (G) Gµν
|
914 |
+
�
|
915 |
+
= 0.
|
916 |
+
(53)
|
917 |
+
This ensures that we have to the computed order the following identity whenever βG
|
918 |
+
µν = 0
|
919 |
+
∇µβG
|
920 |
+
µν = ∇νβΦ = 0,
|
921 |
+
(54)
|
922 |
+
as can be seen by direct calculation. This implies that βΦ is a constant as long as βG = 0.
|
923 |
+
By continuity, this automatically implies at this level that βΦ = 0 for D = 26 [25]. From
|
924 |
+
now on we will restrict ourselves to work in D = 26 and make a comment on strings on
|
925 |
+
non-critical dimension later.
|
926 |
+
B.
|
927 |
+
Including string-loop corrections
|
928 |
+
At this point, we have only focused on the zeroth-order in the gs-expansion. Although
|
929 |
+
it is clear that string loops should modify the results, it is not completely clear how those
|
930 |
+
corrections must be included. One of the most accepted proposals is the Fischler-Susskind
|
931 |
+
approach [8–10]. The idea behind such mechanism is that string loop divergences can be
|
932 |
+
absorbed through a renormalization of the background fields in the non-linear sigma models.
|
933 |
+
Let us illustrate this explicitly for unoriented closed bosonic strings. For the purpose of this
|
934 |
+
section, it is simpler to work with a a sharp cut-off as regularization scheme.
|
935 |
+
The divergences in string loops appear when we have to sum over conformally inequivalent
|
936 |
+
surfaces of a fixed topology (i.e. genus). For a fixed but arbitrary topology (i.e. we focus
|
937 |
+
21
|
938 |
+
|
939 |
+
here on non-trivial topologies), this sum is an integral over a finite-dimensional parameter
|
940 |
+
space, the so-called Teichm¨uller space [17, 18].
|
941 |
+
These integrals are divergent, but these
|
942 |
+
divergences arise from handles that shrink to zero size. These divergences are equivalent to
|
943 |
+
the divergences coming from inserting a local operator on the trivial-genus worldsheet. In a
|
944 |
+
flat spacetime, the divergence appearing for the torus topology can be eliminated through
|
945 |
+
the insertion of an operator log Λ
|
946 |
+
2π γabηµν∂aXµ∂bXν, with a suitable coefficient. Here Λ is a
|
947 |
+
suitable cut-off in the Teichm¨uller space.
|
948 |
+
If we move to a curved geometry Gµν with a non-trivial zero mode of the dilaton field Φ,
|
949 |
+
we need to substitute the metric Gµν and include a relative factor e−Φ to account for the
|
950 |
+
dependence of the path integral on the topology of the surface. We recall that the asymptotic
|
951 |
+
value of the dilaton field λ = ⟨Φ⟩ is identified with the string coupling constant gs = eλ
|
952 |
+
through an exponential relation, as it can be seen by comparison of the actions in Eq. (33)
|
953 |
+
and Eq. (28) [17, 18]. Explicitly for the first non-trivial order (torus topology) we have the
|
954 |
+
following divergences:
|
955 |
+
δSloop = log Λ
|
956 |
+
2π
|
957 |
+
�
|
958 |
+
d2σ√−γγabe−ΦGµν(X)∂aXµ∂bXν.
|
959 |
+
(55)
|
960 |
+
The e−Φ factor ensures that, when evaluated on the trivial topology on the worldsheet, it
|
961 |
+
captures the divergences in the torus. If the dilaton field displays a non-trivial background
|
962 |
+
profile Φ(X), not only a zero mode λ, we expect that replacing Φ with Φ(X) would lead to
|
963 |
+
a first term in an α′ expansion of the term. This term modifies the β-functional (we will
|
964 |
+
refer from now on to those β-functionals modified due to the the presence of string loop
|
965 |
+
corrections as ˜β) associated with the metric through the addition of a term δβG
|
966 |
+
µν to the
|
967 |
+
functional βG
|
968 |
+
µν above
|
969 |
+
˜βG
|
970 |
+
µν = βG
|
971 |
+
µν + δβG
|
972 |
+
��ν,
|
973 |
+
(56)
|
974 |
+
which looks like a cosmological constant term, i.e.
|
975 |
+
δβG
|
976 |
+
µν = Ce−ΦGµν,
|
977 |
+
(57)
|
978 |
+
where C is an arbitrary constant that arises in the renormalization procedure. On equal
|
979 |
+
footing, an additional contribution to the dilaton, which we call δβΦ will also appear, al-
|
980 |
+
though it is hard to evaluate explicitly.
|
981 |
+
Instead, it is easier to obtain it by applying a
|
982 |
+
consistency argument [8–10]. As we have argued above, in principle the vanishing of the
|
983 |
+
22
|
984 |
+
|
985 |
+
modified ˜βΦ-functional through string loop corrections is not independent of the vanishing
|
986 |
+
of the ˜βG
|
987 |
+
µν functional. As we have seen, in the CFT computation, it being constant is pre-
|
988 |
+
cisely a consequence of the vanishing of the remaining β-functionals. By this consistency
|
989 |
+
condition, it is possible to derive an equation for the ˜βΦ-function.
|
990 |
+
Taking the divergence of the ˜βG
|
991 |
+
µν and simplifying it through Bianchi identities and using
|
992 |
+
also the vanishing of ˜βG
|
993 |
+
µν itself, we find:
|
994 |
+
∇µ ˜βG
|
995 |
+
µν = ∇ν
|
996 |
+
�1
|
997 |
+
2R (G) − ∇2Φ − 1
|
998 |
+
2 (∇Φ)2
|
999 |
+
�
|
1000 |
+
(58)
|
1001 |
+
This leads us to the following ˜βΦ functional for the dilaton field:
|
1002 |
+
˜
|
1003 |
+
βΦ = α′
|
1004 |
+
�
|
1005 |
+
−R (G) + 2∇2Φ + 1
|
1006 |
+
2 (∇Φ)2
|
1007 |
+
�
|
1008 |
+
,
|
1009 |
+
(59)
|
1010 |
+
which knowing that is a constant, can be safely chosen to be equal to zero. In case that we
|
1011 |
+
were dealing with strings in non-critical dimension, an additional D − 26/6 factor should be
|
1012 |
+
included arising from the bc-ghost system contribution to the Weyl-anomaly at the string
|
1013 |
+
tree level. Notice that we have introduced α′ as a dimensionful parameter. Once we have
|
1014 |
+
reached this point, it is better to pause and recapitulate what we have done until now. We
|
1015 |
+
began analyzing the α′-expansion of the sigma model describing the propagation of strings in
|
1016 |
+
arbitrary backgrounds. We determined the β-functionals of the Weyl anomaly to the lowest
|
1017 |
+
order. Then we jumped into the problem of including string-loop corrections that should
|
1018 |
+
clearly modify the constraints that the background fields should obey. For the purpose of
|
1019 |
+
including such corrections, we noticed that the divergences arising from the string loops can
|
1020 |
+
be absorbed into a renormalization of the background fields Gµν and Φ. Hence, up to this
|
1021 |
+
point we have found a set of equations that these background fields need to obey for the
|
1022 |
+
consistent propagation of the strings.
|
1023 |
+
C.
|
1024 |
+
EFTs for the theory
|
1025 |
+
The consistency equations that we found arising from the Weyl anomaly cancellation and
|
1026 |
+
the cancellation of the divergences from string loop corrections resemble a lot the equations
|
1027 |
+
of motion of a given field theory for Gµ(X) and Φ(X):
|
1028 |
+
˜βG
|
1029 |
+
µν = Rµν (G) − ∇µ∇νΦ + Ce−ΦGµν + O(α′),
|
1030 |
+
(60)
|
1031 |
+
˜βΦ = D − 26
|
1032 |
+
6
|
1033 |
+
+ α′ �
|
1034 |
+
−R (G) + 2∇2Φ + (∇Φ)2�
|
1035 |
+
+ O
|
1036 |
+
�
|
1037 |
+
α′2�
|
1038 |
+
.
|
1039 |
+
(61)
|
1040 |
+
23
|
1041 |
+
|
1042 |
+
Setting C = 0 corresponds to omitting the string loop corrections. The natural question is
|
1043 |
+
then whether it is possible to obtain an effective action whose dynamics correctly reproduce
|
1044 |
+
these equations. In addition, such effective action needs to correctly account for the scatter-
|
1045 |
+
ing amplitudes involving only massless excitations of the string (to the lowest order in the
|
1046 |
+
α′ expansion) in order to be a sensible action. There are (at least) two effective actions that
|
1047 |
+
fullfill these criteria: match the scattering amplitudes involving gravitons and dilatons and
|
1048 |
+
their equations of motion give rise to the β-functionals. These two actions correspond to a
|
1049 |
+
GR-like EFT and a UG-like EFT. The GR-like EFT can be given as:
|
1050 |
+
SGR
|
1051 |
+
eff =
|
1052 |
+
1
|
1053 |
+
2κ2
|
1054 |
+
�
|
1055 |
+
dD+1X
|
1056 |
+
√
|
1057 |
+
−GeΦ
|
1058 |
+
�
|
1059 |
+
−(D − 26)
|
1060 |
+
6α′
|
1061 |
+
− 2Ce−Φ + R (G) + (∇Φ)2
|
1062 |
+
�
|
1063 |
+
+ O(α′).
|
1064 |
+
(62)
|
1065 |
+
From this action principle it is straightforward to obtain the β-functionals as
|
1066 |
+
˜βΦ = −2κ2 e−Φ
|
1067 |
+
√
|
1068 |
+
−G
|
1069 |
+
δSGR
|
1070 |
+
eff
|
1071 |
+
δΦ ,
|
1072 |
+
(63)
|
1073 |
+
˜βG
|
1074 |
+
µν = 2κ2 e−Φ
|
1075 |
+
√
|
1076 |
+
−G
|
1077 |
+
�δSGR
|
1078 |
+
eff
|
1079 |
+
δGµν + 1
|
1080 |
+
2Gµν
|
1081 |
+
δSGR
|
1082 |
+
eff
|
1083 |
+
δΦ
|
1084 |
+
�
|
1085 |
+
.
|
1086 |
+
(64)
|
1087 |
+
Furthermore, it is possible to perform a field redefinition to map this action to the Einstein
|
1088 |
+
Frame [18].
|
1089 |
+
Following [1] we know that it is also possible to write down an action principle which
|
1090 |
+
reproduces the same equations of motion that Eq. (62) displays, with the cosmological con-
|
1091 |
+
stant C entering as an integration constant instead of a coupling constant. To be concrete,
|
1092 |
+
we can write down the following action principle:
|
1093 |
+
SUG
|
1094 |
+
eff =
|
1095 |
+
1
|
1096 |
+
2κ2
|
1097 |
+
�
|
1098 |
+
dD+1XωeΦ
|
1099 |
+
�
|
1100 |
+
−(D − 26)
|
1101 |
+
6α′
|
1102 |
+
+ R( ˜
|
1103 |
+
G) + ( ˜∇Φ)2
|
1104 |
+
�
|
1105 |
+
+ O(α′).
|
1106 |
+
(65)
|
1107 |
+
If we compute the variation with respect to Gµν we obtain the traceless version of the
|
1108 |
+
equations obtained from Eq. (62). Explicitly, if we define
|
1109 |
+
δSUG
|
1110 |
+
eff
|
1111 |
+
δGµν
|
1112 |
+
= Kµν (G) − 1
|
1113 |
+
2K (G) ,
|
1114 |
+
(66)
|
1115 |
+
for the variation of SUG
|
1116 |
+
eff we obtain the following:
|
1117 |
+
δSUG
|
1118 |
+
eff
|
1119 |
+
δGµν = Kµν( ˜
|
1120 |
+
G) −
|
1121 |
+
1
|
1122 |
+
D + 1K( ˜
|
1123 |
+
G) ˜Gµν = 0.
|
1124 |
+
(67)
|
1125 |
+
with K( ˜
|
1126 |
+
G) = ˜GµνKµν( ˜
|
1127 |
+
G). Upon taking the divergence and using the generalized Bianchi
|
1128 |
+
identities for the corresponding tensor K entering the equations (see [1] for further details)
|
1129 |
+
24
|
1130 |
+
|
1131 |
+
we find:
|
1132 |
+
Eµν = Kµν( ˜
|
1133 |
+
G) − 1
|
1134 |
+
2K( ˜
|
1135 |
+
G) ˜Gµν + C ˜Gµν = 0.
|
1136 |
+
(68)
|
1137 |
+
Again, a suitable combination of these equations with the equation obtained from the equa-
|
1138 |
+
tion of motion for Φ we find:
|
1139 |
+
˜βΦ = −2κ2e−Φ
|
1140 |
+
ω
|
1141 |
+
δSUG
|
1142 |
+
eff
|
1143 |
+
δΦ ,
|
1144 |
+
(69)
|
1145 |
+
˜βG
|
1146 |
+
µν = 2κ2e−Φ
|
1147 |
+
ω
|
1148 |
+
�
|
1149 |
+
Eµν + 1
|
1150 |
+
2
|
1151 |
+
˜Gµν
|
1152 |
+
δSeff
|
1153 |
+
δΦ
|
1154 |
+
�
|
1155 |
+
,
|
1156 |
+
(70)
|
1157 |
+
confirming our claim that the Unimodular Gravity action (65) reproduces the β-functionals.
|
1158 |
+
Notice that this effective action does not only reproduce the β-functionals but it also repro-
|
1159 |
+
duces all of the scattering amplitudes involving massless excitations of the string (graviton
|
1160 |
+
and dilaton asymptotic states), as derived following the procedure sketched in the previous
|
1161 |
+
section. In that sense, both actions reproduce the desired properties and hence none of them
|
1162 |
+
is preferred over the other one from the perspective of using them as EFTs for the massless
|
1163 |
+
modes of the string.
|
1164 |
+
V.
|
1165 |
+
CONCLUSIONS
|
1166 |
+
We have analyzed the embedding of UG in string theory from the point of view of the
|
1167 |
+
consistent quantization of the strings in an arbitrary background. Furthermore, we have
|
1168 |
+
followed the proposal by Susskind and Fischler towards cancelling divergences arising from
|
1169 |
+
string loops with suitable counterterms in the non-linear sigma model. Our analysis here
|
1170 |
+
does not unveil any preference for UG or GR as a low energy description of string theory.
|
1171 |
+
This ties up the loose ends that were not analyzed in [1], regarding the embedding of UG
|
1172 |
+
in string theory. To put it explicitly: both UG and GR are equally valid as low energy
|
1173 |
+
descriptions of the massless modes of string theory and none of them seems to be preferred
|
1174 |
+
over the other one.
|
1175 |
+
Regarding future directions of work, we recall that our analysis here has focused on
|
1176 |
+
bosonic string theory. At first sight, the extension to superstring theory seems straightfor-
|
1177 |
+
ward although subtleties may arise in a careful study. Previous considerations of supergrav-
|
1178 |
+
ity in a UG-like context suggest that some of the vacua may spontenously break SUSY and
|
1179 |
+
hence both theories may develop a potential inequivalence at the quantum level [26–28].
|
1180 |
+
25
|
1181 |
+
|
1182 |
+
Although there is no analysis of the global degrees of freedom in such contexts, it should be
|
1183 |
+
mentioned that it seems possible that a careful implementation of SUSY in that contexts
|
1184 |
+
requires also from a fermionic global degree of freedom, which is the responsible for the
|
1185 |
+
apparent SUSY-breaking presented there.
|
1186 |
+
A second direction of work that is worthwhile exploring is that of non-perturbative defini-
|
1187 |
+
tions of string theory and its interplay with UG. For instance, the gauge/gravity correspon-
|
1188 |
+
dence (also called usually AdS/CFT) [29–31] and matrix models [32], among them probably
|
1189 |
+
we could highlight the BFSS matrix model [33]. In such contexts, we have not explored
|
1190 |
+
whether it is easy or not to accomodate a UG principle instead of a GR principle.
|
1191 |
+
ACKNOWLEDGMENTS
|
1192 |
+
The authors would like to thank Carlos Barcel´o and Ra´ul Carballo-Rubio for collab-
|
1193 |
+
oration in early stages of this project and invaluable discussions during the preparation
|
1194 |
+
of the manuscript.
|
1195 |
+
We would also like to thank Tom´as Ort´ın for helpful conversations.
|
1196 |
+
Financial support was provided by the Spanish Government through the projects PID2020-
|
1197 |
+
118159GB-C43, PID2020-118159GB-C44, and by the Junta de Andaluc´ıa through the
|
1198 |
+
project FQM219. GGM acknowledges financial support from the grant CEX2021-001131-S
|
1199 |
+
funded by MCIN/AEI/10.13039/501100011033. GGM is funded by the Spanish Government
|
1200 |
+
fellowship FPU20/01684.
|
1201 |
+
26
|
1202 |
+
|
1203 |
+
[1] R. Carballo-Rubio, L. J. Garay, and G. Garc´ıa-Moreno, (2022), arXiv:2207.08499 [gr-qc].
|
1204 |
+
[2] R. Carballo-Rubio, Phys. Rev. D 91, 124071 (2015), arXiv:1502.05278 [gr-qc].
|
1205 |
+
[3] G. ’t Hooft, NATO Sci. Ser. B 59, 135 (1980).
|
1206 |
+
[4] C. P. Burgess, Introduction to Effective Field Theory (Cambridge University Press, 2020).
|
1207 |
+
[5] A. Delhom, G. Garc´ıa-Moreno, M. Hohmann, A. Jim´enez-Cano, and T. S. Koivisto, (2022),
|
1208 |
+
arXiv:2211.13056 [gr-qc].
|
1209 |
+
[6] E. ´Alvarez, S. Gonzalez-Martin,
|
1210 |
+
and C. P. Mart´ın, Eur. Phys. J. C 76, 554 (2016),
|
1211 |
+
arXiv:1605.02667 [hep-th].
|
1212 |
+
[7] R. Carballo-Rubio, F. Di Filippo, and N. Moynihan, JCAP 10, 030 (2019), arXiv:1811.08192
|
1213 |
+
[hep-th].
|
1214 |
+
[8] W. Fischler and L. Susskind, Phys. Lett. B 171, 383 (1986).
|
1215 |
+
[9] W. Fischler and L. Susskind, Phys. Lett. B 173, 262 (1986).
|
1216 |
+
[10] W. Fischler, I. R. Klebanov, and L. Susskind, Nucl. Phys. B 306, 271 (1988).
|
1217 |
+
[11] S. Weinberg, Rev. Mod. Phys. 61, 1 (1989).
|
1218 |
+
[12] C. W. Misner, K. S. Thorne, and J. A. Wheeler, Gravitation (W. H. Freeman, San Francisco,
|
1219 |
+
1973).
|
1220 |
+
[13] C. M. Will, Theory and Experiment in Gravitational Physics (Cambridge University Press,
|
1221 |
+
2018).
|
1222 |
+
[14] M. Henneaux and C. Teitelboim, Physics Letters B 222, 195 (1989).
|
1223 |
+
[15] M. Henneaux and C. Teitelboim, Phys. Lett. B 143, 415 (1984).
|
1224 |
+
[16] E. Mottola, JHEP 11, 037 (2022), arXiv:2205.04703 [hep-th].
|
1225 |
+
[17] J. Polchinski, String theory. Vol. 1: An introduction to the bosonic string, Cambridge Mono-
|
1226 |
+
graphs on Mathematical Physics (Cambridge University Press, 2007).
|
1227 |
+
[18] M. B. Green, J. H. Schwarz, and E. Witten, Superstring Theory. Vol. 1: Introduction, Cam-
|
1228 |
+
bridge Monographs on Mathematical Physics (1988).
|
1229 |
+
[19] Y. Nakayama, Phys. Rept. 569, 1 (2015), arXiv:1302.0884 [hep-th].
|
1230 |
+
[20] J. D. Qualls, (2015), arXiv:1511.04074 [hep-th].
|
1231 |
+
[21] P. Di Francesco, P. Mathieu, and D. Senechal, Conformal Field Theory, Graduate Texts in
|
1232 |
+
Contemporary Physics (Springer-Verlag, New York, 1997).
|
1233 |
+
27
|
1234 |
+
|
1235 |
+
[22] D. J. Gross and V. Periwal, Phys. Rev. Lett. 60, 2105 (1988).
|
1236 |
+
[23] S. Mandelstam, Phys. Lett. B 277, 82 (1992).
|
1237 |
+
[24] P. Deligne, P. Etingof, D. S. Freed, L. C. Jeffrey, D. Kazhdan, J. W. Morgan, D. R. Morrison,
|
1238 |
+
and E. Witten, eds., Quantum fields and strings: A course for mathematicians. Vol. 1, 2
|
1239 |
+
(1999).
|
1240 |
+
[25] C. G. Callan, Jr. and L. Thorlacius, in Theoretical Advanced Study Institute in Elementary
|
1241 |
+
Particle Physics: Particles, Strings and Supernovae (TASI 88) (1989).
|
1242 |
+
[26] J. Anero, C. P. Martin, and R. Santos-Garcia, JHEP 01, 145 (2020), arXiv:1911.04160 [hep-
|
1243 |
+
-th].
|
1244 |
+
[27] J. Anero, C. P. Martin,
|
1245 |
+
and R. Santos-Garcia, JCAP 03, 006 (2020), arXiv:2001.05365
|
1246 |
+
[hep-th].
|
1247 |
+
[28] S. Bansal, S. Nagy, A. Padilla, and I. Zavala, JHEP 01, 146 (2021), arXiv:2010.13758 [hep-th].
|
1248 |
+
[29] J. M. Maldacena, Adv. Theor. Math. Phys. 2, 231 (1998), arXiv:hep-th/9711200.
|
1249 |
+
[30] O. Aharony, S. S. Gubser, J. M. Maldacena, H. Ooguri,
|
1250 |
+
and Y. Oz, Phys. Rept. 323, 183
|
1251 |
+
(2000), arXiv:hep-th/9905111.
|
1252 |
+
[31] J. Polchinski, in Theoretical Advanced Study Institute in Elementary Particle Physics: String
|
1253 |
+
theory and its Applications: From meV to the Planck Scale (2010) pp. 3–46, arXiv:1010.6134
|
1254 |
+
[hep-th].
|
1255 |
+
[32] P. H. Ginsparg and G. W. Moore, in Theoretical Advanced Study Institute (TASI 92): From
|
1256 |
+
Black Holes and Strings to Particles (1993) pp. 277–469, arXiv:hep-th/9304011.
|
1257 |
+
[33] T. Banks, W. Fischler, S. H. Shenker,
|
1258 |
+
and L. Susskind, Phys. Rev. D 55, 5112 (1997),
|
1259 |
+
arXiv:hep-th/9610043.
|
1260 |
+
28
|
1261 |
+
|
0NE1T4oBgHgl3EQf4wUX/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
2NFRT4oBgHgl3EQfmzfK/content/tmp_files/2301.13603v1.pdf.txt
ADDED
@@ -0,0 +1,1291 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.13603v1 [math.LO] 31 Jan 2023
|
2 |
+
Limits of structures and Total NP Search Problems∗
|
3 |
+
Ondřej Ježil
|
4 | |
5 |
+
Faculty of Mathematics and Physics, Charles University†
|
6 |
+
Abstract
|
7 |
+
For a class of finite graphs, we define a limit object relative to some computation-
|
8 |
+
ally restricted class of functions. The properties of the limit object then reflect how
|
9 |
+
a computationally restricted viewer “sees” a generic instance from the class. The
|
10 |
+
construction uses Krajíček’s forcing with random variables [7]. We prove sufficient
|
11 |
+
conditions for universal and existential sentences to be valid in the limit, provide sev-
|
12 |
+
eral examples, and prove that such a limit object can then be expanded to a model
|
13 |
+
of weak arithmetic. We then take the limit of all finite pointed paths to obtain a
|
14 |
+
model of arithmetic where the problem OntoWeakPigeon is total but Leaf (the
|
15 |
+
complete problem for PPA) is not. This can be viewed as a logical separation of
|
16 |
+
the oracle classes of total NP search problems, which in our setting implies standard
|
17 |
+
nonreducibility of Leaf to OntoWeakPigeon.
|
18 |
+
1
|
19 |
+
Introduction
|
20 |
+
There exist several logical constructions of limits of classes of finite structures such as
|
21 |
+
the ultraproduct and the compactness theorem. The latter was used in [2] to prove the
|
22 |
+
0–1 law for structures over relational vocabularies.
|
23 |
+
In combinatorics there are also several notions of limits of finite graphs. For example
|
24 |
+
the dense graph limit defined for a sequence of graphs {Gk}k>0 satisfying the condition
|
25 |
+
that
|
26 |
+
t(F, Gn) = |hom(F, G)|
|
27 |
+
|Gn||F |
|
28 |
+
,
|
29 |
+
converges for every fixed connected graph F, where hom(F, G) denotes the set of all graph
|
30 |
+
homomorphisms from F to G. This provided a framework (see [8]) to restate and find new
|
31 |
+
proofs for results in extremal graph theory — for instance Goodman’s theorem relating
|
32 |
+
the number of edges to the number of triangles in a graph. There are other notions of
|
33 |
+
limits of sequences of graphs, and we refer the interested reader to [10]. Another recent
|
34 |
+
use of limit objects for the results of extremal combinatorics was by Razborov in [11].
|
35 |
+
∗ This work has been supported by Charles University Research Center program No.UNCE/SCI/022.
|
36 |
+
† Sokolovská 83, Prague, 186 75, The Czech Republic
|
37 |
+
1
|
38 |
+
|
39 |
+
In this work, we define a new construction of a limit object. Given a class of finite
|
40 |
+
graphs G, whose vertex sets are initial segments of N, we can stratify it into the sequence
|
41 |
+
of sets {Gk}∞
|
42 |
+
k=1 as follows
|
43 |
+
Gk = {G ∈ G; G has {0, . . . , k − 1} as its vertex set}.
|
44 |
+
Our construction would yield a pseudofinite structure if limk→∞|Gk| = 1, but an
|
45 |
+
ordinary application of the compactness theorem suffices for that, we therefore generally
|
46 |
+
care about the case, where limk→∞|Gk| = ∞.1 We call such a sequence of sets of graphs
|
47 |
+
a wide sequence and the limit object its wide limit.
|
48 |
+
Let F be a class of functions with some computational restrictions, for example take
|
49 |
+
F to be the set of functions computed by decision trees of some small depth. We define
|
50 |
+
the wide limit denoted limF Gn, where n is a technical parameter to be defined later.
|
51 |
+
The wide limit limF Gn is a Boolean-valued graph2 — its edge relation does not only
|
52 |
+
permit the truth values 0 and 1 but also many other values from some infinite complete
|
53 |
+
Boolean algebra B. This algebra is in fact also a σ-algebra with a measure µ on it,
|
54 |
+
so to any statement formulated as a first order sentence ϕ we can assign a real number
|
55 |
+
µ([[ϕ]]) ∈ [0, 1] which measures how far is the truth value of ϕ (denoted [[ϕ]]) from the value
|
56 |
+
0. The key method we use is arithmetical forcing with random variables, developed in [7],
|
57 |
+
which allows us to construct models of (weak) arithmetical theories and by restricting to
|
58 |
+
a language of graphs gives us Boolean-valued graphs. In these Boolean-valued graphs,
|
59 |
+
validity of existential quantifiers corresponds to the ability of F to solve search problems
|
60 |
+
over the class of graphs we are considering.
|
61 |
+
Our limit object can be expanded to the original model Krajíček’s method would
|
62 |
+
otherwise construct. We prove (Theorem 5.8) that the truth values of first order sentences
|
63 |
+
concerning the object are preserved even when evaluated in the model of arithmetic
|
64 |
+
relativized to the wide limit (under a mild condition on the family F).
|
65 |
+
As an application of this construction, we take the limit of all finite paths starting
|
66 |
+
at the vertex 0 relative to the class of functions computed by oracle trees of subex-
|
67 |
+
ponential depth and obtain the Boolean-valued graph limFnb ∗PATHn which is an infi-
|
68 |
+
nite path with only one endpoint. This object is then expanded to a Boolean-valued
|
69 |
+
model of weak second order arithmetic K(∗PATHn, Fnb, Gnb) in which every instance of
|
70 |
+
OntoWeakPigeon has a solution. However, the object limFnb ∗PATHn in the model
|
71 |
+
K(∗PATHn, Fnb, Gnb) is an instance of the PPA-complete problem Leaf which does not
|
72 |
+
have a solution. This can be seen as a logical analogue of an oracle separation of these
|
73 |
+
two classes, which is known to hold3. We then show the result implies a separation of
|
74 |
+
those classes under stronger notion of reducibility.
|
75 |
+
1The case where the limit tends to some other positive number results in a structure which after
|
76 |
+
collapsing to a two-valued boolean algebra becomes pseudofinite too.
|
77 |
+
2Generally, we can do this with any L-structures for some first order language L. The limit object is
|
78 |
+
then a Boolean-valued L-structure limF Gn. In this work we restrict ourselves to the language of graphs
|
79 |
+
L = {E} to simplify the presentation.
|
80 |
+
3OntoWeakPigeon can be reduced to WeakPigeon which is known to be in PPP [6] and it is
|
81 |
+
known [1] that Leaf cannot be reduced to any problem in PPP.
|
82 |
+
2
|
83 |
+
|
84 |
+
There is already an established connection between complexity of search problems and
|
85 |
+
logic (namely bounded arithmetic, see [4]). The model we construct is not known nor ex-
|
86 |
+
pected to be a model of any theory which has been considered under these investigations.
|
87 |
+
However, we show that open induction and open comprehension is valid in this model,
|
88 |
+
and thus we show these principles along with the principle that OntoWeakPigeon is
|
89 |
+
total cannot prove that the problem Leaf is total. The way the model is constructed
|
90 |
+
also implies nonreducibility from Leaf to OntoWeakPigeon for subexponential time
|
91 |
+
oracle machines. Moreover, one can at least in theory tweak our construction (e.g. by
|
92 |
+
extending the family Fnb) to obtain a model of a stronger theory. This has been success-
|
93 |
+
fully done for several models already in [7, Chapter 10, Chapter 14, Chapter 21] using
|
94 |
+
the switching lemma.
|
95 |
+
2
|
96 |
+
Preliminaries
|
97 |
+
By graphs we mean structures in a language with a single binary relation denoted E
|
98 |
+
which is antireflexive and possibly symmetric if the graph in question is undirected. We
|
99 |
+
will denote any particular graph by ω as it will be used in some sense as a sample of a
|
100 |
+
discrete probability space. The edge relation of a particular graph ω will be denoted Eω.
|
101 |
+
In the rest of this section we recall notions needed for Krajíček’s forcing construc-
|
102 |
+
tion. Fundamental notion we use throughout the work is of nonstandard models of (true)
|
103 |
+
arithmetic. Let Lall be the language containing the names of all relations and functions
|
104 |
+
on the natural numbers and let ThLall(N) denote the set of true sentences in this lan-
|
105 |
+
guage. By classical results of logic there exist Lall-structures in which all sentences from
|
106 |
+
ThLall(N) are valid but which are not isomorphic to N. These are called nonstandard
|
107 |
+
models (of ThLall(N)).
|
108 |
+
All nonstandard models of ThLall(N) (and even much weaker theories) contain an
|
109 |
+
isomorphic copy of N as an initial segment. Therefore, we can assume that in fact all
|
110 |
+
models we encounter satisfy N ⊆ M.
|
111 |
+
After considering a concrete nonstandard model M (of ThLall(N)) we shall call the
|
112 |
+
elements of M\N nonstandard numbers. These can be intuitively understood as “infinite
|
113 |
+
natural numbers”. The key feature of those elements is that all functions and relations
|
114 |
+
from Lall are defined even on nonstandard numbers. This includes functions for coding
|
115 |
+
sequences and sets by numbers, and therefore we can use notation like a0, . . . , an−1 even
|
116 |
+
for a nonstandard number n. The notation then means that for each i ∈ M such that
|
117 |
+
i < n we have an object ai coded by a number in M and that this whole sequence is
|
118 |
+
coded by some number {ai}n−1
|
119 |
+
i=0 ∈ M. For a nonstandard number S ∈ M coding a set
|
120 |
+
we denote its nonstandard size (cardinality) to be |S|. In the case where we talk about
|
121 |
+
a binary string x the notation |x| denotes the bit length of x (which is nonstandard if x
|
122 |
+
is).
|
123 |
+
In the next section we will fix a nonstandard model M which has the model theoretic
|
124 |
+
property that it is ℵ1-saturated. There is a self-contained construction of such model
|
125 |
+
in [7, Appendix]. The only consequence of the ℵ1-saturation we shall use is the following.
|
126 |
+
Property. Let {ai}∞
|
127 |
+
i=0 be a sequence of standard numbers. Then there exists t ∈ M \N
|
128 |
+
3
|
129 |
+
|
130 |
+
and a sequence {bi}t
|
131 |
+
i=0 ∈ M such that for all i ∈ N it holds that ai = bi. We shall call
|
132 |
+
the sequence of {bi}t
|
133 |
+
i=0 the nonstandard prolongation of {ai}∞
|
134 |
+
i=0.
|
135 |
+
The language Lall contains symbols for all relations on N.
|
136 |
+
Since every sequence
|
137 |
+
of numbers can be defined by some relation it turns out that in our case there is a
|
138 |
+
unique nonstandard prolongation which matches the definition of the wide sequence (up
|
139 |
+
to length which can be chosen arbitrarily high). We can therefore allow ourselves to use
|
140 |
+
nonstandard numbers as indices of any sequences of objects unambiguously.
|
141 |
+
Any nonstandard model M can be extended to an ordered ring ZM by adding neg-
|
142 |
+
ative elements. This ring then can be extended to a fraction field QM. We shall call
|
143 |
+
elements of QM M-rationals. The field QM contains an isomorphic copy of Q as a sub-
|
144 |
+
structure. We call an element in QM with absolute valued greater than all k
|
145 |
+
1, k ∈ N,
|
146 |
+
infinite otherwise we call it finite. We call elements in QM with absolute value smaller
|
147 |
+
than all 1
|
148 |
+
k, k ∈ N infinitesimal.
|
149 |
+
We will denote the set of finite M-rationals as QM
|
150 |
+
fin and one can check it forms an
|
151 |
+
ordered ring.
|
152 |
+
Lemma (The existence of a standard part). There is a function st : QM
|
153 |
+
fin → R assigning
|
154 |
+
to each finite M-rational a real number. st is a ring homomorphism and the kernel of st
|
155 |
+
is exactly the ideal of infinitesimal numbers. When q is a finite M-rational we call st(q)
|
156 |
+
its standard part.
|
157 |
+
We shall use the structure QM analogously to how hyperreal numbers are used in
|
158 |
+
nonstandard analysis. For more details about nonstandard analysis we recommend [3]
|
159 |
+
to the interested reader. The following result characterizes convergence of sequences of
|
160 |
+
rational numbers using QM.
|
161 |
+
Theorem. Let {ai}∞
|
162 |
+
i=0 be a sequence of rational numbers and let r ∈ R.
|
163 |
+
Then the
|
164 |
+
following are equivalent.
|
165 |
+
• limi→∞ ai = r
|
166 |
+
• For every {bi}t
|
167 |
+
i=0, t ∈ M\N, which is a nonstandard prolongation of {ai}∞
|
168 |
+
i=0, there
|
169 |
+
is an nonstandard s0 ≤ t, such that for every nonstandard s ≤ s0: st(as) = r.
|
170 |
+
It is important for forcing with random variables to consider discrete probability
|
171 |
+
spaces of nonstandard size. We shall always use uniform distribution on the samples
|
172 |
+
(although this is not necessary for the general construction). Thus, the probability of an
|
173 |
+
event coded by an element A ∈ M is then just the M-rational number |A|/|S| where S
|
174 |
+
is the set of samples of such a space.
|
175 |
+
We conclude this section by restating classical inequalities used in this work using
|
176 |
+
the nonstandard approach.
|
177 |
+
Theorem (Bernoulli’s inequlity). Let y ∈ M, x ∈ QM and x ≥ −1, then
|
178 |
+
(1 + x)y ≥ 1 + yx.
|
179 |
+
Theorem (Exponential inequality). Let x ∈ M \ N, then
|
180 |
+
st
|
181 |
+
��
|
182 |
+
1 − 1
|
183 |
+
x
|
184 |
+
�x�
|
185 |
+
≤ e−1.
|
186 |
+
4
|
187 |
+
|
188 |
+
3
|
189 |
+
Wide limits
|
190 |
+
3.1
|
191 |
+
The definition
|
192 |
+
We shall define a wide limit of every sequence of the following form.
|
193 |
+
Definition 3.1. A sequence of sets of graphs {Gk}∞
|
194 |
+
k=1 is called a wide sequence if the
|
195 |
+
following holds:
|
196 |
+
• Every graph ω ∈ Gk has the vertex set {0, . . . , k − 1}.
|
197 |
+
• limk→∞|Gk| = ∞.
|
198 |
+
By abuse of notation we will simply talk about a wide sequence Gk instead of {Gk}∞
|
199 |
+
k=1.
|
200 |
+
Since a wide limit is a Boolean-valued graph, we need to construct a Boolean algebra in
|
201 |
+
which the truth evaluation of statements shall take place.
|
202 |
+
For the construction of the Boolean algebra we will closely follow [7, Chapter 1] albeit
|
203 |
+
with slight changes. Let us now fix for the rest of this work an ℵ1-saturated model of
|
204 |
+
ThLall(N) which we will denote M.
|
205 |
+
Definition 3.2. Let n ∈ M. We define
|
206 |
+
An = {A ⊆ {0, . . . , n − 1}; A ∈ M},
|
207 |
+
in words An is the set of subsets of {0, . . . , n − 1} coded by an element in M. This is
|
208 |
+
a boolean algebra and to each A ∈ An we assign an M-rational |A|/n which we call its
|
209 |
+
counting measure.
|
210 |
+
Even though An is a boolean algebra with a “measure” it is not a σ-algebra. Indeed,
|
211 |
+
An contains all singletons, but the countable set of those elements in {0, . . . , n − 1} with
|
212 |
+
only finitely many predecessors is not definable by compactness. However, having infinite
|
213 |
+
joins and meets at our disposal allows us to interpret quantifiers in the boolean valued
|
214 |
+
case, so we now want to ‘tweak’ this Boolean algebra.
|
215 |
+
Definition 3.3. Let I be the ideal of An consisting of elements with infinitesimal count-
|
216 |
+
ing measure. We define Bn = An/I. Each element in Bn is of the form A/I, where
|
217 |
+
A ∈ An, and we define µ(A/I) = st(|A|/n). We will denote the maximal element of Bn
|
218 |
+
by 1 and the minimal element by 0.
|
219 |
+
One can easily check that µ is well-defined since for all A ∈ I it holds that st(|A|/n) =
|
220 |
+
0. The measure µ is called the Loeb measure. The following then holds.
|
221 |
+
Lemma 3.4 ( [7, Lemma 1.2.1]). Bn is a σ-algebra with a real valued measure µ. More-
|
222 |
+
over, Bn is a complete boolean algebra.
|
223 |
+
It is important to note that 1 ∈ Bn is the only element of Bn with measure µ(1) = 1
|
224 |
+
and similarly 0 ∈ Bn is the only element with measure µ(0) = 0. Also, for B, B′ ∈ Bn
|
225 |
+
the inequality B ≤ B′ implies µ(B) ≤ µ(B′).
|
226 |
+
5
|
227 |
+
|
228 |
+
We now define precisely what we mean by the family of functions F relative to which
|
229 |
+
we will be taking the wide limit. This is still a part of Krajíček’s construction, we just
|
230 |
+
modify it to make it compatible with our setup — where we start with a wide sequence.
|
231 |
+
For every k ∈ N the set Gk is finite and thus can be coded by a number. Therefore,
|
232 |
+
there is a nonstandard prolongation of this sequence, and we can consider the set coded
|
233 |
+
by the nonstandard number Gn, which matches the definition of the wide sequence in M.
|
234 |
+
Definition 3.5. Let {Gk}∞
|
235 |
+
k=1 be a wide sequence and let n ∈ M \ N. We say that F is a
|
236 |
+
family of random variables on Gn if every α ∈ F is a function coded by a number in M
|
237 |
+
with domain Gn and taking values in M. We say α ∈ F is an F-vertex if for all ω ∈ Gn
|
238 |
+
it holds that α(ω) ∈ {0, . . . , n − 1}. The set of all F-vertices is denoted U(F).
|
239 |
+
If the wide sequence {Gk}∞
|
240 |
+
k=1 and the number n ∈ M \ N is clear from context we
|
241 |
+
just say F is a family of random variables. This is for now everything we need to recall
|
242 |
+
from [7], and we can proceed to define the central object of our work.
|
243 |
+
Definition 3.6 (The wide limit). Let {Gk}∞
|
244 |
+
k=1 be a wide sequence, let n ∈ M \ N and
|
245 |
+
let F be a family of random variables on Gn. We define the wide limit limF,n{Gk}∞
|
246 |
+
k=1 as
|
247 |
+
a Bn-valued structure in the language consisting of a single binary relation symbol {E}
|
248 |
+
as follows. The universe of the wide limit is taken as the set of all F-vertices. We now
|
249 |
+
inductively define the truth values for all {E}-sentences.
|
250 |
+
• [[α = β]] = {ω ∈ Gn; α(ω) = β(ω)}/I
|
251 |
+
• [[E(α, β)]] = {ω ∈ Gn; Eω(α(ω), β(ω))}/I
|
252 |
+
• [[ − ]] commutes with ¬, ∧ and ∨
|
253 |
+
• [[(∃x)A(x)]] = �
|
254 |
+
α∈U(F ) [[A(α)]]
|
255 |
+
• [[(∀x)A(x)]] = �
|
256 |
+
α∈U(F ) [[A(α)]]
|
257 |
+
By abuse of notation we will denote the wide limit limF,n{Gk}∞
|
258 |
+
k=1 by limF Gn. To
|
259 |
+
stress in which boolean valued structure is the truth evaluation [[ − ]] taking place we will
|
260 |
+
sometimes denote the evaluation C1[[ − ]], C2[[ − ]] for boolean valued structures C1 and C2
|
261 |
+
respectively. Furthermore, if C1[[ϕ]] = 1 for some sentence ϕ we say ϕ is valid in C1.
|
262 |
+
Note that since Gn can be recovered from F as the domain of its elements the wide
|
263 |
+
limit strictly speaking only depends on F. We keep Gn in the notation to cover the
|
264 |
+
situation where we have a very general family of functions (e.g. the family of polynomial
|
265 |
+
functions FPV) which can be applied to every wide sequence. Thus, the notation limF Gn
|
266 |
+
means that F is restricted to those functions which take elements of Gn as an input even
|
267 |
+
when F possibly contains other functions too.
|
268 |
+
The variability of the parameter n may also seem unnecessary and indeed in our
|
269 |
+
applications it is the case, but generally there are examples of wide sequences where n
|
270 |
+
directly affects the wide limit.
|
271 |
+
6
|
272 |
+
|
273 |
+
Example 3.7. Let Fconst be the family of all constant functions with domain Gn and
|
274 |
+
range anywhere in M. Let
|
275 |
+
Gk =
|
276 |
+
�
|
277 |
+
{({0, . . . , k − 1}, E); |E| = 2, (0, 1) ∈ E}
|
278 |
+
k even
|
279 |
+
{({0, . . . , k − 1}, E); |E| = 1, (0, 1) ̸∈ E}
|
280 |
+
k odd
|
281 |
+
then
|
282 |
+
lim
|
283 |
+
Fconst Gn[[E(0, 1)]] =
|
284 |
+
�
|
285 |
+
1
|
286 |
+
n even
|
287 |
+
0
|
288 |
+
n odd.
|
289 |
+
3.2
|
290 |
+
An example of a wide limit relative to shallow decision trees
|
291 |
+
Now we shall define the first nontrivial family of random variables relative to which we
|
292 |
+
shall take wide limits of several sequences. The functions in the family will be computed
|
293 |
+
by shallow decision trees. So the shape of the wide limit reflects what can ‘superloga-
|
294 |
+
rithmic’ trees witness in the wide sequence with probability arbitrarily close to 1.
|
295 |
+
Definition 3.8. Let Trud be a family of labeled rooted binary trees in M of the following
|
296 |
+
form. At each vertex the tree is labeled by an element of {0, . . . , n − 1} × {0, . . . , n − 1}
|
297 |
+
and the two outgoing edges incident to it are labeled as 0 and 1 respectively. The leaves
|
298 |
+
are labeled by an element of M. The depth of the tree is bounded by a number of a
|
299 |
+
form n1/t (rounded to the nearest element of M) for some t ∈ M \ N.
|
300 |
+
A computation of a T ∈ Trud on some ω ∈ Gn is defined as follows. Start at the root
|
301 |
+
and interpret each label (i, j) of the vertex as a question whether the pair (i, j) is in
|
302 |
+
the edge set Eω and follow a path through T reading 1 as a positive answer and 0 as a
|
303 |
+
negative answer. The label of the leaf visited at the end of the path is the output of T
|
304 |
+
on ω, denoted T(ω).
|
305 |
+
We define Frud to be the set of all functions computed by a tree T ∈ Trud.
|
306 |
+
The simplest wide sequence we shall consider is the following sequence of sets of
|
307 |
+
undirected graphs with exactly one edge.
|
308 |
+
Definition 3.9. EDGEk = {({0, . . . , k − 1}, E); |E| = 1}
|
309 |
+
Since any ω ∈ EDGEk has only 1 edge in all potential k · (k − 1)/2 edges, it is not
|
310 |
+
likely a shallow tree will find the edge. This is the idea behind the proof of the following
|
311 |
+
theorem.
|
312 |
+
Theorem 3.10.
|
313 |
+
lim
|
314 |
+
Frud
|
315 |
+
EDGEn[[(∃x)(∃y)E(x, y)]] = 0
|
316 |
+
Proof. Let α, β ∈ U(Frud), we proceed by proving that
|
317 |
+
[[E(α, β)]] = 0
|
318 |
+
which is enough to prove the theorem since even an infinite disjunction of the values 0
|
319 |
+
is 0.
|
320 |
+
7
|
321 |
+
|
322 |
+
Let α and β be computed by T ∈ Trud and S ∈ Trud respectively. Let the depth of
|
323 |
+
both T and S be at most n1/t, where t ∈ M \N. Walk down T from the root and always
|
324 |
+
prolong the path along the edge labeled 0. On this path we have a set of at most n1/t
|
325 |
+
different pairs of vertices and a label of the leaf lT .
|
326 |
+
We do the same for S, and we find another set of at most n1/t pairs of vertices and
|
327 |
+
a label of the leaf lS. lS and lT are then combined to one last pair (lS, lT ). Now we just
|
328 |
+
need to compute the probability that none of these 2n1/t + 1 pairs of vertices are not in
|
329 |
+
the edge set Eω.
|
330 |
+
There are
|
331 |
+
�n
|
332 |
+
2
|
333 |
+
�
|
334 |
+
different graphs in EDGEn and
|
335 |
+
�n−4n1/t−2
|
336 |
+
2
|
337 |
+
�
|
338 |
+
graphs which fulfill our
|
339 |
+
requirements. The probability is thus
|
340 |
+
�n−4n1/t−2
|
341 |
+
2
|
342 |
+
�
|
343 |
+
�n
|
344 |
+
2
|
345 |
+
�
|
346 |
+
= (n − 4n1/t − 2)(n − 4n1/t − 3)
|
347 |
+
n(n − 1)
|
348 |
+
≥ (n − 4n1/t − 3)2
|
349 |
+
n2
|
350 |
+
≥
|
351 |
+
�
|
352 |
+
1 − 4n1/t + 3
|
353 |
+
n
|
354 |
+
�2
|
355 |
+
≥
|
356 |
+
�
|
357 |
+
1 − 8n1/t + 6
|
358 |
+
n
|
359 |
+
�
|
360 |
+
after taking the standard part of the last line we get st(1 − 8n1/t+6
|
361 |
+
n
|
362 |
+
) = 1. Therefore,
|
363 |
+
µ([[E(α, β)]]) = 0 and [[E(α, β)]] = 0.
|
364 |
+
3.3
|
365 |
+
Sufficient conditions for validity of existential and universal sen-
|
366 |
+
tences
|
367 |
+
To analyze wide limits we need ideally to know the values of sentences which describe
|
368 |
+
properties whose complexity we are interested in. Generally this can be hard, so in this
|
369 |
+
section we prove sufficient conditions at least for the validity of universal and existential
|
370 |
+
sentences.
|
371 |
+
We will start with the simpler condition for the validity of universal sentences. This
|
372 |
+
is important also because we would like to know that a wide limit of a wide sequence
|
373 |
+
of graphs (i.e. antireflexive {E}-structures) is also a graph and that a wide limit of a
|
374 |
+
wide sequence of undirected graphs (directed graphs with E symmetric) is an undirected
|
375 |
+
graph. All of these properties are expressible as universal sentences.
|
376 |
+
Theorem 3.11. Let Gk be a wide sequence and let F be any family of random variables.
|
377 |
+
Let ϕ(x0, . . . , xl−1) be an open {E}-formula and assume that
|
378 |
+
lim
|
379 |
+
k→∞ Pr
|
380 |
+
ω∈Gk
|
381 |
+
[ω |= (∀x)ϕ(x)] = 1.
|
382 |
+
Then limF Gn[[(∀x)ϕ(x)]] = 1.
|
383 |
+
8
|
384 |
+
|
385 |
+
Proof. By induction in M we have that st(Prω∈Gn[ω |= (∀x)ϕ(x)]) = 1. Therefore, we
|
386 |
+
have for every tuple of F-vertices α that [[ϕ(α)]] = 1. Now
|
387 |
+
[[(∀x)ϕ(x)]] =
|
388 |
+
�
|
389 |
+
α∈U(F )l
|
390 |
+
[[ϕ(α)]]
|
391 |
+
=
|
392 |
+
�
|
393 |
+
α∈U(F )l
|
394 |
+
1
|
395 |
+
= 1.
|
396 |
+
Corollary 3.12. Let Gk be a wide sequence and F any family of random variables.
|
397 |
+
• If all ω ∈ Gk, k ∈ N, are directed graphs ({E}-structures satisfying that E is antire-
|
398 |
+
flexive) then limF Gn is a Boolean-valued {E}-structure in which the antireflexivity
|
399 |
+
of E is valid (i.e. limF Gn is a Boolean-valued graph).
|
400 |
+
• If all ω ∈ Gk, k ∈ N, are undirected graphs (directed graphs where E is symmetric)
|
401 |
+
then limF Gn is an {E}-structure in which both antireflexivity and symmetry of E
|
402 |
+
is valid. (i.e. limF is a Boolean-valued undirected graph)
|
403 |
+
Now to give a sufficient condition for the validity of an existential sentence (∃x)ϕ(x)
|
404 |
+
we use the auxiliary value of density of ϕ(x0, . . . , xl−1) defined as the probability that a
|
405 |
+
random graph ω ∈ Gk and a random tuple a ∈ {0, . . . , k − 1}l satisfy ω |= ϕ(a) and show
|
406 |
+
that the limiting density gives a lower bound for the measure of [[(∃x)ϕ(x)]].
|
407 |
+
Theorem 3.13. Let Gk be a wide sequence and let F be a family of random variables
|
408 |
+
which contains all constant functions. Let ϕ(x0, . . . , xl−1) be an open {E}-formula and
|
409 |
+
let p ∈ [0, 1]. Assume that
|
410 |
+
lim
|
411 |
+
k→∞ Pr
|
412 |
+
ω∈Gk
|
413 |
+
a
|
414 |
+
[ω |= ϕ(a)] ≥ p,
|
415 |
+
where a is sampled uniformly over all elements of {0, . . . , k − 1}l. Then
|
416 |
+
µ(lim
|
417 |
+
F Gn[[(∃x)ϕ(x)]]) ≥ p.
|
418 |
+
In particular if p = 1 then limF Gn[[(∃x)ϕ(x)]] = 1.
|
419 |
+
Proof. Consider an array C indexed by ω ∈ Gn and a ∈ {0, . . . , n − 1}l such that
|
420 |
+
Cω,a =
|
421 |
+
�
|
422 |
+
1
|
423 |
+
ω |= ϕ(a)
|
424 |
+
0
|
425 |
+
otherwise.
|
426 |
+
By the assumption and induction in M we have that
|
427 |
+
st
|
428 |
+
�
|
429 |
+
1
|
430 |
+
nl|Gn|
|
431 |
+
�
|
432 |
+
ω∈Gn
|
433 |
+
�
|
434 |
+
a
|
435 |
+
Cω,a
|
436 |
+
�
|
437 |
+
≥ p.
|
438 |
+
9
|
439 |
+
|
440 |
+
We now claim that there exists a specific b ∈ {0, . . . , n−1}l such that st(Prω∈Gn[ω |=
|
441 |
+
ϕ(b)]) ≥ p. Assume for contradiction that the claim is false. Then
|
442 |
+
1
|
443 |
+
|Gn|nl
|
444 |
+
�
|
445 |
+
ω∈Gn
|
446 |
+
�
|
447 |
+
a
|
448 |
+
Cω,α = 1
|
449 |
+
nl
|
450 |
+
�
|
451 |
+
a
|
452 |
+
Pr
|
453 |
+
ω∈Gn[ω |= ϕ(a)]
|
454 |
+
≤ Pr
|
455 |
+
ω∈Gn[ω |= ϕ(a0)],
|
456 |
+
where we pick a0 such that it maximizes Prω∈Gn[ω |= ϕ(a0)].
|
457 |
+
But after taking the
|
458 |
+
standard part of the inequality we obtain that
|
459 |
+
st
|
460 |
+
�
|
461 |
+
1
|
462 |
+
nl|Gn|
|
463 |
+
�
|
464 |
+
ω∈Gn
|
465 |
+
�
|
466 |
+
a
|
467 |
+
Cω,a
|
468 |
+
�
|
469 |
+
≤ st( Pr
|
470 |
+
ω∈Gn[ω |= ϕ(a0)]) < p.
|
471 |
+
Which is a contradiction and so the claim is true. Let γb be a tuple of constant
|
472 |
+
functions which is at every sample equal to b. We have
|
473 |
+
[[(∃x)ϕ(x)]] =
|
474 |
+
�
|
475 |
+
α∈U(F )l
|
476 |
+
[[ϕ(α)]]
|
477 |
+
≥ [[ϕ(γb)]]
|
478 |
+
and by taking µ of this inequality we finally obtain that µ([[(∃x)ϕ(x)]]) ≥ p.
|
479 |
+
In the following example we use Theorem 3.13 to show that in the wide limit of graphs
|
480 |
+
which have exactly one large clique and no other edges the nonexistence of a standard
|
481 |
+
sized clique cannot be valid relative to any F with all constants.
|
482 |
+
Example 3.14. Consider the wide sequence
|
483 |
+
SK1/2
|
484 |
+
k
|
485 |
+
= {({0, . . . , k − 1}, E); E has a clique of size ⌊k/2⌋ and no other edges}.
|
486 |
+
We will check that for an {E}-formula ϕl(x) which states that x forms a clique of size l
|
487 |
+
we have
|
488 |
+
lim
|
489 |
+
k→∞
|
490 |
+
Pr
|
491 |
+
ω∈SK1/2
|
492 |
+
k
|
493 |
+
a
|
494 |
+
[ω |= ϕl(a)] ≥ (1/2)l.
|
495 |
+
Notice that we can compute the probability for a fixed a such that ai ̸= aj whenever
|
496 |
+
i ̸= j, since the ratio of tuples containing some vertex twice is infinitesimal. So we have
|
497 |
+
Pr
|
498 |
+
ω∈SK1/2
|
499 |
+
k
|
500 |
+
[ω |= ϕl(a)] =
|
501 |
+
l−1
|
502 |
+
�
|
503 |
+
i=0
|
504 |
+
�
|
505 |
+
1 − k − ⌊k/2⌋
|
506 |
+
k − i
|
507 |
+
�
|
508 |
+
≥
|
509 |
+
�
|
510 |
+
1 − k − ⌊k/2⌋
|
511 |
+
k − l
|
512 |
+
�l
|
513 |
+
≥
|
514 |
+
�
|
515 |
+
1 −
|
516 |
+
1
|
517 |
+
2(1 − l/k) −
|
518 |
+
1
|
519 |
+
k − l
|
520 |
+
�l
|
521 |
+
10
|
522 |
+
|
523 |
+
and since l ∈ N we just take the limit of the inner expression. But one can see that
|
524 |
+
limk→∞(1 − l/k) = 1 and that limk→∞(1/(k − l)) = 1.
|
525 |
+
Now by Theorem 3.13 we obtain that for any F that contains all constants we have
|
526 |
+
lim
|
527 |
+
F SK1/2
|
528 |
+
n [[(∃x)ϕl(x)]] > 0.
|
529 |
+
The following example demonstrates that Theorem 3.11 cannot be generalized to a
|
530 |
+
similar hypothesis as Theorem 3.13.
|
531 |
+
Example 3.15. Let Gk consist of all undirected graphs on the vertex set {0, . . . , k − 1}
|
532 |
+
with exactly ⌈ k(k−1)
|
533 |
+
2 log(k)⌉edges. One can see that
|
534 |
+
lim
|
535 |
+
k→∞ Pr
|
536 |
+
ω���Gk
|
537 |
+
x,y
|
538 |
+
[ω |= ¬E(x, y)] = 1,
|
539 |
+
but in fact limFrud Gn[[(∀x)(∀y)¬E(x, y)]] = 0.
|
540 |
+
Let t ∈ M \ N such that n1/t is not bounded above by a standard number. Let T be
|
541 |
+
a tree which queries on all paths a fixed set of n1/t different potential edges. If we prove
|
542 |
+
that any such set in Gn has to contain at least one edge with probability infinitesimally
|
543 |
+
close to 1 then we can construct Frud-vertices α and β using T such that [[E(α, β)]] = 1
|
544 |
+
by simply taking T and labeling each leaf on a path which finds an edge with one of the
|
545 |
+
vertices incident to this edge.
|
546 |
+
Let S be the set of potential edges queried by T and let m =
|
547 |
+
�n
|
548 |
+
2
|
549 |
+
�
|
550 |
+
. Now we have
|
551 |
+
Pr
|
552 |
+
ω∈Gn[S contains no edge in ω] =
|
553 |
+
(m − n1/t)!(m − ⌈ m
|
554 |
+
log n⌉!)
|
555 |
+
m!(m − ⌈
|
556 |
+
m
|
557 |
+
log m⌉ − n1/t)!
|
558 |
+
=
|
559 |
+
n1/t−1
|
560 |
+
�
|
561 |
+
i=0
|
562 |
+
m − ⌈ m
|
563 |
+
log n⌉ − i
|
564 |
+
m − i
|
565 |
+
≤
|
566 |
+
�
|
567 |
+
1 −
|
568 |
+
⌈ m
|
569 |
+
log n⌉
|
570 |
+
m
|
571 |
+
�n1/t
|
572 |
+
≤
|
573 |
+
�
|
574 |
+
1 −
|
575 |
+
1
|
576 |
+
2 log n
|
577 |
+
�n1/t
|
578 |
+
standard part of which is for all k ∈ N bounded above by
|
579 |
+
st
|
580 |
+
��
|
581 |
+
1 −
|
582 |
+
1
|
583 |
+
2 log n
|
584 |
+
�k·2 log n�
|
585 |
+
≤ e−k
|
586 |
+
which tends to 0 as k → ∞.
|
587 |
+
11
|
588 |
+
|
589 |
+
4
|
590 |
+
A wide limit of Leaf instances relative to oracle trees
|
591 |
+
The class of total NP search problems TFNP, first defined in [9], consists of all relations
|
592 |
+
on binary strings P(x, y) such that:
|
593 |
+
• (verifiability in polynomial time) There is a polynomial time machine M which,
|
594 |
+
given x, y, can decide whether P(x, y) holds.
|
595 |
+
• (totality) There exists a polynomial p and for every x there exists at least one y
|
596 |
+
satisfying |y| ≤ p(|x|) such that P(x, y) holds.
|
597 |
+
Two particular problems are relevant for us.
|
598 |
+
The problem Leaf is formulated as follows. An instance is given by a number k and
|
599 |
+
a undirected graph ω on the vertex set {0, . . . , 2|k| − 1}, presented by a Boolean circuit
|
600 |
+
of polynomial size in |k| computing its neighborhood function, such that degω(0) = 1
|
601 |
+
and ∀v : degω(v) ≤ 2. The task is then to find some nonzero v with degω(v) = 1. The
|
602 |
+
corresponding combinatorial principle being the handshaking lemma, which assures the
|
603 |
+
problem is total.
|
604 |
+
The problem OntoWeakPigeon is formulated as follows.
|
605 |
+
An instance is given
|
606 |
+
by a number k and two functions A : {0, . . . , 2|k| − 1} → {0, . . . , 2|k|−1 − 1} and B :
|
607 |
+
{0, . . . , 2|k|−1 − 1} → {0, . . . , 2|k| − 1}, each presented by a Boolean circuit of polynomial
|
608 |
+
size in |k|. The task is then to find some x such that B(A(x)) ̸= x or some y such
|
609 |
+
that A(B(y)) ̸= y. The corresponding combinatorial principle being the bijective weak
|
610 |
+
pigeonhole principle, which assures the problem is total. The domain of A is twice as
|
611 |
+
large as its range, so B and A cannot form a pair of inverse functions between their
|
612 |
+
respective domains.
|
613 |
+
So far, we presented what is called ‘type 1’ problem in [1]. We are interested about the
|
614 |
+
‘type 2’ problems which replace the input function(s) with oracle(s). So in the ‘type 2’
|
615 |
+
Leaf problem, the input is a pair (α, x) where α is an oracle which describes the neighbor
|
616 |
+
function on G with vertex set {0, . . . , 2|x| − 1}. For the ‘type 2’ OntoWeakPigeon
|
617 |
+
problem, the input is a triple (α, β, x), where α and β are oracles describing the functions
|
618 |
+
α : {0, . . . , 2|x| − 1} → {0, . . . , 2|x|−1 − 1} and β : {0, . . . , 2|x|−1 − 1} → {0, . . . , 2|x| − 1}.
|
619 |
+
The associated computational models for the ‘type 1’ problems are Turing machines
|
620 |
+
and for the ‘type 2’ problems oracle Turing machines.
|
621 |
+
4.1
|
622 |
+
The wide limit and oracle trees
|
623 |
+
The wide sequence ∗PATHk (pointed paths on k vertices) consists of all undirected graphs
|
624 |
+
ω on the vertex set {0, 1, . . . , k − 1} which are isomorphic to a path with k − 1 edges
|
625 |
+
connecting all vertices and degω(0) = 1. Graphs in ∗PATHk are ‘the hardest instances
|
626 |
+
of Leaf’ so we can expect the wide limit to reflect the complexity of these instances
|
627 |
+
relative to the family F we choose.
|
628 |
+
Since each ω ∈ ∗PATHk has only k − 1 edges we can proceed similarly to the proof
|
629 |
+
of Theorem 3.10 to get the following.
|
630 |
+
Lemma 4.1. limFrud ∗PATHn[[(∃x)(∃y)E(x, y)]] = 0
|
631 |
+
12
|
632 |
+
|
633 |
+
To get a result which reflects the properties of the wide sequence more faithfully we
|
634 |
+
will define a new family of random variables on ∗PATHn.
|
635 |
+
Definition 4.2. We define Tnb as the set of all labeled rooted trees of the following shape:
|
636 |
+
• Each non-leaf node is labeled by some v ∈ {0, . . . , n − 1}.
|
637 |
+
• For each {u, w} ⊆ {0, . . . , n − 1} and a node v there is an outgoing edge from v
|
638 |
+
labeled {u, w} (it can be that u = w).
|
639 |
+
• Each leaf is labeled by some m ∈ M.
|
640 |
+
• The depth of the tree is defined as the maximal number of edges in a path from
|
641 |
+
the root, and we require it is at most n1/t (rounded to the nearest element of M)
|
642 |
+
for some t ∈ M \ N.
|
643 |
+
The computation of such a tree in Tnb on ω ∈ ∗PATHn is defined as follows. We
|
644 |
+
build a path by starting at the root and interpreting every vertex labeled by some v as
|
645 |
+
a question ‘what are the neighbors of the vertex v?’ and we follow the output edge with
|
646 |
+
the answer and continue analogously until we find a leaf. The label of the leaf is defined
|
647 |
+
to be the output of the computation.
|
648 |
+
We define Fnb to be the set of all functions on ∗PATHn which are computed by some
|
649 |
+
T ∈ Tnb.
|
650 |
+
The trees computing the functions in Fnb can be thought of as a protocol describing
|
651 |
+
the behavior of a machine M communicating with an oracle describing a particular
|
652 |
+
ω ∈ ∗PATHn. In the study of total NP search problems presented by oracles, we usually
|
653 |
+
denote the size of the object by some 2|x| where x is an additional input to the problems.
|
654 |
+
If 2|x| = n then n1/t = 2|x|/t which for t ∈ M \ N corresponds to protocols describing
|
655 |
+
non-uniform subexponential-time computations. If we prove that no tuple of Fnb-vertices
|
656 |
+
satisfies some open {E}-formula in limFnb ∗PATH we also prove that subexponential-time
|
657 |
+
oracle machines cannot solve the corresponding type 2 problem on a non-diminishing
|
658 |
+
fraction of the inputs. In the rest of this section we proceed to prove that limFnb ∗PATHn
|
659 |
+
has no vertex with degree 1 other than the vertex 0.
|
660 |
+
To do so, we will consider computations of trees on samples with different nonstandard
|
661 |
+
lengths. For the rest of this section we put Gm = ∗PATHm for all m ∈ M, but we can
|
662 |
+
assume m to be smaller than n. We define T (m)
|
663 |
+
nb
|
664 |
+
to be the subset of Tnb consisting of
|
665 |
+
all the trees that have the vertex labels from {0, . . . , m − 1}. For trees in T (m)
|
666 |
+
nb
|
667 |
+
we can
|
668 |
+
extend the definition of a computation to input graphs from Gm in a straight forward
|
669 |
+
way.
|
670 |
+
Definition 4.3. We say a tree T ∈ T (m)
|
671 |
+
nb
|
672 |
+
fails on ω ∈ Gm if the output of T on ω has
|
673 |
+
degree 2.
|
674 |
+
Definition 4.4. Let m ∈ M, v ∈ {0, . . . , m − 1} and {u, w} ⊆ {0, . . . , m − 1} we define
|
675 |
+
Gv:{u,w}
|
676 |
+
m
|
677 |
+
= {ω ∈ Gm; ω |= E(v, u) ∧ E(v, w)}.
|
678 |
+
13
|
679 |
+
|
680 |
+
Lemma 4.5. Let m ∈ M and let u, v and w be distinct elements of {1, . . . , m−1}. Then
|
681 |
+
there are bijections:
|
682 |
+
Gv:{u,w}
|
683 |
+
m
|
684 |
+
∼= Gm−2 × {L, R}
|
685 |
+
Gv:{u,0}
|
686 |
+
m
|
687 |
+
∼= Gm−2
|
688 |
+
Gv:{u}
|
689 |
+
m
|
690 |
+
∼= Gm−1
|
691 |
+
G0:{u}
|
692 |
+
m
|
693 |
+
∼= Gm−1
|
694 |
+
Proof. For the first case a bijection can be given as follows.
|
695 |
+
Contract u, v and w to
|
696 |
+
just one vertex min{u, v, w} and if u is closer to 0 than w pick L otherwise pick R
|
697 |
+
and relabel the remaining vertices using a function ‘new’ which has a property that if
|
698 |
+
u′, v′ remain and u′ < v′ as numbers then new(u′) < new(w′) and the range of new is
|
699 |
+
{0, . . . , m−2}. This can be inverted by first renaming the vertices using new−1 and then
|
700 |
+
replacing min{u, v, w} by a path (u, v, w) with the orientation given either by L or R.
|
701 |
+
The second bijection is almost the same, but the orientation is clear since u is always
|
702 |
+
the neighbor further from 0 since the other neighbor is 0.
|
703 |
+
The third and fourth bijections are given by just removing one end of the graph and
|
704 |
+
relabeling.
|
705 |
+
Definition 4.6. Let m ∈ M and v ∈ {0, . . . , m − 1}.
|
706 |
+
Let u and w be elements of
|
707 |
+
{0, . . . , m − 1} \ {v} and let T ∈ T (m)
|
708 |
+
nb
|
709 |
+
be a tree with the root labeled v. By Tv:{u,w} we
|
710 |
+
denote the induced subtree whose root is the vertex neighboring the root of T via the
|
711 |
+
edge labeled {u, w}.
|
712 |
+
Lemma 4.7. Let m ∈ M. Let T ∈ T (m)
|
713 |
+
nb
|
714 |
+
be a tree with the root labeled v ̸= 0. For
|
715 |
+
each u and w which are distinct elements of {0, . . . , m − 1} \ {v} there exists a tree
|
716 |
+
˜Tv:{u,w} ∈ T (m−2)
|
717 |
+
nb
|
718 |
+
of the same depth as Tv:{u,w} such that
|
719 |
+
Pr
|
720 |
+
ω∈Gm[Tv:{u,w} fails | ω |= E(v, u) ∧ E(v, w)] =
|
721 |
+
Pr
|
722 |
+
ω∈Gm−2[ ˜Tv:{u,w} fails].
|
723 |
+
If T has the root labeled 0 then there exists a tree ˜T0:{u} ∈ T (m−1)
|
724 |
+
nb
|
725 |
+
of the same depth
|
726 |
+
as T0:{u} such that
|
727 |
+
Pr
|
728 |
+
ω∈Gm[T0:{u} fails | ω |= E(0, u)] =
|
729 |
+
Pr
|
730 |
+
ω∈Gm−1[ ˜T0:{u} fails].
|
731 |
+
Proof. In the case where the root is labeled by v ∈ {1, . . . , m − 1} we can construct
|
732 |
+
the tree ˜Tv:{u,w} by simply relabeling vertices of Tv:{u,w}. We use the relabeling function
|
733 |
+
‘new’ from the proof of Lemma 4.5. Now for every ω ∈ Gm there is by the first bijection in
|
734 |
+
Lemma 4.5 a uniquely determined ω′ ∈ Gm−2. The computation of ˜Tv:{u,w} on ω′ is then
|
735 |
+
of the same shape as the computation of Tv:{u,w} on ω assuming ω |= E(v, u) ∧ E(v, w).
|
736 |
+
And ˜Tv:{u,w}(ω′) has the same degree in ω′ as Tv:{u,w}(ω) does in ω.
|
737 |
+
The case where the root is labeled by 0 is analogous, but we instead use the relabeling
|
738 |
+
from the fourth bijection in Lemma 4.5.
|
739 |
+
14
|
740 |
+
|
741 |
+
Lemma 4.8. Let T ∈ T (m)
|
742 |
+
nb
|
743 |
+
of depth d ∈ M and let d ≤ m. Then we have
|
744 |
+
Pr
|
745 |
+
ω∈Gm[T fails] ≥
|
746 |
+
d
|
747 |
+
�
|
748 |
+
i=0
|
749 |
+
�
|
750 |
+
1 −
|
751 |
+
2
|
752 |
+
m − 2i − 2
|
753 |
+
�
|
754 |
+
.
|
755 |
+
Proof. We proceed by induction on d. The case d = 0 follows from
|
756 |
+
Pr
|
757 |
+
ω∈Gm[T fails] ≥
|
758 |
+
�
|
759 |
+
1 −
|
760 |
+
1
|
761 |
+
m − 1
|
762 |
+
�
|
763 |
+
≥
|
764 |
+
�
|
765 |
+
1 −
|
766 |
+
2
|
767 |
+
m − 2
|
768 |
+
�
|
769 |
+
.
|
770 |
+
Now for the inductive case we assume the lemma holds for d − 1, and prove it for d. If
|
771 |
+
the root of T is labeled 0 we proceed as follows. For a given T let u0 be the vertex which
|
772 |
+
minimizes the value Prω∈Gm[T fails | E(0, u0)] which exists by the least number principle
|
773 |
+
in M. Then by Lemma 4.7 and the induction hypothesis
|
774 |
+
Pr
|
775 |
+
ω∈Gm[T fails] ≥
|
776 |
+
Pr
|
777 |
+
ω∈Gm[T fails | E(0, u0)]
|
778 |
+
=
|
779 |
+
Pr
|
780 |
+
ω∈Gm−1[ ˜T0:{u0} fails]
|
781 |
+
≥
|
782 |
+
d−1
|
783 |
+
�
|
784 |
+
i=0
|
785 |
+
�
|
786 |
+
1 −
|
787 |
+
2
|
788 |
+
m − 2i − 3
|
789 |
+
�
|
790 |
+
≥
|
791 |
+
d
|
792 |
+
�
|
793 |
+
i=0
|
794 |
+
�
|
795 |
+
1 −
|
796 |
+
2
|
797 |
+
m − 2i − 2
|
798 |
+
�
|
799 |
+
.
|
800 |
+
Now for the case where the root of T is labeled by nonzero v. First we note that
|
801 |
+
Pr
|
802 |
+
ω∈Gm[v has degree 2 ∧ ¬E(v, 0)] = 1 −
|
803 |
+
2
|
804 |
+
m − 1.
|
805 |
+
Now we choose distinct u0, w0 such that they minimize
|
806 |
+
Pr
|
807 |
+
ω∈Gm[Tv:{u0,w0} fails | E(v, u0) ∧ E(v, w0)].
|
808 |
+
Then by the Lemma 4.7 and the induction hypothesis we have
|
809 |
+
Pr
|
810 |
+
ω∈Gm[T fails] ≥
|
811 |
+
�
|
812 |
+
1 −
|
813 |
+
2
|
814 |
+
m − 1
|
815 |
+
�
|
816 |
+
Pr
|
817 |
+
ω∈Gm[Tv:{u0,w0} fails | E(v, u0) ∧ E(v, w0)]
|
818 |
+
=
|
819 |
+
�
|
820 |
+
1 −
|
821 |
+
2
|
822 |
+
m − 1
|
823 |
+
�
|
824 |
+
Pr
|
825 |
+
ω∈Gm−2[ ˜Tv:{u0,w0} fails]
|
826 |
+
≥
|
827 |
+
�
|
828 |
+
1 −
|
829 |
+
2
|
830 |
+
m − 1
|
831 |
+
� d−1
|
832 |
+
�
|
833 |
+
i=0
|
834 |
+
�
|
835 |
+
1 −
|
836 |
+
2
|
837 |
+
m − 2i − 4
|
838 |
+
�
|
839 |
+
≥
|
840 |
+
�
|
841 |
+
1 −
|
842 |
+
2
|
843 |
+
m − 1
|
844 |
+
�
|
845 |
+
d
|
846 |
+
�
|
847 |
+
i=1
|
848 |
+
�
|
849 |
+
1 −
|
850 |
+
2
|
851 |
+
m − 2i − 2
|
852 |
+
�
|
853 |
+
≥
|
854 |
+
d
|
855 |
+
�
|
856 |
+
i=0
|
857 |
+
�
|
858 |
+
1 −
|
859 |
+
2
|
860 |
+
m − 2i − 2
|
861 |
+
�
|
862 |
+
.
|
863 |
+
15
|
864 |
+
|
865 |
+
Lemma 4.9. Let T ∈ Tnb, then st (Prω∈Gn[T fails]) = 1.
|
866 |
+
Proof. The depth of T is bounded by n1/t for some t ∈ M \ N. We have by Lemma 4.8
|
867 |
+
that
|
868 |
+
Pr
|
869 |
+
ω∈Gn[T fails] ≥
|
870 |
+
n1/t
|
871 |
+
�
|
872 |
+
i=0
|
873 |
+
�
|
874 |
+
1 −
|
875 |
+
2
|
876 |
+
n − 2i − 2
|
877 |
+
�
|
878 |
+
(1)
|
879 |
+
≥
|
880 |
+
�
|
881 |
+
1 −
|
882 |
+
2(n1/t + 1)
|
883 |
+
n − 2n1/t − 2
|
884 |
+
�
|
885 |
+
(2)
|
886 |
+
and the standard part of this lower bound is 1.
|
887 |
+
Finally, in the next theorem we prove that a formalization of ‘there is a nonzero
|
888 |
+
vertex of degree 1’ is not valid in limFnb ∗PATHn and in fact its boolean value is 0.
|
889 |
+
Theorem 4.10.
|
890 |
+
lim
|
891 |
+
Fnb ∗PATHn[[(∃v)(∃u)(∀w)(v ̸= 0 ∧ E(v, u) ∧ (E(v, w) → w = u))]] = 0
|
892 |
+
Proof. By expanding the left-hand side of the statement we get
|
893 |
+
�
|
894 |
+
α∈U(Fnb)
|
895 |
+
�
|
896 |
+
β∈U(Fnb)
|
897 |
+
�
|
898 |
+
γ∈U(Fnb)
|
899 |
+
[[α ̸= 0 ∧ E(α, β) ∧ (E(α, γ) → γ = β)]].
|
900 |
+
Therefore, it is enough if we prove that for each Fnb-vertices α and β there exists an
|
901 |
+
Fnb-vertex γ such that
|
902 |
+
[[α ̸= 0 ∧ E(α, β) ∧ (E(α, γ) → γ = β)]] = 0.
|
903 |
+
For any α, β ∈ U(Fnb) we can append the tree computing β to every leaf of a tree
|
904 |
+
computing α. This is still a tree in Tnb as its depth is at most twice the maximum of
|
905 |
+
depths of the original trees. By relabeling the leaves of the resulting tree we can obtain
|
906 |
+
a tree computing a function
|
907 |
+
γ(ω) =
|
908 |
+
�
|
909 |
+
v
|
910 |
+
if degω(α(ω)) = 1 and v is the only neighbor of α(ω)
|
911 |
+
w
|
912 |
+
if degω(α(ω)) = 2, w is a neighbor of α(ω) and w ̸= β(ω).
|
913 |
+
This is obviously an Fnb-vertex. Let us assume for contradiction that
|
914 |
+
[[α ̸= 0 ∧ E(α, β) ∧ (E(α, γ) → γ = β)]] > 0.
|
915 |
+
By definition this gives us
|
916 |
+
0 < st
|
917 |
+
�
|
918 |
+
Pr
|
919 |
+
ω∈Gn[α(ω) ̸= 0 ∧ Eω(α(ω), β(ω)) ∧ (E(α(ω), γ(ω)) → γ(ω) = β(ω))]
|
920 |
+
�
|
921 |
+
≤ st
|
922 |
+
�
|
923 |
+
Pr
|
924 |
+
ω∈Gn[α(ω) ̸= 0 ∧ degω(α(ω)) = 1]
|
925 |
+
�
|
926 |
+
,
|
927 |
+
but this is in contradiction with Lemma 4.9.
|
928 |
+
16
|
929 |
+
|
930 |
+
5
|
931 |
+
The expanded model with a Leaf instance without a so-
|
932 |
+
lution and with total OntoWeakPigeon
|
933 |
+
As a part of the proof of Theorem 4.10 we proved what can be reformulated as the
|
934 |
+
statement that oracle instances of Leaf are not in oracle time O(2f(|x|)) with f ∈ o(|x|1/c)
|
935 |
+
for every c ∈ N even when we just require it to be correct on any nondiminishing ratio
|
936 |
+
of inputs as |x| grows. In this section we proceed to compare strength of (type 2) NP
|
937 |
+
search problems not only with oracle FP but also with other NP search problems via
|
938 |
+
relative consistency of their totality and nontotality. We will show that there is a model
|
939 |
+
of weak second order arithmetic in which the problem Leaf is not total even though
|
940 |
+
OntoWeakPigeon is.
|
941 |
+
5.1
|
942 |
+
The structures K(F, G)
|
943 |
+
We will now recall the construction of second order models of weak arithmetic K(F, G)
|
944 |
+
defined in [7, Chapter 5]. We will take the liberty to define them as an extension of
|
945 |
+
the definition of a wide limit to obtain structures K(Gn, F, G) 4 which under the right
|
946 |
+
conditions result in a structure in some sublanguage of Lall with two sorts: numbers and
|
947 |
+
bounded sets of numbers which contains the wide limit as an object of the second sort.
|
948 |
+
Definition 5.1. Let L ⊆ Lall. This determines a language L2 which we get by adding
|
949 |
+
to L second order variables X, Y, . . . whose intended interpretation are bounded sets and
|
950 |
+
the equality symbol for second order variables (denoted the same as the first order one).
|
951 |
+
All second order variables are treated as function symbols and can form terms with the
|
952 |
+
first order terms as arguments.
|
953 |
+
We will also use the second order variables as relation symbols, and we define the
|
954 |
+
atomic formula X(x0, . . . , xk−1) simply to be evaluated as the formula X(x0, . . . , xk−1) ̸=
|
955 |
+
0.
|
956 |
+
Now we assume we fix a number n, a wide sequence Gk and a family of random
|
957 |
+
variables on Gn which all together determine a wide limit limF Gn.
|
958 |
+
Definition 5.2. We define Mn ⊆ M to be the subset of M consisting of all numbers
|
959 |
+
bounded above by 2n1/t for some t ∈ M \ N.
|
960 |
+
Definition 5.3. We define Ln ⊆ Lall to contain all relation symbols from Lall and all
|
961 |
+
functions from Lall for which their values on any element of Mn is still in Mn. We say
|
962 |
+
F is Ln-closed if for every function symbol f ∈ Ln we have that f(α0, . . . , αk−1) ∈ F.
|
963 |
+
Note that Mn is then a substructure of the Ln-reduct of M.
|
964 |
+
Definition 5.4. We say that G is a family of random functions (on Gn) if every Θ ∈ G
|
965 |
+
assigns to each ω ∈ Gn a function Θω ∈ Mn.
|
966 |
+
4This notation is just making some parameters of the construction explicit, the models constructed
|
967 |
+
can be obtained by the original method without first constructing the wide limit. Our contribution is in
|
968 |
+
observing that the truth values of first order sentences concerning the wide limit is preserved between
|
969 |
+
the wide limit and the structure K(Gn, F, G).
|
970 |
+
17
|
971 |
+
|
972 |
+
We say G is F-compatible if for every α ∈ F, Θ ∈ G we have that the function Θ(α)
|
973 |
+
defined as
|
974 |
+
Θ(α)(ω) =
|
975 |
+
�
|
976 |
+
Θω(α(ω))
|
977 |
+
if α(ω) ∈ dom(Θω)
|
978 |
+
0
|
979 |
+
otherwise
|
980 |
+
is in fact in F.
|
981 |
+
Definition 5.5. Let F be an Ln-closed family of random variables with values in Mn.
|
982 |
+
Let G be an F-compatible family of random functions. We define K(Gn, F, G) to be
|
983 |
+
a Bn-valued L2
|
984 |
+
n structure with first order sort of the universe F and second order sort
|
985 |
+
of the universe G. The valuation of formulas is then given by the following inductive
|
986 |
+
definition:
|
987 |
+
• [[α = β]] = {ω ∈ Gn; α(ω) = β(ω)}/I, where α, β ∈ F
|
988 |
+
• [[R(α0, . . . , αk−1)]] = {ω ∈ Gn; ω |= R(α0(ω), . . . , αk−1(ω))}/I, where α0, . . . , αk−1
|
989 |
+
are from F and is R a relation symbol in Ln
|
990 |
+
• [[Θ = Ξ]] = {ω ∈ Gn; Θω = Ξω}/I, where Θ, Ξ ∈ G
|
991 |
+
• [[(∀x)A(x)]] = �
|
992 |
+
α∈F [[A(α)]]
|
993 |
+
• [[(∃x)A(x)]] = �
|
994 |
+
α∈F [[A(α)]]
|
995 |
+
• [[(∀X)A(X)]] = �
|
996 |
+
Θ∈G [[A(Θ)]]
|
997 |
+
• [[(∃X)A(X)]] = �
|
998 |
+
Θ∈G [[A(Θ)]].
|
999 |
+
5.2
|
1000 |
+
Preservation of sentences concerning the wide limit
|
1001 |
+
We will now prove (under a mild condition on F) that in a structure K(Gn, F, G) which
|
1002 |
+
represents the wide limit limF Gn by a second order object are the values of all sentences
|
1003 |
+
regarding the object the same as in the wide limit. This lets us construct models in
|
1004 |
+
which an object elementary equivalent to the wide limit might be desired.
|
1005 |
+
Definition 5.6. We say that the edge relation of the wide limit limF Gn is represented
|
1006 |
+
in G by Γ if Γ ∈ G and for all α, β ∈ U(F) we have that
|
1007 |
+
K(Gn, F, G)[[Γ(α, β)]] = lim
|
1008 |
+
F Gn[[E(α, β)]].
|
1009 |
+
Definition 5.7. We say a family of random variables F has restrictable ranges if for
|
1010 |
+
every α ∈ F and m ∈ Mn there is ˜αm ∈ F such that
|
1011 |
+
˜αm(ω) =
|
1012 |
+
�
|
1013 |
+
α(ω)
|
1014 |
+
α(ω) < m
|
1015 |
+
0
|
1016 |
+
otherwise.
|
1017 |
+
18
|
1018 |
+
|
1019 |
+
Theorem 5.8. Let ϕ be a {E}-sentence.
|
1020 |
+
Let F be Ln-closed and have restrictable
|
1021 |
+
ranges and let G be F-compatible. Let the edge relation of the wide limit limF Gn be
|
1022 |
+
represented in G by Γ. We define ˜ϕ(Γ) to be the L2
|
1023 |
+
n-sentence obtained by replacing
|
1024 |
+
all the occurrences of the relation symbol E by Γ, keeping the structure of the logical
|
1025 |
+
connectives and replacing all quantifiers (∀x)(. . . ) by (∀x)(x < n → (. . . )) and (∃x)(. . . )
|
1026 |
+
by (∃x)(x < n ∧ . . . ).
|
1027 |
+
Then we have that for all {E}-sentences that
|
1028 |
+
lim
|
1029 |
+
F Gn[[ϕ]] = K(Gn, F, G)[[ ˜ϕ(Γ)]].
|
1030 |
+
Proof. We will prove that for all {E}-formulas ϕ(x) and all α ∈ F we have that
|
1031 |
+
lim
|
1032 |
+
F Gn[[ϕ(α)]] = K(Gn, F, G)[[ ˜ϕ(Γ, α)]].
|
1033 |
+
We proceed by induction on the complexity of the formula.
|
1034 |
+
The case for atomic
|
1035 |
+
formulas is clear and the step for logical connectives also since [[ − ]] commutes with
|
1036 |
+
them.
|
1037 |
+
With the induction step for negation in hand it is now enough to prove the
|
1038 |
+
inductive step for the universal quantifier.
|
1039 |
+
We assume that the statement works for a formula of lower complexity ϕ(y, x). By
|
1040 |
+
the restrictability of ranges in F we get that for all β ∈ F there is ˜βn ∈ U(F) such that
|
1041 |
+
K(Gn, F, G)[[ ˜ϕ(Γ, ˜βn, α)]] ≤ K(Gn, F, G)[[β < n → ˜ϕ(Γ, β, α)]].
|
1042 |
+
Now we have that for all α ∈ U(F)
|
1043 |
+
K(Gn, F, G)[[(∀y) ˜ϕ(Γ, y, α)]] =
|
1044 |
+
�
|
1045 |
+
α∈F
|
1046 |
+
K(Gn, F, G)[[β < n → ˜ϕ(Γ, β, α)]]
|
1047 |
+
=
|
1048 |
+
�
|
1049 |
+
˜βn∈U(F )
|
1050 |
+
K(Gn, F, G)[[ ˜ϕ(Γ, ˜βn, α)]]
|
1051 |
+
=
|
1052 |
+
�
|
1053 |
+
˜βn∈U(F )
|
1054 |
+
lim
|
1055 |
+
F Gn[[ϕ(˜βn, α)]]
|
1056 |
+
= lim
|
1057 |
+
F Gn[[(∀y)ϕ(y, α)]].
|
1058 |
+
5.3
|
1059 |
+
Failure of totality of Leaf
|
1060 |
+
Now we are in a situation that lets us construct a model of weak second order arithmetic
|
1061 |
+
that contains an instance of the problem Leaf without a solution. Consider a suitable
|
1062 |
+
family Gnb in which we can define not only the wide limit itself but instances of some
|
1063 |
+
other search problem. We can then ask: ‘Do all these instances have a solution?’ This
|
1064 |
+
is a way to compare the strength of the different total NP search problems by relative
|
1065 |
+
unprovability results. We will pick the family Gnb such that validity of totality of some
|
1066 |
+
search problem P implies the nonexistence of a suitable reduction from Leaf to P.
|
1067 |
+
19
|
1068 |
+
|
1069 |
+
Definition 5.9. Let Gnb be the family of all random functions on ∗PATHn such that for
|
1070 |
+
each Θ ∈ Gnb there exists a tuple (γ0, . . . , γm−1) ∈ M so that γi ∈ Fnb and
|
1071 |
+
Θ(α)(ω) =
|
1072 |
+
�
|
1073 |
+
γα(ω)(ω)
|
1074 |
+
α(ω) < m
|
1075 |
+
0
|
1076 |
+
otherwise.
|
1077 |
+
In the models Mn we are working with there is a pairing function ⟨i, j⟩ which can
|
1078 |
+
code pairs of numbers by a single number thus we can represent functions of any finite
|
1079 |
+
arity by functions from Gnb.
|
1080 |
+
One can understand the tuples which compute the random functions from Gnb as
|
1081 |
+
tuples of protocols describing the computations of subexponential oracle machines. Such
|
1082 |
+
a tuple defines a function which is at every index of the tuple computed using queries to
|
1083 |
+
some ω ∈ ∗PATHn. If we prove that every instance of a search problem P represented
|
1084 |
+
by such a tuple has a solution in K(∗PATHn, Fnb, Gnb), and we know that Leaf in
|
1085 |
+
K(∗PATHn, Fnb, Gnb) is not total, which implies nonexistence of a subexponential oracle
|
1086 |
+
machine which converts solutions of P to solutions of Leaf even on any standard fraction
|
1087 |
+
of instances from ∗PATHn and thus a nonexistence of a many-one reduction from Leaf
|
1088 |
+
to P as defined in [1].
|
1089 |
+
Lemma 5.10.
|
1090 |
+
1. Fnb has restrictable ranges
|
1091 |
+
2. Fnb is Ln-closed
|
1092 |
+
3. Gnb is Fnb-compatible
|
1093 |
+
4. Gnb represents the edge relation of limFnb ∗PATHn.
|
1094 |
+
Proof. 1, 2: Here we can proceed simply by relabeling the leaves of the trees computing
|
1095 |
+
the functions from Fnb.
|
1096 |
+
3: Assume that Θ ∈ Gnb is computed by a tuple (γ0, . . . , γm−1). By induction in
|
1097 |
+
M there exists t ∈ M \ N such that ∀i ∈ {0, . . . , m − 1} the depth of γi is at most
|
1098 |
+
n1/t. Therefore, for all α ∈ Fnb we have that Θ(α) has also depth at most n1/t′ for some
|
1099 |
+
t′ ∈ M \ N. Thus, Gnb is Fnb-compatible.
|
1100 |
+
4: Let γ⟨i,j⟩ ∈ Fnb be computed by a tree in Tnb which queries i and outputs 1
|
1101 |
+
if the neighbor set contains j otherwise it outputs 0. Let Γ be computed by a tuple
|
1102 |
+
(γ⟨i,j⟩)n−1
|
1103 |
+
i,j=0. Then we have
|
1104 |
+
K(∗PATHn, Fnb, Gnb)[[Γ(α, β)]] = lim
|
1105 |
+
Fnb ∗PATHn[[E(α, β)]].
|
1106 |
+
Definition 5.11. The L2
|
1107 |
+
n-formula ϕLeaf(X, Y, m) is defined as the disjunction of the
|
1108 |
+
following formulas
|
1109 |
+
(X(0) ̸= Y (0) ∨ X(0) = 0)
|
1110 |
+
(∃x)((x < m) ∧ (X(x) > m − 1 ∨ Y (x) > m − 1))
|
1111 |
+
(∃x)((x < m) ∧ ((X(x) = x ∧ Y (x) ̸= x) ∨ (X(x) ̸= x ∧ Y (x) = x)))
|
1112 |
+
(∃x)((x < m) ∧ (Y (X(x)) ̸= x ∧ X(X(x)) ̸= x) ∨ (X(Y (x)) ̸= x ∧ Y (Y (x)) ̸= x)))
|
1113 |
+
(∃x)((0 < x < m) ∧ (X(x) = Y (x) ∧ X(x) ̸= x)),
|
1114 |
+
20
|
1115 |
+
|
1116 |
+
this formula formalizes that if X and Y are functions representing the neighbor set of
|
1117 |
+
each x < m as {X(x), Y (x)} \ {x} and 0 has only one neighbor then there has to exist
|
1118 |
+
another y < x which also has only one neighbor.
|
1119 |
+
Theorem 5.12.
|
1120 |
+
K(∗PATHn, F, G)[[(∃X)(∃Y )(∃m)¬ϕLeaf(X, Y, m)]] = 1
|
1121 |
+
Proof. We can find Θ1, Θ2 ∈ Gnb such that for each v ∈ {0, . . . , n − 1} we have that
|
1122 |
+
{Θ1(v)(ω), Θ2(v)(ω)} is the neighbor set of v on ω ∈ ∗PATHn. (We can just query v and
|
1123 |
+
split the answer between Θ1 and Θ2.)
|
1124 |
+
By Theorem 4.10 we know that limF Gn has one degree 1 vertex and all other vertices
|
1125 |
+
of degree 2 and by Lemma 5.10 we know that it can be represented by some Γ ∈ Gnb.
|
1126 |
+
Furthermore, we can verify that
|
1127 |
+
[[(Γ(α, β)) ≡ (Θ1(α) = β ∨ Θ2(α) = β)]] = 1,
|
1128 |
+
thus Θ1 and Θ2 do not satisfy the last disjunct of ϕLeaf otherwise it would be in contra-
|
1129 |
+
diction with Theorem 4.10. By their construction and the definition of ∗PATHk we have
|
1130 |
+
that (Θ1, Θ2, n) does not satisfy the other disjuncts either.
|
1131 |
+
5.4
|
1132 |
+
Totality of OntoWeakPigeon
|
1133 |
+
Definition 5.13. The L2
|
1134 |
+
n formula ϕOntoWeakPigeon(X, Y, m) is defined as the disjunc-
|
1135 |
+
tion of the following formulas
|
1136 |
+
(∃x)((x < 2m) ∧ (X(x) > m − 1))
|
1137 |
+
(∃y)((y < m) ∧ Y (y) > m − 1))
|
1138 |
+
(∃x)((x < 2m) ∧ Y (X(x)) ̸= x)
|
1139 |
+
(∃y)((y < m) ∧ X(Y (y)) ̸= y)
|
1140 |
+
it formalizes the bijective weak pigeonhole principle which claims that any pair of func-
|
1141 |
+
tions
|
1142 |
+
X :{0, . . . , 2m − 1} → {0, . . . , m − 1}
|
1143 |
+
Y :{0, . . . , m − 1} → {0, . . . 2m − 1}
|
1144 |
+
is not a pair of inverse bijections.
|
1145 |
+
To prove that ϕOntoWeakPigeon(X, Y, m) is valid in K(∗PATHn, Fnb, Gnb) we will
|
1146 |
+
construct a tree which finds some x such that Yω(Xω(x)) ̸= x or Xω(x) > m − 1 with
|
1147 |
+
probability infinitesimally close to one.
|
1148 |
+
Definition 5.14. Let Θ, Ξ ∈ Gnb, and ζ ∈ Fnb. We say that a tree T ∈ Tnb fails for
|
1149 |
+
(Θ, Ξ, ζ) on ω if
|
1150 |
+
Θω(T(ω)) < ζ(ω)
|
1151 |
+
and
|
1152 |
+
Ξω(Θω(T(ω))) = T(ω).
|
1153 |
+
In words if T does not witness the failure of Ξ being the inverse function to Θ.
|
1154 |
+
21
|
1155 |
+
|
1156 |
+
Lemma 5.15. Let Θ, Ξ ∈ Gnb and ζ ∈ Fnb. Then there is a tree T such that
|
1157 |
+
st
|
1158 |
+
�
|
1159 |
+
Pr
|
1160 |
+
ω∈Gn[T fails for (Θ, Ξ, ζ)]
|
1161 |
+
�
|
1162 |
+
= 0.
|
1163 |
+
Proof. Without loss of generality we may assume that ζ is actually constant, and its
|
1164 |
+
value is r ∈ Mn which we pick to be the least possible output of ζ on any sample.
|
1165 |
+
Furthermore, let Θ be computed by (θ0, . . . , θ2r−1) and Ξ by (ξ0, . . . , ξr−1).
|
1166 |
+
We construct T by stages and at each stage it will have some potential output. First
|
1167 |
+
we notice that at the beginning stage there is at least one i ∈ {0, . . . , 2r − 1} such that
|
1168 |
+
the probability that θi < r or ξθi = i is at most 1
|
1169 |
+
2. The tree T0 is thus the constant tree
|
1170 |
+
always outputting i.
|
1171 |
+
Assume Td−1 have been constructed and pick any path p ∈ Td−1. If p did not fail we
|
1172 |
+
leave it as it is otherwise we extend Td−1 along this path and after extending all such
|
1173 |
+
paths this will become the new stage Td. The path p has a leaf with some label i. We
|
1174 |
+
can check whether i fails by first appending the tree θi to this path and then to each
|
1175 |
+
new leaf (labeled with a number < r) appending ξθi, let the leaves which confirm the
|
1176 |
+
nonfailure of i be labeled by i. Now consider a path p′ extending p without determined
|
1177 |
+
output. We claim that there is j ∈ {0, . . . , 2r − 1} such that
|
1178 |
+
Pr
|
1179 |
+
Gn[θj < r ∧ ξθj = j | p′ is compatible with ω] ≤ 1
|
1180 |
+
2,
|
1181 |
+
where p′ being compatible with ω means that the computation along p′ agrees with the
|
1182 |
+
edge labels which would be chosen according to ω.
|
1183 |
+
To prove the claim we notice that along p′ it was confirmed that already d-many
|
1184 |
+
distinct elements of {0, . . . , 2r − 1} are in bijection with some d-many elements of the
|
1185 |
+
set {0, . . . , r − 1}. Therefore, to fail further there are only at most (r − d)-many other
|
1186 |
+
values j′ in {0, . . . , 2r−1} for which it holds that ξθj′ = j′. By an analogous argument to
|
1187 |
+
the proof of Theorem 3.13 this is enough to show that at least for one of them the claim
|
1188 |
+
holds since r−d
|
1189 |
+
2r ≤ 1
|
1190 |
+
2. Thus, we let j to be the label of the leaf of p′ which concludes the
|
1191 |
+
construction.
|
1192 |
+
Therefore, by construction for each d ∈ Mn, d < 2r we have
|
1193 |
+
Pr
|
1194 |
+
ω∈Gn[Td fails for (Θ, Ξ, ζ)] ≤ 2−d.
|
1195 |
+
If r is in Mn \ N then we put T = Tt′ for any nonstandard t′ such that the depth of
|
1196 |
+
T is still bounded by some n1/t, where t ∈ Mn \ N. Otherwise, we put T = T2r−1 and
|
1197 |
+
since this tree can go through the whole range of Θ it can never fail.
|
1198 |
+
Theorem 5.16.
|
1199 |
+
K(∗PATHn, Fnb, Gnb)[[(∀X)(∀Y )(∀m)ϕOntoWeakPigeon(X, Y, m)]] = 1
|
1200 |
+
Proof. By Lemma 5.15 we can construct for each (Θ, Ξ, ζ) a tree T which computes some
|
1201 |
+
function α which validates the third disjunct of ϕOntoWeakPigeon.
|
1202 |
+
22
|
1203 |
+
|
1204 |
+
Theorem 5.17. Let ϕ(x) be an L2
|
1205 |
+
n-formula with parameters from Fnb and Gnb. Then
|
1206 |
+
for every m ∈ Mn the open comprehension principle
|
1207 |
+
(∃X)(∀y < m)(X(y) ≡ ϕ(y))
|
1208 |
+
and the open induction principle
|
1209 |
+
¬ϕ(0) ∨ ϕ(m) ∨ (∃x < m)(ϕ(x) ∧ ¬ϕ(x + 1))
|
1210 |
+
are both valid in K(∗PATH, Fnb, Gnb).
|
1211 |
+
Proof. This can be proven completely analogously to [7, Lemma 20.2.5].
|
1212 |
+
Compiling the results we have about K(∗PATH, Fnb, Gnb) we get the following.
|
1213 |
+
Corollary 5.18. In the structure K(∗PATH, Fnb, Gnb) the following are valid:
|
1214 |
+
• open induction with parameters from Fnb and Gnb
|
1215 |
+
• open comprehension with parameters from Fnb and Gnb
|
1216 |
+
• every instance of OntoWeakPigeon has a solution
|
1217 |
+
• there is an instance of Leaf which does not have a solution.
|
1218 |
+
Concluding remarks
|
1219 |
+
We have to note that the problem OntoWeakPigeon has not been considered in
|
1220 |
+
the context of oracle NP search problems and the proof of Theorem 5.16 cannot be
|
1221 |
+
adapted to prove that every instance of the stronger WeakPigeon 5 has a solution
|
1222 |
+
in K(∗PATH, Fnb, Gnb) because the presence of the inverse function is essential to the
|
1223 |
+
construction of the witness.
|
1224 |
+
A stronger problem called SourceOrSink is well established in the study of NP
|
1225 |
+
search problems (it is the complete problem for PPAD, see [1]) and can be formulated
|
1226 |
+
as follows: Given a directed graph ω on the vertex set {0, . . . , 2|x| − 1} with the property
|
1227 |
+
that any vertex v has outdegree bounded by 1 and indegree also bounded by 1 and the
|
1228 |
+
indegree of the zero vertex is 0 find a nonzero vertex which is either a source or a sink.
|
1229 |
+
In the type 2 setting the problem is given by a tuple (α, β, x), where x is a binary string
|
1230 |
+
and α and β functions presented by an oracle with domain {0, . . . , 2|x| − 1} computing
|
1231 |
+
the potential successor or predecessor of a given vertex.
|
1232 |
+
It was established in [1] that Leaf is not many-one reducible to SourceOrSink and
|
1233 |
+
therefore this nonreducibility may be reflected in our model K(∗PATH, Fnb, Gnb). The
|
1234 |
+
way SourceOrSink is presented is similar to how OntoWeakPigeon is presented,
|
1235 |
+
and thus a similar strategy could be potentially used to solve the following problem.
|
1236 |
+
Problem. Let ϕSourceOrSink(X, Y, m) be the formula formalizing that (X, Y, m) as an
|
1237 |
+
instance of SourceOrSink has a solution. Is it true that
|
1238 |
+
K(∗PATH, Fnb, Gnb)[[(∀X)(∀Y )(∀m)ϕSourceOrSink(X, Y, m)]] = 1?
|
1239 |
+
5The problem to witness that α : {0, . . . , 2|x| − 1} → {0, . . . , 2|x|−1 − 1} is not injective.
|
1240 |
+
23
|
1241 |
+
|
1242 |
+
Acknowledgement
|
1243 |
+
This work is based on the author’s master’s thesis [5] which was completed under the
|
1244 |
+
supervision of Jan Krajíček. The author also thanks Eitetsu Ken for comments on a draft
|
1245 |
+
of this paper.
|
1246 |
+
References
|
1247 |
+
[1]
|
1248 |
+
Paul Beame, Stephen Cook, Jeff Edmonds, Russell Impagliazzo, and Toniann
|
1249 |
+
Pitassi.
|
1250 |
+
The relative complexity of np search problems.
|
1251 |
+
In Proceedings of the
|
1252 |
+
Twenty-Seventh Annual ACM Symposium on Theory of Computing, STOC ’95, page
|
1253 |
+
303–314, New York, NY, USA, 1995. Association for Computing Machinery.
|
1254 |
+
[2]
|
1255 |
+
Ronald Fagin.
|
1256 |
+
Probabilities on finite models.
|
1257 |
+
The Journal of Symbolic Logic,
|
1258 |
+
41(1):50–58, 1976.
|
1259 |
+
[3]
|
1260 |
+
Isaac Goldbring. Lecture notes on nonstandard analysis, 2014. Available at https://
|
1261 |
+
www.math.uci.edu/~isaac/NSA%20notes.pdf (last accessed 9th of January 2023).
|
1262 |
+
[4]
|
1263 |
+
J. Hanika. Search problems and Bounded Arithmetic. PhD thesis, Charles University,
|
1264 |
+
Prague, 2004.
|
1265 |
+
[5]
|
1266 |
+
Ondřej Ježil. Pseudofinite structures and limits. Master’s thesis, Charles University,
|
1267 |
+
Prague, 2022. Also available in Electronic Colloquium on Computational Complex-
|
1268 |
+
ity.
|
1269 |
+
[6]
|
1270 |
+
Emil Jeřábek. Integer factoring and modular square roots. Journal of Computer
|
1271 |
+
and System Sciences, 82(2):380–394, 2016.
|
1272 |
+
[7]
|
1273 |
+
Jan Krajíček. Forcing with random variables and proof complexity, volume 382 of
|
1274 |
+
London Mathematical Society Lecture Note Series.
|
1275 |
+
Cambridge University Press,
|
1276 |
+
2011.
|
1277 |
+
[8]
|
1278 |
+
László Lovász and Balázs Szegedy. Limits of dense graph sequences. Journal of
|
1279 |
+
Combinatorial Theory, Series B, 96(6):933–957, 2006.
|
1280 |
+
[9]
|
1281 |
+
Nimrod Megiddo and Christos H Papadimitriou. On total functions, existence theo-
|
1282 |
+
rems and computational complexity. Theoretical Computer Science, 81(2):317–324,
|
1283 |
+
1991.
|
1284 |
+
[10] Jaroslav Nešetřil and Patrice Ossona de Mendez.
|
1285 |
+
A model theory approach to
|
1286 |
+
structural limits. Commentationes Mathematicae Universitatis Carolinae, 53:581–
|
1287 |
+
603, 11 2012.
|
1288 |
+
[11] Alexander A. Razborov. Flag algebras. The Journal of Symbolic Logic, 72(4):1239–
|
1289 |
+
1282, 2007.
|
1290 |
+
24
|
1291 |
+
|
2NFRT4oBgHgl3EQfmzfK/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
39A0T4oBgHgl3EQfNf8t/content/tmp_files/2301.02146v1.pdf.txt
ADDED
@@ -0,0 +1,3499 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Searching for Lindbladians obeying local conservation laws and showing thermalization
|
2 |
+
Devashish Tupkary,1, ∗ Abhishek Dhar,2, † Manas Kulkarni,2, ‡ and Archak Purkayastha3, 4, 5, §
|
3 |
+
1Institute for Quantum Computing and Department of Physics and Astronomy,
|
4 |
+
University of Waterloo, Waterloo, Ontario, Canada, N2L 3G1
|
5 |
+
2International Centre for Theoretical Sciences, Tata Institute of Fundamental Research, Bangalore 560089, India
|
6 |
+
3Department of Physics, Indian Institute of Technology, Hyderabad 502285, India
|
7 |
+
4Centre for complex quantum systems, Aarhus University, Nordre Ringgade 1, 8000 Aarhus C, Denmark
|
8 |
+
5School of Physics, Trinity College Dublin, College Green, Dublin 2, Ireland
|
9 |
+
We investigate the possibility of a Markovian quantum master equation (QME) that consistently
|
10 |
+
describes a finite-dimensional system, a part of which is weakly coupled to a thermal bath. In order
|
11 |
+
to preserve complete positivity and trace, such a QME must be of Lindblad form. For physical con-
|
12 |
+
sistency, it should additionally preserve local conservation laws and be able to show thermalization.
|
13 |
+
First, we show that the microscopically derived Redfield equation (RE) violates complete positivity
|
14 |
+
unless in extremely special cases. We then prove that imposing complete positivity and demanding
|
15 |
+
preservation of local conservation laws enforces the Lindblad operators and the lamb-shift Hamil-
|
16 |
+
tonian to be ‘local’, i.e, to be supported only on the part of the system directly coupled to the
|
17 |
+
bath. We then cast the problem of finding ‘local’ Lindblad QME which can show thermalization
|
18 |
+
into a semidefinite program (SDP). We call this the thermalization optimization problem (TOP).
|
19 |
+
For given system parameters and temperature, the solution of the TOP conclusively shows whether
|
20 |
+
the desired type of QME is possible up to a given precision. Whenever possible, it also outputs a
|
21 |
+
form for such a QME. For a XXZ chain of few qubits, fixing a reasonably high precision, we find
|
22 |
+
that such a QME is impossible over a considerably wide parameter regime when only the first qubit
|
23 |
+
is coupled to the bath. Remarkably, we find that when the first two qubits are attached to the bath,
|
24 |
+
such a QME becomes possible over much of the same paramater regime, including a wide range of
|
25 |
+
temperatures.
|
26 |
+
I.
|
27 |
+
INTRODUCTION
|
28 |
+
A small finite-dimensional quantum system, a part of
|
29 |
+
which is weakly coupled to a macroscopic thermal bath,
|
30 |
+
is expected to thermalize to the temperature of the bath.
|
31 |
+
Describing this dynamics is relevant across various fields
|
32 |
+
in quantum science and technology, including quantum
|
33 |
+
information and thermodynamics [1], quantum optics [2],
|
34 |
+
quantum chemistry [3], engineering [4] and biology [5].
|
35 |
+
In absence of coupling to the macroscopic thermal bath,
|
36 |
+
the dynamics of the density matrix of the system is gov-
|
37 |
+
erned by the Heisenberg equation of motion. This unitary
|
38 |
+
evolution is Markovian.
|
39 |
+
When coupled to the macro-
|
40 |
+
scopic thermal bath, the dynamics becomes non-unitary,
|
41 |
+
described by a quantum master equation (QME) [6–8].
|
42 |
+
We investigate whether it is possible to have a physically
|
43 |
+
consistent Markovian QME describing such dynamics. In
|
44 |
+
order to do so, we are led to introduce the “thermaliza-
|
45 |
+
tion optimization problem” (TOP). This is a semidefinite
|
46 |
+
program (SDP), the output of which conclusively shows
|
47 |
+
whether, for given system parameters and temperature,
|
48 |
+
such a QME is possible, up to given precision. When-
|
49 |
+
ever possible, the output also yields one possible form
|
50 |
+
for such a QME. Whenever impossible, it means that,
|
51 |
+
for such parameters, the dynamics cannot be described
|
52 | |
53 | |
54 | |
55 | |
56 |
+
FIG. 1. Schematic of the setup we consider: an arbitrary fi-
|
57 |
+
nite dimensional system described by Hamiltonian HS, a part
|
58 |
+
of which is weakly coupled to a thermal bath at inverse tem-
|
59 |
+
perature β. The Hilbert space of the system, HS is divided
|
60 |
+
into a part HL which directly couples to the bath, and the
|
61 |
+
remaining part HM.
|
62 |
+
by any Markovian QME even at weak system-bath cou-
|
63 |
+
pling, and therefore must have some non-Markovian char-
|
64 |
+
acter. The SDP can be solved using standard packages
|
65 |
+
in high-level computing.
|
66 |
+
We note that, while SDP is
|
67 |
+
widely used in many branches of quantum information
|
68 |
+
and communication [9, 10], and also in quantum chem-
|
69 |
+
istry [11, 12], it has been combined with open quantum
|
70 |
+
system techniques in only few previous works [13–15], in
|
71 |
+
very different contexts.
|
72 |
+
It was shown by Gorini, Kossakowski, Sudarshan, and
|
73 |
+
arXiv:2301.02146v1 [quant-ph] 5 Jan 2023
|
74 |
+
|
75 |
+
Hilbert space Hl
|
76 |
+
Hilbert space HM
|
77 |
+
Hilbert space Hs = HL HM, Hamiltonian Hs2
|
78 |
+
Lindblad (GKSL) [16–18] that any QME that preserves
|
79 |
+
complete positivity and trace of the density matrix, and
|
80 |
+
describes Markovian dynamics has to be of the form
|
81 |
+
∂ρ
|
82 |
+
∂t = i[ρ, HS + HLS] + D(ρ),
|
83 |
+
D(ρ) =
|
84 |
+
d2−1
|
85 |
+
�
|
86 |
+
λ=1
|
87 |
+
γλ
|
88 |
+
�
|
89 |
+
LλρL†
|
90 |
+
λ − 1
|
91 |
+
2{L†
|
92 |
+
λLλ, ρ}
|
93 |
+
�
|
94 |
+
,
|
95 |
+
γλ ≥ 0,
|
96 |
+
(1)
|
97 |
+
which is commonly called the Lindblad equation.
|
98 |
+
In
|
99 |
+
Eq. (1), ρ is the density matrix of the system, d is the
|
100 |
+
Hilbert space dimension of the system, HS is the sys-
|
101 |
+
tem Hamiltonian, HLS is the Lamb shift Hamiltonian,
|
102 |
+
Lλ are the Lindblad operators, γλ are the rates, and
|
103 |
+
D(ρ) is called the “dissipator” term. The preservation
|
104 |
+
of complete positivity condition is enforced by demand-
|
105 |
+
ing γλ ≥ 0. Lindblad equations have been extensively
|
106 |
+
used in studying both theoretical and experimental se-
|
107 |
+
tups [6–8, 19–22].
|
108 |
+
Given this enormous scope of application, it is of
|
109 |
+
paramount importance to assess the conditions under
|
110 |
+
which such a Markovian description emerges from a more
|
111 |
+
microscopic theory.
|
112 |
+
The standard way to microscopi-
|
113 |
+
cally obtain a Markovian QME is to consider the global
|
114 |
+
Hamiltonian of the system weakly coupled to baths, and
|
115 |
+
to trace out the baths perturbatively to the leading or-
|
116 |
+
der. Starting with this microscopic viewpoint, it becomes
|
117 |
+
clear that only having an equation in the Lindblad form
|
118 |
+
is not sufficient, there are some additional fundamental
|
119 |
+
requirements for physical consistency [23].
|
120 |
+
In particu-
|
121 |
+
lar, one must preserve local conservation laws, and if the
|
122 |
+
steady state is unique, the system is not driven and all
|
123 |
+
baths have same temperature, the system must thermal-
|
124 |
+
ize to the temperature of the baths. It would be useful to
|
125 |
+
have a QME which, by construction, is of Lindblad form
|
126 |
+
and satisfy these additional requirements. In this paper,
|
127 |
+
we systematically go about searching for such a QME for
|
128 |
+
a setup where a part of the system is coupled to a single
|
129 |
+
bath (see Fig. 1). This is done in three steps, each step
|
130 |
+
having important consequences:
|
131 |
+
1. The microscopically derived quantum master equa-
|
132 |
+
tion to the leading order in system-bath coupling
|
133 |
+
is the so-called Redfield equation (RE) [6].
|
134 |
+
The
|
135 |
+
RE has been shown to preserve local conservation
|
136 |
+
laws and be able to show thermalization [23]. Here,
|
137 |
+
we provide an explicit, model independent proof
|
138 |
+
that the RE necessarily violates complete positiv-
|
139 |
+
ity unless the Redfield dissipator happens to act
|
140 |
+
“locally”, meaning it is identity on the part of the
|
141 |
+
system that is not directly coupled to the bath. Al-
|
142 |
+
though the violation of complete positivity by RE
|
143 |
+
has been previously demonstrated in specific exam-
|
144 |
+
ples [24–30], we are unaware of any previous work
|
145 |
+
with such a model independent explicit proof.
|
146 |
+
2. We then prove that enforcing complete positivity
|
147 |
+
condition γλ ≥ 0 and preservation of local conser-
|
148 |
+
vation laws necessarily requires the Lindblad oper-
|
149 |
+
ators and the Lamb shift Hamiltonian to be “lo-
|
150 |
+
cal”. That is, they must act only on the part of
|
151 |
+
the system coupled to the bath, and be identity
|
152 |
+
on the part of the system that is not connected to
|
153 |
+
the bath. This directly rules out the possibility of
|
154 |
+
any so-called ‘global’ Lindblad equation, such as
|
155 |
+
the eigenbasis Lindblad equation [6, 8], the Uni-
|
156 |
+
versal Lindblad Equation [31] to be consistent with
|
157 |
+
local conservation laws.
|
158 |
+
3. Given the restriction of the dissipator and the
|
159 |
+
Lamb shift Hamiltonian to be “local’, we devise
|
160 |
+
a numerical technique using SDP to check conclu-
|
161 |
+
sively in a case-by-case basis whether such a QME
|
162 |
+
can show thermalization in a particular situation.
|
163 |
+
We call this the TOP. We use this method to study
|
164 |
+
the case of a XXZ chain of few qubits with a part
|
165 |
+
of it coupled to a bath. If the bath is coupled only
|
166 |
+
to the first qubit, our method conclusively shows
|
167 |
+
that over a large regime of system parameters and
|
168 |
+
temperature, no such QME exists.
|
169 |
+
However, re-
|
170 |
+
markably if the bath is coupled to two qubits of
|
171 |
+
the chain, up to a chosen precision, our method
|
172 |
+
shows that a Marovian QME respecting all condi-
|
173 |
+
tions becomes possible over a considerable regime
|
174 |
+
of parameters, including a wide range of tempera-
|
175 |
+
tures. Note that the RE for the XXZ chain does
|
176 |
+
show thermalization and preserve local conserva-
|
177 |
+
tion laws [23], even when only one qubit is attached
|
178 |
+
to a bath. But it is not completely positive.
|
179 |
+
This work is organized as follows. In Sec. II we ex-
|
180 |
+
plain the setup studied in this work, derive the Redfield
|
181 |
+
equation for our setup, and show that it will necessarily
|
182 |
+
violate complete positivity, unless the Redfield dissipa-
|
183 |
+
tor happens to act “locally”.
|
184 |
+
In Sec. III we consider
|
185 |
+
quantum master equations preserving complete positiv-
|
186 |
+
ity and obeying local conservation laws, and show that
|
187 |
+
such equations must have a dissipator and Lamb shift
|
188 |
+
operator that acts only on the part of the system cou-
|
189 |
+
pled to the bath. In Sec. IV we discuss the possibility of
|
190 |
+
QMEs respecting complete positivity, local conservation
|
191 |
+
laws and being able to show thermalization. We intro-
|
192 |
+
duce the TOP, and use it in the specific case of the few
|
193 |
+
site XXZ chain with one or two sites attached to bath.
|
194 |
+
In Sec. V we summarize our results, and discuss future
|
195 |
+
directions. Certain details are delegated to the appen-
|
196 |
+
dices.
|
197 |
+
II.
|
198 |
+
THE MODEL AND REDFIELD
|
199 |
+
DESCRIPTION
|
200 |
+
Our setup is described schematically in Fig. 1. The
|
201 |
+
full Hamiltonian be given by
|
202 |
+
H = HS + ϵHSB + HB,
|
203 |
+
(2)
|
204 |
+
where HS and HB are the Hamiltonians of the system
|
205 |
+
and bath respectively, ϵ ≪ 1 is a small dimensionless pa-
|
206 |
+
|
207 |
+
3
|
208 |
+
rameter controlling system-bath coupling strength, and
|
209 |
+
HSB is the system-bath coupling Hamiltonian. At initial
|
210 |
+
time, the system is considered to be in an arbitrary ini-
|
211 |
+
tial state ρ(0), while the bath is in a thermal state with
|
212 |
+
inverse temperature β
|
213 |
+
ρtot(0) = ρ(0) ⊗ ρB,
|
214 |
+
ρB = e−βHB
|
215 |
+
ZB
|
216 |
+
.
|
217 |
+
(3)
|
218 |
+
Starting with this initial state, the whole set-up of the
|
219 |
+
system and the bath is evolved with the full Hamiltonian
|
220 |
+
H, and the bath degrees of freedom are traced out to
|
221 |
+
obtain the state of the system,
|
222 |
+
ρ(t) = TrB
|
223 |
+
�
|
224 |
+
e−iHtρtot(0)eiHt�
|
225 |
+
,
|
226 |
+
(4)
|
227 |
+
where TrB(. . .) denotes trace over bath degrees of free-
|
228 |
+
dom.
|
229 |
+
The Eq. (4), by construction, is a completely
|
230 |
+
positive trace preserving (CPTP) map from ρ(0) to
|
231 |
+
ρ(t) [6, 7].
|
232 |
+
Without any loss of generality, we assume
|
233 |
+
TrB(HSBρB) = 0, where TrB(. . .) denotes trace over
|
234 |
+
bath degrees of freedom [6, 7].
|
235 |
+
The effective equation
|
236 |
+
of motion for the system density matrix written to the
|
237 |
+
leading order in system-bath coupling strength ϵ is the
|
238 |
+
RE, given by, [6],
|
239 |
+
∂ρ
|
240 |
+
∂t =i[ρ(t), HS]
|
241 |
+
+ϵ2
|
242 |
+
� ∞
|
243 |
+
0
|
244 |
+
dt′ TrB[HSB, [HSB(−t′), ρ(t) ⊗ ρB]],
|
245 |
+
(5)
|
246 |
+
where
|
247 |
+
HSB(t) = ei(HS+HB)tHSBe−i(HS+HB)t
|
248 |
+
(6)
|
249 |
+
and ρB is the state of the bath. In complete generality,
|
250 |
+
we can write the system-bath coupling Hamiltonian as
|
251 |
+
HSB =
|
252 |
+
�
|
253 |
+
l
|
254 |
+
(SlB†
|
255 |
+
l + S†
|
256 |
+
l Bl),
|
257 |
+
(7)
|
258 |
+
where Sl and Bl are operators on the system and bath
|
259 |
+
respectively, and l can be summed over as many indices as
|
260 |
+
required for HSB. Using Eq.(7) in Eq.(5) and simplifying,
|
261 |
+
we have
|
262 |
+
∂ρ
|
263 |
+
∂t = i[ρ(t), HS] + ϵ2� �
|
264 |
+
l
|
265 |
+
�
|
266 |
+
S†
|
267 |
+
l , S(1)
|
268 |
+
l
|
269 |
+
ρ(t)
|
270 |
+
�
|
271 |
+
−
|
272 |
+
�
|
273 |
+
S†
|
274 |
+
l , ρ(t)S(2)
|
275 |
+
l
|
276 |
+
�
|
277 |
+
+ H.c
|
278 |
+
�
|
279 |
+
,
|
280 |
+
(8)
|
281 |
+
where
|
282 |
+
S(1)
|
283 |
+
l
|
284 |
+
=
|
285 |
+
�
|
286 |
+
m
|
287 |
+
� ∞
|
288 |
+
0
|
289 |
+
dt′ Tr
|
290 |
+
�
|
291 |
+
BlB†
|
292 |
+
m(−t′)ρB
|
293 |
+
�
|
294 |
+
Sm(−t′)
|
295 |
+
+
|
296 |
+
�
|
297 |
+
m
|
298 |
+
� ∞
|
299 |
+
0
|
300 |
+
dt′ Tr
|
301 |
+
�
|
302 |
+
BlBm(−t′)ρB
|
303 |
+
�
|
304 |
+
S†
|
305 |
+
m(−t′)
|
306 |
+
S(2)
|
307 |
+
l
|
308 |
+
=
|
309 |
+
�
|
310 |
+
m
|
311 |
+
� ∞
|
312 |
+
0
|
313 |
+
dt′ Tr
|
314 |
+
�
|
315 |
+
B†
|
316 |
+
m(−t′)BlρB
|
317 |
+
�
|
318 |
+
Sm(−t′)
|
319 |
+
+
|
320 |
+
�
|
321 |
+
m
|
322 |
+
� ∞
|
323 |
+
0
|
324 |
+
dt′ Tr
|
325 |
+
�
|
326 |
+
Bm(−t′)BlρB
|
327 |
+
�
|
328 |
+
S†
|
329 |
+
m(−t′).
|
330 |
+
(9)
|
331 |
+
Since the actual microscopic evolution is given by a
|
332 |
+
CPTP map [see Eqs. (3), (4)], one might naively expect
|
333 |
+
that the evolution obtained from the microscopically de-
|
334 |
+
rived RE respects complete positivity. However, as we
|
335 |
+
prove in the next subsection in generality, unless in ex-
|
336 |
+
tremely special cases, the RE violates complete positivity.
|
337 |
+
A.
|
338 |
+
Violation of complete positivity in Redfield
|
339 |
+
equation
|
340 |
+
1.
|
341 |
+
Choosing an operator Basis
|
342 |
+
As shown in Fig. 1, we consider only a part of the sys-
|
343 |
+
tem is coupled to the bath.
|
344 |
+
Let us denote HL as the
|
345 |
+
Hilbert space of that part of the system that couples to
|
346 |
+
the bath, and let HM be the Hilbert space of the re-
|
347 |
+
maining part of the system. In mathematical terms, this
|
348 |
+
means that any operator OM in the Hilbert space HM
|
349 |
+
commutes with the system-bath coupling Hamiltonian
|
350 |
+
HSB,
|
351 |
+
[OM, HSB] = 0.
|
352 |
+
(10)
|
353 |
+
The system Hamiltonian can then be written as
|
354 |
+
HS = HL + HLM + HM,
|
355 |
+
(11)
|
356 |
+
where the Hamiltonian HL is in Hilbert space HL, the
|
357 |
+
Hamiltonian HM is in Hilbert space HM, and HLM gives
|
358 |
+
the coupling between the two Hilbert spaces. Note that
|
359 |
+
we do not consider this coupling to be small.
|
360 |
+
Let the dimension of HL and HM be dL and dM re-
|
361 |
+
spectively. Then, one can pick an orthonormal basis of
|
362 |
+
operators {fi} and {gj} on HL and HM respectively,
|
363 |
+
where 1 ≤ i ≤ d2
|
364 |
+
L and 1 ≤ j ≤ d2
|
365 |
+
M, and where or-
|
366 |
+
thonormality is defined according to the Hilbert Schmidt
|
367 |
+
inner product given by ⟨A, B⟩ = Tr[A†B]. One can al-
|
368 |
+
ways choose this basis such that fd2
|
369 |
+
L = IL/√dL and
|
370 |
+
gd2
|
371 |
+
M = IM/√dM, where IM and IL are the identity op-
|
372 |
+
erators on those spaces. Such a basis is required by the
|
373 |
+
GKSL theorem [6, 7, 16, 18]. Taking the tensor prod-
|
374 |
+
uct of these two basis, one can obtain an orthonormal
|
375 |
+
basis {Fk} = {fi} ⊗ {gj} for operators on HS, with
|
376 |
+
Fd2
|
377 |
+
Ld2
|
378 |
+
M = IS/
|
379 |
+
√
|
380 |
+
d, where d = dLdM is the dimension of
|
381 |
+
the system Hilbert space. Without loss of generality, the
|
382 |
+
Lindblad equation [Eq. (1)] written in this basis is given
|
383 |
+
by
|
384 |
+
∂ρ
|
385 |
+
∂t = i[ρ, HS + HLS] +
|
386 |
+
d2−1
|
387 |
+
�
|
388 |
+
α,˜α=1
|
389 |
+
Γα˜α
|
390 |
+
�
|
391 |
+
F˜αρF †
|
392 |
+
α − {F †
|
393 |
+
αF˜α, ρ}
|
394 |
+
2
|
395 |
+
�
|
396 |
+
,
|
397 |
+
(12)
|
398 |
+
where complete positivity of ρ is preserved iff Γ is positive
|
399 |
+
semidefinite [6, 7]. Eq. (12) can be turned into Eq. (1)
|
400 |
+
by diagonalizing the matrix Γ.
|
401 |
+
The complete positivity of RE can be checked by tak-
|
402 |
+
ing the RE to the same form as Eq.(12) and checking if
|
403 |
+
the corresponding Γ is positive semidefinite. To do so,
|
404 |
+
|
405 |
+
4
|
406 |
+
let us relabel the indices so that Fi = fi ⊗ IM/√dM for
|
407 |
+
1 ≤ i ≤ d2
|
408 |
+
L − 1. This allows us to expand the system
|
409 |
+
operators in Eq. (8) as,
|
410 |
+
Sl =
|
411 |
+
d2
|
412 |
+
�
|
413 |
+
α=1
|
414 |
+
alαFα,
|
415 |
+
S†
|
416 |
+
l =
|
417 |
+
d2
|
418 |
+
�
|
419 |
+
α=1
|
420 |
+
a′
|
421 |
+
lαFα,
|
422 |
+
S(1)
|
423 |
+
l
|
424 |
+
=
|
425 |
+
d2
|
426 |
+
�
|
427 |
+
α=1
|
428 |
+
blαFα,
|
429 |
+
S(1)†
|
430 |
+
l
|
431 |
+
=
|
432 |
+
d2
|
433 |
+
�
|
434 |
+
α=1
|
435 |
+
b′
|
436 |
+
lαFα,
|
437 |
+
S(2)
|
438 |
+
l
|
439 |
+
=
|
440 |
+
d2
|
441 |
+
�
|
442 |
+
α=1
|
443 |
+
clαFα,
|
444 |
+
S(2)†
|
445 |
+
l
|
446 |
+
=
|
447 |
+
d2
|
448 |
+
�
|
449 |
+
α=1
|
450 |
+
c′
|
451 |
+
lαFα,
|
452 |
+
(13)
|
453 |
+
where alα = a′
|
454 |
+
lα = 0, ∀
|
455 |
+
d2
|
456 |
+
L ≤ α ≤ d2 −1 since Sl and S†
|
457 |
+
l
|
458 |
+
are identity on HM. Substituting Eq. (13) into Eq. (8),
|
459 |
+
we obtain
|
460 |
+
∂ρ
|
461 |
+
∂t = i[ρ, HS] − ϵ2 �
|
462 |
+
l
|
463 |
+
d2
|
464 |
+
�
|
465 |
+
α,˜α=1
|
466 |
+
�
|
467 |
+
a��
|
468 |
+
lαbl˜α[F †
|
469 |
+
α, F˜αρ]
|
470 |
+
+ c′∗
|
471 |
+
lαa′
|
472 |
+
l˜α[ρF †
|
473 |
+
α, F˜α] + b∗
|
474 |
+
lαal˜α[ρF †
|
475 |
+
α, F˜α] + a′∗
|
476 |
+
lαc′
|
477 |
+
l˜α[F †
|
478 |
+
α, F˜αρ]
|
479 |
+
�
|
480 |
+
.
|
481 |
+
(14)
|
482 |
+
Using some straightforward algebra (see Appendix A),
|
483 |
+
Eq. (14) can be simplified to
|
484 |
+
∂ρ
|
485 |
+
∂t = i[ρ, HS + HLS] +
|
486 |
+
d2−1
|
487 |
+
�
|
488 |
+
α,˜α=1
|
489 |
+
Γα˜α
|
490 |
+
�
|
491 |
+
F˜αρF †
|
492 |
+
α − {F †
|
493 |
+
αF˜α, ρ}
|
494 |
+
2
|
495 |
+
�
|
496 |
+
,
|
497 |
+
(15)
|
498 |
+
where Γα˜α is a (d2 −1)×(d2 −1) hermitian matrix given
|
499 |
+
by
|
500 |
+
Γα˜α = ϵ2 �
|
501 |
+
l
|
502 |
+
(a∗
|
503 |
+
lαbl˜α + c′∗
|
504 |
+
lαa′
|
505 |
+
l˜α + b∗
|
506 |
+
lαal˜α + a′∗
|
507 |
+
lαc′
|
508 |
+
l˜α),
|
509 |
+
(16)
|
510 |
+
where x∗ in Eq. (16) denotes the complex conjugate of x,
|
511 |
+
and the expression of HLS that appears in Eq. (15) can
|
512 |
+
be found in Appendix A. Since Eq. (16) is of the form in
|
513 |
+
Eq. (12), the condition for preserving complete positivity
|
514 |
+
of ρ is equivalent to Γ being positive semidefinite.
|
515 |
+
2.
|
516 |
+
The dissipator
|
517 |
+
Let us now look at Γα˜α from Eq. (16). Recall from
|
518 |
+
Sec. II A 1, that if α ≥ d2
|
519 |
+
L, then alα = a′
|
520 |
+
lα = 0. Therefore,
|
521 |
+
Γα˜α = 0 when α, ˜α ≥ d2
|
522 |
+
L, and has the following structure:
|
523 |
+
Γ =
|
524 |
+
�
|
525 |
+
Γα,˜α<d2
|
526 |
+
L
|
527 |
+
Γα<d2
|
528 |
+
L,˜α≥d2
|
529 |
+
L
|
530 |
+
Γα≥d2
|
531 |
+
L,˜α<d2
|
532 |
+
L
|
533 |
+
0
|
534 |
+
�
|
535 |
+
.
|
536 |
+
(17)
|
537 |
+
In general, the off-diagonal blocks Γα<d2
|
538 |
+
L,˜α≥d2
|
539 |
+
L, and
|
540 |
+
Γα≥d2
|
541 |
+
L,˜α<d2
|
542 |
+
L will not be identically zero.
|
543 |
+
The RE will
|
544 |
+
preserve complete positivity if and only if the matrix
|
545 |
+
Γ is positive semidefinite. To move forward we will re-
|
546 |
+
quire the following Lemma concerning positive semidefi-
|
547 |
+
nite matrices.
|
548 |
+
Lemma 1 Let M be any positive semidefinite matrix,
|
549 |
+
such that Mjj = 0. Then, ∀i it must be the case that
|
550 |
+
Mij = Mji = 0. Thus, if a positive semidefinite matrix
|
551 |
+
has a zero as its jth diagonal element, then the entire jth
|
552 |
+
row and jth column must consist of zeros.
|
553 |
+
Proof : For a matrix M to be positive semidefinite, it
|
554 |
+
is necessary that every 2 × 2 matrix (M ′) of the form
|
555 |
+
M ′ =
|
556 |
+
� Mii Mij
|
557 |
+
Mji Mjj
|
558 |
+
�
|
559 |
+
(18)
|
560 |
+
is positive semidefinite. Otherwise there would exist a
|
561 |
+
vector |v′⟩ such that ⟨v′| M ′ |v′⟩ < 0. Then, there would
|
562 |
+
exist a vector |v⟩ which is non-zero only on the ith and
|
563 |
+
jth entries, such that ⟨v| M |v⟩ = ⟨v′| M ′ |v′⟩ < 0.
|
564 |
+
If
|
565 |
+
Mjj = 0, the eigenvalues of M ′ are given by solving the
|
566 |
+
characteristic equation: λ2 − Miiλ − MijMji = 0. Since
|
567 |
+
M is hermitian, for both eigenvalues to be non-negative,
|
568 |
+
it must be the case that Mij = Mji = 0.
|
569 |
+
Applying Lemma 1 to Eq. (17), we find that Γ can
|
570 |
+
be positive semidefinite only if the off-diagonal blocks
|
571 |
+
Γα<d2
|
572 |
+
L,˜α≥d2
|
573 |
+
L and Γα≥d2
|
574 |
+
L,˜α<d2
|
575 |
+
L are zero. Since this is not
|
576 |
+
generically true for RE, we have shown that the RE equa-
|
577 |
+
tion for any generic setup where the bath only couples
|
578 |
+
to a part of the system violates complete positivity. An
|
579 |
+
important exception here are situations where the RE
|
580 |
+
happens to be such that the off-diagonal blocks in Γ are
|
581 |
+
identically zero. In such cases, the RE dissipator consists
|
582 |
+
of operators of the form fi ⊗ IM/√dM, and acts only
|
583 |
+
the part of the system connected to the bath. However,
|
584 |
+
such situations can be expected to arise in only some ex-
|
585 |
+
tremely special cases. Even in such situations, RE may
|
586 |
+
or may not preserve complete positivity, depending on
|
587 |
+
Γα<d2
|
588 |
+
L,˜α<d2
|
589 |
+
L. Thus we have rigorously shown that for se-
|
590 |
+
tups where the bath couples to only a part of the system,
|
591 |
+
the RE will violate complete positivity unless its dissipa-
|
592 |
+
tor is “local” and acts only on the part of the system
|
593 |
+
that is connected to the bath. We also see from Eq. (16),
|
594 |
+
that both the positive and negative eigenvalues of the Γ
|
595 |
+
matrix can be the same order in system-bath coupling,
|
596 |
+
i.e O(ϵ2).
|
597 |
+
We stress that although it is known that RE does not
|
598 |
+
conserve complete positivity, most previous works show
|
599 |
+
this via specific examples (for instance, [24, 25, 30, 32]).
|
600 |
+
To the best of our knowledge, we are not aware of a
|
601 |
+
proof of violation of complete positivity via the explicit,
|
602 |
+
model independent construction as shown above. In Ap-
|
603 |
+
pendix B, we give a concrete example of a two-qubit XXZ
|
604 |
+
system with the first qubit connected to the bath. We
|
605 |
+
indeed find that the matrix Γ for this specific example
|
606 |
+
has the expected structure from Eq. (17), and negative
|
607 |
+
eigenvalues.
|
608 |
+
A natural question that arises, is how one could recover
|
609 |
+
complete positivity of RE via a suitable approximation to
|
610 |
+
the RE. In order to recover complete positivity, one must
|
611 |
+
change Γα˜α to some �Γα˜α that is positive semidefinite. By
|
612 |
+
the above discussion, for any ˜α ≥ d2
|
613 |
+
L, this will require
|
614 |
+
either (i) making �Γαα > 0, ∀α > d2
|
615 |
+
L or (ii) making �Γα˜α =
|
616 |
+
|
617 |
+
5
|
618 |
+
0 ∀α < d2
|
619 |
+
L. We will see in the next section (Sec. III) that
|
620 |
+
any equation with (i), will violate local conservation laws.
|
621 |
+
III.
|
622 |
+
LINDBLAD DESCRIPTIONS OBEYING
|
623 |
+
LOCAL CONSERVATION LAWS
|
624 |
+
A.
|
625 |
+
Local conservation laws
|
626 |
+
Let us make precise what we mean by preservation of
|
627 |
+
local conservation laws. For our setup, since the bath
|
628 |
+
only acts on HL part of the system, any operator on
|
629 |
+
HM commutes with the system-bath coupling Hamilto-
|
630 |
+
nian HSB (see Eq. (10), Fig. 1). So, writing down the
|
631 |
+
Heisenberg equation of motion with respect to the full
|
632 |
+
Hamiltonian H [Eq. (2)], and using Eq. (10), we see that
|
633 |
+
the dynamical equation for the expectation value of any
|
634 |
+
observable OM on HM is given by
|
635 |
+
d
|
636 |
+
dt ⟨IL ⊗ OM⟩ = −i ⟨[IL ⊗ OM, HS]⟩
|
637 |
+
(19)
|
638 |
+
where ⟨X⟩ = Tr[Xρ]. Any effective QME obtained by
|
639 |
+
integrating out the bath should satisfy this property. We
|
640 |
+
call QMEs satisfying this property as ones preserving lo-
|
641 |
+
cal conservation laws. The justification for this name be-
|
642 |
+
comes clear if we look at an operator in HM that would
|
643 |
+
remain conserved if there is coupling with HL, i.e, if HLM
|
644 |
+
in Eq.(11) is zero. One such operator is the Hamiltonian
|
645 |
+
HM. The dynamical equation for expectation value of
|
646 |
+
HM gives the energy continuity equation
|
647 |
+
d
|
648 |
+
dt ⟨HM⟩ = JL→M,
|
649 |
+
JL→M = −i ⟨[HM, HLM]⟩ .
|
650 |
+
(20)
|
651 |
+
Here, JL→M can be interpreted as the energy current
|
652 |
+
from the region L to the region M (see Fig. 1). In steady
|
653 |
+
state, the rate of change of any system operator is zero.
|
654 |
+
From above equation, this gives, JL→M = 0 in steady
|
655 |
+
state. Thus, steady state energy current inside the sys-
|
656 |
+
tem is zero. This is a statement of local conservation of
|
657 |
+
energy and is one of the fundamental physical require-
|
658 |
+
ments for a system coupled to a single bath that follows
|
659 |
+
from the more general requirement Eq. (19).
|
660 |
+
Importantly, the RE, i.e, Eq. (5), can be shown to sat-
|
661 |
+
isfy Eq. (19) [23] and thereby preserves local conservation
|
662 |
+
laws. We can write any QME to leading order in system
|
663 |
+
bath coupling as
|
664 |
+
∂ρ
|
665 |
+
∂t = L0(ρ) + ϵ2L2(ρ),
|
666 |
+
(21)
|
667 |
+
where L0(ρ) = i[ρ, HS] and L2(ρ) contains both the dis-
|
668 |
+
sipator and the Lamb-shift Hamiltonian. Computing the
|
669 |
+
left hand size of Eq. (19) using Eq. (21), and comparing
|
670 |
+
with the right hand size of Eq. (19), we obtain [23],
|
671 |
+
Tr[(IM ⊗ OM)L2(ρ)] = 0.
|
672 |
+
(22)
|
673 |
+
This is a necessary condition for satisfying local conser-
|
674 |
+
vation laws. If we now further restrict the QME to be of
|
675 |
+
Lindblad form, i.e, of the form Eq. (1), thereby respecting
|
676 |
+
complete positivity, we obtain the following theorem.
|
677 |
+
Theorem 2 Any QME of Lindblad form Eq. (1) (thereby
|
678 |
+
satisfying complete positivity) that also satisfies local con-
|
679 |
+
servation laws must have the Lindblad operators and the
|
680 |
+
Lamb-shift Hamiltonian acting only on the part of the
|
681 |
+
system connected to the bath. That is, Lλ = LL
|
682 |
+
λ ⊗ IM,
|
683 |
+
HLS = HL
|
684 |
+
LS ⊗IM, where LL
|
685 |
+
λ, HL
|
686 |
+
LS act only on the Hilbert
|
687 |
+
space HL which is coupled to the bath by system-bath cou-
|
688 |
+
pling Hamiltonian HSB, and IM is the identity on the
|
689 |
+
remaining of the system Hilbert space HM.
|
690 |
+
In the next subsection, we give the proof of this theorem.
|
691 |
+
B.
|
692 |
+
Proof of theorem 2
|
693 |
+
We start by writing the most general Lindblad equa-
|
694 |
+
tion in the basis of Sec. II A 1,
|
695 |
+
∂ρ
|
696 |
+
∂t = i[ρ, HS + �HLS] +
|
697 |
+
d2−1
|
698 |
+
�
|
699 |
+
α,˜α=1
|
700 |
+
�Γα˜α
|
701 |
+
�
|
702 |
+
F˜αρF †
|
703 |
+
α − {F †
|
704 |
+
αF˜α, ρ}
|
705 |
+
2
|
706 |
+
�
|
707 |
+
(23)
|
708 |
+
where �HLS is some Lamb shift Hamiltonian, and �Γ is a
|
709 |
+
positive semidefinite matrix. As mentioned before, this
|
710 |
+
form can be reduced to the form of Eq.(1) by transform-
|
711 |
+
ing to a basis where matrix �Γ is diagonal. So, it suffices to
|
712 |
+
work with this form. Since Fi = fi ⊗ IM for 1 ≤ i < d2
|
713 |
+
L,
|
714 |
+
the condition for the Lindblad operators to act only on
|
715 |
+
HL then translates to the matrix �Γ being of the form
|
716 |
+
�Γ =
|
717 |
+
� �Γα,˜α<d2
|
718 |
+
L 0
|
719 |
+
0
|
720 |
+
0
|
721 |
+
�
|
722 |
+
.
|
723 |
+
(24)
|
724 |
+
In the following we prove that in order to preserve local
|
725 |
+
conservation laws the matrix �Γ must be of this form.
|
726 |
+
1.
|
727 |
+
The restriction on �Γ
|
728 |
+
Writing down the evolution of any observable IL ⊗OM
|
729 |
+
for Eq. (23), we have
|
730 |
+
d ⟨IL ⊗ OM⟩
|
731 |
+
dt
|
732 |
+
= −i ⟨[IL ⊗ OM, HS]⟩ − i ⟨[IL ⊗ OM, �HLS]⟩
|
733 |
+
+
|
734 |
+
d2
|
735 |
+
L−1
|
736 |
+
�
|
737 |
+
α=1
|
738 |
+
d2−1
|
739 |
+
�
|
740 |
+
˜α=d2
|
741 |
+
L
|
742 |
+
�Γα˜α
|
743 |
+
2
|
744 |
+
⟨[IL ⊗ OM, F †
|
745 |
+
αF˜α]⟩
|
746 |
+
+
|
747 |
+
d2−1
|
748 |
+
�
|
749 |
+
α=d2
|
750 |
+
L
|
751 |
+
d2
|
752 |
+
L−1
|
753 |
+
�
|
754 |
+
˜α=1
|
755 |
+
�Γα˜α
|
756 |
+
2
|
757 |
+
⟨[F †
|
758 |
+
αF˜α, IL ⊗ OM]⟩
|
759 |
+
+
|
760 |
+
d2−1
|
761 |
+
�
|
762 |
+
α,˜α=d2
|
763 |
+
L
|
764 |
+
�
|
765 |
+
�Γα˜α
|
766 |
+
�
|
767 |
+
⟨F †
|
768 |
+
α(IL ⊗ OM)F˜α⟩ − 1
|
769 |
+
2 ⟨(IL ⊗ OM)F †
|
770 |
+
αF˜α⟩
|
771 |
+
− 1
|
772 |
+
2 ⟨F †
|
773 |
+
αF˜α(IL ⊗ OM)⟩
|
774 |
+
�
|
775 |
+
(25)
|
776 |
+
|
777 |
+
6
|
778 |
+
where ⟨X⟩ denotes the expectation value of X given by
|
779 |
+
Tr[Xρ], and we use the fact that [Fi, IL ⊗ OM] = 0 when
|
780 |
+
i < d2
|
781 |
+
L. We can combine all commutators in above equa-
|
782 |
+
tion into a single commutator with an effective Lamb-
|
783 |
+
shift like Hamiltonian, which we denote �H(2)
|
784 |
+
LS. This gives
|
785 |
+
d ⟨IL ⊗ OM⟩
|
786 |
+
dt
|
787 |
+
= −i ⟨[IL ⊗ OM, HS + �H(2)
|
788 |
+
LS]⟩
|
789 |
+
+
|
790 |
+
d2−1
|
791 |
+
�
|
792 |
+
α,˜α=d2
|
793 |
+
L
|
794 |
+
�Γα˜α
|
795 |
+
�
|
796 |
+
⟨F †
|
797 |
+
α(IL ⊗ OM)F˜α⟩ − 1
|
798 |
+
2 ⟨(IL ⊗ OM)F †
|
799 |
+
αF˜α⟩
|
800 |
+
− 1
|
801 |
+
2 ⟨F †
|
802 |
+
αF˜α(IL ⊗ OM)⟩
|
803 |
+
�
|
804 |
+
(26)
|
805 |
+
where �H(2)
|
806 |
+
LS is some hermitian operator. Comparing with
|
807 |
+
Eq. (19), and noting that Tr[Mρ] = 0
|
808 |
+
∀ρ implies M =
|
809 |
+
0, we obtain the condition for satisfying Eq. (19) as
|
810 |
+
− i[IL ⊗ OM, �H(2)
|
811 |
+
LS] +
|
812 |
+
d2−1
|
813 |
+
�
|
814 |
+
α,˜α=d2
|
815 |
+
L
|
816 |
+
�Γα˜α
|
817 |
+
�
|
818 |
+
F †
|
819 |
+
α(IL ⊗ OM)F˜α
|
820 |
+
− 1
|
821 |
+
2(IL ⊗ OM)F †
|
822 |
+
αF˜α − 1
|
823 |
+
2F †
|
824 |
+
αF˜α(IL ⊗ OM)
|
825 |
+
�
|
826 |
+
= 0
|
827 |
+
∀OM.
|
828 |
+
(27)
|
829 |
+
We will now relabel the indices α, ˜α for the sake of con-
|
830 |
+
venience.
|
831 |
+
Recall from Sec. II A 1, that α, ˜α which ap-
|
832 |
+
pear in the above expression can be equivalently writ-
|
833 |
+
ten as α → (αL, αM), ˜α → (˜αL, ˜αM), and vice-versa,
|
834 |
+
where Fα = fαL ⊗ gαM . Therefore, �d2−1
|
835 |
+
α=1 is equivalent
|
836 |
+
to �d2
|
837 |
+
M−1
|
838 |
+
αM=1
|
839 |
+
�d2
|
840 |
+
L
|
841 |
+
αL=1. We can also expand �H(2)
|
842 |
+
LS as
|
843 |
+
�H(2)
|
844 |
+
LS =
|
845 |
+
d2
|
846 |
+
�
|
847 |
+
α=1
|
848 |
+
ναFα =
|
849 |
+
d2
|
850 |
+
L
|
851 |
+
�
|
852 |
+
αL=1
|
853 |
+
d2
|
854 |
+
M
|
855 |
+
�
|
856 |
+
αM=1
|
857 |
+
ναL,αM (fαL ⊗gαM ). (28)
|
858 |
+
This basis aids in taking a partial trace over the L part of
|
859 |
+
the system. Performing this partial trace and using the
|
860 |
+
orthonormality of fi operators, we can rewrite Eq. (27)
|
861 |
+
as
|
862 |
+
− i
|
863 |
+
d2
|
864 |
+
M
|
865 |
+
�
|
866 |
+
αM=1
|
867 |
+
νd2
|
868 |
+
L,αM [OM, gαM ] +
|
869 |
+
d2
|
870 |
+
M−1
|
871 |
+
�
|
872 |
+
αM,˜αM=1
|
873 |
+
�ΛαM,˜αM
|
874 |
+
�
|
875 |
+
g†
|
876 |
+
αM OMg˜αM − 1
|
877 |
+
2OMg†
|
878 |
+
αM g˜αM − 1
|
879 |
+
2g†
|
880 |
+
αM g˜αM OM
|
881 |
+
�
|
882 |
+
= 0,
|
883 |
+
∀OM.
|
884 |
+
(29)
|
885 |
+
where
|
886 |
+
�ΛαM,˜αM =
|
887 |
+
d2
|
888 |
+
L
|
889 |
+
�
|
890 |
+
αL,˜αL=1
|
891 |
+
δαL,˜αL�Γ(αL,αM),(˜αL,˜αM)
|
892 |
+
(30)
|
893 |
+
We show in Appendix C that Eq. (29) implies
|
894 |
+
d2
|
895 |
+
M−1
|
896 |
+
�
|
897 |
+
αM=1
|
898 |
+
�ΛαM,αM =
|
899 |
+
d2
|
900 |
+
M−1
|
901 |
+
�
|
902 |
+
αM=1
|
903 |
+
d2
|
904 |
+
L
|
905 |
+
�
|
906 |
+
αL=1
|
907 |
+
�Γ(αL,αM),(αL,αM) = 0 (31)
|
908 |
+
Since we require �Γ to be positive semidefinite, it cannot
|
909 |
+
have negative values on the diagonal. Therefore, Eq. (31)
|
910 |
+
implies �Γ(αL,αM),(αL,αM) = 0 for 1 ≤ αL ≤ d2
|
911 |
+
L and 1 ≤
|
912 |
+
αM ≤ d2
|
913 |
+
M − 1 .
|
914 |
+
Equivalently, �Γαα = 0 for α ≥ d2
|
915 |
+
L.
|
916 |
+
Applying Lemma 1 to this case, we see that �Γα,˜α can be
|
917 |
+
non-zero only when both α, ˜α < d2
|
918 |
+
L, and therefore �Γ is a
|
919 |
+
matrix of the form in Eq. (24). This concludes the first
|
920 |
+
part of the proof.
|
921 |
+
2.
|
922 |
+
The restriction on �
|
923 |
+
HLS
|
924 |
+
Given this structure for �Γ from Eq. (24), we now in-
|
925 |
+
vestigate the restrictions on the Lamb shift Hamilto-
|
926 |
+
nian �HLS. Since �Γ has to obey Eq. (24), we find that
|
927 |
+
�HLS = �H(2)
|
928 |
+
LS = �
|
929 |
+
αL,αM ναL,αM (fαL ⊗ gαM ) in Eq. (27).
|
930 |
+
Then, our condition for satisfying local conservation laws
|
931 |
+
from Eq. (27) is given by,
|
932 |
+
−i
|
933 |
+
d2
|
934 |
+
L
|
935 |
+
�
|
936 |
+
αL=1
|
937 |
+
d2
|
938 |
+
M
|
939 |
+
�
|
940 |
+
αM=1
|
941 |
+
ναL,αM [IL ⊗OM, (fαL ⊗gαM )] = 0
|
942 |
+
∀OM.
|
943 |
+
(32)
|
944 |
+
which further implies
|
945 |
+
− i
|
946 |
+
d2
|
947 |
+
L
|
948 |
+
�
|
949 |
+
αL=1
|
950 |
+
d2
|
951 |
+
M
|
952 |
+
�
|
953 |
+
αM=1
|
954 |
+
ναL,αM fαL ⊗ [OM, gαM ] = 0
|
955 |
+
∀OM. (33)
|
956 |
+
Multiplying both sides by f †
|
957 |
+
αL ⊗ IM, and tracing out the
|
958 |
+
L part of the system, we obtain
|
959 |
+
− i
|
960 |
+
d2
|
961 |
+
M
|
962 |
+
�
|
963 |
+
αM=1
|
964 |
+
ναL,αM [OM, gαM ] = 0
|
965 |
+
∀αL, OM.
|
966 |
+
(34)
|
967 |
+
This can happen only if
|
968 |
+
d2
|
969 |
+
M
|
970 |
+
�
|
971 |
+
αM=1
|
972 |
+
ναL,αM gαM ∝ IM
|
973 |
+
∀αL
|
974 |
+
(35)
|
975 |
+
Using Eq. (35) in Eq. (28), and recalling that �HLS =
|
976 |
+
�H(2)
|
977 |
+
LS, we obtain �HLS = �H(L)
|
978 |
+
LS ⊗ IM. This concludes the
|
979 |
+
second part of the proof.
|
980 |
+
C.
|
981 |
+
Remarks on Theorem 2
|
982 |
+
Theorem 2 says that for a QME to preserve complete
|
983 |
+
positivity and obey local conservation laws, both the
|
984 |
+
Lamb shift Hamitonian and the dissipator must only act
|
985 |
+
on the part of the system connected to the bath. Such a
|
986 |
+
Lindblad equation is often termed a ‘local Lindblad equa-
|
987 |
+
tion’. Theorem 2 thus says that only local Lindblad equa-
|
988 |
+
tions are consistent with local conservation laws. The RE
|
989 |
+
preserves local conservation laws without having a local
|
990 |
+
dissipator, but it does so at the cost of losing complete
|
991 |
+
|
992 |
+
7
|
993 |
+
positivity.
|
994 |
+
Any global form of Lindblad equation, like
|
995 |
+
the eigenbasis Lindblad equation [6, 8] and the universal
|
996 |
+
Lindblad Equation [31], violates local conservation laws,
|
997 |
+
while preserving complete positivity. One main reason
|
998 |
+
such global forms of Lindblad equations are often derived
|
999 |
+
under various approximations is that they can be proven
|
1000 |
+
to show thermalization. However, general statements re-
|
1001 |
+
lated to thermalization in local Lindblad equations are
|
1002 |
+
usually difficult to make. In the next section, we discuss
|
1003 |
+
a numerical technique which allows to study whether, in
|
1004 |
+
a given set-up, a QME consistent with Theorem 2 is pos-
|
1005 |
+
sible such that it also shows thermalization.
|
1006 |
+
IV.
|
1007 |
+
ON THE POSSIBILITY OF
|
1008 |
+
THERMALIZATION WITH LOCAL
|
1009 |
+
DISSIPATORS
|
1010 |
+
A.
|
1011 |
+
Condition for satisfying thermalization
|
1012 |
+
We start by making precise what we mean by thermal-
|
1013 |
+
ization. Going back to the form of the QME in Eq. (21),
|
1014 |
+
the setup is said to show thermalization if
|
1015 |
+
lim
|
1016 |
+
ϵ→0
|
1017 |
+
�
|
1018 |
+
lim
|
1019 |
+
t→∞ et(L0+ϵ2L2)ρ(0)
|
1020 |
+
�
|
1021 |
+
= ρth,
|
1022 |
+
ρth =
|
1023 |
+
e−βHS
|
1024 |
+
Tr[e−βHS],
|
1025 |
+
(36)
|
1026 |
+
irrespective of the initial state of the system ρ(0). Phys-
|
1027 |
+
ically, it means that if the system is weakly coupled to
|
1028 |
+
a thermal bath for a long time, and then the system-
|
1029 |
+
bath coupling is slowly switched-off, the state of the sys-
|
1030 |
+
tem will be the Gibbs state at the temperature of the
|
1031 |
+
bath, irrespective of the system’s initial state. If there
|
1032 |
+
is no explicit time-dependence in the Hamiltonian, as in
|
1033 |
+
Eq. (2), this statement can be proven starting with the
|
1034 |
+
initial state of the full set-up in Eq. (3), and assuming
|
1035 |
+
that the steady state is unique [23]. Given a QME of the
|
1036 |
+
form in Eq.(21), in Ref. [23], we showed that the follow-
|
1037 |
+
ing condition needs to be satisfied in order to guarantee
|
1038 |
+
thermalization,
|
1039 |
+
⟨Ei| L2(ρth) |Ei⟩ = 0
|
1040 |
+
∀ i.
|
1041 |
+
(37)
|
1042 |
+
where |Ei⟩ is the eigenvector of the system Hamiltonian
|
1043 |
+
HS with eigenvalue Ei.
|
1044 |
+
The derivation of this condi-
|
1045 |
+
tion can also be found in Appendix D. Given a system
|
1046 |
+
Hamiltonian HS, the inverse temperature β of the bath
|
1047 |
+
and a partition of the system Hilbert space into the part
|
1048 |
+
HL which is attached to a bath and the remainder of
|
1049 |
+
Hilbert space HM (see Fig.1), we would like to find a
|
1050 |
+
QME respecting the restrictions in theorem 2 and satis-
|
1051 |
+
fying Eq.(37). As we will see later by example, such a
|
1052 |
+
QME is not guaranteed to be possible. In the next sub-
|
1053 |
+
section, we provide a numerical way to conclusively check
|
1054 |
+
if such a QME is possible in a given setup.
|
1055 |
+
B.
|
1056 |
+
The thermalization optimization problem
|
1057 |
+
For the setup shown in Fig. 1, the most general form
|
1058 |
+
of QME respecting the restrictions in theorem 2 for sat-
|
1059 |
+
isfying complete positivity and local conservation laws
|
1060 |
+
is
|
1061 |
+
∂ρ
|
1062 |
+
∂t = i[ρ, HS + ϵ2H(L)
|
1063 |
+
LS ⊗ IM] + ϵ2
|
1064 |
+
d2
|
1065 |
+
L−1
|
1066 |
+
�
|
1067 |
+
αL,˜αL=1
|
1068 |
+
Γ(L)
|
1069 |
+
αL,˜αL
|
1070 |
+
�
|
1071 |
+
(f˜αL ⊗ IM)ρ(fαL ⊗ IM)†
|
1072 |
+
− {(fαL ⊗ IM)†(f˜αL ⊗ IM), ρ}
|
1073 |
+
2
|
1074 |
+
�
|
1075 |
+
.
|
1076 |
+
(38)
|
1077 |
+
Here H(L)
|
1078 |
+
LS is a Lamb shift Hamiltonian that acts on the
|
1079 |
+
HL part of the system, Γ(L) is (d2
|
1080 |
+
L − 1) ⊗ (d2
|
1081 |
+
L − 1) matrix
|
1082 |
+
that must be positive semidefinite, dL is the dimension
|
1083 |
+
of the Hilbert space HL that is directly coupled with the
|
1084 |
+
bath. We include the factor of ϵ2 in front of Γ(L) and
|
1085 |
+
H(L)
|
1086 |
+
LS explicitly.
|
1087 |
+
The system Hamiltonian HS and the
|
1088 |
+
Hilbert space HL are assumed to be given. The task is
|
1089 |
+
then to find H(L)
|
1090 |
+
LS and Γ(L), such that Eq.(37) is satisfied
|
1091 |
+
to a given precision, for a given inverse temperature β.
|
1092 |
+
To this end, we introduce the quantity
|
1093 |
+
τ =
|
1094 |
+
�
|
1095 |
+
i
|
1096 |
+
|⟨Ei| L2(ρth) |Ei⟩| ,
|
1097 |
+
(39)
|
1098 |
+
where L2 consist of all terms in Eq. (38) which are mul-
|
1099 |
+
tiplied by ϵ2, i.e all terms except the commutator with
|
1100 |
+
the system Hamiltonian. Then, we can cast the task in
|
1101 |
+
terms of an optimization problem given by :
|
1102 |
+
minimize :
|
1103 |
+
τ by varying H(L)
|
1104 |
+
LS , Γ(L),
|
1105 |
+
subject to :
|
1106 |
+
H(L)
|
1107 |
+
LS is hermitian,
|
1108 |
+
Tr(Γ(L)) = 1,
|
1109 |
+
Γ(L) ≥ 0,
|
1110 |
+
(40)
|
1111 |
+
where we use Γ(L) ≥ 0 to denote Γ(L) being positive
|
1112 |
+
semidefinite. The condition Tr(Γ(L)) = 1 is imposed to
|
1113 |
+
avoid the trivial solution H(L)
|
1114 |
+
LS , Γ(L) = 0, which trivially
|
1115 |
+
gives the global minimum τ = 0. Since we want Γ(L)
|
1116 |
+
to be a non-zero positive semi-definite matrix, it must
|
1117 |
+
have a positive trace. We have fixed that trace to one
|
1118 |
+
in some arbitrarily chosen energy unit.
|
1119 |
+
This does not
|
1120 |
+
cause loss of generality since the strength of system-bath
|
1121 |
+
coupling is explicitly governed by ϵ2 in Eq.(38). We call
|
1122 |
+
the optimization problem in Eq. (40) the “thermalization
|
1123 |
+
optimization problem”(TOP). Let τopt be the optimal
|
1124 |
+
value obtained from solving TOP. Given a tolerance δ,
|
1125 |
+
if τopt < δ,
|
1126 |
+
the desired QME is possible,
|
1127 |
+
else,
|
1128 |
+
the desired QME is impossible,
|
1129 |
+
(41)
|
1130 |
+
up to the precision δ.
|
1131 |
+
Most interestingly, we find that the TOP in Eq. (40)
|
1132 |
+
can be written as a SDP. The background and theoreti-
|
1133 |
+
cal framework of SDP is discussed in Appendix E 1. The
|
1134 |
+
|
1135 |
+
8
|
1136 |
+
TOP is proven to be a SDP in Appendix E 2. In particu-
|
1137 |
+
lar, any choice of H(L)
|
1138 |
+
LS and Γ(L) in Eq. (40) can be used
|
1139 |
+
to obtain an upper bound on τopt. Then, the theoreti-
|
1140 |
+
cal framework of SDP can be used to construct a “dual”
|
1141 |
+
problem to the optimization problem in Eq. (40). This
|
1142 |
+
dual problem can then be used to obtain a lower bound on
|
1143 |
+
τopt. If the lower bound and upper bound match, then
|
1144 |
+
this guarantees that one has found the global optimal
|
1145 |
+
value of τ . Our above described approach is transpar-
|
1146 |
+
ent, and simple to use, since the optimization problem in
|
1147 |
+
Eq. (40) can be directly put into standard packages for
|
1148 |
+
disciplined convex optimization like the CVX MATLAB
|
1149 |
+
package [33].
|
1150 |
+
In particular, CVX itself automatically
|
1151 |
+
constructs the dual problem, outputs τopt, and gives one
|
1152 |
+
choice of H(L)
|
1153 |
+
LS , and Γ(L) which yields the output value of
|
1154 |
+
τopt. Thus, if τopt < δ, it not only says that the desired
|
1155 |
+
type of QME is possible but also it outputs one possible
|
1156 |
+
candidate for such a QME. If τopt ≥ δ, the desired type
|
1157 |
+
of QME is impossible.
|
1158 |
+
We would like to point out here that, in a microscopic
|
1159 |
+
derivation, given the temperature of the baths, H(L)
|
1160 |
+
LS and
|
1161 |
+
Γ(L) would depend only on the bath spectral functions
|
1162 |
+
and system-bath coupling Hamiltonian.
|
1163 |
+
So, the TOP
|
1164 |
+
can be thought of as varying over all possible bath spec-
|
1165 |
+
tral functions and system-bath coupling Hamiltonians to
|
1166 |
+
find τopt. Thus, if τopt ≥ δ, we can conclusively say that,
|
1167 |
+
for the chosen system parameters and temperature, un-
|
1168 |
+
der no choice of bath spectral function and system-bath
|
1169 |
+
coupling Hamiltonian, can a Markovian QME be derived
|
1170 |
+
which simultaneously satisfies complete positivity, local
|
1171 |
+
conservation laws and shows thermalization up to the
|
1172 |
+
chosen precision. In the next subsection, we look at the
|
1173 |
+
TOP in an open XXZ qubit chain.
|
1174 |
+
C.
|
1175 |
+
Open XXZ qubit chain as an example
|
1176 |
+
We study the possibility of having a Lindblad descrip-
|
1177 |
+
tion satisfying local conservation laws and showing ther-
|
1178 |
+
malization in an open XXZ qubit chain system with some
|
1179 |
+
of the qubits attached to baths. The system Hamiltonian
|
1180 |
+
for this setup is given by
|
1181 |
+
HS =
|
1182 |
+
N
|
1183 |
+
�
|
1184 |
+
ℓ=1
|
1185 |
+
ω(ℓ)
|
1186 |
+
0
|
1187 |
+
2 σ(ℓ)
|
1188 |
+
z
|
1189 |
+
−
|
1190 |
+
N−1
|
1191 |
+
�
|
1192 |
+
ℓ=1
|
1193 |
+
gℓ
|
1194 |
+
�
|
1195 |
+
σ(ℓ)
|
1196 |
+
x σ(ℓ+1)
|
1197 |
+
x
|
1198 |
+
+ σ(ℓ)
|
1199 |
+
y σ(ℓ+1)
|
1200 |
+
y
|
1201 |
+
+ ∆ℓσ(ℓ)
|
1202 |
+
z σ(ℓ+1)
|
1203 |
+
z
|
1204 |
+
�
|
1205 |
+
,
|
1206 |
+
(42)
|
1207 |
+
where σ(ℓ)
|
1208 |
+
x,y,z denotes the Pauli matrices acting on the
|
1209 |
+
ℓth qubit, and ω(ℓ)
|
1210 |
+
0 , gℓ, and gℓ∆ℓ represent the mag-
|
1211 |
+
netic field, the overall qubit-qubit coupling strength and
|
1212 |
+
the anisotropy respectively. The first NL qubits are at-
|
1213 |
+
tached to a bath, while the remaining NM = N − NL
|
1214 |
+
qubits are not attached to any bath.
|
1215 |
+
We use the for-
|
1216 |
+
malism of Sec. IV B to investigate thermalization in this
|
1217 |
+
set-up for various values of NL and NM.
|
1218 |
+
In order to
|
1219 |
+
do so, we first need to construct the basis for opera-
|
1220 |
+
FIG. 2. τopt vs g, for NL = 1, with ω(ℓ)
|
1221 |
+
0
|
1222 |
+
= 1, ∆ℓ = 1, β = 1
|
1223 |
+
and gℓ = g for all ℓ. The tolerance chosen is δ = 10−6. We find
|
1224 |
+
that τopt ≫ δ, conclusively showing that, for such setups, no
|
1225 |
+
QME can simultaneously preserve complete positivity, obey
|
1226 |
+
local conservation laws, and show thermalization up to the
|
1227 |
+
precision set by the tolerance.
|
1228 |
+
FIG. 3.
|
1229 |
+
τopt vs β, for NL = 1, with ω(ℓ)
|
1230 |
+
0
|
1231 |
+
= 1, ∆ℓ = 1,
|
1232 |
+
gℓ = 0.1 for all ℓ. The tolerance chosen is δ = 10−6, and is
|
1233 |
+
plotted as the dashed horizontal line. We find that τopt ≫ δ,
|
1234 |
+
indicating that, for such setups, it is not possible to have a
|
1235 |
+
QME simultaneously preserving complete positivity, obeying
|
1236 |
+
local conservation laws, and showing thermalization up to the
|
1237 |
+
precision set by the tolerance.
|
1238 |
+
tors in Hilbert space of the first NL qubits, so that the
|
1239 |
+
most general form of the desired QME can be written
|
1240 |
+
as in Eq. (38).
|
1241 |
+
For the ℓth qubit, we choose the ba-
|
1242 |
+
sis {−σ(ℓ)
|
1243 |
+
z /
|
1244 |
+
√
|
1245 |
+
2, σ(ℓ)
|
1246 |
+
+ , σ(ℓ)
|
1247 |
+
− , I(ℓ)
|
1248 |
+
2 /
|
1249 |
+
√
|
1250 |
+
2}, where σ(ℓ)
|
1251 |
+
+
|
1252 |
+
= (σ(ℓ)
|
1253 |
+
x
|
1254 |
+
+
|
1255 |
+
iσ(ℓ)
|
1256 |
+
y )/2, σ(ℓ)
|
1257 |
+
− = (σ(ℓ)
|
1258 |
+
x
|
1259 |
+
− iσ(ℓ)
|
1260 |
+
y )/2, and I(ℓ)
|
1261 |
+
2
|
1262 |
+
is the identity
|
1263 |
+
operator for the qubit Hilbert space. The basis for the
|
1264 |
+
first NL qubits is obtained by direct product of the basis
|
1265 |
+
of each of the qubits. We construct the TOP [Eq.(40)]
|
1266 |
+
in this basis, which we then directly input in the CVX
|
1267 |
+
MATLAB package to obtain τopt. We set an ad-hoc value
|
1268 |
+
of the tolerance δ = 10−6 [see Eq.(41)]. In a typical cal-
|
1269 |
+
culation from a weak system-bath coupling QME, usually
|
1270 |
+
the error due to neglecting higher order terms would be
|
1271 |
+
larger than such a low value of tolerance.
|
1272 |
+
|
1273 |
+
-NM=1
|
1274 |
+
θNM = 2
|
1275 |
+
×NM=3
|
1276 |
+
+NM=4
|
1277 |
+
10
|
1278 |
+
10~3
|
1279 |
+
100
|
1280 |
+
10-1
|
1281 |
+
10~2
|
1282 |
+
910
|
1283 |
+
*NM=1
|
1284 |
+
θNM=2
|
1285 |
+
10-5
|
1286 |
+
×NM =3
|
1287 |
+
+NM= 4
|
1288 |
+
100
|
1289 |
+
10-1
|
1290 |
+
101
|
1291 |
+
39
|
1292 |
+
1.
|
1293 |
+
Single qubit attached to bath
|
1294 |
+
First we consider the case where the first qubit of the
|
1295 |
+
chain is coupled to a bath, so, NL = 1. In Fig. (2), we
|
1296 |
+
plot τopt vs g for NM = 1, 2, 3, fixing ω(ℓ)
|
1297 |
+
0
|
1298 |
+
= 1, ∆ℓ = 1 for
|
1299 |
+
all ℓ and β = 1. We find that τopt ≫ δ when NL = 1, and
|
1300 |
+
NM = 1, 2, 3. Thus, no Markovian QME can simultane-
|
1301 |
+
ously preserve complete positivity, obey local conserva-
|
1302 |
+
tion laws, and satisfy thermalization for such setups in
|
1303 |
+
the chosen range of parameters. This explicit example
|
1304 |
+
also directly rules out the possibility of having a general
|
1305 |
+
form of Markovian QME that is guaranteed to meet all
|
1306 |
+
the fundamental requirements. We see from Fig. (2) that
|
1307 |
+
τopt increases with g. This is consistent with previous re-
|
1308 |
+
sults showing that such local Lindblad equations become
|
1309 |
+
a good description when the coupling between the sys-
|
1310 |
+
tem qubits are weak.
|
1311 |
+
Additionally, we see that for a
|
1312 |
+
given value of g, τopt decreases as NM increases. This,
|
1313 |
+
interestingly, seems to indicate that for long chains, local
|
1314 |
+
Lindblad with dissipator acting on only one qubit might
|
1315 |
+
be able to describe the thermal state up to a reason-
|
1316 |
+
ably good precision. However, more detailed studies are
|
1317 |
+
required to make any conclusive statement in this direc-
|
1318 |
+
tion.
|
1319 |
+
Intuitively, memory effects, and hence Markovianity of
|
1320 |
+
open system dynamics, depend on temperature. So, we
|
1321 |
+
might expect that at a different temperature, τopt might
|
1322 |
+
be smaller than δ.
|
1323 |
+
In Fig. (3), we plot τopt vs β for
|
1324 |
+
NL = 1, fixing ω(ℓ)
|
1325 |
+
0
|
1326 |
+
= 1, ∆ℓ = 1, gℓ = 0.1 for all ℓ. We
|
1327 |
+
find that τopt ≫ δ, for almost the entire range of β chosen,
|
1328 |
+
showing that for these parameters, no Markovian QME
|
1329 |
+
can simultaneously preserve complete positivity, obey lo-
|
1330 |
+
cal conservation laws, and satisfy thermalization. But,
|
1331 |
+
we see some interesting features. Firstly, as before, we
|
1332 |
+
see that τopt decreases as NM increases. Secondly, we see
|
1333 |
+
that τopt varies non-monotonically with β. At very low
|
1334 |
+
temperatures, τopt decreases tends to decay below δ. In
|
1335 |
+
Fig. (3), for NM = 4 and β = 10, τopt < δ. At high
|
1336 |
+
temperatures also, τopt decreases. This suggests that at
|
1337 |
+
very low and very high temperatures, it is possible to
|
1338 |
+
obtain a local Lindblad equation that shows thermaliza-
|
1339 |
+
tion. That this is indeed true can be checked indepen-
|
1340 |
+
dently. At such extremes of temperatures, for at least
|
1341 |
+
some choices of baths and system-bath couplings, local
|
1342 |
+
Linblad equations can be microscopically derived [34, 35].
|
1343 |
+
This explains the non-monotonic dependence of τopt on
|
1344 |
+
β. Since very high and very low temperatures can allow
|
1345 |
+
for a local Lindblad description, it is then intuitive that
|
1346 |
+
departure from such behavior is maximum when β is of
|
1347 |
+
the order of system time scales. Indeed it is close to such
|
1348 |
+
values of β, i.e, β ∼ ω(ℓ)
|
1349 |
+
0
|
1350 |
+
= 1, that the highest value of
|
1351 |
+
τopt is seen in Fig. (3).
|
1352 |
+
We would like to point out here that, τopt ≥ δ does not
|
1353 |
+
mean the system coupled to a thermal bath is unable
|
1354 |
+
to thermalize for such parameters. Unless in extremely
|
1355 |
+
special cases, it is almost always possible to find a bath
|
1356 |
+
spectral function and system-bath coupling which ensure
|
1357 |
+
FIG. 4. τopt vs g, for NL = 2, with ω(ℓ)
|
1358 |
+
0
|
1359 |
+
= 1, ∆ℓ = 1, gℓ = g
|
1360 |
+
for all ℓ and β = 1. The tolerance chosen is δ = 10−6, and is
|
1361 |
+
plotted as the dashed horizontal line. We find that τopt ≪ δ
|
1362 |
+
for smaller values of g, indicating that, for such setups, it is
|
1363 |
+
possible to have a QME simultaneously preserving complete
|
1364 |
+
positivity, obeying local conservation laws, and showing ther-
|
1365 |
+
malization up to the precision set by the tolerance.
|
1366 |
+
FIG. 5. τopt vs β, for NL = 2, with ω(ℓ)
|
1367 |
+
0
|
1368 |
+
= 1, ∆ℓ = 1, gℓ = 0.1
|
1369 |
+
for all ℓ. The tolerance chosen is δ = 10−6, and is plotted as
|
1370 |
+
the dashed horizontal line. We find that τopt ≪ δ for smaller
|
1371 |
+
values of g, indicating that, for such setups, it is possible to
|
1372 |
+
have a QME simultaneously preserving complete positivity,
|
1373 |
+
obeying local conservation laws, and showing thermalization
|
1374 |
+
up to the precision set by the tolerance. The values in the
|
1375 |
+
figure less than 10−12 are below the numerical precision of
|
1376 |
+
CVX Matlab package.
|
1377 |
+
thermalization. So τopt ≥ δ instead means that, for those
|
1378 |
+
parameters, the dynamics of approach to thermal state
|
1379 |
+
cannot be governed by a completely positive Markovian
|
1380 |
+
QME preserving local conservation laws. The dynamics
|
1381 |
+
then must have some non-Markovian character. In fact,
|
1382 |
+
as we see from above example, τopt gives an estimate of
|
1383 |
+
how close to Markovianity the open system dynamics can
|
1384 |
+
be for the chosen parameters.
|
1385 |
+
Next, we discuss the case where first two qubits are
|
1386 |
+
attached to the bath and highlight the drastic difference
|
1387 |
+
observed for similar choice of parameters.
|
1388 |
+
|
1389 |
+
*NM
|
1390 |
+
二
|
1391 |
+
θNM = 2
|
1392 |
+
×NM=3
|
1393 |
+
+NM=4
|
1394 |
+
NM=5
|
1395 |
+
10-10
|
1396 |
+
Topt
|
1397 |
+
10-20
|
1398 |
+
10-1
|
1399 |
+
10~2
|
1400 |
+
100
|
1401 |
+
gNM=
|
1402 |
+
θNM=2
|
1403 |
+
&= WN*
|
1404 |
+
ΦNM=5
|
1405 |
+
Topt
|
1406 |
+
15
|
1407 |
+
10
|
1408 |
+
10-20
|
1409 |
+
101
|
1410 |
+
10-1
|
1411 |
+
100
|
1412 |
+
310
|
1413 |
+
0.00033
|
1414 |
+
0
|
1415 |
+
0
|
1416 |
+
-0.00123 0
|
1417 |
+
0 0.00033
|
1418 |
+
0
|
1419 |
+
0
|
1420 |
+
0.00019
|
1421 |
+
0 0
|
1422 |
+
0.00001
|
1423 |
+
0
|
1424 |
+
0
|
1425 |
+
0
|
1426 |
+
0.00196
|
1427 |
+
0
|
1428 |
+
0
|
1429 |
+
-0.00179 0 0
|
1430 |
+
-0.03638 0
|
1431 |
+
0
|
1432 |
+
0 0
|
1433 |
+
0
|
1434 |
+
-0.00002 0
|
1435 |
+
0
|
1436 |
+
0
|
1437 |
+
0.00081
|
1438 |
+
0
|
1439 |
+
0
|
1440 |
+
0 0
|
1441 |
+
0
|
1442 |
+
-0.00081 0
|
1443 |
+
0 0.01307
|
1444 |
+
0
|
1445 |
+
0
|
1446 |
+
-0.00021
|
1447 |
+
-0.00123 0
|
1448 |
+
0
|
1449 |
+
0.02611
|
1450 |
+
0
|
1451 |
+
0 -0.00282 0
|
1452 |
+
0
|
1453 |
+
0.00157
|
1454 |
+
0 0
|
1455 |
+
-0.00143 0
|
1456 |
+
0
|
1457 |
+
0
|
1458 |
+
-0.00179 0
|
1459 |
+
0
|
1460 |
+
0.00172
|
1461 |
+
0 0
|
1462 |
+
0.03491
|
1463 |
+
0
|
1464 |
+
0
|
1465 |
+
0 0
|
1466 |
+
0
|
1467 |
+
0.00011
|
1468 |
+
0
|
1469 |
+
0
|
1470 |
+
0
|
1471 |
+
0
|
1472 |
+
0
|
1473 |
+
0
|
1474 |
+
0 0
|
1475 |
+
0
|
1476 |
+
0
|
1477 |
+
0
|
1478 |
+
0 0
|
1479 |
+
0
|
1480 |
+
0
|
1481 |
+
0
|
1482 |
+
0.00033
|
1483 |
+
0
|
1484 |
+
0
|
1485 |
+
-0.00282 0
|
1486 |
+
0 0.00045
|
1487 |
+
0
|
1488 |
+
0
|
1489 |
+
0.00002
|
1490 |
+
0 0
|
1491 |
+
0.00011
|
1492 |
+
0
|
1493 |
+
0
|
1494 |
+
0
|
1495 |
+
-0.03638 0
|
1496 |
+
0
|
1497 |
+
0.03491
|
1498 |
+
0 0
|
1499 |
+
0.70685
|
1500 |
+
0
|
1501 |
+
0
|
1502 |
+
0 0
|
1503 |
+
0
|
1504 |
+
0.00209
|
1505 |
+
0
|
1506 |
+
0
|
1507 |
+
0
|
1508 |
+
-0.00081 0
|
1509 |
+
0
|
1510 |
+
0 0
|
1511 |
+
0
|
1512 |
+
0.00082
|
1513 |
+
0
|
1514 |
+
0 -0.01311 0
|
1515 |
+
0
|
1516 |
+
0.00021
|
1517 |
+
0.00019
|
1518 |
+
0
|
1519 |
+
0
|
1520 |
+
0.00157
|
1521 |
+
0
|
1522 |
+
0 0.00002
|
1523 |
+
0
|
1524 |
+
0
|
1525 |
+
0.00035
|
1526 |
+
0 0
|
1527 |
+
-0.00014 0
|
1528 |
+
0
|
1529 |
+
0
|
1530 |
+
0
|
1531 |
+
0
|
1532 |
+
0
|
1533 |
+
0
|
1534 |
+
0 0
|
1535 |
+
0
|
1536 |
+
0
|
1537 |
+
0
|
1538 |
+
0 0
|
1539 |
+
0
|
1540 |
+
0
|
1541 |
+
0
|
1542 |
+
0
|
1543 |
+
0
|
1544 |
+
0.01307
|
1545 |
+
0
|
1546 |
+
0
|
1547 |
+
0 0
|
1548 |
+
0
|
1549 |
+
-0.01311 0
|
1550 |
+
0 0.26032
|
1551 |
+
0
|
1552 |
+
0
|
1553 |
+
-0.00208
|
1554 |
+
0.00001
|
1555 |
+
0
|
1556 |
+
0
|
1557 |
+
-0.00143 0
|
1558 |
+
0 0.00011
|
1559 |
+
0
|
1560 |
+
0
|
1561 |
+
-0.00014 0 0
|
1562 |
+
0.00009
|
1563 |
+
0
|
1564 |
+
0
|
1565 |
+
0
|
1566 |
+
-0.00002 0
|
1567 |
+
0
|
1568 |
+
0.00011
|
1569 |
+
0 0
|
1570 |
+
0.00209
|
1571 |
+
0
|
1572 |
+
0
|
1573 |
+
0 0
|
1574 |
+
0
|
1575 |
+
0.0001
|
1576 |
+
0
|
1577 |
+
0
|
1578 |
+
0
|
1579 |
+
-0.00021 0
|
1580 |
+
0
|
1581 |
+
0 0
|
1582 |
+
0
|
1583 |
+
0.00021
|
1584 |
+
0
|
1585 |
+
0 -0.00208 0
|
1586 |
+
0
|
1587 |
+
0.00009
|
1588 |
+
TABLE I.
|
1589 |
+
The Γ(L) obtained from CVX for NL = 2, NM = 4, ω(ℓ)
|
1590 |
+
0
|
1591 |
+
= 1, gℓ = 0.1, ∆ℓ = 1, β = 1, i.e, the values used to
|
1592 |
+
compute Fig. 6. Every entry is rounded to 5 digits after the decimal point for convenience of representation. The corresponding
|
1593 |
+
H(L)
|
1594 |
+
LS is given to be zero. This Γ(L) satisfies complete positivity, local conservation laws and thermalization up to a precision of
|
1595 |
+
δ = 10−6 for the given choice of parameters.
|
1596 |
+
2.
|
1597 |
+
Two qubits attached to bath
|
1598 |
+
In Fig. (4), we plot τopt vs gℓ = g for NL = 2, i.e, first
|
1599 |
+
two qubits attached to the bath, and NM = 1, 2, 3, 4,
|
1600 |
+
taking fixed values of ω(ℓ)
|
1601 |
+
0
|
1602 |
+
= 1, ∆ℓ = 1 and β = 1. These
|
1603 |
+
parameters are the same as in Fig. 2 and g is varied over
|
1604 |
+
the same range. Quite remarkably, in stark contrast to
|
1605 |
+
Fig. 2, we find that in this case τopt ≪ δ over a consid-
|
1606 |
+
erable range for g < 1. We then look at the behavior
|
1607 |
+
of τopt versus β, fixing ω(ℓ)
|
1608 |
+
0
|
1609 |
+
= 1, ∆ℓ = 1, gℓ = g = 0.1.
|
1610 |
+
This is shown in Fig. 5. For NM > NL, we again see
|
1611 |
+
the non-monotonic behavior. However, in stark contrast
|
1612 |
+
to Fig. 3, we find that over the entire chosen range of β
|
1613 |
+
τopt ≪ δ. Thus, for NL = 2, over a considerable range of
|
1614 |
+
parameters, a QME that simultaneously preserves com-
|
1615 |
+
plete positivity, obeys local conservation laws, and satis-
|
1616 |
+
fies thermalization up to the given precision is possible.
|
1617 |
+
This is a highly non-trivial result.
|
1618 |
+
Previously, local two-qubit Lindblad dissipators have
|
1619 |
+
been used to study energy transport in XXZ-type qubit
|
1620 |
+
chains (for example, Refs. [36, 37]). However, those local
|
1621 |
+
two-qubit Lindblad operators were constructed so as to
|
1622 |
+
thermalize the two qubits only, in absence of coupling to
|
1623 |
+
the rest of the chain. Such Lindblad description is not
|
1624 |
+
guaranteed to thermalize the whole chain to the given
|
1625 |
+
inverse temperature β of the bath [38]. Our result here
|
1626 |
+
shows that it is possible to have a two-qubit local Lind-
|
1627 |
+
blad description that can thermalize the full chain to the
|
1628 |
+
given temperature of the bath to a good approximation.
|
1629 |
+
As mentioned before, CVX also outputs a possible
|
1630 |
+
choice of Γ(L) and H(L)
|
1631 |
+
LS matrices corresponding to τopt.
|
1632 |
+
So, when τopt < δ, we get one possible candidate for the
|
1633 |
+
desired type of QME. For our choice of parameters, we
|
1634 |
+
find that CVX always outputs H(L)
|
1635 |
+
LS = 0, and a non-
|
1636 |
+
trivial value of Γ(L) that would be hard to guess other-
|
1637 |
+
wise. In Table. I, we demonstrate the Γ(L) obtained for
|
1638 |
+
NL = 2, NM = 4, ω(ℓ)
|
1639 |
+
0
|
1640 |
+
= 1, gℓ = 0.1, ∆ℓ = 1, β = 1. The
|
1641 |
+
Γ(L) matrix corresponds to the basis of operators {Fk}
|
1642 |
+
chosen as
|
1643 |
+
Fk = f⌈k/4⌉ ⊗ fk(mod 4) ⊗ IM
|
1644 |
+
(43)
|
1645 |
+
where {fi} = {−σz/
|
1646 |
+
√
|
1647 |
+
2, σ−, σ+, I2/
|
1648 |
+
√
|
1649 |
+
2}, ⌈k/4⌉ denotes
|
1650 |
+
the nearest integer greater than or equal to k/4, and
|
1651 |
+
k(mod 4) denotes the value of k modulo 4, and k goes
|
1652 |
+
from 1 to 15. We also note that the exact values of Γ(L)
|
1653 |
+
and H(L)
|
1654 |
+
LS computed by CVX may depend on the exact
|
1655 |
+
configuration of the programming environment (such as
|
1656 |
+
internal solvers used by CVX).
|
1657 |
+
For every parameter of the system, there is a differ-
|
1658 |
+
ent τopt, with a corresponding value of Γ(L) and H(L)
|
1659 |
+
LS
|
1660 |
+
given by CVX. If we want to explore a large parameter
|
1661 |
+
space of the system, it seems that we need a different
|
1662 |
+
Γ(L) and H(L)
|
1663 |
+
LS for each parameter point. Surprisingly,
|
1664 |
+
we find that this is not always required. If τopt ≪ δ for
|
1665 |
+
one set of parameters, we can substantially change pa-
|
1666 |
+
rameters of the system far from the qubits attached to
|
1667 |
+
baths, and still obtain a value of τ ≪ δ with the same
|
1668 |
+
value of Γ(L) and H(L)
|
1669 |
+
LS . This is shown in Fig. (6), where
|
1670 |
+
τ is calculated changing various parameters away from
|
1671 |
+
the two qubits coupled with the bath, fixing H(L)
|
1672 |
+
LS = 0
|
1673 |
+
and Γ(L) to be the same as in Table. I. Over the entire
|
1674 |
+
regime of chosen parameters τ ≪ δ. Note that, in con-
|
1675 |
+
trast to previous plots, this is not be the optimal value of
|
1676 |
+
τ. Nevertheless, if τ ≪ δ, we still get a completely posi-
|
1677 |
+
tive Markovian QME preserving local conservation laws
|
1678 |
+
and showing thermalization up to the chosen precision.
|
1679 |
+
Given Γ(L) and H(L)
|
1680 |
+
LS , it is much easier to just check this
|
1681 |
+
rather than finding the optimal value τopt.
|
1682 |
+
If parameters of the two qubits that are coupled to the
|
1683 |
+
bath are changed, we can no longer use the same Γ(L)
|
1684 |
+
and H(L)
|
1685 |
+
LS . For example, if we choose the same Γ(L) as
|
1686 |
+
|
1687 |
+
11
|
1688 |
+
FIG. 6. τ vs g4, for NL = 2, NM = 4, with ω(ℓ)
|
1689 |
+
0
|
1690 |
+
= 1, ∆ℓ = 1,
|
1691 |
+
β = 1 and gℓ = 0.1 for all ℓ unless otherwise mentioned.
|
1692 |
+
τ is computed from Γ(L) and H(L)
|
1693 |
+
LS obtained from CVX for
|
1694 |
+
NL = 2, NM = 4, with ω(ℓ)
|
1695 |
+
0
|
1696 |
+
= 1, ∆ℓ = 1, β = 1 and gℓ = 0.1
|
1697 |
+
for all ℓ. The modified parameters for the plots are given by (i)
|
1698 |
+
(no parameters changed), (ii) ∆3 = 0.4, ∆4 = 1.2, (iii) ω(3)
|
1699 |
+
0
|
1700 |
+
=
|
1701 |
+
1.5, ω(4)
|
1702 |
+
0
|
1703 |
+
= 1.5, g5 = 0.3, (iv) ω(3)
|
1704 |
+
0
|
1705 |
+
= 1.5, ω(4)
|
1706 |
+
0
|
1707 |
+
= 1.5, g5 =
|
1708 |
+
0.3, ∆4 = 0.5, (v) g3 = 0.3. We find that τ ≪ δ = 10−6 even
|
1709 |
+
if parameters are changed for qubits of the system that are
|
1710 |
+
not coupled to the baths.
|
1711 |
+
in Fig. 6, and change g1 to 0.2 from 0.1, we get τ =
|
1712 |
+
0.0014 ≫ δ.
|
1713 |
+
The above observation suggests that the values of Γ(L)
|
1714 |
+
and H(L)
|
1715 |
+
LS obtained by CVX can be used to define a QME,
|
1716 |
+
independent of the parameters in the bulk of the sys-
|
1717 |
+
tem. This is consistent with underlying picture that each
|
1718 |
+
value of Γ(L) and H(L)
|
1719 |
+
LS corresponds to a different choice of
|
1720 |
+
the bath spectral function and the system-bath coupling
|
1721 |
+
Hamiltonian. If we change any parameter of the qubits
|
1722 |
+
attached to the baths, the change reflects substantially
|
1723 |
+
on the system-bath coupling Hamiltonian, so the value of
|
1724 |
+
τ changes drastically from τopt obtained with original pa-
|
1725 |
+
rameters. If we change any parameter away from the two
|
1726 |
+
qubits, the change reflects much less on the system-bath
|
1727 |
+
coupling Hamiltonian, causing τ to be of the same order
|
1728 |
+
as the original value of τopt. This presents an exciting
|
1729 |
+
prospect for studying the dynamics of the system-bath
|
1730 |
+
setup over a wide range of parameters, including a wide
|
1731 |
+
range of temperatures, with physically consistent Marko-
|
1732 |
+
vian QMEs. Such studies may also be possible for long
|
1733 |
+
chains, since local Markovian dissipation is favourable for
|
1734 |
+
tensor network based numerical techniques. Such dissi-
|
1735 |
+
pation may, also, in principle, be engineered in quantum
|
1736 |
+
computing and quantum simulation platforms, like ion
|
1737 |
+
traps [39, 40], Rydberg atoms [41, 42], superconducting
|
1738 |
+
qubits [43] and quantum dots [44].
|
1739 |
+
V.
|
1740 |
+
SUMMARY AND OUTLOOK
|
1741 |
+
Searching for a physically consistent Markvian QME
|
1742 |
+
— A physically consistent Markovian QME must satisfy
|
1743 |
+
complete positivity, obey local conservation laws and be
|
1744 |
+
able to show thermalization. In this work, we have sys-
|
1745 |
+
tematically gone about searching for such QMEs. This
|
1746 |
+
is done in three steps, and the result in each step has im-
|
1747 |
+
portant consequences. Especially, we are led to introduce
|
1748 |
+
the TOP problem, which is an optimization problem for
|
1749 |
+
finding a QME with all the above properties up to a given
|
1750 |
+
precision. The TOP opens a completely new avenue in
|
1751 |
+
the study of dissipative quantum systems.
|
1752 |
+
We consider a finite-dimensional undriven system a
|
1753 |
+
part of which is weakly coupled to a thermal bath. The
|
1754 |
+
microscopically derived QME written to leading order
|
1755 |
+
in system-bath coupling is the RE, which is known to
|
1756 |
+
obey local conservation laws and be able to show ther-
|
1757 |
+
malization [23].
|
1758 |
+
First, we show in generality that the
|
1759 |
+
RE violates complete positivity, unless in extremely spe-
|
1760 |
+
cial cases. Although there are previous works showing
|
1761 |
+
this via specific examples (for instance, [24, 25, 30, 32]),
|
1762 |
+
we are unaware of a model independent proof similar to
|
1763 |
+
ours. Next, we prove that imposing complete positivity
|
1764 |
+
and preservation of local conservation laws enforces the
|
1765 |
+
QME to be of ‘local’ form. That is, the Lindblad op-
|
1766 |
+
erators and the Lamb-shift Hamiltonian must have sup-
|
1767 |
+
port only on the part of the system directly coupled to
|
1768 |
+
the bath, and be identity elsewhere. This rules out the
|
1769 |
+
possibility of any ‘global’ forms of Lindblad equations,
|
1770 |
+
which are usually constructed to show thermalization,
|
1771 |
+
to be consistent with local conservation laws. Then, we
|
1772 |
+
ask if a ‘local’ Lindblad equation can be found which is
|
1773 |
+
able to show thermalization. We find that, the task of
|
1774 |
+
finding such a Lindblad equation can be cast as an op-
|
1775 |
+
timization problem, which we call TOP. Most interest-
|
1776 |
+
ingly, this optimization problem turns out to be a SDP.
|
1777 |
+
For given system and parameters, the SDP can be ef-
|
1778 |
+
ficiently solved using high-level programming packages
|
1779 |
+
like the CVX Matlab package. The output of the TOP
|
1780 |
+
conclusively shows whether the desired type of QME is
|
1781 |
+
possible for the chosen system parameters and tempera-
|
1782 |
+
ture, up to a chosen precision. For numerical example,
|
1783 |
+
we look at the TOP in a XXZ qubit chain of few sites,
|
1784 |
+
fixing a reasonably high precision. When only the first
|
1785 |
+
site is coupled to a bath, we find that, unless in extremes
|
1786 |
+
of temperatures, it is impossible to find a local Lindblad
|
1787 |
+
equation that is capable of showing thermalization up to
|
1788 |
+
the chosen precision.
|
1789 |
+
Discussion in light of various existing forms of QMEs
|
1790 |
+
— Various forms of QMEs have been derived it literature
|
1791 |
+
under various approximations (for example, [31, 35, 45–
|
1792 |
+
54]), along with the standard RE, local and eigenbasis
|
1793 |
+
Lindblad equations [6].
|
1794 |
+
Although the above example
|
1795 |
+
shows that there is no general form of physically consis-
|
1796 |
+
tent Markovian QME, this does not immediately make
|
1797 |
+
them unusable.
|
1798 |
+
Instead, it turns out that in each of
|
1799 |
+
these forms of QME, some elements of the system den-
|
1800 |
+
sity matrix are given correctly, while the others are not
|
1801 |
+
[23]. So, one needs to be careful in interpreting the re-
|
1802 |
+
sults from them, always keeping in mind their micro-
|
1803 |
+
scopic derivation and approximations. The RE, despite
|
1804 |
+
not being completely positive, is provably more accurate
|
1805 |
+
than all such Lindblad QMEs. To elucidate how this can
|
1806 |
+
|
1807 |
+
X10-8
|
1808 |
+
2.5
|
1809 |
+
2.
|
1810 |
+
1.5
|
1811 |
+
(i)
|
1812 |
+
(ii)
|
1813 |
+
(ii)
|
1814 |
+
1
|
1815 |
+
(iv)
|
1816 |
+
中(v)
|
1817 |
+
0.5
|
1818 |
+
100
|
1819 |
+
9412
|
1820 |
+
happen, imagine that, in a given setup, physically, the
|
1821 |
+
population of one energy level, say, ⟨Ej| ρ |Ej⟩, is zero in
|
1822 |
+
steady state. The RE might then give a small negative
|
1823 |
+
value (say, ⟨Ej| ρ |Ej⟩ = −10−3), while any of the Lind-
|
1824 |
+
blad equations will give a larger positive value, which
|
1825 |
+
might be (say, ⟨Ej| ρ |Ej⟩ = 0.1). Either case is a prob-
|
1826 |
+
lem if we want to calculate various kinds of entropies,
|
1827 |
+
as often required in quantum information and thermo-
|
1828 |
+
dynamics. In case of RE, unphysical results can often
|
1829 |
+
be ruled out by checking the scaling with system-bath
|
1830 |
+
coupling [23, 55]. This is often more difficult in Lindblad
|
1831 |
+
QMEs, where approximations are often less controlled.
|
1832 |
+
The state obtained from the recently derived ULE [31],
|
1833 |
+
which been shown to violate local conservation laws [23],
|
1834 |
+
can be corrected to obtain results as accurate as the RE
|
1835 |
+
[48]. This re-instates the local conservation laws, at the
|
1836 |
+
cost of also re-instating the same positivity problem of
|
1837 |
+
the density matrix as in RE. In another recent work, a
|
1838 |
+
general form of QME has been derived [45] which is more
|
1839 |
+
accurate than RE, even though complete positivity of dy-
|
1840 |
+
namics is still not guaranteed.
|
1841 |
+
TOP and (non) Markovianity — In the microscopic
|
1842 |
+
picture, given the temperature of the bath, the QME is
|
1843 |
+
completely defined by the bath spectral functions and
|
1844 |
+
the type of system-bath coupling. The TOP can then be
|
1845 |
+
thought of as varying over all possible bath spectral func-
|
1846 |
+
tions and types of system-bath couplings to find the clos-
|
1847 |
+
est to satisfying thermalization the local Lindblad equa-
|
1848 |
+
tion can be. So, when TOP shows that the desired type
|
1849 |
+
of QME is impossible, it means no matter what type of
|
1850 |
+
bath is attached and how it is coupled to the system, for
|
1851 |
+
the chosen parameters, it is impossible to describe the
|
1852 |
+
dynamics via a completely positive Markovian QME sat-
|
1853 |
+
isfying local conservation laws and showing thermaliza-
|
1854 |
+
tion. The approach to thermal state must then have some
|
1855 |
+
non-Markovian character for such system parameters and
|
1856 |
+
temperature. The output of TOP, τopt, shows non-trivial
|
1857 |
+
dependence on the system parameters and the temper-
|
1858 |
+
ature. This dependence seems to capture how close to
|
1859 |
+
Markovian the dynamics can be for the chosen parame-
|
1860 |
+
ters.
|
1861 |
+
Surprises when two qubits are attached to bath — Sur-
|
1862 |
+
prisingly, we have found that, when first two qubits of
|
1863 |
+
the few-site XXZ chain are attached to a bath, solving
|
1864 |
+
the TOP shows that it is possible to find Lindbladians
|
1865 |
+
obeying local conservation laws and showing thermaliza-
|
1866 |
+
tion up to quite high precision. This holds over a con-
|
1867 |
+
siderable range of parameters, including a wide range of
|
1868 |
+
temperatures. Notably, in this entire parameter regime,
|
1869 |
+
when one qubit was coupled to a bath, such a QME was
|
1870 |
+
impossible.
|
1871 |
+
Whenever the TOP shows a QME respecting all condi-
|
1872 |
+
tions is possible, standard high-level programming pack-
|
1873 |
+
ages used to solve the SDP also outputs one possible form
|
1874 |
+
for such a QME. When two qubits are attached to the
|
1875 |
+
bath, the form of QME so obtained, which respects all the
|
1876 |
+
requirements, is quite non-trivial and would be hard to
|
1877 |
+
guess otherwise. Even more interestingly, we have found
|
1878 |
+
that if we take one such QME obtained for one choice of
|
1879 |
+
system parameters, and change some system parameters
|
1880 |
+
away from two qubits that couple to the bath, the QME
|
1881 |
+
still satisfies all the requirements. This opens several ex-
|
1882 |
+
citing possibilities that we describe below.
|
1883 |
+
Future directions — Our results open the exciting pos-
|
1884 |
+
sibility of studying the dynamics of approach to thermal
|
1885 |
+
state in open quantum many-body systems using phys-
|
1886 |
+
ically consistent Markovian QMEs, over a wide range
|
1887 |
+
of parameters, including a wide range of temperatures.
|
1888 |
+
This is particularly aided by the fact that local Lindblad
|
1889 |
+
equations are favourable for tensor network techniques.
|
1890 |
+
Studying such dynamics at finite temperatures is often
|
1891 |
+
quite challenging otherwise, requiring simulation of non-
|
1892 |
+
Markovian dynamics [56–58].
|
1893 |
+
The TOP lets us find parameters of the system where
|
1894 |
+
local Lindblad equations can show thermalization. For
|
1895 |
+
two qubits attached to bath, this range of parameters
|
1896 |
+
can be considerably large, as we have seen. It may be
|
1897 |
+
possible to design such local dissipation in quantum com-
|
1898 |
+
puting and quantum simulation platforms like ion traps
|
1899 |
+
[39, 40], Rydberg atoms [41, 42], superconducting qubits
|
1900 |
+
[43] and quantum dots [44]. Especially in ion traps and
|
1901 |
+
Rydberg atom platforms, this offers an interesting way to
|
1902 |
+
controllably prepare finite temperature states of complex
|
1903 |
+
quantum many-body systems in these platforms, which
|
1904 |
+
is presently a technological challenge. Usually, one would
|
1905 |
+
require global Lindblad dissipators to ensure that a ther-
|
1906 |
+
mal state is prepared. This would be hard to design in
|
1907 |
+
quantum simulation platforms if one wants to simulate
|
1908 |
+
complex many-body systems. The possibility of having
|
1909 |
+
local dissipation confined to two qubits offers a much eas-
|
1910 |
+
ier alternative.
|
1911 |
+
Moreover, as we have seen in the example of XXZ qubit
|
1912 |
+
chain, the dependence of the output of the TOP, τopt, on
|
1913 |
+
various parameters of the system already encode rich and
|
1914 |
+
interesting physics.
|
1915 |
+
For complex quantum many-body
|
1916 |
+
systems, one may need more scalable techniques for SDP,
|
1917 |
+
which is itself a direction of research in computer science
|
1918 |
+
[59].
|
1919 |
+
Using these techniques, the rich behavior of τopt
|
1920 |
+
with various parameters can then be studied.
|
1921 |
+
It is therefore clear that our results, especially the in-
|
1922 |
+
troduction of the TOP, leads to new paradigm within the
|
1923 |
+
fields of quantum information, computation and technol-
|
1924 |
+
ogy. Nevertheless, various questions still remain. One
|
1925 |
+
main question concerns steady-state coherences [55, 60–
|
1926 |
+
62]. When coupled to a thermal bath at any finite cou-
|
1927 |
+
pling, the system density matrix will have coherences in
|
1928 |
+
energy eigenbasis of the system [61, 62]. These coher-
|
1929 |
+
ences can be important in quantum information and ther-
|
1930 |
+
modynamics [63–66] and are given correctly to the lead-
|
1931 |
+
ing order by the RE [23, 55, 62]. However, it is not clear
|
1932 |
+
that the steady-state coherences calculated from physi-
|
1933 |
+
cally consistent Markovian QME obtained via TOP will
|
1934 |
+
be the same as those obtained from RE. Further inves-
|
1935 |
+
tigation is required in this respect, which will be carried
|
1936 |
+
out in future works.
|
1937 |
+
All code used in this work can be found at [67].
|
1938 |
+
|
1939 |
+
13
|
1940 |
+
ACKNOWLEDGEMENTS
|
1941 |
+
MK would like to acknowledge support from the
|
1942 |
+
project 6004-1 of the Indo-French Centre for the Promo-
|
1943 |
+
tion of Advanced Research (IFCPAR), Ramanujan Fel-
|
1944 |
+
lowship (SB/S2/RJN-114/2016), SERB Early Career Re-
|
1945 |
+
search Award (ECR/2018/002085) and SERB Matrics
|
1946 |
+
Grant (MTR/2019/001101) from the Science and En-
|
1947 |
+
gineering Research Board (SERB), Department of Sci-
|
1948 |
+
ence and Technology, Government of India. AD and MK
|
1949 |
+
acknowledge support of the Department of Atomic En-
|
1950 |
+
ergy, Government of India, under Project No. RTI4001.
|
1951 |
+
AP acknowledges funding from the European Research
|
1952 |
+
Council (ERC) under the European Unions Horizon 2020
|
1953 |
+
research and innovation program (Grant Agreement No.
|
1954 |
+
758403). A.P also acknowledges funding from the Dan-
|
1955 |
+
ish National Research Foundation through the Center of
|
1956 |
+
Excellence “CCQ” (Grant agreement no.: DNRF156).
|
1957 |
+
Appendix A: Casting Eq.(14) to Eq.(15)
|
1958 |
+
In this appendix we show the steps for taking Eq. (14)
|
1959 |
+
to the form of Eq. (15) which is more amenable to study-
|
1960 |
+
ing issues related to conservation of complete positivity.
|
1961 |
+
We start with Eq. (14), which we recall to be
|
1962 |
+
∂ρ
|
1963 |
+
∂t = i[ρ, HS] − ϵ2 �
|
1964 |
+
l
|
1965 |
+
d2
|
1966 |
+
�
|
1967 |
+
α,˜α=1
|
1968 |
+
�
|
1969 |
+
a∗
|
1970 |
+
lαbl˜α[F †
|
1971 |
+
α, F˜αρ]
|
1972 |
+
+ c′∗
|
1973 |
+
lαa′
|
1974 |
+
l˜α[ρF †
|
1975 |
+
α, F˜α] + b∗
|
1976 |
+
lαal˜α[ρF †
|
1977 |
+
α, F˜α] + a′∗
|
1978 |
+
lαc′
|
1979 |
+
l˜α[F †
|
1980 |
+
α, F˜αρ]
|
1981 |
+
�
|
1982 |
+
.
|
1983 |
+
(A1)
|
1984 |
+
This can be rewritten as
|
1985 |
+
∂ρ
|
1986 |
+
∂t = i[ρ, HS] + ϵ2 �
|
1987 |
+
l
|
1988 |
+
d2
|
1989 |
+
�
|
1990 |
+
α,˜α=1
|
1991 |
+
�
|
1992 |
+
a∗
|
1993 |
+
lαbl˜α
|
1994 |
+
�
|
1995 |
+
F˜αρF †
|
1996 |
+
α − {F †
|
1997 |
+
αF˜α, ρ}
|
1998 |
+
2
|
1999 |
+
− [F †
|
2000 |
+
αF˜α, ρ]
|
2001 |
+
2
|
2002 |
+
�
|
2003 |
+
+ c′∗
|
2004 |
+
lαa′
|
2005 |
+
l˜α
|
2006 |
+
�
|
2007 |
+
F˜αρF †
|
2008 |
+
α − {F †
|
2009 |
+
αF˜α, ρ}
|
2010 |
+
2
|
2011 |
+
+ [F †
|
2012 |
+
αF˜α, ρ]
|
2013 |
+
2
|
2014 |
+
�
|
2015 |
+
+ b∗
|
2016 |
+
lαal˜α
|
2017 |
+
�
|
2018 |
+
F˜αρF †
|
2019 |
+
α − {F †
|
2020 |
+
αF˜α, ρ}
|
2021 |
+
2
|
2022 |
+
+ [F †
|
2023 |
+
αF˜α, ρ]
|
2024 |
+
2
|
2025 |
+
�
|
2026 |
+
+ a′∗
|
2027 |
+
lαc′
|
2028 |
+
l˜α
|
2029 |
+
�
|
2030 |
+
F˜αρF †
|
2031 |
+
α − {F †
|
2032 |
+
αF˜α, ρ}
|
2033 |
+
2
|
2034 |
+
− [F †
|
2035 |
+
αF˜α, ρ]
|
2036 |
+
2
|
2037 |
+
��
|
2038 |
+
,
|
2039 |
+
(A2)
|
2040 |
+
where, A, B
|
2041 |
+
=
|
2042 |
+
AB + BA is the anti-commutator.
|
2043 |
+
Next,
|
2044 |
+
we
|
2045 |
+
note
|
2046 |
+
that
|
2047 |
+
the
|
2048 |
+
summation
|
2049 |
+
�d2
|
2050 |
+
α,˜α=1
|
2051 |
+
in
|
2052 |
+
above
|
2053 |
+
equation,
|
2054 |
+
can
|
2055 |
+
be
|
2056 |
+
written
|
2057 |
+
as
|
2058 |
+
�d2
|
2059 |
+
α,˜α=1
|
2060 |
+
=
|
2061 |
+
�
|
2062 |
+
α=˜α=d2 + �d2−1
|
2063 |
+
α=1,˜α=d2 + �d2−1
|
2064 |
+
˜α=1,α=d2 + �d2−1
|
2065 |
+
α,˜α=1 .
|
2066 |
+
Us-
|
2067 |
+
ing this, and the fact that Fd2 = IS/
|
2068 |
+
√
|
2069 |
+
d commutes with
|
2070 |
+
all operators, we combine all commutator terms and
|
2071 |
+
write them as as i[ρ, HS + HLS] to obtain
|
2072 |
+
∂ρ
|
2073 |
+
∂t = i[ρ, HS + HLS] +
|
2074 |
+
d2−1
|
2075 |
+
�
|
2076 |
+
α,˜α=1
|
2077 |
+
Γα˜α
|
2078 |
+
�
|
2079 |
+
F˜αρF †
|
2080 |
+
α − {F †
|
2081 |
+
αF˜α, ρ}
|
2082 |
+
2
|
2083 |
+
�
|
2084 |
+
.
|
2085 |
+
(A3)
|
2086 |
+
Here
|
2087 |
+
HLS = ϵ2 �
|
2088 |
+
l
|
2089 |
+
�
|
2090 |
+
d2
|
2091 |
+
�
|
2092 |
+
α,˜α=1
|
2093 |
+
�a∗
|
2094 |
+
lαbl˜α
|
2095 |
+
2i
|
2096 |
+
− c′∗
|
2097 |
+
lαa′
|
2098 |
+
l˜α
|
2099 |
+
2i
|
2100 |
+
− b∗
|
2101 |
+
lαal˜α
|
2102 |
+
2i
|
2103 |
+
+ a′∗
|
2104 |
+
lαc′
|
2105 |
+
l˜α
|
2106 |
+
2i
|
2107 |
+
�
|
2108 |
+
F †
|
2109 |
+
αF˜α
|
2110 |
+
+
|
2111 |
+
d2−1
|
2112 |
+
�
|
2113 |
+
α=1
|
2114 |
+
(a∗
|
2115 |
+
lαbl,d2 + c′∗
|
2116 |
+
lαa′
|
2117 |
+
ld2 + b∗
|
2118 |
+
lαal,d2 + a′∗
|
2119 |
+
lαc′
|
2120 |
+
l,d2)
|
2121 |
+
2i
|
2122 |
+
√
|
2123 |
+
d
|
2124 |
+
F †
|
2125 |
+
α
|
2126 |
+
−
|
2127 |
+
d2−1
|
2128 |
+
�
|
2129 |
+
˜α=1
|
2130 |
+
(a∗
|
2131 |
+
ld2bl˜α + c′∗
|
2132 |
+
l,d2a′
|
2133 |
+
l˜α + b∗
|
2134 |
+
l,d2al˜α + a′∗
|
2135 |
+
l,d2c′
|
2136 |
+
l˜α)
|
2137 |
+
2i
|
2138 |
+
√
|
2139 |
+
d
|
2140 |
+
F˜α
|
2141 |
+
�
|
2142 |
+
(A4)
|
2143 |
+
and
|
2144 |
+
Γα˜α = ϵ2 �
|
2145 |
+
l
|
2146 |
+
(a∗
|
2147 |
+
lαbl˜α + c′∗
|
2148 |
+
lαa′
|
2149 |
+
l˜α + b∗
|
2150 |
+
lαal˜α + a′∗
|
2151 |
+
lαc′
|
2152 |
+
l˜α),
|
2153 |
+
(A5)
|
2154 |
+
α, ˜α going from 1 to d2 − 1. This is Eq. (15) given in the
|
2155 |
+
main text.
|
2156 |
+
Appendix B: An example of RE violating complete
|
2157 |
+
positivity
|
2158 |
+
In this section, we will present a simple example of the
|
2159 |
+
discussion in Sec. II. Our setup consists of a two-qubit
|
2160 |
+
XXZ qubit chain, where only the first qubit is connected
|
2161 |
+
to the bath modelled by an infinite number of bosonic
|
2162 |
+
modes.
|
2163 |
+
Let H be the Hamiltonian of the full set-up,
|
2164 |
+
given by
|
2165 |
+
H = HS + ϵ HSB + HB,
|
2166 |
+
(B1)
|
2167 |
+
where
|
2168 |
+
HS = ω0
|
2169 |
+
2 (σ(1)
|
2170 |
+
z
|
2171 |
+
+ σ(2)
|
2172 |
+
z )
|
2173 |
+
− g(σ(1)
|
2174 |
+
x σ(2)
|
2175 |
+
x
|
2176 |
+
+ σ(1)
|
2177 |
+
y σ(2)
|
2178 |
+
y
|
2179 |
+
+ ∆σ(1)
|
2180 |
+
z σ(2)
|
2181 |
+
z )
|
2182 |
+
HSB =
|
2183 |
+
∞
|
2184 |
+
�
|
2185 |
+
r=1
|
2186 |
+
(κr ˆB†
|
2187 |
+
rσ(1)
|
2188 |
+
− + κ∗
|
2189 |
+
r ˆBrσ(1)
|
2190 |
+
+ )
|
2191 |
+
HB =
|
2192 |
+
∞
|
2193 |
+
�
|
2194 |
+
r=1
|
2195 |
+
Ωr ˆB†
|
2196 |
+
r ˆBr
|
2197 |
+
(B2)
|
2198 |
+
|
2199 |
+
14
|
2200 |
+
where σ(ℓ)
|
2201 |
+
x,y,z denotes the Pauli matrices acting on the ℓth
|
2202 |
+
qubit, σ(ℓ)
|
2203 |
+
+
|
2204 |
+
= (σ(ℓ)
|
2205 |
+
x
|
2206 |
+
+ iσ(ℓ)
|
2207 |
+
y )/2, σ(ℓ)
|
2208 |
+
−
|
2209 |
+
= (σ(ℓ)
|
2210 |
+
x
|
2211 |
+
− iσ(ℓ)
|
2212 |
+
y )/2,
|
2213 |
+
ˆBr is bosonic annihilation operator for the rth mode of
|
2214 |
+
the bath. Here, ω0, g, and g∆ represent the magnetic
|
2215 |
+
field, the overall qubit-qubit coupling strength and the
|
2216 |
+
anisotropy respectively. The RE for this setup can be
|
2217 |
+
computed to be [23]
|
2218 |
+
∂ρ
|
2219 |
+
∂t = i[ρ(t), HS] + ϵ2�
|
2220 |
+
[S†, S(1)ρ(t)] − [S†, ρ(t)S(2)]
|
2221 |
+
+ H.c
|
2222 |
+
�
|
2223 |
+
(B3)
|
2224 |
+
with
|
2225 |
+
S† = σ(1)
|
2226 |
+
+ ,
|
2227 |
+
S = σ(1)
|
2228 |
+
−
|
2229 |
+
S(1) =
|
2230 |
+
4
|
2231 |
+
�
|
2232 |
+
j,k=1
|
2233 |
+
|Ej⟩ ⟨Ej| σ(1)
|
2234 |
+
− |Ek⟩ ⟨Ek| D(j, k),
|
2235 |
+
S(2) =
|
2236 |
+
4
|
2237 |
+
�
|
2238 |
+
j,k=1
|
2239 |
+
|Ej⟩ ⟨Ej| σ(1)
|
2240 |
+
− |Ek⟩ ⟨Ek| C(j, k)
|
2241 |
+
,
|
2242 |
+
(B4)
|
2243 |
+
and
|
2244 |
+
C(j, k) = J(Ekj)n(Ekj)
|
2245 |
+
2
|
2246 |
+
− iP
|
2247 |
+
� ∞
|
2248 |
+
0
|
2249 |
+
dω J(ω)n(ω)
|
2250 |
+
ω − Ekj
|
2251 |
+
,
|
2252 |
+
D(j, k) = eβ(Ekj−µℓ)J(Ekj)n(Ekj)
|
2253 |
+
2
|
2254 |
+
− iP
|
2255 |
+
� ∞
|
2256 |
+
0
|
2257 |
+
dω eβ(ω−µ)J(ω)n(ω)
|
2258 |
+
ω − Ekj
|
2259 |
+
,
|
2260 |
+
J(ω) =
|
2261 |
+
∞
|
2262 |
+
�
|
2263 |
+
k=1
|
2264 |
+
2π |κk|2 δ(ω − Ωk),
|
2265 |
+
n(ω) = [eβω − 1]−1.
|
2266 |
+
(B5)
|
2267 |
+
In above, J(ω) is called the bath spectral function. Let us
|
2268 |
+
consider bosonic baths described by Ohmic spectral func-
|
2269 |
+
tions with Gaussian cut-offs, J(ω) = ωe−(ω/ωc)2Θ(ω),
|
2270 |
+
where Θ(ω) is the Heaviside step function, and ωc is the
|
2271 |
+
cut-off frequency. The above operators can then be com-
|
2272 |
+
puted numerically.
|
2273 |
+
The next step is to choose the basis fi and gj for oper-
|
2274 |
+
ators on HL and HM. For the general case, one can start
|
2275 |
+
with any set of linearly independent operators that forms
|
2276 |
+
a basis and includes the identity operator, and then ap-
|
2277 |
+
ply the Gram Schmidt orthonormalization procedure to
|
2278 |
+
produce an orthonormal basis that includes the normal-
|
2279 |
+
ized identity operator. For our case, one can easily verify
|
2280 |
+
that the set {−σ(i)
|
2281 |
+
z /
|
2282 |
+
√
|
2283 |
+
2, σ(i)
|
2284 |
+
− , σ(i)
|
2285 |
+
+ , I(i)
|
2286 |
+
2 /
|
2287 |
+
√
|
2288 |
+
2} suffices, where
|
2289 |
+
i = 1 for {fi} and i = 2 for {gj}, and I2 is the identity
|
2290 |
+
operator.
|
2291 |
+
The basis for the full system {Fi} can be constructed
|
2292 |
+
from the above basis as described in subsection
|
2293 |
+
II A 1,
|
2294 |
+
and is given by
|
2295 |
+
Fi = fi ⊗ I(2)
|
2296 |
+
2
|
2297 |
+
2
|
2298 |
+
(for i = 1, 2, 3)
|
2299 |
+
F3i+j = fi ⊗ gj
|
2300 |
+
(for i = 1, 2, 3, 4 and j = 1, 2, 3)
|
2301 |
+
F16 = I4
|
2302 |
+
2
|
2303 |
+
(B6)
|
2304 |
+
Any operator X can be expanded in terms of the above
|
2305 |
+
basis as X = �
|
2306 |
+
α xαFα, where xα = ⟨Fα, X⟩ = Tr(F †
|
2307 |
+
αX).
|
2308 |
+
Thus, expanding S, S†, S(1), S(2) [Eq. (B4)], one can
|
2309 |
+
evaluate all the coefficients in Eq. (13).
|
2310 |
+
Finally, one
|
2311 |
+
can compute the matrix Γ according to Eq. (16). The
|
2312 |
+
matrix Γ for this example, with parameters chosen as
|
2313 |
+
g = 0.1, ω0 = 1, ωc = 10, β = 1, µ = −0.5, ∆ = 1 is given
|
2314 |
+
by
|
2315 |
+
Γ = ϵ2
|
2316 |
+
�
|
2317 |
+
�����������������������
|
2318 |
+
0
|
2319 |
+
0
|
2320 |
+
0
|
2321 |
+
0
|
2322 |
+
0
|
2323 |
+
0
|
2324 |
+
0
|
2325 |
+
0 0 0 0 0 0 0 0
|
2326 |
+
0
|
2327 |
+
0
|
2328 |
+
1.542 + 3.428i 0
|
2329 |
+
0
|
2330 |
+
0.014 + 0.047i
|
2331 |
+
0
|
2332 |
+
0 0 0 0 0 0 0 0
|
2333 |
+
0 1.542 − 3.428i
|
2334 |
+
0
|
2335 |
+
0 −0.18 − 0.007i
|
2336 |
+
0
|
2337 |
+
0.18 + 0.007i 0 0 0 0 0 0 0 0
|
2338 |
+
0
|
2339 |
+
0
|
2340 |
+
0
|
2341 |
+
0
|
2342 |
+
0
|
2343 |
+
0
|
2344 |
+
0
|
2345 |
+
0 0 0 0 0 0 0 0
|
2346 |
+
0
|
2347 |
+
0
|
2348 |
+
−0.18 + 0.007i 0
|
2349 |
+
0
|
2350 |
+
0
|
2351 |
+
0
|
2352 |
+
0 0 0 0 0 0 0 0
|
2353 |
+
0 0.014 − 0.047i
|
2354 |
+
0
|
2355 |
+
0
|
2356 |
+
0
|
2357 |
+
0
|
2358 |
+
0
|
2359 |
+
0 0 0 0 0 0 0 0
|
2360 |
+
0
|
2361 |
+
0
|
2362 |
+
0.18 − 0.007i
|
2363 |
+
0
|
2364 |
+
0
|
2365 |
+
0
|
2366 |
+
0
|
2367 |
+
0 0 0 0 0 0 0 0
|
2368 |
+
0
|
2369 |
+
0
|
2370 |
+
0
|
2371 |
+
0
|
2372 |
+
0
|
2373 |
+
0
|
2374 |
+
0
|
2375 |
+
0 0 0 0 0 0 0 0
|
2376 |
+
0
|
2377 |
+
0
|
2378 |
+
0
|
2379 |
+
0
|
2380 |
+
0
|
2381 |
+
0
|
2382 |
+
0
|
2383 |
+
0 0 0 0 0 0 0 0
|
2384 |
+
0
|
2385 |
+
0
|
2386 |
+
0
|
2387 |
+
0
|
2388 |
+
0
|
2389 |
+
0
|
2390 |
+
0
|
2391 |
+
0 0 0 0 0 0 0 0
|
2392 |
+
0
|
2393 |
+
0
|
2394 |
+
0
|
2395 |
+
0
|
2396 |
+
0
|
2397 |
+
0
|
2398 |
+
0
|
2399 |
+
0 0 0 0 0 0 0 0
|
2400 |
+
0
|
2401 |
+
0
|
2402 |
+
0
|
2403 |
+
0
|
2404 |
+
0
|
2405 |
+
0
|
2406 |
+
0
|
2407 |
+
0 0 0 0 0 0 0 0
|
2408 |
+
0
|
2409 |
+
0
|
2410 |
+
0
|
2411 |
+
0
|
2412 |
+
0
|
2413 |
+
0
|
2414 |
+
0
|
2415 |
+
0 0 0 0 0 0 0 0
|
2416 |
+
0
|
2417 |
+
0
|
2418 |
+
0
|
2419 |
+
0
|
2420 |
+
0
|
2421 |
+
0
|
2422 |
+
0
|
2423 |
+
0 0 0 0 0 0 0 0
|
2424 |
+
0
|
2425 |
+
0
|
2426 |
+
0
|
2427 |
+
0
|
2428 |
+
0
|
2429 |
+
0
|
2430 |
+
0
|
2431 |
+
0 0 0 0 0 0 0 0
|
2432 |
+
�
|
2433 |
+
�����������������������
|
2434 |
+
(B7)
|
2435 |
+
|
2436 |
+
15
|
2437 |
+
We see that the above matrix has the expected struc-
|
2438 |
+
ture of Eq. (17),
|
2439 |
+
Γ =
|
2440 |
+
�
|
2441 |
+
Γα,˜α<4
|
2442 |
+
Γα<4,˜α≥4
|
2443 |
+
Γα≥4,˜α<4
|
2444 |
+
0
|
2445 |
+
�
|
2446 |
+
(B8)
|
2447 |
+
and crucially, Γα<4,˜α≥4 ̸= 0. Therefore, as per the GKSL
|
2448 |
+
theorem, this RE will not preserve complete positivity.
|
2449 |
+
This example was computed using QuTiP [68, 69].
|
2450 |
+
Appendix C: Effective Lindblad equation satisfying
|
2451 |
+
local conservation laws
|
2452 |
+
In this appendix, we will show that Eq. (29) implies
|
2453 |
+
Eq. (31). The condition for a QME preserving complete
|
2454 |
+
positivity and obeying local conservation laws is given by
|
2455 |
+
Eq. (29), which we recall to be
|
2456 |
+
− i[OM, H′] +
|
2457 |
+
d2
|
2458 |
+
M−1
|
2459 |
+
�
|
2460 |
+
αM,˜αM=1
|
2461 |
+
�ΛαM,˜αM
|
2462 |
+
�
|
2463 |
+
g†
|
2464 |
+
αM OMg˜αM
|
2465 |
+
− 1
|
2466 |
+
2OMg†
|
2467 |
+
αM g˜αM − 1
|
2468 |
+
2g†
|
2469 |
+
αM g˜αM OM
|
2470 |
+
�
|
2471 |
+
= 0,
|
2472 |
+
∀OM,
|
2473 |
+
(C1)
|
2474 |
+
where we write
|
2475 |
+
H′ =
|
2476 |
+
d2
|
2477 |
+
M
|
2478 |
+
�
|
2479 |
+
αM=1
|
2480 |
+
νd2
|
2481 |
+
L,αM gαM ,
|
2482 |
+
(C2)
|
2483 |
+
for convenience. To move forward we will use the opera-
|
2484 |
+
tor vector correspondence from Ref. 9, where the vector-
|
2485 |
+
ized version of the operator X is given by vec(X), and
|
2486 |
+
can be constructed using linearity and
|
2487 |
+
vec(|i⟩ ⟨j|) = |i⟩ ⊗ |j⟩∗ ,
|
2488 |
+
(C3)
|
2489 |
+
where |j⟩∗ denotes the complex conjugate of |j⟩. We will
|
2490 |
+
apply Eq. (C3) to Eq. (C1), using the identity (Eq. 1.132
|
2491 |
+
of Ref. 9)
|
2492 |
+
vec(A0BAT
|
2493 |
+
1 ) = (A0 ⊗ A1)vec(B).
|
2494 |
+
(C4)
|
2495 |
+
Applying the vec operation on both sides of Eq. (C1),
|
2496 |
+
we obtain
|
2497 |
+
− i vec(IMOMH′) + i vec(H′OMIM) +
|
2498 |
+
d2
|
2499 |
+
M−1
|
2500 |
+
�
|
2501 |
+
αM,˜αM=1
|
2502 |
+
�ΛαM,˜αM
|
2503 |
+
�
|
2504 |
+
vec(g†
|
2505 |
+
αM OMg˜αM ) − 1
|
2506 |
+
2vec(IMOMg†
|
2507 |
+
αM g˜αM )
|
2508 |
+
− 1
|
2509 |
+
2vec(g†
|
2510 |
+
αM g˜αM OMIM)
|
2511 |
+
�
|
2512 |
+
= 0,
|
2513 |
+
∀OM.
|
2514 |
+
(C5)
|
2515 |
+
Eq. (C5) can be simplified using Eq. (C4) to obtain,
|
2516 |
+
�
|
2517 |
+
− iIM ⊗ (H′)T + iH′ ⊗ IM
|
2518 |
+
d2
|
2519 |
+
M−1
|
2520 |
+
�
|
2521 |
+
αM,˜αM=1
|
2522 |
+
�ΛαM,˜αM
|
2523 |
+
�
|
2524 |
+
g†
|
2525 |
+
αM ⊗ gT
|
2526 |
+
˜αM − 1
|
2527 |
+
2IM ⊗ (g†
|
2528 |
+
αM g˜αM )T
|
2529 |
+
− 1
|
2530 |
+
2(g†
|
2531 |
+
αM g˜αM ) ⊗ IM
|
2532 |
+
��
|
2533 |
+
vec(OM) = 0,
|
2534 |
+
∀OM.
|
2535 |
+
(C6)
|
2536 |
+
Eq. (C6) is of the form M vec(OM) = 0 for all hermi-
|
2537 |
+
tian OM. Since hermitian matrices (such as OM) form
|
2538 |
+
a basis for the entire space of operators, this implies
|
2539 |
+
M vec(X) = 0 for all operators X. This is because one
|
2540 |
+
can expand X as a linear combination of hermitian op-
|
2541 |
+
erators (such as OM). Now, M vec(X) = 0 ∀ X implies
|
2542 |
+
M = 0. Therefore, Eq. (C6) implies
|
2543 |
+
M = − iIM ⊗ (H′)T + iH′ ⊗ IM +
|
2544 |
+
d2
|
2545 |
+
M−1
|
2546 |
+
�
|
2547 |
+
αM,˜αM=1
|
2548 |
+
�ΛαM,˜αM
|
2549 |
+
�
|
2550 |
+
g†
|
2551 |
+
αM ⊗ gT
|
2552 |
+
˜αM − 1
|
2553 |
+
2IM ⊗ (g†
|
2554 |
+
αM g˜αM )T
|
2555 |
+
− 1
|
2556 |
+
2(g†
|
2557 |
+
αM g˜αM ) ⊗ IM
|
2558 |
+
�
|
2559 |
+
= 0.
|
2560 |
+
(C7)
|
2561 |
+
If M = 0, then Tr(M) = 0. Taking the trace of Eq. (C7),
|
2562 |
+
and using the orthonormality of {gi} along with the fact
|
2563 |
+
that Tr(gi) = δi,d2
|
2564 |
+
M , we obtain
|
2565 |
+
Tr(M) = −
|
2566 |
+
d2
|
2567 |
+
M−1
|
2568 |
+
�
|
2569 |
+
αM=1
|
2570 |
+
�ΛαM,αM dM = 0
|
2571 |
+
(C8)
|
2572 |
+
which implies
|
2573 |
+
d2
|
2574 |
+
M−1
|
2575 |
+
�
|
2576 |
+
αM=1
|
2577 |
+
�ΛαM,αM =
|
2578 |
+
d2
|
2579 |
+
M−1
|
2580 |
+
�
|
2581 |
+
αM=1
|
2582 |
+
d2
|
2583 |
+
L
|
2584 |
+
�
|
2585 |
+
αL=1
|
2586 |
+
�Γ(αL,αM),(αL,αM) = 0. (C9)
|
2587 |
+
which is Eq. (31) in the main text.
|
2588 |
+
Appendix D: The condition for thermalization
|
2589 |
+
From fundamental principles of quantum statistical
|
2590 |
+
mechanics, we expect the system to thermalize when cou-
|
2591 |
+
pled to baths at equal temperatures. The exact condition
|
2592 |
+
that QME’s must obey to satisfy thermalization has been
|
2593 |
+
derived in Ref. 23. For the sake of completeness, we recall
|
2594 |
+
that discussion here.
|
2595 |
+
Let the total system Hamiltonian be given by H =
|
2596 |
+
HS + ϵHSB + HB, where ϵ is a dimensionless parame-
|
2597 |
+
ter controlling the strength of the system bath coupling,
|
2598 |
+
and HSB is the system bath coupling Hamiltonian. We
|
2599 |
+
proceed by obtaining an order-by-order solution to the
|
2600 |
+
steady state of our QME. Any QME describing our setup
|
2601 |
+
|
2602 |
+
16
|
2603 |
+
can be expanded in the so-called time-convolution-less
|
2604 |
+
form [6],
|
2605 |
+
∂ρ(t)
|
2606 |
+
∂t
|
2607 |
+
=
|
2608 |
+
∞
|
2609 |
+
�
|
2610 |
+
m=0
|
2611 |
+
ϵ2mL2m(t)[ρ(t)],
|
2612 |
+
(D1)
|
2613 |
+
where L could in general be time-dependent operators
|
2614 |
+
and L0(t)[ρ(t)] = i[ρ(t), HS]. For quantum master equa-
|
2615 |
+
tions written to second-order in system-bath coupling,
|
2616 |
+
the above summation can be truncated at second order.
|
2617 |
+
Denoting L2m ≡ limt→∞ L2m(t), the steady state ρSS
|
2618 |
+
can be given by
|
2619 |
+
ρSS = lim
|
2620 |
+
t→∞ et(L0+ϵ2L2)ρ(0),
|
2621 |
+
(D2)
|
2622 |
+
which is assumed to be unique. The steady state satisfies
|
2623 |
+
0 =
|
2624 |
+
∞
|
2625 |
+
�
|
2626 |
+
m=0
|
2627 |
+
ϵ2mL2m[ρSS].
|
2628 |
+
(D3)
|
2629 |
+
We can then perform an expansion of ρSS in the even
|
2630 |
+
powers of ϵ as
|
2631 |
+
ρSS =
|
2632 |
+
∞
|
2633 |
+
�
|
2634 |
+
m=0
|
2635 |
+
ϵ2mρ(2m)
|
2636 |
+
SS
|
2637 |
+
(D4)
|
2638 |
+
Using Eq. (D4) in Eq. (D3), we can obtain an order by
|
2639 |
+
order solution of ρSS. At the zeroth order in ϵ, we obtain
|
2640 |
+
[ρ(0)
|
2641 |
+
SS, HS] = 0.
|
2642 |
+
(D5)
|
2643 |
+
Assuming that the Hamiltonian has no degeneracies,
|
2644 |
+
Eq. (D5) implies that ρ(0)
|
2645 |
+
SS is diagonal in the energy eigen-
|
2646 |
+
basis,
|
2647 |
+
ρ(0)
|
2648 |
+
SS =
|
2649 |
+
�
|
2650 |
+
i
|
2651 |
+
pi |Ei⟩ ⟨Ei| .
|
2652 |
+
(D6)
|
2653 |
+
where |Ei⟩ is an eigenstate of the system. At second order
|
2654 |
+
in ϵ (m = 1), we obtain the following two equations,
|
2655 |
+
⟨Ei| L2[ρ(0)
|
2656 |
+
SS] |Ei⟩ = 0,
|
2657 |
+
∀i
|
2658 |
+
(D7)
|
2659 |
+
i(Ei − Ej) ⟨Ei| ρ(2)
|
2660 |
+
SS |Ej⟩
|
2661 |
+
+ϵ2 ⟨Ei| L2[ρ(0)
|
2662 |
+
SS] |Ej⟩ = 0,
|
2663 |
+
∀i ̸= j
|
2664 |
+
(D8)
|
2665 |
+
Since ρ(0)
|
2666 |
+
SS is diagonal in the energy eigenbasis, Eq. (D7)
|
2667 |
+
determines the diagonal elements of ρ(0)
|
2668 |
+
SS.
|
2669 |
+
Having ob-
|
2670 |
+
tained ρ(0)
|
2671 |
+
SS, Eq. (D8) then determines the off-diagonal
|
2672 |
+
elements of ρ(2)
|
2673 |
+
SS.
|
2674 |
+
Note from above equations that the
|
2675 |
+
leading order diagonal elements of ρSS are independent
|
2676 |
+
of ϵ.
|
2677 |
+
It can also be shown that the leading order off-
|
2678 |
+
diagonal elements of ρSS in the energy eigenbasis of the
|
2679 |
+
system scale as ϵ2. As discussed in the main text, the
|
2680 |
+
QME thermalizes if
|
2681 |
+
lim
|
2682 |
+
ϵ→0 ρSS = ρth
|
2683 |
+
(D9)
|
2684 |
+
where ρth is the Gibbs state of the system given by
|
2685 |
+
ρth =
|
2686 |
+
e−βHS
|
2687 |
+
Tr[e−βHS].
|
2688 |
+
(D10)
|
2689 |
+
We then conclude that the thermalization in this sense
|
2690 |
+
is a statement about leading order diagonal elements of
|
2691 |
+
ρSS. Substituting Eq. (D9) in Eq. (D7), we obtain the
|
2692 |
+
following condition on L2 for the system to thermalize,
|
2693 |
+
⟨Ei| L2[ρth] |Ei⟩ = 0
|
2694 |
+
∀i.
|
2695 |
+
(D11)
|
2696 |
+
Appendix E: Semidefinite Programming (SDP)
|
2697 |
+
1.
|
2698 |
+
Basic Theory
|
2699 |
+
In this section, we present the theoretical framework of
|
2700 |
+
semidefinite programming (SDP). We follow the defini-
|
2701 |
+
tion of SDPs given in page 57 of Ref. 9. In what follows,
|
2702 |
+
we will use Φ and Ψ to denote hermitian preserving lin-
|
2703 |
+
ear maps. We will also use Φ† to denote the “adjoint
|
2704 |
+
map” [9], which is defined as the unique linear map that
|
2705 |
+
satisfies
|
2706 |
+
⟨A, Φ(B)⟩ = ⟨Φ†(A), B⟩
|
2707 |
+
(E1)
|
2708 |
+
where
|
2709 |
+
⟨A, B⟩ = Tr(A†B)
|
2710 |
+
(E2)
|
2711 |
+
denotes the Hilbert Schmidt inner product.
|
2712 |
+
An SDP is defined by the tuple (Φ, Ψ, A, B, C), where
|
2713 |
+
Φ, Ψ are hermitian-preserving linear maps, and A, B, C
|
2714 |
+
are hermitian operators. The “primal” problem of the
|
2715 |
+
SDP is given by
|
2716 |
+
maximize :
|
2717 |
+
⟨A, X⟩
|
2718 |
+
w.r.t. X
|
2719 |
+
subject to :
|
2720 |
+
Φ(X) = B, Ψ(X) ≤ C, X ≥ 0,
|
2721 |
+
(E3)
|
2722 |
+
where the inequalities represent matrix inequalities. I.e,
|
2723 |
+
A ≥ B is equivalent to A − B ≥ 0 and implies A − B
|
2724 |
+
is positive semidefinite. We will use the notation Xf to
|
2725 |
+
denote any “feasible” value of X that satisfies the three
|
2726 |
+
constraints in Eq. (E3), and P to denote the maximum
|
2727 |
+
value of ⟨A, X⟩ attained in Eq. (E3) (assuming there is
|
2728 |
+
atleast one X which satisfies constraints).
|
2729 |
+
For every “primal” problem, there exists a “dual”
|
2730 |
+
problem given by
|
2731 |
+
minimize :
|
2732 |
+
⟨B, Y ⟩ + ⟨C, Z⟩
|
2733 |
+
w.r.t. Y, Z
|
2734 |
+
subject to :
|
2735 |
+
Φ†(Y ) + Ψ†(Z) ≥ A,
|
2736 |
+
Y is hermitian, Z ≥ 0.
|
2737 |
+
(E4)
|
2738 |
+
We will use the notation (Yf, Zf) to denote any “fea-
|
2739 |
+
sible” value of Y, Z that satisfies the three constraints
|
2740 |
+
in Eq. (E4), and D to denote the minimum value of
|
2741 |
+
⟨B, Y ⟩ + ⟨C, Z⟩ attained in Eqs. (E4) (assuming atleast
|
2742 |
+
some (Y, Z) satisfies constraints).
|
2743 |
+
|
2744 |
+
17
|
2745 |
+
FIG. 7.
|
2746 |
+
Schematic representing weak duality for the SDP
|
2747 |
+
given in Eqs. (E3) and (E4), according to Eq. (E6).
|
2748 |
+
X(j)
|
2749 |
+
f
|
2750 |
+
and (Y (j)
|
2751 |
+
f
|
2752 |
+
, Z(j)
|
2753 |
+
f ) represents any feasible input to the primal
|
2754 |
+
and dual problems respectively. Any such inputs yield upper
|
2755 |
+
and lower bounds on the solutions of the primal and dual
|
2756 |
+
problems.
|
2757 |
+
Semidefinite programs have a notion of duality asso-
|
2758 |
+
ciated with them, which relates properties of the primal
|
2759 |
+
and the dual problems. In particular, it can be shown
|
2760 |
+
that
|
2761 |
+
P ≤ D
|
2762 |
+
(E5)
|
2763 |
+
a property known as “weak duality”.
|
2764 |
+
In most situa-
|
2765 |
+
tions, it can be shown that P = D, i.e, equality holds
|
2766 |
+
in Eq. (E5). This condition is known as “strong dual-
|
2767 |
+
ity”.
|
2768 |
+
By weak duality and the definition of our primal and
|
2769 |
+
dual problems, using Eq. (E3),(E4), and (E5), we obtain
|
2770 |
+
⟨A, Xf⟩ ≤ P ≤ D ≤ ⟨B, Yf⟩ + ⟨C, Zf⟩ .
|
2771 |
+
(E6)
|
2772 |
+
From Eq. (E6), any feasible choice of inputs to the pri-
|
2773 |
+
mal and dual problem (Xf, Yf, Zf) leads to lower and
|
2774 |
+
upper bounds on the optimal values of the primal and
|
2775 |
+
dual problems [see Fig. (7)]. In particular, if we obtain
|
2776 |
+
⟨A, Xf⟩ = ⟨B, Yf⟩ + ⟨C, Zf⟩, equality holds throughout
|
2777 |
+
in Eq. (E6). This property can therefore be exploited to
|
2778 |
+
obtain exact solutions to the primal problem of an SDP.
|
2779 |
+
We will show in Sec. E 2 that the thermal optimiza-
|
2780 |
+
tion problem (TOP) in Eq. (40) can be reduced to the
|
2781 |
+
standard form of SDP [Eq. (E3)].
|
2782 |
+
2.
|
2783 |
+
Reducing the thermal optimization problem
|
2784 |
+
(TOP) to standard form
|
2785 |
+
Recall that the TOP was given by [Eq.(40)]
|
2786 |
+
minimize : τ
|
2787 |
+
subject to : H(L)
|
2788 |
+
LS is hermitian, Tr(Γ(L)) = 1, Γ(L) ≥ 0.
|
2789 |
+
(E7)
|
2790 |
+
See Eq. (39) for definition of τ and Eq. (38) for defini-
|
2791 |
+
tion of H(L)
|
2792 |
+
LS , Γ(L). In this subsection, we will show how
|
2793 |
+
the TOP from Eq. (E7) can be reduced to the standard
|
2794 |
+
form of an SDP. We note that the standard form of SDP
|
2795 |
+
in Eq. (E3) is not yet suitable for this purpose. There-
|
2796 |
+
fore, we replace A → −A, C → −C, Ψ → −Ψ, Y → −Y,
|
2797 |
+
in Eq. (E3) and Eq. (E4), leaving Φ, B, X and Z un-
|
2798 |
+
changed. Since maximizing any function is the same as
|
2799 |
+
minimizing its negative, we obtain the new “primal” form
|
2800 |
+
as
|
2801 |
+
minimize :
|
2802 |
+
⟨A, X⟩
|
2803 |
+
subject to :
|
2804 |
+
Φ(X) = B, Ψ(X) ≥ C, X ≥ 0,
|
2805 |
+
(E8)
|
2806 |
+
FIG. 8.
|
2807 |
+
Schematic representing weak duality for the SDP
|
2808 |
+
given in Eqs. (E8) and (E9), according to Eq. (E10). X(j)
|
2809 |
+
f
|
2810 |
+
and (Y (j)
|
2811 |
+
f
|
2812 |
+
, Z(j)
|
2813 |
+
f ) represents any feasible input to the primal
|
2814 |
+
and dual problems respectively. Any such inputs yield upper
|
2815 |
+
and lower bounds on the solutions of the primal and dual
|
2816 |
+
problems.
|
2817 |
+
where we use �P to denote the minimum value of ⟨A, X⟩
|
2818 |
+
obtained in Eq. (E8). The new “dual” form is written as
|
2819 |
+
maximize :
|
2820 |
+
⟨B, Y ⟩ + ⟨C, Z⟩
|
2821 |
+
subject to :
|
2822 |
+
Φ†(Y ) + Ψ†(Z) ≤ A,
|
2823 |
+
Y is hermitian, Z ≥ 0,
|
2824 |
+
(E9)
|
2825 |
+
where we use �D to denote the minimum value of ⟨B, Y ⟩+
|
2826 |
+
⟨C, Z⟩ obtained in Eq. (E9). Eq. (E6) is then transformed
|
2827 |
+
into [see Fig (8)],
|
2828 |
+
⟨A, Xf⟩ ≥ �P ≥ �D ≥ ⟨B, Yf⟩ + ⟨C, Zf⟩ .
|
2829 |
+
(E10)
|
2830 |
+
We will now show how to reduce the TOP from
|
2831 |
+
Eq. (E7) to Eq. (E8), via a series of changes to the opti-
|
2832 |
+
mization problem in Eq. (E8). We do so in three steps.
|
2833 |
+
Step 1: Our first step is to write down a primal op-
|
2834 |
+
timization problem whose solution (minimum value at-
|
2835 |
+
tained) is equal to
|
2836 |
+
||K||1 = Tr(
|
2837 |
+
√
|
2838 |
+
K†K).
|
2839 |
+
(E11)
|
2840 |
+
for any hermitian matrix K. Let Πp and Πn be projectors
|
2841 |
+
onto the positive and negative eigenspaces of K. In this
|
2842 |
+
case,
|
2843 |
+
||K||1 = Tr(ΠpKΠp) − Tr(ΠnKΠn).
|
2844 |
+
(E12)
|
2845 |
+
Let us now consider the optimization problem given by,
|
2846 |
+
minimize :
|
2847 |
+
��
|
2848 |
+
I 0
|
2849 |
+
0 I
|
2850 |
+
�
|
2851 |
+
,
|
2852 |
+
�
|
2853 |
+
P
|
2854 |
+
.
|
2855 |
+
.
|
2856 |
+
Q
|
2857 |
+
��
|
2858 |
+
subject to :
|
2859 |
+
Ψ1
|
2860 |
+
�
|
2861 |
+
P
|
2862 |
+
.
|
2863 |
+
.
|
2864 |
+
Q
|
2865 |
+
�
|
2866 |
+
=
|
2867 |
+
�
|
2868 |
+
P
|
2869 |
+
0
|
2870 |
+
0 Q
|
2871 |
+
�
|
2872 |
+
≥
|
2873 |
+
�
|
2874 |
+
K
|
2875 |
+
0
|
2876 |
+
0
|
2877 |
+
−K
|
2878 |
+
�
|
2879 |
+
,
|
2880 |
+
�
|
2881 |
+
P
|
2882 |
+
.
|
2883 |
+
.
|
2884 |
+
Q
|
2885 |
+
�
|
2886 |
+
≥ 0,
|
2887 |
+
(E13)
|
2888 |
+
where we use dots to represent arbitrary blocks of the
|
2889 |
+
matrices which can always be set to zero without af-
|
2890 |
+
fecting the objective function or constraints. Note that
|
2891 |
+
Ψ1 in Eq. (E13) is a map that replaces the off-diagonal
|
2892 |
+
blocks with null matrices, leaving the diagonal blocks un-
|
2893 |
+
changed. It is easy to see that Eq. (E13) is of the form
|
2894 |
+
Eq. (E8) (with Φ and B omitted i.e., no equality con-
|
2895 |
+
straint). Thus Eq. (E13) is an SDP.
|
2896 |
+
|
2897 |
+
D
|
2898 |
+
(Yf),zf1)
|
2899 |
+
8
|
2900 |
+
P
|
2901 |
+
α(f1),zf1)
|
2902 |
+
D
|
2903 |
+
8
|
2904 |
+
(y(2), z(2)
|
2905 |
+
+8
|
2906 |
+
p18
|
2907 |
+
The dual problem to the primal problem in Eq. (E13)
|
2908 |
+
is given by
|
2909 |
+
maximize :
|
2910 |
+
��
|
2911 |
+
K
|
2912 |
+
0
|
2913 |
+
0
|
2914 |
+
−K
|
2915 |
+
�
|
2916 |
+
,
|
2917 |
+
� ¯P
|
2918 |
+
.
|
2919 |
+
.
|
2920 |
+
¯Q
|
2921 |
+
��
|
2922 |
+
subject to :
|
2923 |
+
Ψ†
|
2924 |
+
1
|
2925 |
+
� ¯P
|
2926 |
+
.
|
2927 |
+
.
|
2928 |
+
¯Q
|
2929 |
+
�
|
2930 |
+
=
|
2931 |
+
� ¯P
|
2932 |
+
0
|
2933 |
+
0
|
2934 |
+
¯Q
|
2935 |
+
�
|
2936 |
+
≤
|
2937 |
+
�
|
2938 |
+
I 0
|
2939 |
+
0 I
|
2940 |
+
�
|
2941 |
+
� ¯P
|
2942 |
+
.
|
2943 |
+
.
|
2944 |
+
¯Q
|
2945 |
+
�
|
2946 |
+
≥ 0.
|
2947 |
+
(E14)
|
2948 |
+
where Ψ†
|
2949 |
+
1 turns out to be the same map as Ψ1 using
|
2950 |
+
Eq. (E1). It can be seen that Eq. (E14) is of the form
|
2951 |
+
Eq. (E9) (again with Φ and B omitted).
|
2952 |
+
We will now show that the optimal values attained in
|
2953 |
+
both the primal and dual problems in Eqs. (E13) and
|
2954 |
+
(E14) is equal to ||K||1. To show this, note that setting
|
2955 |
+
Pf = ΠpKΠp,
|
2956 |
+
Qf = −ΠnKΠn
|
2957 |
+
(E15)
|
2958 |
+
(where Pf and Qf denote ‘feasible’ choices of P and Q
|
2959 |
+
respectively) in Eq. (E13) allows us to obtain ||K||1 in
|
2960 |
+
the primal objective function. Furthermore, setting
|
2961 |
+
¯Pf = Πp,
|
2962 |
+
¯Qf = Πn
|
2963 |
+
(E16)
|
2964 |
+
in Eq. (E14) allows us to obtain ||K||1 in the dual objec-
|
2965 |
+
tive function. Thus, we have explicitly constructed fea-
|
2966 |
+
sible choices of inputs to the primal and dual problems
|
2967 |
+
of Eqs. (E13) and (E14) respectively, that yield ||K||1
|
2968 |
+
in the primal and dual objective functions. Therefore,
|
2969 |
+
according to Eq. (E10), the optimal values attained in
|
2970 |
+
the primal and dual problems are both exactly equal to
|
2971 |
+
||K||1.
|
2972 |
+
Step 2: In the first step we constructed an SDP whose
|
2973 |
+
solution is equal to ||K||1, for a fixed K. We will now
|
2974 |
+
construct an SDP which computes the minimum value of
|
2975 |
+
||K||1, subject to some constraints on K. We will first
|
2976 |
+
recast the problem in Eq. (E13) as
|
2977 |
+
minimize :
|
2978 |
+
Tr(P) + Tr(Q)
|
2979 |
+
subject to :
|
2980 |
+
P ≥ K, Q ≥ −K, P, Q ≥ 0.
|
2981 |
+
(E17)
|
2982 |
+
Eq. (E13) computes
|
2983 |
+
||K||1 =
|
2984 |
+
�
|
2985 |
+
i
|
2986 |
+
|Kii|.
|
2987 |
+
(E18)
|
2988 |
+
when K is diagonal. Let G be a linear, hermitian preserv-
|
2989 |
+
ing map that always outputs a diagonal matrix. Then,
|
2990 |
+
the optimization problem given by
|
2991 |
+
minimize :
|
2992 |
+
Tr(P) + Tr(Q)
|
2993 |
+
subject to :
|
2994 |
+
P ≥ G(R), Q ≥ −G(R),
|
2995 |
+
Φ(R) = B,
|
2996 |
+
P, Q, R ≥ 0,
|
2997 |
+
(E19)
|
2998 |
+
computes minR≥0,Φ(R)=B
|
2999 |
+
�
|
3000 |
+
i |G(R)ii|. We will now begin
|
3001 |
+
to connect the above formalism to TOP from Eq. (E7).
|
3002 |
+
We will show how R can be chosen to reflect the opti-
|
3003 |
+
mization over H(L)
|
3004 |
+
LS and Γ(L), and Φ can be chosen to
|
3005 |
+
reflect the trace constraint on Γ(L). Then, we will spec-
|
3006 |
+
ify a map G that takes R as input (i.e, H(L)
|
3007 |
+
LS and Γ(L)
|
3008 |
+
LS ),
|
3009 |
+
and outputs a diagonal matrix such that the objective
|
3010 |
+
function computes
|
3011 |
+
τ =
|
3012 |
+
�
|
3013 |
+
i
|
3014 |
+
|⟨Ei| L2(ρth) |Ei⟩| .
|
3015 |
+
(E20)
|
3016 |
+
Step
|
3017 |
+
3:
|
3018 |
+
In
|
3019 |
+
the
|
3020 |
+
thermal
|
3021 |
+
optimization
|
3022 |
+
problem
|
3023 |
+
[Eq. (E7)], we have an optimization over Γ(L) ≥ 0, and
|
3024 |
+
hermitian H(L)
|
3025 |
+
LS . We use the fact that any hermitian ma-
|
3026 |
+
trix H(L)
|
3027 |
+
LS can be written as a H(L)
|
3028 |
+
LS
|
3029 |
+
= S − T, where
|
3030 |
+
S, T ≥ 0. Moreover S − T for any S, T ≥ 0 is always
|
3031 |
+
hermitian. We will now replace the hermitian H(L)
|
3032 |
+
LS with
|
3033 |
+
the difference of positive matrices S − T. This is needed,
|
3034 |
+
since semidefinite programs can only handle optimization
|
3035 |
+
over positive semidefinite variables. Furthermore, let us
|
3036 |
+
identify Γ(L) with some matrix U. Now consider the map
|
3037 |
+
G that acts as follows :
|
3038 |
+
G
|
3039 |
+
�
|
3040 |
+
�
|
3041 |
+
S
|
3042 |
+
.
|
3043 |
+
.
|
3044 |
+
. T
|
3045 |
+
.
|
3046 |
+
.
|
3047 |
+
.
|
3048 |
+
U
|
3049 |
+
�
|
3050 |
+
� ≡ G(S, T, U) ≡
|
3051 |
+
�
|
3052 |
+
�
|
3053 |
+
�
|
3054 |
+
�
|
3055 |
+
�
|
3056 |
+
⟨E1| L2(ρth) |E1⟩
|
3057 |
+
0
|
3058 |
+
. . .
|
3059 |
+
0
|
3060 |
+
0
|
3061 |
+
⟨E2| L2(ρth) |E2⟩ . . .
|
3062 |
+
0
|
3063 |
+
...
|
3064 |
+
. . .
|
3065 |
+
...
|
3066 |
+
...
|
3067 |
+
0
|
3068 |
+
. . .
|
3069 |
+
0
|
3070 |
+
⟨Ed| L2(ρth) |Ed⟩ ,
|
3071 |
+
�
|
3072 |
+
�
|
3073 |
+
�
|
3074 |
+
�
|
3075 |
+
�
|
3076 |
+
(E21)
|
3077 |
+
where the map constructs L2 according to Eq. (38) after
|
3078 |
+
setting H(L)
|
3079 |
+
LS = S − T, and Γ(L) = U. Now, we consider
|
3080 |
+
a specific case of the optimization problem in Eq. (E19),
|
3081 |
+
for the choice of G in Eq. (E21). We obtain,
|
3082 |
+
minimize :
|
3083 |
+
Tr(P) + Tr(Q)
|
3084 |
+
subject to :
|
3085 |
+
P ≥ G
|
3086 |
+
�
|
3087 |
+
�
|
3088 |
+
S
|
3089 |
+
.
|
3090 |
+
.
|
3091 |
+
. T
|
3092 |
+
.
|
3093 |
+
.
|
3094 |
+
.
|
3095 |
+
U
|
3096 |
+
�
|
3097 |
+
� , Q ≥ −G
|
3098 |
+
�
|
3099 |
+
�
|
3100 |
+
S
|
3101 |
+
.
|
3102 |
+
.
|
3103 |
+
. T
|
3104 |
+
.
|
3105 |
+
.
|
3106 |
+
.
|
3107 |
+
U
|
3108 |
+
�
|
3109 |
+
� ,
|
3110 |
+
Φ1
|
3111 |
+
�
|
3112 |
+
�
|
3113 |
+
S
|
3114 |
+
.
|
3115 |
+
.
|
3116 |
+
. T
|
3117 |
+
.
|
3118 |
+
.
|
3119 |
+
.
|
3120 |
+
U
|
3121 |
+
�
|
3122 |
+
� = Tr(U) = 1, P, Q, S, T, U ≥ 0.
|
3123 |
+
(E22)
|
3124 |
+
|
3125 |
+
19
|
3126 |
+
Since G always outputs a diagonal matrix [see Eq. (E21)],
|
3127 |
+
Eq. (E22) computes
|
3128 |
+
min
|
3129 |
+
�
|
3130 |
+
i
|
3131 |
+
������
|
3132 |
+
G
|
3133 |
+
�
|
3134 |
+
�
|
3135 |
+
S
|
3136 |
+
T
|
3137 |
+
U
|
3138 |
+
�
|
3139 |
+
�
|
3140 |
+
ii
|
3141 |
+
������
|
3142 |
+
subject to :
|
3143 |
+
S, T, U ≥ 0, Tr(U) = 1
|
3144 |
+
(E23)
|
3145 |
+
Since H(L)
|
3146 |
+
LS can always be written as S−T, and Γ(L) as U,
|
3147 |
+
Eq. (E23) [and therefore Eq. (E22) ] is identical to the
|
3148 |
+
thermal optimization problem in Eq. (E7).
|
3149 |
+
Therefore,
|
3150 |
+
Eq. (E22) computes τopt.
|
3151 |
+
All that remains is converting Eq. (E22) to the stan-
|
3152 |
+
dard form Eq. (E8).
|
3153 |
+
Eq. (E22) can be obtained from
|
3154 |
+
Eq. (E22) after choosing
|
3155 |
+
A =
|
3156 |
+
�
|
3157 |
+
�
|
3158 |
+
�
|
3159 |
+
�
|
3160 |
+
�
|
3161 |
+
I
|
3162 |
+
I
|
3163 |
+
0
|
3164 |
+
0
|
3165 |
+
0
|
3166 |
+
�
|
3167 |
+
�
|
3168 |
+
�
|
3169 |
+
�
|
3170 |
+
� ,
|
3171 |
+
B = 1,
|
3172 |
+
X =
|
3173 |
+
�
|
3174 |
+
�
|
3175 |
+
�
|
3176 |
+
�
|
3177 |
+
�
|
3178 |
+
P
|
3179 |
+
.
|
3180 |
+
.
|
3181 |
+
.
|
3182 |
+
.
|
3183 |
+
.
|
3184 |
+
Q .
|
3185 |
+
.
|
3186 |
+
.
|
3187 |
+
.
|
3188 |
+
.
|
3189 |
+
S
|
3190 |
+
.
|
3191 |
+
.
|
3192 |
+
.
|
3193 |
+
.
|
3194 |
+
. T
|
3195 |
+
.
|
3196 |
+
.
|
3197 |
+
.
|
3198 |
+
.
|
3199 |
+
.
|
3200 |
+
U
|
3201 |
+
�
|
3202 |
+
�
|
3203 |
+
�
|
3204 |
+
�
|
3205 |
+
� ,
|
3206 |
+
C = 0,
|
3207 |
+
Ψ
|
3208 |
+
�
|
3209 |
+
�
|
3210 |
+
�
|
3211 |
+
�
|
3212 |
+
�
|
3213 |
+
P
|
3214 |
+
.
|
3215 |
+
.
|
3216 |
+
.
|
3217 |
+
.
|
3218 |
+
.
|
3219 |
+
Q .
|
3220 |
+
.
|
3221 |
+
.
|
3222 |
+
.
|
3223 |
+
.
|
3224 |
+
S
|
3225 |
+
.
|
3226 |
+
.
|
3227 |
+
.
|
3228 |
+
.
|
3229 |
+
. T
|
3230 |
+
.
|
3231 |
+
.
|
3232 |
+
.
|
3233 |
+
.
|
3234 |
+
.
|
3235 |
+
U
|
3236 |
+
�
|
3237 |
+
�
|
3238 |
+
�
|
3239 |
+
�
|
3240 |
+
� =
|
3241 |
+
�
|
3242 |
+
P − G(S, T, U)
|
3243 |
+
0
|
3244 |
+
0
|
3245 |
+
Q + G(S, T, U)
|
3246 |
+
�
|
3247 |
+
,
|
3248 |
+
Φ
|
3249 |
+
�
|
3250 |
+
�
|
3251 |
+
�
|
3252 |
+
�
|
3253 |
+
�
|
3254 |
+
P
|
3255 |
+
.
|
3256 |
+
.
|
3257 |
+
.
|
3258 |
+
.
|
3259 |
+
.
|
3260 |
+
Q .
|
3261 |
+
.
|
3262 |
+
.
|
3263 |
+
.
|
3264 |
+
.
|
3265 |
+
S
|
3266 |
+
.
|
3267 |
+
.
|
3268 |
+
.
|
3269 |
+
.
|
3270 |
+
. T
|
3271 |
+
.
|
3272 |
+
.
|
3273 |
+
.
|
3274 |
+
.
|
3275 |
+
.
|
3276 |
+
U
|
3277 |
+
�
|
3278 |
+
�
|
3279 |
+
�
|
3280 |
+
�
|
3281 |
+
� = Tr(U)
|
3282 |
+
(E24)
|
3283 |
+
Recall that it is helpful to think of P, Q as variables
|
3284 |
+
needed to compute the objective function τ [Eq. (E7)],
|
3285 |
+
S, T are variables that give rise to H(L)
|
3286 |
+
LS = S − T, and U
|
3287 |
+
is a variable that encodes Γ(L). We have therefore shown
|
3288 |
+
that the TOP [Eq. (E7)] is an SDP.
|
3289 |
+
It is to be noted that it is not necessary to reduce
|
3290 |
+
the TOP to the standard form of an SDP in order to
|
3291 |
+
use CVX [33]. Infact, the TOP from Eq. (E7) can be
|
3292 |
+
directly implemented into CVX, which itself handles the
|
3293 |
+
construction of the dual problem automatically in the
|
3294 |
+
background.
|
3295 |
+
[1] F. Binder,
|
3296 |
+
L. A. Correa,
|
3297 |
+
C. Gogolin,
|
3298 |
+
J. Anders,
|
3299 |
+
and G. Adesso, eds., Thermodynamics in the Quantum
|
3300 |
+
Regime (Springer, Cham, 2018).
|
3301 |
+
[2] K. L. Hur, L. Henriet, A. Petrescu, K. Plekhanov,
|
3302 |
+
G. Roux, and M. Schir´o, Comptes Rendus Physique 17,
|
3303 |
+
808 (2016).
|
3304 |
+
[3] Y. Cao, J. Romero, J. P. Olson, M. Degroote, P. D. John-
|
3305 |
+
son, M. Kieferov´a, I. D. Kivlichan, T. Menke, B. Per-
|
3306 |
+
opadre, N. P. D. Sawaya, and et al., Chemical Reviews
|
3307 |
+
119, 10856–10915 (2019).
|
3308 |
+
[4] D. D. Awschalom, C. H. R. Du, R. He, J. Heremans,
|
3309 |
+
A. Hoffmann, J. Hou, H. Kurebayashi, Y. Li, L. Liu,
|
3310 |
+
V. Novosad, J. Sklenar, S. Sullivan, D. Sun, H. Tang,
|
3311 |
+
V. Tyberkevych, C. Trevillian, A. W. Tsen, L. Weiss,
|
3312 |
+
W. Zhang, X. Zhang, L. Zhao,
|
3313 |
+
and C. W. Zollitsch,
|
3314 |
+
IEEE Transactions on Quantum Engineering , 1 (2021).
|
3315 |
+
[5] J. Cao, R. J. Cogdell, D. F. Coker, H.-G. Duan, J. Hauer,
|
3316 |
+
U. Kleinekath¨ofer, T. L. C. Jansen, T. Manˇcal, R. J. D.
|
3317 |
+
Miller, J. P. Ogilvie, V. I. Prokhorenko, T. Renger, H.-S.
|
3318 |
+
Tan, R. Tempelaar, M. Thorwart, E. Thyrhaug, S. West-
|
3319 |
+
enhoff, and D. Zigmantas, Science Advances 6 (2020).
|
3320 |
+
[6] H.-P. Breuer and F. Petruccione, The Theory of Open
|
3321 |
+
Quantum Systems (Oxford University Press, Oxford,
|
3322 |
+
2006).
|
3323 |
+
[7] ´A. Rivas and S. F. Huelga, SpringerBriefs in Physics
|
3324 |
+
(2012).
|
3325 |
+
[8] H. Carmichael, Statistical Methods in Quantum Op-
|
3326 |
+
tics 1. Master Equations and Fokker–Planck Equations
|
3327 |
+
(Springer-Verlag Berlin Heidelberg, 2002).
|
3328 |
+
[9] J. Watrous, The Theory of Quantum Information (Cam-
|
3329 |
+
bridge University Press, 2018).
|
3330 |
+
[10] V. Siddhu and S. Tayur, “Five starter pieces: Quantum
|
3331 |
+
information science via semidefinite programs,” in Tu-
|
3332 |
+
torials in Operations Research: Emerging and Impactful
|
3333 |
+
Topics in Operations (2022) Chap. 3, pp. 59–92.
|
3334 |
+
[11] D. A. Mazziotti, Phys. Rev. Lett. 93, 213001 (2004).
|
3335 |
+
[12] D. A. Mazziotti, Phys. Rev. Lett. 106, 083001 (2011).
|
3336 |
+
[13] M. M. Wolf, J. Eisert, T. S. Cubitt,
|
3337 |
+
and J. I. Cirac,
|
3338 |
+
Phys. Rev. Lett. 101, 150402 (2008).
|
3339 |
+
[14] T. S. Cubitt, J. Eisert, and M. M. Wolf, Communications
|
3340 |
+
in Mathematical Physics 310, 383 (2012).
|
3341 |
+
[15] A. H. Kiilerich and K. Mølmer, Phys. Rev. A 97, 052113
|
3342 |
+
(2018).
|
3343 |
+
[16] V. Gorini, A. Kossakowski,
|
3344 |
+
and E. C. G. Sudarshan,
|
3345 |
+
Journal of Mathematical Physics 17, 821 (1976).
|
3346 |
+
[17] V. Gorini, A. Frigerio, M. Verri, A. Kossakowski,
|
3347 |
+
and
|
3348 |
+
E. Sudarshan, Reports on Mathematical Physics 13, 149
|
3349 |
+
(1978).
|
3350 |
+
[18] G. Lindblad, Communications in Mathematical Physics
|
3351 |
+
48, 119 (1976).
|
3352 |
+
|
3353 |
+
20
|
3354 |
+
[19] H. Weimer, A. Kshetrimayum, and R. Or´us, Rev. Mod.
|
3355 |
+
Phys. 93, 015008 (2021).
|
3356 |
+
[20] M. B. Plenio and P. L. Knight, Rev. Mod. Phys. 70, 101
|
3357 |
+
(1998).
|
3358 |
+
[21] J. Dalibard, Y. Castin, and K. Mølmer, Phys. Rev. Lett.
|
3359 |
+
68, 580 (1992).
|
3360 |
+
[22] K. Mølmer, Y. Castin, and J. Dalibard, Journal of the
|
3361 |
+
Optical Society of America B 10, 524 (1993).
|
3362 |
+
[23] D. Tupkary, A. Dhar, M. Kulkarni, and A. Purkayastha,
|
3363 |
+
Phys. Rev. A 105, 032208 (2022).
|
3364 |
+
[24] R. Hartmann and W. T. Strunz, Phys. Rev. A 101,
|
3365 |
+
012103 (2020).
|
3366 |
+
[25] P. R. Eastham, P. Kirton, H. M. Cammack, B. W. Lovett,
|
3367 |
+
and J. Keeling, Phys. Rev. A 94, 012110 (2016).
|
3368 |
+
[26] S. Anderloni, F. Benatti,
|
3369 |
+
and R. Floreanini, Journal
|
3370 |
+
of Physics A: Mathematical and Theoretical 40, 1625
|
3371 |
+
(2007).
|
3372 |
+
[27] P. Gaspard and M. Nagaoka, The Journal of Chemical
|
3373 |
+
Physics 111, 5668 (1999).
|
3374 |
+
[28] D. Kohen, C. C. Marston, and D. J. Tannor, The Journal
|
3375 |
+
of Chemical Physics 107, 5236 (1997).
|
3376 |
+
[29] S. Gnutzmann and F. Haake, Zeitschrift f¨ur Physik B
|
3377 |
+
Condensed Matter 101, 263 (1996).
|
3378 |
+
[30] A. Su´arez, R. Silbey, and I. Oppenheim, The Journal of
|
3379 |
+
Chemical Physics 97, 5101 (1992).
|
3380 |
+
[31] F. Nathan and M. S. Rudner, Phys. Rev. B 102, 115109
|
3381 |
+
(2020).
|
3382 |
+
[32] H. Spohn, Rev. Mod. Phys. 52, 569 (1980).
|
3383 |
+
[33] M. Grant and S. Boyd, “CVX: Matlab software for disci-
|
3384 |
+
plined convex programming, version 2.1,” http://cvxr.
|
3385 |
+
com/cvx (2014).
|
3386 |
+
[34] D. Walls and G. J. Milburn, Quantum optics (Springer-
|
3387 |
+
Verlag Berlin Heidelberg, 2008).
|
3388 |
+
[35] T. Becker, L.-N. Wu, and A. Eckardt, Phys. Rev. E 104,
|
3389 |
+
014110 (2021).
|
3390 |
+
[36] T. Prosen and M. ˇZnidariˇc, Journal of Statistical Me-
|
3391 |
+
chanics: Theory and Experiment 2009, P02035 (2009).
|
3392 |
+
[37] J. J. Mendoza-Arenas, S. R. Clark, and D. Jaksch, Phys.
|
3393 |
+
Rev. E 91, 042129 (2015).
|
3394 |
+
[38] M. ˇZnidariˇc, T. c. v. Prosen, G. Benenti, G. Casati, and
|
3395 |
+
D. Rossini, Phys. Rev. E 81, 051135 (2010).
|
3396 |
+
[39] J. T. Barreiro, M. M¨uller, P. Schindler, D. Nigg, T. Monz,
|
3397 |
+
M. Chwalla, M. Hennrich, C. F. Roos, P. Zoller,
|
3398 |
+
and
|
3399 |
+
R. Blatt, Nature 470, 486 (2011).
|
3400 |
+
[40] P. Schindler, M. M¨uller, D. Nigg, J. T. Barreiro, E. A.
|
3401 |
+
Martinez, M. Hennrich, T. Monz, S. Diehl, P. Zoller, and
|
3402 |
+
R. Blatt, Nature Physics 9, 361 (2013).
|
3403 |
+
[41] H. Weimer, M. M¨uller, I. Lesanovsky, P. Zoller, and H. P.
|
3404 |
+
B¨uchler, Nature Physics 6, 382 (2010).
|
3405 |
+
[42] T. L. Nguyen, J. M. Raimond, C. Sayrin, R. Corti˜nas,
|
3406 |
+
T.
|
3407 |
+
Cantat-Moltrecht,
|
3408 |
+
F.
|
3409 |
+
Assemat,
|
3410 |
+
I.
|
3411 |
+
Dotsenko,
|
3412 |
+
S. Gleyzes, S. Haroche, G. Roux, T. Jolicoeur,
|
3413 |
+
and
|
3414 |
+
M. Brune, Phys. Rev. X 8, 011032 (2018).
|
3415 |
+
[43] G. Garc´ıa-P´erez, M. A. C. Rossi, and S. Maniscalco, npj
|
3416 |
+
Quantum Information 6, 1 (2020).
|
3417 |
+
[44] C. W. Kim, J. M. Nichol, A. N. Jordan, and I. Franco,
|
3418 |
+
PRX Quantum 3, 040308 (2022).
|
3419 |
+
[45] T. Becker, A. Schnell, and J. Thingna, Phys. Rev. Lett.
|
3420 |
+
129, 200403 (2022).
|
3421 |
+
[46] G. McCauley, B. Cruikshank, D. I. Bondar, and K. Ja-
|
3422 |
+
cobs, npj Quantum Information 6 (2020).
|
3423 |
+
[47] U. Harbola, M. Esposito,
|
3424 |
+
and S. Mukamel, Phys. Rev.
|
3425 |
+
B 74, 235309 (2006).
|
3426 |
+
[48] F.
|
3427 |
+
Nathan
|
3428 |
+
and
|
3429 |
+
M.
|
3430 |
+
S.
|
3431 |
+
Rudner,
|
3432 |
+
(2022),
|
3433 |
+
10.48550/ARXIV.2206.02917.
|
3434 |
+
[49] A.
|
3435 |
+
Trushechkin,
|
3436 |
+
Physical
|
3437 |
+
Review
|
3438 |
+
A
|
3439 |
+
103
|
3440 |
+
(2021),
|
3441 |
+
10.1103/physreva.103.062226.
|
3442 |
+
[50] A. S. Trushechkin and I. V. Volovich, EPL (Europhysics
|
3443 |
+
Letters) 113, 30005 (2016).
|
3444 |
+
[51] E. Kleinherbers, N. Szpak, J. K¨onig, and R. Sch¨utzhold,
|
3445 |
+
Phys. Rev. B 101, 125131 (2020).
|
3446 |
+
[52] D. Davidovi´c, Quantum 4, 326 (2020).
|
3447 |
+
[53] E. Mozgunov and D. Lidar, Quantum 4, 227 (2020).
|
3448 |
+
[54] G. Kirˇsanskas, M. Francki´e, and A. Wacker, Phys. Rev.
|
3449 |
+
B 97, 035432 (2018).
|
3450 |
+
[55] A. Purkayastha, G. Guarnieri, M. T. Mitchison, R. Filip,
|
3451 |
+
and J. Goold, npj Quantum Information 6 (2020).
|
3452 |
+
[56] G. E. Fux, D. Kilda, B. W. Lovett,
|
3453 |
+
and J. Keeling,
|
3454 |
+
(2022), 10.48550/ARXIV.2201.05529.
|
3455 |
+
[57] A. Purkayastha, G. Guarnieri, S. Campbell, J. Prior, and
|
3456 |
+
J. Goold, Phys. Rev. B 104, 045417 (2021).
|
3457 |
+
[58] A.
|
3458 |
+
M.
|
3459 |
+
Lacerda,
|
3460 |
+
A.
|
3461 |
+
Purkayastha,
|
3462 |
+
M.
|
3463 |
+
Kewming,
|
3464 |
+
G.
|
3465 |
+
T.
|
3466 |
+
Landi,
|
3467 |
+
and
|
3468 |
+
J.
|
3469 |
+
Goold,
|
3470 |
+
(2022),
|
3471 |
+
10.48550/ARXIV.2206.01090.
|
3472 |
+
[59] A. Majumdar, G. Hall, and A. A. Ahmadi, Annual Re-
|
3473 |
+
view of Control, Robotics, and Autonomous Systems 3,
|
3474 |
+
331 (2020).
|
3475 |
+
[60] G. Guarnieri, M. Kol´aˇr, and R. Filip, Phys. Rev. Lett.
|
3476 |
+
121, 070401 (2018).
|
3477 |
+
[61] A. S. Trushechkin, M. Merkli, J. D. Cresser, and J. An-
|
3478 |
+
ders, AVS Quantum Science 4, 012301 (2022).
|
3479 |
+
[62] J. D. Cresser and J. Anders, Phys. Rev. Lett. 127, 250601
|
3480 |
+
(2021).
|
3481 |
+
[63] A. Streltsov, G. Adesso,
|
3482 |
+
and M. B. Plenio, Rev. Mod.
|
3483 |
+
Phys. 89, 041003 (2017).
|
3484 |
+
[64] G. Francica, J. Goold, and F. Plastina, Phys. Rev. E 99,
|
3485 |
+
042105 (2019).
|
3486 |
+
[65] J. P. Santos, L. C. C´eleri, G. T. Landi,
|
3487 |
+
and M. Pater-
|
3488 |
+
nostro, npj Quantum Information 5 (2019).
|
3489 |
+
[66] V. Narasimhachar and G. Gour, Nature Communications
|
3490 |
+
6 (2015).
|
3491 |
+
[67] D.
|
3492 |
+
Tupkary,
|
3493 |
+
https://github.com/dtupkary/
|
3494 |
+
SearchingLindbladians (2022).
|
3495 |
+
[68] J. Johansson, P. Nation, and F. Nori, Computer Physics
|
3496 |
+
Communications 183, 1760 (2012).
|
3497 |
+
[69] J. Johansson, P. Nation, and F. Nori, Computer Physics
|
3498 |
+
Communications 184, 1234 (2013).
|
3499 |
+
|
39A0T4oBgHgl3EQfNf8t/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
4tE2T4oBgHgl3EQf6ghP/content/tmp_files/2301.04200v1.pdf.txt
ADDED
@@ -0,0 +1,1439 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Smoothing the H0 tension with a dynamical dark energy model
|
2 |
+
Safae Dahmani,∗ Amine Bouali,† Imad El Bojaddaini,‡ Ahmed Errahmani,§ and Taoufik Ouali¶
|
3 |
+
Laboratory of Physics of Matter and Radiation, Mohammed I University, BP 717, Oujda, Morocco
|
4 |
+
(Dated: January 12, 2023)
|
5 |
+
The discrepancy between Planck data and direct measurements of the current expansion rate H0 and the
|
6 |
+
matter fluctuation amplitude S8 has become one of the most intriguing puzzles in cosmology nowadays. The
|
7 |
+
H0 tension has reached 4.2σ in the context of standard cosmology i.e ΛCDM. Therefore, explanations to this
|
8 |
+
issue are mandatory to unveil its secrets. Despite its success, ΛCDM is unable to give a satisfying explanation
|
9 |
+
to the tension problem.
|
10 |
+
Unless some systematic errors might be hidden in the observable measurements,
|
11 |
+
physics beyond the standard model of cosmology must be advocated. In this perspective, we study a phantom
|
12 |
+
dynamical dark energy model as an alternative to ΛCDM in order to explain the aforementioned issues. This
|
13 |
+
phantom model is characterised by one extra parameter, Ωpdde, compared to ΛCDM. We obtain a strong
|
14 |
+
positive correlation between H0 and Ωpdde, for all data combinations. Using Planck measurements together
|
15 |
+
with BAO and Pantheon, we find that the H0 and the S8 tensions are 3σ and 2.6σ, respectively. By introducing
|
16 |
+
a prior on the absolute magnitude, MB, of the SN Ia, the H0 tension decreases to 2.27σ with H0 = 69.76+0.75
|
17 |
+
−0.82
|
18 |
+
km s−1 Mpc−1 and the S8 tension reaches the value 2.37σ with S8 = 0.8269+0.011
|
19 |
+
−0.012.
|
20 |
+
Keywords: dark energy, H0 tension, S8 tension.
|
21 |
+
I.
|
22 |
+
INTRODUCTION
|
23 |
+
Supernova Type Ia (SN Ia) observation [1, 2] reports
|
24 |
+
an unexpected cosmic acceleration of the expansion of
|
25 |
+
the current Universe. This observation was corroboratted
|
26 |
+
latter by other observations such as the cosmic microwave
|
27 |
+
background (CMB) [3, 4], the large scale structure [5, 6]
|
28 |
+
and the baryonic acoustic oscillations (BAO) [7, 8]. The
|
29 |
+
standard model of cosmology successfully describes this
|
30 |
+
late time cosmic acceleration by introducing a new exotic
|
31 |
+
component in the budget of the Universe dubbed dark
|
32 |
+
energy (DE). In the context of the standard model of
|
33 |
+
cosmology, called ΛCDM, the major part of the content
|
34 |
+
of the Universe is dominated by DE which is in the
|
35 |
+
form of a cosmological constant, Λ, and the cold dark
|
36 |
+
matter (CDM). In addition, various observational data
|
37 |
+
give preference to ΛCDM for a vast range of redshifts z
|
38 |
+
[9–13]. However, this model faces many problems, among
|
39 |
+
them the “Hubble tension”, related to the current Hubble
|
40 |
+
rate H0 and the σ8 tension due to the matter fluctuation
|
41 |
+
amplitude.
|
42 |
+
The Hubble tension appears when comparing the value
|
43 |
+
measured indirectly by calibrating theoretical models in
|
44 |
+
the early Universe i.e. at high-redshift and that measured
|
45 |
+
directly using cosmological distances and redshifts by
|
46 |
+
observing space objects. Generally, the value obtained at
|
47 |
+
high-redshifts is lower than that obtained at low-redshifts.
|
48 |
+
The value predicted at high-redshifts i.e.
|
49 |
+
by cosmic
|
50 |
+
microwave
|
51 |
+
background
|
52 |
+
measurements
|
53 |
+
assuming
|
54 |
+
the
|
55 |
+
ΛCDM model, is H0 = 67.37 ± 0.54 km s−1 Mpc−1
|
56 |
+
[11] while the one determined by the Cepheid calibrated
|
57 | |
58 | |
59 | |
60 | |
61 | |
62 |
+
supernovae Ia, is H0 = 73.2 ± 1.3 km s−1 Mpc−1 [14].
|
63 |
+
It is clear that there is significant discrepancy between
|
64 |
+
these values qualified as a tension.
|
65 |
+
This tension is at
|
66 |
+
about 4.2σ level.
|
67 |
+
Recent studies have shown that this
|
68 |
+
tension depends directly on the SN Ia absolute magnitude,
|
69 |
+
MB [15–19].
|
70 |
+
In fact the SH0ES project measures the
|
71 |
+
absolute peak magnitude (MB = −19.244 ± 0.037 mag
|
72 |
+
[16]) of SN Ia, while the value of H0 can be estimated
|
73 |
+
by the magnitude-redshift relation of SN Ia in the range
|
74 |
+
z ∈ [0.023, 0.15] [20]. The same studies indicated that to
|
75 |
+
test any model that modifies the late-time of the Universe,
|
76 |
+
it is necessary to use a prior on the absolute magnitude of
|
77 |
+
supernovae type Ia, MB, instead of using the prior on H0
|
78 |
+
from SH0ES for a correct statistical analysis and to avoid
|
79 |
+
misleading results.
|
80 |
+
On the other hand, the tension between the value of
|
81 |
+
the matter fluctuation amplitude σ8 found by CMB
|
82 |
+
measurements and that from large-scale observations
|
83 |
+
in the late Universe rises another problem in ΛCDM.
|
84 |
+
The parameter that quantifies the matter fluctuations
|
85 |
+
is defined by S8
|
86 |
+
=
|
87 |
+
σ8
|
88 |
+
�
|
89 |
+
(Ωm,0/0.3), representing a
|
90 |
+
combination of σ8 and the matter density Ωm,0 at the
|
91 |
+
present time.
|
92 |
+
Constraints from Planck and those from
|
93 |
+
local measurements are in tension at more than 2σ.
|
94 |
+
Indeed, while the constrained S8 from Planck data is
|
95 |
+
S8 = 0.832 ± 0.013 [11], smaller values are found from
|
96 |
+
local measurements, e.g. S8 = 0.762+0.025
|
97 |
+
−0.024 obtained by
|
98 |
+
KV450 (KiDS+VIKING-450) and DES-Y1 (Dark Energy
|
99 |
+
Survey Year 1) combined [21]. This discrepancy could be
|
100 |
+
an evidence of new physics beyond the standard model of
|
101 |
+
cosmology [22–24].
|
102 |
+
Several theoretical approaches have been proposed to
|
103 |
+
solve these tension problems, such as extensions of the
|
104 |
+
ΛCDM model, DE–DM interactions and decaying DM
|
105 |
+
[26–36]. These approaches have also shown that changing
|
106 |
+
the properties of DE e.g. by introducing the early Dark
|
107 |
+
Energy [37] and the phantom Dark Energy where the
|
108 |
+
equation of state (EoS) parameter is slightly less than
|
109 |
+
arXiv:2301.04200v1 [astro-ph.CO] 10 Jan 2023
|
110 |
+
|
111 |
+
2
|
112 |
+
−1, can increase the value of H0 and consequently can
|
113 |
+
alleviate the Hubble tension compared to ΛCDM [38–47].
|
114 |
+
These conclusions motivated us to address these issues
|
115 |
+
in the context of a particular dynamical dark energy (DDE)
|
116 |
+
model where the EoS and the energy density are given re-
|
117 |
+
spectively by [48]
|
118 |
+
pde = −(ρde + α
|
119 |
+
3 ),
|
120 |
+
(1.1)
|
121 |
+
and
|
122 |
+
ρde(z) = ρde,0 − α ln (1 + z),
|
123 |
+
(1.2)
|
124 |
+
where ρde,0 is the present DE density, α is a positive con-
|
125 |
+
stant that distinguishes this model from ΛCDM. Hence
|
126 |
+
ρde tends to the standard cosmological constant Λ at the
|
127 |
+
present (z = 0). This phantom dynamical dark energy
|
128 |
+
model induces an abrupt event in the future where the dark
|
129 |
+
energy density dominates all other forms of energy density.
|
130 |
+
However, in the past, this dark energy density decreases
|
131 |
+
and the energy density of dark matter dominates the bud-
|
132 |
+
get of the Universe.
|
133 |
+
According to Eqs. (1.1) and (1.2) the EoS parameter is
|
134 |
+
given by
|
135 |
+
ωde = −(1 +
|
136 |
+
α
|
137 |
+
3(ρde,0 − α ln (1 + z))).
|
138 |
+
(1.3)
|
139 |
+
For positive values of α, we get ωde < −1 and the model
|
140 |
+
describes a phantom dark energy. For negative values of α,
|
141 |
+
ωde > −1, the model describes a quintessence dark energy
|
142 |
+
and mimics ΛCDM in the limit α → 0. In the following,
|
143 |
+
we will focus on the phantom case i.e. α > 0.
|
144 |
+
The Friedmann equation of a Universe filled by CDM and
|
145 |
+
DE can be written as [48–50]
|
146 |
+
E2(z) = Ωm,0(1+z)3 +Ωde,0 −Ωpdde ln (1 + z), (1.4)
|
147 |
+
where E = H(z)
|
148 |
+
H0 , H0 is the current Hubble rate, Ωm,0 is
|
149 |
+
the actual matter density, Ωde,0 = 8πG
|
150 |
+
3H2
|
151 |
+
0 ρde,0 and Ωpdde =
|
152 |
+
8πG
|
153 |
+
3H2
|
154 |
+
0 α is a dimensionless parameter characterizing our
|
155 |
+
phantom DDE model.
|
156 |
+
From Eq (1.4), the model predicts more dark matter in the
|
157 |
+
past as z → ∞. However, in the future, this model is
|
158 |
+
dominant by the DE and it is characterized by a particu-
|
159 |
+
lar behaviour. Indeed, its Hubble rate H diverges while its
|
160 |
+
derivative ˙H remains constant. This abrupt event has been
|
161 |
+
well studied in [48–50] and dubbed as Little Sibling of the
|
162 |
+
Big Rip since it smooths the big rip singularity in the fu-
|
163 |
+
ture.
|
164 |
+
In this paper, we study the effect of this phantom dy-
|
165 |
+
namical dark energy model (PDDE) on both tensions,
|
166 |
+
namely the H0 and S8 tensions, and we compare the results
|
167 |
+
with those of ΛCDM. To this aim, we perform a Markov
|
168 |
+
Chain Monte Carlo (MCMC) [51] analysis, using the last
|
169 |
+
datasets.
|
170 |
+
This paper is organized as follows: in Sec. II, we describe
|
171 |
+
the methodology followed and the data used in our anal-
|
172 |
+
ysis. In Sec. III, we present the results and discussions,
|
173 |
+
while in Sec. IV we analyze the effect on the power spec-
|
174 |
+
trum. Finally, Sec. V is dedicated to conclusions.
|
175 |
+
II.
|
176 |
+
METHODOLOGY AND DATASETS
|
177 |
+
To constrain our theoretical model we employ the χ2
|
178 |
+
statistics
|
179 |
+
χ2 = [Pobs − Pth]2
|
180 |
+
σ2
|
181 |
+
P
|
182 |
+
,
|
183 |
+
(2.1)
|
184 |
+
where Pobs, Pth and σ2
|
185 |
+
P indicate the observed values, the
|
186 |
+
predicted values and the standard deviation, respectively.
|
187 |
+
The model with a small value of χ2 fits better the observa-
|
188 |
+
tional data and is considered as the best. We also use the
|
189 |
+
Akaike Information Criterion (AIC) [52], which is widely
|
190 |
+
used in cosmology [53, 54] to compare cosmological mod-
|
191 |
+
els with different free parameters numbers
|
192 |
+
AIC = −2 ln (Lmax) + 2N,
|
193 |
+
(2.2)
|
194 |
+
where L is the likelihood and N is the number of free
|
195 |
+
parameters. The model with a small value of AIC is the
|
196 |
+
most supported by observational data. In this work, we
|
197 |
+
calculate △AIC = AICP DDE − AICΛCDM and we
|
198 |
+
consider ΛCDM as the reference model i.e. △AIC = 0.
|
199 |
+
Furthermore, a positive (negative) value of △AIC indi-
|
200 |
+
cates that ΛCDM (PDDE) is the most preferred model by
|
201 |
+
observational data.
|
202 |
+
To run the MCMC [51] we use the MontePython code
|
203 |
+
[57], which interfaces with CLASS [58] in which we have
|
204 |
+
implemented our PDDE fluid. We consider 7-dimensional
|
205 |
+
parameters space, consisting of six standard cosmological
|
206 |
+
parameters ωb, ωcdm, H0, ns, τreio and ln (1010As) which
|
207 |
+
correspond to the physical densities of baryons and CDM,
|
208 |
+
the Hubble constant, the scalar spectral index, the optical
|
209 |
+
depth and the power spectrum amplitude, respectively plus
|
210 |
+
the additional parameter Ωpdde characterizing our PDDE
|
211 |
+
model. The priors of these free parameters are mentioned
|
212 |
+
in Table I. To avoid non-adiabatic instabilities at the
|
213 |
+
perturbation evolution, we employ the Parameterized
|
214 |
+
Post-Friedmann (PPF) [59] approach.
|
215 |
+
In this work, we use the following observational data:
|
216 |
+
Planck18: The CMB temperature measurements (low-ℓ
|
217 |
+
TT) and polarization (low-ℓ EE) at low multipoles 2 ⩽ ℓ ⩽
|
218 |
+
29. We also use temperature and polarization combined
|
219 |
+
(high-ℓ TT TE EE) at higher multipoles 30 ⩽ ℓ ⩽ 2500. In
|
220 |
+
addition we use the lensing constraint [11].
|
221 |
+
BAO: The Baryon Acoustic Oscillation measurements at
|
222 |
+
different redshifts z, BOSS DR12 from the CMASS (at
|
223 |
+
z = 0.57) and LOWZ galaxies (at z = 0.32) [60], 6dFGS
|
224 |
+
(at z = 0.106) [61] and SDSS DR7 (at z = 0.15) [62].
|
225 |
+
Pantheon: The luminosity distance from 1048 Supernovae
|
226 |
+
|
227 |
+
3
|
228 |
+
Type Ia (SN Ia) in the range z ∈ [0.01, 2.3] [20]. The SN
|
229 |
+
Ia data directly give measures of mb(z) for each z, where
|
230 |
+
mb(z) is the apparent magnitude. For a given cosmolog-
|
231 |
+
ical model this parameter can be calculated theoretically
|
232 |
+
by
|
233 |
+
mb(z) = 5log10[dL(z)
|
234 |
+
Mpc ] + MB + 25,
|
235 |
+
(2.3)
|
236 |
+
where, dL(z) = (1 + z)
|
237 |
+
´ z
|
238 |
+
0
|
239 |
+
cdz′
|
240 |
+
H(z′) is the luminosity
|
241 |
+
distance and MB is the absolute magnitude which will be
|
242 |
+
considered as a free parameter in our analysis.
|
243 |
+
Prior on MB: The SN measurements from the SH0ES
|
244 |
+
project give a Gaussian prior on the absolute magnitude as
|
245 |
+
MB = −19.244 ± 0.037 mag [16].
|
246 |
+
The total χ2 of the combined data is
|
247 |
+
χ2
|
248 |
+
tot = χ2
|
249 |
+
P lanck18 + χ2
|
250 |
+
BAO + χ2
|
251 |
+
P antheon + χ2
|
252 |
+
MB. (2.4)
|
253 |
+
Table I. A prior imposed on different parameters for the ΛCDM
|
254 |
+
and PDDE models
|
255 |
+
Parameters
|
256 |
+
Prior
|
257 |
+
Ωbh2
|
258 |
+
[0.005, 0.1]
|
259 |
+
Ωch2
|
260 |
+
[0.01, 0.99]
|
261 |
+
Ωpdde
|
262 |
+
[0, 1]
|
263 |
+
H0
|
264 |
+
[40, 100]
|
265 |
+
τreio
|
266 |
+
[0.001, 0.8]
|
267 |
+
ns
|
268 |
+
[0.8, 1.2]
|
269 |
+
ln (1010As)
|
270 |
+
[2, 4]
|
271 |
+
MB
|
272 |
+
default priora
|
273 |
+
a For the absolute magnitude parameter we used MontePython v3.5
|
274 |
+
default prior.
|
275 |
+
III.
|
276 |
+
RESULTS AND DISCUSSIONS
|
277 |
+
We perform an MCMC analysis to obtain con-
|
278 |
+
straints on cosmological parameters of the PDDE model
|
279 |
+
and compare them with those of ΛCDM. First of all,
|
280 |
+
we employ the PDDE model with three different data
|
281 |
+
combinations,
|
282 |
+
namely Planck18,
|
283 |
+
Planck18+BAO and
|
284 |
+
Planck18+BAO+Pantheon, in order to make a comparison
|
285 |
+
with ΛCDM and get a general insight of the analysis. In the
|
286 |
+
second analysis, we include a prior on MB from SHOES
|
287 |
+
to Planck18+BAO+Pantheon datasets.
|
288 |
+
A.
|
289 |
+
Planck18, BAO and Pantheon datasets.
|
290 |
+
Table II shows the mean values and their correspond-
|
291 |
+
ing errors at 68% C.L. for all considered parameters using
|
292 |
+
Planck18, Planck18+BAO and Planck18+BAO+Pantheon.
|
293 |
+
Fig. 1 shows the 2D and 1D posterior distributions for the
|
294 |
+
PDDE model for the aforementioned datasets.
|
295 |
+
Using Planck data alone, we get a large value of H0 =
|
296 |
+
77.5±1.1 km s−1 Mpc−1 for PDDE and H0 = 67.93+0.58
|
297 |
+
−0.63
|
298 |
+
km s−1 Mpc−1 for ΛCDM. This last value is in ten-
|
299 |
+
sion of about 3.6σ with the local measurement of R20
|
300 |
+
i.e.
|
301 |
+
HR20
|
302 |
+
0
|
303 |
+
= 73.2 ± 1.3 km s−1 Mpc−1.
|
304 |
+
While for
|
305 |
+
the PDDE model the tension is reduced to ∼ 2.5σ. De-
|
306 |
+
spite this we notice that our model deviates strongly from
|
307 |
+
ΛCDM i.e. Ωpdde = 0, where the value of Ωpdde obtained
|
308 |
+
(Ωpdde = 0.4901+0.031
|
309 |
+
−0.022) is around 15σ away from 0, which
|
310 |
+
shows that our late model strictly shifted towards the more
|
311 |
+
phantom regime (i.e. ωde << −1). Therefore, Planck18
|
312 |
+
alone does not provide any sientific conclusion to our late-
|
313 |
+
time dark energy transition. When we add the BAO data
|
314 |
+
the Ωpdde value decreases to 0.08478+0.024
|
315 |
+
−0.085. We also see
|
316 |
+
a small decrease by 7.1% for H0 i.e. H0 = 69.13+0.79
|
317 |
+
−1.1
|
318 |
+
km s−1 Mpc−1 for PDDE and a small increase by 0.2%
|
319 |
+
for ΛCDM i.e.
|
320 |
+
H0 = 68.07 ± 0.45 km s−1 Mpc−1.
|
321 |
+
The tension of H0 remains around ∼ 2.5σ for the PDDE
|
322 |
+
model and increases to ∼ 3.7σ for ΛCDM compared to
|
323 |
+
HR20
|
324 |
+
0
|
325 |
+
. The significant difference between HΛCDM
|
326 |
+
0
|
327 |
+
and
|
328 |
+
HP DDE
|
329 |
+
0
|
330 |
+
tensions is actually not enough to come out with
|
331 |
+
conclusive results about the H0 tension because analyz-
|
332 |
+
ing this tension in light of any late-time model like PDDE
|
333 |
+
should necessarily involve analyzing the Pantheon SN Ia
|
334 |
+
sample [15].
|
335 |
+
Adding Pantheon data to Planck18+BAO
|
336 |
+
dataset, we observe a decreasing values of Ωpdde and H0
|
337 |
+
to 0.0586+0.017
|
338 |
+
−0.059 km s−1 Mpc−1 and 68.76+0.59
|
339 |
+
−0.76 km s−1
|
340 |
+
Mpc−1, respectively for PDDE. The tension in this case
|
341 |
+
is still significant with 3σ for PDDE. However, this value
|
342 |
+
is less than that of ΛCDM that gives 3.7σ. These con-
|
343 |
+
clusions can be justified by the positive correlation ob-
|
344 |
+
served in the (Ωpdde, H0) plan as can be seen in Fig. 1.
|
345 |
+
We also compare the absolute magnitude, MB, value with
|
346 |
+
SH0ES calibration i.e. MB = −19.244 ± 0.037 mag, we
|
347 |
+
notice that our model can considerably smooth the MB
|
348 |
+
tension, where the tension with SH0ES calibration is at
|
349 |
+
about 3.6σ, while for ΛCDM is at about 4.2σ (see Fig.
|
350 |
+
2). On the other hand, in the context of PDDE model,
|
351 |
+
we obtain a relatively high value of σ8 i.e. 0.9038+0.0094
|
352 |
+
−0.0094
|
353 |
+
and a noticeable decrease in the current density of matter
|
354 |
+
i.e. Ωm = 0.2358+0.0079
|
355 |
+
−0.0082. This gives a small value of
|
356 |
+
S8 i.e. 0.8011+0.015
|
357 |
+
−0.014. According to KV450+DES-Y1, S8
|
358 |
+
tension is at 1.4σ for PDDE and at 2.6σ for ΛCDM. Us-
|
359 |
+
ing Planck18+BAO and Planck18+BAO+Pantheon, we get
|
360 |
+
S8 = 0.831 ± 0.011 (S8 = 0.832+0.011
|
361 |
+
−0.012) and 0.8312+0.011
|
362 |
+
−0.012
|
363 |
+
(0.832 ± 0.011) for ΛCDM (PDDE), respectively. S8 ten-
|
364 |
+
sion is at 2.6σ (2.6σ) and 2.5σ (2.6σ) for ΛCDM (PDDE).
|
365 |
+
We deduce that PDDE attenuates the S8 tension compared
|
366 |
+
to the ΛCDM when constrained by Planck data only.
|
367 |
+
Table III shows the χ2 for each data combination. Fur-
|
368 |
+
thermore, △χ2
|
369 |
+
tot = χ2(P DDE)
|
370 |
+
tot
|
371 |
+
− χ2(ΛCDM)
|
372 |
+
tot
|
373 |
+
, △AIC =
|
374 |
+
AICP DDE − AICΛCDM and AIC are also shown in Ta-
|
375 |
+
ble III. Using Planck18 together with BAO and Pantheon
|
376 |
+
datasets we get a positive value of △χ2
|
377 |
+
tot and △AIC. The
|
378 |
+
inclusion of these data gives preference to ΛCDM.
|
379 |
+
|
380 |
+
4
|
381 |
+
Table II. Summary of the mean±1σ of the cosmological parameters for the ΛCDM and PDDE models, using Planck18, Planck18+BAO and
|
382 |
+
Planck18+BAO+Pantheon datasets.
|
383 |
+
Data
|
384 |
+
Planck18a
|
385 |
+
Planck18+BAO
|
386 |
+
Planck18+BAO+Pantheon
|
387 |
+
Model
|
388 |
+
ΛCDM
|
389 |
+
PDDE
|
390 |
+
ΛCDM
|
391 |
+
PDDE
|
392 |
+
ΛCDM
|
393 |
+
PDDE
|
394 |
+
100Ωbh2
|
395 |
+
2.238+0.016
|
396 |
+
−0.017
|
397 |
+
2.244 ± 0.016
|
398 |
+
2.24+0.014
|
399 |
+
−0.013
|
400 |
+
2.236 ± 0.015
|
401 |
+
2.241 ± 0.014
|
402 |
+
2.236 ± 0.015
|
403 |
+
Ωch2
|
404 |
+
0.1199 ± 0.0013 0.1191 ± 0.0013
|
405 |
+
0.1196+0.00099
|
406 |
+
−0.00098
|
407 |
+
0.12 ± 0.0011 0.1196+0.00096
|
408 |
+
−0.001
|
409 |
+
0.12 ± 0.001
|
410 |
+
Ωpdde
|
411 |
+
-
|
412 |
+
0.4901+0.031
|
413 |
+
−0.022
|
414 |
+
-
|
415 |
+
0.0847+0.024
|
416 |
+
−0.085
|
417 |
+
-
|
418 |
+
0.0586+0.017
|
419 |
+
−0.059
|
420 |
+
H0 [km s−1 Mpc−1]
|
421 |
+
67.93+0.58
|
422 |
+
−0.63
|
423 |
+
77.5 ± 1.1
|
424 |
+
68.07 ± 0.45
|
425 |
+
69.13+0.79
|
426 |
+
−1.1
|
427 |
+
68.09+0.46
|
428 |
+
−0.45
|
429 |
+
68.76+0.59
|
430 |
+
−0.76
|
431 |
+
τreio
|
432 |
+
0.054 ± 0.0081
|
433 |
+
0.05211+0.0088
|
434 |
+
−0.0081
|
435 |
+
0.0545+0.0076
|
436 |
+
−0.0077
|
437 |
+
0.0528+0.0075
|
438 |
+
−0.008
|
439 |
+
0.055+0.0074
|
440 |
+
−0.0079
|
441 |
+
0.053 ± 0.0076
|
442 |
+
ns
|
443 |
+
0.965 ± 0.0046
|
444 |
+
0.9674+0.0044
|
445 |
+
−0.0046
|
446 |
+
0.9661+0.0039
|
447 |
+
−0.0041
|
448 |
+
0.964 ± 0.0041 0.9663+0.0039
|
449 |
+
−0.0038
|
450 |
+
0.965+0.0042
|
451 |
+
−0.0039
|
452 |
+
ln (1010As)
|
453 |
+
3.044+0.015
|
454 |
+
−0.016
|
455 |
+
3.037+0.017
|
456 |
+
−0.016
|
457 |
+
3.044+0.015
|
458 |
+
−0.016
|
459 |
+
3.041 ± 0.015
|
460 |
+
3.045 ± 0.015
|
461 |
+
3.042 ± 0.015
|
462 |
+
Ωm
|
463 |
+
0.308+0.0081
|
464 |
+
−0.008
|
465 |
+
0.2358+0.0079
|
466 |
+
−0.0082
|
467 |
+
0.3065+0.0058
|
468 |
+
−0.0061
|
469 |
+
0.2982+0.0094
|
470 |
+
−0.0082
|
471 |
+
0.3063+0.0057
|
472 |
+
−0.0062
|
473 |
+
0.3013+0.007
|
474 |
+
−0.0066
|
475 |
+
σ8
|
476 |
+
0.823 ± 0.0066
|
477 |
+
0.9038+0.0094
|
478 |
+
−0.0094
|
479 |
+
0.8226 ± 0.0066
|
480 |
+
0.835+0.0094
|
481 |
+
−0.013
|
482 |
+
0.8227+0.0062
|
483 |
+
−0.0066
|
484 |
+
0.831+0.0082
|
485 |
+
−0.01
|
486 |
+
S8
|
487 |
+
0.834 ± 0.014
|
488 |
+
0.8011+0.015
|
489 |
+
−0.014
|
490 |
+
0.831 ± 0.011
|
491 |
+
0.832+0.011
|
492 |
+
−0.012
|
493 |
+
0.8312+0.011
|
494 |
+
−0.012
|
495 |
+
0.832 ± 0.011
|
496 |
+
MB [mag]
|
497 |
+
-
|
498 |
+
-
|
499 |
+
-
|
500 |
+
-
|
501 |
+
−19.41+0.013
|
502 |
+
−0.012
|
503 |
+
−19.39+0.015
|
504 |
+
−0.017
|
505 |
+
H0 tensionb
|
506 |
+
3.6σ
|
507 |
+
2.525σ
|
508 |
+
3.72σ
|
509 |
+
2.531σ
|
510 |
+
3.7σ
|
511 |
+
3σ
|
512 |
+
MB tension
|
513 |
+
-
|
514 |
+
-
|
515 |
+
-
|
516 |
+
-
|
517 |
+
4.2σ
|
518 |
+
3.6σ
|
519 |
+
S8 tension
|
520 |
+
2.6σ
|
521 |
+
1.4σ
|
522 |
+
2.6σ
|
523 |
+
2.6σ
|
524 |
+
2.5σ
|
525 |
+
2.6σ
|
526 |
+
a We used the “lite” version of high-ℓ likelihood.
|
527 |
+
b To calculate the tension between two values of H0 obtained from different data (d1, d2), we use the following expression [63, 64]:
|
528 |
+
T(H0) = |H0(d1) − H0(d2)|/(
|
529 |
+
�
|
530 |
+
σ(H0(d1))2 + σ(H0(d2))2), where H0 and σ are the mean and the variance of the posterior of Hubble rate (the same
|
531 |
+
for MB and S8).
|
532 |
+
Table III. The best-fit χ2 per experiment for the ΛCDM and PDDE models.
|
533 |
+
Datasets
|
534 |
+
Planck18
|
535 |
+
Planck18+BAO
|
536 |
+
Planck18+BAO+Pantheon
|
537 |
+
Model
|
538 |
+
ΛCDM
|
539 |
+
PDDE
|
540 |
+
ΛCDM
|
541 |
+
PDDE
|
542 |
+
ΛCDM
|
543 |
+
PDDE
|
544 |
+
Planck high-ℓ TTTEEE lite 583.41
|
545 |
+
582.37
|
546 |
+
583.96
|
547 |
+
584.26
|
548 |
+
583.5
|
549 |
+
583.96
|
550 |
+
Planck low-ℓ EE
|
551 |
+
396.23
|
552 |
+
395.68
|
553 |
+
395.98
|
554 |
+
395.86
|
555 |
+
396.26
|
556 |
+
395.84
|
557 |
+
Planck low-ℓ TT
|
558 |
+
23.44
|
559 |
+
22.31
|
560 |
+
23.27
|
561 |
+
23.22
|
562 |
+
23.36
|
563 |
+
23.43
|
564 |
+
Planck lensing
|
565 |
+
8.78
|
566 |
+
8.73
|
567 |
+
8.81
|
568 |
+
8.8
|
569 |
+
8.801
|
570 |
+
8.81
|
571 |
+
bao boss dr12
|
572 |
+
-
|
573 |
+
-
|
574 |
+
3.73
|
575 |
+
3.69
|
576 |
+
3.88
|
577 |
+
3.92
|
578 |
+
bao smallz 2014
|
579 |
+
-
|
580 |
+
-
|
581 |
+
1.48
|
582 |
+
1.53
|
583 |
+
1.41
|
584 |
+
1.43
|
585 |
+
Pantheon
|
586 |
+
-
|
587 |
+
-
|
588 |
+
-
|
589 |
+
-
|
590 |
+
1025.84
|
591 |
+
1025.80
|
592 |
+
χ2
|
593 |
+
tot
|
594 |
+
1011.88 1009.12 1017.25 1017.39 2043.09
|
595 |
+
2043.23
|
596 |
+
△χ2
|
597 |
+
tot
|
598 |
+
0
|
599 |
+
−2.76
|
600 |
+
0
|
601 |
+
+0.14
|
602 |
+
0
|
603 |
+
+0.14
|
604 |
+
AIC
|
605 |
+
1029.88 1029.12 1035.25 1037.39 2063.09
|
606 |
+
2065.23
|
607 |
+
△AIC
|
608 |
+
0
|
609 |
+
−0.76
|
610 |
+
0
|
611 |
+
+2.14
|
612 |
+
0
|
613 |
+
+2.14
|
614 |
+
In the following, we will focus on the data combination
|
615 |
+
Planck18+BAO+Pantheon as it is the only suitable combi-
|
616 |
+
nation to study the tension in the framework of the late-
|
617 |
+
time model PDDE.
|
618 |
+
B.
|
619 |
+
Adding MB prior.
|
620 |
+
To combine the SH0ES results with the other cosmo-
|
621 |
+
logical data, we take into account the SN Ia peak absolute
|
622 |
+
magnitude MB rather than the H0 parameter. For this,
|
623 |
+
we introduce a prior on MB from the SN measurements,
|
624 |
+
MB = −19.244 ± 0.037. In Fig. 3, we show the 2D
|
625 |
+
and 1D posterior distributions at 68.3% and 95.4% C.
|
626 |
+
L. for all cosmological parameters of the ΛCDM and
|
627 |
+
PDDE models.
|
628 |
+
The mean values, the error at 68%
|
629 |
+
C.L. and χ2 per experiment are given in Table IV and
|
630 |
+
Table V, respectively.
|
631 |
+
When adding the MB prior to
|
632 |
+
Planck18+BAO+Pantheon, the Ωpdde parameter reaches
|
633 |
+
the value 0.1087+0.052
|
634 |
+
−0.061 and the Hubble rate increases to
|
635 |
+
H0 = 69.76+0.75
|
636 |
+
−0.82.
|
637 |
+
This increase can be observed also
|
638 |
+
for the absolute magnitude where MB = −19.37+0.017
|
639 |
+
−0.018,
|
640 |
+
compared to the same datasets without MB prior, as can
|
641 |
+
be noticed from the strong positive correlation in the
|
642 |
+
|
643 |
+
5
|
644 |
+
0.115
|
645 |
+
0.119
|
646 |
+
0.124
|
647 |
+
Ωcdmh2
|
648 |
+
0
|
649 |
+
0.284
|
650 |
+
0.569
|
651 |
+
Ωpdde
|
652 |
+
67.3
|
653 |
+
74.3
|
654 |
+
81.3
|
655 |
+
H0
|
656 |
+
2.96
|
657 |
+
3.02
|
658 |
+
3.09
|
659 |
+
ln1010As
|
660 |
+
0.951
|
661 |
+
0.967
|
662 |
+
0.983
|
663 |
+
ns
|
664 |
+
0.001
|
665 |
+
0.0402
|
666 |
+
0.0794
|
667 |
+
τ reio
|
668 |
+
0.212
|
669 |
+
0.266
|
670 |
+
0.321
|
671 |
+
Ωm
|
672 |
+
0.812
|
673 |
+
0.873
|
674 |
+
0.934
|
675 |
+
σ8
|
676 |
+
0.755
|
677 |
+
0.811
|
678 |
+
0.868
|
679 |
+
S8
|
680 |
+
-19.4
|
681 |
+
-19.4
|
682 |
+
-19.3
|
683 |
+
MB
|
684 |
+
2.19
|
685 |
+
2.24
|
686 |
+
2.3
|
687 |
+
Ωbh2
|
688 |
+
-19.4
|
689 |
+
-19.4
|
690 |
+
-19.3
|
691 |
+
MB
|
692 |
+
0.115
|
693 |
+
0.119
|
694 |
+
0.124
|
695 |
+
Ωcdmh2
|
696 |
+
0
|
697 |
+
0.284
|
698 |
+
0.569
|
699 |
+
Ωpdde
|
700 |
+
67.3
|
701 |
+
74.3
|
702 |
+
81.3
|
703 |
+
H0
|
704 |
+
2.96
|
705 |
+
3.02
|
706 |
+
3.09
|
707 |
+
ln1010As
|
708 |
+
0.951
|
709 |
+
0.967
|
710 |
+
0.983
|
711 |
+
ns
|
712 |
+
0.001
|
713 |
+
0.0402
|
714 |
+
0.0794
|
715 |
+
τ reio
|
716 |
+
0.212
|
717 |
+
0.266
|
718 |
+
0.321
|
719 |
+
Ωm
|
720 |
+
0.812
|
721 |
+
0.873
|
722 |
+
0.934
|
723 |
+
σ8
|
724 |
+
0.755
|
725 |
+
0.811
|
726 |
+
0.868
|
727 |
+
S8
|
728 |
+
Planck18
|
729 |
+
Planck18+BAO
|
730 |
+
Planck18+BAO+Pantheon
|
731 |
+
Figure 1. The 2D and 1D posterior distributions at 68.3% and 95.4% C.L. for the PDDE model using different combinations of data (Planck,
|
732 |
+
Planck+BAO and Planck+BAO+Pantheon). The local measurement of H0 = 73.2 ± 1.3km s−1 Mpc−1 and S8 = 0.762+0.025
|
733 |
+
−0.024 obtained by
|
734 |
+
R20 and KV450+DES-Y1 respectively, are represented by the orange band.
|
735 |
+
{Ωpdde, H0}, {Ωpdde, MB} and {H0, MB} plans (see
|
736 |
+
Fig. 3). We also notice that the H0 tension is reduced
|
737 |
+
to a lower value of about ∼ 2.27σ and the MB tension
|
738 |
+
reduced to ∼ 3.06σ for the PDDE model. For ΛCDM,
|
739 |
+
we obtain H0 = 68.58+0.43
|
740 |
+
−0.44 and MB = −19.39 ± 0.012
|
741 |
+
with a tension of about 3.36σ and 3.7σ, respectively.
|
742 |
+
Therefore, we conclude that the PDDE model is able to
|
743 |
+
make a slight attenuation of the H0 and MB tensions
|
744 |
+
using Planck18+BAO+Pantheon+MB datasets compared
|
745 |
+
to ΛCDM. On the other hand, the prior on MB reduces
|
746 |
+
the value of S8 to 0.8212 ± 0.011 (0.8269+0.011
|
747 |
+
−0.012) for
|
748 |
+
ΛCDM (PDDE), respectively, compared to the same
|
749 |
+
datasets without MB prior.
|
750 |
+
A negative correlation can
|
751 |
+
also be seen in Fig.3 between S8 and MB. According to
|
752 |
+
KV450+DES-Y1, the S8 tension is at 2.16σ and 2.37σ
|
753 |
+
for ΛCDM and PDDE, respectively. We notice that the
|
754 |
+
ΛCDM model, reduces the S8 tension compared to PDDE
|
755 |
+
when
|
756 |
+
constrained
|
757 |
+
by
|
758 |
+
Planck18+BAO+Pantheon+MB
|
759 |
+
datasets.
|
760 |
+
Table V shows the χ2 per experiment using
|
761 |
+
Planck18+BAO+Pantheon+MB datasets. We get a nega-
|
762 |
+
tive value for △χ2
|
763 |
+
tot and △AIC, i. e. △χ2
|
764 |
+
tot = −3.01 and
|
765 |
+
△AIC = −1.01, while in the previous section, positive
|
766 |
+
values were found for the same datasets without MB prior.
|
767 |
+
The negative value of △χ2
|
768 |
+
tot is mainly related to the MB
|
769 |
+
prior from SH0ES data with △χ2
|
770 |
+
MB = −3.59. Conse-
|
771 |
+
quently the PDDE model provides a slightly better fit for
|
772 |
+
Planck18+BAO+Pantheon+MB datasets than ΛCDM.
|
773 |
+
|
774 |
+
6
|
775 |
+
ΛCDM
|
776 |
+
PDDE
|
777 |
+
SH0ES
|
778 |
+
-19.6
|
779 |
+
-19.5
|
780 |
+
-19.4
|
781 |
+
-19.3
|
782 |
+
-19.2
|
783 |
+
-19.1
|
784 |
+
-19.0
|
785 |
+
0.0
|
786 |
+
0.2
|
787 |
+
0.4
|
788 |
+
0.6
|
789 |
+
0.8
|
790 |
+
1.0
|
791 |
+
MB
|
792 |
+
P/Pmax
|
793 |
+
-19.5
|
794 |
+
-19.4
|
795 |
+
-19.3
|
796 |
+
-19.2
|
797 |
+
MB
|
798 |
+
66.8
|
799 |
+
68.9
|
800 |
+
71.1
|
801 |
+
73.2
|
802 |
+
H0
|
803 |
+
-19.5
|
804 |
+
-19.4
|
805 |
+
-19.3
|
806 |
+
-19.2
|
807 |
+
MB
|
808 |
+
ΛCDM
|
809 |
+
PDDE
|
810 |
+
Figure 2. The left panel shows 1D posterior distributions for the absolute magnitude, MB. The right panel shows 68% and 95% constraints
|
811 |
+
on (H0, MB) plan using Planck18+BAO+Pantheon datasets. The local measurement of H0 = 73.2 ± 1.3km s−1 Mpc−1 and MB =
|
812 |
+
−19.244 ± 0.037 mag obtained by SH0ES, are represented by the grey band and the orange band respectively.
|
813 |
+
Table IV. Summary of the mean±1σ of cosmological parameters for the ΛCDM and PDDE models, using Planck18+BAO+Pantheon+MB
|
814 |
+
datasets.
|
815 |
+
Data
|
816 |
+
Planck18+BAO+Pantheon+MB
|
817 |
+
Model
|
818 |
+
ΛCDM
|
819 |
+
PDDE
|
820 |
+
100Ωbh2
|
821 |
+
2.25 ± 0.014
|
822 |
+
2.242 ± 0.015
|
823 |
+
Ωch2
|
824 |
+
0.1185+0.00093
|
825 |
+
−0.00098 0.1196 ± 0.0011
|
826 |
+
Ωpdde
|
827 |
+
-
|
828 |
+
0.1087+0.052
|
829 |
+
−0.061
|
830 |
+
H0 [km s−1 Mpc−1]
|
831 |
+
68.58+0.43
|
832 |
+
−0.44
|
833 |
+
69.76+0.75
|
834 |
+
−0.82
|
835 |
+
τreio
|
836 |
+
0.05758+0.0073
|
837 |
+
−0.0085
|
838 |
+
0.05414+0.0077
|
839 |
+
−0.0081
|
840 |
+
ns
|
841 |
+
0.9688+0.0039
|
842 |
+
−0.004
|
843 |
+
0.9661+0.0041
|
844 |
+
−0.0042
|
845 |
+
ln (1010As)
|
846 |
+
3.049+0.015
|
847 |
+
−0.016
|
848 |
+
3.043+0.015
|
849 |
+
−0.016
|
850 |
+
Ωm
|
851 |
+
0.3+0.0054
|
852 |
+
−0.0056
|
853 |
+
0.292 ± 0.0071
|
854 |
+
σ8
|
855 |
+
0.8213+0.0064
|
856 |
+
−0.0068
|
857 |
+
0.8382+0.011
|
858 |
+
−0.012
|
859 |
+
S8
|
860 |
+
0.8212 ± 0.011
|
861 |
+
0.8269+0.011
|
862 |
+
−0.012
|
863 |
+
MB [mag]
|
864 |
+
−19.39 ± 0.012
|
865 |
+
−19.37+0.017
|
866 |
+
−0.018
|
867 |
+
H0 tension
|
868 |
+
3.36σ
|
869 |
+
2.27σ
|
870 |
+
MB tension
|
871 |
+
3.7σ
|
872 |
+
3.06σ
|
873 |
+
S8 tension
|
874 |
+
2.16σ
|
875 |
+
2.37σ
|
876 |
+
IV.
|
877 |
+
EFFECT ON THE CMB POWER SPECTRUM.
|
878 |
+
In the top panel of Fig. 4, we show the effect of the
|
879 |
+
phantom dynamical dark energy model and the ΛCDM
|
880 |
+
model on the CMB temperature power spectrum using
|
881 |
+
the results obtained by Planck18+BAO+Pantheon+MB
|
882 |
+
dataset. We notice that in the CMB temperature power
|
883 |
+
spectrum, the effect of the PDDE model is visible at large
|
884 |
+
scales 2 < ℓ < 30 but at higher multipoles ℓ this model
|
885 |
+
is indistinguishable from ΛCDM. This conclusion agrees
|
886 |
+
with that of several model of this type of dark energy (see
|
887 |
+
for example [43, 45]).
|
888 |
+
We also show the current mat-
|
889 |
+
ter power spectrum P(z), for the ΛCDM and the PDDE
|
890 |
+
models for different values of Ωpdde using the results ob-
|
891 |
+
tained in Tab. II and Tab. III. The bottom left and right
|
892 |
+
panels of Fig. 4 correspond to the amplitude of the mat-
|
893 |
+
ter power spectrum for different k-modes running approxi-
|
894 |
+
mately from the current Hubble horizon, k = 3.33×10−4h
|
895 |
+
Mpc−1 to k ∼ 1h Mpc−1. The bottom panels of Fig. 4 are
|
896 |
+
obtained using datasets under consideration without MB
|
897 |
+
prior (left panel) and with MB prior (right panel). In the
|
898 |
+
bottom-left panel of Fig. 4, we notice a clear difference
|
899 |
+
|
900 |
+
7
|
901 |
+
0.116
|
902 |
+
0.12
|
903 |
+
0.123
|
904 |
+
Ωcdmh2
|
905 |
+
67.4
|
906 |
+
69.9
|
907 |
+
72.3
|
908 |
+
H0
|
909 |
+
3
|
910 |
+
3.05
|
911 |
+
3.1
|
912 |
+
ln1010As
|
913 |
+
0.952
|
914 |
+
0.965
|
915 |
+
0.978
|
916 |
+
ns
|
917 |
+
0.0285
|
918 |
+
0.0547
|
919 |
+
0.0808
|
920 |
+
τ reio
|
921 |
+
-19.4
|
922 |
+
-19.4
|
923 |
+
-19.3
|
924 |
+
MB
|
925 |
+
0.272
|
926 |
+
0.294
|
927 |
+
0.316
|
928 |
+
Ωm
|
929 |
+
0.801
|
930 |
+
0.838
|
931 |
+
0.876
|
932 |
+
σ8
|
933 |
+
0.791
|
934 |
+
0.828
|
935 |
+
0.865
|
936 |
+
S8
|
937 |
+
0
|
938 |
+
0.152
|
939 |
+
0.304
|
940 |
+
Ωpdde
|
941 |
+
2.19
|
942 |
+
2.24
|
943 |
+
2.3
|
944 |
+
Ωbh2
|
945 |
+
0
|
946 |
+
0.152
|
947 |
+
0.304
|
948 |
+
Ωpdde
|
949 |
+
0.116
|
950 |
+
0.12
|
951 |
+
0.123
|
952 |
+
Ωcdmh2
|
953 |
+
67.4
|
954 |
+
69.9
|
955 |
+
72.3
|
956 |
+
H0
|
957 |
+
3
|
958 |
+
3.05
|
959 |
+
3.1
|
960 |
+
ln1010As
|
961 |
+
0.952
|
962 |
+
0.965
|
963 |
+
0.978
|
964 |
+
ns
|
965 |
+
0.0285
|
966 |
+
0.0547
|
967 |
+
0.0808
|
968 |
+
τ reio
|
969 |
+
-19.4
|
970 |
+
-19.4
|
971 |
+
-19.3
|
972 |
+
MB
|
973 |
+
0.272
|
974 |
+
0.294
|
975 |
+
0.316
|
976 |
+
Ωm
|
977 |
+
0.801
|
978 |
+
0.838
|
979 |
+
0.876
|
980 |
+
σ8
|
981 |
+
0.791
|
982 |
+
0.828
|
983 |
+
0.865
|
984 |
+
S8
|
985 |
+
ΛCDM
|
986 |
+
PDDE
|
987 |
+
Figure 3.
|
988 |
+
The 2D and 1D posterior distributions at 68.3% and 95.4% C.L. for the ΛCDM and PDDE models using
|
989 |
+
Planck18+BAO+Pantheon+MB datasets. The local measurement of H0 = 73.2 ± 1.3 km s−1 Mpc−1 and S8 = 0.762+0.025
|
990 |
+
−0.024 obtained
|
991 |
+
by SH0ES and KV450+DES-Y1 respectively, are shown by the orange band.
|
992 |
+
between ΛCDM and PDDE using Planck18 datasets alone.
|
993 |
+
This difference is due to the increase of the value of Ωpdde,
|
994 |
+
particularly when we use Planck18 alone. This observa-
|
995 |
+
tion is justified by the high value of σ8 for PDDE model
|
996 |
+
and the positive correlation observed in the plan (Ωpdde,
|
997 |
+
σ8) (see Fig. 1). However, this difference becomes less
|
998 |
+
observable by using Planck + BAO and Planck + BAO +
|
999 |
+
Pantheon datasets. The phantom dark energy model has
|
1000 |
+
a low effect on the matter power spectrum. This result
|
1001 |
+
is also shown in the reference [49]. The addition of MB
|
1002 |
+
prior to Planck18+BAO+Pantheon datasets slightly distin-
|
1003 |
+
guishes the PDDE model from the ΛCDM model. The
|
1004 |
+
different effect between ΛCDM and PDDE on the ampli-
|
1005 |
+
tude of the matter power spectrum is observed clearly in
|
1006 |
+
the range of smallest modes.
|
1007 |
+
V.
|
1008 |
+
CONCLUSIONS
|
1009 |
+
In this work, we have studied the effect of a phantom
|
1010 |
+
dynamical dark energy (PDDE) model on the cosmo-
|
1011 |
+
logical parameters, particularly its capability of relieving
|
1012 |
+
the H0 and S8 tensions.
|
1013 |
+
The equation of state of this
|
1014 |
+
model depends on the redshift z and deviates from the
|
1015 |
+
ΛCDM model by a positive constant. This PDDE model
|
1016 |
+
is specified by introducing an abrupt event in the future
|
1017 |
+
labeled in the literature the Little Sibling of the Big Rip
|
1018 |
+
as it smooths the big rip singularity. The Boltzman code
|
1019 |
+
CLASS has been modified to implement the parameter
|
1020 |
+
|
1021 |
+
8
|
1022 |
+
Table V. The χ2 per experiment for the ΛCDM and PDDE models
|
1023 |
+
Dataset
|
1024 |
+
Planck18+BAO+Pantheon+MB
|
1025 |
+
Model
|
1026 |
+
ΛCDM
|
1027 |
+
PDDE
|
1028 |
+
Planck high-ℓ TTTEEE lite 585.005
|
1029 |
+
582.857
|
1030 |
+
Planck low-ℓ EE
|
1031 |
+
396.53
|
1032 |
+
396.29
|
1033 |
+
Planck low-ℓ TT
|
1034 |
+
22.75
|
1035 |
+
23.45
|
1036 |
+
Planck lensing
|
1037 |
+
8.84
|
1038 |
+
8.77
|
1039 |
+
bao boss dr12
|
1040 |
+
3.38
|
1041 |
+
4.025
|
1042 |
+
bao smallz 2014
|
1043 |
+
1.99
|
1044 |
+
2.64
|
1045 |
+
Pantheon
|
1046 |
+
1025.65
|
1047 |
+
1026.7
|
1048 |
+
MB prior
|
1049 |
+
16.29
|
1050 |
+
12.7
|
1051 |
+
χ2
|
1052 |
+
tot
|
1053 |
+
2060.47
|
1054 |
+
2057.46
|
1055 |
+
△χ2
|
1056 |
+
tot
|
1057 |
+
0
|
1058 |
+
−3.01
|
1059 |
+
AIC
|
1060 |
+
2080.47
|
1061 |
+
2079.46
|
1062 |
+
△AIC
|
1063 |
+
0
|
1064 |
+
−1.01
|
1065 |
+
characterizing the PDDE model and a first Markov
|
1066 |
+
Chain Monte Carlo analysis has been performed using
|
1067 |
+
the dataset combinations Planck18, Planck18+BAO and
|
1068 |
+
Planck18+BAO+Pantheon.
|
1069 |
+
We have found that when
|
1070 |
+
using Planck18 data alone and Planck18+BAO, a mislead-
|
1071 |
+
ing reduction of the tension is noticed. In fact, finding a
|
1072 |
+
late-time solution of the H0 tension implies an analysis
|
1073 |
+
of the SN measurements, i.e.
|
1074 |
+
Pantheon data.
|
1075 |
+
Adding
|
1076 |
+
Pantheon data shows a persistent 3σ tension for H0 and
|
1077 |
+
2.6σ for S8. Although the H0 tension for PDDE is reduced
|
1078 |
+
in comparison with ΛCDM, it is clear that a late-time
|
1079 |
+
model can not lead to a solution to this H0 discrepancy.
|
1080 |
+
In a second analysis,
|
1081 |
+
we have added a prior on
|
1082 |
+
MB that was obtained by the SH0ES project,
|
1083 |
+
i.e.
|
1084 |
+
MB
|
1085 |
+
=
|
1086 |
+
−19.244 ± 0.037 mag.
|
1087 |
+
As shown in Ta-
|
1088 |
+
ble IV, the PDDE model reduces the H0 tension to
|
1089 |
+
2.27σ and the S8 tension to 2.37σ when combin-
|
1090 |
+
ing Planck18+BAO+Pantheon datasets with the MB
|
1091 |
+
prior,
|
1092 |
+
i.e
|
1093 |
+
Planck18+BAO+Pantheon+MB.
|
1094 |
+
Further-
|
1095 |
+
more,
|
1096 |
+
the PDDE model provides a slightly better
|
1097 |
+
fit
|
1098 |
+
to
|
1099 |
+
Planck18+BAO+Pantheon+MB
|
1100 |
+
datasets
|
1101 |
+
with
|
1102 |
+
∆χ2 = −3.01 and ∆AIC = −1.01 (see Table V).
|
1103 |
+
The distinction of the PDDE model over the standard
|
1104 |
+
model of cosmology is clearly observed in our work,
|
1105 |
+
for a wide range of data combinations.
|
1106 |
+
These findings
|
1107 |
+
agree with the fact that phantom dark energy models are
|
1108 |
+
supported by observations and can be an alternative of
|
1109 |
+
ΛCDM to solve problems related to the fine-tuning, the
|
1110 |
+
coincidence and the tensions under consideration if more
|
1111 |
+
investigations with regards to these models are done.
|
1112 |
+
Particularly, other phantom dark energy models such as
|
1113 |
+
the little rip [65] can be employed and many scenarios
|
1114 |
+
for the structure of the Universe such as the inclusion of
|
1115 |
+
massive neutrinos and the modification of the space-time
|
1116 |
+
curvature can be tested. We will focus on these subjects in
|
1117 |
+
our future works.
|
1118 |
+
|
1119 |
+
9
|
1120 |
+
101
|
1121 |
+
102
|
1122 |
+
103
|
1123 |
+
0
|
1124 |
+
1000
|
1125 |
+
2000
|
1126 |
+
3000
|
1127 |
+
4000
|
1128 |
+
5000
|
1129 |
+
6000
|
1130 |
+
( + 1)CTT/2 [ K2]
|
1131 |
+
CDM
|
1132 |
+
PDDE
|
1133 |
+
Planck Data
|
1134 |
+
2
|
1135 |
+
20
|
1136 |
+
35
|
1137 |
+
10 4
|
1138 |
+
10 3
|
1139 |
+
10 2
|
1140 |
+
10 1
|
1141 |
+
100
|
1142 |
+
k [hMpc
|
1143 |
+
1]
|
1144 |
+
102
|
1145 |
+
103
|
1146 |
+
104
|
1147 |
+
P(k) [Mpc/h]3
|
1148 |
+
CDM
|
1149 |
+
PDDE
|
1150 |
+
CDM
|
1151 |
+
PDDE
|
1152 |
+
CDM
|
1153 |
+
PDDE
|
1154 |
+
10 4
|
1155 |
+
10 3
|
1156 |
+
10 2
|
1157 |
+
10 1
|
1158 |
+
100
|
1159 |
+
k [hMpc
|
1160 |
+
1]
|
1161 |
+
102
|
1162 |
+
103
|
1163 |
+
104
|
1164 |
+
P(k) [Mpc/h]3
|
1165 |
+
CDM
|
1166 |
+
PDDE
|
1167 |
+
Figure 4. The CMB Temperature power spectrum (top panel) for the ΛCDM (dashed line) and PDDE (continuous line) models using the
|
1168 |
+
best-fit obtained by Planck18+BAO+Pantheon+MB datasets. The bottom panels correspond to the matter power spectrum using different
|
1169 |
+
combinations of data. The left panel is for Planck18 (blue lines), Planck18+BAO (red lines) and Planck18+BAO+Pantheon (green lines)
|
1170 |
+
datasets. The right panel is for Planck18+BAO+Pantheon+MB datasets.
|
1171 |
+
|
1172 |
+
10
|
1173 |
+
[1] A. G. Riess et al., “Observational Evidence from Super-
|
1174 |
+
novae for an Accelerating Universe and a Cosmological
|
1175 |
+
Constant”, Astron. J. 116 (1998) 1009. [astro-ph/9805201].
|
1176 |
+
[2] S. Perlmutter et al., “Measurements of Ω and Λ from 42
|
1177 |
+
High-Redshift Supernovae”, Astrophys. J. 517 (1999) 565,
|
1178 |
+
[astro-ph/9812133].
|
1179 |
+
[3] R.R. Caldwell, M. Doran, “Cosmic microwave background
|
1180 |
+
and supernova constraints on quintessence: concordance re-
|
1181 |
+
gions and target models”, Phys. Rev. D 69 (2004) 103517, [
|
1182 |
+
arXiv:astro-ph/0305334].
|
1183 |
+
[4] Z.Y. Huang et al., “Holographic explanation of wide-
|
1184 |
+
angle power correlation suppression in the Cosmic Mi-
|
1185 |
+
crowave Background Radiation”, JCAP 0605 (2006) 013,
|
1186 |
+
[ arXiv:hep-th/0501059].
|
1187 |
+
[5] T. Koivisto, D.F. Mota, “Dark Energy Anisotropic Stress
|
1188 |
+
and Large Scale Structure Formation”, Phys. Rev. D 73
|
1189 |
+
(2006) 083502, [ arXiv:astro-ph/0512135].
|
1190 |
+
[6] S.F. Daniel, “Large Scale Structure as a Probe of Grav-
|
1191 |
+
itational Slip ”, Phys. Rev. D 77 (2008) 103513, [
|
1192 |
+
arXiv:0802.1068 [astro-ph]].
|
1193 |
+
[7] D.J. Eisenstein et al., “Detection of the Baryon Acoustic
|
1194 |
+
Peak in the Large-Scale Correlation Function of SDSS Lu-
|
1195 |
+
minous Red Galaxies ”, Astrophys. J 633 (2005) 560 , [
|
1196 |
+
arXiv:astro-ph/0501171].
|
1197 |
+
[8] D.J. Eisenstein et al., “Baryon Acoustic Oscillations in the
|
1198 |
+
Sloan Digital Sky Survey Data Release 7 Galaxy Sample
|
1199 |
+
”, MNRAS. 401 (2010) 2148 , [ arXiv:0907.1660 [astro-
|
1200 |
+
ph.CO]].
|
1201 |
+
[9] A. Shadab et al.,“The clustering of galaxies in the com-
|
1202 |
+
pleted SDSS-III Baryon Oscillation Spectroscopic Sur-
|
1203 |
+
vey:
|
1204 |
+
cosmological analysis of the DR12 galaxy sam-
|
1205 |
+
ple,” Mon. Not. R. Astron. Soc 470 (2017) 2617–2652,
|
1206 |
+
[arXiv:1607.03155[astro-ph.CO]].
|
1207 |
+
[10] M. Blomqvist, et al.,“Baryon acoustic oscillations from
|
1208 |
+
the cross-correlation of Lyα absorption and quasars in
|
1209 |
+
eBOSS DR14,”
|
1210 |
+
Astron. Astrophys. 629 (2019) A86,
|
1211 |
+
[arXiv:1904.03430[astro-ph.CO]].
|
1212 |
+
[11] Planck Collaboration: N. Aghanim et al.,“Planck 2018 re-
|
1213 |
+
sults. VI. Cosmological parameters,” Astron. Astrophys.
|
1214 |
+
641 (2020) A6, [ arXiv:1807.06209[astro-ph.CO]].
|
1215 |
+
[12] T. M. C. Abbott et al.,“First Cosmology Results using
|
1216 |
+
Type Ia Supernovae from the Dark Energy Survey: Con-
|
1217 |
+
straints on Cosmological Parameters,”ApJL. 872 (2019)
|
1218 |
+
L30, [arXiv:1811.02374[astro-ph.CO]].
|
1219 |
+
[13] A. G. Riess et al.,“Milky Way Cepheid Standards for Mea-
|
1220 |
+
suring Cosmic Distances and Application to Gaia DR2:
|
1221 |
+
Implications for the Hubble Constant,”Astrophys. J. 861
|
1222 |
+
(2018) 126, [arXiv:1804.10655v2[astro-ph.CO]].
|
1223 |
+
[14] A. G. Riess et al., “ Cosmic Distances Calibrated to 1%
|
1224 |
+
Precision with Gaia EDR3 Parallaxes and Hubble Space
|
1225 |
+
Telescope Photometry of 75 Milky Way Cepheids Con-
|
1226 |
+
firm Tension with ΛCDM, ”Astrophys. J 908 (2021) L6,
|
1227 |
+
[arXiv:2012.08534 [astro-ph.CO]].
|
1228 |
+
[15] G. Efstathiou, “To H0 or not to H0?,” MNRAS 505 (2021)
|
1229 |
+
3866–3872 [arXiv:2103.08723v3 [astro-ph.CO] ].
|
1230 |
+
[16] D. Camarena and V. Marra, “On the use of the local prior
|
1231 |
+
on the absolute magnitude of Type Ia supernovae in cos-
|
1232 |
+
mological inference,” MNRAS 504 (2021) 5164–5171 [
|
1233 |
+
arXiv:2101.08641 [astro-ph.CO]].
|
1234 |
+
[17] R. C. Nunes, E. Di Valentino, “Dark sector interaction and
|
1235 |
+
the supernova absolute magnitude tension,” Phys. Rev. D
|
1236 |
+
104 (2021) 063529 [ arXiv:2107.09151 [astro-ph.CO]].
|
1237 |
+
[18] S. Gariazzo, E. Di Valentino et al, “Late time interacting
|
1238 |
+
cosmologies and the Hubble constant tension,” Phys. Rev.
|
1239 |
+
D 106 (2022) 023530 [arXiv:2111.03152v2 [astro-ph.CO]].
|
1240 |
+
[19] G. Benevento et al, “Can Late Dark Energy Transitions
|
1241 |
+
Raise the Hubble constant?,” Phys. Rev. D 101 (2020)
|
1242 |
+
103517 [ arXiv:2002.11707 [astro-ph.CO]].
|
1243 |
+
[20] D. M. Scolnic, D. O. Jones et al, “The Complete Light-curve
|
1244 |
+
Sample of Spectroscopically Confirmed SNe Ia from Pan-
|
1245 |
+
STARRS1 and Cosmological Constraints from the Com-
|
1246 |
+
bined Pantheon Sample,” Astrophys . J. 859 (2018) 101
|
1247 |
+
[arXiv:1710.00845 [astro-ph.CO]].
|
1248 |
+
[21] S. Joudaki, et al., “KiDS+VIKING-450 and DES-Y1 com-
|
1249 |
+
bined: Cosmology with cosmic shear, ” Astron. Astrophys.
|
1250 |
+
L1 (2020) 638, [ arXiv:1708.01530 [astro-ph.CO]].
|
1251 |
+
[22] W. L. Freedman, “ Cosmology at at Crossroads: Tension
|
1252 |
+
with the Hubble Constant, ” Nat. Astron 1 (2017) 0169, [
|
1253 |
+
arXiv:1706.02739 [astro-ph.CO]].
|
1254 |
+
[23] E. M¨ortsell, S. Dhawan, “ Does the Hubble constant ten-
|
1255 |
+
sion call for new physics?, ” JCAP 09 (2018) 025, [
|
1256 |
+
arXiv:1906.09262 [astro-ph.CO]].
|
1257 |
+
[24] L. Knox, M. Millea, “ The Hubble Hunter’s Guide, ” Phys.
|
1258 |
+
Rev. D 101 (2020) 043533, [ arXiv:1908.03663 [astro-
|
1259 |
+
ph.CO]].
|
1260 |
+
[25] E. D. Valentino, A. Melchiorri, J. Silk, “ Beyond six param-
|
1261 |
+
eters: extending ΛCDM, ” Phys. Rev. D 92 (2015) 121302,
|
1262 |
+
[arXiv:1507.06646 [astro-ph.CO]].
|
1263 |
+
[26] E. D. Valentino, A. Melchiorri, J. Silk, “ Beyond six param-
|
1264 |
+
eters: extending ΛCDM, ” Phys. Rev. D 92 (2015) 121302,
|
1265 |
+
[arXiv:1507.06646 [astro-ph.CO]].
|
1266 |
+
[27] M. Lucca, D. C. Hooper, “ Tensions in the dark: shedding
|
1267 |
+
light on Dark Matter-Dark Energy interactions, ” Phys. Rev.
|
1268 |
+
D 102 (2020) 123502, [ arXiv:2002.06127 [astro-ph.CO]].
|
1269 |
+
[28] S. Kumar, R. C. Nunes, “ Probing the interaction be-
|
1270 |
+
tween dark matter and dark energy in the presence of
|
1271 |
+
massive neutrinos, ” Phys. Rev. D 94 (2016) 123511, [
|
1272 |
+
arXiv:1608.02454 [astro-ph.CO]].
|
1273 |
+
[29] E. D. Valentino, A. Melchiorri, O. Mena, “Can interacting
|
1274 |
+
dark energy solve the H0 tension?
|
1275 |
+
, ” Phys. Rev. D 96
|
1276 |
+
(2017) 043503, [ arXiv:1704.08342 [astro-ph.CO]].
|
1277 |
+
[30] A. G´omez-Valent, V. Pettorino, L. Amendola, “Update on
|
1278 |
+
Coupled Dark Energy and the H0 tension , ” Phys. Rev. D
|
1279 |
+
101 (2020) 123513, [ arXiv:2004.00610 [astro-ph.CO]].
|
1280 |
+
[31] W. Yang, S. Pan, E. D. Valentino, R. C. Nunes, S. Vagnozzi,
|
1281 |
+
D. F. Mota, “Tale of stable interacting dark energy, observa-
|
1282 |
+
tional signatures, and the H0 tension , ” JCAP 1809 (2018)
|
1283 |
+
019, [ arXiv:1805.08252 [astro-ph.CO]].
|
1284 |
+
[32] E. D. Valentino, A. Melchiorri, O. Mena, S. Vagnozzi,
|
1285 |
+
“Non-minimal
|
1286 |
+
dark
|
1287 |
+
sector
|
1288 |
+
physics
|
1289 |
+
and
|
1290 |
+
cosmological
|
1291 |
+
tensions ,
|
1292 |
+
”
|
1293 |
+
Phys. Rev. D 101 (2020) 063502,
|
1294 |
+
[
|
1295 |
+
arXiv:1910.09853 [astro-ph.CO]].
|
1296 |
+
[33] L. P. Kanhaiya, K. Tanvi, D. Subinoy, “ Alleviating the
|
1297 |
+
H0 and σ8 anomalies with a decaying dark matter model,
|
1298 |
+
” JCAP 072020 (2020) 026, [ arXiv:1902.10636 [astro-
|
1299 |
+
ph.CO]].
|
1300 |
+
[34] S. R. Choudhury and S. Choubey, “Constraining light ster-
|
1301 |
+
ile neutrino mass with the BICEP2/Keck Array 2014 B-
|
1302 |
+
mode polarization data, ”Eur. Phys. J. C79 (2019) 557,
|
1303 |
+
[arXiv:1807.10294 [astro-ph.CO]].
|
1304 |
+
[35] S. Carneiro,
|
1305 |
+
P. C. de Holanda,
|
1306 |
+
C. Pigozzo and F.
|
1307 |
+
Sobreira, “ Is the H0 tension suggesting a 4th neu-
|
1308 |
+
|
1309 |
+
11
|
1310 |
+
trino’s generation?, ”Phys. Rev. D 100 (2019) 023505,
|
1311 |
+
[arXiv:1812.06064v2[astro-ph.CO]].
|
1312 |
+
[36] M. Lucca, “ Dark energy–dark matter interactions as a solu-
|
1313 |
+
tion to the S8 tension, ”Phys. Dark. Univ. 34 (2021) 100899,
|
1314 |
+
[https://doi.org/10.1016/j.dark.2021.100899].
|
1315 |
+
[37] Vivian Poulin et al., “ Early Dark Energy can Resolve the
|
1316 |
+
Hubble Tension, ”Phys. Rev. Lett.. 122 (2019) 221301, [
|
1317 |
+
arXiv:1811.04083 [astro-ph.CO]].
|
1318 |
+
[38] E. D. Valentino, A. Melchiorri and J. Silk, “ Recon-
|
1319 |
+
ciling Planck with the local value of H0 in extended
|
1320 |
+
parameter space, ”Phys. Lett. B 761 (2016) 242–246,
|
1321 |
+
[arXiv:1606.00634 [astro-ph.CO]].
|
1322 |
+
[39] Q. Huang and K. Wang, “How the Dark Energy Can Rec-
|
1323 |
+
oncile Planck with Local Determination of the Hubble Con-
|
1324 |
+
stant, ” EPJC 76 (2016), [ arXiv:1606.05965 [astro-ph.CO]
|
1325 |
+
].
|
1326 |
+
[40] E. D. Valentino, A. Melchiorri, E. V. Linder and J. Silk,
|
1327 |
+
“Constraining Dark Energy Dynamics in Extended Pa-
|
1328 |
+
rameter Space, ” Phys. Rev. D 96 (2017) 023523, [
|
1329 |
+
arXiv:1704.00762 [astro-ph.CO]].
|
1330 |
+
[41] E. D. Valentino, A. Melchiorri, E. V. Linder, J. Silk, “How
|
1331 |
+
the Dark Energy Can Reconcile Planck with Local De-
|
1332 |
+
termination of the Hubble Constant, ” Phys. Rev. D 96
|
1333 |
+
(2017)023523, [ arXiv:1704.00762 [astro-ph.CO] ].
|
1334 |
+
[42] U. Alam, S. Bag, V. Sahni, “Constraining the Cosmology of
|
1335 |
+
the Phantom Brane using Distance Measures, ” Phys. Rev.
|
1336 |
+
D 95 (2017) 023524, [arXiv:1605.04707 [astro-ph.CO] ].
|
1337 |
+
[43] W.
|
1338 |
+
Yang,
|
1339 |
+
S.
|
1340 |
+
Pan,
|
1341 |
+
E.
|
1342 |
+
D.
|
1343 |
+
Valentino,
|
1344 |
+
E.
|
1345 |
+
N.
|
1346 |
+
Sari-
|
1347 |
+
dakis, S. Chakraborty, “Observational constraints on one-
|
1348 |
+
parameter dynamical dark-energy parametrizations and the
|
1349 |
+
H0 tension, ” Astrophys. J. Lett. 99 (2019) 043543, [
|
1350 |
+
arXiv:1810.05141 [astro-ph.CO] ].
|
1351 |
+
[44] S. Vagnozzi, “New physics in light of the H0 tension: an
|
1352 |
+
alternative view, ” Phys. Rev. D 102 (2020) 023518, [
|
1353 |
+
arXiv:1907.07569 [astro-ph.CO]].
|
1354 |
+
[45] G. Alestas, L. Kazantzidis, L. Perivolaropoulos, “H0 Ten-
|
1355 |
+
sion, Phantom Dark Energy and Cosmological Parame-
|
1356 |
+
ter Degeneracies, ” Phys. Rev. D 101 (2020) 123516,
|
1357 |
+
[arXiv:2004.08363v3 [astro-ph.CO] ].
|
1358 |
+
[46] E. D. Valentino, A. Mukherjee, A. A. Sen, “Dark Energy
|
1359 |
+
with Phantom Crossing and the H0 tension, ” Entropy J. 23
|
1360 |
+
(2021) 404, [ arXiv:2005.12587 [astro-ph.CO] ].
|
1361 |
+
[47] F. X. L. Cede˜no et al., “Tracker phantom field and a
|
1362 |
+
cosmological constant:
|
1363 |
+
dynamics of a composite dark
|
1364 |
+
energy model, ” Phys. Rev. D. 104 (2021) 123502, [
|
1365 |
+
arXiv:2105.07103 [astro-ph.CO] ].
|
1366 |
+
[48] M. Bouhmadi-Lopez, A. Errahmani, P. Martin-Moruno,
|
1367 |
+
T. Ouali, Y. Tavakoli, “The little sibling of the big rip
|
1368 |
+
singularity, ” Int. J. Mod. Phys. D. 24 (2015) 1550078,
|
1369 |
+
[arXiv:1407.2446 [gr-qc] ].
|
1370 |
+
[49] A. Bouali, I. Albarran, M. Bouhmadi-L´opez, T. Ouali, “Cos-
|
1371 |
+
mological constraints of phantom dark energy models”,
|
1372 |
+
Phys. Dark. Univ. 26 (2019) 100391. [arXiv:1905.07304
|
1373 |
+
[astro-ph.CO]].
|
1374 |
+
[50] A. Bouali, I. Albarran, M. Bouhmadi-L´opez, A. Errahmani,
|
1375 |
+
T. Ouali, “Cosmological constraints of interacting phantom
|
1376 |
+
dark energy models”, Phys. Dark. Univ. 34 (2021) 100907.
|
1377 |
+
[https://doi.org/10.1016/j.dark.2021.100907].
|
1378 |
+
[51] L. E. Padilla,
|
1379 |
+
L. O. Tellez,
|
1380 |
+
L. A. Escamilla and
|
1381 |
+
J. A. Vazquez,
|
1382 |
+
“ Cosmological parameter inference
|
1383 |
+
with Bayesian statistics,
|
1384 |
+
”
|
1385 |
+
Universe 97 (2021) 213,
|
1386 |
+
[arXiv:1903.11127 [astro-ph.CO]].
|
1387 |
+
[52] H. Akaike, “ A new look at the statistical model identifica-
|
1388 |
+
tion, ” IEEE Transactions on Automatic Control 19 (716-
|
1389 |
+
723) 023537.
|
1390 |
+
[53] A. R. Liddle, “ Information criteria for astrophysical model
|
1391 |
+
selection, ” MNRAS 377 (2007) L74-L78.
|
1392 |
+
[54] M. Szydlowski, A. Krawiec, A. Kurek and M. Kamionka,
|
1393 |
+
“ AIC, BIC, Bayesian evidence against the interacting dark
|
1394 |
+
energy model, ” Eur. Phys. J. C . 75 (2015) 1-11.
|
1395 |
+
[55] B. Krzysztof, “ Emerging spatial curvature can resolve the
|
1396 |
+
tension between high-redshift CMB and low-redshift dis-
|
1397 |
+
tance ladder measurements of the Hubble constant, ” Phys.
|
1398 |
+
Rev. D 97 (2018) 103529, [arXiv:1712.02967v2 [astro-
|
1399 |
+
ph.CO]].
|
1400 |
+
[56] W. K. Hastings, “Monte Carlo sampling methods using
|
1401 |
+
Markov chains and their applications, ” Biometrika 57
|
1402 |
+
(1970) 97–109.
|
1403 |
+
[57] T. Brinckmann, J. Lesgourgues, “MontePython 3: boosted
|
1404 |
+
MCMC sampler and other features,” Phys. Dark. Univ. 57
|
1405 |
+
(2019) 100260 [arXiv:1804.07261v2 [astro-ph.CO]].
|
1406 |
+
[58] J. Lesgourgues, “The Cosmic Linear Anisotropy Solving
|
1407 |
+
System (CLASS) I: Overview,”(2011) [arXiv:1104.2932v2
|
1408 |
+
[astro-ph.IM]].
|
1409 |
+
[59] W. Fang, W.Hu, A. Lewis, “Crossing the phantom divide
|
1410 |
+
with parametrized post-Friedmann dark energy,” Phys.Rev.
|
1411 |
+
D78 (2008) [arXiv:0808.3125 [astro-ph]].
|
1412 |
+
[60] BOSS collaboration, S. Alam, M. Ata et al., “The cluster-
|
1413 |
+
ing of galaxies in the completed SDSS-III Baryon Oscil-
|
1414 |
+
lation Spectroscopic Survey: cosmological analysis of the
|
1415 |
+
DR12 galaxy sample”, MNRAS. 470 (2017) 2617–2652,
|
1416 |
+
[arXiv:1607.03155 [astro-ph.CO]].
|
1417 |
+
[61] F. Beutler, C. Blake, M. Colless, D. H. Jones, L. Staveley-
|
1418 |
+
Smith, L. Campbell, Lachlan, Q Parker, W. Saunders, F.
|
1419 |
+
Watson, “The 6dF Galaxy Survey: baryon acoustic oscil-
|
1420 |
+
lations and the local Hubble constant,” Mon. Not. Roy. As-
|
1421 |
+
trono. Soc. 416 (2011) 3017–3032 [arXiv:1106.3366 [astro-
|
1422 |
+
ph.CO]].
|
1423 |
+
[62] A. J. Ross, L. Samushia, C. Howlett, W. J. Percival, A. Bur-
|
1424 |
+
den, M. Manera, “The clustering of the SDSS DR7 main
|
1425 |
+
Galaxy sample – I. A 4 per cent distance measure at z =
|
1426 |
+
0.15,” Mon. Not. Roy. Astrono. Soc. J. 449 (2015) 835–847
|
1427 |
+
[arXiv:1409.3242 [astro-ph.CO]].
|
1428 |
+
[63] D. Camarena, V. Marra, “ Impact of the cosmic variance
|
1429 |
+
on H0 on cosmological analyses, ” Phys. Rev. D 98 (2018)
|
1430 |
+
023537, [arXiv:1805.09900v3 [astro-ph.CO]].
|
1431 |
+
[64] C. A. P. Bengaly, U. Andrade and J. S. Alcaniz, “
|
1432 |
+
How does an incomplete sky coverage affect the Hub-
|
1433 |
+
ble Constant variance?, ” Eur. Phys. J. C 79 (2019) 768,
|
1434 |
+
[arXiv:1810.04966v2 [astro-ph.CO] ].
|
1435 |
+
[65] F. Contreras, N. Cruz, E. Elizalde, E. Gonz´alez and
|
1436 |
+
S. Odintsov, “ Linking little rip cosmologies with regu-
|
1437 |
+
lar early universes, ” Phys. Rev. D98 (2018) 123520, [
|
1438 |
+
arXiv:1808.06546 [gr-qc] ].
|
1439 |
+
|
4tE2T4oBgHgl3EQf6ghP/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
6dE4T4oBgHgl3EQf1w1z/content/tmp_files/2301.05293v1.pdf.txt
ADDED
@@ -0,0 +1,968 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
HTTE: A Hybrid Technique For Travel Time
|
2 |
+
Estimation In Sparse Data Environments
|
3 |
+
immediate
|
4 |
+
Nikolaos Zygouras1, [email protected] Nikolaos Panagiotou1, [email protected]
|
5 |
+
Yang Li3, [email protected] Dimitrios Gunopulos1, [email protected] Leonidas
|
6 |
+
Guibas2, [email protected]
|
7 |
+
1
|
8 |
+
Abstract
|
9 |
+
Travel time estimation is a critical task, useful to many urban appli-
|
10 |
+
cations at the individual citizen and the stakeholder level. This paper
|
11 |
+
presents a novel hybrid algorithm for travel time estimation that lever-
|
12 |
+
ages historical and sparse real-time trajectory data. Given a path and a
|
13 |
+
departure time we estimate the travel time taking into account the histor-
|
14 |
+
ical information, the real-time trajectory data and the correlations among
|
15 |
+
different road segments. We detect similar road segments using historical
|
16 |
+
trajectories, and use a latent representation to model the similarities. Our
|
17 |
+
experimental evaluation demonstrates the effectiveness of our approach.
|
18 |
+
1
|
19 |
+
Introduction
|
20 |
+
The increasing population density in modern cities is leading to massively in-
|
21 |
+
creasing commuting demands for citizens. This strongly motivates the need for
|
22 |
+
faster and more efficient navigation tools in the city. To be truly useful such
|
23 |
+
systems need to be able to monitor and accurately predict the traffic condi-
|
24 |
+
tions across the entire city road network in real-time, to respond to abrupt or
|
25 |
+
unexpected condition changes. Accurate travel time estimation for a path in
|
26 |
+
the road network is important for tools that help individual citizens plan their
|
27 |
+
travel; equally stakeholders and city/traffic authorities can exploit such tools
|
28 |
+
for efficient route planning and automatic detection of traffic anomalies. Sev-
|
29 |
+
eral works have used data from static sensors, including loop detectors Kwon
|
30 |
+
et al. (2003) and CCTV cameras Zhan et al. (2015) to address the travel time
|
31 |
+
estimation for a path. Such sensors are typically located at several junctions
|
32 |
+
across the city monitoring the traffic condition. The prevalence of such solu-
|
33 |
+
tions has diminished since their first appearance. The increased capital cost of
|
34 |
+
1(1)National and Kapodistrian University of Athens (2)Stanford University (3) Tsinghua-
|
35 |
+
Berkeley Shenzhen Institute
|
36 |
+
1
|
37 |
+
arXiv:2301.05293v1 [cs.LG] 12 Jan 2023
|
38 |
+
|
39 |
+
installing and maintaining such devices and their limited and static coverage
|
40 |
+
of the road network in combination with the inherent inaccuracy in calculating
|
41 |
+
the travel time from the output of these sensors (i.e. number of vehicles, speed
|
42 |
+
and video frames) limit their application in practice.
|
43 |
+
Recently researchers have used trajectory data in order to perform travel
|
44 |
+
time estimation, thus taking advantage of the widespread use of mobile devices
|
45 |
+
that are equipped with Global Position System (GPS) technology. Thus, such
|
46 |
+
mobile devices are transformed into important moving and ubiquitous sensors
|
47 |
+
reporting the traffic condition at different parts of the road network.
|
48 |
+
However, not all such data are available in real-time for a variety of reasons.
|
49 |
+
Sensors may be offline or smartphones may report their locations infrequently
|
50 |
+
or in batches.
|
51 |
+
Additionally, in several cases the application has access to a
|
52 |
+
small number of sensors. Taxi or bus companies, for instance, have data for the
|
53 |
+
vehicles in their fleet only. Over time, such applications can compile massive
|
54 |
+
historical data with impressive coverage, although at any given time the coverage
|
55 |
+
of the map is sparse.
|
56 |
+
The goal of this study is to estimate the time that is required to travel a
|
57 |
+
given query path considering a particular departure time in real time even when
|
58 |
+
very patchy real time coverage of the network is available. To accomplish this
|
59 |
+
we propose a hybrid model that considers efficiently the recent and historical
|
60 |
+
trajectories generated by a sample of vehicles. In our settings, the travel time
|
61 |
+
estimation is a challenging problem for the following reasons:
|
62 |
+
1. Data sparsity: for the majority of the road segments we do not have any
|
63 |
+
information regarding their recent traffic condition, since only the trajectories
|
64 |
+
of a small subset of vehicles moving in the road network is available. Therefore,
|
65 |
+
our setting is different from industry situations where an extensive real-time
|
66 |
+
coverage of the traffic conditions may be available.
|
67 |
+
2. Noisy data: the travel time reports are extremely noisy. A driver may stop at
|
68 |
+
a traffic light and spend a while waiting, while another driver crosses the junction
|
69 |
+
without stopping at the traffic light. This would generate two divergent travel
|
70 |
+
time reports for the same road segment. Also, some drivers may drive faster or
|
71 |
+
slower than others adding further complexity in the measurements.
|
72 |
+
3. Unpredictable dynamics of traffic: there are many traffic irregularities and
|
73 |
+
anomalies that may occur in the road network (i.e. an accident, a social event
|
74 |
+
etc.) that could affect the expected and the orderly traffic behaviour of the road
|
75 |
+
network.
|
76 |
+
4. Response time: it is crucial to create a model able to answer users’ queries
|
77 |
+
instantly and at the same time update its state in real time considering the
|
78 |
+
recent traffic condition.
|
79 |
+
To address the aforementioned challenges, we propose a Hybrid Travel Time
|
80 |
+
Estimation framework, referred as HTTE. The framework achieves the estima-
|
81 |
+
tion of the travel time for a given query path (laying on top of the road network),
|
82 |
+
using data from moving vehicles. The proposed framework is capable of pro-
|
83 |
+
viding predictions in real-time by exploiting the similarity of the road segments
|
84 |
+
and by considering travel time reports provided by recent as well as historical
|
85 |
+
trajectories. The contributions of this work can be summarized as follows:
|
86 |
+
2
|
87 |
+
|
88 |
+
• A latent representation for road segments: In order to treat the data sparsity
|
89 |
+
problem in individual segments, we take advantage of the available traffic
|
90 |
+
information from other segments with similar traffic behavior. We provide a
|
91 |
+
mechanism for learning a latent representation for the road segments. This
|
92 |
+
representation describes their traffic behaviour. Thus, road segments with
|
93 |
+
similar traffic behaviour will be placed close in this latent space.
|
94 |
+
• A Hybrid Estimation Model: We develop a streaming and hybrid estimation
|
95 |
+
model that captures the recent traffic reports, the periodicity of the time
|
96 |
+
series and the correlations among different road segments. Our framework
|
97 |
+
models large areas of the city jointly and not the road segments individually,
|
98 |
+
addressing this way the data sparsity problem.
|
99 |
+
• We evaluate our method under realistic settings using data from buses and
|
100 |
+
taxis and compare it with state of the art techniques. We show that hybrid
|
101 |
+
techniques such as the one we propose outperform techniques that use only
|
102 |
+
historical or only real-time and near real-time data. Experiments show that
|
103 |
+
incorporating pathlets can improve the query efficiency up to 14 times with
|
104 |
+
slight degradation in accuracy. This modification allows HTTE to work with
|
105 |
+
interactive applications on a much larger scale.
|
106 |
+
2
|
107 |
+
Related Work
|
108 |
+
Travel Time Estimation Using Static Sensor Data: A variety of tech-
|
109 |
+
niques have been proposed in the literature for estimating the road segments’
|
110 |
+
traffic flow or speed, exploiting static sensor data. Among these techniques, Qu
|
111 |
+
et al. (2008) describes a matrix decomposition method, for estimating the traffic
|
112 |
+
flow in Beijing, Li et al. (2013) proposes an extension of Probabilistic Principal
|
113 |
+
Component Analysis and Kernel Principal Component Analysis that captures
|
114 |
+
spatial and temporal dependencies and Wang et al. (2016b) uses deep convo-
|
115 |
+
lutional neural networks for predicting the road segments’ speed. A DeepNN
|
116 |
+
architecture able to capture spatial/temporal relations between road segments
|
117 |
+
was proposed in Li et al. (2018b) using speeds from static sensors.
|
118 |
+
Travel Time Estimation Using Dynamic Mobile Sensor Data: Many
|
119 |
+
studies have explored the travel time estimation problem using moving sensors.
|
120 |
+
In Zhan et al. (2013) the authors estimated the travel time in links, employing
|
121 |
+
least-square optimization on taxi trip data that contained endpoint locations
|
122 |
+
and trip metadata. A Bayesian mixture model was introduced in Zhan et al.
|
123 |
+
(2016a) that estimated the short-term average urban link travel times with par-
|
124 |
+
tial information available. The correlations between the travel times of nearby
|
125 |
+
links and different time slots are crucial for inferring the traffic state of a partic-
|
126 |
+
ular link Niu et al. (2014); Zhang et al. (2016). Online methods that determine
|
127 |
+
the time required by a bus to reach a specified bus stop were proposed in Gal
|
128 |
+
et al. (2017), Gal et al. (2018) and Yu et al. (2011). In Wang et al. (2016a) the
|
129 |
+
authors propose a method that estimates the travel time by identifying near-
|
130 |
+
neighbor trajectories, with similar origin and destination. The final estimation
|
131 |
+
3
|
132 |
+
|
133 |
+
of the travel time is the weighted average of the neighbors travel times. The au-
|
134 |
+
thors in Jenelius and Koutsopoulos (2013) state that the travel time estimation
|
135 |
+
can be approximated by the sum of the segments’ traversal time and a delay
|
136 |
+
penalty that occurs at the links between the segments. In Zhan et al. (2016b)
|
137 |
+
the authors propose a hybrid framework that incorporates (i) road network data,
|
138 |
+
(ii) POI (Points of Interest), (iii) GPS trajectories and (iv) weather informa-
|
139 |
+
tion to estimate the travel speed and the traffic volume. In Li et al. (2017) the
|
140 |
+
authors proposed a technique that estimates the travel time using a small num-
|
141 |
+
ber of GPS-equipped cars available, discovering local traffic patterns over a set
|
142 |
+
of frequent paths, a.k. a. pathlets. At query time, a trajectory is decomposed
|
143 |
+
into pathlets, whose recent travel time is estimated using pattern matching with
|
144 |
+
recent travel time observations. A spatio-temporal hidden Markov model that
|
145 |
+
models correlations among different traffic time series was proposed in Yang
|
146 |
+
et al. (2013) taking into account the sparsity, the spatio-temporal correlation,
|
147 |
+
and the heterogeneity of time series. A different approach was followed by Yang
|
148 |
+
et al. (2018); Dai et al. (2016) assigning the weights to the paths instead of the
|
149 |
+
edges of the road network, avoiding splitting the trajectories in small fragments.
|
150 |
+
The authors in Yang et al. (2014) explored the use of weighted PageRank values
|
151 |
+
of edges for assigning appropriate weights to all edges. The authors in Id´e and
|
152 |
+
Sugiyama (2011) proposed a weight propagation model able to capture neigh-
|
153 |
+
boring road-link dependencies and embedded the model to the regression task.
|
154 |
+
In the same direction in Zheng and Ni (2013) the authors provided a multi
|
155 |
+
task learning framework that simultaneously captures spatial dependencies and
|
156 |
+
temporal dynamics encouraging spatio-temporal smoothness.
|
157 |
+
Learning Latent Features on the Road Network: Recent techniques have
|
158 |
+
suggested more sophisticated methods for taking advantage of historical data
|
159 |
+
for travel time prediction. In Hofleitner et al. (2012) a technique that estimates
|
160 |
+
the arterial travel time distributions is proposed, introducing hidden random
|
161 |
+
variables that represent the road segments’ state (congested and undersatu-
|
162 |
+
rated). Then a dynamic bayesian network learns the travel time distributions.
|
163 |
+
A technique that detects the time-varying distribution of travel time of road seg-
|
164 |
+
ments using Graph Convolutional Neural Network was introduced in Hu et al.
|
165 |
+
(2019). In Deng et al. (2016) the authors proposed a method that imputes the
|
166 |
+
short future speeds for the road segments, utilizing latent topological and tem-
|
167 |
+
poral features learned and updated incrementally through matrix factorization.
|
168 |
+
In Wang et al. (2014) the travel times of different road segments, drivers and
|
169 |
+
time slots are modeled as a 3D sparse tensor. The missing values were filled
|
170 |
+
in using the geospatial features and the recent and historical traffic informa-
|
171 |
+
tion. A dynamic programming technique optimally concatenated the path into
|
172 |
+
subpaths.
|
173 |
+
Deep Learning Approaches: The recent success of deep learning in a variety
|
174 |
+
of learning problems, lead to the design of deep learning architectures for the
|
175 |
+
travel time estimation task. In DeepTravel Zhang et al. (2018) a deep learn-
|
176 |
+
ing architecture is proposed with two major components. The first handles the
|
177 |
+
representation of the features (spatial, temporal, driving state) with an embed-
|
178 |
+
dings layer while the second consists of a BiLSTM layer that performs the actual
|
179 |
+
4
|
180 |
+
|
181 |
+
regression. An origin-destination travel time estimation method is MURAT Li
|
182 |
+
et al. (2018a) that employs a graph embedding method for extracting roads’
|
183 |
+
embeddings and an embedding layer for capturing the spatial and temporal fea-
|
184 |
+
tures. These embeddings layers transform and provide the input to a Residual
|
185 |
+
network.
|
186 |
+
The authors in Wang et al. (2018a) proposed an end-to-end Deep
|
187 |
+
learning framework for travel time estimation of an entire path (DeepTTE). A
|
188 |
+
geo-convolution operation is proposed that handles the GPS points of the tra-
|
189 |
+
jectory followed by a recurrent component. A multi-task learning component is
|
190 |
+
used in order to learn both the total travel time of the given path and the travel
|
191 |
+
times of smaller parts of the path. Finally in Wang et al. (2018b) the authors
|
192 |
+
proposed a deep learning model that estimates the time of arrival using wide,
|
193 |
+
deep and recurrent components.
|
194 |
+
In essence, in our work we exploit novel techniques for the discovery of latent
|
195 |
+
features in the spatial and temporal traffic data and at the same time leverage
|
196 |
+
the use of sparse real-time information.
|
197 |
+
3
|
198 |
+
Our Approach
|
199 |
+
3.1
|
200 |
+
Problem Setup
|
201 |
+
In this work we propose an efficient algorithm for estimating the travel time that
|
202 |
+
is required for a vehicle to traverse a path of the road network. The proposed
|
203 |
+
framework receives firstly as input a set of vehicles’ trajectories. Each trajectory
|
204 |
+
is a sequence of time ordered spatial points T : (p1, t1) → · · · → (pn, tn), where
|
205 |
+
each point pi ∈ R2 is the sampled GPS position and ti is the corresponding
|
206 |
+
timestamp of the measurement. Then the points of the trajectories are mapped
|
207 |
+
on a Road Network.
|
208 |
+
A Road Network is defined as a topological structure
|
209 |
+
of a network captured by a graph G, where the nodes of G correspond to a
|
210 |
+
collection of road segments ri that link different urban areas together and the
|
211 |
+
set of edges represent the connections between these road segments. A map-
|
212 |
+
matched trajectory TG is a projection of a trajectory T in the road network G.
|
213 |
+
TG : (r1, tin,1, t1) → · · · → (rn′, tin,n′, tn′) is defined as a sequence of the visited
|
214 |
+
road segments ri along with the timestamps that the vehicle entered tin,i and
|
215 |
+
left ti each road segment. In this work we are computing the estimated travel
|
216 |
+
time of a given query path, without maintaining profiles for each driver.
|
217 |
+
Each vehcile that traverses a segment ri generates a Travel Time Report
|
218 |
+
Ri = (ri, ti, TTi). The reports Ri are available when the vehicle exits the road
|
219 |
+
segment. TTi = ti−tin,i is the travel time required for the traversal and ti is the
|
220 |
+
time when the vehicle left the road segment. The travel time reports are stored
|
221 |
+
in a collection RH that is incrementally updated as new reports are provided.
|
222 |
+
Also, a Road Segment Embedding is a mapping E : ri → RD , that maps a road
|
223 |
+
segment ri of the road network G to a D-dimensional latent space. Finally, a
|
224 |
+
query path Pq : rq1 → · · · → rqm is an ordered sequence of m consecutive road
|
225 |
+
segments of G.
|
226 |
+
Problem Definition. Given a query q that consists of a query path Pq and
|
227 |
+
5
|
228 |
+
|
229 |
+
Query
|
230 |
+
q
|
231 |
+
Offline
|
232 |
+
Data
|
233 |
+
Real Time
|
234 |
+
Data
|
235 |
+
Road
|
236 |
+
Network
|
237 |
+
Trajectory
|
238 |
+
Database
|
239 |
+
Map
|
240 |
+
Matching
|
241 |
+
Segments
|
242 |
+
TT - RH
|
243 |
+
Matrix
|
244 |
+
Factorization
|
245 |
+
Embeddings
|
246 |
+
Gaussian
|
247 |
+
Processes
|
248 |
+
Training
|
249 |
+
Hyperpar
|
250 |
+
ameters
|
251 |
+
Gaussian
|
252 |
+
Process
|
253 |
+
Real Time/
|
254 |
+
Offline Data
|
255 |
+
Travel Time
|
256 |
+
Estimation
|
257 |
+
TTq
|
258 |
+
Figure 1: Framework of our approach.
|
259 |
+
a departure time tdep,q, predict the travel time TTq� that is required for a vehicle
|
260 |
+
to traverse all the road segments of Pq departing at tdep,q using the collection
|
261 |
+
of historical travel time reports RH that have been received until the time of the
|
262 |
+
query.
|
263 |
+
3.2
|
264 |
+
Overview of the Approach
|
265 |
+
The overview of our framework for estimating the travel time of a given query
|
266 |
+
path is illustrated in Figure 1. Our framework has two major tasks. Initially, it
|
267 |
+
aims to model the historical data by examining the traffic behavior of the road
|
268 |
+
segments. Then it makes real-time predictions that exploit both historical and
|
269 |
+
real-time information. Our architecture consists of the following modules:
|
270 |
+
Module 1: Road Network & Trajectory Partitioning. The first pro-
|
271 |
+
cessing component receives as input raw GPS trajectories and maps them onto
|
272 |
+
paths in a road network, such as OpenStreetMap (OSM). In this case, the GPS
|
273 |
+
points of a trajectory are mapped to road segments (i.e. OSM road segments)
|
274 |
+
using the Barefoot2 library. Also, in this work we consider more abstract models
|
275 |
+
of the road network. Under this case, the input GPS points could be mapped
|
276 |
+
to sequences of road segments, or to pairs of GPS locations that represent a
|
277 |
+
transition from an origin to a destination.
|
278 |
+
One way to obtain a compact set of road segment sequences for learning the
|
279 |
+
traffic behaviour is using the concept of pathlet dictionary. Given a set of map
|
280 |
+
matched trajectories S, the pathlet dictionary (PD) is a collection of paths
|
281 |
+
(road segment sequences) on the road network that reconstructs all trajectories
|
282 |
+
in S by concatenation. Entries in the pathlet dictionary are referred as pathlets.
|
283 |
+
A pathlet dictionary is considered optimal if it satisfies the following criteria:
|
284 |
+
(i) The number of pathlets in the dictionary, |PD| is minimized. (ii) For each
|
285 |
+
map matched trajectory TG ∈ S, the number of pathlets used to reconstruct TG,
|
286 |
+
|p(TG)| is minimized.
|
287 |
+
Although computing the optimal pathlet dictionary from a trajectory col-
|
288 |
+
lection is an NP-hard problem, Chen et al. (2013) proposed an efficient approx-
|
289 |
+
imation algorithm to find solution in O(|S|·n2) time, where |S| is the size of the
|
290 |
+
trajectory collection and n is the maximum number of road segments. When the
|
291 |
+
2https://github.com/bmwcarit/barefoot
|
292 |
+
6
|
293 |
+
|
294 |
+
Figure 2: Example segments mapping into the embedding space. The t-SNE
|
295 |
+
technique is used in order to project the embeddings in a 3-dimensional space.
|
296 |
+
dictionary is computed, it’s easy to query the decomposition of map matched
|
297 |
+
trajectories using graph search creating the travel time reports for the pathlets.
|
298 |
+
After the mapping to the road segments is completed using the former or the
|
299 |
+
latter approach the travel time reports RH are generated, containing the time
|
300 |
+
required to travel the road segments or the pathlets. This processing module is
|
301 |
+
common for both the historical and the real-time data. These reports are the
|
302 |
+
fundamental element of the proposed travel time estimation technique.
|
303 |
+
Module 2: A latent representation for road segments.
|
304 |
+
Identifying
|
305 |
+
segments with similar traffic patterns is crucial for tackling the data sparsity
|
306 |
+
problem. This component receives as input timestamped travel time reports for
|
307 |
+
the various road segments. A latent representation for each segment is learned
|
308 |
+
capturing the correlations among the road segments. That is, segments with
|
309 |
+
similar traffic behaviour are placed close in the latent space. On the other hand,
|
310 |
+
segments with divergent traffic behaviour are placed far apart in the latent space.
|
311 |
+
Figure 2 on the right illustrates on the map several road segments with similar
|
312 |
+
traffic behavior (similar embeddings). On the left part of the figure the mapping
|
313 |
+
of these road segments into the embedding space is presented.
|
314 |
+
Module 3: Travel Time Estimation. The final module estimates the time
|
315 |
+
needed to travel a given query path Pq. This module is comprised by an offline
|
316 |
+
and a real-time stage. A Gaussian Process (Williams and Rasmussen, 2006)
|
317 |
+
model is trained offline with a set of historical reports RH using a complex
|
318 |
+
covariance function, able to capture a variety of data aspects such as the data
|
319 |
+
periodicity and the magnitude of the most recent values.
|
320 |
+
Then our system
|
321 |
+
receives in real-time queries q and estimates the total travel time required to
|
322 |
+
traverse the given query path Pq, estimating the travel times of all the individual
|
323 |
+
road segments of Pq.
|
324 |
+
4
|
325 |
+
THE HTTE Algorithm
|
326 |
+
We describe the HTTE travel time estimation algorithm. Initially, we describe
|
327 |
+
a technique for modeling the traffic data and for identifying road segments with
|
328 |
+
similar traffic behavior. Then we discuss the desirable properties of our data
|
329 |
+
and present a covariance function that captures these properties. Finally, we
|
330 |
+
describe a method for predicting in real-time the travel times of the query paths.
|
331 |
+
7
|
332 |
+
|
333 |
+
40
|
334 |
+
30
|
335 |
+
20
|
336 |
+
10
|
337 |
+
0
|
338 |
+
10
|
339 |
+
-20
|
340 |
+
30
|
341 |
+
20
|
342 |
+
30
|
343 |
+
0
|
344 |
+
10
|
345 |
+
10
|
346 |
+
20
|
347 |
+
-10
|
348 |
+
0
|
349 |
+
30
|
350 |
+
-30
|
351 |
+
-20A Latent Representation for Road Segments
|
352 |
+
Data sparsity is one of the major obstacles in estimating the travel time of a road
|
353 |
+
segment since traffic information is provided only by a few vehicles. Information
|
354 |
+
for the recent traffic state for the majority of road segments is often missing.
|
355 |
+
It is essential to ensure that the method will use the traffic information from
|
356 |
+
the segments for which we have recent reports in order to infer the state for a
|
357 |
+
segment with similar traffic behavior but without recent information.
|
358 |
+
Here we propose a technique that detects a latent embedding representation
|
359 |
+
for the segments. The main property of this mapping is that segments with sim-
|
360 |
+
ilar traffic behaviour should be placed close in this embedding space. This latent
|
361 |
+
representation is used by the proposed prediction model in order to address the
|
362 |
+
data sparsity issue. For the purpose of constructing the embedding representa-
|
363 |
+
tion for the segments we decided to employ a matrix factorization approach. A
|
364 |
+
similar technique is also used in Deng et al. (2016); Wang et al. (2014). Our
|
365 |
+
aim is to discover some latent features that describe the road segments traffic
|
366 |
+
characteristics. Each road segment ri and time window w is associated with
|
367 |
+
a D-dimensional embedding vector of latent features. Then, the actual travel
|
368 |
+
time report for the segment ri in the time window w can be approximated by
|
369 |
+
the product of these two latent vectors. In order to satisfy this condition, the
|
370 |
+
learned embeddings of segments with similar traffic behaviour should be close
|
371 |
+
in the latent space.
|
372 |
+
In order to apply the matrix factorization method we need to convert the
|
373 |
+
historical reports RH to a sparse matrix M ∈ RN×W , where the N rows corre-
|
374 |
+
spond to the segments ri of the road network G and the W columns correspond
|
375 |
+
to all the time windows of the historical data w. Each time window has a size of
|
376 |
+
30 minutes and each cell corresponds to the average travel time for a segment ri
|
377 |
+
in this window (i.e. from 10:00 till 10:30), considering all the vehicles that tra-
|
378 |
+
versed ri. After applying the matrix factorization the matrix M is decomposed
|
379 |
+
into two matrices P ∈ RN×D, Q ∈ RW ×D such that M ≈ P × QT = M ′. The
|
380 |
+
rows of P are the D-dimensional embeddings of the road segments and the rows
|
381 |
+
of Q are the D-dimensional embeddings of the time windows. For estimating
|
382 |
+
the matrices P and Q we minimize the Mean Squared Error (MSE) between
|
383 |
+
the original matrix M and the matrix reconstruction M ′ using the Stochastic
|
384 |
+
Gradient Descent (SGD). The SGD starts with the random matrices P and Q
|
385 |
+
and at each step alters them considering the direction of the gradient of the
|
386 |
+
objective function. The algorithm terminates when the objective function does
|
387 |
+
not significantly change.
|
388 |
+
Constructing the Covariance Function: Here, we first introduce the prop-
|
389 |
+
erties that characterise the road segments’ travel times. Then we describe the
|
390 |
+
complex covariance function that fits our data. Our aim is to predict the travel
|
391 |
+
time of several queried road segments considering multiple travel time reports
|
392 |
+
which are transmitted by the moving vehicles. Multiple evolving time-series are
|
393 |
+
generated, one for each road segment, and our aim is to make accurate forecasts
|
394 |
+
for their future traffic condition.
|
395 |
+
To accurately estimate travel time the following key properties of the time
|
396 |
+
8
|
397 |
+
|
398 |
+
series data should be considered: (i) Periodicity: the traffic condition of the road
|
399 |
+
segments is periodic in a daily basis, since commuters tend to follow similar trips.
|
400 |
+
(ii) Correlation among road segments: The information provided by multiple
|
401 |
+
road segments can be used in order to make predictions jointly, exploiting the
|
402 |
+
correlations among the road segments and allows us to ameliorate the effects of
|
403 |
+
data sparsity. (iii) Short term irregularities: even if the time series are periodic
|
404 |
+
the traffic condition can be affected by multiple factors (i.e. constructions in
|
405 |
+
the road network, an accident or a social event). This could generate traffic
|
406 |
+
congestion events that are impossible to detect without monitoring the real-
|
407 |
+
time traffic reports. (iv) Noisiness: the travel time reports are extremely noisy,
|
408 |
+
for instance a driver may be stopped by a traffic light spending 1 minute waiting
|
409 |
+
while another driver may not.
|
410 |
+
In this work we use Gaussian processes to tackle the travel time estima-
|
411 |
+
tion problem. We construct appropriately the covariance function providing an
|
412 |
+
excellent fit to the data and characterizing the correlations among the differ-
|
413 |
+
ent travel time reports in the process. Here we consider Gaussian processes
|
414 |
+
with a zero mean function. Our goal is to model the travel time (TT) of the
|
415 |
+
road segments as a function of the input vector x �� RD+1. x contains the D-
|
416 |
+
dimensional embedding representation of the road segment along with the time
|
417 |
+
that the vehicle left the road segment.
|
418 |
+
x =
|
419 |
+
�t, e�T
|
420 |
+
(1)
|
421 |
+
e =
|
422 |
+
�
|
423 |
+
e1, . . . , eD�
|
424 |
+
(2)
|
425 |
+
We model the daily variation of the road segments’ travel times using a
|
426 |
+
periodic covariance function on the timestamp of measurements t, modified by
|
427 |
+
taking the product with a squared exponential component on (i) the timestamp
|
428 |
+
measurement t reducing the impact of older reports and (ii) the embeddings in
|
429 |
+
order to reduce the impact of irrelevant road segments.
|
430 |
+
k1(x, x′) = θ2
|
431 |
+
1exp(−(t − t′)2
|
432 |
+
2θ2
|
433 |
+
2
|
434 |
+
− (e − e′)T (e − e′)
|
435 |
+
2θ2
|
436 |
+
3
|
437 |
+
− 2sin2(π(t − t′))
|
438 |
+
θ2
|
439 |
+
4
|
440 |
+
)
|
441 |
+
(3)
|
442 |
+
The next term of the covariance function, models the medium term irreg-
|
443 |
+
ularities and the correlations among similar road segments. This term uses a
|
444 |
+
rational quadratic component on the timestamp t and a squared exponential
|
445 |
+
component on the road segments’ embeddings e. Using this term the travel
|
446 |
+
time prediction of a road segment is affected by the recent reports of road seg-
|
447 |
+
ments with similar traffic behaviour (close in the embedding space), treating
|
448 |
+
the data sparsity problem.
|
449 |
+
k2(x, x′) = θ2
|
450 |
+
5(1 + (t − t′)2
|
451 |
+
2θ6θ7
|
452 |
+
)−θ6exp(−(e − e′)T (e − e′)
|
453 |
+
2θ2
|
454 |
+
8
|
455 |
+
)
|
456 |
+
(4)
|
457 |
+
Finally, a noise model is introduced considering the timestamp and the em-
|
458 |
+
beddings of the datapoints.
|
459 |
+
k3(x, x′) = θ2
|
460 |
+
9exp(−(e − e′)T (e − e′)
|
461 |
+
2θ2
|
462 |
+
10
|
463 |
+
− (t − t′)2
|
464 |
+
2θ2
|
465 |
+
11
|
466 |
+
)
|
467 |
+
(5)
|
468 |
+
9
|
469 |
+
|
470 |
+
The final covariance function is the sum of the previously described covari-
|
471 |
+
ance functions, k(x, x′) = k1(x, x′) + k2(x, x′) + k3(x, x′) , with hyperparam-
|
472 |
+
eters θ = [θ1 . . . θ11]. We empirically initialize these hyperparameters based on
|
473 |
+
our prior beliefs about the data. During the learning procedure θ is automati-
|
474 |
+
cally adjusted in order to appropriately fit the training data.
|
475 |
+
Hybrid Travel Time Estimation (HTTE): We now present in detail our
|
476 |
+
travel time estimation algorithm for the received query paths. Our algorithm,
|
477 |
+
presented in Algorithm 1, consists of an offline and a real-time stage. The offline
|
478 |
+
stage is responsible to initialize the required variables and is executed only once.
|
479 |
+
The real-time stage of the algorithm receives in a streaming manner query paths
|
480 |
+
and a departure time for each path and estimates instantly the corresponding
|
481 |
+
travel time considering the already received travel time reports RH.
|
482 |
+
Offline stage: Here we perform a set of tasks that initialize our system. Firstly,
|
483 |
+
we compute the average travel time for each road segment for different times of
|
484 |
+
the day, referred as TTavg. These average travel times will provide us later an
|
485 |
+
approximate estimation of the departure time for each road segment of the given
|
486 |
+
query path. In order to compute TTavg the day is partitioned in time windows
|
487 |
+
of 30 minutes. Additionally, we compute for each road segment the average
|
488 |
+
travel time and the standard deviation of travel time, referred as segsStats.
|
489 |
+
The segsStats variable does not consider the time of the day. These statistics
|
490 |
+
will be used later in order to standardize the travel time reports of the various
|
491 |
+
road segments. Then our algorithm computes an embedding representation E
|
492 |
+
for each road segment as it was described in Section 4. In the next step of the
|
493 |
+
algorithm, a Gaussian process model, with the covariance function described in
|
494 |
+
Section 4 and zero-mean is trained and its hyperparmeters θ are learned.
|
495 |
+
Having all the travel time reports that have been received until now and
|
496 |
+
the road segments statistics and embeddings, our next step is to initialize the
|
497 |
+
Gaussian process models, defined as gpModels. In order to avoid generating a
|
498 |
+
large Gaussian process model that would consider the travel time reports for all
|
499 |
+
the city and the whole day we perform spatial and temporal partitioning of RH.
|
500 |
+
This results in multiple gpModels and expedits the estimation of travel times
|
501 |
+
queries. Each model is affiliated with a particular spatial area and time of the
|
502 |
+
day. When a gpModel is generated, a covariance matrix K is constructed using
|
503 |
+
the covariance function of Section 4, and the hyperparameters θ. The covariance
|
504 |
+
matrix, for each gpModel, describes the correlation between the different travel
|
505 |
+
time reports that have been received till now for a particular time window and
|
506 |
+
area.
|
507 |
+
Since the road segments have different lengths and their travel times
|
508 |
+
deviate significantly, we decided to standardize the travel time reports for each
|
509 |
+
road segment using the corresponding statistics segsStats. Thus the targets y
|
510 |
+
for each gpModel are the standardized, with the statistics, travel times and not
|
511 |
+
the raw travel times.
|
512 |
+
The travel time reports are partitioned into different gpModels considering
|
513 |
+
the location of the road segments and their timestamp (Figure 3). More specifi-
|
514 |
+
cally the whole city is decomposed in smaller areas applying a grid of uniformly
|
515 |
+
sized cells. In order to feed the model we allow spatial overlaps with neighbor-
|
516 |
+
ing spatial grid cells in order to improve the accuracy for the road segments
|
517 |
+
10
|
518 |
+
|
519 |
+
Overlapping Area
|
520 |
+
Query area
|
521 |
+
...
|
522 |
+
00
|
523 |
+
01
|
524 |
+
02
|
525 |
+
10
|
526 |
+
12
|
527 |
+
13
|
528 |
+
14
|
529 |
+
21
|
530 |
+
22
|
531 |
+
23
|
532 |
+
...
|
533 |
+
11
|
534 |
+
Query time
|
535 |
+
window
|
536 |
+
Overlapping
|
537 |
+
time window
|
538 |
+
Figure 3: Spatial and temporal partitioning.
|
539 |
+
that are near the edges of each cell. Also, each day is partitioned into smaller
|
540 |
+
time windows. Here we allow temporal overlaps with the previous and the next
|
541 |
+
time windows, providing traffic information at the beginning of each query time
|
542 |
+
window.
|
543 |
+
The travel time reports that belong in overlapping areas and time
|
544 |
+
windows are inserted into multiple gpModels. Finally, each gpModel contains
|
545 |
+
the recent and historical reports of each query and overlapping time window
|
546 |
+
and area that is associated with.
|
547 |
+
Real-time stage:
|
548 |
+
Our system receives query paths in real-time from the
|
549 |
+
QueriesStream and performs instantly the travel time estimation for each given
|
550 |
+
query. Initially our algorithm updates the gpModels adding the newly received
|
551 |
+
travel time reports. The update of the gpModels is performed in predetermined
|
552 |
+
periods and not every time a travel time report or a query is received. Such
|
553 |
+
frequent updates would be time consuming. In order to do this we identify the
|
554 |
+
current time window of the day w, considering the current time. If the window w
|
555 |
+
has changed from the window of the previous query prevW then the gpModels
|
556 |
+
are updated. Each gpModel is updated extending its covariance matrix K with
|
557 |
+
the travel time reports that have been received from the previous update of the
|
558 |
+
gpModel for the investigated spatial area and time window.
|
559 |
+
The next step of the algorithm is to decompose the given query path in a
|
560 |
+
set of individual road segments (SubQueries) and estimate their travel times
|
561 |
+
querying the corresponding gpModels. In order to query the gpModels it is
|
562 |
+
required to estimate an approximate departure time ti for each road segment
|
563 |
+
rqi of the given query path. In order to approximate the departure times we
|
564 |
+
begin with the first road segment rq1 of the query path setting as departure
|
565 |
+
time t1 for this road segment the trip’s departure time tdep,q. Then in order to
|
566 |
+
estimate the departure time for the next road segment rqi we add to the previous
|
567 |
+
road segment departure time ti−1 the average travel time TTavg of the previous
|
568 |
+
road segment rqi−1, as it was computed in the offline stage of the algorithm.
|
569 |
+
This procedure iterates till the last road segment of the query path. Having an
|
570 |
+
approximate estimation for the departure time for each road segment will allow
|
571 |
+
to perform batch queries to the affected gpModels of the query path, speeding
|
572 |
+
up the execution time of the queries.
|
573 |
+
Finally, individual queries for the road segments’ travel times are posed
|
574 |
+
to the appropriate gpModel, considering the spatial and temporal partitioning.
|
575 |
+
The gpModels return standardized travel times, thus the segsStats are required
|
576 |
+
in order to get the actual travel time estimations. The total travel time of the
|
577 |
+
query path TT�q is updated considering the estimates of the gpModels for the
|
578 |
+
individual road segments.
|
579 |
+
Finally, TT�q is the estimated travel time for the
|
580 |
+
11
|
581 |
+
|
582 |
+
DRUMCONDRA
|
583 |
+
[R807]
|
584 |
+
R803
|
585 |
+
ad
|
586 |
+
R131]
|
587 |
+
FainviewPark
|
588 |
+
R834
|
589 |
+
CrokePark
|
590 |
+
R101
|
591 |
+
R803
|
592 |
+
OADSTONE
|
593 |
+
R131
|
594 |
+
EastPointBusinessPark
|
595 |
+
H
|
596 |
+
The Mater Misericordiae
|
597 |
+
University Hospital
|
598 |
+
R802]
|
599 |
+
NORTHSTRAND
|
600 |
+
[R803]
|
601 |
+
Mountjoy
|
602 |
+
R105]
|
603 |
+
Square Park
|
604 |
+
M50
|
605 |
+
Dublin City Gallery
|
606 |
+
JamesJoyceCentre
|
607 |
+
The Hugh Lane
|
608 |
+
EASTWALL
|
609 |
+
Rotunda Hospital C
|
610 |
+
R803
|
611 |
+
R101]
|
612 |
+
R131
|
613 |
+
R108
|
614 |
+
NT
|
615 |
+
St Mary'sProCathedral
|
616 |
+
CA.
|
617 |
+
国
|
618 |
+
Dublin
|
619 |
+
R101
|
620 |
+
NORTH WALL
|
621 |
+
R10S]
|
622 |
+
R801
|
623 |
+
EPICTheIrish
|
624 |
+
3Arena
|
625 |
+
rch
|
626 |
+
EmigrationMuseum
|
627 |
+
Ha'penny Bridge
|
628 |
+
R802
|
629 |
+
R814
|
630 |
+
RiverLiffey
|
631 |
+
R148
|
632 |
+
Trinity College
|
633 |
+
R131
|
634 |
+
TEMPLEBAR
|
635 |
+
Dublin
|
636 |
+
Bord Gais
|
637 |
+
Cathedral
|
638 |
+
EnergyTheatre
|
639 |
+
Dublin Castle
|
640 |
+
R131
|
641 |
+
R108]
|
642 |
+
R802
|
643 |
+
National Gallery
|
644 |
+
oscarwilde House
|
645 |
+
R802
|
646 |
+
Ringsend
|
647 |
+
of Ireland
|
648 |
+
R118
|
649 |
+
TheLittleMuseum
|
650 |
+
R138
|
651 |
+
R802
|
652 |
+
Cathedral
|
653 |
+
of Dublin
|
654 |
+
Merrion
|
655 |
+
R815]
|
656 |
+
国
|
657 |
+
Square
|
658 |
+
STELLA GARDENS
|
659 |
+
R131
|
660 |
+
StStephen's
|
661 |
+
TheFitzwilliam
|
662 |
+
Technological
|
663 |
+
UniversityDublin R110
|
664 |
+
Green
|
665 |
+
Casinoand Card Club
|
666 |
+
R815
|
667 |
+
R137
|
668 |
+
R111
|
669 |
+
Irishtown
|
670 |
+
R110
|
671 |
+
Dicey's Garden ClubO
|
672 |
+
BEGGAR'SBUSH
|
673 |
+
UNT
|
674 |
+
AvivaStadium
|
675 |
+
Hey
|
676 |
+
R114
|
677 |
+
Iveagh
|
678 |
+
TheNational
|
679 |
+
Gardens
|
680 |
+
ConcertHall
|
681 |
+
R118]
|
682 |
+
Royal Victoria Eye H
|
683 |
+
国
|
684 |
+
R816M50
|
685 |
+
R108]
|
686 |
+
R104]
|
687 |
+
R809]
|
688 |
+
R107
|
689 |
+
Finglas
|
690 |
+
R103]
|
691 |
+
RT
|
692 |
+
Coolock
|
693 |
+
NCHARDSTOWN
|
694 |
+
R135
|
695 |
+
Glasnevin
|
696 |
+
WHITEHALL
|
697 |
+
Artane
|
698 |
+
Kilba
|
699 |
+
RahenyR105
|
700 |
+
M50
|
701 |
+
R147
|
702 |
+
R102
|
703 |
+
[R103]
|
704 |
+
R808)
|
705 |
+
National
|
706 |
+
R102
|
707 |
+
M50
|
708 |
+
R807
|
709 |
+
Castleknock
|
710 |
+
Botanic
|
711 |
+
R108
|
712 |
+
R107
|
713 |
+
Gardens
|
714 |
+
NT
|
715 |
+
R808
|
716 |
+
Saint
|
717 |
+
R806
|
718 |
+
Marino
|
719 |
+
R105]
|
720 |
+
AnnesPark
|
721 |
+
ASHTOWN
|
722 |
+
Cabra
|
723 |
+
Clontarf
|
724 |
+
Fairview
|
725 |
+
Dollymount
|
726 |
+
R806]
|
727 |
+
DRUMCONDRA
|
728 |
+
R147
|
729 |
+
[R80S]
|
730 |
+
BROADSTONE
|
731 |
+
EastPointBusinessPark
|
732 |
+
DublinZoo
|
733 |
+
R101]
|
734 |
+
nerstown
|
735 |
+
R105
|
736 |
+
PhoenixPark
|
737 |
+
M50
|
738 |
+
QDublin Port
|
739 |
+
JamesonDistillery Bow St
|
740 |
+
Dublin
|
741 |
+
3Arena
|
742 |
+
R109
|
743 |
+
R112
|
744 |
+
R109
|
745 |
+
R801
|
746 |
+
R111R148
|
747 |
+
[R802]
|
748 |
+
R131
|
749 |
+
Ballyfermot
|
750 |
+
R833
|
751 |
+
DublinEhbourg
|
752 |
+
GuinnessStorehouse
|
753 |
+
AD
|
754 |
+
StStephen's
|
755 |
+
Rinasend
|
756 |
+
R810
|
757 |
+
StPatrick'sCathedral
|
758 |
+
Green
|
759 |
+
INCHICORE
|
760 |
+
R812
|
761 |
+
R111
|
762 |
+
DolphinsBarn
|
763 |
+
West
|
764 |
+
Bluebell
|
765 |
+
DRIMNAGH
|
766 |
+
R111
|
767 |
+
x&Geese
|
768 |
+
Ballsbridge
|
769 |
+
R131
|
770 |
+
Ranelagh
|
771 |
+
R112
|
772 |
+
R114
|
773 |
+
Rathmines
|
774 |
+
R815
|
775 |
+
R110
|
776 |
+
R117
|
777 |
+
.
|
778 |
+
Ballymount
|
779 |
+
R817
|
780 |
+
Rathgar
|
781 |
+
Donnybrook
|
782 |
+
IndustrialEstate
|
783 |
+
Greenhills
|
784 |
+
R820
|
785 |
+
TERENURE
|
786 |
+
UCDInstitute
|
787 |
+
forDiscovery
|
788 |
+
Booterstown
|
789 |
+
M5D
|
790 |
+
R112]
|
791 |
+
R118
|
792 |
+
[R838]
|
793 |
+
TymonPark
|
794 |
+
R138
|
795 |
+
R817]
|
796 |
+
R112
|
797 |
+
Blackrock
|
798 |
+
[R137]
|
799 |
+
Kilnamanagh
|
800 |
+
R117
|
801 |
+
R825
|
802 |
+
N31
|
803 |
+
R114
|
804 |
+
R112
|
805 |
+
DUNDRUM
|
806 |
+
R825
|
807 |
+
Monks
|
808 |
+
R821]
|
809 |
+
Goatstown
|
810 |
+
R817
|
811 |
+
N11
|
812 |
+
Tallaght
|
813 |
+
R115
|
814 |
+
M50
|
815 |
+
Ballyboden
|
816 |
+
R826
|
817 |
+
R826
|
818 |
+
R113]
|
819 |
+
R827
|
820 |
+
Firhouse
|
821 |
+
Knocklyon
|
822 |
+
R822
|
823 |
+
RE
|
824 |
+
R113]Algorithm 1: Travel Time Estimation Algorithm
|
825 |
+
Data: RH, QueriesStream = [q1, . . . , q∞]
|
826 |
+
Result: TT�1, . . . , TT�∞)
|
827 |
+
1 Offline Stage;
|
828 |
+
2 TTavg ← computeAvgTravelTime(RH);
|
829 |
+
3 segsStats ← computeRoadSegmentsStats(RH);
|
830 |
+
4 E ← computeEmbeddings(RH, segsStats);
|
831 |
+
5 θ ← computeHyperparametersGP(RH, E, segsStats);
|
832 |
+
6 gpModels ← initializeMultipleGPs(RH, E, segsStats, θ);
|
833 |
+
7 prevW ← None;
|
834 |
+
8 Online Stage;
|
835 |
+
9 foreach q =< Pq, tdep,q > in QueriesStream do
|
836 |
+
10
|
837 |
+
TT�q ← 0;
|
838 |
+
11
|
839 |
+
w ← getTimeWindow();
|
840 |
+
12
|
841 |
+
if w ̸= prevW then
|
842 |
+
13
|
843 |
+
gpModels.update(RH, segsStats, θ);
|
844 |
+
14
|
845 |
+
prevW ← w;
|
846 |
+
15
|
847 |
+
SubQueries ← decompose path(Pq, tdep,q, TTavg);
|
848 |
+
16
|
849 |
+
foreach < ri, ti >∈ SubQueries do
|
850 |
+
17
|
851 |
+
gpModel ← findGP(ri, ti);
|
852 |
+
18
|
853 |
+
TT�q ← TT�q + gpModel.query(ri, ti, segsStats)
|
854 |
+
query q.
|
855 |
+
5
|
856 |
+
Conclusion
|
857 |
+
We develop a novel hybrid technique for travel time estimation, that considers
|
858 |
+
recent and historical traffic reports. An embedding representation for each road
|
859 |
+
segment is learned based on its traffic behaviour. This representation is incor-
|
860 |
+
porated by a regression technique, handling the data sparsity problem. This
|
861 |
+
allows our technique to make accurate estimations even if there are no recent
|
862 |
+
traffic reports available for a segment. Finally, our technique adapts different
|
863 |
+
levels and types of abstraction that allow the real-time travel time estimation.
|
864 |
+
References
|
865 |
+
Chen, C., Su, H., Huang, Q., Zhang, L., and Guibas, L. (2013). Pathlet learning
|
866 |
+
for compressing and planning trajectories. In ACM SIGSPATIAL 2013, pages
|
867 |
+
392–395.
|
868 |
+
Dai, J., Yang, B., Guo, C., Jensen, C. S., and Hu, J. (2016). Path cost distri-
|
869 |
+
bution estimation using trajectory data. PVLDB 2016, 10(3):85–96.
|
870 |
+
12
|
871 |
+
|
872 |
+
Deng, D., Shahabi, C., Demiryurek, U., Zhu, L., Yu, R., and Liu, Y. (2016).
|
873 |
+
Latent space model for road networks to predict time-varying traffic. In ACM
|
874 |
+
SIGKDD 2016, pages 1525–1534.
|
875 |
+
Gal, A., Gunopulos, D., Panagiotou, N., Rivetti, N., Senderovich, A., and Zy-
|
876 |
+
gouras, N. (2018). Remi: A framework of reusable elements for mining het-
|
877 |
+
erogeneous data with missing information. Journal of Intelligent Information
|
878 |
+
Systems 2018, (2):367–388.
|
879 |
+
Gal, A., Mandelbaum, A., Schnitzler, F., Senderovich, A., and Weidlich, M.
|
880 |
+
(2017). Traveling time prediction in scheduled transportation with journey
|
881 |
+
segments. Inf. Syst. 2017, 64(C):266–280.
|
882 |
+
Hofleitner, A., Herring, R., Abbeel, P., and Bayen, A. (2012). Learning the
|
883 |
+
dynamics of arterial traffic from probe data using a dynamic bayesian network.
|
884 |
+
IEEE T-ITS 2012, 13(4):1679–1693.
|
885 |
+
Hu, J., Guo, C., Yang, B., and Jensen, C. S. (2019). Stochastic weight comple-
|
886 |
+
tion for road networks using graph convolutional networks. In IEEE ICDE
|
887 |
+
2019, pages 1274–1285.
|
888 |
+
Id´e, T. and Sugiyama, M. (2011). Trajectory regression on road networks. In
|
889 |
+
AAAI 2011, pages 203–208.
|
890 |
+
Jenelius, E. and Koutsopoulos, H. N. (2013). Travel time estimation for ur-
|
891 |
+
ban road networks using low frequency probe vehicle data. Transportation
|
892 |
+
Research Part B: Methodological, 53:64–81.
|
893 |
+
Kwon, J., Varaiya, P., and Skabardonis, A. (2003). Estimation of truck traffic
|
894 |
+
volume from single loop detectors with lane-to-lane speed correlation. Journal
|
895 |
+
of the TRB 2003, (1856):106–117.
|
896 |
+
Li, L., Li, Y., and Li, Z. (2013). Efficient missing data imputing for traffic flow
|
897 |
+
by considering temporal and spatial dependence. Transportation research part
|
898 |
+
C: emerging technologies 2013, 34:108–120.
|
899 |
+
Li, Y., Fu, K., Wang, Z., Shahabi, C., Ye, J., and Liu, Y. (2018a). Multi-task
|
900 |
+
representation learning for travel time estimation. In ACM SIGKDD 2018,
|
901 |
+
pages 1695–1704.
|
902 |
+
Li, Y., Gunopulos, D., Lu, C., and Guibas, L. (2017). Urban travel time predic-
|
903 |
+
tion using a small number of gps floating cars. In ACM SIGSPATIAL 2017,
|
904 |
+
pages 3:1–3:10.
|
905 |
+
Li, Y., Yu, R., Shahabi, C., and Liu, Y. (2018b). Diffusion convolutional recur-
|
906 |
+
rent neural network: Data-driven traffic forecasting. In ICLR 2018.
|
907 |
+
Niu, X., Zhu, Y., and Zhang, X. (2014). Deepsense: A novel learning mechanism
|
908 |
+
for traffic prediction with taxi gps traces. In IEEE GLOBECOM 2014, pages
|
909 |
+
2745–2750. IEEE.
|
910 |
+
13
|
911 |
+
|
912 |
+
Qu, L., Zhang, Y., Hu, J., Jia, L., and Li, L. (2008). A bpca based missing
|
913 |
+
value imputing method for traffic flow volume data. In IEEE IV Symposium
|
914 |
+
2008, pages 985–990.
|
915 |
+
Wang, D., Zhang, J., Cao, W., Li, J., and Zheng, Y. (2018a). When will you
|
916 |
+
arrive? estimating travel time based on deep neural networks. In AAAI 2018,
|
917 |
+
pages 2500–2507.
|
918 |
+
Wang, H., Kuo, Y.-H., Kifer, D., and Li, Z. (2016a). A simple baseline for
|
919 |
+
travel time estimation using large-scale trip data.
|
920 |
+
In ACM SIGSPATIAL
|
921 |
+
2016, pages 19:1–19:22.
|
922 |
+
Wang, J., Gu, Q., Wu, J., Liu, G., and Xiong, Z. (2016b). Traffic speed pre-
|
923 |
+
diction and congestion source exploration: A deep learning method. In IEEE
|
924 |
+
ICDM 2016, pages 499–508. IEEE.
|
925 |
+
Wang, Y., Zheng, Y., and Xue, Y. (2014). Travel time estimation of a path
|
926 |
+
using sparse trajectories. In ACM SIGKDD 2014, pages 25–34.
|
927 |
+
Wang, Z., Fu, K., and Ye, J. (2018b). Learning to estimate the travel time. In
|
928 |
+
ACM SIGKDD 2018, pages 858–866.
|
929 |
+
Williams, C. K. and Rasmussen, C. E. (2006). Gaussian processes for machine
|
930 |
+
learning. the MIT Press, 2(3):4.
|
931 |
+
Yang, B., Dai, J., Guo, C., Jensen, C. S., and Hu, J. (2018). PACE: a path-
|
932 |
+
centric paradigm for stochastic path finding. VLDB J., 27(2):153–178.
|
933 |
+
Yang, B., Guo, C., and Jensen, C. S. (2013). Travel cost inference from sparse,
|
934 |
+
spatio-temporally correlated time series using markov models.
|
935 |
+
PVLDB,
|
936 |
+
6(9):769–780.
|
937 |
+
Yang, B., Kaul, M., and Jensen, C. S. (2014). Using incomplete information for
|
938 |
+
complete weight annotation of road networks. IEEE TKDE 2014, 26(5):1267–
|
939 |
+
1279.
|
940 |
+
Yu, B., Lam, W. H., and Tam, M. L. (2011). Bus arrival time prediction at
|
941 |
+
bus stop with multiple routes. Transportation Research Part C: Emerging
|
942 |
+
Technologies, 19(6):1157–1170.
|
943 |
+
Zhan, X., Hasan, S., Ukkusuri, S. V., and Kamga, C. (2013). Urban link travel
|
944 |
+
time estimation using large-scale taxi data with partial information. Trans-
|
945 |
+
portation Research Part C: Emerging Technologies, 33:37–49.
|
946 |
+
Zhan, X., Li, R., and Ukkusuri, S. V. (2015). Lane-based real-time queue length
|
947 |
+
estimation using license plate recognition data. Transportation Research Part
|
948 |
+
C: Emerging Technologies, 57:85–102.
|
949 |
+
Zhan, X., Ukkusuri, S. V., and Yang, C. (2016a). A bayesian mixture model
|
950 |
+
for short-term average link travel time estimation using large-scale limited
|
951 |
+
information trip-based data. Automation in Construction, 72:237–246.
|
952 |
+
14
|
953 |
+
|
954 |
+
Zhan, X., Zheng, Y., Yi, X., and Ukkusuri, S. V. (2016b).
|
955 |
+
Citywide traffic
|
956 |
+
volume estimation using trajectory data. IEEE Transactions on Knowledge
|
957 |
+
and Data Engineering, 29(2):272–285.
|
958 |
+
Zhang, F., Zhu, X., Hu, T., Guo, W., Chen, C., and Liu, L. (2016). Urban
|
959 |
+
link travel time prediction based on a gradient boosting method considering
|
960 |
+
spatiotemporal correlations. ISPRS 2016, 5(11):201.
|
961 |
+
Zhang, H., Wu, H., Sun, W., and Zheng, B. (2018).
|
962 |
+
Deeptravel: a neural
|
963 |
+
network based travel time estimation model with auxiliary supervision. In
|
964 |
+
IJCAI 2018, pages 3655–3661.
|
965 |
+
Zheng, J. and Ni, L. M. (2013). Time-dependent trajectory regression on road
|
966 |
+
networks via multi-task learning. In AAAI 2013, pages 1048–1055.
|
967 |
+
15
|
968 |
+
|
6dE4T4oBgHgl3EQf1w1z/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
6tAyT4oBgHgl3EQfpvgE/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:1b982a9810fca63eef74f001102423c6fc83823b9779385ccbd6a5b77d0c1117
|
3 |
+
size 9633837
|
79E1T4oBgHgl3EQf7gUu/content/tmp_files/2301.03534v1.pdf.txt
ADDED
@@ -0,0 +1,1467 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
2 |
+
ANTHONY BONATO, TRENT G. MARBACH, MICHAEL MOLNAR, AND JD NIR
|
3 |
+
Abstract. We introduce a variant of the Localization game in which the cops only
|
4 |
+
have visibility one, along with the corresponding optimization parameter, the one-
|
5 |
+
visibility localization number ζ1.
|
6 |
+
By developing lower bounds using isoperimetric
|
7 |
+
inequalities, we give upper and lower bounds for ζ1 on k-ary trees with k ≥ 2 that
|
8 |
+
differ by a multiplicative constant, showing that the parameter is unbounded on k-
|
9 |
+
ary trees. We provide a O(√n) bound for Kh-minor free graphs of order n, and we
|
10 |
+
show Cartesian grids meet this bound by determining their one-visibility localization
|
11 |
+
number up to four values. We present upper bounds on ζ1 using pathwidth and the
|
12 |
+
domination number and give upper bounds on trees via their depth and order. We
|
13 |
+
conclude with open problems.
|
14 |
+
1. Introduction
|
15 |
+
Pursuit-evasion games, such as the Localization game and the Cops and Robber
|
16 |
+
game, are combinatorial models for detecting or neutralizing an adversary’s activity on
|
17 |
+
a graph. In such models, pursuers attempt to capture an evader loose on the vertices
|
18 |
+
of a graph. How the players move and the rules of capture depend on which variant is
|
19 |
+
studied. Such games are motivated by foundational topics in computer science, discrete
|
20 |
+
mathematics, and artificial intelligence, such as robotics and network security.
|
21 |
+
For
|
22 |
+
surveys of pursuit-evasion games, see the books [7, 11]; see Chapter 5 of [11] for more
|
23 |
+
on the Localization game.
|
24 |
+
Among the many variants of the game of Cops and Robbers, one theme is to limit the
|
25 |
+
visibility of the robber. For a nonnegative integer k, in k-visibility Cops and Robbers,
|
26 |
+
the robber is visible to the cops only when a cop is distance at most k. The case when
|
27 |
+
k = 0 has been studied [17, 18, 23], as has the case when k = 1 [26, 27, 28], and a recent
|
28 |
+
paper covers the cases k ≥ 1 [16].
|
29 |
+
The Localization game was first introduced for one cop by Seager [15, 21]. The game
|
30 |
+
in the present form was first considered in the paper [15], and subsequently studied in
|
31 |
+
several papers such as [2, 8, 9, 10, 12, 13, 14]. We consider a novel analogue of one-
|
32 |
+
visibility Cops and Robbers in the setting of the Localization game. In the one-visibility
|
33 |
+
Localization game, there are two players playing on a graph, with one player controlling
|
34 |
+
a set of k cops, where k is a positive integer, and the second controlling a single robber.
|
35 |
+
The game is played over a sequence of discrete time-steps; a round of the game is a
|
36 |
+
move by the cops and the subsequent move by the robber. The robber occupies a vertex
|
37 |
+
of the graph, and when the robber is ready to move during a round, they may move to a
|
38 |
+
neighboring vertex or remain on their current vertex. A move for the cops is a placement
|
39 |
+
2020 Mathematics Subject Classification. 05C57,05C12.
|
40 |
+
Key words and phrases. localization number, limited visibility, pursuit-evasion games, isoperimetric
|
41 |
+
inequalities, graphs.
|
42 |
+
1
|
43 |
+
arXiv:2301.03534v1 [math.CO] 9 Jan 2023
|
44 |
+
|
45 |
+
2
|
46 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
47 |
+
of cops on a set of vertices (note that the cops are not limited to moving to neighboring
|
48 |
+
vertices). The players move on alternate time-steps, with the robber going first. In each
|
49 |
+
round, the cops C1,C2,...,Ck occupy a set of vertices u1,u2,...,uk and each cop sends
|
50 |
+
out a cop probe di, where 1 ≤ i ≤ k. If a cop Ci is on the vertex of the robber, then di = 0.
|
51 |
+
If the cop Ci is adjacent to the robber, then di = 1. In all other cases, the cop probe
|
52 |
+
returns no information, and we set di = ∗. Hence, in each round, the cops determine a
|
53 |
+
distance vector D = (d1,d2,...,dk) of cop probes. Relative to the cops’ position, there
|
54 |
+
may be more than one vertex x with the same distance vector. We refer to such a vertex
|
55 |
+
x as a candidate of D or simply a candidate. The cops win if they have a strategy to
|
56 |
+
determine, after a finite number of rounds, a unique candidate, at which time we say
|
57 |
+
that the cops capture the robber. We assume the robber is omniscient, in the sense
|
58 |
+
that they know the entire strategy for the cops. If the robber evades capture, then the
|
59 |
+
robber wins. For a graph G, define the one-visibility localization number of G, written
|
60 |
+
ζ1(G), to be the least positive integer k for which k cops have a winning strategy in
|
61 |
+
the one-visibility Localization game. The standard Localization game is played in the
|
62 |
+
same way, except that each cops’ probe returns di as the distance between this cop and
|
63 |
+
the robber. The localization number is the minimum number of cops required for this
|
64 |
+
game and is denoted ζ(G).
|
65 |
+
For a graph G of order n, ζ(G) ≤ ζ1(G), as a winning cop strategy in one-visibility
|
66 |
+
localization will also be winning in the Localization game. Further, ζ1(G) ≤ n − 1. If
|
67 |
+
G has diameter at most 2, then a probe of ∗ by a one-visibility cop can only represent
|
68 |
+
a distance of 2, and so ζ(G) = ζ1(G). We may define ζj for all integers j ≥ 0 in an
|
69 |
+
analogous fashion, although we will only consider the case j = 1 in this paper. A recent
|
70 |
+
work [3] introduced the so-called zero-visibility search game, which is equivalent to ζj
|
71 |
+
in the case when j = 0.
|
72 |
+
We illustrate briefly how the parameters ζ(G) and ζ1(G) may differ. Spiders are
|
73 |
+
trees with exactly one vertex of degree at least 3. This vertex is referred to as the head,
|
74 |
+
and the paths from the head to the leaves, not including the head, are referred to as
|
75 |
+
arms. Let G be the spider consisting of head vertex r and three arms of length three.
|
76 |
+
It is straightforward to see that ζ(G) = 1; however, ζ1(G) = 2. To see that ζ1(G) > 1,
|
77 |
+
suppose one cop plays. The robber chooses one of the neighbors of r on an arm the cop
|
78 |
+
will not probe first and passes until the cop is about to probe on that arm. When the
|
79 |
+
cop moves to the robber’s arm, the robber moves to r. Anticipating the next cop probe,
|
80 |
+
they move to a neighbor of r on an arm that will not be probed in the next round and
|
81 |
+
the process repeats. To see that ζ1(G) ≤ 2, have one cop probe r in every round, and
|
82 |
+
the other cop scans each of the arms until the robber is captured.
|
83 |
+
The paper is organized as follows. We begin in Section 2 by considering a relaxation
|
84 |
+
of the one-visibility Localization game to the one-proximity game, where the robber
|
85 |
+
is captured if they occupy a neighbor of the cop. We consider bounds on ζ1 in terms
|
86 |
+
of the corresponding one-proximity number prox1(G). In Section 3, we give several
|
87 |
+
techniques for bounding ζ1(G) and prox1(G) for general graphs G. Upper bounds are
|
88 |
+
given using pathwidth and the domination number, and are found for certain minor-free
|
89 |
+
graphs. Lower bounds are derived by using isoperimetric inequalities and a new graph
|
90 |
+
parameter we call the h-index. In Section 4, we show that ζ1 and prox1 differ on trees
|
91 |
+
by at most 1. We derive upper bounds on trees via their depth and order and give lower
|
92 |
+
bounds on k-ary trees with k ≥ 2 using their isoperimetric peaks. One consequence of
|
93 |
+
|
94 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
95 |
+
3
|
96 |
+
these results is that the one-visibility number is unbounded on the family of k-ary trees;
|
97 |
+
this contrasts significantly from the Localization game, where trees have localization
|
98 |
+
number at most 2. We consider Cartesian grid graphs in Section 5 and derive bounds
|
99 |
+
there that differ by four values. We conclude with further directions and open problems.
|
100 |
+
All graphs we consider are finite, undirected, reflexive, and do not contain multiple
|
101 |
+
edges. We only consider connected graphs, unless otherwise stated. The set of vertices
|
102 |
+
that share an edge with x is denoted N(x), and we refer to vertices in N(x) as neighbors
|
103 |
+
of x. Although our graphs are reflexive, we insist that x ∉ N(x). We define N[x] =
|
104 |
+
N(x)∪{x}. For a set S of vertices, N[S] = ⋃u∈S N[u]. For a graph G, let ∆(G) b e the
|
105 |
+
maximum degree of a vertex in G. For further background on graph theory, see [25].
|
106 |
+
2. The one-proximity game
|
107 |
+
Before we present results on the one-visibility Localization game, we give a simpler
|
108 |
+
version that will prove useful for bounding ζ1(G). In the one-proximity game, play is
|
109 |
+
defined as in the one-visibility Localization game, except that the cops win immediately
|
110 |
+
if any probe returns a distance other than ∗. We call the corresponding graph parameter
|
111 |
+
the one-proximity number, written as prox1(G). This game corresponds to the probes
|
112 |
+
returning perfect information about the neighborhood of a vertex, rather than merely
|
113 |
+
whether or not the robber is adjacent to the probed vertex. Note that prox1 is the
|
114 |
+
analogue of the one-visibility seeing cop-number c′
|
115 |
+
1, where the robber is captured if they
|
116 |
+
are in the neighborhood of a cop; see [16].
|
117 |
+
Observe that prox1(G) ≤ ζ1(G), as the one-proximity game cops can use the same
|
118 |
+
strategy as the Localization game cops until the final round when, having located the
|
119 |
+
robber, the one-proximity game cop probes the robber’s last known location and must
|
120 |
+
be within distance one from the robber. As noted for k-visibility Cops and Robber in
|
121 |
+
[16], seeing the robber for the first time could be much more resource intensive than the
|
122 |
+
subsequent capture. The extra expense cannot be too large, however.
|
123 |
+
Theorem 1. For every graph G, we have
|
124 |
+
ζ1(G) ≤ ∆(G)prox1(G).
|
125 |
+
Proof. Suppose that when prox1(G) cops play the one-proximity game, and that if these
|
126 |
+
cops move on the vertices Vt in round t, then the cops win. We play with ∆(G)prox1(G)
|
127 |
+
cops in the one-visibility Localization game. In round t, for each u ∈ Vt, a cop is placed
|
128 |
+
on u and on ∆(G)−1 of the at most ∆(G) vertices in N(u), chosen arbitrarily. We know
|
129 |
+
that in some round t′, there is a v ∈ Vt′ such that the robber is in N[v]. (This was the
|
130 |
+
requirement for the cops to win independent of the robber strategy in the one-proximity
|
131 |
+
game.) Before round t′, every cop in the one-proximity game received a distance of ∗,
|
132 |
+
so the cops in the one-visibility Localization game are playing with no less information.
|
133 |
+
In round t′, we have either a cop on the same vertex as the robber, or the robber is on
|
134 |
+
the unique vertex in N(v) that does not contain a cop. In the latter case, the robber’s
|
135 |
+
exact location is now known, so they are captured.
|
136 |
+
□
|
137 |
+
Theorem 1 is tight on the complete graphs. We can say more if prox1(G) is large
|
138 |
+
compared to the maximum degree of G. We do not claim the bound on prox1 in the
|
139 |
+
hypothesis of the following theorem is optimal.
|
140 |
+
|
141 |
+
4
|
142 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
143 |
+
Theorem 2. If G is a graph and prox1(G) ≥ ∆(G)2, then ζ1(G) = prox1(G).
|
144 |
+
Proof. The prox1(G)-many cops play the one-visibility Localization game, following a
|
145 |
+
winning strategy from the one-proximity game. At some point, since the strategy is
|
146 |
+
winning, at least one probe returns a distance of 1 on vertex v. On the robber’s move,
|
147 |
+
the robber moves to a vertex of distance 0, 1, or 2 from v.
|
148 |
+
During the cops’ next move, a cop is placed on each vertex of distance 1 or 2 from
|
149 |
+
v, which requires at most ∆(G)2 cops. Either a cop on some vertex u probes 0 and the
|
150 |
+
robber is found on u, or no cop probes 0 and the robber is found on v.
|
151 |
+
□
|
152 |
+
One benefit of considering the one-proximity game instead of the one-visibility Local-
|
153 |
+
ization game is the success or failure of the cops strategy is independent of the robber’s
|
154 |
+
strategy. Let G be a graph, and for t ≥ 1, let Vt denote the set of vertices probed by the
|
155 |
+
cops in round t. Define St = St(G,{V1,...,Vt}) to be the set of vertices on which the
|
156 |
+
robber may reside immediately after the cops’ tth move without having been captured.
|
157 |
+
Consider the following three properties:
|
158 |
+
(1) the robber can start on any vertex;
|
159 |
+
(2) if the robber was on some vertex v before the robber’s (t+1)th move, then they
|
160 |
+
can move to any vertex in N[v] on their (t + 1)th move; and
|
161 |
+
(3) the robber is captured on the cops’ (t + 1)th move if they are in a vertex of
|
162 |
+
⋃v∈Vt+1 N[v].
|
163 |
+
The following theorem translates these properties to statements about St. For a set
|
164 |
+
of vertices S, let δ(S) be the set of vertices not in S that are adjacent to some vertex
|
165 |
+
in S. To avoid conflicting notation, we do not use δ to denote the minimum degree of
|
166 |
+
a graph.
|
167 |
+
Lemma 3. When playing the one-proximity game on a graph G where the cops play
|
168 |
+
on Vt in round t, the robber can be on a vertex u if and only if u ∈ St, where
|
169 |
+
(1) S1 = V (G); and
|
170 |
+
(2) St+1 = (St ∪ δ(St)) ∖ (⋃v∈Vt+1 N[v]).
|
171 |
+
Proof. The robber may start on any vertex, so S1 = V (G). Immediately before the
|
172 |
+
robber’s (t + 1)th move, the robber may be on a vertex v if and only if v ∈ St. The
|
173 |
+
robber uses their (t + 1)th move to occupy some vertex in N[v]. Thus, the robber can
|
174 |
+
be on vertex v if and only if v ∈ (St ∪ δ(St)) after the robber’s (t + 1)th move.
|
175 |
+
The robber will be captured on the cops’ (t+1)th move if and only if it is in a vertex
|
176 |
+
of ⋃v∈Vt+1 N[v].
|
177 |
+
Therefore, the robber remains uncaptured after the cop’s (t + 1)th
|
178 |
+
move if and only if it is on a vertex in (St ∪ δ(St)) ∖ (⋃v∈Vt+1 N[v]). This completes the
|
179 |
+
proof.
|
180 |
+
□
|
181 |
+
There are a variety of different terminologies for the sets St. These can be called the
|
182 |
+
robber territory, or the set of contaminated vertices. We use the term contaminated,
|
183 |
+
denoting these vertices as red in the figures. The vertices not in St are usually called
|
184 |
+
either clean or cleared. We use the term cleared and denote these vertices as white in
|
185 |
+
any figures. A set of vertices is contaminated (respectively, cleared) if all of its contained
|
186 |
+
vertices are contaminated (respectively, cleared). We say a cleared set S is fully cleared
|
187 |
+
when the robber can never return to recontaminate the vertices of S under the given
|
188 |
+
cop strategy.
|
189 |
+
|
190 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
191 |
+
5
|
192 |
+
Lemma 3 is the one-visibility Localization game equivalent of Proposition 10 of [3],
|
193 |
+
which is a result about the zero-visibility Localization game. As a result, we can treat
|
194 |
+
play in the one-proximity game as a single-player game where the cops clear vertices on
|
195 |
+
their move and the contamination spreads between the cops’ moves. This will often be
|
196 |
+
easier to analyze because the robber strategy is no longer necessary.
|
197 |
+
3. Bounds on ζ1
|
198 |
+
In the present section, we focus on several bounds for ζ1, including upper bounds
|
199 |
+
using pathwidth, the domination number, and one using properties of certain minor-
|
200 |
+
free graphs. We finish by giving lower bounds using isoperimetric inequalities.
|
201 |
+
3.1. Upper bounds. We begin with an upper bound using pathwidth. In [12], the lo-
|
202 |
+
calization number of a graph is bounded above by the graph’s pathwidth. An analogous
|
203 |
+
result holds for the one-localization number.
|
204 |
+
Given a graph G, a path-decomposition of G is a pair (X,P), where the set X =
|
205 |
+
{B1,B2,...,Bn} consists of subsets of V (G) called bags, and P is a path whose vertices
|
206 |
+
are the bags Bi, satisfying the following properties:
|
207 |
+
(1) V (G) = ⋃n
|
208 |
+
i=1 Bi;
|
209 |
+
(2) for every edge (u,v) ∈ E(G), there exists a bag that contains both u and v; and
|
210 |
+
(3) for all 1 ≤ i ≤ k ≤ j ≤ n, Bi ∩ Bj ⊆ Bk.
|
211 |
+
The width of the path-decomposition is the cardinality of its largest bag minus 1, and
|
212 |
+
the pathwidth of the graph G, denoted pw(G), is the minimum width among all possible
|
213 |
+
path-decompositions of G. While the proof of the following theorem is analogous to the
|
214 |
+
proof bounding the localization number by pathwidth given in [12], we include it for
|
215 |
+
completeness.
|
216 |
+
Theorem 4. For any graph G, ζ1(G) ≤ pw(G).
|
217 |
+
Proof. Assume G has at least two vertices and let P be a path-decomposition of G.
|
218 |
+
Without loss of generality, linearly order the bags B1,B2,...,Bk from left to right. For
|
219 |
+
all 1 ≤ i ≤ k we assume Bi ∖Bi+1 is nonempty; otherwise, Bi can be eliminated from the
|
220 |
+
path-decomposition. Furthermore, for every u ∈ Bi ∖ Bi+1, we assume u has a neighbor
|
221 |
+
in Bi. If this were not the case, then we remove u from bag Bi without changing the
|
222 |
+
path-decomposition.
|
223 |
+
For each 1 ≤ i < k, let ui be a fixed vertex in Bi ∖Bi+1 and let vi be a neighbor of ui in
|
224 |
+
Bi. Also let uk be a vertex in Bk ∖Bk−1 and vk be a neighbor of uk in Bk. Sequentially,
|
225 |
+
for i = 1,2,...,k, the cops probe each vertex of Bi ∖ vi.
|
226 |
+
Starting with B1, which is a leaf of P, cops probe B1 ∖ v1. Suppose the robber is in
|
227 |
+
B1. If they are in B1 ∖v1, then they are captured since a cop will probe 0. If the robber
|
228 |
+
is on v1, the cop at u1 probes 1. Since u1 must have a neighbor in B1 and no cop has
|
229 |
+
probed 0, the robber is captured at v1. In this way, we can ensure the robber is not in
|
230 |
+
B1. We then proceed inductively, probing the vertices in Bj ∖ vj, for j > 1, to ensure
|
231 |
+
the robber is not in Bi, with i ≤ j. The robber is forced to move into Bk where they
|
232 |
+
will be captured.
|
233 |
+
□
|
234 |
+
The bound in Theorem 4 is tight for complete graphs Kn, as pw(Kn) = ζ1(Kn) = n−1.
|
235 |
+
We note that proof of Theorem 4 also holds for the zero-visibility Localization game,
|
236 |
+
|
237 |
+
6
|
238 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
239 |
+
except that we must place a cop on all vertices of a bag as we sequentially probe the
|
240 |
+
bags. Therefore, we also have the following.
|
241 |
+
Lemma 5. For any graph G, ζ0(G) ≤ pw(G) + 1.
|
242 |
+
For graphs which are C4-free (that is, do not contain the 4-cycle as a subgraph),
|
243 |
+
we have the following bound for the one-visibility localization number in terms of two
|
244 |
+
common graph parameters, including the domination number, written γ(G).
|
245 |
+
Theorem 6. If G is C4-free, then ζ1(G) ≤ γ(G) + ∆(G).
|
246 |
+
Proof. Let S = {v1,v2,...,vγ(G)} be a dominating set of G and have γ(G)-many cops
|
247 |
+
probe each vertex of S in each round. On the first probe, either some cop probes 0 and
|
248 |
+
the robber is captured, or the robber is on some vertex u ∈ V (G) ∖ S, and there is at
|
249 |
+
least one cop who probes 1. Say this is the cop at v1.
|
250 |
+
In the next round, we will use the additional ∆(G)-many cops to probe each neighbor
|
251 |
+
of v1, and so the robber must move to avoid capture. The robber moves to w ∈ V (G)∖S,
|
252 |
+
where w is not a neighbor of v1. On the next round of probes, since S is a dominating
|
253 |
+
set, there will be some other cop, say the one at v2, who probes 1, while the cop at
|
254 |
+
u also probes 1. If v2 were adjacent to a second neighbor of u, then G would contain
|
255 |
+
a 4-cycle. Therefore, the cops can uniquely determine the robber’s location to be at
|
256 |
+
w.
|
257 |
+
□
|
258 |
+
Our next result provides an upper bound on ζ1 for a large family of graphs. A graph
|
259 |
+
H formed from G by first taking a subgraph and then contracting some of the remaining
|
260 |
+
edges is said to be a minor of G. The family of Kh-minor free graphs includes planar
|
261 |
+
graphs in the case h = 5. The following separator theorem for Kh-minor-free graphs will
|
262 |
+
be useful for bounding the one-localization number.
|
263 |
+
Theorem 7 ([1]). If h ≥ 1 is a fixed integer and G is a Kh-minor-free graph of order
|
264 |
+
n, then there are sets of vertices A, B, and C so that no vertex in A is adjacent with a
|
265 |
+
vertex in B, neither A nor B contains more than 2/3n vertices, and C contains no more
|
266 |
+
than h3/2√n vertices.
|
267 |
+
We refer to the set C in Theorem 7 as a separator, and the sets A and B of order at
|
268 |
+
most 2/3n as parts. The following theorem gives an upper bound on the ζ1 number for
|
269 |
+
several classes of graphs, including planar graphs. The proof uses a divide-and-conquer
|
270 |
+
approach. Later in the paper, we will give bounds Ω(√n) in square grids. We do not
|
271 |
+
attempt to optimize constants in the upper bound.
|
272 |
+
Theorem 8. If h > 3 and n are integers, and G is a Kh-minor free graph of order n,
|
273 |
+
then ζ1(G) = O(√n). In particular, if G is planar of order n, then ζ1(G) = O(√n).
|
274 |
+
Proof. Define the function f(m) = h3/2√m(
|
275 |
+
1
|
276 |
+
1−
|
277 |
+
√
|
278 |
+
2/3) + √n. We write P(m) to be the
|
279 |
+
statement that for each Kh-minor-free graph G of order m, there exists a strategy using
|
280 |
+
at most f(m) cops to capture the robber on G. We apply induction, assuming that
|
281 |
+
P(m) is true for 1 ≤ m ≤ n−1, and show that P(n) holds. Once that is established, the
|
282 |
+
proof of the theorem follows.
|
283 |
+
The base cases are when 1 ≤ m ≤ √n. In any such graph, we can place a cop on every
|
284 |
+
vertex to capture the robber in one round. This uses at most √n ≤ f(m) cops, and so
|
285 |
+
P(m) is true in these cases.
|
286 |
+
|
287 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
288 |
+
7
|
289 |
+
For the inductive step, for a graph G of order n, we apply Theorem 7 to give a
|
290 |
+
separator C of G with ∣C∣ ≤ h3/2√n, with parts A and B of cardinalities at most 2n/3.
|
291 |
+
We note that A and B are not necessarily connected; however, they are both Kh-minor-
|
292 |
+
free graphs.
|
293 |
+
The cops employ a strategy in two phases. During both phases (and hence, in all
|
294 |
+
rounds), at most h3/2√n cops are played on C so that each vertex in C contains a cop;
|
295 |
+
we label this set of cops by X. As such, the robber cannot move between A and B
|
296 |
+
without being captured on a cop move.
|
297 |
+
We know by the inductive hypothesis that a strategy exists to capture the robber on
|
298 |
+
A using at most f(∣A∣) cops. Therefore in the first phase, we play this strategy on A
|
299 |
+
using the cops while also playing the cops in X on C. After this, the robber will be
|
300 |
+
captured if it was ever on a vertex in A or C, and so we may assume that the robber is
|
301 |
+
now in B after the cops’ last move.
|
302 |
+
There similarly exists a strategy to capture the robber on B using at most f(∣B∣)
|
303 |
+
cops, and in the second phase, we play this strategy on B while also playing the cops in
|
304 |
+
X on C. After this process, the robber will be captured either on a vertex of B or C.
|
305 |
+
Assuming without loss of generality that ∣A∣ ≥ ∣B∣, we used at most
|
306 |
+
max(h3/2√n + f(∣A∣),h3/2√n + f(∣B∣))
|
307 |
+
≤
|
308 |
+
h3/2√n + f(∣A∣)
|
309 |
+
≤
|
310 |
+
h3/2√n + h3/2√
|
311 |
+
2n/3⎛
|
312 |
+
⎝
|
313 |
+
1
|
314 |
+
1 −
|
315 |
+
√
|
316 |
+
2/3
|
317 |
+
⎞
|
318 |
+
⎠ + √n
|
319 |
+
=
|
320 |
+
h3/2√n⎛
|
321 |
+
⎝
|
322 |
+
1
|
323 |
+
1 −
|
324 |
+
√
|
325 |
+
2/3
|
326 |
+
⎞
|
327 |
+
⎠ + √n
|
328 |
+
cops to capture the robber on G. In the first inequality, we used the fact that ∣f(B)∣ ≤
|
329 |
+
∣f(A)∣, while the second follows by inductive hypothesis. Hence, P(n) holds, and the
|
330 |
+
proof follows.
|
331 |
+
□
|
332 |
+
Interestingly, we show that the bound in Theorem 8 is tight in the sense that there
|
333 |
+
exist planar graphs G (in particular, Cartesian grid graphs) with ζ1(G) =
|
334 |
+
√
|
335 |
+
∣V (G)∣ +
|
336 |
+
O(1).
|
337 |
+
3.2. Lower bounds from isoperimetric inequalities. The isoperimetric problem
|
338 |
+
of a graph G asks for the minimum cardinality of the boundary of a set of vertices,
|
339 |
+
given the set of vertices has cardinality k. For a subset of vertices S, this border can
|
340 |
+
be either the vertex border δ(S) = N[S] ∖ S, or the edge border
|
341 |
+
∂(S) = ∣E(S,S)∣ = ∣{(u,v) ∈ E(G) ∶ u ∈ S,v ∉ S}∣,
|
342 |
+
which is the set of edges that have exactly one endpoint in S.
|
343 |
+
We consider the following two standard isoperimetric parameters for graphs:
|
344 |
+
ΦE(G,k) =
|
345 |
+
min
|
346 |
+
S⊆V ∶∣S∣=k ∣∂(S)∣,
|
347 |
+
ΦV (G,k) =
|
348 |
+
min
|
349 |
+
S⊆V ∶∣S∣=k ∣δ(S)∣.
|
350 |
+
The isoperimetric problem for either of these two parameters asks for an exact eval-
|
351 |
+
uation of ΦE(G,k) or ΦV (G,k), while an isoperimetric inequality is a bound on these
|
352 |
+
|
353 |
+
8
|
354 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
355 |
+
values. The edge isoperimetric problem is also studied along with the problem of max-
|
356 |
+
imizing the number of edges between vertices of a k-set of vertices, maxS∶∣S∣=k ∣E(S,S)∣.
|
357 |
+
For a survey on edge isoperimetric inequalities, see [4].
|
358 |
+
The two isoperimetric problems are closely related. We have that ΦV (G,k) ≤ ΦE(G,k).
|
359 |
+
Since each vertex in δ(S) is incident to at most ∆(G) vertices in S, it follows that
|
360 |
+
ΦE(G,k) ≤ ∆(G)ΦV (G,k). Therefore, these parameters differ at most by a factor of
|
361 |
+
∆(G):
|
362 |
+
ΦE(G,k)
|
363 |
+
∆(G)
|
364 |
+
≤ ΦV (G,k) ≤ ΦE(G,k).
|
365 |
+
The isoperimetric peak is the maximum over the isoperimetric numbers on the graph:
|
366 |
+
ΦE(G) = max
|
367 |
+
k
|
368 |
+
ΦE(G,k),
|
369 |
+
ΦV (G) = max
|
370 |
+
k
|
371 |
+
ΦV (G,k).
|
372 |
+
The vertex isoperimetric peak has been explicitly studied for trees [5, 20, 24], although
|
373 |
+
further results for the isoperimetric peak problem appear implicitly within many works.
|
374 |
+
We introduce a modification to this concept inspired by the h-index metric of citation
|
375 |
+
metrics. For some function f ∶ Z → Z, define the h-index function on f, H(f), as follows:
|
376 |
+
H(f) = max{h ∈ Z ∶ for some k1, we have f(k) ≥ h for k1 ≤ k ≤ k1 + h − 1}.
|
377 |
+
In particular, there are H(f) consecutive integers k1 ≤ k ≤ k1 + h − 1 with f(k) ≥ H(f).
|
378 |
+
The vertex-h-index of a graph is
|
379 |
+
HV (G) = H(ΦV (G,k)),
|
380 |
+
and similarly, the edge-h-index of a graph is
|
381 |
+
HE(G) = H(ΦE(G,k)).
|
382 |
+
See Figure 1 for an illustration of HV (G).
|
383 |
+
The following lemma establishes inequalities for the HV and HE parameters.
|
384 |
+
Lemma 9. For a graph G, we have that
|
385 |
+
HE(G)
|
386 |
+
∆(G) ≤ HV (G) ≤ HE(G).
|
387 |
+
Proof. Let h = HV (G). By the definition of HV (G), there exists an integer ka such that
|
388 |
+
each k ∈ [ka,...,ka + h − 1] satisfies ΦV (G,k) ≥ h. However, since ΦE(G,k) ≥ ΦV (G,k),
|
389 |
+
this gives that ΦE(G,k) ≥ h for k ∈ [ka,...,ka + h − 1]. Therefore, HE(G) ≥ h = HV (G)
|
390 |
+
by the definition of HE.
|
391 |
+
Let h = HE(G). By the definition of HE(G), there exists an integer ka such that each
|
392 |
+
k ∈ [ka,...,ka + h − 1] has ΦE(G,k) ≥ h. However, since ΦV (G,k) ≥ ΦE(G,k)/∆(G),
|
393 |
+
this gives that ΦV (G,k) ≥ h/∆(G) for k ∈ [ka,...,ka+⌈h/∆(G)⌉−1] ⊆ [ka,...,ka+h−1].
|
394 |
+
Therefore, HV (G) ≥ h/∆(G) = HE(G)/∆(G) by the definition of HV .
|
395 |
+
□
|
396 |
+
The following theorem gives a lower bound on prox1(G) in terms of HV (G), and
|
397 |
+
hence, gives a lower bound for ζ1(G).
|
398 |
+
Theorem 10. If G is a graph, then
|
399 |
+
prox1(G) > HV (G)
|
400 |
+
∆(G) + 1.
|
401 |
+
|
402 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
403 |
+
9
|
404 |
+
k
|
405 |
+
ΦV (G,k)
|
406 |
+
ka
|
407 |
+
kb = ka + HV (G) − 1
|
408 |
+
HV (G)
|
409 |
+
k1
|
410 |
+
k2
|
411 |
+
k3
|
412 |
+
cleared
|
413 |
+
re-contaminated
|
414 |
+
Figure 1. A graph of Φ(G,k) that illustrates HV (G), where a contigu-
|
415 |
+
ous set of HV (G) integers each have Φ(G,k) ≥ HV (G). For Theorem 10,
|
416 |
+
if the cops manage to reduce the number of contaminated vertices k be-
|
417 |
+
low kb + 1 (in our example, moving from k = k1 to k = k2 that is in
|
418 |
+
the gray region), then the contamination is guaranteed to grow to some
|
419 |
+
cardinality at least kb + 1 (that is, moving from k = k2 to k = k3 in our
|
420 |
+
example, which is to the right of the gray region).
|
421 |
+
Proof. We may assume HV (G) ≥ (∆(G)+1), or else the proof is immediate. See Figure
|
422 |
+
1 as an aid to this proof. As a high-level overview of the proof, p cops can clear at most
|
423 |
+
p(∆(G) + 1) vertices per round (that is, a cop on u clears the at most ∆ + 1 vertices in
|
424 |
+
N[u]) and the contamination spreads at a rate of at least ΦV (G,k), with k being the
|
425 |
+
number of currently contaminated vertices. If ΦV (G,k) is larger than p(∆(G) + 1) for
|
426 |
+
enough contiguous values k, then there will always be some point in the game where
|
427 |
+
the contamination will grow faster than the cops can clear the contamination.
|
428 |
+
Consider a game in which the cop player controls p = ⌊ HV (G)
|
429 |
+
∆(G)+1⌋ cops. By the definition
|
430 |
+
of HV (G), there must exist ka and kb = ka + HV (G) − 1 such that for any value k ∈
|
431 |
+
{ka,ka + 1,...,kb} we have ΦV (G,k) ≥ HV (G). Note that ka > 1, since
|
432 |
+
ΦV (G,1) = min
|
433 |
+
v∈V (G)deg(v) < ∆(G) + 1 ≤ HV (G),
|
434 |
+
so the inequality ΦV (G,1) ≥ HV (G) does not hold.
|
435 |
+
Suppose there are at least kb+1 contaminated vertices just before the cops move. If a
|
436 |
+
cop plays on vertex v, then the vertices on N[v] that were contaminated are no longer
|
437 |
+
contaminated. As a consequence, after this cop round at most p(∆(G) + 1) ≤ HV (G)
|
438 |
+
vertices have been cleared, which implies that at least
|
439 |
+
kb + 1 − HV (G) = (ka + HV (G) − 1) + 1 − HV (G) = ka
|
440 |
+
vertices remain contaminated.
|
441 |
+
That is, in a round where the cops reduce the con-
|
442 |
+
taminated vertices below kb + 1, there will always be at least ka contaminated vertices
|
443 |
+
remaining. For the cops to win by eliminating all contaminated vertices, there must
|
444 |
+
be some round where between ka and kb vertices are contaminated. Suppose we are in
|
445 |
+
such a round after the cops move.
|
446 |
+
|
447 |
+
10
|
448 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
449 |
+
Now ΦV (G,k) ≥ HV (G) for each k with ka ≤ k ≤ kb, so on the contamination round
|
450 |
+
at least HV (G) clear vertices become re-contaminated, and so at least ka + HV (G) =
|
451 |
+
kb + 1 vertices are now contaminated. That is, if the cops ever reduce the number of
|
452 |
+
contaminated vertices to be kb or fewer, then there will be kb + 1 or more contaminated
|
453 |
+
vertices after the subsequent contamination round. Therefore, we conclude that the
|
454 |
+
cops can never reduce the number of contaminated vertices below ka.
|
455 |
+
□
|
456 |
+
An analogous bound for HE can be found using Lemma 9 on Theorem 10 is the
|
457 |
+
following.
|
458 |
+
Corollary 11. For a graph G,
|
459 |
+
prox1(G) >
|
460 |
+
HE(G)
|
461 |
+
(∆(G) + 1)∆(G).
|
462 |
+
Since ζ1(G) ≥ prox1(G), both Theorem 10 and Corollary 11 allow results in isoperi-
|
463 |
+
metric bounds to be applied to yield lower bounds on the k-visibility Location number.
|
464 |
+
The primary challenge remaining is that even when the isoperimetric parameters are
|
465 |
+
known exactly, computing HV (G) and HE(G) is often a complex task. As an example,
|
466 |
+
the vertex isometric peak of a binary tree of radius d is known to be asymptotically
|
467 |
+
equal to d/2 [19]; it is also known that the number of vertices in the vertex border
|
468 |
+
is small for many sporadic values of k. However, we can find a lower bound of HV
|
469 |
+
and HE using the corresponding isoperimetric peak, showing that an h-index and its
|
470 |
+
corresponding isoperimetric parameter differ by a small multiplicative constant without
|
471 |
+
complicated direct analysis.
|
472 |
+
Theorem 12. For a graph G,
|
473 |
+
ΦV (G)
|
474 |
+
2
|
475 |
+
(1 +
|
476 |
+
1
|
477 |
+
2∆(G) + 1) ≤ HV (G) ≤ ΦV (G).
|
478 |
+
Proof. The upper bound is clear by the definition of HV and ΦV . For the lower bound,
|
479 |
+
we will show that two consecutive values cannot have their ΦV (G,k) values differ too
|
480 |
+
much.
|
481 |
+
Consider a set S of cardinality k + 1. If we remove any vertex u from S, then the
|
482 |
+
only vertex that can be in δ(S ∖ {u}) that is not in δ(S) is the vertex u, and so
|
483 |
+
∣δ(S)∣ ≥ ∣δ(S ∖ {u})∣ − 1. As a consequence, if ∣δ(S)∣ = ΦV (G,k + 1) and u ∈ S, then we
|
484 |
+
have that
|
485 |
+
ΦV (G,k + 1) = ∣δ(S)∣ ≥ ∣δ(S ∖ {u})∣ − 1 ≥
|
486 |
+
min
|
487 |
+
S′∶∣S′∣=k ∣δ(S′)∣ − 1 = ΦV (G,k) − 1.
|
488 |
+
(1)
|
489 |
+
Now consider a set S of cardinality k − 1. If we add a vertex v to S, then any vertex
|
490 |
+
in δ(S ∪{v}) that is not in δ(S) must be a neighbor of v. As a consequence, δ(S ∪{v})
|
491 |
+
contains at most ∆(G) more vertices than δ(S), and so similar to the previous case,
|
492 |
+
ΦV (G,k − 1) ≥ ΦV (G,k) − ∆(G).
|
493 |
+
(2)
|
494 |
+
Let kp be a value such that ΦV (G,kp) = ΦV (G). By recursively applying inequality
|
495 |
+
(1), we find htat
|
496 |
+
ΦV (G,kp + i) ≥ ΦV (G,kp) − i ≥ ΦV (G) − ΦV (G)∆(G)/(2∆(G) + 1)
|
497 |
+
|
498 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
499 |
+
11
|
500 |
+
for each i ∈ {0,...,ΦV (G)∆(G)/(2∆(G) + 1)}. Similarly, by recursively applying in-
|
501 |
+
equality (2),
|
502 |
+
ΦV (G,kp − i) ≥ ΦV (G,kp) − i∆(G) ≥ ΦV (G) − ΦV (G)∆(G)/(2∆(G) + 1)
|
503 |
+
for each i ∈ {1,...,ΦV (G)/(2∆(G) + 1)}. Therefore, there are at least
|
504 |
+
ΦV (G)∆(G)
|
505 |
+
2∆(G) + 1
|
506 |
+
+ 1 +
|
507 |
+
ΦV (G)
|
508 |
+
2∆(G) + 1 = ΦV (G) ∆(G) + 1
|
509 |
+
2∆(G) + 1 + 1
|
510 |
+
contiguous values of k such that
|
511 |
+
ΦV (G,k) ≥ ΦV (G) − ΦV (G)∆(G)
|
512 |
+
2∆(G) + 1
|
513 |
+
= ΦV (G) ∆(G) + 1
|
514 |
+
2∆(G) + 1.
|
515 |
+
By the definition of HV , this yields that
|
516 |
+
HV (G) ≥ ΦV (G) ∆(G) + 1
|
517 |
+
2∆(G) + 1 = ΦV (G)
|
518 |
+
2
|
519 |
+
(1 +
|
520 |
+
1
|
521 |
+
2∆(G) + 1),
|
522 |
+
as required.
|
523 |
+
□
|
524 |
+
We note that as ΦV (G) ≥ HV (G), the vertex-h-index and the vertex isoperimetric
|
525 |
+
peak differ by a multiplicative factor of at most a little over 2. There is an analogous
|
526 |
+
result for the edge-h-index, as follows.
|
527 |
+
Theorem 13. For a graph G,
|
528 |
+
HE(G) ≥
|
529 |
+
2
|
530 |
+
∆(G) + 2ΦE(G).
|
531 |
+
Proof. Follows similarly to the proof of Theorem 12, except using
|
532 |
+
ΦE(G,k + 1) ≥ ΦE(G,k) − ∆(G)
|
533 |
+
in place of the inequality (1).
|
534 |
+
□
|
535 |
+
We have the following corollary as a consequence of Theorems 10 and 12.
|
536 |
+
Corollary 14. For a graph G, we have that
|
537 |
+
prox1(G) = Ω(ΦV (G)
|
538 |
+
∆(G) ),
|
539 |
+
and as ΦV (G) ≥ ΦE(G)/∆(G),
|
540 |
+
prox1(G) = Ω(ΦE(G)
|
541 |
+
∆(G)2 ).
|
542 |
+
4. Trees
|
543 |
+
As was proved first in [21] and later in [13], the localization number of trees is at
|
544 |
+
most two. For the one-visibility Localization game, the situation is quite different. We
|
545 |
+
explore bounds on ζ1 for trees and give upper and lower bounds on ζ1 for k-ary trees
|
546 |
+
with k ≥ 2 that differ by a multiplicative constant; this family is shown as a result to
|
547 |
+
have ζ1 unbounded.
|
548 |
+
We begin by showing that ζ1 is monotone on subtrees of a tree.
|
549 |
+
Lemma 15. If T is a tree and S is a subtree of T, then ζ1(S) ≤ ζ1(T).
|
550 |
+
|
551 |
+
12
|
552 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
553 |
+
Proof. For each v ∈ T, let des(v) ∈ S be the unique vertex in S at the shortest distance
|
554 |
+
(in T) from v. Using ζ1(T) cops, if a successful strategy on T calls for a cop to probe
|
555 |
+
v ∈ T, they instead probe des(v). Since the robber cannot be in T ∖ S, the distance
|
556 |
+
in T between the robber and des(v) is at most the distance between the robber and v.
|
557 |
+
Thus, this strategy gives no less information than it would in T. As the cops win in T,
|
558 |
+
they will win in S.
|
559 |
+
□
|
560 |
+
Our next result shows that the one-visibility localization number and one-proximity
|
561 |
+
number differ by at most one for trees.
|
562 |
+
Lemma 16. For any tree T,
|
563 |
+
prox1(T) ≤ ζ1(T) ≤ prox1(T) + 1.
|
564 |
+
Furthermore, if prox1(T) ≥ ∆(T), then ζ1(T) = prox1(T).
|
565 |
+
Proof. Let m = prox1(T). Root T arbitrarily and let r be the root vertex. The cops
|
566 |
+
of the one-visibility Localization game use m cops to follow a winning strategy in the
|
567 |
+
one-proximity game and place one additional cop at r on each round. If the robber
|
568 |
+
ever tries to cross from one subtree of T − r to another, then they must pass through
|
569 |
+
r, at which point the cop on r would probe a distance of 0, and the robber would be
|
570 |
+
captured. Therefore, the robber may only move in one subtree.
|
571 |
+
As the cops’ strategy succeeds in the one-proximity game, they eventually probe a
|
572 |
+
vertex and receive a distance of at most one. If the probe returns distance zero, the
|
573 |
+
robber has been located, so assume it returns one. This uniquely determines on which
|
574 |
+
subtree the robber is located. If the cop on r also returned a probe of distance 1 to
|
575 |
+
the robber, then the robber would be captured as r has exactly one neighbor on each
|
576 |
+
subtree. Therefore, we may assume the robber has distance at least 2 from r. The cop
|
577 |
+
dedicated to probing r can now probe the root of the robber’s subtree while the other
|
578 |
+
m cops start the winning strategy from the beginning. After repeating this process at
|
579 |
+
most d times, where d is the depth of T, the subtree onto which the robber is forced
|
580 |
+
will be a leaf. The cops can then win by probing each leaf until locating the robber.
|
581 |
+
□
|
582 |
+
Let T be a tree. Note that given any v ∈ T, T −v is a forest. Call v a midway vertex of
|
583 |
+
T if each component T1,T2,...,Tk of T − v satisfies ∣V (Ti)∣ ≤ n/2. The following result
|
584 |
+
is folklore.
|
585 |
+
Lemma 17. Every tree has at least one midway vertex.
|
586 |
+
Proof. Given u ∈ V (T), let T1,T2,...,Tk be the components of T − u and define
|
587 |
+
s(u) = max
|
588 |
+
1≤i≤k ∣V (Ti)∣.
|
589 |
+
Assume for the sake of contradiction that minu∈V (T) s(u) > n/2. Let v be a vertex with
|
590 |
+
s(v) minimal and let T1,T2,...,Tk be the components of T −v, where we have s(v) > n/2
|
591 |
+
by our initial assumption. Note that at most one component satisfies ∣V (Ti)∣ > n/2 as
|
592 |
+
∑∣V (Ti)∣ = n − 1; without loss of generality, let this component be T1.
|
593 |
+
Let w ∈ T1 be the neighbor of v in T. We then have that T − w is a collection of
|
594 |
+
components, say S1,S2,...,Sr. The largest of these components, say S1, cannot be a
|
595 |
+
subtree of T1 as any such subset does not contain w and therefore has fewer than ∣V (T1)∣
|
596 |
+
vertices, contradicting that s(v) was minimal. However, any Si intersecting T1 must,
|
597 |
+
|
598 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
599 |
+
13
|
600 |
+
in fact, be a subtree of T1 as the only path from elements in T1 to elements in T − T1
|
601 |
+
contains w.
|
602 |
+
Thus, the largest component S1 must be the subtree formed by combining the subtrees
|
603 |
+
T2,...,Tk and v, and so we have that ∣V (S1)∣ ≤ n − ∣V (T1)∣. As ∣V (T1)∣ > n/2, we have
|
604 |
+
that
|
605 |
+
∣V (S1)∣ ≤ n − ∣V (T1)∣ < n − n/2 = n/2,
|
606 |
+
which contradicts that s(w) ≥ s(v).
|
607 |
+
□
|
608 |
+
We now derive the following bound in terms of the order of the tree.
|
609 |
+
Theorem 18. If T is a tree of order n ≥ 2, then ζ1(T) ≤ ⌈log2 n⌉.
|
610 |
+
Proof. The proof is by induction on n. The base case with n = 2 is straightforward: the
|
611 |
+
only tree on two vertices is an edge, for which log2 2 = 1 probe suffices.
|
612 |
+
Now assume T is a tree on n vertices. Let x be a midway vertex of T and probe x
|
613 |
+
every round. This prevents the robber from moving from one component of T − x to
|
614 |
+
another. Each component of T −x contains at most n/2 vertices and thus, by induction,
|
615 |
+
requires at most log2(n/2) = log2 n − 1 probes to search. As the robber is restricted
|
616 |
+
to a single component of T − x, the cops can use these log2 n − 1 probes to clear each
|
617 |
+
component of T −x before moving on to the next. The winning cop strategy we outlined
|
618 |
+
uses at most 1 + log2 n − 1 = log2 n probes, and the proof follows.
|
619 |
+
□
|
620 |
+
The depth of a vertex in a rooted tree is the number of edges in a shortest path from
|
621 |
+
the vertex to the tree’s root. The depth of a rooted tree T is the greatest depth in T.
|
622 |
+
The depth of a tree is the smallest depth of a rooted tree over all ways of rooting T. We
|
623 |
+
next turn to two bounds in terms of the depth of a tree.
|
624 |
+
Theorem 19. For a tree T of depth d, we have that
|
625 |
+
ζ1(T) ≤ ⌊d
|
626 |
+
4⌋ + 2.
|
627 |
+
Proof. We provide a strategy using m = ⌊d
|
628 |
+
4⌋ + 1 cops to win the one-proximity game on
|
629 |
+
T. The result then follows from Lemma 16. The idea of the proof is to clear paths
|
630 |
+
sequentially, based on an ordering of the leaves. We clear all the paths to leaves from
|
631 |
+
lower to higher index, using two cop moves to clear a given path. We ensure that the
|
632 |
+
robber cannot reinfect previously infected paths to leaves with a lower index in each
|
633 |
+
round.
|
634 |
+
Let u0 be the root vertex of T, and let ℓ1,...,ℓp denote an ordering of the leaves of
|
635 |
+
T, where the ordering is obtained by performing a depth-first search on T. Let i be the
|
636 |
+
smallest index such that ℓi has not yet been chosen. Let Pi = u0u1,...,uq = ℓi denote
|
637 |
+
the path from the root to ℓi. Define vi as the vertex in Pi that is not in Pi+1 but is as
|
638 |
+
close to the root u0 as possible.
|
639 |
+
By induction, we assume that an even number of rounds have occurred, and it is
|
640 |
+
immediately before the cops’ move on a round of odd parity. Further, we assume that
|
641 |
+
each subtree in the forest T − Pi either has:
|
642 |
+
(1) all vertices cleared; or
|
643 |
+
(2) all vertices infected, except perhaps the unique vertex with a neighbor in Pi
|
644 |
+
(within the graph T).
|
645 |
+
|
646 |
+
14
|
647 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
648 |
+
We call these subtrees cleared and infected, respectively. The base step for induction is
|
649 |
+
follows as, on the first round, T − P1 is composed of infected trees. We note that under
|
650 |
+
these assumptions and since the ℓi were defined using a depth-first search, directly before
|
651 |
+
the cops take their move, the only infected descendants of vi are in Pi.
|
652 |
+
Recall that q ≤ d is the length of the path Pi. The cop player places a cop on the
|
653 |
+
vertex u4j for each 0 ≤ j ≤ ⌊q/4⌋ using at most ⌊q/4⌋ + 1 ≤ m cops. If the robber was
|
654 |
+
on Pi and was not captured in this move, then they must have been on u4j+2 for some
|
655 |
+
0 ≤ j ≤ ⌊(q − 2)/4⌋ or else on uq = ℓi if q ≡ 3 (mod 4). Therefore, after the robber moves,
|
656 |
+
they are on either an infected subtree of T −Pi or on N[u4j+2] for some 0 ≤ j ≤ ⌊(q−2)/4⌋.
|
657 |
+
On the next cop move, a cop is placed on vertex u4j+2 for each 0 ≤ j ≤ ⌊(q−2)/4⌋ using at
|
658 |
+
most ⌊(q−2)/4⌋+1 ≤ m cops. The robber may now only be on an infected subtree and is
|
659 |
+
not on Pi nor on a cleared tree. As we noted before these two rounds, the descendants of
|
660 |
+
vi were infected only if they were in Pi. Consequently, each descendant of vi (including
|
661 |
+
vi itself) is cleared after these two moves. The robber then takes their move, and after
|
662 |
+
this move may be on an infected tree or on a vertex in V (Pi) ∩ V (Pi+1).
|
663 |
+
We observe that the descendants of vi (including vi itself) form a cleared tree of
|
664 |
+
T −Pi+1, which we label as S. In addition, a cleared tree in T −Pi is either a cleared tree
|
665 |
+
in T −Pi+1 or is a subtree of S. Similarly, we can show that each subtree of T −Pi+1 that
|
666 |
+
is not one of these cleared trees is an infected tree. Therefore, we have that an even
|
667 |
+
number of rounds has occurred, it is now the cops’ move on an odd-parity round, and
|
668 |
+
each subtree of T − Pi+1 is either cleared or infected, completing the inductive step.
|
669 |
+
□
|
670 |
+
We provide a third and final upper bound for ζ1 on trees. An example will follow,
|
671 |
+
illustrating three graphs such that each bound is best on exactly one graph.
|
672 |
+
Let T be a tree, rooted at vertex v, of depth d.
|
673 |
+
Let Lv = {L1,L2,...,Ld} be a
|
674 |
+
level decomposition of T rooted at v, where Li = {u ∈ V (T) ∶ d(u,v) = i}. Define the
|
675 |
+
nonnegative integer Li = ∣{w ∈ Li ∶ deg(w) ≥ 2}∣, which counts the number of non-leaf
|
676 |
+
vertices within each level. We have the following upper bound on prox1(T).
|
677 |
+
Theorem 20. If Lv is the level decomposition of T rooted at v, then
|
678 |
+
prox1(T) ≤ ⌈maxi{Li}
|
679 |
+
3
|
680 |
+
⌉ + 1.
|
681 |
+
Proof. Let k = ⌈maxi{Li}
|
682 |
+
3
|
683 |
+
⌉. We give a strategy for k + 1 one-proximity cops to clear T
|
684 |
+
starting from level Lm−1 and working up to the root v. Divide the non-leaf vertices of
|
685 |
+
Lm−1 into disjoint groups of three vertices, assigning one cop to each set, and consider
|
686 |
+
the first such group consisting of vertices x, y, and z. For x, let x1 denote the parent of
|
687 |
+
x, x2 denote the parent of x1, and define y1,y2,z1 and z2 analogously. We refer to the
|
688 |
+
cop initially assigned to these three vertices as C1. At the start of the game, the robber
|
689 |
+
may be anywhere on T, so all vertices start contaminated.
|
690 |
+
In the first three rounds, C1 will probe x, then y, then z. After these probes, imme-
|
691 |
+
diately before the robber’s move, the robber may be at x (had they begun on x2, they
|
692 |
+
could move to x1 prior to the cop probing y, and then to x prior to the cop probing z).
|
693 |
+
The robber could also be at y1 or z2. We note that the robber cannot currently be on
|
694 |
+
a leaf adjacent to x, y, or z without being previously detected by one of the first three
|
695 |
+
probes. See Figure 2.
|
696 |
+
|
697 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
698 |
+
15
|
699 |
+
x
|
700 |
+
⋯
|
701 |
+
x1
|
702 |
+
x2
|
703 |
+
y
|
704 |
+
⋯
|
705 |
+
y1
|
706 |
+
y2
|
707 |
+
z
|
708 |
+
⋯
|
709 |
+
z1
|
710 |
+
z2
|
711 |
+
Lm
|
712 |
+
Lm−1
|
713 |
+
Lm−2
|
714 |
+
Lm−3
|
715 |
+
Figure 2. Possible robber locations are shown in red after C1’s third
|
716 |
+
probe.
|
717 |
+
The robber now takes their move. To keep the leaves adjacent to x clear, C1 will next
|
718 |
+
probe x. They could then probe y, and then z, repeating the previous three probes.
|
719 |
+
This would protect the leaves adjacent to x, y, and z, but would not allow the cop player
|
720 |
+
to make progress. We now introduce our additional cop, C∗, who will help C1 shift from
|
721 |
+
guarding x,y and z to guarding x1,y1, and z1. To do this, C∗ probes x instead of C1.
|
722 |
+
Had the robber moved to x they will be detected by this next probe regardless of where
|
723 |
+
they now move. This allows C1’s next three probes to be x1, then y, then z, while C∗
|
724 |
+
continues to probe x. Following these three rounds of cop probes, x is fully cleared.
|
725 |
+
In the next three rounds we will have C∗ probe y, while C1 probes x1, then y1, then
|
726 |
+
z. Next, C∗ probes z while C1 probes x1, then y1, then z1. On the robber’s move
|
727 |
+
following this sequence of probes, they may now be at x1, y2, or z3. Next, C∗ will move
|
728 |
+
to the second trio of non-leaf vertices in Lm−1 and will perform this same strategy with
|
729 |
+
the cop there, C2. At the same time, C1 will repeatedly probe x1, then y1, then z1,
|
730 |
+
ensuring that the robber can only reach Lm−1 in this part of the graph, and will be
|
731 |
+
detected doing so, thereby clearing x, y, and z, and the adjacent leaves in Lm. This is
|
732 |
+
continued for each group of three non-leaf vertices in Lm−1, of which we have at most
|
733 |
+
k.
|
734 |
+
When C∗ has concluded with the last group of three non-leaves in Lm−1, the cops will
|
735 |
+
probe in Lm−1 so that every non-leaf vertex there is probed every three rounds. This
|
736 |
+
ensures that the robber will be captured if they ever move onto a non-leaf in Lm−1.
|
737 |
+
The clearing strategy continues up the tree, one level at a time. When the cops move
|
738 |
+
to Lm−2, we note that we may have non-leaf vertices in Lm−2 which have yet to be
|
739 |
+
probed (those that have all their children as leaves in Lm−1). The tree T has at most
|
740 |
+
k sets of three non-leaves in any level. For such vertices, divide them into groups of
|
741 |
+
three and assign an unused cop to each. We have these cops repeatedly probe each of
|
742 |
+
their three vertices (as C1 probed x, y, then z initially), clearing their adjacent leaves
|
743 |
+
in Lm−1.
|
744 |
+
The cop C∗ is then used to extend the cop territory up from Lm−2 into Lm−3. First,
|
745 |
+
C∗ probes x1 while C1 probes x2, then y1, then z1. The process is repeated as in the
|
746 |
+
level below. In each grouping of vertices, the cop C∗ extends the cop territory up the
|
747 |
+
tree, one vertex at a time. Since each vertex in a level is probed every three terms
|
748 |
+
while C∗ is probing that level, the robber cannot move down the tree into cop territory
|
749 |
+
without being detected.
|
750 |
+
|
751 |
+
16
|
752 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
753 |
+
In this way, C∗ can extend the cop territory eventually up to the root v, cleaning the
|
754 |
+
tree and winning the one-proximity game. The proof follows.
|
755 |
+
□
|
756 |
+
For integers d,k ≥ 2, we use the notation T k
|
757 |
+
d for the k-ary tree of depth d, where each
|
758 |
+
non-leaf vertex has k children. We note that the bound in Theorem 20 is tight for T 3
|
759 |
+
2 .
|
760 |
+
Rooted at the midway vertex, the tree has maxi{Li} = ∣L1∣ = 3, and so Theorem 20
|
761 |
+
provides that prox1(T 3
|
762 |
+
2 ) ≤ 2. It is known [22] that the original localization number
|
763 |
+
satisfies ζ(T 3
|
764 |
+
2 ) = 2, so we have ζ1(T 3
|
765 |
+
2 ) ≥ 2 as well.
|
766 |
+
To compare the upper bounds on ζ1(T) provided by Theorems 18, 19, and 20, let
|
767 |
+
T0 = T 3
|
768 |
+
3 , which has 40 vertices and 39 edges. The corresponding upper bounds for T0
|
769 |
+
are displayed in the first row of Table 1. Define the trees Ti to be T0 with each edge
|
770 |
+
subdivided into i vertices. We then have that Ti will have depth 3(i + 1) and order
|
771 |
+
40 + 39i. The best upper bound for each tree is shown in bold. Note that each of the
|
772 |
+
theorems gives the best bound depending on the tree considered.
|
773 |
+
Theorem 18
|
774 |
+
Theorem 19
|
775 |
+
Theorem 20
|
776 |
+
T0
|
777 |
+
6
|
778 |
+
2
|
779 |
+
4
|
780 |
+
T10
|
781 |
+
9
|
782 |
+
10
|
783 |
+
10
|
784 |
+
T100
|
785 |
+
12
|
786 |
+
77
|
787 |
+
10
|
788 |
+
Table 1. Upper bounds for ζ1 from Theorems 18, 19, and 20.
|
789 |
+
Finding lower bounds for the one-visibility localization number is challenging in most
|
790 |
+
cases. We determined that the isoperimetric peak can give a lower bound on prox1,
|
791 |
+
enabling us to utilize such isoperimetric results when they exist. We finish by applying
|
792 |
+
such results to binary trees, where k = 2. We cite the following result, which gives
|
793 |
+
asymptotically tight values for the isoperimetric peak of binary trees.
|
794 |
+
Theorem 21 ([19]). If d ≥ 2 is an integer, then
|
795 |
+
d
|
796 |
+
2 − O(log d) ≤ ΦE(T 2
|
797 |
+
d ) ≤ d
|
798 |
+
2 + O(1).
|
799 |
+
We therefore have that HE(T 2
|
800 |
+
d ) ≥ d
|
801 |
+
5 − O(log d) from Theorem 13, and so we have the
|
802 |
+
following bounds.
|
803 |
+
Corollary 22. If d ≥ 2 is an integer, then
|
804 |
+
d
|
805 |
+
60 − O(log d) < prox1(T 2
|
806 |
+
d ) ≤ ζ1(T 2
|
807 |
+
d ) ≤ d
|
808 |
+
4 + 2.
|
809 |
+
Proof. The upper bound follows from Theorem 19. The lower bound follows from using
|
810 |
+
Corollary 11, then applying Theorem 13 to the result, and then finally using the lower
|
811 |
+
bound of Theorem 21.
|
812 |
+
□
|
813 |
+
Similar lower bounds of the vertex isoperimetric peak on k-ary trees are also useful
|
814 |
+
to us here.
|
815 |
+
|
816 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
817 |
+
17
|
818 |
+
Theorem 23 ([24]). If d,k ≥ 2 are integers, then
|
819 |
+
ΦV (T k
|
820 |
+
d ) ≥ 3
|
821 |
+
40(d − 2).
|
822 |
+
Theorem 23 provides the following bounds on prox1 and ζ1 for k-ary trees.
|
823 |
+
Corollary 24. If d,k ≥ 2 are integers, then
|
824 |
+
3
|
825 |
+
80(d − 2)(
|
826 |
+
2
|
827 |
+
2k + 3) < prox1(T k
|
828 |
+
d ) ≤ ζ1(T k
|
829 |
+
d ) ≤ d
|
830 |
+
4 + 2.
|
831 |
+
Proof. The upper bound follows from Theorem 19. The lower bound follows from using
|
832 |
+
Theorem 10, then applying Theorem 12, and then finally using Theorem 23.
|
833 |
+
□
|
834 |
+
Corollaries 22 and 24 provide families of trees with unbounded ζ1 number, in stark
|
835 |
+
contrast to ζ being bounded by 2 for trees. The result of Corollary 24 is far from tight.
|
836 |
+
We note that improvements to the isoperimetric value of k-ary trees would improve this
|
837 |
+
result.
|
838 |
+
5. Cartesian grid graphs
|
839 |
+
We proved in Theorem 8 that for planar graphs of order n, ζ1(G) ≤ O(√n). In this
|
840 |
+
section, we show that grid graphs make this bound tight, in the sense that such graphs
|
841 |
+
have ζ1 numbers in
|
842 |
+
√
|
843 |
+
∣V (G)∣ + O(1).
|
844 |
+
For a positive integer n, let Gn,n be the n × n Cartesian grid, which consists of the
|
845 |
+
Cartesian product of the n-order path with itself, or Pn ◻ Pn. As we only consider
|
846 |
+
Cartesian grids, we refer to them as grids.
|
847 |
+
The lower bound for grids follows by using our earlier results with the h-index.
|
848 |
+
Theorem 25. For a positive integer n > 1, prox1(Gn,n) ≥ n
|
849 |
+
5 + 1.
|
850 |
+
Proof. The vertex isoperimetric values are known for the grids [6]. In particular, for
|
851 |
+
Gn,n, ΦV (Gn,n,k) = n for k ∈ {n2−3n+4
|
852 |
+
2
|
853 |
+
,..., n2+n−2
|
854 |
+
2
|
855 |
+
}, which are 2n−2 contiguous values of
|
856 |
+
k. Thus, it follows that HV (Gn,n) ≥ n, and by Theorem 10 we have that prox1(Gn,n) >
|
857 |
+
n/5, as required.
|
858 |
+
□
|
859 |
+
We next establish upper bounds for grid graphs that differ from the lower bound in
|
860 |
+
Theorem 25 by an additive constant.
|
861 |
+
Theorem 26. Let m be the odd integer such that n = 5m − i for some integer 0 ≤ i ≤ 9.
|
862 |
+
We then have that
|
863 |
+
prox1(Gn,n) ≤ m + 3.
|
864 |
+
We prove Theorem 26 at the end of this section. As a consequence of Theorem 26,
|
865 |
+
we know prox1(Gn,n) up to one of four values.
|
866 |
+
This gives a class of graphs where
|
867 |
+
Theorem 10 is close to being tight.
|
868 |
+
Corollary 27. For n a positive integer,
|
869 |
+
⌈n
|
870 |
+
5 ⌉ + 1 ≤ prox1(Gn,n) ≤ ⌈n
|
871 |
+
5 ⌉ + 4.
|
872 |
+
Proof. Theorem 25 gives prox1(Gn,n) ≥ ⌈n
|
873 |
+
5 ⌉+1. When we note that m = ⌈n
|
874 |
+
5 ⌉+⌊ i
|
875 |
+
5⌋ ≤ ⌈n
|
876 |
+
5 ⌉+1
|
877 |
+
in Theorem 26, it follows that prox1(Gn,n) ≤ ⌈n
|
878 |
+
5 ⌉ + 4.
|
879 |
+
□
|
880 |
+
|
881 |
+
18
|
882 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
883 |
+
The following result determines the one-visibility localization number of Cartesian
|
884 |
+
grids up to four values, assuming that n is sufficiently large.
|
885 |
+
Corollary 28. If n ≥ 11, then
|
886 |
+
⌈n
|
887 |
+
5 ⌉ + 1 ≤ ζ1(Gn,n) ≤ ⌈n
|
888 |
+
5 ⌉ + 4.
|
889 |
+
Proof. Using prox1(Gn,n) cops in the one-visibility Localization game, the cops may
|
890 |
+
initially follow the strategy guaranteed by Corollary 27 until some cop probes a distance
|
891 |
+
of 1 from the robber, say the cop on vertex u. The robber moves and may now be on
|
892 |
+
any vertex of distance 0, 1, or 2 from u. Since n ≥ 11, we have that ⌈n
|
893 |
+
5 ⌉ + 1 ≥ 4, and so
|
894 |
+
we know that at least four cops are playing. For the cops’ second move, play four cops
|
895 |
+
on the vertices of N(u).
|
896 |
+
If all four cops probe a distance of 1, then the robber is on u. If exactly two of these
|
897 |
+
cops probe a distance of 1, then the robber must be on the unique vertex of distance
|
898 |
+
2 from u that is adjacent to the two vertices containing these cops. If exactly one cop
|
899 |
+
probes a distance of 1, then the robber must be on the unique vertex of distance 1 from
|
900 |
+
this cop that is not adjacent to any of the other cops. Thus, the robber’s location is
|
901 |
+
determined by the cops.
|
902 |
+
□
|
903 |
+
We finish the section with the proof of Theorem 26, but as the proof is quite technical,
|
904 |
+
we motivate our technique by exploring some less efficient but more intuitive strategies.
|
905 |
+
A first strategy one may think of for the cops is to clear the grid using n cops to probe
|
906 |
+
an entire row and march upwards, clearing the grid from bottom to top. This approach
|
907 |
+
is effective but inefficient.
|
908 |
+
A natural improvement is to place a cop in every other column, alternating between
|
909 |
+
the first and second row, so that two full rows of the grid are cleared using at most
|
910 |
+
(n+1)/2 cops; see Figure 3. As the cops march upwards, two rows are cleared, and only
|
911 |
+
c
|
912 |
+
c
|
913 |
+
c
|
914 |
+
c
|
915 |
+
c
|
916 |
+
c
|
917 |
+
Figure 3. Cops placed on every other column can clear two rows.
|
918 |
+
one row is reinfected each round. This strategy avoids overlapping the neighborhoods of
|
919 |
+
the cops’ probes, but only the “forward” edge of the cops’ line clears infected vertices.
|
920 |
+
The “rear” of each probe is already cleared. Matching the isoperimetric lower bound
|
921 |
+
requires most cops to clear the maximum ∆(G) + 1 = 5 new vertices with every probe.
|
922 |
+
To improve on this second strategy, note that it would take the robber multiple rounds
|
923 |
+
to cross the cops’ formation: three rounds on a column with a cop and two rounds on
|
924 |
+
a column without a cop. This implies that cops only need to play on these positions
|
925 |
+
every other round to prevent the robber from reinfecting the portion of the grid they’ve
|
926 |
+
|
927 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
928 |
+
19
|
929 |
+
fully cleared. By shifting the set of columns where the cops’ probe, it is possible for the
|
930 |
+
cops to protect these rows by playing twice every five rounds, so that each column has
|
931 |
+
two vertices cleared by one cop move and three vertices cleared by the other.
|
932 |
+
We now give a high-level description of our strategy. We partition the grid into five
|
933 |
+
rectangles of width approximately n/5 vertices. Using two sets of approximately n/10
|
934 |
+
cops, each rectangle is probed twice every five rounds with a cop probing every other
|
935 |
+
column in the rectangle. To prevent the robber from slipping from the infected portion
|
936 |
+
of one rectangle to the cleared portion of the next, the cops clear a diagonal, rather
|
937 |
+
than the two rows from Figure 3. Although it takes several rounds to do so, we show
|
938 |
+
that the cops can move these diagonals up the rectangles, closing in on the robber until
|
939 |
+
they are captured.
|
940 |
+
We now turn to the proof of our main result in this section.
|
941 |
+
Proof of Theorem 26. Let Gn,m′ denote the n×m′ grid and G denote the square lattice
|
942 |
+
with vertices in Z×Z. It will be convenient to allow the cops to play on G and to restrict
|
943 |
+
the robber’s position to a subgraph Gn,m′, where m′ = m for the first part of the proof
|
944 |
+
and m′ = n in the second part of the proof. (Recall that m is the odd integer for which
|
945 |
+
n = 5m − i for some 0 ≤ i ≤ 9.) We will then argue this relaxation did not benefit the
|
946 |
+
cop player.
|
947 |
+
We break the proof into three parts which prove the following three claims, respec-
|
948 |
+
tively:
|
949 |
+
(1) When the robber is restricted to a subgraph Gn,m within G, m+3
|
950 |
+
2
|
951 |
+
cops which
|
952 |
+
only play on rounds t with t ≡ 0,3 (mod 5) can capture the robber.
|
953 |
+
(2) When the robber is restricted to a subgraph Gn,5m of G, the robber can be
|
954 |
+
captured by m + 3 cops.
|
955 |
+
(3) At most m + 3 cops are required to capture the robber on Gn,n.
|
956 |
+
Throughout the proof, let
|
957 |
+
fi,j(c) =
|
958 |
+
⎧⎪⎪⎨⎪⎪⎩
|
959 |
+
i + 1 + ⌊c−j
|
960 |
+
2 ⌋
|
961 |
+
for c − j > 0
|
962 |
+
i + ⌈c−j
|
963 |
+
2 ⌉
|
964 |
+
for c − j ≤ 0,
|
965 |
+
and define Fi,j = {(r,c) ∶ 1 ≤ c ≤ m′,fi,j(c) ≤ r ≤ n}, which we call a forced region. These
|
966 |
+
forced regions describe different subsets of vertices that the cop player will contain the
|
967 |
+
robber within. The strategy we describe will reduce the cardinality of the forced region
|
968 |
+
over time. It is important to note here that when we show that the robber must be
|
969 |
+
in a given forced region, there may be some vertices the robber cannot occupy.
|
970 |
+
In
|
971 |
+
particular, it will be convenient to assume that the forced region will, in some rounds,
|
972 |
+
contain several vertices (x,y) with x < 1.
|
973 |
+
The (i,j) index of Fi,j refers to a cell along the lower edge of the region, which cuts
|
974 |
+
diagonally from southwest to northeast across columns 1 through m′. In particular, the
|
975 |
+
second index describes the column of focus of the forced region, which we pay special
|
976 |
+
attention to in the proof. The function fi,j, given a column c, gives a certain key position
|
977 |
+
in Fi,j related to where the cops will play. See Figure 4 for a visual reference.
|
978 |
+
Let
|
979 |
+
Si,j ={(fi,j(c) + 1,c) ∶ c > j and c − j is odd}∪
|
980 |
+
{(fi,j(c) + 1,c) ∶ c ≤ j and c − j is even}.
|
981 |
+
|
982 |
+
20
|
983 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
984 |
+
The set Si,j contains points spaced apart in an L-shape, similar to a knight move
|
985 |
+
in chess. These vertices are chosen so that the neighborhoods of the points cover a
|
986 |
+
diagonal stripe along the bottom of Fi,j with minimal overlap.
|
987 |
+
Claim 1: When the robber is restricted to a subgraph Gn,m within G, m+3
|
988 |
+
2
|
989 |
+
cops which
|
990 |
+
only play on rounds t with t ≡ 0,3 (mod 5) can capture the robber.
|
991 |
+
The cops��� strategy consists of two moves. If the cops have restricted the robber to
|
992 |
+
Fi,j immediately before the cops’ move, then the cops will play on the vertices Si,j that
|
993 |
+
are within the columns [0,m+1]. By the definition of Si,j, the cops will only be playing
|
994 |
+
on every other column in [0,j] and every other column in [j + 1,m + 1], for a total of
|
995 |
+
⌈j
|
996 |
+
2⌉ + ⌈(m + 1) − (j + 1) + 1
|
997 |
+
2
|
998 |
+
⌉ ≤ j + 1
|
999 |
+
2
|
1000 |
+
+ (m + 1) − (j + 1) + 1 + 1
|
1001 |
+
2
|
1002 |
+
= m + 3
|
1003 |
+
2
|
1004 |
+
cops.
|
1005 |
+
Immediately after this cop’s move, the robber may only be on a vertex in Fi,j ∖
|
1006 |
+
N[Si,j] = Fi+2,j−1. To see this fact, we consider the cases c > j and c ≤ j. For the
|
1007 |
+
first case, when c − j is odd, N[(fi,j(c) + 1,c)] is a superset of {(fi,j(c),c),(fi,j(c) +
|
1008 |
+
1,c),(fi,j(c) + 2,c)}; if the robber is in column c, then it must be on a vertex (r,c)
|
1009 |
+
with r ≥ fi,j(c) + 3 = fi+2,j−1(c).
|
1010 |
+
When c − j is even, {(fi,j(c),c),(fi,j(c) + 1,c)} ⊆
|
1011 |
+
N[(fi,j(c)+1,c)], and the robber must be in a row r ≥ fi,j(c)+2 = fi+2,j−1(c). The case
|
1012 |
+
when c ≤ j follows similarly to find that if the robber is in column c, then the robber
|
1013 |
+
must be on row r ≥ fi+2,j−1(c), which defines the set Fi+2,j−1. We call this the natural
|
1014 |
+
cop move and label this as P1 for future reference.
|
1015 |
+
In the case that the robber is known to be on a vertex of Fi+2,0, the cops instead think
|
1016 |
+
of the robber as being on a vertex of Fi+2+ m+1
|
1017 |
+
2
|
1018 |
+
,m. These two forced regions describe the
|
1019 |
+
same set of vertices, but as Si,j is determined by the index (i,j), this change of index
|
1020 |
+
describes a different cop move. We label this replacement as P2 for future reference.
|
1021 |
+
Observe that when the robber is on a vertex in Fi,j but the cops do not play during
|
1022 |
+
their next move (as in rounds 1,2,4 (mod 5)), then the robber moves to a vertex in
|
1023 |
+
Fi−1,j = N[Fi,j]. We label this as P3 for future reference.
|
1024 |
+
We prove Claim 1 recursively. As a base case, we can assume the robber is contained
|
1025 |
+
within Fi,m for any i ≤ 1, where we note that we will take i to be negative in some cases.
|
1026 |
+
Note that for such i, Fi,m contains the subset of vertices [1,n] × [1,m], so this initial
|
1027 |
+
assumption is always true.
|
1028 |
+
For the recursive step, assume the robber is contained within some Fi,m in round t
|
1029 |
+
with t ≡ 0 (mod 5). Repeating the natural move P1, the column of focus j will shift
|
1030 |
+
from m down to 1, with rounds 0 (mod 5) focusing on an odd column and rounds 3
|
1031 |
+
(mod 5) focusing on an even column. We refer to these rounds collectively as the first
|
1032 |
+
sweep. Once the column of focus is 1, we continue to play, and the column of focus
|
1033 |
+
again becomes m. For this second sweep, the column of focus will shift from m all the
|
1034 |
+
way down to 1, but with the parity reversed: rounds 3 (mod 5) focus on an odd column
|
1035 |
+
and rounds 0 (mod 5) focus on an even column. After both sweeps, the cops will have
|
1036 |
+
successfully moved the robber from Fi,m to Fi+1,m.
|
1037 |
+
We refer the reader to Figure 4, which depicts the following cop moves.
|
1038 |
+
First sweep: The cops play the natural move so that the robber must be contained
|
1039 |
+
within Fi+2,m−1 (see P1). The robber moves three times, first to a vertex in Fi+1,m−1,
|
1040 |
+
|
1041 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
1042 |
+
21
|
1043 |
+
then to a vertex in Fi,m−1, and finally to a vertex in Fi−1,m−1 (see P3). The cops then play
|
1044 |
+
the natural move in round t + 3, so that the robber must be contained within Fi+1,m−2
|
1045 |
+
(see P1). Then the robber moves twice, first to a vertex in Fi,m−2, then to a vertex in
|
1046 |
+
Fi−1,m−2 (see P3). This shows that every five moves, the indices of the forced region
|
1047 |
+
decrease by one in the first coordinate and two in the second coordinate. This process
|
1048 |
+
repeats (m − 1)/2 times until the robber is known to reside on Fi− m−1
|
1049 |
+
2
|
1050 |
+
,1 immediately
|
1051 |
+
before the cops’ (t + 5m−1
|
1052 |
+
2 )th move, where we note that t + 5m−1
|
1053 |
+
2
|
1054 |
+
≡ 0 (mod 5). The
|
1055 |
+
cops again play the natural move, and so the robber is known to reside in Fi− m−1
|
1056 |
+
2
|
1057 |
+
+2,0,
|
1058 |
+
immediately after the cops’ move, which is then replaced with Fi+3,m by P2. The robber
|
1059 |
+
takes three moves and is on a vertex in Fi,m.
|
1060 |
+
Second sweep: The cops again play the natural move, and so the robber is known
|
1061 |
+
to reside in Fi+2,m−1. The robber takes two moves and is on a vertex in Fi,m−1. Once
|
1062 |
+
again, every five moves the first index of the forced region is decreased by one and
|
1063 |
+
the second index by two. Play continues in this fashion (the cops playing the natural
|
1064 |
+
move on round 0,3 (mod 5)) for (m − 1)/2 rounds, until the robber is known to reside
|
1065 |
+
in Fi− m−1
|
1066 |
+
2
|
1067 |
+
,1 immediately before the cops’ move in the (t + 5(m − 1))th round, where
|
1068 |
+
t + 5(m − 1) ≡ 0 (mod 5). The cops play the natural move, so the robber is known
|
1069 |
+
to reside in Fi− m−1
|
1070 |
+
2
|
1071 |
+
+2,0 immediately after the cops’ move, which is then replaced with
|
1072 |
+
Fi+3,m by P2. The robber takes two moves and is on a vertex in Fi+1,m immediately
|
1073 |
+
before the cops’ (t + 5m)th move.
|
1074 |
+
We note that we started with the robber being on a vertex of Fi,m in some round 0
|
1075 |
+
(mod 5), and now have that Fi+1,m in some round 0 (mod 5). This completes the recur-
|
1076 |
+
sive step, and so we can conclude that after sufficiently many rounds, as Fn+ 3m
|
1077 |
+
2 ,m = ∅,
|
1078 |
+
the robber is captured, and the proof of Claim 1 follows.
|
1079 |
+
For the next claim, it will be useful to note that if this process is initialized with Fi,m,
|
1080 |
+
then immediately before the cops’ move in round t = 5mα + 1, the robber must be in
|
1081 |
+
the forced region Fi+α,m.
|
1082 |
+
Claim 2: When the robber is restricted to a subgraph Gn,5m of G, the robber can be
|
1083 |
+
captured by m + 3 cops.
|
1084 |
+
We split the subgraph Gn,5m into five subgraphs A1,A2,A3,A4, and A5, where Aj is
|
1085 |
+
on the vertices of Gn,5m in columns [(j − 1)m + 1,jm]. We use a set of m+3
|
1086 |
+
2
|
1087 |
+
cops on
|
1088 |
+
Aj on rounds j,j + 3 (mod 3). This requires two sets of m+3
|
1089 |
+
2
|
1090 |
+
cops, and so m + 3 cops
|
1091 |
+
are used in total. The technique described in Claim 1 is applied to each Ai, shifting
|
1092 |
+
the rounds on which the cops play appropriately, and with the additional condition
|
1093 |
+
that the process in Claim 1 is started in Aj in round j with forced region Fi,m where
|
1094 |
+
i = −2m + (j − 1)m−1
|
1095 |
+
2 .
|
1096 |
+
To illustrate how the process in Claim 1 is extended to Gn,5m, we describe the first
|
1097 |
+
six cops moves of the m + 3 cops on the infinite square grid G, focused on the subgraph
|
1098 |
+
Gn,5m.
|
1099 |
+
Cop move 1: The first set of m+3
|
1100 |
+
2
|
1101 |
+
cops play on S−2m,m on the columns [0,m + 1] (this
|
1102 |
+
is the first move for the cops in A1).
|
1103 |
+
Cop move 2: The first set of m+3
|
1104 |
+
2
|
1105 |
+
cops play on S−2m+ m−1
|
1106 |
+
2
|
1107 |
+
,m on the columns [m,2m + 1]
|
1108 |
+
(this is the first move for the cops in A2).
|
1109 |
+
|
1110 |
+
22
|
1111 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
1112 |
+
Figure 4. The first sweep of claim 1 where m = 7. Red and pink dots
|
1113 |
+
indicate the forced region before the cops’ move, and the square indicates
|
1114 |
+
the i,j such that this forced region is Fi,j. Red dots indicate the forced
|
1115 |
+
region after the cops’ move. Black circles indicate the locations of the
|
1116 |
+
cops their move. From left to right, top to bottom, the images indicate
|
1117 |
+
play just before and after the cops’ 1st, 4th, 6th, 9th, 11th, 14th, 16th,
|
1118 |
+
and 19th move.
|
1119 |
+
|
1120 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
1121 |
+
23
|
1122 |
+
Cop move 3: The first set of m+3
|
1123 |
+
2
|
1124 |
+
cops play on S−2m+2 m−1
|
1125 |
+
2
|
1126 |
+
,m on the columns [2m,3m+1]
|
1127 |
+
(this is the first move for the cops in A3).
|
1128 |
+
Cop move 4: The first set of m+3
|
1129 |
+
2
|
1130 |
+
cops play on S−2m+3 m−1
|
1131 |
+
2
|
1132 |
+
,m on the columns [3m,4m+1]
|
1133 |
+
(this is the first move for cops in A4) and the second set of m+3
|
1134 |
+
2
|
1135 |
+
cops play on S−2m−1,m−1
|
1136 |
+
on the columns [0,m + 1] (this is the fourth round in A1).
|
1137 |
+
Cop move 5: The first set of m+3
|
1138 |
+
2
|
1139 |
+
cops play on S−2m+4 m−1
|
1140 |
+
2
|
1141 |
+
,m on the columns [4m,5m +
|
1142 |
+
1] (this is the first move for cops in A5) and the second set of
|
1143 |
+
m+3
|
1144 |
+
2
|
1145 |
+
cops play on
|
1146 |
+
S−2m−1+ m−1
|
1147 |
+
2
|
1148 |
+
,m−1 on the columns [m,2m + 1] (this is the fourth round in A2).
|
1149 |
+
Cop move 6: The first set of m+3
|
1150 |
+
2
|
1151 |
+
cops play on S−2m−1,m−2 on the columns [0,m + 1]
|
1152 |
+
(this is the sixth round in A1) and the second set of m+3
|
1153 |
+
2
|
1154 |
+
cops play on S−2m−1+2 m−1
|
1155 |
+
2
|
1156 |
+
,m−1
|
1157 |
+
on the columns [2m,3m + 1] (this is the fourth round in A3).
|
1158 |
+
If the robber stays within a subgraph Aj, then by Claim 1 they will eventually be
|
1159 |
+
captured. Suppose the robber moves from one subgraph to another, say from Aa to
|
1160 |
+
Ab. The robber must have been on a vertex of the cops’ current forced region in Aa in
|
1161 |
+
round t. If the robber moved to the cops’ current forced region in Ab, then the robber
|
1162 |
+
has not made progress as they may as well have started in Ab and stayed there until
|
1163 |
+
the current move. Therefore, we can assume that the robber moves to a vertex of Ab
|
1164 |
+
outside of the cops’ forced region.
|
1165 |
+
Assume without loss of generality that a,b ∈ {1,2}. We analyze the moves that occur
|
1166 |
+
on the border of A1 and A2, which affect where the robber can be on either column m
|
1167 |
+
or m + 1. Before we begin, we analyze each of the cops’ moves of A1 to find which cops
|
1168 |
+
played on either the left-most columns 0, 1, and 2, or the right-most columns m − 1, m,
|
1169 |
+
and m + 1. This will require a deeper analysis of the moves in Claim 1. We note the
|
1170 |
+
following properties.
|
1171 |
+
Property 1: The first sweep of Claim 1 utilized 5m−1
|
1172 |
+
2
|
1173 |
+
+ 3 rounds and the second
|
1174 |
+
sweep of Claim 1 utilized 5m−1
|
1175 |
+
2
|
1176 |
+
+ 2 rounds. Together, this is 5m−1
|
1177 |
+
2
|
1178 |
+
+ 3 + 5m−1
|
1179 |
+
2
|
1180 |
+
+ 2 = 5m
|
1181 |
+
rounds needed to perform both sweeps. Therefore, if the cops were on Si,m in round t,
|
1182 |
+
then the cops are on Si+1,m in round t+5m. Since the cops play on S−2m,m in the round
|
1183 |
+
with t = 1, we conclude that the cops play on S−2m+α,m during round t = 1 + (5m)α.
|
1184 |
+
Property 2: If the cops played on Si,j in round t, then the cops play on Si−1,j−2
|
1185 |
+
in round t + 5, unless j ∈ {1,2}, in which case the cops play on Si+ m−1
|
1186 |
+
2
|
1187 |
+
,j+m−2. Since
|
1188 |
+
the cops play on S−2m+α,m in round t = 1 + (5m)α, we conclude that the cops play on
|
1189 |
+
S−2m+α−β,m−2β in round t = 1 + (5m)α + 5β when 0 ≤ β ≤ m−1
|
1190 |
+
2 , and the cops play on
|
1191 |
+
S−2m+α−β+ m−1
|
1192 |
+
2
|
1193 |
+
,m−2β+(m−2) in round t = 1 + (5m)α + 5β when m+1
|
1194 |
+
2
|
1195 |
+
≤ β ≤ m − 1.
|
1196 |
+
Property 3: If the cops play on Si,j in round t where t ≡ 1 (mod 5), then in the
|
1197 |
+
round t + 3 the cops play on Si−1,j−1 if j ≠ 1, and on Si+ m−1
|
1198 |
+
2
|
1199 |
+
,j+(m−1) if j = 1.
|
1200 |
+
We next consider the situation where the cops play near the left and right edges.
|
1201 |
+
For each t ≡ 1 (mod 5), we describe which of these cops in A1 played on a column in
|
1202 |
+
{0,1,2,m − 1,m,m + 1}.
|
1203 |
+
(1) If we are playing in round t = 1+(5m)α+5β where β = 0, then the cops in these
|
1204 |
+
columns were played on vertices {(−2m + α + 1,m),(−2m + α + 2,m + 1),(−2m +
|
1205 |
+
α + 1 − m−1
|
1206 |
+
2 ,1)}.
|
1207 |
+
|
1208 |
+
24
|
1209 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
1210 |
+
(2) If we are playing in round t = 1 + (5m)α + 5β where 1 ≤ β ≤ m−1
|
1211 |
+
2 , then the cops
|
1212 |
+
in these columns were played on vertices {(−2m+α+1,m−1),(−2m+α+2,m+
|
1213 |
+
1),(−2m + α + 1 − m−1
|
1214 |
+
2 ,1)}.
|
1215 |
+
(3) If we are playing in round t = 1 + (5m)α + 5β where m+1
|
1216 |
+
2
|
1217 |
+
≤ β ≤ m − 1, then the
|
1218 |
+
cops in these columns were played on vertices {(−2m + α + 2,m),(−2m + α + 1 −
|
1219 |
+
m−1
|
1220 |
+
2 ,0),(−2m + α + 2 − m−1
|
1221 |
+
2 ,2)}.
|
1222 |
+
For each t ≡ 4 (mod 5), we describe which of these cops in A1 played on a column in
|
1223 |
+
{0,1,2,m − 1,m,m + 1}.
|
1224 |
+
(1) If we are playing in round t = 4 + (5m)α + 5β where 0 ≤ β ≤ m−1
|
1225 |
+
2 , then the
|
1226 |
+
cops in these columns were played on vertices {(−2m + α + 1,m),(−2m + α −
|
1227 |
+
m−1
|
1228 |
+
2 ,0),(−2m + α + 1 − m−1
|
1229 |
+
2 ,2)}.
|
1230 |
+
(2) If we are playing in round t = 4 + (5m)α + 5β where β = m+1
|
1231 |
+
2 , then the cops
|
1232 |
+
in these columns were played on vertices {(−2m + α + 1,m),(−2m + α + 2,m +
|
1233 |
+
1),(−2m + α + 1 − m−1
|
1234 |
+
2 ,1)}.
|
1235 |
+
(3) If we are playing in round t = 4 + (5m)α + 5β where m+1
|
1236 |
+
2
|
1237 |
+
≤ β ≤ m − 1, then the
|
1238 |
+
cops in these columns were played on vertices {(−2m − 1 + α + 1,m − 1),(−2m +
|
1239 |
+
α + 2,m + 1),(−2m + α + 1 − m−1
|
1240 |
+
2 ,1)}.
|
1241 |
+
Property 4: A cop on A1 plays on the vertex (i,j) during round t if and only if a
|
1242 |
+
cop on A2 plays on the vertex (i + m−1
|
1243 |
+
2 ,j + m) in round t + 1. As a consequence, for
|
1244 |
+
each of the vertices (i,j) with j ∈ {0,1,2} that were visited by a cop in A1 in round t as
|
1245 |
+
described above, the corresponding vertex (i′,j′) = (i + m−1
|
1246 |
+
2 ,j + m) in A2 was visited in
|
1247 |
+
round t + 1, where j′ ∈ {m,m + 1,m + 2}. Therefore, for every round, we can now derive
|
1248 |
+
which cops probed a vertex in column {m − 1,m,m + 1,m + 2}.
|
1249 |
+
This is relevant as only the cops playing in columns {m − 1,m,m + 1,m + 2} will
|
1250 |
+
impact the robber’s location on the border of A1 and A2. To simplify, take α = 2m. A
|
1251 |
+
similar argument follows for all other α. In Table 2, we describe exactly which vertices
|
1252 |
+
are probed by the cops on columns {m − 1,m,m + 1,m + 2} in rounds i + 5β + 5m(2m),
|
1253 |
+
where 0 ≤ β ≤ m − 1 and 1 ≤ i ≤ 5.
|
1254 |
+
i
|
1255 |
+
β = 0
|
1256 |
+
1 ≤ β ≤ m−1
|
1257 |
+
2
|
1258 |
+
β = m+1
|
1259 |
+
2
|
1260 |
+
m+1
|
1261 |
+
2
|
1262 |
+
≤ β ≤ m − 1
|
1263 |
+
1
|
1264 |
+
(1,m) (2,m + 1)
|
1265 |
+
(1,m − 1) (2,m + 1)
|
1266 |
+
(2,m)
|
1267 |
+
(2,m)
|
1268 |
+
2
|
1269 |
+
(1,m + 1)
|
1270 |
+
(1,m + 1)
|
1271 |
+
(1,m),(2,m + 2)
|
1272 |
+
(1,m) (2,m + 2)
|
1273 |
+
3
|
1274 |
+
4
|
1275 |
+
(1,m)
|
1276 |
+
(1,m)
|
1277 |
+
(1,m) (2,m + 1)
|
1278 |
+
(1,m − 1) (2,m + 1)
|
1279 |
+
5
|
1280 |
+
(0,m) (1,m + 2)
|
1281 |
+
(0,m) (1,m + 2)
|
1282 |
+
(1,m + 1)
|
1283 |
+
(1,m + 1)
|
1284 |
+
Table 2. The vertices in columns {m − 1,m,m + 1,m + 2} where a cop
|
1285 |
+
plays in round t = i + 5β + 5mα, where α = 2m.
|
1286 |
+
We may also analyze Claim 1 to find that if the robber is on a vertex (i,m) in
|
1287 |
+
column m that is in the forced region of A1 immediately after the cops move in round
|
1288 |
+
t = 1+5β +(5m)α, then i ≥ α−2m+3 if 0 ≤ β ≤ m−1
|
1289 |
+
2 , and i ≥ α−2m+4 if m+1
|
1290 |
+
2
|
1291 |
+
≤ β ≤ m−1.
|
1292 |
+
Similarly, after the cops move in round t = 4 + 5β + (5m)α, then i ≥ α − 2m + 3 for
|
1293 |
+
0 ≤ β ≤ m − 1.
|
1294 |
+
|
1295 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
1296 |
+
25
|
1297 |
+
If the robber is on a vertex (i,m + 1) in column m + 1 that is in the forced region of
|
1298 |
+
A2 immediately after the cops move in round t = 2 + 5β + (5m)α, then i ≥ α − 2m + 3.
|
1299 |
+
Similarly, after the cops move in round t = 5 + 5β + (5m)α, then i ≥ α − 2m + 2 if
|
1300 |
+
0 ≤ β ≤ m−1
|
1301 |
+
2 , and i ≥ α − 2m + 3 if m+1
|
1302 |
+
2
|
1303 |
+
≤ β ≤ m − 1.
|
1304 |
+
Let xt
|
1305 |
+
1 denote the smallest value of x such that a cop may be on (x,m) in round t in
|
1306 |
+
the forced region of A1, and let xt
|
1307 |
+
2 denote the smallest value of x such that a cop may be
|
1308 |
+
on (x,m+1) in round t in the forced region of A2. The robber may then move from the
|
1309 |
+
forced region of A1 onto a vertex not in the forced region of A2 only when xt
|
1310 |
+
1 ≤ xt
|
1311 |
+
2 + 2.
|
1312 |
+
Similarly, the robber may move from the forced region of A2 onto a vertex not in the
|
1313 |
+
forced region of A1 only when xt
|
1314 |
+
2 ≤ xt
|
1315 |
+
1 +2. We note that by the above analysis, this only
|
1316 |
+
occurs when t ≡ 1,4 (mod 5). In each of these rounds and for every possible move of
|
1317 |
+
the robber from a vertex of a forced region onto a vertex not in a forced region, there is
|
1318 |
+
a cop that prevents it by either being adjacent to the robber before or after their move.
|
1319 |
+
The complete list of such events is presented in Table 3 for the case α = 2m. The proof
|
1320 |
+
of Claim 2 follows.
|
1321 |
+
t ≡
|
1322 |
+
robber at t
|
1323 |
+
robber at t + 1
|
1324 |
+
capturing cop
|
1325 |
+
0 ≤ β ≤ m−1
|
1326 |
+
2
|
1327 |
+
1
|
1328 |
+
(1,m+1)
|
1329 |
+
(1,m)
|
1330 |
+
(2,m + 1) on round t
|
1331 |
+
4
|
1332 |
+
(1,m + 1)
|
1333 |
+
(1,m)
|
1334 |
+
(1,m) on round t
|
1335 |
+
β = m+1
|
1336 |
+
2
|
1337 |
+
1
|
1338 |
+
(1,m + 1)
|
1339 |
+
(1,m)
|
1340 |
+
(1,m) on round t + 1
|
1341 |
+
1
|
1342 |
+
(2,m+1)
|
1343 |
+
(2,m)
|
1344 |
+
(1,m) on round t + 1
|
1345 |
+
4
|
1346 |
+
(1,m + 1)
|
1347 |
+
(1,m)
|
1348 |
+
(1,m) on round t
|
1349 |
+
m+3
|
1350 |
+
2
|
1351 |
+
≤ β ≤ m − 1
|
1352 |
+
1
|
1353 |
+
(2,m + 1)
|
1354 |
+
(2,m)
|
1355 |
+
(2,m) on round t
|
1356 |
+
4
|
1357 |
+
(2,m + 1)
|
1358 |
+
(1,m + 1)
|
1359 |
+
(2,m + 1) on round t
|
1360 |
+
Table 3. In round t = i+5β +(5m)α with α = 2m, each possible robber
|
1361 |
+
move from the forced region of one Aj to the unforced region of the other
|
1362 |
+
Aj′ is represented as a row, with the corresponding cop that captures
|
1363 |
+
the robber if it performs this move.
|
1364 |
+
Claim 3: At most m + 3 cops are required to capture the robber on Gn,n.
|
1365 |
+
We now show that at most m + 3 cops are required to capture the robber on Gn,n,
|
1366 |
+
which proves Claim 3 and will complete the proof of the theorem. Recall that n = 5m−i
|
1367 |
+
for some 0 ≤ i ≤ 9. To capture the robber on Gn,n, the cops’ will observe and modify
|
1368 |
+
the strategy to capture the robber on the subgraph Gn,5m of G given in Claim 2.
|
1369 |
+
That is, suppose that the m + 3 cops play on vertices St in round t in G where the
|
1370 |
+
robber is restricted to Gn,5m. We further restrict the robber so that it can only be on
|
1371 |
+
Gn,n ⊆ Gn,5m. A simple modification to the cop moves St also ensures that the cops
|
1372 |
+
only play on the subset Gn,n of G. However, this game is identical to just playing on
|
1373 |
+
the graph Gn,n, and so is a winning strategy for m + 3 cops to capture the robber on
|
1374 |
+
Gn,n.
|
1375 |
+
We note that each cop outside of [0,n + 1] × [0,n + 1] will not affect the robber, since
|
1376 |
+
the robber is contained within the vertices [1,n]×[1,n] in all rounds. Delete all vertices
|
1377 |
+
in St that are not within [0,n + 1] × [0,n + 1]. This has no impact on capturing the
|
1378 |
+
robber.
|
1379 |
+
|
1380 |
+
26
|
1381 |
+
A. BONATO, T.G. MARBACH, M. MOLNAR, AND JD NIR
|
1382 |
+
Suppose (0,x) ∈ St. This cop clears only the vertex (1,x) in round t, and so it is a
|
1383 |
+
strictly better move for the cop to play on (1,x). We therefore, replace (0,x) ∈ St with
|
1384 |
+
(1,x) ∈ St. Similarly, we replace (n + 1,x) ∈ St with (n,x) ∈ St, replace (x,0) ∈ St with
|
1385 |
+
(x,1) ∈ St, and replace (x,n + 1) ∈ St with (x,n) ∈ St.
|
1386 |
+
The resulting cop moves are, therefore, strictly better at capturing the robber on
|
1387 |
+
Gn,n, but also have the robber contained within Gn,n. This completes the proof.
|
1388 |
+
□
|
1389 |
+
6. Conclusion and future directions
|
1390 |
+
We introduced the one-visibility localization number and proved asymptotically tight
|
1391 |
+
bounds on Cartesian grids and bounds on k-ary trees. We gave bounds for trees in terms
|
1392 |
+
of their order and depth. Determining a tree’s exact one-visibility localization number
|
1393 |
+
based on its structural features remains an open problem.
|
1394 |
+
The one-visibility localization number may be investigated in various graph families
|
1395 |
+
where the localization number has been studied, such as Kneser graphs, Latin square
|
1396 |
+
graphs, or the incidence graphs of projective planes and combinatorial designs. Our
|
1397 |
+
approach using isoperimetric inequalities should apply to the families of hypercubes,
|
1398 |
+
higher dimensional Cartesian grids, and strong grids.
|
1399 |
+
Another natural direction would be to consider the k-limited visibility Localization
|
1400 |
+
game for k > 1, with corresponding optimization parameter ζk. It would be interesting
|
1401 |
+
to find graphs G such ζi(G) ≠ ζj(G) for all distinct values of i and j that are at most
|
1402 |
+
the radius of G.
|
1403 |
+
7. Acknowledgements
|
1404 |
+
The authors were supported by NSERC.
|
1405 |
+
References
|
1406 |
+
[1] N. Alon, P. Seymour, R. Thomas, A separator theorem for nonplanar graphs, Journal of the
|
1407 |
+
American Mathematical Society 3 (1990) 801–808.
|
1408 |
+
[2] N.C. Behague, A. Bonato, M.A. Huggan, T.G. Marbach, B. Pittman, The localization capture time
|
1409 |
+
of a graph, Theoretical Computer Science 911 (2022) 80-91.
|
1410 |
+
[3] A. Bernshteyn, E. Lee, Searching for an intruder on graphs and their subdivisions, Electronic
|
1411 |
+
Journal of Combinatorics 29(3) (2022) P3.9.
|
1412 |
+
[4] S.L. Bezrukov, Edge isoperimetric problems on graphs, Bolyai Soc. Math. Stud. 7 (1999) 157–197.
|
1413 |
+
[5] B.V.S. Bharadwaj, L.S. Chandran, Bounds on isoperimetric values of trees, Discrete Mathematics
|
1414 |
+
textbf309 (2009) 834–842.
|
1415 |
+
[6] B. Bollob´as, I. Leader, Compressions and isoperimetric inequalities Journal of Combinatorial The-
|
1416 |
+
ory, Series A 56 (1991) 47–62.
|
1417 |
+
[7] A. Bonato, An Invitation to Pursuit-Evasion Games and Graph Theory, American Mathematical
|
1418 |
+
Society, Providence, Rhode Island, 2022.
|
1419 |
+
[8] A. Bonato, M.A. Huggan, T. Marbach, The localization number of designs, Journal of Combina-
|
1420 |
+
torial Designs 29 (2021) 175–192.
|
1421 |
+
[9] A. Bonato, M.A. Huggan, T. Marbach, The localization number and metric dimension of graphs
|
1422 |
+
of diameter 2, accepted to Contributions to Discrete Mathematics.
|
1423 |
+
[10] A. Bonato, W. Kinnersley, Bounds on the localization number, Journal of Graph Theory 94 (2020)
|
1424 |
+
1–18.
|
1425 |
+
[11] A. Bonato, R.J. Nowakowski, The Game of Cops and Robbers on Graphs, American Mathematical
|
1426 |
+
Society, Providence, Rhode Island, 2011.
|
1427 |
+
|
1428 |
+
THE ONE-VISIBILITY LOCALIZATION GAME
|
1429 |
+
27
|
1430 |
+
[12] B. Bosek, P. Gordinowicz, J. Grytczuk, N. Nisse, J. Sok´o�l, M. ´Sleszy´nska-Nowak, Localization
|
1431 |
+
game on geometric and planar graphs, Discrete Applied Mathematics 251 (2018) 30–39.
|
1432 |
+
[13] B. Bosek, P. Gordinowicz, J. Grytczuk, N. Nisse, J. Sok´o�l, M. ´Sleszy´nska-Nowak, Centroidal local-
|
1433 |
+
ization game, Electronic Journal of Combinatorics 25(4) (2018) P4.62.
|
1434 |
+
[14] A. Brandt, J. Diemunsch, C. Erbes, J. LeGrand, C. Moffatt, A robber locating strategy for trees,
|
1435 |
+
Discrete Applied Mathematics 232 (2017) 99–106.
|
1436 |
+
[15] J. Carraher, I. Choi, M. Delcourt, L.H. Erickson, D.B. West, Locating a robber on a graph via
|
1437 |
+
distance queries, Theoretical Computer Science 463 (2012) 54–61.
|
1438 |
+
[16] N.E. Clarke, D. Cox, C. Duffy, D. Dyer, S.L. Fitzpatrick, M.E. Messinger, Limited visibility Cops
|
1439 |
+
and Robber, Discrete Applied Mathematics 282 (2020) 53–64.
|
1440 |
+
[17] D. Dereniowski, D. Dyer, R. Tifenbach, B. Yang, Zero-visibility cops & robber and the pathwidth
|
1441 |
+
of a graph, Journal of Combinatorial Optimization 29 (2015) 541–564.
|
1442 |
+
[18] D. Dereniowski, D. Dyer, B. Yang, The complexity of zero-visibility cops and robber, Theoretical
|
1443 |
+
Computer Science 607 (2015) 135–148.
|
1444 |
+
[19] P. Hrubevs, A. Yehudayoff, On isoperimetric profiles and computational complexity, 43rd Interna-
|
1445 |
+
tional Colloquium on Automata, Languages, and Programming (ICALP 2016) 55 (2016) 89:1–89:12.
|
1446 |
+
[20] Y. Otachi, K. Yamazaki, A lower bound for the vertex boundary-width of complete k-ary trees,
|
1447 |
+
Discrete Mathematics 308 2389–2395.
|
1448 |
+
[21] S. Seager, Locating a robber on a graph, Discrete Mathematics 312 (2012) 3265–3269.
|
1449 |
+
[22] S. Seager, Locating a backtracking robber on a tree, Theoretical Computer Science 539 (2014)
|
1450 |
+
28–37.
|
1451 |
+
[23] R. Tovsi´c, Vertex-to-vertex search in a graph, In: Proceedings of the Sixth Yugoslav Seminar on
|
1452 |
+
Graph Theory, Dubrovnik (1985) 233–237.
|
1453 |
+
[24] I. Vrt’o, A note on isoperimetric peaks of complete trees, Discrete Mathematics 310 (2010) 1272–
|
1454 |
+
1274.
|
1455 |
+
[25] D.B. West, Introduction to Graph Theory, 2nd edition, Prentice Hall, 2001.
|
1456 |
+
[26] B.T. Yang, T. Akter, One-visibility cops and robber on trees, Theoretical Computer Science 886
|
1457 |
+
(2021) 139–156.
|
1458 |
+
[27] B.T. Yang, One-visibility cops and robber on trees: optimal cop-win strategies, Theoretical Com-
|
1459 |
+
puter Science 928 (2022) 27–47.
|
1460 |
+
[28] B.T. Yang, Computing the one-visibility cop-win strategies for trees, Combinatorial optimization
|
1461 |
+
and applications Lecture Notes in Comput. Sci., 13135 (2021) 125–139.
|
1462 |
+
(A1,A2,A3,A4) Toronto Metropolitan University, Toronto, Canada
|
1463 |
+
Email address, A1: (A1) [email protected]
|
1464 |
+
Email address, A2: (A2) [email protected]
|
1465 |
+
Email address, A3: (A3) [email protected]
|
1466 |
+
Email address, A4: (A4) [email protected]
|
1467 |
+
|
79E1T4oBgHgl3EQf7gUu/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
7dE4T4oBgHgl3EQfcww5/content/2301.05085v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:191bf91e21c378bc7fe6fe54720d9ae582e5a728c5aae4d37f08b08f4c1512fd
|
3 |
+
size 947446
|
7dE4T4oBgHgl3EQfcww5/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:11cf8c00339a85d09f2e05b5036e0cf6a15ebc2ab805a8ae95c93ea93a568eca
|
3 |
+
size 3473453
|
7dE4T4oBgHgl3EQfcww5/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7a781f5279023d0f322dfa98bb77b5656f01a5e122d044b3ba1f55e3384b7b1e
|
3 |
+
size 128306
|
89E4T4oBgHgl3EQf3A3O/content/tmp_files/2301.05303v1.pdf.txt
ADDED
@@ -0,0 +1,1837 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.05303v1 [eess.SY] 12 Jan 2023
|
2 |
+
1
|
3 |
+
Probabilistic Constraint Construction for
|
4 |
+
Network-safe Load Coordination
|
5 |
+
Sunho Jang, Student Member, IEEE, Necmiye Ozay, Senior Member, IEEE,
|
6 |
+
Johanna L. Mathieu, Senior Member, IEEE
|
7 |
+
Abstract—Distributed Energy Resources (DERs) can provide
|
8 |
+
balancing services to the grid, but their power variations might
|
9 |
+
cause voltage and current constraint violations in the distribution
|
10 |
+
network, compromising network safety. This could be avoided by
|
11 |
+
including network constraints within DER control formulations,
|
12 |
+
but the entities coordinating DERs (e.g., aggregators) may not
|
13 |
+
have access to network information, which typically is known only
|
14 |
+
to the utility. Therefore, it is challenging to develop network-safe
|
15 |
+
DER control algorithms when the aggregator is not the utility;
|
16 |
+
it requires these entities to coordinate with each other. In this
|
17 |
+
paper, we develop an aggregator-utility coordination framework
|
18 |
+
that enables network-safe control of thermostatically-controlled
|
19 |
+
loads to provide frequency regulation. In our framework, the
|
20 |
+
utility sends a network-safe constraint set on the aggregator’s
|
21 |
+
command without directly sharing any network information. We
|
22 |
+
propose a constraint set construction algorithm that guarantees
|
23 |
+
satisfaction of a chance constraint on network safety. Assuming
|
24 |
+
monotonicity of the probability of network safety with respect
|
25 |
+
to the aggregator’s command, we leverage the bisection method
|
26 |
+
to find the largest possible constraint set, providing maximum
|
27 |
+
flexibility to the aggregator. Simulations show that, compared to
|
28 |
+
two benchmark algorithms, the proposed approach provides a
|
29 |
+
good balance between service quality and network safety.
|
30 |
+
Index Terms—chance constraints, distributed energy resources,
|
31 |
+
load control, network safety, thermostatically-controlled loads
|
32 |
+
I. INTRODUCTION
|
33 |
+
A
|
34 |
+
S the amount of intermittent renewable generation is
|
35 |
+
rapidly growing, it is becoming more difficult to rely
|
36 |
+
solely on the conventional ways of balancing power systems.
|
37 |
+
One emerging solution is to leverage Distributed Energy
|
38 |
+
Resources (DERs), such as thermostatically-controlled loads
|
39 |
+
(TCLs), batteries, and electric vehicles, to provide grid ser-
|
40 |
+
vices. By doing so, they can improve the reliability, and
|
41 |
+
reduce the operating cost and environmental impact of power
|
42 |
+
systems. However, DERs coordinated to provide balancing
|
43 |
+
services might cause issues in the distribution network, such as
|
44 |
+
under/over-voltages, over-current violations, and transformer
|
45 |
+
overheating, compromising network safety.
|
46 |
+
When the distribution network operator (i.e., the utility)
|
47 |
+
coordinates DERs to provide grid services it can adopt a cen-
|
48 |
+
tralized algorithm that explicitly manages distribution network
|
49 |
+
constraints, e.g., the algorithms provided in [1]–[3]. However,
|
50 |
+
in competitive U.S. electricity markets it is becoming more
|
51 |
+
likely that third-party (i.e., non-utility) DER aggregators will
|
52 |
+
take on this role. Unfortunately, the aggregator does not have
|
53 |
+
This work was supported by U.S. National Science Foundation Award
|
54 |
+
CNS-1837680. The authors are with the Department of Electrical Engineering
|
55 |
+
and Computer Science, University of Michigan, Ann Arbor, MI 48109 USA
|
56 |
+
{sunhoj,necmiye,jlmath}@umich.edu.
|
57 |
+
access to detailed distribution network information typically
|
58 |
+
known only to the utility, and so it is unable to directly de-
|
59 |
+
termine how its actions would affect the distribution network.
|
60 |
+
This challenge has already been recognized by the US Federal
|
61 |
+
Energy Regulatory Commission (FERC) [4].
|
62 |
+
Thus, there is a need for coordination between the aggrega-
|
63 |
+
tor and the utility to ensure network-safe operation of DERs.
|
64 |
+
The recent FERC Order No. 2222 [5] provided some guidance
|
65 |
+
on the development of operational coordination architectures
|
66 |
+
between DER aggregators, utilities, and market coordinators;
|
67 |
+
however, it is still unclear how these architectures will evolve
|
68 |
+
and which architecture is “best.” Beyond ensuring network
|
69 |
+
safety, coordination architectures should also 1) ensure that
|
70 |
+
each entity’s private information (e.g., sensitive network in-
|
71 |
+
formation held by the utility, proprietary DER coordination
|
72 |
+
strategies held by the aggregator, and private DER state
|
73 |
+
information held by the DERs’ end-users) is not shared with
|
74 |
+
the other entities and 2) communication between the entities
|
75 |
+
is minimal for compatibility with current communications
|
76 |
+
infrastructure and/or to reduce the cost of any newly required
|
77 |
+
infrastructure. Furthermore, architectures need to specify coor-
|
78 |
+
dination protocols on different timescales, for example, 1) for
|
79 |
+
operational planning such that the aggregator can determine
|
80 |
+
its offer for balancing services, and 2) for real-time control
|
81 |
+
in case network conditions differ significantly from forecasts
|
82 |
+
and aggregator actions need to be curtailed.
|
83 |
+
In this paper, we propose an aggregator-utility coordination
|
84 |
+
framework for a collection of TCLs to provide balancing
|
85 |
+
services like frequency regulation while ensuring distribution
|
86 |
+
network-safety with high probability. We focus on real-time
|
87 |
+
coordination, specifically, a setting in which an aggregator is
|
88 |
+
already committed to provide a certain amount of balancing
|
89 |
+
services, but real-time distribution network conditions require
|
90 |
+
curtailment of those services. In our framework, the utility
|
91 |
+
sends the aggregator a one-step ahead constraint set on the
|
92 |
+
aggregator’s control input, which guarantees the satisfaction of
|
93 |
+
a chance constraint on network safety with a certain confidence
|
94 |
+
level. This method leverages estimation from Monte Carlo
|
95 |
+
simulation and the bisection method to provide the largest
|
96 |
+
possible constraint set to maximize the network-safe TCL
|
97 |
+
flexibility. To achieve light communication requirements, the
|
98 |
+
aggregator control algorithm assumes the TCLs all respond to
|
99 |
+
the same scalar control input. This constrains the aggregator’s
|
100 |
+
degrees-of-freedom but also makes it possible for the utility
|
101 |
+
to define a simple constraint set on the control input.
|
102 |
+
Previous work, e.g. [6]–[9], has proposed strategies to con-
|
103 |
+
trol aggregations of TCLs, such as air conditioners and water
|
104 |
+
|
105 |
+
2
|
106 |
+
heaters, to provide balancing services in ways that are non-
|
107 |
+
disruptive to end-users. TCLs have inherent thermal energy
|
108 |
+
storage capacity and non-disruptiveness can be achieved, e.g.,
|
109 |
+
by keeping internal temperatures inside a narrow temperature
|
110 |
+
dead-band. However, network safety was not considered in the
|
111 |
+
above papers. Some work has developed network-safe control
|
112 |
+
algorithms for TCLs coordinated by third-party aggregators.
|
113 |
+
Ref. [10] proposes both a utility-centric and an aggregator-
|
114 |
+
centric coordination framework, differentiated by which entity
|
115 |
+
ultimately sends control commands to the TCLs. That paper
|
116 |
+
and [11] develop utility-centric strategies wherein the utility
|
117 |
+
blocks aggregator’s commands that would otherwise cause net-
|
118 |
+
work constraint violations. In contrast, our proposed approach
|
119 |
+
would be considered aggregator-centric.
|
120 |
+
Aggregator-centric network-safe DER coordination could
|
121 |
+
be achieved through (convex) inner approximation of safe
|
122 |
+
operating regions [12]–[14], which could be computed by the
|
123 |
+
utility and sent to the aggregator as constraints on the net
|
124 |
+
DER power deviations at each node. Research from Australia
|
125 |
+
refers to these nodal constraints as operating envelopes [15]–
|
126 |
+
[17]. Ref. [18] proposes an optimization problem to obtain a
|
127 |
+
hyper-rectangular constraint set on the net power consumption
|
128 |
+
of controllable DERs at each node in order to satisfy chance
|
129 |
+
constraints on the voltage at each node. However, these
|
130 |
+
approaches all require constraints to be applied at each node,
|
131 |
+
rather than applying a constraint on aggregate power devia-
|
132 |
+
tions by DERs located across a network. Ref. [19] proposes a
|
133 |
+
method to constrain the norm of the power deviations across
|
134 |
+
all nodes in the network, but requires significant computation
|
135 |
+
to compute the constraint. Assuming an aggregate power
|
136 |
+
deviation constraint exists, our previous work [20] develops an
|
137 |
+
aggregator-centric TCL coordination algorithm using formal
|
138 |
+
methods, but does not develop an approach to obtain the
|
139 |
+
constraint, and the solutions are very conservative.
|
140 |
+
In contrast to this previous work, this paper makes the
|
141 |
+
following contributions: 1) we develop a new aggregator-
|
142 |
+
centric approach to enable network-safe control of TCLs for
|
143 |
+
balancing services; 2) assuming a simple control scheme that
|
144 |
+
leverages a scalar control input to coordinate TCLs to provide
|
145 |
+
balancing services (the aggregator’s algorithm), we develop
|
146 |
+
an approach to constrain the control input to satisfy a chance
|
147 |
+
constraint on network safety (the utility’s algorithm); and
|
148 |
+
3) we demonstrate our approach in simulation and compare
|
149 |
+
its performance to two benchmark approaches. In contrast to
|
150 |
+
past work on network-safe control that assumes the system is
|
151 |
+
deterministic, e.g., [19], here we consider uncertainty in the
|
152 |
+
power consumption of non-participating loads. Furthermore,
|
153 |
+
in contrast to [20], we assume the aggregator has incomplete
|
154 |
+
information about the TCLs to reduce communication require-
|
155 |
+
ments and preserve some level of privacy. Lastly, though some
|
156 |
+
past work leveraged chance constraints to develop network-
|
157 |
+
safe DER coordination approaches, e.g., [18], [21]–[26], these
|
158 |
+
papers all assume that the controller has detailed distribution
|
159 |
+
network information (enabling the formulation of a chance-
|
160 |
+
constrained optimal power flow problem), which is inconsis-
|
161 |
+
tent with our utility-aggregator coordination framework.
|
162 |
+
The organization of the paper is as follows. Section II
|
163 |
+
introduces the coordination framework and problem of in-
|
164 |
+
terest. Section III explains the aggregator’s control approach
|
165 |
+
and Section IV details the proposed constraint construction
|
166 |
+
algorithm used by the utility to achieve network safety at
|
167 |
+
a high level of probability. Section V presents the results
|
168 |
+
of a case study comparing the proposed approach to two
|
169 |
+
benchmarks. The appendix includes proofs of two of the
|
170 |
+
theorems.
|
171 |
+
Notation: N, [N], [N]0 are the set of natural num-
|
172 |
+
bers, {1, . . ., N}, and {0, 1, . . ., N}, respectively. The n-
|
173 |
+
dimensional Euclidean space is Rn. The jth element of the
|
174 |
+
vector y is yj. Binomial distribution B(ns, ν) has ns trials,
|
175 |
+
each with success probability ν, and cumulative density func-
|
176 |
+
tion (cdf) FB(x; ns, ν). N(µ, σ2) is the normal distribution
|
177 |
+
with mean µ and variance σ2. Function
|
178 |
+
1(A) is 1 if A is
|
179 |
+
true, and 0 otherwise. All random variables are capitalized
|
180 |
+
English letters, e.g., X, with realizations denoted ˜x and esti-
|
181 |
+
mates/approximates denoted ˆx. All other variables are denoted
|
182 |
+
by symbols other than capitalized English letters. Vectors and
|
183 |
+
matrices are bolded.
|
184 |
+
II. FRAMEWORK & PROBLEM OF INTEREST
|
185 |
+
We consider a framework in which a utility and aggregator
|
186 |
+
coordinate to provide network-safe grid balancing services,
|
187 |
+
e.g., frequency regulation, by aggregations of TCLs. TCLs
|
188 |
+
switch ON/OFF to maintain temperature within a dead-band.
|
189 |
+
We focus on real-time coordination, i.e., we assume that the
|
190 |
+
aggregator has already participated in the ancillary services
|
191 |
+
market and committed balancing service capacity to the in-
|
192 |
+
dependent system operator (ISO). The amount of balancing
|
193 |
+
service capacity offered by the aggregator was based on
|
194 |
+
forecasts of the capabilities of the TCLs and the network state.
|
195 |
+
However, the real-time network state differs significantly from
|
196 |
+
its forecasts and so the committed balancing service capacity
|
197 |
+
must be curtailed to avoid distribution network constraint
|
198 |
+
violations. This could happen when load consumption and/or
|
199 |
+
renewable power injections are significantly different from
|
200 |
+
forecasts and the network is operating close to its limits.
|
201 |
+
We assume that the following coordination steps occur at
|
202 |
+
each discrete time step t, where the length of each time step
|
203 |
+
is ∆t. The coordination scheme is shown in Fig. 1.
|
204 |
+
1) The aggregator receives a constraint set U(t) from the
|
205 |
+
utility and a reference signal pref(t) (e.g., a scaled and
|
206 |
+
biased frequency regulation signal) from the ISO.
|
207 |
+
2) The aggregator determines the control command u(t) ∈
|
208 |
+
U(t) and broadcasts the same command to all TCLs.
|
209 |
+
3) Each TCL maintains or switches its ON/OFF mode based
|
210 |
+
on its temperature and the aggregator’s command u(t).
|
211 |
+
4) The utility observes the real and reactive power consump-
|
212 |
+
tion at each network node p(t) and q(t), and obtains
|
213 |
+
some information from the aggregator (described below).
|
214 |
+
Then, it constructs a one-step ahead constraint set U(t+1)
|
215 |
+
and sends it to the aggregator. (And go back to step 1.)
|
216 |
+
The aggregator’s goal is to select u(t) to maximize the
|
217 |
+
quality of grid balancing services. This means that the aggre-
|
218 |
+
gator should choose a command u(t) that is likely to adjust
|
219 |
+
the aggregate power of the TCLs to match the reference
|
220 |
+
signal pref(t) as closely as possible. Here, we assume the
|
221 |
+
|
222 |
+
3
|
223 |
+
Fig. 1. Coordination between the aggregator, utility, and the TCLs.
|
224 |
+
aggregator’s command u(t) is a real scalar in the range [−1, 1]
|
225 |
+
and is interpreted by each TCL as the probability it should
|
226 |
+
switch modes; the details of how it switches are given in
|
227 |
+
Section III. TCL coordination through probabilistic switching
|
228 |
+
has been considered in previous work e.g., [6], [10]. An
|
229 |
+
advantage of this type of command is that it only needs simple
|
230 |
+
broadcast communication infrastructure. However, it does not
|
231 |
+
allow the aggregator to directly adjust the power consumption
|
232 |
+
of individual TCLs, which means that the aggregator has a
|
233 |
+
low degree-of-freedom in control.
|
234 |
+
Since the aggregator does not have detailed distribution
|
235 |
+
network information and cannot evaluate how its command
|
236 |
+
would affect the network, the utility sends a one-step ahead
|
237 |
+
constraint set U(t+1) on the aggregator’s command u(t+1).
|
238 |
+
This set U(t+1) is designed such that, if u(t+1) ∈ U(t+1),
|
239 |
+
then probability of network safety is over a desired value 1−ǫ.
|
240 |
+
We propose a method for the utility to compute U(t + 1) in
|
241 |
+
Section IV, which is the main contribution of this work. To
|
242 |
+
do this, the utility leverages:
|
243 |
+
1) Real-time data from household smart meters to obtain
|
244 |
+
the real and reactive power consumption at each node, p(t)
|
245 |
+
and q(t). We recognize that in practice most utilities do not
|
246 |
+
currently gather smart meter data in real-time, but this is
|
247 |
+
possible with most existing smart meters and could be enabled
|
248 |
+
through reconfiguration of their settings.
|
249 |
+
2) Forecasts of the probability distributions of the one-
|
250 |
+
step ahead real and reactive power consumption of non-
|
251 |
+
participating loads at each node, P L(t+1) and QL(t+1). We
|
252 |
+
assume that these distributions are estimated using historical
|
253 |
+
and real-time data from household smart meters, and lever-
|
254 |
+
aging a disaggregation technique [27] to separate the power
|
255 |
+
consumption of the TCLs from that of the non-participating
|
256 |
+
loads. We assume that P L(t) and QL(t) are correlated and
|
257 |
+
fP L,QL(t) is their joint probability density function (pdf).
|
258 |
+
3) Some real-time TCL information from the aggregator
|
259 |
+
that is necessary for constraint set computation. This should
|
260 |
+
be minimal to protect end-user privacy. In our framework, the
|
261 |
+
aggregator provides the one-step ahead estimated fractions of
|
262 |
+
TCLs that will be outside of their temperature dead-band and
|
263 |
+
switched OFF-to-ON and ON-to-OFF by their thermostats,
|
264 |
+
ˆ
|
265 |
+
wON(t + 1) and ˆ
|
266 |
+
wOFF(t + 1). Details on how this information
|
267 |
+
is used are provided in Section IV-A.
|
268 |
+
In this paper, for the sake of simplicity, we define network
|
269 |
+
safety in terms of under-voltage violations. Specifically, we
|
270 |
+
say that the network is safe if there are no under-voltage
|
271 |
+
violations, and unsafe if there are any violations. The approach
|
272 |
+
can be easily extended to include over-voltage violations and
|
273 |
+
other distribution network constraint violations. The formal
|
274 |
+
statement problem is as follows.
|
275 |
+
Problem 1. Given the desired safety probability 1−ǫ, the real-
|
276 |
+
time real and reactive power consumption at each node p(t)
|
277 |
+
and q(t), the joint pdfs of the uncontrollable loads fP L,QL(t),
|
278 |
+
fP L,QL(t + 1), and the fractions of TCLs that are outside of
|
279 |
+
their dead-band wON(t + 1), wOFF(t + 1), find a one-step
|
280 |
+
ahead constraint set U(t + 1) such that the following chance
|
281 |
+
constraint holds if u(t + 1) ∈ U(t + 1),
|
282 |
+
Pr
|
283 |
+
�
|
284 |
+
min
|
285 |
+
j∈[n] Vj(t + 1) ≥ v
|
286 |
+
�
|
287 |
+
≥ 1 − ǫ,
|
288 |
+
(1)
|
289 |
+
where v is the lower bound on each of the nodal voltages Vj
|
290 |
+
and n is the number of nodes other than the substation.
|
291 |
+
To solve this problem, we define the one-time step ahead
|
292 |
+
voltage at each node Vj(t + 1) as a random variable whose
|
293 |
+
distribution depends on the command u(t + 1); the details are
|
294 |
+
explained in Section IV. It is difficult to obtain a closed-form
|
295 |
+
expression for the probability distribution of each Vj(t + 1).
|
296 |
+
Therefore, our approach leverages Monte Carlo simulation to
|
297 |
+
estimate the left side of (1) given a one-step ahead command
|
298 |
+
u(t + 1). Since estimation from sampling leads to error, we
|
299 |
+
find a constraint set U(t + 1) with a confidence level over a
|
300 |
+
desired level 1 − β rather than giving an exact solution.
|
301 |
+
III. AGGREGATOR’S CONTROL APPROACH
|
302 |
+
In this section, we explain how the TCLs operate under the
|
303 |
+
aggregator’s command u(t). For simplicity, we assume that all
|
304 |
+
participating TCLs are cooling TCLs (e.g., air conditioners),
|
305 |
+
though the approach also applies to heating TCLs. We denote
|
306 |
+
by nTCL the vector whose element nTCL
|
307 |
+
j
|
308 |
+
is the number of
|
309 |
+
participating TCLs at node j, and by nTCL := 1⊤nTCL the total
|
310 |
+
number of participating TCLs, which satisfies �n
|
311 |
+
j=1 nTCL
|
312 |
+
j
|
313 |
+
=
|
314 |
+
nTCL. The internal temperature of the ith TCL at time t is
|
315 |
+
denoted by θi(t) and its mode is denoted by mi(t), which
|
316 |
+
is 0 when it is OFF, and 1 when it is ON. The temperature
|
317 |
+
dynamics of the ith TCL follow the affine model from [28],
|
318 |
+
θi(t + 1) = ai
|
319 |
+
thθi(t) +
|
320 |
+
�
|
321 |
+
1 − ai
|
322 |
+
th
|
323 |
+
� �
|
324 |
+
θi
|
325 |
+
a(t) + ri
|
326 |
+
thpi
|
327 |
+
trmi(t)
|
328 |
+
�
|
329 |
+
,
|
330 |
+
(2)
|
331 |
+
where
|
332 |
+
θi
|
333 |
+
a(t)
|
334 |
+
is
|
335 |
+
the
|
336 |
+
ambient
|
337 |
+
temperature
|
338 |
+
and
|
339 |
+
ai
|
340 |
+
th
|
341 |
+
=
|
342 |
+
exp(−∆t/(ri
|
343 |
+
thci
|
344 |
+
th)) is a parameter computed from the thermal
|
345 |
+
resistance ri
|
346 |
+
th and capacitance ci
|
347 |
+
th of the ith TCL. Also, pi
|
348 |
+
tr is
|
349 |
+
the energy transfer rate of the ith TCL, which is negative for
|
350 |
+
a cooling TCL. The power consumption of the ith TCL in the
|
351 |
+
ON mode is pi := pi
|
352 |
+
tr/ζi where ζi is the coefficient of per-
|
353 |
+
formance; the power consumption in the OFF mode is 0. We
|
354 |
+
assume that the reactive power consumption of the ith TCL is
|
355 |
+
qi := ωipi, where ωi is a positive constant. The aggregate real
|
356 |
+
power consumption of the TCLs is pagg(t) := �nTCL
|
357 |
+
i=1 pimi(t).
|
358 |
+
Each TCL has a temperature range [θi, θ
|
359 |
+
i] within which its
|
360 |
+
internal temperature should always be; this range is called the
|
361 |
+
temperature dead-band. The temperature set-point, which is
|
362 |
+
set by its end-user, θi
|
363 |
+
s := (θi + θ
|
364 |
+
i)/2 is the middle point of
|
365 |
+
the dead-band. Whenever a TCL’s internal temperature reaches
|
366 |
+
|
367 |
+
Input
|
368 |
+
Reference
|
369 |
+
Constraints
|
370 |
+
Signal
|
371 |
+
Utility
|
372 |
+
Aggregator
|
373 |
+
Network
|
374 |
+
Aggregate
|
375 |
+
Probabilistic
|
376 |
+
information
|
377 |
+
Power
|
378 |
+
Input
|
379 |
+
TCL
|
380 |
+
TCL
|
381 |
+
TCL
|
382 |
+
Distribution
|
383 |
+
1
|
384 |
+
2
|
385 |
+
NT
|
386 |
+
Network
|
387 |
+
Aggregate TCLs4
|
388 |
+
or goes beyond the boundary of its dead-band it switches its
|
389 |
+
mode to go back into the dead-band.
|
390 |
+
At each time step t, the aggregator determines its command
|
391 |
+
u(t) and broadcasts it to all participating TCLs. TCLs within
|
392 |
+
their dead-bands interpret this command as the desired prob-
|
393 |
+
ability of OFF TCLs to switch ON when u(t) > 0, and the
|
394 |
+
desired probability of ON TCLs to switch OFF when u(t) < 0.
|
395 |
+
To determine whether or not to switch, each TCL draws a
|
396 |
+
random number zi(t) from the uniform distribution on the
|
397 |
+
interval [0, 1) and compares it to the command u(t). If it is
|
398 |
+
OFF and zi(t) ≤ u(t), then it switches ON. If it is ON and
|
399 |
+
zi(t) ≤ −u(t), then it switches OFF.
|
400 |
+
In summary, the mode of the ith TCL is
|
401 |
+
mi(t) =
|
402 |
+
|
403 |
+
|
404 |
+
|
405 |
+
|
406 |
+
|
407 |
+
1
|
408 |
+
if θi(t) ≥ θ
|
409 |
+
i
|
410 |
+
0
|
411 |
+
if θi(t) ≤ θi
|
412 |
+
mc(zi(t), u(t))
|
413 |
+
otherwise,
|
414 |
+
(3)
|
415 |
+
where mc(zi(t), u(t)) is equal to
|
416 |
+
|
417 |
+
|
418 |
+
|
419 |
+
|
420 |
+
|
421 |
+
1
|
422 |
+
if mi(t − 1) = 0 and zi(t) ≤ u(t)
|
423 |
+
0
|
424 |
+
if mi(t − 1) = 1 and zi(t) ≤ −u(t)
|
425 |
+
mi(t − 1)
|
426 |
+
otherwise.
|
427 |
+
Note that, when positive (negative) u(t) is broadcast to
|
428 |
+
the TCLs, the fraction of the OFF (ON) TCLs within their
|
429 |
+
dead-bands that are switched is approximately u(t) (−u(t)).
|
430 |
+
Thus, |u(t)| can be interpreted by the aggregator as the ratio
|
431 |
+
of the power consumption increase (decrease) compared to
|
432 |
+
the maximal increase (decrease). Therefore, even though the
|
433 |
+
power consumption of each TCL is not directly controlled
|
434 |
+
by the aggregator, the aggregator can manipulate pagg(t) by
|
435 |
+
selecting the u(t) ∈ U(t) that is likely to adjust pagg(t) to
|
436 |
+
match the reference signal pref(t) as closely as possible, i.e.,
|
437 |
+
uopt(t) = arg min
|
438 |
+
u∈U(t)
|
439 |
+
|E [Pagg(t)] − pref(t)| ,
|
440 |
+
(4)
|
441 |
+
where U(t) is provided by the utility.
|
442 |
+
IV. UTILITY’S CONSTRAINT CONSTRUCTION METHOD
|
443 |
+
As mentioned in Section II, the utility computes a one-step
|
444 |
+
ahead constraint set U(t + 1), which should be a solution to
|
445 |
+
Problem 1. This requires the utility to be able to evaluate
|
446 |
+
how the command u(t + 1) would affect the probability of
|
447 |
+
network safety. In this section, we first show how the voltage
|
448 |
+
at each node is modeled as a random variable. For ease
|
449 |
+
of exposition, we consider only balanced radial distribution
|
450 |
+
networks. Then, we derive the probability of network safety
|
451 |
+
(i.e., the probability that no under-voltage violations happen)
|
452 |
+
as a function of the command u(t + 1) = u.
|
453 |
+
Next, we show how to verify whether or not the chance
|
454 |
+
constraint (1) is satisfied under u(t + 1) = u with a desired
|
455 |
+
confidence level, and how the utility can construct U(t+1) to
|
456 |
+
ensure (1) is satisfied. We introduce a theorem establishing a
|
457 |
+
confidence interval for the success probability of a Bernoulli
|
458 |
+
random variable using Monte Carlo simulations. Using this
|
459 |
+
result, we leverage the bisection method to find the largest
|
460 |
+
upper bound on u(t + 1) that guarantees (1) with a desired
|
461 |
+
confidence level. The largest upper bound gives the aggregator
|
462 |
+
the greatest possible flexibility in determining its command.
|
463 |
+
A. Modeling the probability of network safety
|
464 |
+
We denote the real and reactive power consumption of
|
465 |
+
participating TCLs across all nodes by P T(t) and QT(t) ∈ Rn.
|
466 |
+
The utility approximates the nodal values as
|
467 |
+
P T
|
468 |
+
j (t) ≈ pjN ON
|
469 |
+
j
|
470 |
+
(t), QT
|
471 |
+
j (t) ≈ qjN ON
|
472 |
+
j
|
473 |
+
(t)
|
474 |
+
∀j ∈ [n],
|
475 |
+
(5)
|
476 |
+
where N ON
|
477 |
+
j
|
478 |
+
(t) and N OFF
|
479 |
+
j
|
480 |
+
(t) are the number of ON and OFF
|
481 |
+
TCLs at node j, and pj and qj are the average real and reactive
|
482 |
+
power rating (i.e., the ON-mode consumption) of the TCLs at
|
483 |
+
node j. We additionally define diagonal matrices Ξp and Ξq ∈
|
484 |
+
Rn×n whose jth diagonal elements are pj and qj, respectively.
|
485 |
+
Then, P T(t) = ΞpN ON(t) and QT(t) = ΞqN ON(t), and the
|
486 |
+
total real and reactive power consumption across all nodes is
|
487 |
+
P (t) = ΞpN ON(t) + P L(t) and Q(t) = ΞqN ON(t) + QL(t).
|
488 |
+
We first show how the one-step ahead number of ON TCLs
|
489 |
+
N ON(t + 1) ∈ Rn is modeled as a random variable under the
|
490 |
+
command u(t+1) = u. The number N ON(t+1) depends upon
|
491 |
+
how many TCLs are switched both by their thermostat (i.e., the
|
492 |
+
first and second cases of (3)) and by the aggregator’s command
|
493 |
+
(i.e., the third case of (3)). The number of TCLs at each node
|
494 |
+
j that will be switched ON, OFF by their thermostats is
|
495 |
+
SON
|
496 |
+
j (t + 1) = wON
|
497 |
+
j (t + 1)N OFF
|
498 |
+
j
|
499 |
+
(t),
|
500 |
+
SOFF
|
501 |
+
j
|
502 |
+
(t + 1) = wOFF
|
503 |
+
j
|
504 |
+
(t + 1)N ON
|
505 |
+
j
|
506 |
+
(t),
|
507 |
+
(6)
|
508 |
+
where, as defined in Section II, wON
|
509 |
+
j
|
510 |
+
(t + 1) is the one-step
|
511 |
+
ahead fraction of OFF TCLs that will be switched ON and
|
512 |
+
wOFF
|
513 |
+
j
|
514 |
+
(t + 1) is the one-step ahead fraction of ON TCLs that
|
515 |
+
will be switched OFF by their thermostats at bus j. We assume
|
516 |
+
that the aggregator estimates wON
|
517 |
+
j (t + 1) and wOFF
|
518 |
+
j
|
519 |
+
(t + 1)
|
520 |
+
using a model of the aggregate TCL dynamics and sends
|
521 |
+
the estimated values ˆwON
|
522 |
+
j (t + 1) and ˆwOFF
|
523 |
+
j
|
524 |
+
(t + 1) to the
|
525 |
+
utility, which corresponds to the TCL information illustrated
|
526 |
+
in Fig. 1. The utility uses these estimates to obtain realizations
|
527 |
+
of SON
|
528 |
+
j (t + 1) and SOFF
|
529 |
+
j
|
530 |
+
(t + 1) via Monte Carlo simulation,
|
531 |
+
which will be explained in Section IV-B.
|
532 |
+
According to (3), the numbers of TCLs at each node j that
|
533 |
+
will be switched ON and OFF by the aggregator’s command
|
534 |
+
follow binomial distributions,
|
535 |
+
CON
|
536 |
+
u,j(t + 1) ∼ B
|
537 |
+
�
|
538 |
+
N OFF
|
539 |
+
j
|
540 |
+
(t) − SON
|
541 |
+
j (t + 1), u+�
|
542 |
+
,
|
543 |
+
COFF
|
544 |
+
u,j (t + 1) ∼ B
|
545 |
+
�
|
546 |
+
N ON
|
547 |
+
j
|
548 |
+
(t) − SOFF
|
549 |
+
j
|
550 |
+
(t + 1), u−�
|
551 |
+
,
|
552 |
+
(7)
|
553 |
+
where u+ := max(u, 0) and u− = max(−u, 0). Therefore,
|
554 |
+
the number of ON TCLs given the command u(t + 1) = u is
|
555 |
+
N ON
|
556 |
+
u (t + 1) = N ON(t) + SON(t + 1)
|
557 |
+
−SOFF(t + 1) + CON
|
558 |
+
u (t + 1) − COFF
|
559 |
+
u
|
560 |
+
(t + 1). (8)
|
561 |
+
Since the distributions of CON
|
562 |
+
u,j(t + 1) and COFF
|
563 |
+
u,j (t + 1) depend
|
564 |
+
on u, the real and reactive power consumption across all nodes
|
565 |
+
P (t+1) and Q(t+1) also depend on u. Therefore, from now
|
566 |
+
on, we denote these random variables under the one-step ahead
|
567 |
+
command u(t + 1) = u as Pu(t + 1) and Qu(t + 1).
|
568 |
+
The next step is to model the one-step ahead voltage
|
569 |
+
Vj(t + 1) at each node j as a random variable. Suppose that
|
570 |
+
vj is the voltage magnitude at node j; pb
|
571 |
+
j and qb
|
572 |
+
j are the
|
573 |
+
real and reactive power flowing through the branch whose
|
574 |
+
receiving end is node j; and the resistance and reactance
|
575 |
+
|
576 |
+
5
|
577 |
+
of the branch are rj > 0 and xj > 0, respectively. Then,
|
578 |
+
the DistFlow equations [29] corresponding to a single-phase
|
579 |
+
equivalent model of a radial three-phase balanced network are
|
580 |
+
pb
|
581 |
+
j =
|
582 |
+
�
|
583 |
+
k∈c(j)
|
584 |
+
pb
|
585 |
+
k + pj + rj|ib
|
586 |
+
j|
|
587 |
+
qb
|
588 |
+
j =
|
589 |
+
�
|
590 |
+
k∈c(j)
|
591 |
+
qb
|
592 |
+
k + qj + xj|ib
|
593 |
+
j|
|
594 |
+
v2
|
595 |
+
j = v2
|
596 |
+
e(j) − 2(rjpb
|
597 |
+
j + xjqb
|
598 |
+
j) + (r2
|
599 |
+
j + x2
|
600 |
+
j)|ib
|
601 |
+
j|,
|
602 |
+
(9)
|
603 |
+
where e(j) and c(j) are the parent node and set of child
|
604 |
+
nodes of node j, respectively, and |ib
|
605 |
+
j|= ((pb
|
606 |
+
j)2 + (qb
|
607 |
+
j)2)/v2
|
608 |
+
e(j)
|
609 |
+
is the magnitude of the current flowing through the branch
|
610 |
+
whose receiving end is node j. Given real and reactive power
|
611 |
+
consumption p and q ∈ Rn and substation voltage v0, we
|
612 |
+
let fvj(p, q, v0) be the voltage solution of (9), which can
|
613 |
+
be obtained by various algorithms such as Backward-Forward
|
614 |
+
Sweep [30]. Then, the one-step ahead voltage at node j under
|
615 |
+
the command u(t + 1) = u is Vu,j(t + 1) = fvj(Pu(t +
|
616 |
+
1), Qu(t + 1), v0). Note that we cannot obtain an explicit pdf
|
617 |
+
of Vu,j(t + 1) since there is no closed-form solution of fvj.
|
618 |
+
Instead, we can obtain a realization of Vu,j(t + 1) by solving
|
619 |
+
(9) for a set of realizations ˜p and ˜q of Pu(t+1) and Qu(t+1).
|
620 |
+
Finally, we define a Bernoulli random variable that indicates
|
621 |
+
whether or not an under-voltage violation exists,
|
622 |
+
Xu(t + 1) =
|
623 |
+
1
|
624 |
+
�
|
625 |
+
minj∈[n]Vu,j(t + 1) ≥ v
|
626 |
+
�
|
627 |
+
,
|
628 |
+
(10)
|
629 |
+
whose success probability νu(t + 1) = Pr (Xu(t + 1) = 1)
|
630 |
+
corresponds to the one-step ahead probability of network
|
631 |
+
safety under command u(t + 1) = u. Thus, the utility’s
|
632 |
+
problem is to find a set U(t+1) such that, for any u ∈ U(t+1),
|
633 |
+
νu(t+1) is larger than 1−ǫ with confidence level over 1−β.
|
634 |
+
The solution to this problem is explained in the next section.
|
635 |
+
B. Probabilistically-safe set construction
|
636 |
+
In this section, we first present a theorem on computing a
|
637 |
+
confidence interval for the success probability of a Bernoulli
|
638 |
+
random variable via a Monte Carlo simulation. Based on this
|
639 |
+
theorem, we then show how the utility can test whether a
|
640 |
+
command u(t + 1) = u is probabilistically safe and how this
|
641 |
+
test procedure can be used to construct the set U(t + 1) of all
|
642 |
+
commands that satisfy the chance constraint.
|
643 |
+
Theorem 1. Suppose that X(1), . . . , X(ns) are i.i.d. samples of
|
644 |
+
a random variable X following Bernoulli distribution B(1, ν)
|
645 |
+
for a positive ν (i.e. Pr(X(i) = 1) = ν, Pr(X(i) = 0) = 1−ν
|
646 |
+
for any i ∈ [ns]). Let Mns := �ns
|
647 |
+
i=1 X(i)/ns be the estimator
|
648 |
+
of ν, and ˜mns a realization of Mns. If the following inequalities
|
649 |
+
hold,
|
650 |
+
˜mns > 1 − ǫ
|
651 |
+
(11)
|
652 |
+
ns > ln
|
653 |
+
� 1
|
654 |
+
β
|
655 |
+
�
|
656 |
+
1
|
657 |
+
( ˜mns + ǫ) ln( ˜mns + ǫ) − ( ˜mns + ǫ − 1), (12)
|
658 |
+
then [1 − ǫ, 1] is a confidence interval for the success proba-
|
659 |
+
bility ν of X with the confidence level over 1 − β.
|
660 |
+
The proof is given in Appendix A. In our problem, ˜mns is a
|
661 |
+
realization of an estimator of the success probability νu(t+1)
|
662 |
+
obtained from realizations of Xu(t+1). This theorem implies
|
663 |
+
that, if both ˜mns and the number of samples ns are sufficiently
|
664 |
+
large, then νu(t+1) is larger than 1−ǫ. Thus, to verify whether
|
665 |
+
or not νu(t + 1) is larger than 1 − ǫ, the utility can obtain a
|
666 |
+
number of realizations of Xu(t + 1) and check if inequalities
|
667 |
+
(11) and (12) hold.
|
668 |
+
Now, we introduce the procedure the utility uses to obtain
|
669 |
+
realizations of Xu(t + 1) given some u ∈ [−1, 1]. The utility
|
670 |
+
first computes the probability mass function (pmf) of N ON(t)
|
671 |
+
given the observed p(t) and q(t) as follows,
|
672 |
+
Pr
|
673 |
+
�
|
674 |
+
N ON(t) = nON | (P (t) = p(t)) ∩ (Q(t) = q(t))
|
675 |
+
�
|
676 |
+
=
|
677 |
+
Pr
|
678 |
+
� �
|
679 |
+
P L(t) = p(t) − ΞpnON�
|
680 |
+
∩
|
681 |
+
�
|
682 |
+
QL(t) = q(t) − ΞqnON�
|
683 |
+
| (P (t) = p(t)) ∩ (Q(t) = q(t))
|
684 |
+
�
|
685 |
+
=
|
686 |
+
fP L,QL
|
687 |
+
�
|
688 |
+
p(t) − ΞpnON, q(t) − ΞqnON�
|
689 |
+
�
|
690 |
+
n∈NON fP L,QL (p(t) − Ξpn, q(t) − Ξqn),
|
691 |
+
(13)
|
692 |
+
where NON :=
|
693 |
+
�
|
694 |
+
nON | nON
|
695 |
+
j
|
696 |
+
∈ [nTCL
|
697 |
+
j
|
698 |
+
]0 ∀j ∈ [n]
|
699 |
+
�
|
700 |
+
is the set of
|
701 |
+
all possible vectors for N ON(t). Then, the utility obtains a
|
702 |
+
realization ˜xu(t + 1) of Xu(t + 1) through the following
|
703 |
+
sampling procedure, illustrated in Fig. 2.
|
704 |
+
Step 1) a. Obtain a realization ˜nON(t) of N ON(t) by sampling
|
705 |
+
from its pmf derived through (13), and compute
|
706 |
+
˜nOFF(t) = nTCL − ˜nON(t).
|
707 |
+
b. Obtain realizations
|
708 |
+
˜pL(t + 1) and ˜qL(t + 1) of P L(t + 1) and QL(t + 1)
|
709 |
+
by sampling from fP L,QL(t + 1).
|
710 |
+
Step 2) Obtain realizations ˜sON and ˜sOFF of SON(t + 1) and
|
711 |
+
SOFF(t + 1) by computing their elements per (6) as
|
712 |
+
˜sON
|
713 |
+
j (t + 1) = ˆwON
|
714 |
+
j (t + 1)˜nOFF
|
715 |
+
j
|
716 |
+
(t) ∀j ∈ [n]
|
717 |
+
˜sOFF
|
718 |
+
j
|
719 |
+
(t + 1) = ˆwOFF
|
720 |
+
j
|
721 |
+
(t + 1)˜nON
|
722 |
+
j (t) ∀j ∈ [n].
|
723 |
+
Step 3) Obtain
|
724 |
+
realizations
|
725 |
+
˜cON
|
726 |
+
u (t + 1)
|
727 |
+
and
|
728 |
+
˜cOFF
|
729 |
+
u
|
730 |
+
(t +
|
731 |
+
1) of CON
|
732 |
+
u (t + 1) and COFF
|
733 |
+
u
|
734 |
+
(t + 1) by sam-
|
735 |
+
pling
|
736 |
+
their
|
737 |
+
elements
|
738 |
+
per
|
739 |
+
(7)
|
740 |
+
from
|
741 |
+
the
|
742 |
+
bino-
|
743 |
+
mial distributions B
|
744 |
+
�
|
745 |
+
˜nOFF
|
746 |
+
j
|
747 |
+
(t) − ˜sON
|
748 |
+
j (t + 1), u+�
|
749 |
+
and
|
750 |
+
B
|
751 |
+
�
|
752 |
+
˜nON
|
753 |
+
j (t) − ˜sOFF
|
754 |
+
j
|
755 |
+
(t + 1), u−�
|
756 |
+
.
|
757 |
+
Step 4) Obtain realizations of N ON
|
758 |
+
u (t+1), Pu(t+1), Qu(t+
|
759 |
+
1), Vu(t + 1), and Xu(t + 1) as
|
760 |
+
˜nON
|
761 |
+
u (t + 1) = ˜nON(t) + ˜sON(t + 1) − ˜sOFF(t + 1)
|
762 |
+
+ ˜cON
|
763 |
+
u (t + 1) − ˜cOFF
|
764 |
+
u
|
765 |
+
(t + 1)
|
766 |
+
˜pu(t + 1) = ˜pL(t + 1) + Ξp ˜nON
|
767 |
+
u (t + 1)
|
768 |
+
˜qu(t + 1) = ˜qL(t + 1) + Ξq ˜nON
|
769 |
+
u (t + 1)
|
770 |
+
˜vu,j(t + 1) = fvj(˜pu(t + 1), ˜qu(t + 1), v0) ∀j ∈ [n]
|
771 |
+
˜xu(t + 1) =
|
772 |
+
1(minj∈[n]˜vu,j(t + 1) ≥ v).
|
773 |
+
The utility can obtain multiple realizations of Xu(t + 1)
|
774 |
+
by iterating this sampling procedure. Denote each realization
|
775 |
+
i of Xu(t + 1) as ˜x(i)
|
776 |
+
u (t + 1), where i ∈ [ns]. In each
|
777 |
+
iteration, the utility updates the realization of the estimator
|
778 |
+
˜mns = �ns
|
779 |
+
i=1 ˜x(i)
|
780 |
+
u (t + 1)/ns and checks if the inequalities
|
781 |
+
(11), (12) hold. If they do, u(t + 1) = u satisfies the
|
782 |
+
chance constraint with confidence level over 1−β; otherwise,
|
783 |
+
the utility continues to iterate until ns reaches some pre-
|
784 |
+
determined upper bound ns, as shown in Fig. 2.
|
785 |
+
|
786 |
+
6
|
787 |
+
Fig. 2. Flowchart of the test procedure to check if a one-step ahead command
|
788 |
+
u(t + 1) = u satisfies the chance constraint. The information required for
|
789 |
+
each step is in orange.
|
790 |
+
Next, we construct a one-step ahead constraint set U(t+1).
|
791 |
+
We first make an assumption on the monotonicity of νu(t+1).
|
792 |
+
Assumption 1. The one-step ahead probability of network
|
793 |
+
safety νu(t + 1) monotonically decreases with respect to u.
|
794 |
+
The intuition behind this assumption is that the real and
|
795 |
+
reactive power consumption at each node is likely to increase
|
796 |
+
as u increases, which is also likely to lead to a voltage
|
797 |
+
decrease at every node. This assumption will be justified in
|
798 |
+
Section IV-C. Under this assumption, the following holds.
|
799 |
+
Theorem 2. Suppose that Assumption 1 holds and let ˜x(1)
|
800 |
+
u (t+
|
801 |
+
1), . . . , ˜x(ns)
|
802 |
+
u
|
803 |
+
(t + 1) be ns realizations of Xu(t + 1) for a
|
804 |
+
command u ∈ [−1, 1]. If ns and ˜mns = �ns
|
805 |
+
i=1 ˜x(i)
|
806 |
+
u (t + 1)/ns
|
807 |
+
satisfy (11) and (12), then U(t + 1) = [−1, u] is a solution to
|
808 |
+
the Problem 1 with confidence level over 1 − β.
|
809 |
+
Proof. By Theorem 1, the interval [1 − ǫ, 1] is a confidence
|
810 |
+
interval for νu(t + 1) with confidence level over 1 − β. Also,
|
811 |
+
under Assumption 1, νu(t + 1) ≥ νu(t + 1) holds for any
|
812 |
+
u ∈ U(t + 1) = [−1, u]. Thus, νu(t + 1) is greater than or
|
813 |
+
equal to 1−ǫ for any u ∈ U(t+1) with confidence level over
|
814 |
+
1 − β.
|
815 |
+
This theorem means that, if the one-step ahead probability
|
816 |
+
of network safety νu(t+1) under the command u(t+1) = u is
|
817 |
+
greater than or equal to the desired safety probability, then any
|
818 |
+
less aggressive command in the range [−1, u] also satisfies the
|
819 |
+
chance constraint. Therefore, a solution to Problem 1 is the
|
820 |
+
interval [−1, u], where u passes the test procedure in Fig. 2.
|
821 |
+
The choice of probabilistically-safe set U(t + 1) is not
|
822 |
+
unique. A larger U(t + 1) gives more flexibility to the aggre-
|
823 |
+
gator, potentially improves the quality of balancing services,
|
824 |
+
and reduces the conservativeness of our approach. Therefore,
|
825 |
+
the utility should find the largest possible u that passes the test
|
826 |
+
procedure. This can be achieved using the bisection method
|
827 |
+
[31], starting with u = 1.
|
828 |
+
Remark 1. To restrict the probability of over-voltage vi-
|
829 |
+
olations, we can also apply the monotonicity assumption;
|
830 |
+
the probability of over-voltage violations increases as the
|
831 |
+
command u decreases. In this case, we can use the bisection
|
832 |
+
method to obtain a lower bound on u(t + 1). Then, the utility
|
833 |
+
can send both a lower and upper bound on u(t+1) to restrict
|
834 |
+
the probability of over- and under-voltage violations.
|
835 |
+
Remark 2. Since the utility approximates P T and QT in
|
836 |
+
(5) and uses estimates of wON and wOFF in Step 2 of the
|
837 |
+
sampling procedure, Theorem 2 holds only if those approxi-
|
838 |
+
mations/estimates are accurate. We will justify the use of these
|
839 |
+
approximations/estimations through simulation in Section V.
|
840 |
+
C. Justification of Assumption 1
|
841 |
+
In this section, we justify Assumption 1 by showing that
|
842 |
+
an approximation of νu(t + 1) is a monotonically decreasing
|
843 |
+
function with respect to u. We consider the LinDistFlow
|
844 |
+
equations [32], which drop the nonlinear terms of (9), i.e.,
|
845 |
+
ˆpb
|
846 |
+
j =
|
847 |
+
�
|
848 |
+
k∈c(j)
|
849 |
+
ˆpb
|
850 |
+
k + pj,
|
851 |
+
ˆqb
|
852 |
+
j =
|
853 |
+
�
|
854 |
+
k∈c(j)
|
855 |
+
ˆqb
|
856 |
+
k + qj
|
857 |
+
ˆv2
|
858 |
+
j = ˆv2
|
859 |
+
e(j) − 2(rj ˆpb
|
860 |
+
j + xj ˆqb
|
861 |
+
j),
|
862 |
+
(14)
|
863 |
+
where variables with hats correspond to approximations of the
|
864 |
+
original DistFlow variables. Let ˆfvj(p, q, v0) be the voltage
|
865 |
+
solution of (14), i.e., ˆVu,j(t + 1) := ˆfvj(Pu(t + 1), Qu(t +
|
866 |
+
1), v0) is the approximate voltage at node j. Also, let
|
867 |
+
ˆXu(t + 1) =
|
868 |
+
1
|
869 |
+
�
|
870 |
+
minj∈[n] ˆVu,j(t + 1) ≥ v
|
871 |
+
�
|
872 |
+
,
|
873 |
+
(15)
|
874 |
+
whose success probability ˆνu(t + 1) := Pr( ˆXu(t + 1) = 1)
|
875 |
+
approximates νu(t + 1). To show that ˆνu(t + 1) is decreasing
|
876 |
+
with respect to u, we start with a proposition.
|
877 |
+
Proposition 1. Suppose that p(1), p(2) ∈ Rn and q(1), q(2) ∈
|
878 |
+
Rn are different instances of real and reactive power con-
|
879 |
+
sumption where p(1)
|
880 |
+
j
|
881 |
+
≤ p(2)
|
882 |
+
j
|
883 |
+
and q(1)
|
884 |
+
j
|
885 |
+
≤ q(2)
|
886 |
+
j
|
887 |
+
∀ j ∈ [n]. Then,
|
888 |
+
ˆfvj(p(1), q(1), v0) ≥ ˆfvj(p(2), q(2), v0) for all j ∈ [n].
|
889 |
+
Proof. First let ˆfpb
|
890 |
+
j(p, q, v0) and ˆfqb
|
891 |
+
j(p, q, v0) be the solutions
|
892 |
+
of (14) corresponding to pb
|
893 |
+
j and qb
|
894 |
+
j when the real and reactive
|
895 |
+
power consumption at each node are p and q, and the
|
896 |
+
substation voltage is v0. Then, for all j ∈ [n] [32]
|
897 |
+
ˆfpb
|
898 |
+
j(p, q, v0) =
|
899 |
+
�
|
900 |
+
k∈d(j)
|
901 |
+
pk,
|
902 |
+
ˆfqb
|
903 |
+
j(p, q, v0) =
|
904 |
+
�
|
905 |
+
k∈d(j)
|
906 |
+
qk
|
907 |
+
ˆf 2
|
908 |
+
vj(p, q, v0) = v2
|
909 |
+
0 − 2
|
910 |
+
�
|
911 |
+
k∈a(j)
|
912 |
+
�
|
913 |
+
rk ˆfpb
|
914 |
+
k(p, q, v0)
|
915 |
+
+ xk ˆfqb
|
916 |
+
k(p, q, v0)
|
917 |
+
�
|
918 |
+
,
|
919 |
+
(16)
|
920 |
+
where d(j) := c(j)∪{j} is the set of indices of all descendants
|
921 |
+
of node j including itself, and a(j) is the set of indices of
|
922 |
+
all ancestors of node j including itself. Hence, ˆfpb
|
923 |
+
j(p, q, v0)
|
924 |
+
and ˆfqb
|
925 |
+
j(p, q, v0) are increasing as pk and qk increase for
|
926 |
+
all k ∈ [n], and ˆfpb
|
927 |
+
j(p(1), q(1), v0) ≤ ˆfpb
|
928 |
+
j(p(2), q(2), v0) and
|
929 |
+
ˆfqb
|
930 |
+
j(p(1), q(1), v0) ≤ ˆfqb
|
931 |
+
j(p(2), q(2), v0) for all j ∈ [n]. Also,
|
932 |
+
since all rk and xk are positive, ˆfvj(p, q, v0) is decreasing as
|
933 |
+
|
934 |
+
Initialize
|
935 |
+
ns ←1
|
936 |
+
fpLou (t),p(t),q(t)
|
937 |
+
Stepla
|
938 |
+
Step1b
|
939 |
+
fpLo
|
940 |
+
L(t+1)
|
941 |
+
Sample NON (t)
|
942 |
+
Sample
|
943 |
+
pl(t + 1), Q(t + 1)
|
944 |
+
WON(t + 1)
|
945 |
+
Step2
|
946 |
+
WOFF(t + 1)
|
947 |
+
Sample
|
948 |
+
sON(t + 1), SOFF(t + 1)
|
949 |
+
ns - ns +1
|
950 |
+
u(t+1)=u
|
951 |
+
Step3
|
952 |
+
Sample
|
953 |
+
CON(t +1),COFF(t+1)
|
954 |
+
Step 4
|
955 |
+
Step4
|
956 |
+
SampleNoN(t+1),Pu(t+1),Qu(t+1)
|
957 |
+
V,(t + 1), X,(t + 1) and obtain x(ns)(t + 1)
|
958 |
+
No
|
959 |
+
Do
|
960 |
+
x(t+1)
|
961 |
+
No
|
962 |
+
rns
|
963 |
+
Is
|
964 |
+
m
|
965 |
+
ns
|
966 |
+
ns
|
967 |
+
ns≥n,?
|
968 |
+
satisfy(10),(11)?
|
969 |
+
Yes
|
970 |
+
Yes
|
971 |
+
Safe
|
972 |
+
Unsafe7
|
973 |
+
Fig. 3. Demonstration of the monotonicity of νu(t + 1) with respect to u.
|
974 |
+
ˆfpb
|
975 |
+
k(p, q, v0) and ˆfqb
|
976 |
+
k(p, q, v0) increase for all k ∈ [n]. There-
|
977 |
+
fore, ˆfvj(p(1), q(1), v0) ≥ ˆfvj(p(2), q(2), v0) ∀ j ∈ [n].
|
978 |
+
This proposition states that ˆfvj(p, q, v0) monotonically de-
|
979 |
+
creases as the real and reactive power consumption pj and
|
980 |
+
qj at every node increase for all j ∈ [n]. Since the one-step
|
981 |
+
ahead real and reactive power consumption of the TCLs at
|
982 |
+
each node are likely to increase as u increases (recall that
|
983 |
+
in Section III we made the realistic assumption that TCLs
|
984 |
+
have constant lagging power factors, and so their real and
|
985 |
+
reactive power consumption change in the same direction),
|
986 |
+
this proposition implies that the probability of under-voltage
|
987 |
+
violations increases as u increases. This is stated in the
|
988 |
+
following theorem.
|
989 |
+
Theorem 3. The approximate probability of network safety
|
990 |
+
ˆνu(t + 1) under the one-step ahead command u is a mono-
|
991 |
+
tonically decreasing function of u.
|
992 |
+
The proof is given in Appendix B. While Theorem 3
|
993 |
+
justifies Assumption 1 for the approximation ˆνu(t + 1), we
|
994 |
+
also empirically validate that νu(t + 1) is a monotonically
|
995 |
+
decreasing function of u in Fig. 3. To create this plot, we
|
996 |
+
generated ns = 106 realizations of Xu(t + 1) for each of 101
|
997 |
+
uniformly spaced points u from -1 to 1.
|
998 |
+
V. CASE STUDY
|
999 |
+
We next present the result of a case study in which we com-
|
1000 |
+
pare the proposed approach with two benchmark approaches,
|
1001 |
+
a tracking controller benchmark and an Optimal Power Flow
|
1002 |
+
(OPF) benchmark. We first describe our simulation setup and
|
1003 |
+
detail the benchmark approaches. Then, we present our results.
|
1004 |
+
We use the 56-bus balanced distribution network from [33]
|
1005 |
+
where the nominal real and reactive power consumption at
|
1006 |
+
node j are denoted by pLn
|
1007 |
+
j
|
1008 |
+
and qLn
|
1009 |
+
j , respectively. We set
|
1010 |
+
the safe lower bound on the voltage to v
|
1011 |
+
= 0.95 pu.
|
1012 |
+
TCL parameters are randomly sampled1, and the TCLs are
|
1013 |
+
distributed throughout the network so that the aggregate
|
1014 |
+
TCLs’ nominal real power consumption at node j is ap-
|
1015 |
+
proximately 0.25pLn
|
1016 |
+
j . For simplicity, we assume that the
|
1017 |
+
real and reactive power consumption of the non-participating
|
1018 |
+
loads at each node P L
|
1019 |
+
j (t) and QL
|
1020 |
+
j (t) follow normal distribu-
|
1021 |
+
tions N(pLn
|
1022 |
+
j (t), (0.15pLn
|
1023 |
+
j )2) and N(qLn
|
1024 |
+
j (t), (0.15qLn
|
1025 |
+
j )2) trun-
|
1026 |
+
cated by the intervals [pLmin
|
1027 |
+
j
|
1028 |
+
, pLmax
|
1029 |
+
j
|
1030 |
+
] = [−0.25pLn
|
1031 |
+
j , 0.675pLn
|
1032 |
+
j ]
|
1033 |
+
and [qLmin
|
1034 |
+
j
|
1035 |
+
, qLmax
|
1036 |
+
j
|
1037 |
+
] = [−0.25qLn
|
1038 |
+
j , 0.675qLn
|
1039 |
+
j ], respectively. We
|
1040 |
+
1Each parameter is sampled from uniform distributions with intervals:
|
1041 |
+
θi
|
1042 |
+
a ∈ [29, 31] °C, ci
|
1043 |
+
th ∈ [1.5, 2.5]kWh/°C, ri
|
1044 |
+
th = [1.2, 2.5]°C/kW, pi
|
1045 |
+
tr ∈
|
1046 |
+
[−18, −14] kW, ζi ∈ [2.3, 2.7], θi
|
1047 |
+
s ∈ [20, 25]°C, θ
|
1048 |
+
i − θi ∈ [1.5, 2]°C, and
|
1049 |
+
ωi = tan(arccos(φi)), where φi ∈ [0.95, 0.99].
|
1050 |
+
13
|
1051 |
+
13.5
|
1052 |
+
14
|
1053 |
+
14.5
|
1054 |
+
15
|
1055 |
+
Time (h)
|
1056 |
+
0
|
1057 |
+
0.01
|
1058 |
+
0.02
|
1059 |
+
0.03
|
1060 |
+
0.04
|
1061 |
+
0.05
|
1062 |
+
0.06
|
1063 |
+
0.07
|
1064 |
+
Fraction of TCLs
|
1065 |
+
Actual Fraction
|
1066 |
+
Estimated Fraction
|
1067 |
+
13
|
1068 |
+
13.5
|
1069 |
+
14
|
1070 |
+
14.5
|
1071 |
+
15
|
1072 |
+
Time (h)
|
1073 |
+
0
|
1074 |
+
0.02
|
1075 |
+
0.04
|
1076 |
+
0.06
|
1077 |
+
0.08
|
1078 |
+
0.1
|
1079 |
+
Fraction of TCLs
|
1080 |
+
Actual Fraction
|
1081 |
+
Estimated Fraction
|
1082 |
+
Fig. 4. Actual and estimated fractions of TCLs switched ON (left) and OFF
|
1083 |
+
(right) by their thermostats, in the proposed approach (ǫ = 0.02).
|
1084 |
+
conduct 2h simulations (13h-15h) and let pLn
|
1085 |
+
j (t) and qLn
|
1086 |
+
j (t)
|
1087 |
+
linearly increase from 0.5 to 0.65 of their nominal values
|
1088 |
+
from 13.0h to 13.9h, stay constant from 13.9h to 14.1h, and
|
1089 |
+
linearly decrease to 0.5 of their nominal values from 14.1h to
|
1090 |
+
15.0h. The reference signal pref(t) is a scaled and shifted 2h
|
1091 |
+
segment of a PJM RegD signal [34]. We use the desired safety
|
1092 |
+
probabilities 1−ǫ = 0.95 and 0.98 and the desired confidence
|
1093 |
+
level 1 − β = 0.999.
|
1094 |
+
The aggregator obtains the estimates
|
1095 |
+
ˆwON
|
1096 |
+
j (t + 1) and
|
1097 |
+
ˆwOFF
|
1098 |
+
j
|
1099 |
+
(t + 1) for each node leveraging an approximate model
|
1100 |
+
of the dynamics of the TCL aggregation. The model was
|
1101 |
+
developed in past work, e.g., [6], and so not detailed here.
|
1102 |
+
While we could identify different models for each node,
|
1103 |
+
here we use the same model for each node j ∈ [n] and so
|
1104 |
+
ˆwON
|
1105 |
+
j (t + 1) and ˆwOFF
|
1106 |
+
j
|
1107 |
+
(t + 1) are identical across nodes. Fig. 4
|
1108 |
+
demonstrates the model’s estimation performance, showing the
|
1109 |
+
actual and estimated fractions of TCLs outside of their dead-
|
1110 |
+
bands. Although the estimates do not perfectly track the actual
|
1111 |
+
values, they capture the overall trends.
|
1112 |
+
The tracking controller benchmark does not take into ac-
|
1113 |
+
count network safety. It chooses the optimal command uopt(t)
|
1114 |
+
using (4) with U(t) = [−1, 1], where E [Pagg(t)] is the
|
1115 |
+
expected aggregate power of the TCLs under u(t) = u, which
|
1116 |
+
is computed with the same approximate aggregate TCL model.
|
1117 |
+
The OPF benchmark approximately enforces network safety
|
1118 |
+
assuming linearized power flow. It solves the following mixed
|
1119 |
+
integer linear program at each time step to compute the optimal
|
1120 |
+
one-step ahead mode of each TCL,
|
1121 |
+
min
|
1122 |
+
mi |pagg − pref|
|
1123 |
+
(17a)
|
1124 |
+
s.t. pagg =
|
1125 |
+
nTCL
|
1126 |
+
�
|
1127 |
+
i=1
|
1128 |
+
pimi
|
1129 |
+
(17b)
|
1130 |
+
pT
|
1131 |
+
j =
|
1132 |
+
�
|
1133 |
+
i∈Ij
|
1134 |
+
pimi, qT
|
1135 |
+
j =
|
1136 |
+
�
|
1137 |
+
i∈Ij
|
1138 |
+
qimi,
|
1139 |
+
∀j ∈ [n]
|
1140 |
+
(17c)
|
1141 |
+
TCL temperature dynamics (2),
|
1142 |
+
∀i ∈ [nTCL]
|
1143 |
+
(17d)
|
1144 |
+
θi ∈ [θi, θi],
|
1145 |
+
∀i ∈ [nTCL]
|
1146 |
+
(17e)
|
1147 |
+
v = Φp(pT + pLmax) + Φq(qT + qLmax) + Φc
|
1148 |
+
(17f)
|
1149 |
+
v ≤ v,
|
1150 |
+
(17g)
|
1151 |
+
where Ij is the set of indices of TCLs connected to j and
|
1152 |
+
(17f) is the linearized power flow developed in [1]. The OPF
|
1153 |
+
benchmark is different from the proposed approach and opti-
|
1154 |
+
mal tracking controller in that it can observe the TCLs’ internal
|
1155 |
+
temperatures and directly control the TCLs’ modes. In contrast
|
1156 |
+
to the proposed approach, it has a deterministic constraint
|
1157 |
+
(17g) on network safety rather than a chance constraint.
|
1158 |
+
|
1159 |
+
1.00
|
1160 |
+
0.75
|
1161 |
+
十
|
1162 |
+
+0.50
|
1163 |
+
0.25
|
1164 |
+
0.00
|
1165 |
+
1.0
|
1166 |
+
-0.5
|
1167 |
+
0.0
|
1168 |
+
0.5
|
1169 |
+
1.0
|
1170 |
+
u8
|
1171 |
+
0
|
1172 |
+
0.5
|
1173 |
+
1
|
1174 |
+
1.5
|
1175 |
+
2
|
1176 |
+
Power (MW)
|
1177 |
+
Ref Signal
|
1178 |
+
Agg Power
|
1179 |
+
Nom Power
|
1180 |
+
13
|
1181 |
+
13.5
|
1182 |
+
14
|
1183 |
+
14.5
|
1184 |
+
15
|
1185 |
+
Time (h)
|
1186 |
+
0.94
|
1187 |
+
0.95
|
1188 |
+
0.96
|
1189 |
+
0.97
|
1190 |
+
0.98
|
1191 |
+
Voltage (V)
|
1192 |
+
Minimum Voltage
|
1193 |
+
Lower Bound
|
1194 |
+
13.5
|
1195 |
+
14
|
1196 |
+
14.5
|
1197 |
+
15
|
1198 |
+
Time (h)
|
1199 |
+
13.5
|
1200 |
+
14
|
1201 |
+
14.5
|
1202 |
+
15
|
1203 |
+
Time (h)
|
1204 |
+
13.5
|
1205 |
+
14
|
1206 |
+
14.5
|
1207 |
+
15
|
1208 |
+
Time (h)
|
1209 |
+
Fig. 5. The reference signal and the TCLs’ aggregate power (top), and the minimum network voltage and the safe lower bound (bottom) for each algorithm.
|
1210 |
+
TABLE I
|
1211 |
+
TRACKING AND SAFETY PERFORMANCE OF EACH ALGORITHM
|
1212 |
+
Track Ctrl
|
1213 |
+
OPF
|
1214 |
+
Proposed Approach
|
1215 |
+
Benchmark
|
1216 |
+
Benchmark
|
1217 |
+
ǫ = 0.05
|
1218 |
+
ǫ = 0.02
|
1219 |
+
RMSE (kW)
|
1220 |
+
77.05
|
1221 |
+
168.3
|
1222 |
+
102.8
|
1223 |
+
118.8
|
1224 |
+
Safety Probability
|
1225 |
+
0.908
|
1226 |
+
1.00
|
1227 |
+
0.981
|
1228 |
+
0.986
|
1229 |
+
Fig. 5 illustrates the results of the comparison between the
|
1230 |
+
two benchmarks and our proposed approach with ǫ = 0.05 and
|
1231 |
+
0.02. Table I shows the root mean squared error (RMSE) of
|
1232 |
+
the aggregate power from the reference signal, along with the
|
1233 |
+
empirical safety probability computed as the fraction of time
|
1234 |
+
steps in which under-voltage violations (computed with the
|
1235 |
+
nonlinear power flow equations) do not happen. The tracking
|
1236 |
+
controller benchmark has the best tracking performance, but
|
1237 |
+
frequently causes under-voltage violations. This demonstrates
|
1238 |
+
the need to employ network-safe DER control strategies. In
|
1239 |
+
contrast, the OPF benchmark avoids under-voltage violations,
|
1240 |
+
but has the worst tracking performance, demonstrating that
|
1241 |
+
approaches that (approximately) enforce network safety will
|
1242 |
+
at times have poor balancing service performance.
|
1243 |
+
Our approach achieves a better trade-off between tracking
|
1244 |
+
performance and network safety; specifically, it achieves better
|
1245 |
+
tracking performance than the OPF benchmark and satisfies
|
1246 |
+
the chance constraint on network safety, resulting in fewer
|
1247 |
+
under-voltage violations than the tracking controller bench-
|
1248 |
+
mark. As shown in Table I, the empirical safety probabilities
|
1249 |
+
are over the target values 1 − ǫ. The RMSE increases as ǫ
|
1250 |
+
decreases, which is expected since higher 1−ǫ results in more
|
1251 |
+
conservative bounds on the input commands.
|
1252 |
+
VI. CONCLUSION
|
1253 |
+
This paper proposed an approach to coordinate a collection
|
1254 |
+
of TCLs to provide balancing services while guaranteeing
|
1255 |
+
network safety with high probability. In particular, we pro-
|
1256 |
+
posed a constraint construction method that would allow the
|
1257 |
+
utility to constrain the input commands of an aggregator
|
1258 |
+
providing balancing services like frequency regulation. The
|
1259 |
+
approach imposes a chance constraint on network safety,
|
1260 |
+
wherein both the violation probability and confidence level are
|
1261 |
+
design parameters that can be selected by the utility. We used
|
1262 |
+
the bisection method to compute the largest possible constraint
|
1263 |
+
set, which provides the most flexibility to the aggregator.
|
1264 |
+
Future work will extend the proposed approach to incor-
|
1265 |
+
porate different types of DERs, such as stationary batteries,
|
1266 |
+
electric vehicles, and curtailable solar photovoltaics, into the
|
1267 |
+
framework; we already have some preliminary work along this
|
1268 |
+
direction [35].
|
1269 |
+
REFERENCES
|
1270 |
+
[1] E. Dall’Anese, S. Guggilam, A. Simonetto, Y. C. Chen, and S. Dhople,
|
1271 |
+
“Optimal regulation of virtual power plants,” IEEE Trans. Power Syst.,
|
1272 |
+
vol. 33, no. 2, pp. 1868–1881, 2017.
|
1273 |
+
[2] A. Bernstein and E. Dall’Anese, “Real-time feedback-based optimization
|
1274 |
+
of distribution grids: A unified approach,” IEEE Trans. Control Netw.
|
1275 |
+
Syst., vol. 6, no. 3, pp. 1197–1209, 2019.
|
1276 |
+
[3] E. Vrettos and G. Andersson, “Combined load frequency control and
|
1277 |
+
active distribution network management with thermostatically controlled
|
1278 |
+
loads,” in IEEE Int. Conf. Smart Grid Comm., 2013, pp. 247–252.
|
1279 |
+
[4] Federal
|
1280 |
+
Energy
|
1281 |
+
Regulatory
|
1282 |
+
Commission,
|
1283 |
+
“Notice
|
1284 |
+
inviting
|
1285 |
+
post-technical
|
1286 |
+
conference
|
1287 |
+
comments,”
|
1288 |
+
Tech.
|
1289 |
+
Rep.
|
1290 |
+
Docket
|
1291 |
+
No..
|
1292 |
+
RM18-9-000,
|
1293 |
+
Apr.
|
1294 |
+
2018.
|
1295 |
+
[Online].
|
1296 |
+
Available
|
1297 |
+
:
|
1298 |
+
https://cms.ferc.gov/sites/default/files/2020-09/Notice-for-Comments-on-NOPR-RM18-9.pdf.
|
1299 |
+
[5] ——,
|
1300 |
+
“FERC
|
1301 |
+
order
|
1302 |
+
no.
|
1303 |
+
2222:
|
1304 |
+
Participation
|
1305 |
+
of
|
1306 |
+
distributed
|
1307 |
+
energy
|
1308 |
+
resource
|
1309 |
+
aggregations
|
1310 |
+
in
|
1311 |
+
markets
|
1312 |
+
operated
|
1313 |
+
by
|
1314 |
+
regional
|
1315 |
+
transmission
|
1316 |
+
organizations
|
1317 |
+
and
|
1318 |
+
independent
|
1319 |
+
system
|
1320 |
+
operators.”
|
1321 |
+
https://www.ferc.gov/sites/default/files/2020-09/E-1 0.pdf, Sep 2020.
|
1322 |
+
[6] J. Mathieu, S. Koch, and D. S. Callaway, “State estimation and control
|
1323 |
+
of electric loads to manage real-time energy imbalance,” IEEE Trans.
|
1324 |
+
Power Syst., vol. 28, no. 1, pp. 430–440, 2012.
|
1325 |
+
[7] S. Bashash and H. K. Fathy, “Modeling and control of aggregate air
|
1326 |
+
conditioning loads for robust renewable power management,” IEEE
|
1327 |
+
Trans. Control Syst. Technol., vol. 21, no. 4, pp. 1318–1327, 2012.
|
1328 |
+
[8] W. Zhang, J. Lian, C.-Y. Chang, and K. Kalsi, “Aggregated modeling
|
1329 |
+
and control of air conditioning loads for demand response,” IEEE Trans.
|
1330 |
+
Power Syst., vol. 28, no. 4, pp. 4655–4664, 2013.
|
1331 |
+
[9] S. Tindemans, V. Trovato, and G. Strbac, “Decentralized control of
|
1332 |
+
thermostatic loads for flexible demand response,” IEEE Trans. Control
|
1333 |
+
Syst. Technol., vol. 23, no. 5, pp. 1685–1700, 2015.
|
1334 |
+
[10] S. C. Ross, N. Ozay, and J. L. Mathieu, “Coordination between an
|
1335 |
+
aggregator and distribution operator to achieve network-aware load
|
1336 |
+
control,” in PowerTech, 2019.
|
1337 |
+
[11] S. Ross and J. Mathieu, “Strategies for network-safe load control with a
|
1338 |
+
third-party aggregator and a distribution operator,” IEEE Trans. Power
|
1339 |
+
Syst., vol. 36, no. 4, pp. 3329–3339, 2021.
|
1340 |
+
[12] D. Lee, K. Turitsyn, D. K. Molzahn, and L. A. Roald, “Robust AC
|
1341 |
+
optimal power flow with robust convex restriction,” IEEE Trans. Power
|
1342 |
+
Syst., vol. 36, no. 6, pp. 4953–4966, 2021.
|
1343 |
+
[13] H. D. Nguyen, K. Dvijotham, and K. Turitsyn, “Constructing convex
|
1344 |
+
inner approximations of steady-state security regions,” IEEE Trans. on
|
1345 |
+
Power Syst., vol. 34, no. 1, pp. 257–267, 2018.
|
1346 |
+
[14] N. Nazir and M. Almassalkhi, “Grid-aware aggregation and realtime
|
1347 |
+
disaggregation of distributed energy resources in radial networks,” IEEE
|
1348 |
+
Trans. on Power Syst., vol. 37, no. 3, pp. 1706–1717, 2021.
|
1349 |
+
[15] K. Petrou, M. Z. Liu, A. T. Procopiou, L. F. Ochoa, J. Theunissen,
|
1350 |
+
and J. Harding, “Operating envelopes for prosumers in LV networks: A
|
1351 |
+
weighted proportional fairness approach,” in ISGT Europe, 2020.
|
1352 |
+
[16] Y. Yi and G. Verbiˇc, “Fair operating envelopes under uncertainty using
|
1353 |
+
chance constrained optimal power flow,” Electr. Power Syst. Res., vol.
|
1354 |
+
213, p. 108465, 2022.
|
1355 |
+
[17] J. S. Russell, P. Scott, and A. Attarha, “Stochastic shaping of aggregator
|
1356 |
+
energy and reserve bids to ensure network security,” Electr. Power Syst.
|
1357 |
+
Res., vol. 212, p. 108418, 2022.
|
1358 |
+
|
1359 |
+
9
|
1360 |
+
[18] J. Comden, A. S. Zamzam, and A. Bernstein, “Secure control regions
|
1361 |
+
for distributed stochastic systems with application to distributed energy
|
1362 |
+
resource dispatch,” in ACC, 2022, pp. 2208–2213.
|
1363 |
+
[19] S. C. Ross and J. L. Mathieu, “A method for ensuring a load aggregator’s
|
1364 |
+
power deviations are safe for distribution networks,” Electr. Power Syst.
|
1365 |
+
Res., vol. 189, p. 106781, 2020.
|
1366 |
+
[20] S. Jang, N. Ozay, and J. L. Mathieu, “Large-scale invariant sets for safe
|
1367 |
+
coordination of thermostatic loads,” in ACC, 2021, pp. 4163–4170.
|
1368 |
+
[21] K. Baker, E. Dall’Anese, and T. Summers, “Distribution-agnostic
|
1369 |
+
stochastic optimal power flow for distribution grids,” in NAPS, 2016.
|
1370 |
+
[22] E. Dall’Anese, K. Baker, and T. Summers, “Chance-constrained ac
|
1371 |
+
optimal power flow for distribution systems with renewables,” IEEE
|
1372 |
+
Trans. Power Syst., vol. 32, no. 5, pp. 3427–3438, 2017.
|
1373 |
+
[23] A. Hassan, Y. Dvorkin, D. Deka, and M. Chertkov, “Chance-constrained
|
1374 |
+
ADMM approach for decentralized control of distributed energy re-
|
1375 |
+
sources,” in PSCC, 2018.
|
1376 |
+
[24] K. S. Ayyagari, N. Gatsis, and A. F. Taha, “Chance constrained optimiza-
|
1377 |
+
tion of distributed energy resources via affine policies,” in GlobalSIP,
|
1378 |
+
2017, pp. 1050–1054.
|
1379 |
+
[25] A. Hassan, R. Mieth, M. Chertkov, D. Deka, and Y. Dvorkin, “Optimal
|
1380 |
+
load ensemble control in chance-constrained optimal power flow,” IEEE
|
1381 |
+
Trans. Smart Grid, vol. 10, no. 5, pp. 5186–5195, 2018.
|
1382 |
+
[26] Y. Chen and Y. Lin, “Combining model-based and model-free methods
|
1383 |
+
for stochastic control of distributed energy resources,” Applied Energy,
|
1384 |
+
vol. 283, p. 116204, 2021.
|
1385 |
+
[27] G. W. Hart, “Nonintrusive appliance load monitoring,” Proc. IEEE,
|
1386 |
+
vol. 80, no. 12, pp. 1870–1891, 1992.
|
1387 |
+
[28] R. C. Sonderegger, Dynamic models of house heating based on equiva-
|
1388 |
+
lent thermal parameters. Ph.D. dissertation, Princeton University, 1978.
|
1389 |
+
[29] M. Baran and F. F. Wu, “Optimal sizing of capacitors placed on a radial
|
1390 |
+
distribution system,” IEEE Trans. Power Deliv., vol. 4, no. 1, pp. 735–
|
1391 |
+
743, 1989.
|
1392 |
+
[30] W. H. Kersting, “Distribution system modeling and analysis,” in Electric
|
1393 |
+
Power Generation, Transmission, and Distribution: The Electric Power
|
1394 |
+
Engineering Handbook.
|
1395 |
+
CRC press, 2018, pp. 26–1.
|
1396 |
+
[31] R. L. Burden, J. D. Faires, and A. M. Burden, Numerical analysis.
|
1397 |
+
Cengage Learning, 2015.
|
1398 |
+
[32] M. E. Baran and F. F. Wu, “Network reconfiguration in distribution
|
1399 |
+
systems for loss reduction and load balancing,” IEEE Power Eng. Rev.,
|
1400 |
+
vol. 9, no. 4, pp. 101–102, 1989.
|
1401 |
+
[33] S. Bolognani and S. Zampieri, “On the existence and linear approxima-
|
1402 |
+
tion of the power flow solution in power distribution networks,” IEEE
|
1403 |
+
Trans. Power Syst., vol. 31, no. 1, pp. 163–172, 2015.
|
1404 |
+
[34] PJM, “RTO regulation signal data for 7.19.2019 & 7.20.2019.xls,”
|
1405 |
+
https://www.pjm.com/markets-and-operations/ancillary-services.aspx,
|
1406 |
+
accessed: 2019-10-22.
|
1407 |
+
[35] S. Jang, N. Ozay, and J. L. Mathieu, “Data-driven estimation of
|
1408 |
+
probabilistic constraints for network-safe distributed energy resource
|
1409 |
+
control,” in Allerton, 2022.
|
1410 |
+
[36] M. Mitzenmacher and E. Upfal, Probability and computing: Random-
|
1411 |
+
ization and probabilistic techniques in algorithms and data analysis.
|
1412 |
+
Cambridge University Press, 2017.
|
1413 |
+
[37] G. P. Wadsworth, J. G. Bryan, and A. C. Eringen, “Introduction to
|
1414 |
+
probability and random variables,” J. Appl. Mech., vol. 28, no. 2, p.
|
1415 |
+
319, 1961.
|
1416 |
+
APPENDIX
|
1417 |
+
A. Proof of Theorem 1
|
1418 |
+
By Theorem 4.1 in [36], the following inequality is derived
|
1419 |
+
from the Chernoff bound for any 0 < δ ≤ 1−ν
|
1420 |
+
ν ,
|
1421 |
+
Pr(Mns ≥ (1 + δ)ν) ≤
|
1422 |
+
�
|
1423 |
+
1
|
1424 |
+
1 + δ
|
1425 |
+
�(1+δ)nsν
|
1426 |
+
eδnsν
|
1427 |
+
= ensν(δ−(1+δ) ln(1+δ)).
|
1428 |
+
(18)
|
1429 |
+
We substitute c/ν, with c ∈ [0, 1 − ν], for δ and obtain
|
1430 |
+
Pr (Mns − ν ≥ c) ≤ ens(c−(ν+c) ln(1+ c
|
1431 |
+
ν))
|
1432 |
+
⇐⇒ Pr (ν ≥ Mns − c) ≥ 1 − ens(c−(ν+c) ln(1+ c
|
1433 |
+
ν)).
|
1434 |
+
(19)
|
1435 |
+
Hence, [ ˜mns − c, 1] is a confidence interval for ν with con-
|
1436 |
+
fidence level over 1 − ens(c−(ν+c) ln(1+ c
|
1437 |
+
ν )). Thus, if there
|
1438 |
+
exists c > 0 that satisfies ˜mns − c ≥ 1 − ǫ and 1 −
|
1439 |
+
ens(c−(ν+c) ln(1+ c
|
1440 |
+
ν )) > 1 − β, then [1 − ǫ, 1] is a confidence
|
1441 |
+
interval for ν with confidence level over 1 − β. Next, we
|
1442 |
+
show that such a c exists. First, we derive a lower bound on
|
1443 |
+
1 − ens(c−(ν+c) ln(1+ c
|
1444 |
+
ν)). Focusing on the exponent, observe
|
1445 |
+
that
|
1446 |
+
∂
|
1447 |
+
∂ν
|
1448 |
+
�
|
1449 |
+
c − (ν + c) ln
|
1450 |
+
�
|
1451 |
+
1 + c
|
1452 |
+
ν
|
1453 |
+
��
|
1454 |
+
= − ln
|
1455 |
+
�
|
1456 |
+
1 + c
|
1457 |
+
ν
|
1458 |
+
�
|
1459 |
+
+ c
|
1460 |
+
ν .
|
1461 |
+
(20)
|
1462 |
+
If we let h1(x) := − ln(1+x)+x, the right side of (20) is equal
|
1463 |
+
to h1(c/ν). From h1(0) = 0 and ∂h1(x)/∂x = −1/(1 + x)+
|
1464 |
+
1 ≥ 0
|
1465 |
+
∀x ∈ [0, ∞), we have h1(x) ≥ 0 for all x ∈ [0, ∞),
|
1466 |
+
which means h1(c/ν) is non-negative. Hence, the exponent is
|
1467 |
+
increasing with respect to ν, and thus achieves its maximum
|
1468 |
+
at ν = 1. Therefore,
|
1469 |
+
Pr (ν ≥ Mns − c) ≥ 1 − ens(c−(1+c) ln(1+c)).
|
1470 |
+
(21)
|
1471 |
+
Since ν ≤ 1, (21) implies that [ ˜mns − c, 1] is a confidence in-
|
1472 |
+
terval for ν with confidence level over 1−ens(c−(1+c) ln(1+c)).
|
1473 |
+
Now, suppose that (11), (12) hold and define h2(x) :=
|
1474 |
+
x − (1 + x) ln(1 + x); the exponent on the right side of (21)
|
1475 |
+
is nsh2(c). From h2(0) = 0 and ∂h2(x)/∂x < 0 for all x ∈
|
1476 |
+
(0, ∞), we have h2(x) < 0 for all x ∈ (0, ∞). Since ˜mns −
|
1477 |
+
(1 − ǫ) > 0 by (11), ( ˜mns + ǫ − 1) − ( ˜mns + ǫ) ln( ˜mns +
|
1478 |
+
ǫ)) = h2( ˜mns − (1 − ǫ)) is negative. Also, substituting
|
1479 |
+
c with
|
1480 |
+
˜mns − (1 − ǫ), the right side of (21) becomes
|
1481 |
+
1 − ens(( ˜mns+ǫ−1)−( ˜mns+ǫ) ln( ˜mns+ǫ)) which is less than 1 −
|
1482 |
+
e− ln( 1
|
1483 |
+
β) = 1 − β, per (12). Hence, 1 − ens(c−(1+c) ln(1+c)) ≥
|
1484 |
+
1 − β and, thus, the interval [1 − ǫ, 1] = [ ˜mns − c, 1] is a
|
1485 |
+
confidence interval for ν with confidence level over 1−β.
|
1486 |
+
B. Proof of Theorem 3 and supporting lemmas
|
1487 |
+
We first introduce and prove Lemma 1, which is required
|
1488 |
+
for the proof of Lemma 2. Then, we prove Lemma 2, which is
|
1489 |
+
used in the proof of Theorem 3. Finally, we prove Theorem 3.
|
1490 |
+
Lemma 1. Suppose that aw(x), bw(x) : X → R+ are non-
|
1491 |
+
negative functions with parameter w ∈ R, and {˜x1, . . . , ˜xN}
|
1492 |
+
(˜x1 ≤ . . . ≤ ˜xN) is a finite subset of the domain X. Also, as-
|
1493 |
+
sume that the following two conditions hold: 1) �j
|
1494 |
+
k=1 aw(˜xk)
|
1495 |
+
is a decreasing function with respect to w for any j ∈
|
1496 |
+
{1, . . ., N}, and 2) bw(x) is decreasing function with respect
|
1497 |
+
to both x and w. Then, g(w) := �N
|
1498 |
+
k=1 aw(˜xk)bw(˜xk) is a
|
1499 |
+
decreasing function with respect to w.
|
1500 |
+
Proof. We prove the lemma by showing that, for w ≤ w,
|
1501 |
+
�j
|
1502 |
+
k=1 aw(˜xk)bw(˜xk) ≥ �j
|
1503 |
+
k=1 aw(˜xk)bw(˜xk) for any j ∈ [N]
|
1504 |
+
and w1, w2 ∈ R as follows:
|
1505 |
+
j
|
1506 |
+
�
|
1507 |
+
k=1
|
1508 |
+
aw(˜xk)bw(˜xk) ≥
|
1509 |
+
j
|
1510 |
+
�
|
1511 |
+
k=1
|
1512 |
+
aw(˜xk)bw(˜xk)
|
1513 |
+
(22a)
|
1514 |
+
= bw(˜xj)
|
1515 |
+
j
|
1516 |
+
�
|
1517 |
+
k=1
|
1518 |
+
aw(˜xk) +
|
1519 |
+
j−1
|
1520 |
+
�
|
1521 |
+
k=1
|
1522 |
+
∆bw(˜xk)
|
1523 |
+
k
|
1524 |
+
�
|
1525 |
+
l=1
|
1526 |
+
aw(˜xl)
|
1527 |
+
(22b)
|
1528 |
+
≥ bw(˜xj)
|
1529 |
+
j
|
1530 |
+
�
|
1531 |
+
k=1
|
1532 |
+
aw(˜xk) +
|
1533 |
+
j−1
|
1534 |
+
�
|
1535 |
+
k=1
|
1536 |
+
∆bw(˜xk)
|
1537 |
+
k
|
1538 |
+
�
|
1539 |
+
l=1
|
1540 |
+
aw(˜xl)
|
1541 |
+
(22c)
|
1542 |
+
=
|
1543 |
+
j
|
1544 |
+
�
|
1545 |
+
k=1
|
1546 |
+
aw(˜xk)bw(˜xk)
|
1547 |
+
(22d)
|
1548 |
+
|
1549 |
+
10
|
1550 |
+
where ∆bw(˜xk) := (bw(˜xk) − bw(˜xk+1)), (22a) holds by
|
1551 |
+
condition 2 and (22c) holds by condition 1.
|
1552 |
+
Lemma 2. Suppose that Y (j)
|
1553 |
+
w
|
1554 |
+
(j ∈ [n]) is a discrete random
|
1555 |
+
variable with the finite sample space Y(j) = {´yj
|
1556 |
+
1, . . . , ´yj
|
1557 |
+
κj}
|
1558 |
+
(´yj
|
1559 |
+
1
|
1560 |
+
≤ . . . ≤
|
1561 |
+
´yj
|
1562 |
+
κj) with parameter w ∈ R having the
|
1563 |
+
following properties: 1) Y (1)
|
1564 |
+
w , · · · , Y (n)
|
1565 |
+
w
|
1566 |
+
are independent of
|
1567 |
+
each other, and 2) the cdf FY (j)(y; w) of Y (j)
|
1568 |
+
w
|
1569 |
+
is a decreasing
|
1570 |
+
function with respect to w for any y ∈ Y(j). Then, for any
|
1571 |
+
z(i) ∈ R (i ∈ [nc]) and non-negative coefficients aij ∈ R+,
|
1572 |
+
Pr
|
1573 |
+
��nc
|
1574 |
+
i=1
|
1575 |
+
��n
|
1576 |
+
j=1 aijY (j)
|
1577 |
+
w
|
1578 |
+
≤ z(i)��
|
1579 |
+
monotonically decreases
|
1580 |
+
as w increases.
|
1581 |
+
Proof. Let Yw = (Y (1)
|
1582 |
+
w , . . . , Y (n)
|
1583 |
+
w
|
1584 |
+
)⊤ be a multivariate random
|
1585 |
+
variable with elements Y (j)
|
1586 |
+
w
|
1587 |
+
and P = {y | Ay ≤ z} be a
|
1588 |
+
polyhedron with elements aij. Then,
|
1589 |
+
Pr
|
1590 |
+
|
1591 |
+
|
1592 |
+
nc
|
1593 |
+
�
|
1594 |
+
i=1
|
1595 |
+
|
1596 |
+
|
1597 |
+
n
|
1598 |
+
�
|
1599 |
+
j=1
|
1600 |
+
aijY (j)
|
1601 |
+
w
|
1602 |
+
≤ z(i)
|
1603 |
+
|
1604 |
+
|
1605 |
+
|
1606 |
+
= Pr (Yw ∈ P) .
|
1607 |
+
Note that P is a lower polyhedron in Πn
|
1608 |
+
j=1[´yj
|
1609 |
+
1, ´yj
|
1610 |
+
κj]; if y ∈ P,
|
1611 |
+
then y′ ∈ P also holds for any y′ ≤ y. Thus, it is sufficient
|
1612 |
+
to show that Pr (Yw1 ∈ P′) ≥ Pr (Yw2 ∈ P′) ∀ w1 ≥ w2 and
|
1613 |
+
any lower polyhedron P′, which we do as follows:
|
1614 |
+
1) Let n = 1 and P′
|
1615 |
+
1 ⊂ [´y1
|
1616 |
+
1, ´y1
|
1617 |
+
κ1] be a 1-dimensional lower
|
1618 |
+
polyhedron. Then, there exists y such that P′
|
1619 |
+
1 = [´y1
|
1620 |
+
1, y],
|
1621 |
+
and Pr(Y (1)
|
1622 |
+
w1
|
1623 |
+
∈ P′
|
1624 |
+
1) = FY (1)(y; w1) ≥ FY (1)(y; w2) =
|
1625 |
+
Pr(Y (1)
|
1626 |
+
w2 ∈ P′
|
1627 |
+
1), which proves the statement for n = 1.
|
1628 |
+
2) Let n
|
1629 |
+
=
|
1630 |
+
k and suppose Pr(Y (1:k)
|
1631 |
+
w1
|
1632 |
+
∈
|
1633 |
+
P′
|
1634 |
+
k)
|
1635 |
+
≥
|
1636 |
+
Pr(Y (1:k)
|
1637 |
+
w2
|
1638 |
+
∈ P′
|
1639 |
+
k) holds ∀ w1 ≥ w2 and for any k-
|
1640 |
+
dimensional lower polyhedron P′
|
1641 |
+
k ⊂ Πk
|
1642 |
+
j=1[´yj
|
1643 |
+
1, ´yj
|
1644 |
+
κj]. De-
|
1645 |
+
fine P−
|
1646 |
+
k (yk+1) = {(y1, . . . , yk)⊤ | (y1, . . . , yk, yk+1)⊤ ∈
|
1647 |
+
P′
|
1648 |
+
k+1}. Then, P−
|
1649 |
+
k (yk+1) is a lower polyhedron for
|
1650 |
+
any yk+1 ∈ [´yk+1
|
1651 |
+
1
|
1652 |
+
, ´yk+1
|
1653 |
+
κk+1]. Therefore, Pr(Y (1:k+1)
|
1654 |
+
w1
|
1655 |
+
∈
|
1656 |
+
P′
|
1657 |
+
k+1)
|
1658 |
+
=
|
1659 |
+
�κk+1
|
1660 |
+
j=1 Pr(Y (k+1)
|
1661 |
+
w1
|
1662 |
+
=
|
1663 |
+
´yk+1
|
1664 |
+
j
|
1665 |
+
)Pr(Y (1:k)
|
1666 |
+
w1
|
1667 |
+
∈
|
1668 |
+
P−
|
1669 |
+
k (´yk+1
|
1670 |
+
j
|
1671 |
+
)) for any k + 1-dimensional lower polyhedron
|
1672 |
+
P′
|
1673 |
+
k+1 ⊂ Πk+1
|
1674 |
+
j=1[´yj
|
1675 |
+
1, ´yj
|
1676 |
+
κj]. This is greater than or equal to
|
1677 |
+
�κk+1
|
1678 |
+
j=1 Pr(Y (k+1)
|
1679 |
+
w2
|
1680 |
+
= ´yk+1
|
1681 |
+
j
|
1682 |
+
)Pr(Y (1:k)
|
1683 |
+
w2
|
1684 |
+
∈ P−
|
1685 |
+
k (´yk+1
|
1686 |
+
j
|
1687 |
+
)) by
|
1688 |
+
Lemma 1, which in turn equals Pr(Y (1:k+1)
|
1689 |
+
w2
|
1690 |
+
∈ P′
|
1691 |
+
k+1).
|
1692 |
+
This proves the statement for n = k + 1.
|
1693 |
+
Therefore, by mathematical induction, Pr (Yw1 ∈ P′)
|
1694 |
+
≥
|
1695 |
+
Pr (Yw2 ∈ P′) holds for any lower polyhedron P′.
|
1696 |
+
Proof of Theorem 3. From (16), we obtain
|
1697 |
+
ˆV 2
|
1698 |
+
u,j(t + 1) = ˆf 2
|
1699 |
+
vj(Pu(t + 1), Qu(t + 1), v0)
|
1700 |
+
= v2
|
1701 |
+
0 − 2
|
1702 |
+
�
|
1703 |
+
k∈a(j)
|
1704 |
+
�
|
1705 |
+
rk ˆfpb
|
1706 |
+
k(Pu(t + 1), Qu(t + 1), v0)
|
1707 |
+
+ xk ˆfqb
|
1708 |
+
k(Pu(t + 1), Qu(t + 1), v0)
|
1709 |
+
�
|
1710 |
+
= v2
|
1711 |
+
0 − 2
|
1712 |
+
�
|
1713 |
+
k∈a(j)
|
1714 |
+
�
|
1715 |
+
l∈d(k)
|
1716 |
+
(rkPu,l(t + 1) + xkQu,l(t + 1)) .
|
1717 |
+
(23)
|
1718 |
+
Substituting Pu,l(t+1) with P L
|
1719 |
+
l (t+1)+plN ON
|
1720 |
+
u,l (t+1), Qu,l(t+
|
1721 |
+
1) with QL
|
1722 |
+
l (t + 1) + qlN ON
|
1723 |
+
u,l (t + 1), N ON
|
1724 |
+
u,l (t + 1) with the right
|
1725 |
+
side of (8), and leveraging (23) we obtain
|
1726 |
+
ˆVu,j(t + 1) ≥ v ⇐⇒ ˆV 2
|
1727 |
+
u,j(t + 1) ≥ v2
|
1728 |
+
⇐⇒ gj(Cu(t + 1)) ≤ hj(R),
|
1729 |
+
where
|
1730 |
+
vector
|
1731 |
+
R
|
1732 |
+
:=
|
1733 |
+
(N ON(t)⊤, P L(t + 1)⊤, QL(t +
|
1734 |
+
1)⊤, SON(t + 1)⊤, SOFF(t + 1)⊤)⊤ collects random variables,
|
1735 |
+
Cu(t + 1) := CON
|
1736 |
+
u (t + 1) − COFF
|
1737 |
+
u
|
1738 |
+
(t + 1) is the net number of
|
1739 |
+
TCL OFF to ON switches by the aggregator’s command, and
|
1740 |
+
the functions gj and hj are
|
1741 |
+
gj (Cu(t + 1)) := 2
|
1742 |
+
�
|
1743 |
+
k∈a(j)
|
1744 |
+
�
|
1745 |
+
l∈d(k)
|
1746 |
+
(rkpl + xkql)Cu,l(t + 1),
|
1747 |
+
hj(R) := v2
|
1748 |
+
0 − v2 − 2
|
1749 |
+
�
|
1750 |
+
k∈a(j)
|
1751 |
+
�
|
1752 |
+
l∈d(k)
|
1753 |
+
�
|
1754 |
+
rkP L
|
1755 |
+
l (t + 1) + xkQL
|
1756 |
+
l (t + 1)
|
1757 |
+
+ (rkpl + xkql)
|
1758 |
+
�
|
1759 |
+
N ON
|
1760 |
+
l
|
1761 |
+
(t) + SON
|
1762 |
+
l
|
1763 |
+
(t + 1) − SOFF
|
1764 |
+
l
|
1765 |
+
(t + 1)
|
1766 |
+
� �
|
1767 |
+
.
|
1768 |
+
Note that gj is a non-negative linear combination of Cu,l(t+1)
|
1769 |
+
for all j ∈ [n], i.e., there exist ajl ≥ 0 for any j, l ∈ [n] such
|
1770 |
+
that gj(Cu(t + 1)) is equal to �n
|
1771 |
+
l=1 ajlCu,l(t + 1).
|
1772 |
+
Let R be the sample space of R and fR be the joint
|
1773 |
+
probability density function of R. Then, we have
|
1774 |
+
ˆνu(t + 1) = Pr
|
1775 |
+
|
1776 |
+
|
1777 |
+
n
|
1778 |
+
�
|
1779 |
+
j=1
|
1780 |
+
�
|
1781 |
+
ˆVu,j(t + 1) ≥ v
|
1782 |
+
�
|
1783 |
+
|
1784 |
+
|
1785 |
+
=
|
1786 |
+
�
|
1787 |
+
˜r∈R
|
1788 |
+
Pr
|
1789 |
+
|
1790 |
+
|
1791 |
+
n�
|
1792 |
+
j=1
|
1793 |
+
(gj(Cu(t + 1)) ≤ hj(˜r))
|
1794 |
+
����R = ˜r
|
1795 |
+
|
1796 |
+
fR(˜r)d˜r.
|
1797 |
+
(24)
|
1798 |
+
For any realization, ˜r := (˜nON(t)⊤, ˜pL(t + 1)⊤, ˜qL(t +
|
1799 |
+
1)⊤, ˜sON(t+1)⊤, ˜sOFF(t+1)⊤)⊤ ∈ R, Cu,l(t+1) = CON
|
1800 |
+
u (t+
|
1801 |
+
1) when u ≥ 0, and Cu,l(t+ 1) = −COFF
|
1802 |
+
u
|
1803 |
+
(t+ 1) when u < 0.
|
1804 |
+
Thus, by (7), the conditional cdf of Cu,l(t+1) is computed as
|
1805 |
+
Pr(Cu,l(t + 1) ≤ k|R = ˜r) = FB(k; ˜nOFF
|
1806 |
+
l
|
1807 |
+
(t) − ˜sON
|
1808 |
+
l
|
1809 |
+
(t + 1), u)
|
1810 |
+
when u ≥ 0, and Pr(Cu,l(t + 1) ≤ k|R = ˜r) = 1 −
|
1811 |
+
FB(−k; ˜nON
|
1812 |
+
l
|
1813 |
+
(t) − ˜sOFF
|
1814 |
+
l
|
1815 |
+
(t + 1), −u) when u < 0. In addition,
|
1816 |
+
from [37], the cdf of a binomial random variable B(n; ν) is
|
1817 |
+
FB(k; n, ν) = (n − k)
|
1818 |
+
�n
|
1819 |
+
k
|
1820 |
+
� � 1−ν
|
1821 |
+
0
|
1822 |
+
tn−k−1(1 − t)kdt,
|
1823 |
+
which is a monotonically decreasing function with respect to
|
1824 |
+
ν. Thus, Pr(Cu,l(t + 1) ≤ k|R = ˜r) monotonically decreases
|
1825 |
+
as u increases, and Cu,1(t+1)|˜r, . . . , Cu,n(t+1)|˜r for any ˜r ∈
|
1826 |
+
R satisfies the conditions on the random variables in Lemma 2.
|
1827 |
+
Thus, Pr
|
1828 |
+
��n
|
1829 |
+
j=1
|
1830 |
+
�
|
1831 |
+
gj(Cu(t + 1)) ≤ hj(˜r)
|
1832 |
+
����R = ˜r
|
1833 |
+
��
|
1834 |
+
is a de-
|
1835 |
+
creasing function with respect to u. Therefore, by (24),
|
1836 |
+
ˆνu(t + 1) is also a decreasing function with respect to u.
|
1837 |
+
|
89E4T4oBgHgl3EQf3A3O/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
8tA0T4oBgHgl3EQfOv9y/content/tmp_files/2301.02165v1.pdf.txt
ADDED
@@ -0,0 +1,1045 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Towards the Resolution of a Quantized Chaotic Phase Space: The Interplay of
|
2 |
+
Dynamics with Noise
|
3 |
+
Domenico Lippolis1 and Akira Shudo2
|
4 |
+
1
|
5 |
+
Institute for Applied Systems Analysis, Jiangsu University, Zhenjiang 212013, China; [email protected]
|
6 |
+
2
|
7 |
+
Department of Physics, Tokyo Metropolitan University, Minami-Osawa, Hachioji, Tokyo 192-0397, Japan
|
8 |
+
Abstract—We outline formal and physical similarities between the quantum dynamics of open systems, and the
|
9 |
+
mesoscopic description of classical systems affected by weak noise. The main tool of our interest is the dissipative
|
10 |
+
Wigner equation, that, for suitable timescales, becomes analogous to the Fokker-Planck equation describing classical
|
11 |
+
advection and diffusion. This correspondence allows in principle to surmise a a finite resolution, other than the Planck
|
12 |
+
scale, for the quantized state space of the open system, particularly meaningful when the latter underlies chaotic classical
|
13 |
+
dynamics. We provide representative examples of the quantum-stochastic parallel with noisy Hopf cycles and Van der Pol
|
14 |
+
oscillators.
|
15 |
+
1. Introduction
|
16 |
+
Efforts to reconcile classical and quantum mechanics are just about as old as quantum mechanics itself. While the
|
17 |
+
formulation in Hilbert space makes it difficult to establish a direct correspondence between the two, a projection of the
|
18 |
+
wave function to phase space may reveal some formal affinities between the quantum evolution of probability density and
|
19 |
+
the traditional Liouville formalism of classical mechanics. The closest one can get to relate the two is by projecting the
|
20 |
+
Liouville-von Neumann equation onto a suitable state space. For example, choosing the traditional phase space, we may
|
21 |
+
obtain the so-called Wigner representation, that shares similarities with the aforementioned classical density evolution.
|
22 |
+
Yet, there are also notable differences, as it stands to reason. The Wigner function, that is the projection of the density
|
23 |
+
operator onto the phase-space, may also take on negative values, its evolution is governed by an equation plagued with
|
24 |
+
an infinity of derivatives, and, as an indirect consequence of that, it may attain scales smaller than Planck’s constant [1].
|
25 |
+
This is especially true in systems whose underlying classical dynamics exhibits chaotic behavior.
|
26 |
+
In reality, however, no system is perfectly and eternally isolated, and exchange of matter or energy with the surround-
|
27 |
+
ing environment is inevitable, whether due to measurements, thermal interactions, or shot noise [2, 3, 4]. That brings
|
28 |
+
dissipation into the picture, and with that, decoherence.
|
29 |
+
The effect of the environment on the evolution of a density matrix in a phase-space representation was first studied by
|
30 |
+
Feynman and Vernon [5], who extended the path-integral formalism to dissipative quantum dynamics. Later, Caldeira and
|
31 |
+
Leggett [6] derived an equivalent partial differential equation for the density matrix, that bears diffusive and dissipative
|
32 |
+
terms, similarly to a Fokker-Planck equation. The latter analogy was then thought to hold but in the semiclassical limit,
|
33 |
+
until a new wave of contributions [7, 8, 9, 10] reexamined the problem in a quantum chaotic setting. A most remarkable
|
34 |
+
outcome of those works is the identification of a decoherence time, beyond which the Wigner equation is in all a Fokker-
|
35 |
+
Planck equation since the higher-order derivatives may be safely neglected, and the quantized phase space may be resolved
|
36 |
+
only up to a finite scale. Such resolution does not depend on the Planck constant, but rather emerges from the balance of
|
37 |
+
the phase-space contraction rate (Lyapunov exponent) with the coupling of the system with an Ohmic environment.
|
38 |
+
More recent contributions have focussed on the efficiency of Wigner evolution for general types of dissipation [11],
|
39 |
+
and on obtaining a Lindblad-based dissipative Wigner equation to tackle quantum friction [12, 13].
|
40 |
+
Once it is established that, under suitable conditions and after a sufficiently long time of evolution, the Wigner equation
|
41 |
+
has the form of a Fokker-Planck equation, the quantum dissipative problem is cast into a classical stochastic process.
|
42 |
+
Moreover, if the underlying classical dynamics of the quantum system in exam is chaotic, the limiting resolution of the
|
43 |
+
phase space postulated in refs. [8, 10] is not expected to be uniform, but it will depend on the local interplay of the
|
44 |
+
stretching/contraction with the dissipation. In the equivalent classical noisy problem, it is the ‘Brownian’ diffusion that
|
45 |
+
plays the role of the dissipation.
|
46 |
+
In the past decade, significant steps [14, 15, 17, 18, 16] were taken to determine the resolution of a chaotic state space
|
47 |
+
in the presence of weak noise, and so reduce the dynamics to a Markov process of finite degrees of freedom, in the form
|
48 |
+
of a matrix. Low-dimensional discrete-time dynamical systems such as logistic- or Hénon-type maps have been treated in
|
49 |
+
a non-Hamiltonian setting, whose quantum analogs are in principle difficult to identify. The optimal resolution hypothesis
|
50 |
+
arXiv:2301.02165v1 [quant-ph] 4 Jan 2023
|
51 |
+
|
52 |
+
should be extended to continuous-time flows as well, and the starting point of that roadmap is a thorough comprehension
|
53 |
+
of the steady-state solutions of the Fokker-Planck equation around the building blocs of chaos: periodic orbits.
|
54 |
+
Here, we intend to lay the foundation of that understanding, by solving the Fokker-Planck equation of nonlinear
|
55 |
+
paradigmatic dynamical systems, classical and with weak noise. We examine two-dimensional flows featuring nonlinear-
|
56 |
+
ities but not yet chaos, where the competition between contraction and noise around a limit cycle results in a stationary
|
57 |
+
density, which characterizes the steady state, and, as shown at the very end of the manuscript, shares common traits with
|
58 |
+
the steady-state Wigner function of a case study in quantum dissipative dynamics.
|
59 |
+
The article is structured as follows: in section 2 we review the basic tools of the phase-space representation of quantum
|
60 |
+
dynamics, both in closed and open systems. We follow up in section 3 by discussing the main issues related to the evolution
|
61 |
+
of the Wigner function in a quantum chaotic setting, the effects of dissipation, and the correspondence of the Wigner- with
|
62 |
+
the Fokker-Planck equation. In section 4 a novel methodology is introduced to evaluate the steady-state solution of the
|
63 |
+
Fokker-Planck equation around a periodic orbit, which casts the partial differential equation into an ordinary differential
|
64 |
+
equation for the covariance matrix, known as Lyapunov equation. We first present a proof of concept on the simplest limit
|
65 |
+
cycle, of circular shape as from a Hopf bifurcation, to be followed in section 5 by the treatment of the nonlinear oscillators
|
66 |
+
that are the main object of the current study. At the end of the section the results on the Fokker-Planck steady-state
|
67 |
+
densities are paralleled to those obtained for the Wigner function in a recent study of a quantum-dissipative model of the
|
68 |
+
same oscillators. Summary and discussion close the paper.
|
69 |
+
2. Density matrix, Wigner function, and dissipation
|
70 |
+
Given a collection of physical systems, the ensemble average of an observable A is given by
|
71 |
+
⟨A⟩ =
|
72 |
+
�
|
73 |
+
i
|
74 |
+
ρi⟨ψi|A|ψi⟩ ,
|
75 |
+
(1)
|
76 |
+
or, using
|
77 |
+
ρ =
|
78 |
+
�
|
79 |
+
i
|
80 |
+
ρi|ψi⟩⟨ψi| ,
|
81 |
+
(2)
|
82 |
+
one can simply write
|
83 |
+
⟨A⟩ = Tr �ρ A� ,
|
84 |
+
(3)
|
85 |
+
so that, if the observable A is time-independent, knowing ρ at all times means solving the problem of dynamics. That is
|
86 |
+
the motivation for studying the density matrix ρ in the first place.
|
87 |
+
2.1. Quantum dynamics in the phase space
|
88 |
+
Now, the density ρ evolves according to the Liouville-von Neumann equation
|
89 |
+
iℏρt = �ρ, H� ,
|
90 |
+
(4)
|
91 |
+
the quantum analog of the well-known Liouville equation
|
92 |
+
ρt = {ρ, H}
|
93 |
+
(5)
|
94 |
+
of classical dynamics, which we spell out in phase space:
|
95 |
+
∂tρ = − p
|
96 |
+
m∂xρ +
|
97 |
+
�
|
98 |
+
∂xV(x)∂p
|
99 |
+
�
|
100 |
+
p ,
|
101 |
+
(6)
|
102 |
+
assuming a Hamiltonian of the form H = p2
|
103 |
+
2m + V(x).
|
104 |
+
In order to integrate the Liouville-von Neumann equation (4), we need to project it onto some basis, and several
|
105 |
+
representations are already available to us, for instance, the P- or the Q-representation (a.k.a. Husimi’s)
|
106 |
+
Q(α, α∗) = 1
|
107 |
+
π⟨α|ρ|α⟩ ,
|
108 |
+
(7)
|
109 |
+
with |α⟩ a coherent state. Studying quantum-to-classical correspondence, especially of a system that exhibits chaotic
|
110 |
+
behavior, is generally best achieved by using the Wigner representation [19]
|
111 |
+
W(x, p) =
|
112 |
+
1
|
113 |
+
2πℏ
|
114 |
+
�
|
115 |
+
e−ipy/ℏψ
|
116 |
+
�
|
117 |
+
x + y
|
118 |
+
2
|
119 |
+
�
|
120 |
+
ψ∗ �
|
121 |
+
x − y
|
122 |
+
2
|
123 |
+
�
|
124 |
+
dy ,
|
125 |
+
(8)
|
126 |
+
|
127 |
+
which can also be expressed in terms of the density matrix, as
|
128 |
+
W(x, p) = 1
|
129 |
+
πℏ
|
130 |
+
�
|
131 |
+
e−2ipy/ℏ⟨x − y|ρ|x + y⟩dy ,
|
132 |
+
(9)
|
133 |
+
of which ⟨x − y|ρ|x + y⟩ is called Weyl transform. An operator A may also be projected onto phase space, by applying a
|
134 |
+
Weyl transform:
|
135 |
+
˜A(x, p) =
|
136 |
+
�
|
137 |
+
e−ipy/ℏ⟨x + y/2|A|x − y/2⟩dy ,
|
138 |
+
(10)
|
139 |
+
which can prove handy in the evaluation of expectation values, that is
|
140 |
+
⟨A⟩ = Tr �ρ A� =
|
141 |
+
�
|
142 |
+
W(x, p) ˜A(x, p)dxdp ,
|
143 |
+
(11)
|
144 |
+
since, in general,
|
145 |
+
Tr [AB] =
|
146 |
+
�
|
147 |
+
˜A(x, p) ˜B(x, p)dxdp .
|
148 |
+
(12)
|
149 |
+
Thus, expectation values of observables are determined by means of phase-space averages, and the problem of quantum
|
150 |
+
mechanics boils down to that of the time evolution of the Wigner function. It has been shown [19] that W(x, p) obeys the
|
151 |
+
Wigner equation
|
152 |
+
∂tW(x, p) = − p
|
153 |
+
m∂xW(x, p) +
|
154 |
+
∞
|
155 |
+
�
|
156 |
+
s=0
|
157 |
+
cs(−ℏ2)s∂2s+1
|
158 |
+
x
|
159 |
+
V(x)∂2s+1
|
160 |
+
p
|
161 |
+
W(x, p) ,
|
162 |
+
(13)
|
163 |
+
that, in general, bears an infinite number of terms. In reality, integrating equation (13) can already be impractical if there
|
164 |
+
are just a few nontrivial terms in the summation [20]. If the potential V(x) is at most quadratic, the Wigner equation
|
165 |
+
reduces to Liouville’s, as in (6). Otherwise, Eq. (13) is still not easy to deal with, and, importantly, it may not be truncated
|
166 |
+
in the semiclassical limit, since the terms ∂2s+1
|
167 |
+
p
|
168 |
+
W(x, p) bring down powers of ℏ−1−2s, so that
|
169 |
+
ℏ2s ·
|
170 |
+
1
|
171 |
+
ℏ2s+1 ∼ ℏ−1 ,
|
172 |
+
(14)
|
173 |
+
and O
|
174 |
+
�
|
175 |
+
ℏ−1�
|
176 |
+
does grow in the limit ℏ → 0, making no terms in the Wigner equation negligible, in principle.
|
177 |
+
2.2. Open systems
|
178 |
+
On the other hand, let us suppose the system is connected to an environment, whose interaction produces two addi-
|
179 |
+
tional terms in the right-hand side of the Wigner equation (13), that is [8]
|
180 |
+
2γ∂p
|
181 |
+
�pW(x, p)� + D∂2
|
182 |
+
ppW(x, p) .
|
183 |
+
(15)
|
184 |
+
The first term produces relaxation, due to the exchange of energy with the environment, and γ is the relaxation rate. The
|
185 |
+
second term means diffusion, responsible for the so-called decoherence process, where one sets D = 2γMkBT, with M
|
186 |
+
mass of the system, and T temperature of the environment. The dissipation and diffusion terms are obtained from a path-
|
187 |
+
integral formulation of the system-environment interaction, that traces back to the works of Feynman and Vernon [5], and,
|
188 |
+
later, of Caldeira and Leggett [6].
|
189 |
+
If the potential V(x) is at most quadratic, one recovers the Fokker-Planck equation, that describes the classical evolu-
|
190 |
+
tion of the density of trajectories produced by a particle subject to Brownian motion:
|
191 |
+
∂tW(x, p) = − p
|
192 |
+
m∂xW(x, p) + ∂xV(x)∂pW(x, p) + 2γ∂p
|
193 |
+
�pW(x, p)� + D∂2
|
194 |
+
ppW(x, p) .
|
195 |
+
(16)
|
196 |
+
This equation is fully quantum mechanical, and W(x, p) may take on negative values, unlike the classical phase-space
|
197 |
+
density of a Brownian particle.
|
198 |
+
Yet, for a general potential V(x), the evolution of the dissipative system is ruled by the full-fledged Wigner equa-
|
199 |
+
tion (13) plus the terms (15) due to the environment:
|
200 |
+
∂tW(x, p) = − p
|
201 |
+
m∂xW(x, p) +
|
202 |
+
∞
|
203 |
+
�
|
204 |
+
s=0
|
205 |
+
cs(−ℏ2)s∂2s+1
|
206 |
+
x
|
207 |
+
V(x)∂2s+1
|
208 |
+
p
|
209 |
+
W(x, p) + 2γ∂p
|
210 |
+
�pW(x, p)� + D∂2
|
211 |
+
ppW(x, p) .
|
212 |
+
(17)
|
213 |
+
The resulting equation is still plagued with an infinite number of derivatives, and is thus of impractical integration. In the
|
214 |
+
next section, we discuss whether and how it is safe to neglect the higher-order terms in Eq. (17), in the context of quantum
|
215 |
+
chaos.
|
216 |
+
|
217 |
+
3. Stretching, contracting, and Zaslavsky’s time
|
218 |
+
Let us examine some aspects of the evolution of the Wigner function, when the underlying classical dynamics of the
|
219 |
+
system is chaotic. By established knowledge [21], the two main features of chaos are
|
220 |
+
1. Nearby trajectories diverge exponentially fast, meaning that, letting x = (x, p),
|
221 |
+
λ = lim
|
222 |
+
t→∞ ln
|
223 |
+
�����
|
224 |
+
δx(t)
|
225 |
+
δx(0)
|
226 |
+
����� > 0 ,
|
227 |
+
(18)
|
228 |
+
in other words, the difference δx(t) between any two nearby trajectories grows exponentially fast for any initial
|
229 |
+
conditions. This feature is also described as extreme sensitivity of the system to initial conditions.
|
230 |
+
2. The number M of qualitatively distinct orbits (‘configurations’, tagged by symbolic sequences) scales exponentially
|
231 |
+
with their length, so that the topological entropy is positive:
|
232 |
+
S = lim
|
233 |
+
t→∞
|
234 |
+
1
|
235 |
+
t ln M(t) > 0 .
|
236 |
+
(19)
|
237 |
+
3.1. Chaos and the Wigner function
|
238 |
+
Chaos is the result of a stretching and folding process mainly due to nonlinearities. For a Hamiltonian system, volumes
|
239 |
+
in the phase space are conserved (by Liouville’s theorem), so that the amount of stretching (diverging trajectories) in some
|
240 |
+
directions must be compensated by an equal amount of contraction in others.
|
241 |
+
As a result, the inconvenient higher-order terms in the Wigner equation (13) can be estimated to evolve as
|
242 |
+
∂2s+1
|
243 |
+
p
|
244 |
+
W(x, p) ∝ W(x, p)
|
245 |
+
δp2s+1(t) ∼
|
246 |
+
W(x, p)
|
247 |
+
δp(0) e−(2s+1)λt ,
|
248 |
+
(20)
|
249 |
+
for smooth enough W(x, p). Thus, the inherent problem is in principle not with the smoothness of the density, but rather
|
250 |
+
with the fact that the phase space contracts at an exponential rate, and therefore the contribution of higher-order derivatives
|
251 |
+
in the equation (13) is more and more important, as time proceeds. To better illustrate that, let us compare the terms in
|
252 |
+
the Poisson brackets of the Liouville equation (6) (also present in the full-fledged Wigner equation), with the higher-order
|
253 |
+
terms in Eq. (13):
|
254 |
+
∂xV(x)∂pW(x, p)
|
255 |
+
cs∂2s+1
|
256 |
+
x
|
257 |
+
V(x)∂2s+1
|
258 |
+
p
|
259 |
+
W(x, p) ∼ 1
|
260 |
+
cs
|
261 |
+
∂xV(x)
|
262 |
+
∂2s+1
|
263 |
+
x
|
264 |
+
V(x)
|
265 |
+
δp2s
|
266 |
+
W2s(x, p) ∼ 1
|
267 |
+
cs
|
268 |
+
∂xV(x)
|
269 |
+
∂2s+1
|
270 |
+
x
|
271 |
+
V(x)
|
272 |
+
δp(0) e−2sλt
|
273 |
+
W2s(x, p) ≫ 1
|
274 |
+
(21)
|
275 |
+
is a condition for the higher-order terms to be negligible with respect to the lower-order, ‘Liouville’ terms. The above
|
276 |
+
inequality can be inverted, and turned into a condition for the time t:
|
277 |
+
t ≪ 1
|
278 |
+
λ ln
|
279 |
+
� ∂xV(x)
|
280 |
+
∂2s+1
|
281 |
+
x
|
282 |
+
V(x)
|
283 |
+
δp(0)
|
284 |
+
csW2s(x, p)
|
285 |
+
�−1/2s
|
286 |
+
.
|
287 |
+
(22)
|
288 |
+
Identifying the quantity XV δp(0) =
|
289 |
+
∂xV(x)δp(0)
|
290 |
+
∂2s+1
|
291 |
+
x
|
292 |
+
V(x)W2s(x,p) with the typical action of the system, we can now understand
|
293 |
+
t∗ = 1
|
294 |
+
λ ln XV δp(0)
|
295 |
+
ℏ
|
296 |
+
(23)
|
297 |
+
as the time scale within which the inconvenient higher-order terms of the Wigner equation may be neglected. Some
|
298 |
+
literature refers to t∗ as Zaslavsky’s time [22]. Its meaning is somehow related to the more commonly mentioned Ehrenfest
|
299 |
+
time, as in fact t∗ is longer the larger the ratio of the typical action to ℏ, and longest in the semiclassical limit. Still, the
|
300 |
+
basic idea of this correspondence time does not relate directly with interference or need ‘semiclassical’ dynamics, but
|
301 |
+
rather implies a finite resolution for the quantized phase space within a certain time scale, irrespective of the scale of the
|
302 |
+
action. In general, the smoother the potential V(x), the longer t∗, the larger the Lyapunov exponent λ, the shorter t∗.
|
303 |
+
3.2. A resolution for the quantized phase space
|
304 |
+
In a simplified but physically meaningful description, that will then prove more accurate as a local model, we may rec-
|
305 |
+
ognize and estimate the competing effects of dynamical contraction on the one hand, and of dissipation-induced diffusion
|
306 |
+
on the other hand, by quantizing the Hamiltonian H = λxp. A wave packet of the form
|
307 |
+
W(x, p) ∼ e−x2/σ2−σ2p2
|
308 |
+
(24)
|
309 |
+
|
310 |
+
evolves separately along the stretching x−direction, and the contracting p−direction. In momentum space, we have the
|
311 |
+
Schrödinger equation
|
312 |
+
∂tu(p, t) = λp∂pu(p, t) ⇒ u(p, t) = u0
|
313 |
+
�
|
314 |
+
peλt�
|
315 |
+
,
|
316 |
+
(25)
|
317 |
+
that maps the wave packet in the p−direction as
|
318 |
+
e−σ2p2/2 → ee2λtσ2p2/2 ,
|
319 |
+
(26)
|
320 |
+
and thus the width σ−2 shrinks by a factor of e−2λt after time t. Identifying σ−1 with the uncertainty δp(t) of the momentum,
|
321 |
+
we may say that
|
322 |
+
δp(t) ∼ δp(0)e−λt
|
323 |
+
(27)
|
324 |
+
along the contracting direction. On the other hand, connecting the system to an environment brings about diffusion, and
|
325 |
+
∂tu(p, t) = D∂ppu(p, t) ⇒ u(p, t) ∼ e−p2/2(δp(0)+Dt) ,
|
326 |
+
(28)
|
327 |
+
whose variance evolves as
|
328 |
+
√
|
329 |
+
Dt:
|
330 |
+
δp(t) ∼ �δp(0) + Dt�1/2
|
331 |
+
(29)
|
332 |
+
Then, intuitively, there must be some minimal scale in the contracting direction, set by
|
333 |
+
δpmin ∼
|
334 |
+
� D
|
335 |
+
2λ
|
336 |
+
�1/2
|
337 |
+
.
|
338 |
+
(30)
|
339 |
+
The full picture is called Ornstein-Uhlenbeck problem [23]
|
340 |
+
∂tu(p, t) = D∂ppu(p, t) − λ∂pu(p, t) .
|
341 |
+
(31)
|
342 |
+
In particular, the larger δpmin, the closer the evolution of the Wigner function to a stochastic process. More precisely, the
|
343 |
+
regime where we may neglect the higher-order derivatives in the Wigner equation is deduced from Eq. (21) as
|
344 |
+
XV δpmin
|
345 |
+
ℏ
|
346 |
+
≫ 1 ,
|
347 |
+
(32)
|
348 |
+
and that requires a relatively smooth potential, and the coefficient of the decoherence term in Eq. (16), D, to be comparable
|
349 |
+
to the Lyapunov exponent λ. Now, if δpmin is an ‘equilibrium’ value as argued above, the chaotic contraction is no
|
350 |
+
longer shrinking the scale of phase-space probability exponentially and indefinitely as in the non-dissipative setting (
|
351 |
+
recall δp(t) ∼ δp(0)e−λt). Hence, in principle there would be no Zaslavsky’s time t∗, but rather, the quantum dissipative
|
352 |
+
evolution may be well described by the Fokker-Planck type of equation (16) at all times, provided that the initial condition
|
353 |
+
is smooth enough. Importantly, the semiclassical limit is not required for this approximation to work.
|
354 |
+
4. Contraction vs. diffusion in stochastic dynamics
|
355 |
+
Equation (16) and the discussion from the previous section suggest that, under suitable conditions, the problem of
|
356 |
+
the dynamics of a quantum system connected to an environment may be cast into the classical evolution of a density
|
357 |
+
according to a Fokker-Planck equation. As a consequence, studying the interplay of stretching/contracting dynamics with
|
358 |
+
weak noise may also help shed light on quantum dissipation. Particularly interesting scenarios arise when the deterministic
|
359 |
+
dynamics exhibits chaotic behavior. It is in fact well known that the phase space of a chaotic system has a self-similar
|
360 |
+
(fractal) structure of infinite resolution. However, in reality, every system experiences noise, coming from experimental
|
361 |
+
uncertainties, neglected degrees of freedom, or roundoff errors, for example. No matter how weak, noise smoothens out
|
362 |
+
fractals, giving the system a finite resolution. The consequences are dramatic for the computation of long-time dynamical
|
363 |
+
averages, such as diffusion coefficients or escape rates, since infinite-dimensional operators describing the evolution of
|
364 |
+
the system (such as Fokker-Planck) effectively become finite matrices. With the aim of efficiently estimating long-time
|
365 |
+
averages of observables for a chaotic dynamical system affected by background noise, a recent endeavor carried on over
|
366 |
+
the past decade has achieved a technique to partition the chaotic phase space up to its optimal resolution, using unstable
|
367 |
+
periodic orbits. The benchmark models already treated range from one-dimensional discrete-time repellers [14], and
|
368 |
+
general unimodal maps [15], to two-dimensional chaotic attractors [18, 17]. Most importantly, a finite resolution for
|
369 |
+
the state space of these models has effectively changed the dimensionality of the Fokker-Planck operator from infinite
|
370 |
+
to inherently finite. Consequently, computations of the desired long-time averages become simpler and more efficient.
|
371 |
+
On a more intuitive note, the present results also bear physical significance because, even when the external noise is
|
372 |
+
|
373 |
+
uncorrelated, additive, isotropic, and homogenous, the interplay of noise and nonlinear dynamics always results in a
|
374 |
+
local stochastic neighborhood, whose covariance depends on both the past and the future noise integrated and nonlinearly
|
375 |
+
convolved with deterministic evolution along the trajectory. In that sense, noise is effectively never ‘white’ in nonlinearity,
|
376 |
+
and thus the optimal resolution varies from neighborhood to neighborhood and has to be computed locally.
|
377 |
+
As stated in the introduction, here we attack continuous-time dynamical systems, and begin by studying the evolution
|
378 |
+
of noisy neighborhoods of periodic orbits. The simplest yet meaningful models are two-dimensional limit cycles, that can
|
379 |
+
serve as testbed for parsing the interaction of deterministic dynamics with noise.
|
380 |
+
4.1. The Lyapunov equation around a cycle
|
381 |
+
Consider the Fokker-Planck equation
|
382 |
+
∂tρ(x, t) = −∂x (v(x)ρ(x, t)) + ∆∂xxρ(x, t) ,
|
383 |
+
(33)
|
384 |
+
where ∆ is the diffusion tensor, whose entries are the noise amplitudes along each direction (∆ is diagonal with identical
|
385 |
+
entries for isotropic noise). If we look at the dynamics in the neighborhood of a particular deterministic trajectory, we
|
386 |
+
may linearize the velocity field v(x) locally, and replace it with Aa(x − xa), where Aa = ∂v(x)
|
387 |
+
∂x
|
388 |
+
����x=xa is the so-called matrix of
|
389 |
+
variations. Moreover, we may switch to a co-moving reference frame in the desired neighborhood, say za = x − xa .
|
390 |
+
Suppose we start off with an initial density of trajectories of Gaussian shape, that is ρa(za) =
|
391 |
+
1
|
392 |
+
Ca exp
|
393 |
+
�
|
394 |
+
−z⊤
|
395 |
+
a
|
396 |
+
1
|
397 |
+
Qa za
|
398 |
+
�
|
399 |
+
. The
|
400 |
+
short-time solution to (33) can then be written in the path-integral form
|
401 |
+
ρa+1(za+1)
|
402 |
+
=
|
403 |
+
1
|
404 |
+
Ca
|
405 |
+
�
|
406 |
+
[dza] exp
|
407 |
+
�
|
408 |
+
−1
|
409 |
+
2(za+1 − (1 + Aaδt)za)⊤ 1
|
410 |
+
∆δt (za+1 − (1 + Aaδt)za) − 1
|
411 |
+
2z⊤
|
412 |
+
a
|
413 |
+
1
|
414 |
+
Qa
|
415 |
+
za
|
416 |
+
�
|
417 |
+
=
|
418 |
+
1
|
419 |
+
Ca+1
|
420 |
+
exp
|
421 |
+
�
|
422 |
+
−1
|
423 |
+
2z⊤
|
424 |
+
a+1
|
425 |
+
1
|
426 |
+
(1 + Aaδt)Qa(1 + Aaδt)T + ∆δt za+1
|
427 |
+
�
|
428 |
+
.
|
429 |
+
(34)
|
430 |
+
One can then infer the relation between input and output quadratic forms in the exponential
|
431 |
+
Qa+1 = ∆δt + (1 + Aaδt)Qa(1 + Aaδt)⊤ ,
|
432 |
+
(35)
|
433 |
+
and, neglecting terms of order δt2, recover the time-dependent Lyapunov equation
|
434 |
+
˙Q = A(t)Q + QA⊤(t) + ∆ ,
|
435 |
+
Q(t0) = Q0 .
|
436 |
+
(36)
|
437 |
+
Following the theory of time-dependent ordinary differential equations [24], we may write the solution of (36) as
|
438 |
+
Q(t) = J(t, t0)
|
439 |
+
�
|
440 |
+
Q(t0) +
|
441 |
+
� t
|
442 |
+
t0
|
443 |
+
J−1(s, t0)∆
|
444 |
+
�
|
445 |
+
J−1(s, t0)
|
446 |
+
�⊤ds
|
447 |
+
�
|
448 |
+
J⊤(t, t0) .
|
449 |
+
(37)
|
450 |
+
Here J(t, t0) is the Jacobian along a flow x = x(t):
|
451 |
+
d
|
452 |
+
dt J(t, t0) = A(x)J(t, t0),
|
453 |
+
J(t0, t0) = 1 .
|
454 |
+
(38)
|
455 |
+
One can verify this by just plugging the solution above into the equation. Alternatively, one can write Eq. (37) in the
|
456 |
+
simpler form
|
457 |
+
Q(t) = J(t, t0)Q(t0)J⊤(t, t0) +
|
458 |
+
� t
|
459 |
+
t0
|
460 |
+
J(t, s)∆J⊤(t, s)ds ,
|
461 |
+
(39)
|
462 |
+
where the notation J(t, s) means that the Jacobian is computed following a trajectory that starts at time s and ends at time
|
463 |
+
t, consistently with Eq. (38).
|
464 |
+
4.2. Noisy circle
|
465 |
+
Next, consider one of the simplest 2-dimensional dynamical systems, a pair of ODEs with a circular limit cycle of
|
466 |
+
radius rc, together with additive isotropic white noise of strength 2D:
|
467 |
+
˙x
|
468 |
+
=
|
469 |
+
λ(rc −
|
470 |
+
�
|
471 |
+
x2 + y2)x − ωy +
|
472 |
+
√
|
473 |
+
2Dξx
|
474 |
+
˙y
|
475 |
+
=
|
476 |
+
λ(rc −
|
477 |
+
�
|
478 |
+
x2 + y2)y + ωx +
|
479 |
+
√
|
480 |
+
2Dξy
|
481 |
+
(40)
|
482 |
+
|
483 |
+
�1.0
|
484 |
+
�0.5
|
485 |
+
0.5
|
486 |
+
1.0
|
487 |
+
x
|
488 |
+
�1.0
|
489 |
+
�0.5
|
490 |
+
0.5
|
491 |
+
1.0
|
492 |
+
y
|
493 |
+
Figure 1: Solution of the numerically integrated Eq. (40) without noise. Any initial condition converges to the circular
|
494 |
+
limit cycle.
|
495 |
+
where
|
496 |
+
< ξx(t)ξx(τ) >= δ(t − τ),
|
497 |
+
< ξx(t)ξy(τ) >= 0.
|
498 |
+
(41)
|
499 |
+
In polar coordinates, this is written
|
500 |
+
˙r
|
501 |
+
=
|
502 |
+
λ(rc − r)r +
|
503 |
+
√
|
504 |
+
2Dξx cos θ +
|
505 |
+
√
|
506 |
+
2Dξy sin θ
|
507 |
+
˙θ
|
508 |
+
=
|
509 |
+
ω −
|
510 |
+
√
|
511 |
+
2Dξx
|
512 |
+
sin θ
|
513 |
+
r
|
514 |
+
+
|
515 |
+
√
|
516 |
+
2Dξy
|
517 |
+
cos θ
|
518 |
+
r
|
519 |
+
(42)
|
520 |
+
This Langevin-type equation produces the drift and diffusion coefficients [23]
|
521 |
+
Dr
|
522 |
+
=
|
523 |
+
λ(rc − r)r + 2D
|
524 |
+
r
|
525 |
+
Dθ
|
526 |
+
=
|
527 |
+
ω
|
528 |
+
Drr
|
529 |
+
=
|
530 |
+
2D
|
531 |
+
Dθθ
|
532 |
+
=
|
533 |
+
2D
|
534 |
+
r2
|
535 |
+
(43)
|
536 |
+
which then determine the Fokker-Planck equation for the system:
|
537 |
+
∂tP + 1
|
538 |
+
r ∂r[λ(rc − r)rP] + ∂θωP − D
|
539 |
+
r ∂r(r∂rP) − D
|
540 |
+
r2 ∂θθP = 0
|
541 |
+
(44)
|
542 |
+
The limit cycle r = rc can be either stable or unstable depending on the sign of λ. Let us consider the stable case.
|
543 |
+
The first thing to look for is a stationary solution to the asymptotic form of (44):
|
544 |
+
∂r[λ(rc − r)rP∞] − D∂r(r∂rP∞) = 0
|
545 |
+
(45)
|
546 |
+
A solution is
|
547 |
+
P∞(r) = Ce− λ
|
548 |
+
2D (r−rc)2 ,
|
549 |
+
(46)
|
550 |
+
which implies that P∞ is a Gaussian of width 2 √D/λ in the neighborhood of the limit cycle. The general solution to (44)
|
551 |
+
is [23]
|
552 |
+
P(r, θ, t) = e− λ
|
553 |
+
2D (r−rc)2
|
554 |
+
∞
|
555 |
+
�
|
556 |
+
n=0
|
557 |
+
∞
|
558 |
+
�
|
559 |
+
ν=−∞
|
560 |
+
Aν
|
561 |
+
ne−sν
|
562 |
+
nt(r − rc)|ν|L|ν|
|
563 |
+
n (r − rc)eiνθ
|
564 |
+
(47)
|
565 |
+
where L|ν|
|
566 |
+
n (r − rc) are generalized Laguerre polynomials and both the eigenvalues sν
|
567 |
+
n and the coefficients Aν
|
568 |
+
n can be found
|
569 |
+
numerically.
|
570 |
+
|
571 |
+
4.2.1. Neighborhood and coordinates
|
572 |
+
This problem has an obvious symmetry, which allows us to guess the right (nonlinear!) change of coordinates, as well
|
573 |
+
as the stationary solution, that is independent of the angular coordinate. The result is that the noisy neighborhood of the
|
574 |
+
limit cycle is determined by the variance of the stationary solution (46). In general, however, we might not be so lucky,
|
575 |
+
and guessing a suitable, possibly nonlinear, change of coordinates is probably beyond our reach. One way to identify a
|
576 |
+
neighborhood for a periodic or any other orbit is to integrate the time-dependent Lyapunov equation (36) in the original
|
577 |
+
(Cartesian) coordinates, but in a co-moving frame defined by the local coordinates za = x − xa introduced in section 4.1.
|
578 |
+
Figure 2 illustrates this second approach: the forward Lyapunov equation (36) is numerically solved along an orbit that
|
579 |
+
converges to the circular limit cycle 1, and its solution (39) is sampled along the trajectory and inverted to obtain Q−1(t),
|
580 |
+
the covariance matrix of the Gaussian density, that produces a tube (in the figure in light yellow) along the orbit. The
|
581 |
+
eigenvalues of Q−1(t) are found to converge to Λ1 =
|
582 |
+
λ
|
583 |
+
2D, consistently with the result for the width of the stationary-state
|
584 |
+
solution (46) of the full-blown radial Fokker-Planck equation (45): that determines the width of the tube, σ = √1/2Λ1.
|
585 |
+
The second eigenvalue of Q−1 is Λ2 = 0, as it appears from fig. 2(b). The latter eigenvalue is to be read as follows: while
|
586 |
+
the forward Lyapunov equation converges to a finite limit in the stable (radial) direction, where noise balances contracting
|
587 |
+
dynamics, it diverges along the marginal (tangent) direction, and therefore its inverse converges to zero, asymptotically.
|
588 |
+
As shown in Fig. 2(c)-(d), the exact solution (46) of the Fokker-Planck equation is well reproduced by piecing together
|
589 |
+
Gaussian tubes of covariance Q−1(t), each computed around a definite point of the noiseless limit cycle (the spurious
|
590 |
+
lines orthogonal to the circle in Fig. 2(d) are due to the finite sampling of the Gaussian tubes, that should ideally be a
|
591 |
+
continuum).
|
592 |
+
As we may mostly be interested in the solution of the Lyapunov equation near unstable periodic orbits (like in a chaotic
|
593 |
+
system), we then need to solve the same problem backwards in time, otherwise said by studying adjoint evolution, or the
|
594 |
+
adjoint Lyapunov equation.
|
595 |
+
4.3. Adjoint Lyapunov equation
|
596 |
+
The backward evolution is described by the adjoint Fokker-Planck equation
|
597 |
+
∂tρ(x, t) = v(x)∂xρ(x, t) + ∆∂xxρ(x, t) .
|
598 |
+
(48)
|
599 |
+
Following the line of thought of section 4.1, we can write the path-integral evolution of a Gaussian density in the neigh-
|
600 |
+
borhood of an orbit
|
601 |
+
ρa(za)
|
602 |
+
=
|
603 |
+
1
|
604 |
+
Ca+1
|
605 |
+
�
|
606 |
+
[dza+1] exp [−1
|
607 |
+
2(za+1 − (1 + Aaδt)za)⊤ 1
|
608 |
+
∆δt (za+1 − (1 + Aaδt)za) − 1
|
609 |
+
2z⊤
|
610 |
+
a+1
|
611 |
+
1
|
612 |
+
Qa+1
|
613 |
+
za+1]
|
614 |
+
=
|
615 |
+
1
|
616 |
+
Ca
|
617 |
+
exp
|
618 |
+
�
|
619 |
+
−1
|
620 |
+
2z⊤
|
621 |
+
a
|
622 |
+
1
|
623 |
+
Qa
|
624 |
+
za
|
625 |
+
�
|
626 |
+
,
|
627 |
+
(49)
|
628 |
+
where
|
629 |
+
Qa = (1 + Aaδt)−1 (Qa+1 + ∆δt)
|
630 |
+
�
|
631 |
+
(1 + Aaδt)⊤�−1 .
|
632 |
+
(50)
|
633 |
+
Analogously to the forward evolution, we can take the limit of infinitesimal time intervals and get the differential equation
|
634 |
+
˙Q = ∆ − A(t)Q − QA⊤(t) ,
|
635 |
+
(51)
|
636 |
+
the adjoint (or backward-) Lyapunov equation. Compared to the forward Lyapunov equation (36), the adjoint evolu-
|
637 |
+
tion (51) features the ‘time reversal’ operation A(t) → −A(t), and therefore we can still use Eq. (39) as a solution, as long
|
638 |
+
as the Jacobian along the orbit is computed as
|
639 |
+
d
|
640 |
+
dt J(t, t0) = −A(x)J(t, t0),
|
641 |
+
J(t0, t0) = 1 ,
|
642 |
+
(52)
|
643 |
+
and its computation follows the time reversed flow, that is the solution to the dynamical system ˙x = −v(x) .
|
644 |
+
1Here we take the diffusion tensor ∆ =
|
645 |
+
� 2D
|
646 |
+
0
|
647 |
+
0
|
648 |
+
2D
|
649 |
+
�
|
650 |
+
|
651 |
+
(a)
|
652 |
+
�1.0
|
653 |
+
�0.5
|
654 |
+
0.5
|
655 |
+
1.0
|
656 |
+
x
|
657 |
+
�1.0
|
658 |
+
�0.5
|
659 |
+
0.5
|
660 |
+
1.0
|
661 |
+
y
|
662 |
+
(b)
|
663 |
+
0
|
664 |
+
5
|
665 |
+
10
|
666 |
+
15
|
667 |
+
20
|
668 |
+
25
|
669 |
+
30t
|
670 |
+
0.2
|
671 |
+
0.4
|
672 |
+
0.6
|
673 |
+
0.8
|
674 |
+
1.0
|
675 |
+
Σ, �
|
676 |
+
(c)
|
677 |
+
(d)
|
678 |
+
Figure 2: (a) Solution of the numerically integrated Eq. (40), together with the eigenvectors (arrows) of the covariant
|
679 |
+
matrix Q−1, as given by the solution (39) of the forward Lyapunov equation, for noise amplitude 2D = 0.1. The light
|
680 |
+
yellow stripe is a pictorial representation of the Gaussian tube along the limit cycle (plan view); (b) The eigenvalues
|
681 |
+
Λ1 (blue dots), Λ2 (red dots) of Q−1, and the width σ (solid line) of the evolved density versus time t; (c) The exact
|
682 |
+
steady-state solution (46) to the Fokker-Planck equation for a noisy circular limit cycle; (d) The approximation to the
|
683 |
+
same steady-state, obtained by piecing together solutions (39) to the Lyapunov equation around the limit cycle.
|
684 |
+
5. Non-circular limit cycles: Classical noise vs. quantum dissipation
|
685 |
+
We now turn our attention to non-circular limit cycles with background noise, and determine the steady-state density
|
686 |
+
distribution yielded by the Fokker-Planck equation. We do so by integrating the Lyapunov equation in the neighborhood
|
687 |
+
of a trajectory that eventually converges to the limit cycle.
|
688 |
+
The paradigmatic models of our choice both come from the nonlinear oscillator
|
689 |
+
¨x + ω2
|
690 |
+
0x + µ
|
691 |
+
�
|
692 |
+
a ˙x
|
693 |
+
3 − b˙x
|
694 |
+
�
|
695 |
+
= 0 .
|
696 |
+
(53)
|
697 |
+
In what follows, we shall set a = 1, b = 3, ω0 = 1, and we will tweak µ. Equation (53) may be reduced to a dynamical
|
698 |
+
system as the Van der Pol oscillator
|
699 |
+
˙x
|
700 |
+
=
|
701 |
+
y
|
702 |
+
˙y
|
703 |
+
=
|
704 |
+
−µ
|
705 |
+
�
|
706 |
+
x2 − 3
|
707 |
+
�
|
708 |
+
y − x ,
|
709 |
+
(54)
|
710 |
+
|
711 |
+
yo
|
712 |
+
0
|
713 |
+
xyo
|
714 |
+
0
|
715 |
+
xor as the Rayleigh model
|
716 |
+
˙x
|
717 |
+
=
|
718 |
+
y − µ
|
719 |
+
�1
|
720 |
+
3 x3 − 3x
|
721 |
+
�
|
722 |
+
˙y
|
723 |
+
=
|
724 |
+
−x .
|
725 |
+
(55)
|
726 |
+
�6
|
727 |
+
�4
|
728 |
+
�2
|
729 |
+
2
|
730 |
+
4
|
731 |
+
6 x
|
732 |
+
�6
|
733 |
+
�4
|
734 |
+
�2
|
735 |
+
2
|
736 |
+
4
|
737 |
+
6
|
738 |
+
y
|
739 |
+
�4
|
740 |
+
�2
|
741 |
+
2
|
742 |
+
4
|
743 |
+
x
|
744 |
+
�4
|
745 |
+
�2
|
746 |
+
2
|
747 |
+
4
|
748 |
+
y
|
749 |
+
Figure 3: Solution of the numerically integrated (a) Eq. (55), and (b) Eq. (54), without noise. Any initial condition
|
750 |
+
converges to a limit cycle.
|
751 |
+
In both classical systems, the dynamics converges to a limit-cycle of non-circular shape, which depends on the pa-
|
752 |
+
rameters, and it is characterized by fast and slow motion. One therefore expects the interplay of noise with the inherent
|
753 |
+
nonlinear contraction to be non-uniform, unlike in the circular limit cycle examined in the previous section, and to give
|
754 |
+
rise to a stationary density distribution of varying covariance along the cycle. We consider both models (54) and (55) for
|
755 |
+
different values of the parameter µ, so as to gradually increase the eccentricity of the limit cycle, from a deformed circle
|
756 |
+
[fig. 4(a)] to a nearly rectangular orbit [fig. 5(b)], where the deterministic stretching/contraction are most inhomogeneous
|
757 |
+
along the cycle. The most notable feature is the oscillation along the direction orthogonal to that of noiseless motion of the
|
758 |
+
covariance of the Gaussian solution of the linearized Fokker-Planck equation, denoted by σ in figs. 4(c)-(d) and 5(c)-(d):
|
759 |
+
the more eccentric the limit cycle, the more widely and rapidly σ oscillates. That translates to a Gaussian steady-state
|
760 |
+
density featuring a width that increasingly depends on the position along the orbit with the parameter µ, as we can see in
|
761 |
+
the three-dimensional/density plots of figs. 4(e)-(f), and 5(e)-(f). As anticipated, these monodromic Gaussian distributions
|
762 |
+
computed by means of the Lyapunov equation and portrayed in the figures would be, in a chaotic setting, the building
|
763 |
+
blocs of a partition of the noisy phase space, whose non-uniform resolution is determined by their widths.
|
764 |
+
The Gaussian solutions of the Lyapunov equation computed and illustrated here share common traits with the steady-
|
765 |
+
state Wigner function of the same two oscillators (54) and (55), as obtained from a fully quantum mechanical compu-
|
766 |
+
tation that has recently appeared in the literature [25]. In that work, the quantization is performed by means of cre-
|
767 |
+
ation/annihilation operators
|
768 |
+
ˆa = 1
|
769 |
+
2 (ˆx + iˆy) ,
|
770 |
+
(56)
|
771 |
+
and its adjoint ˆa†, while dissipative terms are added to the Liouville-von Neumann equation (4), in the spirit of Lindblad’s
|
772 |
+
formalism:
|
773 |
+
iℏρt =
|
774 |
+
�
|
775 |
+
ρ, ˆa†ˆa
|
776 |
+
�
|
777 |
+
− γ1D
|
778 |
+
�
|
779 |
+
ˆa†�
|
780 |
+
− γ2D
|
781 |
+
�
|
782 |
+
ˆa2�
|
783 |
+
,
|
784 |
+
(57)
|
785 |
+
where
|
786 |
+
D [ˆc] ρ = ˆcρˆc† − 1
|
787 |
+
2 ˆc†ˆcρ − 1
|
788 |
+
2ρˆc†ˆc .
|
789 |
+
(58)
|
790 |
+
The above equation (57) was numerically integrated, and the Wigner function was then found to eventually concentrate
|
791 |
+
around the classical limit cycles, that feature similar eccentricities to the ones considered in the present work and plotted in
|
792 |
+
figs. 4 and 5. In particular (Fig. 6), the steady-state Wigner distribution is enhanced along ‘tubes’ of varying width, as it can
|
793 |
+
be noticed in the more eccentric density plots of the Rayleigh model [Fig. 6(c)-(d)]. This feature is especially apparent in
|
794 |
+
Fig. 6(d), where the high-density region is narrower along the vertical segments of the limit cycle (faster classical motion),
|
795 |
+
|
796 |
+
(a)
|
797 |
+
�4
|
798 |
+
�2
|
799 |
+
2
|
800 |
+
4
|
801 |
+
x
|
802 |
+
�4
|
803 |
+
�2
|
804 |
+
2
|
805 |
+
4
|
806 |
+
y
|
807 |
+
(b)
|
808 |
+
�4
|
809 |
+
�2
|
810 |
+
2
|
811 |
+
4
|
812 |
+
x
|
813 |
+
�4
|
814 |
+
�2
|
815 |
+
2
|
816 |
+
4
|
817 |
+
y
|
818 |
+
(c)
|
819 |
+
6
|
820 |
+
8
|
821 |
+
10
|
822 |
+
12
|
823 |
+
14
|
824 |
+
16
|
825 |
+
18t
|
826 |
+
0.2
|
827 |
+
0.4
|
828 |
+
0.6
|
829 |
+
0.8
|
830 |
+
1.0
|
831 |
+
1.2
|
832 |
+
Σ
|
833 |
+
(d)
|
834 |
+
6
|
835 |
+
8
|
836 |
+
10
|
837 |
+
12
|
838 |
+
14
|
839 |
+
16t
|
840 |
+
0.1
|
841 |
+
0.2
|
842 |
+
0.3
|
843 |
+
0.4
|
844 |
+
0.5
|
845 |
+
0.6
|
846 |
+
0.7Σ
|
847 |
+
(e)
|
848 |
+
(f)
|
849 |
+
Figure 4: Top: solution of the numerically integrated Eq. (54), together with the eigenvectors (arrows) of the covariant
|
850 |
+
matrix Q−1, as given by the solution (39) of the forward Lyapunov equation. In Eq. (54), we take (a)-(c)-(e) µ = 0.03, and
|
851 |
+
(b)-(d)-(f) µ = 0.2, while the amplitude of the noise is set to 2D = 0.1. The light yellow stripe represents the width σ of
|
852 |
+
the Gaussian density around the limit cycle; Middle: width of the Lyapunov tube, determined by the nonzero eigenvalue
|
853 |
+
of Q−1(t), vs. time t. The cycle period is tp ≈ 7 time units; Bottom: Gaussian solutions of the linearized Fokker-Planck
|
854 |
+
equation along the limit cycle.
|
855 |
+
|
856 |
+
yo
|
857 |
+
S
|
858 |
+
0
|
859 |
+
5
|
860 |
+
xyo
|
861 |
+
-5
|
862 |
+
0
|
863 |
+
5
|
864 |
+
x(a)
|
865 |
+
�4
|
866 |
+
�2
|
867 |
+
2
|
868 |
+
4 x
|
869 |
+
�4
|
870 |
+
�2
|
871 |
+
2
|
872 |
+
4
|
873 |
+
y
|
874 |
+
(b)
|
875 |
+
�6
|
876 |
+
�4
|
877 |
+
�2
|
878 |
+
2
|
879 |
+
4
|
880 |
+
6 x
|
881 |
+
�6
|
882 |
+
�4
|
883 |
+
�2
|
884 |
+
2
|
885 |
+
4
|
886 |
+
6
|
887 |
+
y
|
888 |
+
(c)
|
889 |
+
0
|
890 |
+
2
|
891 |
+
4
|
892 |
+
6
|
893 |
+
8
|
894 |
+
10 12 14
|
895 |
+
t
|
896 |
+
0.1
|
897 |
+
0.2
|
898 |
+
0.3
|
899 |
+
0.4
|
900 |
+
0.5
|
901 |
+
0.6
|
902 |
+
0.7
|
903 |
+
Σ
|
904 |
+
(d)
|
905 |
+
0
|
906 |
+
2
|
907 |
+
4
|
908 |
+
6
|
909 |
+
8
|
910 |
+
t
|
911 |
+
0.1
|
912 |
+
0.2
|
913 |
+
0.3
|
914 |
+
0.4
|
915 |
+
0.5
|
916 |
+
0.6
|
917 |
+
0.7
|
918 |
+
Σ
|
919 |
+
(e)
|
920 |
+
(f)
|
921 |
+
Figure 5: Top: solution of the numerically integrated Eq. (55), together with the eigenvectors (arrows) of the covariant
|
922 |
+
matrix Q−1, as given by the solution (39) of the forward Lyapunov equation. In Eq. (55), we take (a)-(c)-(e) µ = 0.3, and
|
923 |
+
(b)-(d)-(f) µ = 0.8, while the amplitude of the noise is set to 2D = 0.1. The light yellow stripe represents the width σ of
|
924 |
+
the Gaussian density around the limit cycle; Middle: width of the Lyapunov tube, determined by the nonzero eigenvalue
|
925 |
+
of Q−1(t), vs. time t. The cycle period is tp ≈ 7 time units; Bottom: Gaussian solutions of the linearized Fokker-Planck
|
926 |
+
equation along the limit cycle.
|
927 |
+
|
928 |
+
yo
|
929 |
+
.5
|
930 |
+
0
|
931 |
+
5
|
932 |
+
x5
|
933 |
+
yo
|
934 |
+
0
|
935 |
+
5
|
936 |
+
xand wider along its horizontal segments (slower classical motion). It compares directly with the Gaussian solution of the
|
937 |
+
Lyapunov equation portrayed in Fig. 5(f).
|
938 |
+
It is noted that in the cited work, the authors did not integrate the Wigner equation, but the Lindblad equation with
|
939 |
+
a full-fledged quantum-mechanical algorithm. In particular, the localization of the Wigner function around the classical
|
940 |
+
limit cycles is not to be taken for granted, and it legitimates the parallel between their steady-state solutions and the local
|
941 |
+
Gaussian tubes obtained in the present work from the noisy classical system.
|
942 |
+
On the other hand, the numerical steady-state solutions to Eq. (58) obtained by the authors of [25] are clearly not
|
943 |
+
Gaussians centered at the limit cycles (except in Fig. 6(a), the case of least eccentricity), as demonstrated by their varying
|
944 |
+
intensities along the periodic orbits. In that sense, the Gaussian Ansatz that turns the Fokker-Planck- into the Lyapunov
|
945 |
+
equation carries but limited information on the phase-space density distributions at equilibrium. Therefore, the analogy
|
946 |
+
proposed here should be taken with a grain of salt, and only considered as a hint for the noisy-classical to quantum-
|
947 |
+
dissipative correspondence in a particular system with nontrivial interplay of contraction and diffusion.
|
948 |
+
Finally, we would like to briefly comment on the difference between classical and quantum dissipation in the present
|
949 |
+
models featuring limit cycles. In the classical system the dissipation produces damping, which is then balanced by the
|
950 |
+
noise-induced diffusion. Instead, the quantum dissipation, generated by the characteristic Lindblad terms in Eq. (57), is
|
951 |
+
responsible for both the ‘friction’ that drives densities to localize along the classical limit cycles, and the diffusion that
|
952 |
+
spreads out the steady-state Wigner density distribution in the same region of the attracting orbits. This is consistent with
|
953 |
+
the more general picture of section 2.2, where the quantum dissipation brings about both a damping- and a diffusive term
|
954 |
+
in the Wigner equation.
|
955 |
+
Figure 6: Quantum Van der Pol- and Rayleigh oscillators from [25]. In the figures the steady-state Wigner function is
|
956 |
+
portrayed for increasing eccentricity parameter µ from Eqs. (54) [in (a)-(b)] and (55) [in (c)-(d)]. Reproduced with the
|
957 |
+
permission of the American Physical Society from Ref. [25].
|
958 |
+
6. Summary and discussion
|
959 |
+
Having reviewed the parallels between the problem of dynamical evolution of a quantum system subject to dissipation
|
960 |
+
and that of a stochastic process ruled by Fokker-Planck’s equation, we have narrowed our attention down to chaos, and,
|
961 |
+
in particular, to the problem of an inherent scale resolution of the phase space. The issue is measuring the conjugated
|
962 |
+
variables down to a certain precision, which may be set by the balance of the contraction rate of the classical chaos with
|
963 |
+
the coupling to the environment, the source of dissipation.
|
964 |
+
Using the analogy with the problem of classical chaotic dynamics with background noise, we consider the Fokker-
|
965 |
+
Planck equation, and study its local solutions in the neighborhood of a periodic orbit, that effectively give the latter a
|
966 |
+
finite width, in the phase space. Solving the problem for two-dimensional limit cycles, as done here, is the starting
|
967 |
+
point: in a chaotic setting, a number of periodic tubes of finite width that proliferate exponentially with their length must
|
968 |
+
end up overlapping, and thus determine the finest resolution for the noisy/quantized state space, that is expected to be
|
969 |
+
non-uniform, as chaos interacts differently with diffusion/dissipation everywhere, in general.
|
970 |
+
The analysis performed in this venue shows that the problem is tractable, and it provides the basic technology to attack
|
971 |
+
it. Complications and obstacles are ahead for higher-dimensional systems, where stable, unstable, and marginal directions
|
972 |
+
coexist along the same orbit, and where the solution to the adjoint Fokker-Planck operator introduced here will almost
|
973 |
+
certainly be instrumental to the method. Still, the progress already achieved by periodic orbit theory in such complex
|
974 |
+
models as the Kuramoto-Sivashinsky or the Navier-Stokes equation give us confidence in the feasibility of the optimal
|
975 |
+
partition hypothesis in higher-dimensional chaos.
|
976 |
+
|
977 |
+
(a)
|
978 |
+
5 (b)
|
979 |
+
p
|
980 |
+
0
|
981 |
+
P o
|
982 |
+
5
|
983 |
+
-5
|
984 |
+
-5
|
985 |
+
0
|
986 |
+
5
|
987 |
+
-5
|
988 |
+
0
|
989 |
+
5
|
990 |
+
Q
|
991 |
+
Q5 (c)
|
992 |
+
5 (d)
|
993 |
+
P o
|
994 |
+
p 0
|
995 |
+
-5
|
996 |
+
-5
|
997 |
+
0
|
998 |
+
5
|
999 |
+
-5
|
1000 |
+
0
|
1001 |
+
5
|
1002 |
+
Q
|
1003 |
+
QReferences
|
1004 |
+
[1] Zurek, W. H. Sub-Planck structure in phase space and its relevance for quantum decoherence. Nature 2001, 412, 6848.
|
1005 |
+
[2] Breuer, H.-P.; Petruccione, F. The Theory of Open Quantum Systems, Oxford University Press: London, United
|
1006 |
+
Kingdom, 2007.
|
1007 |
+
[3] Zubairy, M. S.; Scully, M. O. Quantum Optics, Cambridge University Press: Cambridge, United Kingdom, 1997.
|
1008 |
+
[4] Gardiner, C. W.; Zoller, P. Quantum Noise, Springer: Berlin, Germany, 2004.
|
1009 |
+
[5] Feynman, R. P.; Vernon, F. L. The theory of a general quantum system interacting with a linear dissipative system.
|
1010 |
+
Ann. Phys. 1963, 24, 118.
|
1011 |
+
[6] Caldeira, A. O.; Leggett, A. J. Path integral approach to quantum brownian motion. Physica A 1983, 121, 587–616.
|
1012 |
+
[7] Dittrich, T.; Graham, R., Effects of weak dissipation on the long-time behaviour of the quantized standard map
|
1013 |
+
Europhys. Lett. 1988, 7, 287–291.
|
1014 |
+
[8] Zurek, W. H.; Paz, J. P. Decoherence, Chaos, and the Second Law. Phys. Rev. Lett. 1993, 72, 2508–2511.
|
1015 |
+
[9] Kolovsky, A. R. A remark on the problem of quantum-classical correspondence in the case of chaotic dynamics.
|
1016 |
+
Europhys. Lett. 1994, 27, 79–84.
|
1017 |
+
[10] Kolovsky, A. R. Quantum coherence, evolution of the Wigner function, and transition from quantum to classical
|
1018 |
+
dynamics for a chaotic system. Chaos 1996, 6, 534–542.
|
1019 |
+
[11] Cabrera, R.; Bondar, D. I.; Jacobs, K; Rabitz, H. A. Efficient method to generate time evolution of the Wigner
|
1020 |
+
function for open quantum systems. Phys. Rev. A 2015, 92, 042122.
|
1021 |
+
[12] Bondar, D. I.; Cabrera, R.; Campos, A.; Mukamel, S.; Rabitz, H. A. Correction to Wigner-Lindblad equations for
|
1022 |
+
quantum friction J. Phys. Chem. Lett. 2016, 7, 1632.
|
1023 |
+
[13] Carlo, G. G.; Ermann, L.; Rivas, A. M. F. Effects of chaotic dynamics on quantum friction. Phys. Rev. E 2019, 99,
|
1024 |
+
042214.
|
1025 |
+
[14] Lippolis, D.; Cvitanovi´c, P. How well can one resolve the state space of a chaotic map?, Phys. Rev. Lett. 2010, 104,
|
1026 |
+
014101.
|
1027 |
+
[15] Cvitanovi´c, P.; Lippolis, D. Knowing when to stop: how noise frees us from determinism, AIP Conf. Proc. 2012,
|
1028 |
+
1468 , 82.
|
1029 |
+
[16] Heninger, J. M.; Lippolis, D.; Cvitanovi´c, P. Perturbation theory for the Fokker-Planck operator in chaos, Commun.
|
1030 |
+
Nonlinear Sci. Numer. Simulat. 2018, 55, 16.
|
1031 |
+
[17] Lippolis, D. Mapping densities in a noisy state space, IEICE Proc. Ser. 2014, 2, 318.
|
1032 |
+
[18] Heninger, J. M.; Lippolis, D.; Cvitanovi´c, P. Neighborhoods of periodic orbits and the stationary distribution of a
|
1033 |
+
noisy chaotic system, Phys. Rev. E 2015, 92, 062922.
|
1034 |
+
[19] Case, W. B. Wigner functions and Weyl transforms for pedestrians. Am. J. Phys. 2008, 76, 937.
|
1035 |
+
[20] Altland, A.; Haake, F. Quantum Chaos and Effective Thermalization. Phys. Rev. Lett. 2012, 108, 073601.
|
1036 |
+
[21] Gaspard, P. Chaos, Scattering and Statistical Mechanics; Cambridge University Press: Cambridge, United King-
|
1037 |
+
dom, 1998.
|
1038 |
+
[22] Berman, G. P.; Zaslavsky, G. M. Condition of stochasticity in quantum nonlinear systems. Physica A 1978, 91,
|
1039 |
+
450–460.
|
1040 |
+
[23] Risken, H. The Fokker-Planck Equation, Springer: Berlin, Germany, 1996.
|
1041 |
+
[24] Amann, H. Ordinary Differential Equations: an Introduction to Nonlinear Analysis; De Gruyter: Berlin, Germany,
|
1042 |
+
1990.
|
1043 |
+
[25] Chia, A.; Kwek, L. C.; Noh, C. Relaxation oscillations and frequency entrainment in quantum mechanics, Phys. Rev.
|
1044 |
+
E 2020, 102, 042213.
|
1045 |
+
|
8tA0T4oBgHgl3EQfOv9y/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
8tAyT4oBgHgl3EQfqPgO/content/tmp_files/2301.00537v1.pdf.txt
ADDED
@@ -0,0 +1,1396 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Posterior Collapse and
|
2 |
+
Latent Variable Non-identifiability
|
3 |
+
Yixin Wang
|
4 |
+
University of Michigan
|
5 | |
6 |
+
David M. Blei
|
7 |
+
Columbia University
|
8 | |
9 |
+
John P. Cunningham
|
10 |
+
Columbia University
|
11 | |
12 |
+
Abstract
|
13 |
+
Variational
|
14 |
+
autoencoders
|
15 |
+
model
|
16 |
+
high-dimensional
|
17 |
+
data
|
18 |
+
by
|
19 |
+
positing
|
20 |
+
low-
|
21 |
+
dimensional latent variables that are mapped through a flexible distribution
|
22 |
+
parametrized by a neural network. Unfortunately, variational autoencoders often
|
23 |
+
suffer from posterior collapse: the posterior of the latent variables is equal to its
|
24 |
+
prior, rendering the variational autoencoder useless as a means to produce mean-
|
25 |
+
ingful representations. Existing approaches to posterior collapse often attribute it
|
26 |
+
to the use of neural networks or optimization issues due to variational approxima-
|
27 |
+
tion. In this paper, we consider posterior collapse as a problem of latent variable
|
28 |
+
non-identifiability. We prove that the posterior collapses if and only if the latent
|
29 |
+
variables are non-identifiable in the generative model. This fact implies that pos-
|
30 |
+
terior collapse is not a phenomenon specific to the use of flexible distributions or
|
31 |
+
approximate inference. Rather, it can occur in classical probabilistic models even
|
32 |
+
with exact inference, which we also demonstrate. Based on these results, we pro-
|
33 |
+
pose a class of latent-identifiable variational autoencoders, deep generative mod-
|
34 |
+
els which enforce identifiability without sacrificing flexibility. This model class
|
35 |
+
resolves the problem of latent variable non-identifiability by leveraging bijective
|
36 |
+
Brenier maps and parameterizing them with input convex neural networks, with-
|
37 |
+
out special variational inference objectives or optimization tricks. Across syn-
|
38 |
+
thetic and real datasets, latent-identifiable variational autoencoders outperform ex-
|
39 |
+
isting methods in mitigating posterior collapse and providing meaningful repre-
|
40 |
+
sentations of the data.
|
41 |
+
1
|
42 |
+
Introduction
|
43 |
+
Variational autoencoders (VAE) are powerful generative models for high-dimensional data [28, 46].
|
44 |
+
Their key idea is to combine the inference principles of probabilistic modeling with the flexibility of
|
45 |
+
neural networks. In a VAE, each datapoint is independently generated by a low-dimensional latent
|
46 |
+
variable drawn from a prior, then mapped to a flexible distribution parametrized by a neural network.
|
47 |
+
Unfortunately, VAE often suffer from posterior collapse, an important and widely studied phe-
|
48 |
+
nomenon where the posterior of the latent variables is equal to prior [6, 8, 38, 62]. This phenomenon
|
49 |
+
is also known as latent variable collapse, KL vanishing, and over-pruning. Posterior collapse ren-
|
50 |
+
ders the VAE useless to produce meaningful representations, in so much as its per-datapoint latent
|
51 |
+
variables all have the exact same posterior.
|
52 |
+
Posterior collapse is commonly observed in the VAE whose generative model is highly flexible,
|
53 |
+
leading to the common speculation that posterior collapse occurs because VAE involve flexible
|
54 |
+
neural networks in the generative model [11], or because it uses variational inference [59]. Based
|
55 |
+
on these hypotheses, many of the proposed strategies for mitigating posterior collapse thus focus on
|
56 |
+
modifying the variational inference objective (e.g. [44]), designing special optimization schemes
|
57 |
+
35th Conference on Neural Information Processing Systems (NeurIPS 2021).
|
58 |
+
arXiv:2301.00537v1 [stat.ML] 2 Jan 2023
|
59 |
+
|
60 |
+
for variational inference in VAE (e.g. [18, 25, 32]), or limiting the capacity of the generative model
|
61 |
+
(e.g. [6, 16, 60].)
|
62 |
+
In this paper, we consider posterior collapse as a problem of latent variable non-identifiability. We
|
63 |
+
prove that posterior collapse occurs if and only if the latent variable is non-identifiable in the gen-
|
64 |
+
erative model, which loosely means the likelihood function does not depend on the latent vari-
|
65 |
+
able [40, 42, 56]. Below, we formally establish this equivalence by appealing to recent results in
|
66 |
+
Bayesian non-identifiability [40, 42, 43, 49, 58].
|
67 |
+
More broadly, the relationship between posterior collapse and latent variable non-identifiability im-
|
68 |
+
plies that posterior collapse is not a phenomenon specific to the use of neural networks or varia-
|
69 |
+
tional inference. Rather, it can also occur in classical probabilistic models fitted with exact inference
|
70 |
+
methods, such as Gaussian mixture models and probabilistic principal component analysis (PPCA).
|
71 |
+
This relationship also leads to a new perspective on existing methods for avoiding posterior collapse,
|
72 |
+
such as the delta-VAE [44] or the β-VAE [19]. These methods heuristically adjust the approximate
|
73 |
+
inference procedure embedded in the optimization of the model parameters. Though originally mo-
|
74 |
+
tivated by the goal of patching the variational objective, the results here suggest that these adjust-
|
75 |
+
ments are useful because they help avoid parameters at which the latent variable is non-identifiable
|
76 |
+
and, consequently, avoid posterior collapse.
|
77 |
+
The relationship between posterior collapse and non-identifiability points to a direct solution to the
|
78 |
+
problem: we must make the latent variable identifiable. To this end, we propose latent-identifiable
|
79 |
+
VAE, a class of VAE that is as flexible as classical VAE while also being identifiable. Latent-
|
80 |
+
identifiable VAE resolves the latent variable non-identifiability by leveraging Brenier maps [36,
|
81 |
+
39] and parameterizing them with input-convex neural networks [2, 35]. Inference on identifiable
|
82 |
+
VAE uses the standard variational inference objective, without special modifications or optimization
|
83 |
+
tricks. Across synthetic and real datasets, we show that identifiable VAE mitigates posterior collapse
|
84 |
+
without sacrificing fidelity to the data.
|
85 |
+
Related work. Existing approaches to avoiding posterior collapse often modify the variational in-
|
86 |
+
ference objective, design new initialization or optimization schemes for VAE, or add neural network
|
87 |
+
links between each data point and their latent variables [1, 3, 6, 8, 12, 15, 16, 17, 18, 21, 25, 27, 32,
|
88 |
+
34, 38, 44, 50, 51, 52, 55, 61, 62, 63]. Several recent papers also attempt to provide explanations
|
89 |
+
for posterior collapse. Chen et al. [8] explains how the inexact variational approximation can lead
|
90 |
+
to inefficiency of coding in VAE, which could lead to posterior collapse due to a form of informa-
|
91 |
+
tion preference. Dai et al. [11] argues that posterior collapse can be partially attributed to the local
|
92 |
+
optima in training VAE with deep neural networks. Lucas et al. [33] shows that posterior collapse
|
93 |
+
is not specific to the variational inference training objective; absent a variational approximation, the
|
94 |
+
log marginal likelihood of PPCA has bad local optima that can lead to posterior collapse. Yacoby
|
95 |
+
et al. [59] discusses how variational approximation can select an undesirable generative model when
|
96 |
+
the generative model parameters are non-identifiable. In contrast to these works, we consider poste-
|
97 |
+
rior collapse solely as a problem of latent variable non-identifiability, and not of optimization, varia-
|
98 |
+
tional approximations, or neural networks per se. We use this result to propose the identifiable VAE
|
99 |
+
as a way to directly avoid posterior collapse.
|
100 |
+
Outside VAE, latent variable identifiability in probabilistic models has long been studied in the
|
101 |
+
statistics literature [40, 42, 42, 43, 49, 56, 58]. More recently, Betancourt [5] studies the effect of
|
102 |
+
latent variable identifiability on Bayesian computation for Gaussian mixtures. Khemakhem et al.
|
103 |
+
[23, 24] propose to resolve the non-identifiability in deep generative models by appealing to auxiliary
|
104 |
+
data. Kumar & Poole [29] study how the variational family can help resolve the non-identifiability
|
105 |
+
of VAE. These works address the identifiability issue for a different goal: they develop identifia-
|
106 |
+
bility conditions for different subsets of VAE, aiming for recovering true causal factors of the data
|
107 |
+
and improving disentanglement or out-of-distribution generalization. Related to these papers, we
|
108 |
+
demonstrate posterior collapse as an additional way that the concept of identifiability, though classi-
|
109 |
+
cal, can be instrumental in modern probabilistic modeling. Considering identifiability leads to new
|
110 |
+
solutions to posterior collapse.
|
111 |
+
Contributions.
|
112 |
+
We prove that posterior collapse occurs if and only if the latent variable in the
|
113 |
+
generative model is non-identifiable. We then propose latent-identifiable VAE, a class of VAE
|
114 |
+
that are as flexible as classical VAE but have latent variables that are provably identifiable. Across
|
115 |
+
synthetic and real datasets, we demonstrate that latent-identifiable VAE mitigates posterior collapse
|
116 |
+
without modifying VAE objectives or applying special optimization tricks.
|
117 |
+
2
|
118 |
+
|
119 |
+
2
|
120 |
+
Posterior collapse and latent variable non-identifiability
|
121 |
+
Consider a dataset x = (x1,...,xn); each datapoint is m-dimensional. Positing n latent variables
|
122 |
+
z = (z1,..., zn), a variational autoencoder (VAE) assumes that each datapoint xi is generated by a
|
123 |
+
K-dimensional latent variable zi:
|
124 |
+
zi ∼ p(zi),
|
125 |
+
xi | zi ∼ p(xi | zi ; θ) = EF(xi | fθ(zi)),
|
126 |
+
(1)
|
127 |
+
where xi follows an exponential family distribution with parameters fθ(zi); fθ parameterizes the
|
128 |
+
conditional likelihood. In a deep generative model fθ is a parameterized neural network. Classical
|
129 |
+
probabilistic models like Gaussian mixture model [45] and probabilistic PCA [10, 47, 48, 54] are
|
130 |
+
also special cases of Eq. 1.
|
131 |
+
To fit the model, VAE optimizes the parameters θ by maximizing a variational approximation of the
|
132 |
+
log marginal likelihood. After finding an optimal ˆθ, we can form a representation of the data using
|
133 |
+
the approximate posterior q ˆφ(z|x) with variational parameters ˆφ or its expectation Eq ˆφ(z|x) [z|x].
|
134 |
+
Note that here we abstract away computational considerations and consider the ideal case where the
|
135 |
+
variational approximation is exact. This choice is sensible: if the exact posterior suffers from pos-
|
136 |
+
terior collapse then so will the approximate posterior (a variational approximation cannot “uncol-
|
137 |
+
lapse” a collapsed posterior). That said we also note that there exist in practice situations where
|
138 |
+
variational inference alone can lead to posterior collapse. A notable example is when the variational
|
139 |
+
approximating family is overly restrictive: it is then possible to have non-collapsing exact posteriors
|
140 |
+
but collapsing approximate posteriors.
|
141 |
+
2.1
|
142 |
+
Posterior collapse ⇔ Latent variable non-identifiability
|
143 |
+
We first define posterior collapse and latent variable non-identifiability, then proving their connec-
|
144 |
+
tion.
|
145 |
+
Definition 1 (Posterior collapse [6, 8, 38, 62]). Given a probability model p(x, z; θ), a parameter
|
146 |
+
value θ = ˆθ, and a dataset x = (x1,...,xn), the posterior of the latent variables z collapses if
|
147 |
+
p(z|x; ˆθ) = p(z).
|
148 |
+
(2)
|
149 |
+
The posterior collapse phenomenon can occur in a variety of probabilistic models and with dif-
|
150 |
+
ferent latent variables. When the probability model is a VAE, it only has local latent variables
|
151 |
+
z = (z1,..., zn), and Eq. 2 is equivalent to the common definition of posterior collapse p(zi |xi ; ˆθ) =
|
152 |
+
p(zi) for all i [12, 17, 33, 44]. Posterior collapse has also been observed in Gaussian mixture mod-
|
153 |
+
els [5]; the posterior of the latent mixture weights resembles their prior when the number of mixture
|
154 |
+
components in the model is larger than that of the data generating process. Regardless of the model,
|
155 |
+
when posterior collapse occurs, it prevents the latent variable from providing meaningful summary
|
156 |
+
of the dataset.
|
157 |
+
Definition 2 (Latent variable non-identifiability [42, 56]). Given a likelihood function p(x| z; θ), a
|
158 |
+
parameter value θ = ˆθ, and a dataset x = (x1,...,xn), the latent variable z is non-identifiable if
|
159 |
+
p(x| z = ˜z′ ; ˆθ) = p(x| z = ˜z; ˆθ)
|
160 |
+
∀˜z′, ˜z ∈ Z ,
|
161 |
+
(3)
|
162 |
+
where Z denotes the domain of z, and ˜z′, ˜z refer to two arbitrary values the latent variable z can
|
163 |
+
take. As a consequence, for any prior p(z) on z, we have the conditional likelihood equal to the
|
164 |
+
marginal p(x| z = ˜z; ˆθ) =
|
165 |
+
�
|
166 |
+
p(x| z; ˆθ)p(z)dz = p(x; ˆθ)
|
167 |
+
∀˜z ∈ Z .
|
168 |
+
Definition 2 says a latent variable z is non-identifiable when the likelihood of the dataset x does
|
169 |
+
not depend on z. It is also known as practical non-identifiability [42, 56] and is closely related to
|
170 |
+
the definition of z being conditionally non-identifiable (or conditionally uninformative) given ˆθ [40,
|
171 |
+
42, 43, 49, 58]. To enforce latent variable identifiability, it is sufficient to ensure that the likelihood
|
172 |
+
p(x| z,θ) is an injective (a.k.a. one-to-one) function of z for all θ. If this condition holds then
|
173 |
+
˜z′ ̸= ˜z
|
174 |
+
⇒
|
175 |
+
p(x| z = ˜z′ ; ˆθ) ̸= p(x| z = ˜z; ˆθ).
|
176 |
+
(4)
|
177 |
+
Note that latent variable non-identifiability only requires Eq. 3 be true for a given dataset x and
|
178 |
+
parameter value ˆθ. Thus a latent variable may be identifiable in a model given one dataset but not
|
179 |
+
another, and at one θ but not another. See examples in Appendix A.
|
180 |
+
3
|
181 |
+
|
182 |
+
Latent variable identifiability (Definition 2) [42, 56] differs from model identifiability [41], a related
|
183 |
+
notion that has also been cited as a contributing factor to posterior collapse [59]. Latent variable
|
184 |
+
identifiability is a weaker requirement: it only requires the latent variable z be identifiable at a
|
185 |
+
particular parameter value θ = ˆθ, while model identifiability requires both z and θ be identifiable.
|
186 |
+
We now establish the equivalence between posterior collapse and latent variable non-identifiability.
|
187 |
+
Theorem 1 (Latent variable non-identifiability ⇔ Posterior collapse). Consider a probability model
|
188 |
+
p(x, z; θ), a dataset x, and a parameter value θ = ˆθ. The local latent variables z are non-identifiable
|
189 |
+
at ˆθ if and only if the posterior of the latent variable z collapses, p(z|x) = p(z).
|
190 |
+
Proof. To prove that non-identifiability implies posterior collapse, note that, by Bayes rule,
|
191 |
+
p(z|x; ˆθ) ∝ p(z)p(x| z; ˆθ) = p(z)p(x; ˆθ) ∝ p(z),
|
192 |
+
(5)
|
193 |
+
where the middle equality is due to the definition of latent variable non-identifiability. It implies
|
194 |
+
p(z|x; ˆθ) = p(z) as both are densities. To prove that posterior collapse implies latent variable non-
|
195 |
+
identifiability, we again invoke Bayes rule. Posterior collapse implies that p(z) = p(z|x; ˆθ) ∝ p(z)·
|
196 |
+
p(x| z; ˆθ), which further implies that p(x| z; ˆθ) is constant in z. If p(x| z; ˆθ) nontrivially depends
|
197 |
+
on z, then p(z) must be different from p(z)p(x| z; ˆθ) as a function of z.
|
198 |
+
The proof of Theorem 1 is straightforward, but Theorem 1 has an important implication. It shows
|
199 |
+
that the problem of posterior collapse mainly arises from the model and the data, rather than from
|
200 |
+
inference or optimization. If the maximum likelihood parameters ˆθ of the VAE renders the latent
|
201 |
+
variable z non-identifiable, then we will observe posterior collapse. Theorem 1 also clarifies why
|
202 |
+
posteriors may change from non-collapsed to collapsed (and back) while fitting a VAE. When fitting
|
203 |
+
a VAE, Some parameter iterates may lead to posterior collapse; others may not.
|
204 |
+
Theorem 1 points to why existing approaches can help mitigate posterior collapse. Consider the β-
|
205 |
+
VAE [19], the VAE lagging encoder [18], and the semi-amortized VAE [25]. Though motivated by
|
206 |
+
other perspectives, these methods modify the optimization objectives or algorithms of VAE to avoid
|
207 |
+
parameter values θ at which the latent variable is non-identifiable. The resulting posterior may not
|
208 |
+
collapse, though the optimal parameters for these algorithms no longer approximates the maximum
|
209 |
+
likelihood estimate.
|
210 |
+
Theorem 1 can also help us understand posterior collapse observed in practice, which manifests
|
211 |
+
as the phenomenon that the posterior is approximately (as opposed to exactly) equal to the prior,
|
212 |
+
p(z|x; ˆθ) ≈ p(z). In several empirical studies of VAE (e.g. [12, 18, 25]), we observe that the
|
213 |
+
Kullback-Leibler (KL) divergence between the prior and posterior is close to zero but not exactly
|
214 |
+
zero, a property that stems from the likelihood p(x| z) being nearly constant in the latents z. In
|
215 |
+
these cases, Theorem 1 provides the intuition that the latent variable is nearly non-identifiable ,
|
216 |
+
p(x| ˜z′) ≈ p(x| ˜z),∀˜z, ˜z′ and so Eq. 2 holds approximately.
|
217 |
+
2.2
|
218 |
+
Examples of latent variable non-identifiability and posterior collapse
|
219 |
+
We illustrate Theorem 1 with three examples. Here we discuss the example of Gaussian mixture
|
220 |
+
VAE (GMVAE). See Appendix A for probabilistic principal component analysis (PPCA) and
|
221 |
+
Gaussian mixture model (GMM).
|
222 |
+
The GMVAE [13, 51] is the following model:
|
223 |
+
p(zi) = Categorical(1/K),
|
224 |
+
p(wi | zi ; µ,Σ) = N (µzi,Σzi),
|
225 |
+
p(xi |wi ; f ,σ) = N (f (wi),σ2 · Im),
|
226 |
+
where µk’s are d-dimensional, Σk are d × d-dimensional, and the parameters are θ = (µ,Σ, f ,σ2).
|
227 |
+
Suppose the function f is fully flexible; thus f (wi) can capture any distribution of the data. The
|
228 |
+
latent variable of interest is the categorical z = (z1,..., zn). If its posterior collapses, then p(zi =
|
229 |
+
k|x) = 1/K for all k = 1,...,K.
|
230 |
+
Consider fitting a GMVAE model with K = 2 to a dataset of 5,000 samples. This dataset is drawn
|
231 |
+
from a GMVAE also with K = 2 well-separated clusters; there is no model misspecification. A GM-
|
232 |
+
VAE is typically fit by optimizing the maximum log marginal likelihood ˆθ = argmaxθ log p(x|θ).
|
233 |
+
Note there may be multiple values of θ that achieve the global optimum of this function.
|
234 |
+
We focus on two likelihood maximizers. One provides latent variable identifiability and the posterior
|
235 |
+
of zi does not collapse. The other does not provide identifiablity; the posterior collapses.
|
236 |
+
4
|
237 |
+
|
238 |
+
1. The first likelihood-maximizing parameter ˆθ1 is the truth; the distribution of the K fitted clusters
|
239 |
+
correspond to the K data-generating clusters. Given this parameter, the latent variable zi is
|
240 |
+
identifiable because the K data-generating clusters are different; different cluster memberships
|
241 |
+
zi must result in different likelihoods p(xi | zi ; ˆθ1). The posterior of zi does not collapse.
|
242 |
+
2. In the second likelihood-maximizing parameter ˆθ2, however, all K fitted clusters share the
|
243 |
+
same distribution, each of which is equal to the marginal distribution of the data. Specifically,
|
244 |
+
(µ∗
|
245 |
+
k,Σ∗
|
246 |
+
k) = (0, Id) for all k, and each fitted cluster is a mixture of the K original data generating
|
247 |
+
clusters, i.e., the marginal. At this parameter value, the model is still able to fully capture the
|
248 |
+
mixture distribution of the data. However, all the K mixture components are the same, and thus
|
249 |
+
the latent variable zi is non-identifiable; different cluster membership zi do not result in differ-
|
250 |
+
ent likelihoods p(xi | zi ; ˆθ2), and hence the posterior of zi collapses. Figure 1a illustrates a fit of
|
251 |
+
this (non-identifiable) GMVAE to the pinwheel data [22]. In Section 3, we construct an latent-
|
252 |
+
identifiable VAE (LIDVAE) that avoids this collapse.
|
253 |
+
Latent variable identifiability is a function of the both the model and the true data-generating distri-
|
254 |
+
bution. Consider fitting the same GMVAE with K = 2 but to a different dataset of 5,000 samples,
|
255 |
+
this one drawn from a GMVAE with only one cluster. (There is model misspecification.) One max-
|
256 |
+
imizing parameter value ˆθ3 is where both of the fitted clusters correspond to the true data generating
|
257 |
+
cluster. While this parameter value resembles that of the first maximizer ˆθ1 above—both correspond
|
258 |
+
to the true data generating cluster—this dataset leads to a different situation for latent variable iden-
|
259 |
+
tifiability. The two fitted clusters are the same and so different cluster memberships do not result in
|
260 |
+
different likelihoods of p(xi | zi ; ˆθ3). The latent variable zi is not identifiable and its posterior col-
|
261 |
+
lapses.
|
262 |
+
Takeaways.
|
263 |
+
The GMVAE example in this section (and the PPCA and GMM examples in Ap-
|
264 |
+
pendix A) illustrate different ways that a latent variable can be non-identifiable in a model and suffer
|
265 |
+
from posterior collapse. They show that even the true posterior—without variational inference—can
|
266 |
+
collapse in non-identifiable models. They also illustrate that whether a latent variable is identifiable
|
267 |
+
can depend on both the model and the data. Posterior collapse is an intrinsic problem of the model
|
268 |
+
and the data, rather than specific to the use of neural networks or variational inference.
|
269 |
+
The equivalence between posterior collapse and latent variable non-identifiability in Theorem 1 also
|
270 |
+
implies that, to mitigate posterior collapse, we should try to resolve latent variable non-identifiability.
|
271 |
+
In the next section, we develop such a class of latent-identifiable VAE.
|
272 |
+
3
|
273 |
+
Latent-identifiable VAE via Brenier maps
|
274 |
+
We now construct latent-identifiable VAE, a class of VAE whose latent variables are guaranteed to
|
275 |
+
be identifiable, and thus the posteriors cannot collapse.
|
276 |
+
3.1
|
277 |
+
The latent-identifiable VAE
|
278 |
+
To construct the latent-identifiable VAE, we rely on a key observation that, to guarantee latent
|
279 |
+
variable identifiability, it is sufficient to make the likelihood function P(xi | zi ; θ) injective for all
|
280 |
+
values of θ. If the likelihood is injective, then, for any θ, each value of zi will lead to a different
|
281 |
+
distribution P(xi | zi ; θ). In particular, this fact will be true for any optimized ˆθ and so the latent zi
|
282 |
+
must be identifiable, regardless of the data. By Theorem 1, its posterior cannot collapse.
|
283 |
+
Constructing latent-identifiable VAE thus amounts to constructing an injective likelihood function
|
284 |
+
for VAE. The construction is based on a few building blocks of linear and nonlinear injective
|
285 |
+
functions, then composed into an injective likelihood p(xi | zi ; θ) mapping from Z d to X m, where
|
286 |
+
Z and X indicate the set of values zi and xi can take. For example, if xi is an m-dimensional binary
|
287 |
+
vector, then X = {0,1}m; if zi is a K-dimensional real-valued vector, then Z = Rd.
|
288 |
+
The building blocks of LIDVAE: Injective functions. For linear mappings from Rd1 to Rd2 (d2 ≥
|
289 |
+
d1), we consider matrix multiplication by a d1 × d2-dimensional matrix β. For a d1-dimensional
|
290 |
+
variable z, left multiplication by a matrix β⊤ is injective when β has full column rank [53]. For
|
291 |
+
example, a matrix with all ones in the diagonal and all other entries being zero has full column rank.
|
292 |
+
For nonlinear injective functions, we focus on Brenier maps [4, 37]. A d-dimensional Brenier map
|
293 |
+
is is the gradient of a convex function from Rd to R. That is, a Brenier map satisfies g = ∇T for
|
294 |
+
5
|
295 |
+
|
296 |
+
some convex function T : Rd → R. Brenier maps are also known as a monotone transport map. They
|
297 |
+
are guaranteed to be bijective [4, 37] because their derivative is the Hessian of a convex T, which
|
298 |
+
must be positive semidefinite and has a nonnegative determinant [4].
|
299 |
+
To build a VAE with Brenier maps, we require a neural network parametrization of the Brenier map.
|
300 |
+
As Brenier maps are gradients of convex functions, we begin with the neural network parametrizaton
|
301 |
+
of convex functions, namely the input convex neural network (ICNN) [2, 35]. This parameterization
|
302 |
+
of convex functions will enable Brenier maps to be paramterized as the gradient of ICNN.
|
303 |
+
An L-layer ICNN is a neural network mapping from Rd to R. Given an input u ∈ Rd, its lth layer is
|
304 |
+
z0 = u,
|
305 |
+
zl+1 = hl(Wlzl +Alu+bl),
|
306 |
+
(l = 0,...,L −1),
|
307 |
+
(6)
|
308 |
+
where the last layer zL must be a scalar, {Wl} are non-negative weight matrices with W0 = 0. The
|
309 |
+
functions {hl : R → R} are convex and non-decreasing entry-wise activation functions for layer l;
|
310 |
+
they are applied element-wise to the vector (Wlzl + Alu + bl). A common choice of h0 : R → R
|
311 |
+
is the square of a leaky RELU, h0(x) = (max(α · x,x))2 with α = 0.2; the remaining hl’s are set to
|
312 |
+
be a leaky RELU, hl(x) = max(α· x,x). This neural network is called “input convex” because it is
|
313 |
+
guaranteed to be a convex function.
|
314 |
+
Input convex neural networks can approximate any convex function on a compact domain in sup
|
315 |
+
norm (Theorem 1 of Chen et al. [9].) Given the neural network parameterization of convex functions,
|
316 |
+
we can parametrize the Brenier map gθ(·) as its gradient with respect to the input gθ(u) = ∂zL/∂u.
|
317 |
+
This neural network parameterization of Brenier map is a universal approxiamtor of all Brenier maps
|
318 |
+
on a compact domain, because input convex neural networks are universal approximators of convex
|
319 |
+
functions [9].
|
320 |
+
The latent-identifiable VAE (LIDVAE). We construct injective likelihoods for LIDVAE by com-
|
321 |
+
posing two bijective Brenier maps with an injective matrix multiplication. As the composition of in-
|
322 |
+
jective and bijective mappings must be injective, the resulting composition must be injective. Sup-
|
323 |
+
pose g1,θ : RK → RK and g2,θ : RD → RD are two Brenier maps, and β is a K ×D-dimensional matrix
|
324 |
+
(D ≥ K) with all the main diagonal entries being one and all other entries being zero. The matrix
|
325 |
+
β⊤ has full column rank, so multiplication by β⊤ is injective. Thus the composition g2,θ(β⊤ g1,θ(·))
|
326 |
+
must be an injective function from a low-dimensional space RK to a high-dimensional space RD.
|
327 |
+
Definition 3 (Latent-identifiable VAE (LIDVAE) via Brenier maps). An LIDVAE via Brenier maps
|
328 |
+
generates a D-dimensional datapoint xi,∈ {1,...,n} by:
|
329 |
+
zi ∼ p(zi),
|
330 |
+
xi | zi ∼ EF(xi | g2,θ(β⊤ g1,θ(zi))),
|
331 |
+
(7)
|
332 |
+
where EF stands for exponential family distributions; zi is a K-dimensional latent variable, discrete
|
333 |
+
or continuous. The parameters of the model are θ = (g1,θ, g2,θ), where g1,θ : RK → RK and g2,θ :
|
334 |
+
RD → RD are two continuous Brenier maps. The matrix β is a K × D-dimensional matrix (D ≥ K)
|
335 |
+
with all the main diagonal entries being one and all other entries being zero.
|
336 |
+
Contrasting LIDVAE (Eq. 7) with the classical VAE (Eq. 1), the LIDVAE replaces the function
|
337 |
+
fθ : Z K → X D with the injective mapping g2,θ(β⊤ g1,θ(·)), composed by bijective Brenier maps
|
338 |
+
g1,θ, g2,θ and a zero-one matrix β⊤ with full column rank. As the likelihood functions of exponential
|
339 |
+
family are injective, the likelihood function p(xi | zi ; θ) = EF(g2,θ(β⊤ g1,θ(zi))) of LIDVAE must
|
340 |
+
be injective. Therefore, replacing an arbitrary function fθ : Z K → X D with the injective mapping
|
341 |
+
g2,θ(β⊤ g1,θ(·)) plays a crucial role in enforcing identifiability for latent variable zi and avoiding
|
342 |
+
posterior collapse in LIDVAE. As the latent zi must be identifiable in LIDVAE, its posterior does
|
343 |
+
not collapse.
|
344 |
+
Despite its injective likelihood, LIDVAE are as flexible as VAE; the use of Brenier maps and ICNN
|
345 |
+
does not limit the capacity of the generative model. Loosely, LIDVAE can model any distributions
|
346 |
+
in RD because Brenier maps can map any given non-atomic distribution in Rd to any other one in
|
347 |
+
Rd [37]. Moreover, the ICNN parametrization is a universal approximator of Brenier maps [2]. We
|
348 |
+
summarize the key properties of LIDVAE in the following proposition.
|
349 |
+
Proposition 2. The latent variable zi is identifiable in LIDVAE, i.e. for all i ∈ {1,...,n}, we have
|
350 |
+
p(xi | zi = ˜z′ ; θ) = p(xi | zi = ˜z; θ)
|
351 |
+
⇒
|
352 |
+
˜z′ = ˜z,
|
353 |
+
∀ ˜z′, ˜z,θ.
|
354 |
+
(8)
|
355 |
+
Moreover, for any VAE-generated data distribution, there exists an LIDVAE that can generate the
|
356 |
+
same distribution. (The proof is in Appendix B.)
|
357 |
+
6
|
358 |
+
|
359 |
+
15
|
360 |
+
10
|
361 |
+
5
|
362 |
+
0
|
363 |
+
5
|
364 |
+
10
|
365 |
+
15
|
366 |
+
20
|
367 |
+
15
|
368 |
+
10
|
369 |
+
5
|
370 |
+
0
|
371 |
+
5
|
372 |
+
10
|
373 |
+
15
|
374 |
+
(a) Non-ID GMVAE
|
375 |
+
15
|
376 |
+
10
|
377 |
+
5
|
378 |
+
0
|
379 |
+
5
|
380 |
+
10
|
381 |
+
15
|
382 |
+
20
|
383 |
+
15
|
384 |
+
10
|
385 |
+
5
|
386 |
+
0
|
387 |
+
5
|
388 |
+
10
|
389 |
+
15
|
390 |
+
(b) IDGMVAE
|
391 |
+
0
|
392 |
+
100
|
393 |
+
200
|
394 |
+
300
|
395 |
+
400
|
396 |
+
500
|
397 |
+
Epoch
|
398 |
+
0.1
|
399 |
+
0.2
|
400 |
+
0.3
|
401 |
+
0.4
|
402 |
+
0.5
|
403 |
+
0.6
|
404 |
+
Accuracy
|
405 |
+
(c) Accuracy
|
406 |
+
0
|
407 |
+
200
|
408 |
+
400
|
409 |
+
Epoch
|
410 |
+
400
|
411 |
+
350
|
412 |
+
300
|
413 |
+
250
|
414 |
+
Test Log Likelihood
|
415 |
+
3-layer ID-GMVAE
|
416 |
+
6-layer ID-GMVAE
|
417 |
+
9-layer ID-GMVAE
|
418 |
+
3-layer GMVAE
|
419 |
+
6-layer GMVAE
|
420 |
+
9-layer GMVAE
|
421 |
+
(d) Log-likelihood
|
422 |
+
Figure 1: (a)-(b): The posterior of the classical GMVAE [13, 26, 51] collapses when fit to the
|
423 |
+
pinwheel dataset; the latents predict the same value for all datapoints. The posteriors of latent-
|
424 |
+
identifiable Gaussian mixture VAE (LIDGMVAE), however, do not collapse and provide meaning-
|
425 |
+
ful representations.
|
426 |
+
(c)-(d) The latent-identifiable GMVAE produces posteriors that are substan-
|
427 |
+
tially more informative than GMVAE when fit to fashion MNIST. It also achieves higher test log
|
428 |
+
likelihood.
|
429 |
+
3.2
|
430 |
+
Inference in LIDVAE
|
431 |
+
Performing inference in LIDVAE is identical to the classical VAE, as the two VAE differ only in
|
432 |
+
their parameter constraints. To fit an LIDVAE, we use the classical amortized inference algorithm
|
433 |
+
of VAE; we maximize the evidence lower bound (ELBO) of the log marginal likelihood [28].
|
434 |
+
In general, LIDVAE are a drop-in replacement for VAE. Both have the same capacity (Proposi-
|
435 |
+
tion 2) and share the same inference algorithm, but LIDVAE is identifiable and does not suffer from
|
436 |
+
posterior collapse. The price we pay for LIDVAE is computational: the generative model (i.e. de-
|
437 |
+
coder) is parametrized using the gradient of a neural network; its optimization thus requires calcu-
|
438 |
+
lating gradients of the gradient of a neural network, which increases the computational complex-
|
439 |
+
ity of VAE inference and can sometimes challenge optimization. While fitting classical VAE using
|
440 |
+
stochastic gradient descent has O(k · p) computational complexity, where k is the number of itera-
|
441 |
+
tions and p is the number of parameters, fitting latent-identifiable VAE may require O(k · p2) com-
|
442 |
+
putational complexity.
|
443 |
+
3.3
|
444 |
+
Extensions of LIDVAE
|
445 |
+
The construction of LIDVAE reveals a general strategy to make the latent variables of generative
|
446 |
+
models identifiable: replacing nonlinear mappings with injective nonlinear mappings. We can em-
|
447 |
+
ploy this strategy to make the latent variables of many other VAE variants identifiable. Below we
|
448 |
+
give two examples, mixture VAE and sequential VAE.
|
449 |
+
The mixture VAE, with GMVAE as a special case, models the data with an exponential family
|
450 |
+
mixture and mapped through a flexible neural network to generate the data. We develop its latent-
|
451 |
+
identifiable counterpart using Brenier maps.
|
452 |
+
Example 1 (Latent-identifiable mixture VAE (LIDMVAE)). An LIDMVAE generates a D-
|
453 |
+
dimensional datapoint xi, i ∈ {1,...,n} by
|
454 |
+
zi ∼ Categorical(1/K),
|
455 |
+
wi | zi ∼ EF(wi |β⊤
|
456 |
+
1 zi),
|
457 |
+
xi |wi ∼ EF(xi | g2,θ(β⊤
|
458 |
+
2 g1,θ(wi))),
|
459 |
+
(9)
|
460 |
+
where Wi is a K-dimensional one-hot vector that indicates the cluster assignment. The parameters
|
461 |
+
of the model are θ = (g1,θ, g2,θ), where the functions g1,θ : RM → RM and g2,θ : RD → RD are two
|
462 |
+
continuous Brenier maps. The matrices β1 and β2 are a K × M-dimensional matrix (M ≥ K) and
|
463 |
+
a M × D-dimensional matrix (D ≥ M) respectively, both having all the main diagonal entries being
|
464 |
+
one and all other entries being zero.
|
465 |
+
The LIDMVAE differs from the classical mixture VAE in p(xi | zi), where we replace its neural
|
466 |
+
network mapping with its injective counterpart, i.e. a composition of two Brenier maps and a matrix
|
467 |
+
multiplication g2,θ(β⊤
|
468 |
+
2 g1,θ(·)). As a special case, setting both exponential families in Example 1 as
|
469 |
+
Gaussian gives us LIDGMVAE, which we will use to model images in Section 4.
|
470 |
+
Next we derive the identifiable counterpart of sequential VAE, which models the data with an au-
|
471 |
+
toregressive model conditional on the latents.
|
472 |
+
7
|
473 |
+
|
474 |
+
Fashion-MNIST
|
475 |
+
Omniglot
|
476 |
+
AU
|
477 |
+
KL
|
478 |
+
MI
|
479 |
+
LL
|
480 |
+
AU
|
481 |
+
KL
|
482 |
+
MI
|
483 |
+
LL
|
484 |
+
VAE [28]
|
485 |
+
0.1
|
486 |
+
0.2
|
487 |
+
0.9
|
488 |
+
-258.8
|
489 |
+
0.02
|
490 |
+
0.0
|
491 |
+
0.1
|
492 |
+
-862.1
|
493 |
+
SA-VAE [25]
|
494 |
+
0.2
|
495 |
+
0.3
|
496 |
+
1.3
|
497 |
+
-252.2
|
498 |
+
0.1
|
499 |
+
0.2
|
500 |
+
1.0
|
501 |
+
-853.4
|
502 |
+
Lagging VAE [18]
|
503 |
+
0.4
|
504 |
+
0.6
|
505 |
+
1.6
|
506 |
+
-248.5
|
507 |
+
0.5
|
508 |
+
1.0
|
509 |
+
3.6
|
510 |
+
-849.4
|
511 |
+
β-VAE [19] (β=0.2)
|
512 |
+
0.6
|
513 |
+
1.2
|
514 |
+
2.4
|
515 |
+
-245.3
|
516 |
+
0.7
|
517 |
+
1.4
|
518 |
+
5.9
|
519 |
+
-842.6
|
520 |
+
LIDGMVAE (this work)
|
521 |
+
1.0
|
522 |
+
1.6
|
523 |
+
2.6
|
524 |
+
-242.3
|
525 |
+
1.0
|
526 |
+
1.7
|
527 |
+
7.5
|
528 |
+
-820.3
|
529 |
+
Synthetic
|
530 |
+
Yahoo
|
531 |
+
Yelp
|
532 |
+
AU
|
533 |
+
KL
|
534 |
+
MI
|
535 |
+
LL
|
536 |
+
AU
|
537 |
+
KL
|
538 |
+
MI
|
539 |
+
LL
|
540 |
+
AU
|
541 |
+
KL
|
542 |
+
MI
|
543 |
+
LL
|
544 |
+
VAE [28]
|
545 |
+
0.0
|
546 |
+
0.0
|
547 |
+
0.0
|
548 |
+
-46.5
|
549 |
+
0.0
|
550 |
+
0.0
|
551 |
+
0.0
|
552 |
+
-519.7
|
553 |
+
0.0
|
554 |
+
0.0
|
555 |
+
0.0
|
556 |
+
-635.9
|
557 |
+
SA-VAE [25]
|
558 |
+
0.4
|
559 |
+
0.1
|
560 |
+
0.1
|
561 |
+
-40.2
|
562 |
+
0.2
|
563 |
+
1.0
|
564 |
+
0.2
|
565 |
+
-520.2
|
566 |
+
0.1
|
567 |
+
1.9
|
568 |
+
0.2
|
569 |
+
-631.5
|
570 |
+
Lagging VAE [18]
|
571 |
+
0.5
|
572 |
+
0.1
|
573 |
+
0.1
|
574 |
+
-40.0
|
575 |
+
0.3
|
576 |
+
1.6
|
577 |
+
0.4
|
578 |
+
-518.6
|
579 |
+
0.2
|
580 |
+
3.6
|
581 |
+
0.1
|
582 |
+
-631.0
|
583 |
+
β-VAE [19] (β=0.2)
|
584 |
+
1.0
|
585 |
+
0.1
|
586 |
+
0.1
|
587 |
+
-39.9
|
588 |
+
0.5
|
589 |
+
4.7
|
590 |
+
0.9
|
591 |
+
-524.4
|
592 |
+
0.3
|
593 |
+
10.0
|
594 |
+
0.1
|
595 |
+
-637.3
|
596 |
+
LIDSVAE
|
597 |
+
1.0
|
598 |
+
0.5
|
599 |
+
0.6
|
600 |
+
-40.3
|
601 |
+
0.8
|
602 |
+
7.2
|
603 |
+
1.1
|
604 |
+
-519.5
|
605 |
+
0.7
|
606 |
+
9.1
|
607 |
+
0.9
|
608 |
+
-634.2
|
609 |
+
Table 1: Across image and text datasets, LIDVAE outperforms existing VAE variants in preventing
|
610 |
+
posterior collapse while achieving similar goodness-of-fit to the data.
|
611 |
+
Example 2 (Latent-identifiable sequential VAE (LIDSVAE)). An LIDSVAE generates a D-
|
612 |
+
dimensional datapoint xi, i ∈ {1,...,n} by
|
613 |
+
zi ∼ p(zi),
|
614 |
+
xi | zi,x<i ∼ EF(g2,θ(β⊤
|
615 |
+
2 g1,θ([zi, fθ(x<i)]))),
|
616 |
+
where x<i = (x1,...,xi−1) represents the history of x before the ith dimension. The function fθ :
|
617 |
+
X<i → RH maps the history X<i into an H-dimensional vector. Finally, [zi, fθ(x<i)] is an (K+H)×1
|
618 |
+
vector that represents a row-stack of the vectors (zi)K×1 and (fθ(x<i))H×1.
|
619 |
+
Similar with mixture VAE, the LIDSVAE also differs from sequential VAE only in its use of
|
620 |
+
g2,θ(β⊤
|
621 |
+
2 g1,θ(·)) function in p(xi | zi,x<i). We will use LIDSVAE to model text in Section 4.
|
622 |
+
4
|
623 |
+
Empirical studies
|
624 |
+
We study LIDVAE on images and text datasets, finding that LIDVAE do not suffer from posterior
|
625 |
+
collapse as we increase the capacity of the generative model, while achieving similar fits to the data.
|
626 |
+
We further study PPCA, showing how likelihood functions nearly constant in latent variables lead
|
627 |
+
to collapsing posterior even with Markov chain Monte Carlo (MCMC).
|
628 |
+
4.1
|
629 |
+
LIDVAE on images and text
|
630 |
+
We consider three metrics for evaluating posterior collapse:
|
631 |
+
(1) KL divergence between
|
632 |
+
the posterior and the prior, KL(q(z|x)||p(z)); (2) Percentange of active units (AU):AU =
|
633 |
+
�D
|
634 |
+
d=1 1{Covp(x)(Eq(z|x) [zd]) ≥ ϵ}, where zd = (z1d,..., znd) is the dth dimension of the latent vari-
|
635 |
+
able z for all the n data points. In calculating AU, we follow Burda et al. [7] to calculate the
|
636 |
+
posterior mean, (E [z1d |x1],...,E [znd |xn])] for all data points, and calculate the sample variance
|
637 |
+
of E [zid |xi] across i’s from this vector. The threshold ϵ is chosen to be 0.01 [7]; the theoretical
|
638 |
+
maximum of %AU is one; (3) Approximate Mutual information (MI) between xi and zi, I(x, z) =
|
639 |
+
Ex
|
640 |
+
�
|
641 |
+
Eq(z|x) [log(q(z|x))]
|
642 |
+
�
|
643 |
+
− Ex
|
644 |
+
�
|
645 |
+
Eq(z|x) [log(q(z))]
|
646 |
+
�. We also evaluate the model fit using the impor-
|
647 |
+
tance weighted estimate of log-likelihood on a held-out test set [7]. For mixture VAE, we also eval-
|
648 |
+
uate the predictive accuracy of the categorical latents against ground truth labels to quantify their
|
649 |
+
informativeness.
|
650 |
+
Competing methods. We compare LIDVAE with the classical VAE [28], the β-VAE (β=0.2) [19],
|
651 |
+
the semi-amortized VAE [25], and the lagging VAE [18]. Throughout the empirical studies, we use
|
652 |
+
flexible variational approximating families (RealNVPs [14] for image and LSTMs [20] for text).
|
653 |
+
Results: Images. We first study LIDGMVAE on four subsampled image datasets drawn from pin-
|
654 |
+
wheel [22], MNIST [31], Fashion MNIST [57], and Omniglot [30]. Figures 1a and 1b illustrate a
|
655 |
+
fit of the GMVAE and the LIDGMVAE to the pinwheel data [22]. The posterior of the GMVAE
|
656 |
+
8
|
657 |
+
|
658 |
+
z1
|
659 |
+
2
|
660 |
+
0
|
661 |
+
2
|
662 |
+
z2
|
663 |
+
2
|
664 |
+
0
|
665 |
+
2
|
666 |
+
LL
|
667 |
+
1e4
|
668 |
+
8
|
669 |
+
6
|
670 |
+
4
|
671 |
+
2
|
672 |
+
0
|
673 |
+
4
|
674 |
+
2
|
675 |
+
0
|
676 |
+
2
|
677 |
+
4
|
678 |
+
0
|
679 |
+
1
|
680 |
+
2
|
681 |
+
3
|
682 |
+
4
|
683 |
+
5
|
684 |
+
6
|
685 |
+
Density
|
686 |
+
(a) σ = 0.2
|
687 |
+
z1
|
688 |
+
2
|
689 |
+
0
|
690 |
+
2
|
691 |
+
z2
|
692 |
+
2
|
693 |
+
0
|
694 |
+
2
|
695 |
+
LL
|
696 |
+
1e4
|
697 |
+
8
|
698 |
+
6
|
699 |
+
4
|
700 |
+
2
|
701 |
+
0
|
702 |
+
4
|
703 |
+
2
|
704 |
+
0
|
705 |
+
2
|
706 |
+
4
|
707 |
+
0
|
708 |
+
1
|
709 |
+
2
|
710 |
+
3
|
711 |
+
4
|
712 |
+
5
|
713 |
+
6
|
714 |
+
Density
|
715 |
+
(b) σ = 0.5
|
716 |
+
z1
|
717 |
+
2
|
718 |
+
0
|
719 |
+
2
|
720 |
+
z2
|
721 |
+
2
|
722 |
+
0
|
723 |
+
2
|
724 |
+
LL
|
725 |
+
1e4
|
726 |
+
8
|
727 |
+
6
|
728 |
+
4
|
729 |
+
2
|
730 |
+
0
|
731 |
+
2.5
|
732 |
+
0.0
|
733 |
+
2.5
|
734 |
+
0
|
735 |
+
2
|
736 |
+
4
|
737 |
+
6
|
738 |
+
Density
|
739 |
+
(c) σ = 1.0
|
740 |
+
z1
|
741 |
+
2
|
742 |
+
0
|
743 |
+
2
|
744 |
+
z2
|
745 |
+
2
|
746 |
+
0
|
747 |
+
2
|
748 |
+
LL
|
749 |
+
1e4
|
750 |
+
8
|
751 |
+
6
|
752 |
+
4
|
753 |
+
2
|
754 |
+
0
|
755 |
+
2.5
|
756 |
+
0.0
|
757 |
+
2.5
|
758 |
+
0
|
759 |
+
2
|
760 |
+
4
|
761 |
+
6
|
762 |
+
Density
|
763 |
+
posterior
|
764 |
+
prior
|
765 |
+
(d) σ = 1.5
|
766 |
+
Figure 2: As the noise level increases in PPCA, the latent variable becomes closer to non-
|
767 |
+
identifiable because the likelihood and more susceptible to posterior collapse. Its likelihood sur-
|
768 |
+
face becomes flatter and its posterior becomes closer to the prior. Top panel: Likelihood surface of
|
769 |
+
PPCA as a function of the two latents z1, z2. When σ increase, the likelihood surface becomes flat-
|
770 |
+
ter and the latent variables z1, z2 are closer to non-identifiable. Bottom panel: Posterior of z1 under
|
771 |
+
different σ values. When σ increase, the posterior becomes closer to the prior.
|
772 |
+
latents collapse, attributing all datapoints to the same latent cluster. In contrast, LIDGMVAE pro-
|
773 |
+
duces categorical latents faithful to the clustering structure. Figure 1 examines the LIDGMVAE
|
774 |
+
as we increase the flexibility of the generative model. Figure 1c shows that the categorical latents
|
775 |
+
of the LIDGMVAE are substantially more predictive of the true labels than their classical coun-
|
776 |
+
terparts. Moreover, its performance does not degrade as the generative model becomes more flexi-
|
777 |
+
ble. Figure 1d shows that the LIDGMVAE consistently achieve higher test log-likelihood. Table 1
|
778 |
+
compares different variants of VAE in a 9-layer generative model. Across four datasets, LIDGM-
|
779 |
+
VAE mitigates posterior collapse. It achieves higher AU, KL and MI than other variants of VAE.
|
780 |
+
It also achieves a higher test log-likelihood.
|
781 |
+
Results: Text.
|
782 |
+
We apply LIDSVAE to three subsampled text datasets drawn from a synthetic
|
783 |
+
text dataset, the Yahoo dataset, and the Yelp dataset [60]. The synthetic dataset is generated from a
|
784 |
+
classical two-layer sequential VAE with a five-dimensional latent. Table 1 compares the LIDSVAE
|
785 |
+
with the sequential VAE. Across the three text datasets, the LIDSVAE outperforms other variants
|
786 |
+
of VAE in mitigating posterior collapse, generally achieving a higher AU, KL, and MI.
|
787 |
+
4.2
|
788 |
+
Latent variable non-identifiability and posterior collapse in PPCA
|
789 |
+
Here we show that the PPCA posterior becomes close to the prior when the latent variable becomes
|
790 |
+
close to be non-identifiable. We perform inference using Hamiltonian Monte Carlo (HMC), avoid-
|
791 |
+
ing the effect of variational approximation on posterior collapse.
|
792 |
+
Consider a PPCA with two latent dimensions, p(zi) = N (zi ; 0, I2), p(xi | zi ; θ) = N (xi ; z⊤
|
793 |
+
i w,σ2 ·
|
794 |
+
I5), where the value of σ2 is known, zi’s are the latent variables of interest, and w is the only
|
795 |
+
parameter of interest. When the noise σ2 is set to a large value, the latent variable zi may become
|
796 |
+
nearly non-identifiable. The reason is that the likelihood function p(xi | zi) becomes slower-varying
|
797 |
+
as σ2 increases. For example, Figure 2 shows that the likelihood surface becomes flatter as σ2
|
798 |
+
increases. Accordingly, the posterior becomes closer to the prior as σ2 increases. When σ = 1.5, the
|
799 |
+
posterior collapses. This non-identifiability argument provides an explanation to the closely related
|
800 |
+
phenomenon described in Section 6.2 of [33].
|
801 |
+
5
|
802 |
+
Discussion
|
803 |
+
In this work, we show that the posterior collapse phenomenon is a problem of latent variable non-
|
804 |
+
identifiability. It is not specific to the use of neural networks or particular inference algorithms in
|
805 |
+
9
|
806 |
+
|
807 |
+
VAE. Rather, it is an intrinsic issue of the model and the dataset. To this end, we propose a class of
|
808 |
+
LIDVAE via Brenier maps to resolve latent variable non-identifiability and mitigate posterior col-
|
809 |
+
lapse. Across empirical studies, we find that LIDVAE outperforms existing methods in mitigating
|
810 |
+
posterior collapse.
|
811 |
+
The latent variables of LIDVAE are guaranteed to be identifiable. However, it does not guarantee
|
812 |
+
that the latent variables and the parameters of LIDVAE are jointly identifiable. In other words, the
|
813 |
+
LIDVAE model may not be identifiable even though its latents are identifiable. This difference be-
|
814 |
+
tween latent variable identifiability and model identifiability may appear minor. But the tractability
|
815 |
+
of resolving latent variable identifiability plays a key role in making non-identifiability a fruitful one
|
816 |
+
perspective of posterior collapse. To enforce latent variable identifiability, it is sufficient to ensure
|
817 |
+
that the likelihood p(x| z, ˆθ) is an injective function of z. In contrast, resolving model identifiability
|
818 |
+
for the general class of VAE remains a long standing open problem, with some recent progress re-
|
819 |
+
lying on auxiliary variables [23, 24]. The tractability of resolving latent variable identifiability is a
|
820 |
+
key catalyst of a principled solution to mitigating posterior collapse.
|
821 |
+
There are a few limitations of this work. One is that the theoretical argument focuses on the collapse
|
822 |
+
of the exact posterior. The rationale is that, if the exact posterior collapses, then its variational ap-
|
823 |
+
proximation must also collapse because variational approximation of posteriors cannot “uncollapse”
|
824 |
+
a posterior. That said, variational approximation may “collapse” a posterior, i.e. the exact posterior
|
825 |
+
does not collapse but the variational approximate posterior collapses. The theoretical argument and
|
826 |
+
algorithmic approaches developed in this work does not apply to this setting, which remains an in-
|
827 |
+
teresting venue of future work.
|
828 |
+
A second limitation is that the latent-identifiable VAE developed in this work bear a higher compu-
|
829 |
+
tational cost than classical VAE. While the latent-identifiable VAE ensures the identifiability of its
|
830 |
+
latent variables and mitigates posterior collapse, it does come with a price in computation because
|
831 |
+
its generative model (i.e. decoder) is parametrized using gradients of a neural network. Fitting the
|
832 |
+
latent-identifiable VAE thus requires calculating gradients of gradients of a neural network, leading
|
833 |
+
to much higher computational complexity than fitting the classifical VAE. Developing computation-
|
834 |
+
ally efficient variants of the latent-identifiable VAE is another interesting direction for future work.
|
835 |
+
Acknowledgments.
|
836 |
+
We thank Taiga Abe and Gemma Moran for helpful discussions, and anony-
|
837 |
+
mous reviewers for constructive feedback that improved the manuscript. David Blei is supported by
|
838 |
+
ONR N00014-17-1-2131, ONR N00014-15-1-2209, NSF CCF-1740833, DARPA SD2 FA8750-18-
|
839 |
+
C-0130, Amazon, and the Simons Foundation. John Cunningham is supported by the Simons Foun-
|
840 |
+
dation, McKnight Foundation, Zuckerman Institute, Grossman Center, and Gatsby Charitable Trust.
|
841 |
+
10
|
842 |
+
|
843 |
+
References
|
844 |
+
[1] Alemi, A. A., Poole, B., et al. (2017). Fixing a broken ELBO. arXiv preprint arXiv:1711.00464.
|
845 |
+
[2] Amos, B., Xu, L., & Kolter, J. Z. (2017). Input convex neural networks. In Proceedings of the 34th
|
846 |
+
International Conference on Machine Learning-Volume 70 (pp. 146–155).: JMLR. org.
|
847 |
+
[3] Asperti, A. (2019). Variational autoencoders and the variable collapse phenomenon. Sensors & Transduc-
|
848 |
+
ers, 234(6), 1–8.
|
849 |
+
[4] Ball, K. (2004). An elementary introduction to monotone transportation. In Geometric aspects of functional
|
850 |
+
analysis (pp. 41–52). Springer.
|
851 |
+
[5] Betancourt, M. (2017).
|
852 |
+
Identifying Bayesian mixture models.
|
853 |
+
https://mc-stan.org/users/
|
854 |
+
documentation/case-studies/identifying_mixture_models. Accessed: 2021-05-04.
|
855 |
+
[6] Bowman, S., Vilnis, L., et al. (2016). Generating sentences from a continuous space. In Proceedings of
|
856 |
+
The 20th SIGNLL Conference on Computational Natural Language Learning (pp. 10–21).
|
857 |
+
[7] Burda, Y., Grosse, R., & Salakhutdinov, R. (2015). Importance weighted autoencoders. arXiv preprint
|
858 |
+
arXiv:1509.00519.
|
859 |
+
[8] Chen, X., Kingma, D. P., et al. (2016). Variational lossy autoencoder. arXiv preprint arXiv:1611.02731.
|
860 |
+
[9] Chen, Y., Shi, Y., & Zhang, B. (2018). Optimal control via neural networks: A convex approach. arXiv
|
861 |
+
preprint arXiv:1805.11835.
|
862 |
+
[10] Collins, M., Dasgupta, S., & Schapire, R. E. (2001). A generalization of principal components analysis
|
863 |
+
to the exponential family. In Nips, volume 13 (pp.˜23).
|
864 |
+
[11] Dai, B., Wang, Z., & Wipf, D. (2019). The usual suspects? Reassessing blame for VAE posterior collapse.
|
865 |
+
arXiv preprint arXiv:1912.10702.
|
866 |
+
[12] Dieng, A. B., Kim, Y., Rush, A. M., & Blei, D. M. (2018).
|
867 |
+
Avoiding latent variable collapse with
|
868 |
+
generative skip models. arXiv preprint arXiv:1807.04863.
|
869 |
+
[13] Dilokthanakul, N., Mediano, P. A., et al. (2016). Deep unsupervised clustering with Gaussian mixture
|
870 |
+
variational autoencoders. arXiv preprint arXiv:1611.02648.
|
871 |
+
[14] Dinh, L., Sohl-Dickstein, J., & Bengio, S. (2016). Density estimation using real NVP. arXiv preprint
|
872 |
+
arXiv:1605.08803.
|
873 |
+
[15] Fu, H., Li, C., et al. (2019). Cyclical annealing schedule: A simple approach to mitigating KL vanishing.
|
874 |
+
arXiv preprint arXiv:1903.10145.
|
875 |
+
[16] Gulrajani, I., Kumar, K., et al. (2016). Pixelvae: A latent variable model for natural images. arXiv preprint
|
876 |
+
arXiv:1611.05013.
|
877 |
+
[17] Havrylov, S. & Titov, I. (2020). Preventing posterior collapse with Levenshtein variational autoencoder.
|
878 |
+
arXiv preprint arXiv:2004.14758.
|
879 |
+
[18] He, J., Spokoyny, D., Neubig, G., & Berg-Kirkpatrick, T. (2019). Lagging inference networks and poste-
|
880 |
+
rior collapse in variational autoencoders. arXiv preprint arXiv:1901.05534.
|
881 |
+
[19] Higgins, I., Matthey, L., et al. (2016). β-VAE: Learning basic visual concepts with a constrained varia-
|
882 |
+
tional framework.
|
883 |
+
[20] Hochreiter, S. & Schmidhuber, J. (1997). Long short-term memory. Neural computation, 9(8), 1735–
|
884 |
+
1780.
|
885 |
+
[21] Hoffman, M. D. & Johnson, M. J. (2016). ELBO surgery: Yet another way to carve up the variational
|
886 |
+
evidence lower bound.
|
887 |
+
[22] Johnson, M. J., Duvenaud, D. K., Wiltschko, A., Adams, R. P., & Datta, S. R. (2016).
|
888 |
+
Composing
|
889 |
+
graphical models with neural networks for structured representations and fast inference. In Advances in
|
890 |
+
neural information processing systems (pp. 2946–2954).
|
891 |
+
[23] Khemakhem, I., Kingma, D. P., & Hyvärinen, A. (2019). Variational autoencoders and nonlinear ICA: A
|
892 |
+
unifying framework. arXiv preprint arXiv:1907.04809.
|
893 |
+
[24] Khemakhem, I., Monti, R. P., Kingma, D. P., & Hyvarinen, A. (2020). ICE-BeeM: Identifiable conditional
|
894 |
+
energy-based deep models based on nonlinear ICA.
|
895 |
+
[25] Kim, Y., Wiseman, S., Miller, A., Sontag, D., & Rush, A. (2018). Semi-amortized variational autoen-
|
896 |
+
coders. In International Conference on Machine Learning (pp. 2678–2687).
|
897 |
+
[26] Kingma, D. P., Mohamed, S., Rezende, D. J., & Welling, M. (2014). Semi-supervised learning with deep
|
898 |
+
generative models. In Advances in neural information processing systems (pp. 3581–3589).
|
899 |
+
[27] Kingma, D. P., Salimans, T., et al. (2016). Improved variational inference with inverse autoregressive
|
900 |
+
flow. In Advances in neural information processing systems (pp. 4743–4751).
|
901 |
+
11
|
902 |
+
|
903 |
+
[28] Kingma, D. P. & Welling, M. (2014). Auto-encoding variational Bayes. In Proceedings of the Interna-
|
904 |
+
tional Conference on Learning Representations (ICLR), volume 1.
|
905 |
+
[29] Kumar, A. & Poole, B. (2020). On implicit regularization in β-vaes. In International Conference on
|
906 |
+
Machine Learning (pp. 5480–5490).: PMLR.
|
907 |
+
[30] Lake, B. M., Salakhutdinov, R., & Tenenbaum, J. B. (2015). Human-level concept learning through
|
908 |
+
probabilistic program induction. Science, 350(6266), 1332–1338.
|
909 |
+
[31] LeCun, Y., Cortes, C., & Burges, C. (2010). MNIST handwritten digit database. ATT Labs [Online].
|
910 |
+
Available: http://yann.lecun.com/exdb/mnist, 2.
|
911 |
+
[32] Li, B., He, J., Neubig, G., Berg-Kirkpatrick, T., & Yang, Y. (2019). A surprisingly effective fix for deep
|
912 |
+
latent variable modeling of text. arXiv preprint arXiv:1909.00868.
|
913 |
+
[33] Lucas, J., Tucker, G., Grosse, R. B., & Norouzi, M. (2019). Don’t blame the ELBO! A linear VAE
|
914 |
+
perspective on posterior collapse. In Advances in Neural Information Processing Systems (pp. 9403–9413).
|
915 |
+
[34] Maalø e, L., Fraccaro, M., Liévin, V., & Winther, O. (2019). BIVA: A very deep hierarchy of latent
|
916 |
+
variables for generative modeling. In H. Wallach, H. Larochelle, A. Beygelzimer, F. d'Alché-Buc, E. Fox, &
|
917 |
+
R. Garnett (Eds.), Advances in Neural Information Processing Systems, volume 32: Curran Associates, Inc.
|
918 |
+
[35] Makkuva, A. V., Taghvaei, A., Oh, S., & Lee, J. D. (2019). Optimal transport mapping via input convex
|
919 |
+
neural networks. arXiv preprint arXiv:1908.10962.
|
920 |
+
[36] McCann, R. J. et al. (1995). Existence and uniqueness of monotone measure-preserving maps. Duke
|
921 |
+
Mathematical Journal, 80(2), 309–324.
|
922 |
+
[37] McCann, R. J. & Guillen, N. (2011). Five lectures on optimal transportation: geometry, regularity and
|
923 |
+
applications. Analysis and geometry of metric measure spaces: Lecture notes of the séminaire de Mathéma-
|
924 |
+
tiques Supérieure (SMS) Montréal, (pp. 145–180).
|
925 |
+
[38] Oord, A. v. d., Vinyals, O., & Kavukcuoglu, K. (2017). Neural discrete representation learning. arXiv
|
926 |
+
preprint arXiv:1711.00937.
|
927 |
+
[39] Peyré, G., Cuturi, M., et al. (2019). Computational optimal transport. Foundations and Trends® in
|
928 |
+
Machine Learning, 11(5-6), 355–607.
|
929 |
+
[40] Poirier, D. J. (1998). Revising beliefs in nonidentified models. Econometric Theory, 14(4), 483–509.
|
930 |
+
[41] Rao, B. & Prakasa, R. (1992). Identifiability in Stochastic Models: Characterization of Probability Dis-
|
931 |
+
tributions. Probability and mathematical statistics. Academic Press.
|
932 |
+
[42] Raue, A., Kreutz, C., et al. (2009). Structural and practical identifiability analysis of partially observed
|
933 |
+
dynamical models by exploiting the profile likelihood. Bioinformatics, 25(15), 1923–1929.
|
934 |
+
[43] Raue, A., Kreutz, C., Theis, F. J., & Timmer, J. (2013).
|
935 |
+
Joining forces of Bayesian and frequentist
|
936 |
+
methodology: a study for inference in the presence of non-identifiability. Philosophical Transactions of the
|
937 |
+
Royal Society A: Mathematical, Physical and Engineering Sciences, 371(1984), 20110544.
|
938 |
+
[44] Razavi, A., Oord, A. v. d., Poole, B., & Vinyals, O. (2019). Preventing posterior collapse with delta-
|
939 |
+
VAEs. arXiv preprint arXiv:1901.03416.
|
940 |
+
[45] Reynolds, D. A. (2009). Gaussian mixture models. Encyclopedia of biometrics, 741, 659–663.
|
941 |
+
[46] Rezende, D. J., Mohamed, S., & Wierstra, D. (2014). Stochastic backpropagation and approximate infer-
|
942 |
+
ence in deep generative models. arXiv preprint arXiv:1401.4082.
|
943 |
+
[47] Roweis, S. (1998). Em algorithms for pca and spca. Advances in neural information processing systems,
|
944 |
+
(pp. 626–632).
|
945 |
+
[48] Roweis, S. & Ghahramani, Z. (1999). A unifying review of linear gaussian models. Neural computation,
|
946 |
+
11(2), 305–345.
|
947 |
+
[49] San Martın, E. & González, J. (2010). Bayesian identifiability: Contributions to an inconclusive debate.
|
948 |
+
Chilean Journal of Statistics, 1(2), 69–91.
|
949 |
+
[50] Seybold, B., Fertig, E., Alemi, A., & Fischer, I. (2019). Dueling decoders: Regularizing variational
|
950 |
+
autoencoder latent spaces. arXiv preprint arXiv:1905.07478.
|
951 |
+
[51] Shu, R. (2016). Gaussian mixture VAE: Lessons in variational inference, generative models, and deep
|
952 |
+
nets.
|
953 |
+
[52] Sønderby, C. K., Raiko, T., Maaløe, L., Sønderby, S. K., & Winther, O. (2016). How to train deep
|
954 |
+
variational autoencoders and probabilistic ladder networks. In 33rd International Conference on Machine
|
955 |
+
Learning (ICML 2016).
|
956 |
+
[53] Strang, G., Strang, G., Strang, G., & Strang, G. (1993).
|
957 |
+
Introduction to linear algebra, volume 3.
|
958 |
+
Wellesley-Cambridge Press Wellesley, MA.
|
959 |
+
12
|
960 |
+
|
961 |
+
[54] Tipping, M. E. & Bishop, C. M. (1999). Probabilistic principal component analysis. Journal of the Royal
|
962 |
+
Statistical Society: Series B (Statistical Methodology), 61(3), 611–622.
|
963 |
+
[55] Tomczak, J. M. & Welling, M. (2017). VAE with a VampPrior. arXiv preprint arXiv:1705.07120.
|
964 |
+
[56] Wieland, F.-G., Hauber, A. L., Rosenblatt, M., Tönsing, C., & Timmer, J. (2021). On structural and
|
965 |
+
practical identifiability. Current Opinion in Systems Biology.
|
966 |
+
[57] Xiao, H., Rasul, K., & Vollgraf, R. (2017). Fashion-MNIST: a novel image dataset for benchmarking
|
967 |
+
machine learning algorithms. CoRR, abs/1708.07747.
|
968 |
+
[58] Xie, Y. & Carlin, B. P. (2006). Measures of Bayesian learning and identifiability in hierarchical models.
|
969 |
+
Journal of Statistical Planning and Inference, 136(10), 3458–3477.
|
970 |
+
[59] Yacoby, Y., Pan, W., & Doshi-Velez, F. (2020). Characterizing and avoiding problematic global optima
|
971 |
+
of variational autoencoders.
|
972 |
+
[60] Yang, Z., Hu, Z., Salakhutdinov, R., & Berg-Kirkpatrick, T. (2017). Improved variational autoencoders for
|
973 |
+
text modeling using dilated convolutions. In Proceedings of the 34th International Conference on Machine
|
974 |
+
Learning-Volume 70 (pp. 3881–3890).
|
975 |
+
[61] Yeung, S., Kannan, A., Dauphin, Y., & Fei-Fei, L. (2017). Tackling over-pruning in variational autoen-
|
976 |
+
coders. arXiv preprint arXiv:1706.03643.
|
977 |
+
[62] Zhao, T., Lee, K., & Eskenazi, M. (2018). Unsupervised discrete sentence representation learning for
|
978 |
+
interpretable neural dialog generation. In Proceedings of the 56th Annual Meeting of the Association for
|
979 |
+
Computational Linguistics (Volume 1: Long Papers) (pp. 1098–1107).
|
980 |
+
[63] Zhao, Y., Yu, P., Mahapatra, S., Su, Q., & Chen, C. (2020). Discretized bottleneck in VAE: Posterior-
|
981 |
+
collapse-free sequence-to-sequence learning. arXiv preprint arXiv:2004.10603.
|
982 |
+
13
|
983 |
+
|
984 |
+
Supplementary Materials
|
985 |
+
Posterior Collapse and Latent Variable Non-identifiability
|
986 |
+
A
|
987 |
+
Examples of posterior collapse continued
|
988 |
+
We present two additional examples of posterior collapse, probabilistic principal component analysis
|
989 |
+
and Gaussian mixture model.
|
990 |
+
A.1
|
991 |
+
Probabilistic principal component analysis
|
992 |
+
We consider classical probabilistic principal component analysis (PPCA) and show that its local
|
993 |
+
latent variables can suffer from posterior collapse at maximum likelihood parameter values (i.e.
|
994 |
+
global maxima of log marginal likelihood). This example refines the perspective of Lucas et al. [7],
|
995 |
+
which demonstrated that posterior collapse can occur in PPCA absent any variational approximation
|
996 |
+
but due to local maxima in the log marginal likelihood. Here we show that posterior collapse can
|
997 |
+
occur even with global maxima, absent optimization issues due to local maxima.
|
998 |
+
Consider a PPCA with two latent dimensions,
|
999 |
+
p(zi) = N (zi |0, I2),
|
1000 |
+
p(xi | zi ; θ) = N (xi | z⊤
|
1001 |
+
i w,σ2 · I5),
|
1002 |
+
where zi’s are the latent variables of interest and others θ = (w,σ2) are parameters of the model.
|
1003 |
+
Consider fitting this model to two datasets, each with 500 samples, focusing on maximum likelihood
|
1004 |
+
parameter values. Depending on the true distribution of the dataset, PPCA may or may not suffer
|
1005 |
+
from posterior collapse.
|
1006 |
+
1. Sample the data from a one-dimensional PPCA,
|
1007 |
+
xi ∼ N (xi |N (0, I1)· ¯w1, ¯σ1 · I5).
|
1008 |
+
(10)
|
1009 |
+
(The model remains two dimensional.) The latent variables zi’s are not (fully) identifiable in this
|
1010 |
+
case. The reason is that one set of maximum likelihood parameters is ˆθ = ( ˆw, ˆσ) = ([0, ¯w1], ¯σ1),
|
1011 |
+
i.e. setting one latent dimension as zero and the other equal to the true data generating direction.
|
1012 |
+
Under this ˆθ, the likelihood function is constant in the first dimension of the latent variable, i.e.
|
1013 |
+
zi1; see Figure 3a. The posterior of zi1 thus collapses, matching the prior, while the posterior of
|
1014 |
+
zi2 stays peaked (Figure 3b).
|
1015 |
+
2. Sample the data from from a two-dimensional PPCA,
|
1016 |
+
xi ∼ N (xi |N (0, I2)· ¯w2, ¯σ2 · I5).
|
1017 |
+
(11)
|
1018 |
+
The latent variables zi are identifiable. The likelihood function varies against both zi1 and zi2;
|
1019 |
+
the posteriors of both zi1 and zi2 are peaked (Figures 3c and 3d).
|
1020 |
+
A.2
|
1021 |
+
Gaussian mixture model
|
1022 |
+
Though we have focused on the posterior collapse of local latent variables, a model can also suffer
|
1023 |
+
from posterior collapse of its global latent variables. Consider a simple Gaussian mixture model
|
1024 |
+
(GMM) with two clusters,
|
1025 |
+
p(α) = Beta(α|5,5),
|
1026 |
+
p(xi |α; θ) = α·N (xi |µ1,σ2
|
1027 |
+
1)+(1−α)·N (xi |µ2,σ2
|
1028 |
+
2).
|
1029 |
+
Here α is a global latent variable and θ = (µ1,µ2,σ1,σ2) are the parameters of the model. Fit this
|
1030 |
+
model to three datasets, each with 105 samples.
|
1031 |
+
1. Sample the data from two non-overlapping clusters,
|
1032 |
+
xi ∼ 0.15·N (−10,1)+0.85·N (10,1).
|
1033 |
+
(12)
|
1034 |
+
The latent variable α is identifiable. The two data generating clusters are substantially different,
|
1035 |
+
so the likelihood function varies across α ∈ [0,1] under the maximum likelihood (ML) parameters
|
1036 |
+
(Figure 4a). The posterior of α is also peaked (Figure 4b) and differs much from the prior.
|
1037 |
+
1
|
1038 |
+
|
1039 |
+
2. Sample the data from two overlapping clusters,
|
1040 |
+
xi ∼ 0.15·N (−0.5,1)+0.85·N (0.5,1).
|
1041 |
+
(13)
|
1042 |
+
The latent variable α is identifiable.
|
1043 |
+
However, it is nearly non-identifiable.
|
1044 |
+
While the two
|
1045 |
+
data generating clusters are different, they are very similar to each other because they over-
|
1046 |
+
lap. Therefore, the likelihood function p(xi |α; θ∗) is slowly varying under ML parameters
|
1047 |
+
θ∗ = (µ∗
|
1048 |
+
1,µ∗
|
1049 |
+
2,σ∗
|
1050 |
+
1,σ∗
|
1051 |
+
2) = (−0.5,0.5,1,1); see Figure 4a. Consequently, the posterior of α remains
|
1052 |
+
very close to the prior; see Figure 4b.
|
1053 |
+
3. Sample the data from a single Gaussian distribution, xi ∼ N (−1,1). The latent variable α is non-
|
1054 |
+
identifiable. The reason is that one set of ML parameters is θ∗ = (µ∗
|
1055 |
+
1,µ∗
|
1056 |
+
2,σ∗
|
1057 |
+
1,σ∗
|
1058 |
+
2) = (−1,−1,1,1),
|
1059 |
+
i.e. setting both of the two mixture components equal to the true data generating Gaussian distri-
|
1060 |
+
bution.
|
1061 |
+
Under this θ∗, the latent variable α is non-identifiable and its likelihood function p({xi}n
|
1062 |
+
i=1 |α; θ∗)
|
1063 |
+
is constant in α because the two mixture components are equal; Figure 4a illustrates this fact.
|
1064 |
+
Moreover, the posterior of α collapses, p(α|{xi}n
|
1065 |
+
i=1 ; θ∗) = p(α). Figure 4b illustrates this fact:
|
1066 |
+
The HMC samples of the α posterior closely match those drawn from the prior. (Exact inference
|
1067 |
+
is intractable in this case, so we use HMC as a close approximation to exact inference.) This
|
1068 |
+
example demonstrates the connection between non-identifiability and posterior collapse; it also
|
1069 |
+
shows that posterior collapse is not specific to variational inference but is an issue of the model
|
1070 |
+
and the data.
|
1071 |
+
As for PPCA, these GMM examples demonstrate that whether a latent variable is identifiable in a
|
1072 |
+
probabilistic model not only depends on the model but also the data. While all three examples were
|
1073 |
+
fitted with the same GMM model, their identifiability situation differs as the samples are generated
|
1074 |
+
in different ways.
|
1075 |
+
B
|
1076 |
+
Proof of Proposition 2
|
1077 |
+
We prove a general version of Proposition 2 by establishing the latent variable identifiability and
|
1078 |
+
flexibility of the most general form of the LIDVAE. The LIDVAE, LIDMVAE, and LIDSVAE
|
1079 |
+
(Definition 4 and examples 1 and 2) will all be its special cases. Then Proposition 2 will also be a
|
1080 |
+
special case of the more general result stated below (Proposition 3).
|
1081 |
+
We first define the most general form of LIDVAE.
|
1082 |
+
Definition 4 (General LIDVAE via Brenier maps). A general LIDVAE via Brenier maps generates
|
1083 |
+
an D-dimensional data-point xi,∈ {1,...,n} by:
|
1084 |
+
(zi)K×1 ∼ p(zi),
|
1085 |
+
(14)
|
1086 |
+
(wi)M×1 | zi ∼ EF(wi |β⊤
|
1087 |
+
1 zi),
|
1088 |
+
(15)
|
1089 |
+
(xi)D×1 |wi,x<i ∼ EF(xi |h◦ g2,θ(β⊤
|
1090 |
+
2 g1,θ([wi, fθ(x<i)]))),
|
1091 |
+
(16)
|
1092 |
+
where EF stands for exponential family distributions; zi is a K-dimensional latent variable, discrete
|
1093 |
+
or continuous. The parameters of the model are θ = (g1,θ, g2,θ, fθ), where fθ : X<i → RH is a
|
1094 |
+
function that maps all previous data points x<i to an H-dimensional vector, g1,θ : RM+H → RM+H
|
1095 |
+
and g2,θ : RD → RD are two continuous monotone transport maps. The function h(·) is a bijective
|
1096 |
+
link function for the exponential family, e.g. the sigmoid function. The matrix β1 is a K × M-
|
1097 |
+
dimensional matrix (M ≥ K) all the main diagonal entries being one and all other entries being
|
1098 |
+
zero, and thus with full row rank. Similarly, β2 is a (M + H)× D-dimensional matrix (D ≥ M + H)
|
1099 |
+
with all the main diagonal entries being one and all other entries being zero, also with full row rank.
|
1100 |
+
Finally, [wi, fθ(x<i)] is an (M+H)×1 vector that represents a row-stack of the vectors (wi)M×1 and
|
1101 |
+
(fθ(x<i))H×1.
|
1102 |
+
The general LIDVAE differs from the classical VAE whose general form is
|
1103 |
+
(zi)K×1 ∼ p(zi),
|
1104 |
+
(17)
|
1105 |
+
(wi)M×1 | zi ∼ EF(wi |β⊤
|
1106 |
+
1 zi),
|
1107 |
+
(18)
|
1108 |
+
(xi)D×1 |wi,x<i ∼ EF(xi |h◦ gθ([wi, fθ(x<i)])),
|
1109 |
+
(19)
|
1110 |
+
2
|
1111 |
+
|
1112 |
+
The key difference is in Eq. 19, where the classical VAE uses an arbitrary function g : RM+H → RD
|
1113 |
+
in Eq. 19. In contrast, LIDVAE uses a composition g2,θ(β⊤
|
1114 |
+
2 g1,θ(·)) with additional constraints in
|
1115 |
+
Eq. 16.
|
1116 |
+
General LIDVAE can handle both i.i.d. and sequential data. For i.i.d data (e.g. images), we can set
|
1117 |
+
fθ(·) to be a zero function, which implies P(xi |wi,x<i) = P(xi |wi). For sequential data (e.g. text),
|
1118 |
+
we can set fθ(·) to be an LSTM that embeds the history x<i into an H-dimensional vector.
|
1119 |
+
General LIDVAE emulate many existing VAE. Letting zi be categorical (one-hot) vectors, the dis-
|
1120 |
+
tribution EF(z⊤
|
1121 |
+
i βθ) is an exponential family mixture. The identifiable VAE then maps this mixture
|
1122 |
+
model through a flexible function gθ. When zi is real-valued, it mimics classical VAE by mapping
|
1123 |
+
an exponential family PCA through flexible functions.
|
1124 |
+
LIDGMVAE is a special case of the general LIDVAE when we set zi be categorical (one-hot)
|
1125 |
+
vectors, set the exponential family distribution EF to be Gaussian in Eqs. 15 and 16. In this case,
|
1126 |
+
wi ∼ Gaussian(z⊤
|
1127 |
+
i βθ,γθ) is a Gaussian mixture. Then, we set fθ(·) to be a zero function, which
|
1128 |
+
implies P(xi |wi,x<i) = P(xi |wi), and finally set h as the identity function.
|
1129 |
+
This general LIDVAE also subsumes the Bernoulli mixture model, which is a common variant
|
1130 |
+
of LIDGMVAE for the MNIST data. Specifically, we can set zi be categorical (one-hot) vec-
|
1131 |
+
tors, and then set the exponential family distribution EF to be Gaussian in Eq. 15, making wi ∼
|
1132 |
+
Gaussian(z⊤
|
1133 |
+
i βθ,γθ) to be a Gaussian mixture. Next we set fθ(·) to be a zero function, which im-
|
1134 |
+
plies P(xi |wi,x<i) = P(xi |wi), then set h to be the sigmoid function, and finally set the EF to be
|
1135 |
+
Bernoulli in Eq. 16.
|
1136 |
+
LIDSVAE is another special case of the general LIDVAE when we set the EF to be a point mass
|
1137 |
+
and β1,θ to be identity matrix in Eq. 15, which implies wi = zi. Then setting the EF to be a categor-
|
1138 |
+
ical distribution and h to be identity in Eq. 16 leads to a configuration that is the same as Example 2.
|
1139 |
+
LIDVAE can be made deeper with more layers by introducing additional full row-rank matrices βk
|
1140 |
+
(e.g. ones with all the main diagonal entries being one and all other entries being zero) and additional
|
1141 |
+
Brenier maps gk,θ. For example, we can expand Eq. 16 with an additional layer by setting
|
1142 |
+
(xi)D×1 |wi,x<i ∼ EF(g3,θ(β⊤
|
1143 |
+
3 g2,θ(β⊤
|
1144 |
+
2 g1,θ([wi, fθ(x<i)])))).
|
1145 |
+
Next we establish the latent variable identifiability and flexibility of this general class of LIDVAE,
|
1146 |
+
which will imply the identifiability and flexibility of all the special cases above.
|
1147 |
+
Proposition 3. The latent variable zi is identifiable in LIDVAE, i.e. for all i ∈ {1,...,n}, we have
|
1148 |
+
p(xi | zi = ˜z′,x<i ; θ) = p(xi | zi = ˜z,x<i ; θ)
|
1149 |
+
⇒
|
1150 |
+
˜z′ = ˜z,
|
1151 |
+
∀ ˜z′, ˜z,θ.
|
1152 |
+
(20)
|
1153 |
+
Moreover, for any data distribution generated by the classical VAE (Eqs. 17 to 19), there exists an
|
1154 |
+
LIDVAE that can generate the same distribution.
|
1155 |
+
Proof. We first establish the latent variable identifiability. To show that the latent variable zi is
|
1156 |
+
identifiable, it is sufficient to show that the mapping from zi to p(xi | zi ; θ) is injective for all θ.
|
1157 |
+
The injectivity holds because all the transformations (β1,β2, g1,θ, g2,θ) involved in the mapping is
|
1158 |
+
injective, and their composition must be injective: the linear transformations (β1,β2) have full row
|
1159 |
+
rank and hence are injective; the nonlinear transformations (g1,θ, g2,θ) are monotone transport maps
|
1160 |
+
and are guaranteed to be bijective [1, 9]; finally, the exponential family likelihood is injective.
|
1161 |
+
We next establish the flexibility of the LIDVAE, by proving that any VAE-generated p(x) can be
|
1162 |
+
generated by an LIDVAE. The proof proceeds in two steps: (1) we show any VAE-generated p(x)
|
1163 |
+
can be generated by a VAE with injective likelihood p(xi | zi ; θ); (2) we show any p(x) generated
|
1164 |
+
by an injective VAE can be generated by an LIDVAE.
|
1165 |
+
To prove (1), suppose β1 does not have full row rank and gθ is not injective. Then there exists some
|
1166 |
+
Z′ ∈ Rd, d < K, and injective β′
|
1167 |
+
1,θ, g′
|
1168 |
+
θ such that the new VAE can represent the same p(x). The
|
1169 |
+
reason is that we can always turn an non-injective function into an injective one by considering its
|
1170 |
+
quotient space. In particular, we consider the quotient space with the equivalence relation between
|
1171 |
+
z, z′ defined as p(x| z; θ) = p(x| z′ ; θ)}, which induces a bijection into Rd. When p(z′) is no longer
|
1172 |
+
standard Gaussian, there must exist a bijective Brenier map ˜z = ft(z′) such that p(˜x) is standard
|
1173 |
+
Gaussian (Theorem 6 of McCann et al. [8]).
|
1174 |
+
3
|
1175 |
+
|
1176 |
+
Pinwheel
|
1177 |
+
MNIST
|
1178 |
+
AU
|
1179 |
+
KL
|
1180 |
+
MI
|
1181 |
+
LL
|
1182 |
+
AU
|
1183 |
+
KL
|
1184 |
+
MI
|
1185 |
+
LL
|
1186 |
+
VAE [6]
|
1187 |
+
0.2
|
1188 |
+
1.4e-6
|
1189 |
+
2.0e-3
|
1190 |
+
-6.2 (5e-2)
|
1191 |
+
0.1
|
1192 |
+
0.1
|
1193 |
+
0.2
|
1194 |
+
-108.2 (5e-1)
|
1195 |
+
SA-VAE [5]
|
1196 |
+
0.2
|
1197 |
+
1.6e-5
|
1198 |
+
2.0e-2
|
1199 |
+
-6.5 (5e-2)
|
1200 |
+
0.4
|
1201 |
+
0.4
|
1202 |
+
0.6
|
1203 |
+
-106.3 (7e-1)
|
1204 |
+
Lagging VAE [3]
|
1205 |
+
0.6
|
1206 |
+
0.7e-3
|
1207 |
+
1.5e0
|
1208 |
+
-6.5 (4e-2)
|
1209 |
+
0.5
|
1210 |
+
0.8
|
1211 |
+
1.7
|
1212 |
+
-105.2 (5e-1)
|
1213 |
+
β-VAE [4] (β=0.2)
|
1214 |
+
1.0
|
1215 |
+
1.2e-3
|
1216 |
+
2.3e0
|
1217 |
+
-6.6 (6e-2)
|
1218 |
+
0.8
|
1219 |
+
1.5
|
1220 |
+
2.8
|
1221 |
+
-100.4 (6e-1)
|
1222 |
+
LIDGMVAE (this work)
|
1223 |
+
1.0
|
1224 |
+
1.2e-3
|
1225 |
+
2.2e0
|
1226 |
+
-6.5 (5e-2)
|
1227 |
+
1.0
|
1228 |
+
1.8
|
1229 |
+
3.9
|
1230 |
+
-95.4 (7e-1)
|
1231 |
+
Table 2: LIDGMVAE do not suffer from posterior collapse and achieves better fit than its classical
|
1232 |
+
counterpart in a 9-layer generative model. The reported number is mean (sd) over ten different
|
1233 |
+
random seeds. (Higher is better.)
|
1234 |
+
To prove (2), we show that any VAE with injective mapping can be reparameterized as a LIDVAE.
|
1235 |
+
To prove this claim, it is sufficient to show that any injective function lθ : RM+H → RD can be
|
1236 |
+
reparametrized as g2,θ(β⊤
|
1237 |
+
2 g1,θ(·)). Below we provide such a reparametrization by solving for g1, g2
|
1238 |
+
and β in lθ(z) = g2,θ(β⊤
|
1239 |
+
2 g1,θ(z)). We set g1,θ as an identity map, β2 as an (M + H)× D matrix with
|
1240 |
+
all the main diagonal entries being one and all other entries being zero, and g2,θ as an invertible
|
1241 |
+
Rd → Rd mapping which coincides with lθ on the (M + H)-dimensional subspace of z.
|
1242 |
+
Finally, we note that the same argument applies to the variant of VAE where wi = zi. It coincides
|
1243 |
+
with the classical VAE in Kingma & Welling [6]. Applying the same argument as above establishes
|
1244 |
+
Proposition 2.
|
1245 |
+
C
|
1246 |
+
Experiment details
|
1247 |
+
For image experiments, all hidden layers of the neural networks have 512 units. We choose the
|
1248 |
+
number of continuous latent variables as 64 and the dimensionality of categorical variables as the
|
1249 |
+
number of ground truth labels. Then we use two-layer RealNVP ([2]) as an approximating family
|
1250 |
+
to tease out the effect of variational inference.
|
1251 |
+
For text experiments, all hidden layers of the neural networks have 1024 units. We choose the
|
1252 |
+
dimensionality of the embedding as 1024. Then we use two-layer LSTM as an approximating family
|
1253 |
+
following common practice of fitting sequential VAE.
|
1254 |
+
D
|
1255 |
+
Additional experimental results
|
1256 |
+
Table 2 includes additional experimental results of LIDVAE on image datasets (Pinwheel and
|
1257 |
+
MNIST).
|
1258 |
+
4
|
1259 |
+
|
1260 |
+
z1
|
1261 |
+
2
|
1262 |
+
1
|
1263 |
+
0
|
1264 |
+
1
|
1265 |
+
2
|
1266 |
+
z2
|
1267 |
+
2
|
1268 |
+
1
|
1269 |
+
0
|
1270 |
+
1
|
1271 |
+
2
|
1272 |
+
likelihood
|
1273 |
+
3000
|
1274 |
+
2500
|
1275 |
+
2000
|
1276 |
+
1500
|
1277 |
+
1000
|
1278 |
+
500
|
1279 |
+
(a) Likelihood (1D PPCA)
|
1280 |
+
2
|
1281 |
+
0
|
1282 |
+
2
|
1283 |
+
4
|
1284 |
+
0.00
|
1285 |
+
0.25
|
1286 |
+
0.50
|
1287 |
+
0.75
|
1288 |
+
1.00
|
1289 |
+
1.25
|
1290 |
+
prior of z1 and z2
|
1291 |
+
posterior of z1
|
1292 |
+
posterior of z2
|
1293 |
+
(b) Posterior (1D PPCA)
|
1294 |
+
z1
|
1295 |
+
2
|
1296 |
+
1
|
1297 |
+
0
|
1298 |
+
1
|
1299 |
+
2
|
1300 |
+
z2
|
1301 |
+
2
|
1302 |
+
1
|
1303 |
+
0
|
1304 |
+
1
|
1305 |
+
2
|
1306 |
+
likelihood
|
1307 |
+
8000
|
1308 |
+
6000
|
1309 |
+
4000
|
1310 |
+
2000
|
1311 |
+
(c) Likelihood (2D PPCA)
|
1312 |
+
2
|
1313 |
+
0
|
1314 |
+
2
|
1315 |
+
0.0
|
1316 |
+
0.5
|
1317 |
+
1.0
|
1318 |
+
1.5
|
1319 |
+
prior of z1 and z2
|
1320 |
+
posterior of z1
|
1321 |
+
posterior of z2
|
1322 |
+
(d) Posterior (2D PPCA)
|
1323 |
+
Figure 3: Fitting PPCA with more latent dimensions than enough leads to non-identifiable local
|
1324 |
+
latent variables and collapsed posteriors. (a)-(b) Fit a two-dimensional PPCA to data drawn from a
|
1325 |
+
one-dimensional PPCA. The likelihood surface is constant in one dimension of the latent variable,
|
1326 |
+
i.e. this latent variable is non-identifiable. Hence its corresponding posterior collapses. (c)-(d) Fit
|
1327 |
+
a two-dimensional PPCA to data from a two-dimensional PPCA does not suffer from posterior
|
1328 |
+
collapse; its likelihood surface varies in all dimensions.
|
1329 |
+
0.00
|
1330 |
+
0.25
|
1331 |
+
0.50
|
1332 |
+
0.75
|
1333 |
+
1.00
|
1334 |
+
mixture weight
|
1335 |
+
6
|
1336 |
+
4
|
1337 |
+
2
|
1338 |
+
likelihood
|
1339 |
+
data
|
1340 |
+
2 clusters (non-overlap) : ID
|
1341 |
+
2 clusters (overlap):
|
1342 |
+
non-ID
|
1343 |
+
1 cluster: non-ID
|
1344 |
+
(a) Likelihood function
|
1345 |
+
0.00
|
1346 |
+
0.25
|
1347 |
+
0.50
|
1348 |
+
0.75
|
1349 |
+
1.00
|
1350 |
+
mixture weight
|
1351 |
+
0
|
1352 |
+
250
|
1353 |
+
500
|
1354 |
+
750
|
1355 |
+
1000
|
1356 |
+
2 clusters (non-overlap)
|
1357 |
+
2 clusters (overlap)
|
1358 |
+
1 cluster
|
1359 |
+
prior
|
1360 |
+
(b) Posterior histogram
|
1361 |
+
Figure 4: When a latent variable is non-identifiable (non-ID) in a model, its likelihood function
|
1362 |
+
is a constant function and its posterior is equal to the prior, i.e. its posterior collapses. Consider
|
1363 |
+
a Gaussian mixture model with two clusters x ∼ α · N (µ1,σ2
|
1364 |
+
1) + (1 − α) · N (µ2,σ2
|
1365 |
+
2), treating the
|
1366 |
+
mixture weight α as the latent variable and others as parameters. Fit the model to datasets generated
|
1367 |
+
respectively by one Gaussian cluster (α non-identifiable), two overlapping Gaussian clusters (α
|
1368 |
+
nearly non-identifiable), and two non-overlapping Gaussian clusters (α identifiable). Under optimal
|
1369 |
+
parameters, the likelihood function p(x|α) is (close to) a constant when the latent variable α is (close
|
1370 |
+
to) non-identifiable; its posterior is also (close to) the prior. Otherwise, the likelihood function is
|
1371 |
+
non-constant and the posterior is peaked.
|
1372 |
+
5
|
1373 |
+
|
1374 |
+
References
|
1375 |
+
[1] Ball, K. (2004). An elementary introduction to monotone transportation. In Geometric aspects
|
1376 |
+
of functional analysis (pp. 41–52). Springer.
|
1377 |
+
[2] Dinh, L., Sohl-Dickstein, J., & Bengio, S. (2016). Density estimation using real NVP. arXiv
|
1378 |
+
preprint arXiv:1605.08803.
|
1379 |
+
[3] He, J., Spokoyny, D., Neubig, G., & Berg-Kirkpatrick, T. (2019). Lagging inference networks
|
1380 |
+
and posterior collapse in variational autoencoders. arXiv preprint arXiv:1901.05534.
|
1381 |
+
[4] Higgins, I., Matthey, L., et al. (2016). β-VAE: Learning basic visual concepts with a constrained
|
1382 |
+
variational framework.
|
1383 |
+
[5] Kim, Y., Wiseman, S., Miller, A., Sontag, D., & Rush, A. (2018). Semi-amortized variational
|
1384 |
+
autoencoders. In International Conference on Machine Learning (pp. 2678–2687).
|
1385 |
+
[6] Kingma, D. P. & Welling, M. (2014). Auto-encoding variational Bayes. In Proceedings of the
|
1386 |
+
International Conference on Learning Representations (ICLR), volume 1.
|
1387 |
+
[7] Lucas, J., Tucker, G., Grosse, R. B., & Norouzi, M. (2019). Don’t blame the ELBO! A linear
|
1388 |
+
VAE perspective on posterior collapse. In Advances in Neural Information Processing Systems
|
1389 |
+
(pp. 9403–9413).
|
1390 |
+
[8] McCann, R. J. et al. (1995). Existence and uniqueness of monotone measure-preserving maps.
|
1391 |
+
Duke Mathematical Journal, 80(2), 309–324.
|
1392 |
+
[9] McCann, R. J. & Guillen, N. (2011). Five lectures on optimal transportation: geometry, regu-
|
1393 |
+
larity and applications. Analysis and geometry of metric measure spaces: Lecture notes of the
|
1394 |
+
séminaire de Mathématiques Supérieure (SMS) Montréal, (pp. 145–180).
|
1395 |
+
6
|
1396 |
+
|
8tAyT4oBgHgl3EQfqPgO/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
AdFIT4oBgHgl3EQf-yxb/content/tmp_files/2301.11412v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
AdFIT4oBgHgl3EQf-yxb/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
BtFAT4oBgHgl3EQfsR7g/content/2301.08658v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:64810ba98fbffcae7cd62e975df5e7a0ece619d60a459b10a2845c2beeebdde9
|
3 |
+
size 822893
|
BtFAT4oBgHgl3EQfsR7g/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:af6febca82489302c92c49b95b84b9aaa555ba2064df220eed3a341057f59e9c
|
3 |
+
size 123086
|
C9E1T4oBgHgl3EQfpwXL/content/tmp_files/2301.03336v1.pdf.txt
ADDED
@@ -0,0 +1,1444 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.03336v1 [math.FA] 8 Dec 2022
|
2 |
+
On existence theorems of a functional differential
|
3 |
+
equations in partially ordered Banach algebras
|
4 |
+
Amor Fahem(1), Aref Jeribi (1) and Najib Kaddachi (2)
|
5 |
+
(1) Department of Mathematics. University of Sfax. Faculty of Sciences of Sfax.
|
6 |
+
Soukra Road Km 3.5 B.P. 1171, 3000, Sfax, Tunisia
|
7 |
+
E-mail: [email protected]
|
8 |
+
E-mail: [email protected]
|
9 |
+
(2) University of Kairouan. Faculty of Science and Technology of Sidi Bouzid. Agricultural
|
10 |
+
University City Campus − 9100, Sidi Bouzid, Tunisia
|
11 |
+
E-mail: [email protected]
|
12 |
+
Abstract. In this paper we are concerned with existence results for a coupled system of
|
13 |
+
quadratic functional differential equations. This system is reduced to a fixed point problem
|
14 |
+
for a 2 × 2 block operator matrix with nonlinear inputs. To prove the existence we are
|
15 |
+
established some fixed point theorem of Dhage’s type for the block matrix operator acting
|
16 |
+
in partially ordered Banach algebras.
|
17 |
+
Keywords:
|
18 |
+
Partially
|
19 |
+
ordered
|
20 |
+
Banach
|
21 |
+
algebra,
|
22 |
+
Fixed
|
23 |
+
point
|
24 |
+
theory,
|
25 |
+
Partial
|
26 |
+
measure
|
27 |
+
of
|
28 |
+
noncompactness, differential equations, block Operator matrix.
|
29 |
+
Mathematics Subject Classification: 47H10, 47H08, 47H09.
|
30 |
+
1
|
31 |
+
Introduction
|
32 |
+
The theory of fixed point is one of the most powerful and most fruitful tools of modern
|
33 |
+
mathematics and can consider a fundamental material of non-linear analysis. In recent years a
|
34 |
+
number of excellent monographs and surveys by distinguished authors about fixed point theory
|
35 |
+
have appeared such as, [1, 2, 5, 6, 9, 20]. Based on the fact that the Banach spaces are the
|
36 |
+
fundamental underlying spaces on linear and nonlinear analysis, it leads us to consider the
|
37 |
+
following problem: if a Banach space is equipped with an ordering structure, partial order or
|
38 |
+
lattice, this Banach space becomes a partially ordered Banach space. Then, when we solve
|
39 |
+
some problems on this Banach space, in addition to the topological structure and the algebraic
|
40 |
+
structure, the ordering structure will provide a new powerful tool. This important idea has
|
41 |
+
been widely used in solving integral equations [4, 7, 12, 18, 19, 21, 24, 26]. In this work, we are
|
42 |
+
1
|
43 |
+
|
44 |
+
mainly concerned with the existence results of solutions of the following system of Quadratic
|
45 |
+
nonlinear functional differential equation (in short QFDE)
|
46 |
+
|
47 |
+
|
48 |
+
|
49 |
+
|
50 |
+
|
51 |
+
|
52 |
+
|
53 |
+
|
54 |
+
|
55 |
+
|
56 |
+
|
57 |
+
|
58 |
+
|
59 |
+
|
60 |
+
|
61 |
+
�x(t) − f1(t, x(t))
|
62 |
+
f2(t, y(t))
|
63 |
+
�′
|
64 |
+
+ λ
|
65 |
+
�x(t) − f1(t, x(t))
|
66 |
+
f2(t, y(t))
|
67 |
+
�
|
68 |
+
= g(t, y(t))
|
69 |
+
y(t) =
|
70 |
+
1
|
71 |
+
1 − b(t)|x(t)| − p
|
72 |
+
�
|
73 |
+
t,
|
74 |
+
1
|
75 |
+
1 − b(t)|x(t)|
|
76 |
+
�
|
77 |
+
+ p(t, y(t))
|
78 |
+
�
|
79 |
+
x(0), y(0)
|
80 |
+
�
|
81 |
+
= (x0, y0) ∈ R2,
|
82 |
+
(1.1)
|
83 |
+
where λ ∈ R+, b : J −→ R and f1, f2, g, p : J × R −→ R are continuous with f2 not ever
|
84 |
+
vanishing. The first equation of FDE (1.1) is general in the sense that it includes some im-
|
85 |
+
portant classes of functional differential equations. If we take x = y, f1(t, x) = φ(t, x) = 0
|
86 |
+
and f2(t, x) = f(t, x, y) and g(t, x) = g(t, x, y), then the FDE (1.1) reduces to the following
|
87 |
+
functional differential equation with a delay:
|
88 |
+
|
89 |
+
|
90 |
+
|
91 |
+
|
92 |
+
|
93 |
+
|
94 |
+
|
95 |
+
�
|
96 |
+
x(t)
|
97 |
+
f(t, x(t), X(t))
|
98 |
+
�′
|
99 |
+
+ λ
|
100 |
+
�
|
101 |
+
x(t)
|
102 |
+
f(t, x(t), X(t))
|
103 |
+
�
|
104 |
+
= g(t, x(t), xt),
|
105 |
+
t ∈ I
|
106 |
+
x0 = φ ∈ C([−r, 0], R),
|
107 |
+
r > 0
|
108 |
+
whenever I = [0, T ], T > 0. The equation was examined in the paper [15, 17] and some special
|
109 |
+
cases of this equation were considered in [25].
|
110 |
+
Again, when f1(t, x) = φ(t, x) = 0, f2(t, x) = 1 and g(t, x) = g(t, x, y), the QFDE (1.1) reduces
|
111 |
+
to the following known nonlinear differential equation with maxima
|
112 |
+
|
113 |
+
|
114 |
+
|
115 |
+
x′(t) + λx(t) = g(t, x(t), X(t),
|
116 |
+
t ∈ I
|
117 |
+
x(0) = α0 ∈ R+.
|
118 |
+
The above nonlinear differential equation with maxima has already been discussed in [3] for
|
119 |
+
existence and uniqueness of the solutions via classical methods of Schauder and Banach fixed
|
120 |
+
point principles.
|
121 |
+
Furthermore, if f1(t, x) = f(t, x, y), f2(t, x) = 1, φ(t, x) = 0 and g(t, x) = g(t, x, y), the QFDE
|
122 |
+
(1.1) reduces to the following HDE without maxima,
|
123 |
+
|
124 |
+
|
125 |
+
|
126 |
+
(x(t) − f(t, x(t), X(t))′ + λ(x(t) − f1(t, x(t))) = g(t, x(t), X(t))
|
127 |
+
x(0)) = α0 ∈ R+,
|
128 |
+
(1.2)
|
129 |
+
which is discussed in [14] via Dhage iteration method and established the existence and approx-
|
130 |
+
imation result under some mixed partial Lipschitz and partial compactness conditions.
|
131 |
+
Note that the system (1.1) may be transformed into the following fixed point problem of
|
132 |
+
the 2 × 2 block operator matrix
|
133 |
+
� A
|
134 |
+
B · B′
|
135 |
+
C
|
136 |
+
D
|
137 |
+
�
|
138 |
+
,
|
139 |
+
(1.3)
|
140 |
+
where the entries of the matrix are, in general, nonlinear operators defined on partially ordered
|
141 |
+
Banach algebras. The operators occurring in the representation (1.3) are nonlinear, and our
|
142 |
+
assumptions are as follows: A a maps nondecreasing in a partially ordered Banach algebra E
|
143 |
+
into E and B, C, D and B′ are nondecreasing and positive operators from E into E.
|
144 |
+
In this direction, the authors A. Jeribi, B. Krichen and N. Kaddachi in [22, 23] have es-
|
145 |
+
tablished some fixed point for a 2 × 2 operator matrix (1.3), when X is a Banach algebra
|
146 |
+
2
|
147 |
+
|
148 |
+
satisfying certain condition. It is important to mention that the theoretical study was based
|
149 |
+
on the existence of a solution of the following equation
|
150 |
+
x = Ax · Bx + Cx
|
151 |
+
(1.4)
|
152 |
+
and obtained a lot of valuable results ([10, 12, 13] and the references therein). These studies
|
153 |
+
were mainly based on the closure of the bounded domain, and properties of the operators A,
|
154 |
+
B and C (cf. partially completely continuous, partially nonlinear k-set contractive, partially
|
155 |
+
condensing, and the potential tool of the axiomatic partially measure of noncompactness,...).
|
156 |
+
This paper is organized as follows. In the next section, we give some preliminary results
|
157 |
+
needed in the sequel. In Section 3, we present existence results for Equation (1.4). In Section 4,
|
158 |
+
we will deal with some fixed point results for 2 × 2 block operator matrices in partially ordered
|
159 |
+
Banach algebra. The main results of this section are Theorems 4.1 and 4.2. In Section 5, we
|
160 |
+
give an application showing the existence of solutions of the system (1.1) in partially ordered
|
161 |
+
Banach algebra.
|
162 |
+
2
|
163 |
+
Auxiliary Results
|
164 |
+
Throughout this paper, let (E, ⪯, ∥·∥) be a partially ordered Banach algebra with zero element
|
165 |
+
θ. Two elements x and y in E are called comparable if either the relation x ⪯ y or y ⪯ x
|
166 |
+
holds. A non-empty subset C of E is called a chain or totally ordered set if all elements of
|
167 |
+
C are comparable. It is know that E is regular if {xn} a nondecreasing (resp. nonincreasing)
|
168 |
+
sequence in E and xn → x∗ as n → ∞, then xn ⪯ x∗ (resp. xn ⪰ x∗) for all n ∈ N. The
|
169 |
+
conditions guaranteeing the regularity of E many be found in Guo and Lakshmikentham [20]
|
170 |
+
and Nieto and Lopez [26] and the references therein.
|
171 |
+
At the beginning of this section, we present some basic facts concerning the partially mea-
|
172 |
+
sures of noncompactness in E. If C is a chain in E, then C′ denotes the set of all limit points
|
173 |
+
of C in E. The symbol C stands for the closure of C in E defined by C = C ∪ C′. The set C
|
174 |
+
is called a closed chain in E. Thus, C is the intersection of all closed chains containing C. In
|
175 |
+
what follows, we denote by Pcl(E), Pbd(E), Prcp(E), Pch(E), Pbd,ch(E), Prcp,ch(E), the class
|
176 |
+
of all nonempty and closed, bounded, relatively compact, chains, bounded chains and relatively
|
177 |
+
compact chains of E respectively. Recall that the notion of the partial Kuratowski measure of
|
178 |
+
noncompactness αp(.) on E by the formula:
|
179 |
+
αp(C) = inf
|
180 |
+
�
|
181 |
+
r > 0, C =
|
182 |
+
n�
|
183 |
+
i=1
|
184 |
+
Ci, diam(Ci) ≤ r ∀i
|
185 |
+
�
|
186 |
+
where diam(Ci) = sup{∥x − y∥ : x, y ∈ Ci}. For convenience we recall some basic properties of
|
187 |
+
αp(.) needed below [11, 12, 13, 15].
|
188 |
+
Definition 2.1 A mapping αp : Pbd,ch(E) −→ R+ is said to be a partially measure of noncompactness
|
189 |
+
in E if it satisfies the following conditions:
|
190 |
+
1. ∅ ̸= (αp)−1({0}) ⊂ Prcp,ch(E),
|
191 |
+
2. αp(C) = αp(C),
|
192 |
+
3. αp is nondecreasing,
|
193 |
+
4. If {Cn} is a sequence of nondecreasing closed chains from Pbd,ch(E) with lim
|
194 |
+
n→∞ αp(Cn) = 0,
|
195 |
+
then C∞ = ∩∞
|
196 |
+
n=0Cn is a nonempty set and αp(C∞) = 0,
|
197 |
+
3
|
198 |
+
|
199 |
+
The family of sets described in 1. is said to be the kernel of the measure of noncompactness
|
200 |
+
αp and is defined as
|
201 |
+
ker αp = {C ∈ Pbd,ch(E)|αp(C) = 0}
|
202 |
+
Clearly, ker αp ⊂ Prcp,ch(E). Observe that the intersection set C∞ from condition 4. is
|
203 |
+
a member of the family kerαp. In fact, since αp(C∞) ≤ αp(Cn) for any n, we infer that
|
204 |
+
αp(C∞) = 0. This yields that αp(C∞) ∈ ker αp. This simple observation will be essential
|
205 |
+
in our further investigations.
|
206 |
+
The partially measure αp of noncompactness is called sublinear if it satisfies
|
207 |
+
5. αp(C1 + C2) ≤ αp(C1) + αp(C2), for all C1, C2 ∈ Pbd,ch,
|
208 |
+
6. αp(λC1) = |λ|α(C1), for all λ ∈ R,
|
209 |
+
Again, αp is said to satisfy maximum property if
|
210 |
+
7. αp(C1 ∪ C2) = max{αp(C1), αp(C2)}.
|
211 |
+
Finally, αp is said to be full or complete if
|
212 |
+
8. ker αp = Prcp,ch(E)
|
213 |
+
♦
|
214 |
+
The following definitions (see [11, 12, 13] and the references therein) are frequently used in the
|
215 |
+
subsequent part of this paper.
|
216 |
+
Definition 2.2 A mapping T : E −→ E is called monotone nondecreasing if it preserves the
|
217 |
+
order relation ⪯, that is, if x ⪯ y implies T x ⪯ T y for all x, y ∈ E. Similarly, T is called
|
218 |
+
monotone nonincreasing if x ⪯ y implies T x ⪰ T y for all x, y ∈ E. A monotone mapping T is
|
219 |
+
one which is either monotone nondecreasing or monotone nonincreasing on E.
|
220 |
+
♦
|
221 |
+
Definition 2.3 A mapping ψ : R+ −→ R+ is called a dominating function or, in short,
|
222 |
+
D-function if it is an upper semi-continuous and monotonic nondecreasing function satisfying
|
223 |
+
ψ(0) = 0
|
224 |
+
♦
|
225 |
+
Definition 2.4 A mapping T : E −→ E is called partially nonlinear D-Lipschitzian if there
|
226 |
+
exist a D-function ψ : R+ −→ R+ satisfying
|
227 |
+
∥T x − T y∥ ≤ ψ(∥x − y∥),
|
228 |
+
for all comparable elements x, y ∈ E where ψ(0) = 0. The function ψ is called a D-function of
|
229 |
+
T on E. If ψ(r) = kr, k > 0, then T is called partially Lipschitzian with the Lipschitz constant
|
230 |
+
k. In particular, if k < 1, then T is called a partially contraction on E with the contraction
|
231 |
+
constant k. Finally, T is called a partially nonlinear D-contraction if it is a partially nonlinear
|
232 |
+
D-Lipschitzian with ψ(r) < r for r > 0.
|
233 |
+
♦
|
234 |
+
Remark 2.1 Obviously, every partially Lipshitzian mapping is partially nonlinear D-Lipshitizian.
|
235 |
+
the converse may be not true.
|
236 |
+
Definition 2.5 A nondecreasing mapping T : E −→ E is called partially nonlinear D-set-Lipschitzian
|
237 |
+
if there exists a D-function ψ such that
|
238 |
+
αp(T C) ≤ ψ(αp(C)),
|
239 |
+
for all bounded chain C in E. T is called partially k-set-Lipschitzian if ψ(r) = kr, k > 0. T is
|
240 |
+
called partially k-set-contraction if it is a partially k-set-Lipschitzian with k < 1. Finally, T is
|
241 |
+
called a partially nonlinear D-set-contraction if it is a partially nonlinear D-Lipschitzian with
|
242 |
+
ψ(r) < r for r > 0.
|
243 |
+
♦
|
244 |
+
4
|
245 |
+
|
246 |
+
Definition 2.6 A mapping T : E −→ E is called partially continuous at a point a ∈ E if
|
247 |
+
for ε > 0 there exist a δ > 0 such that ∥T x − T a∥ < ε whenever x is comparable to a and
|
248 |
+
∥x − a∥ < δ. T called partially continuous on E if it is partially continuous at every point of
|
249 |
+
it. It is clear that if T is partially continuous on E, then it is continuous on every chain C
|
250 |
+
contained in E.
|
251 |
+
♦
|
252 |
+
Definition 2.7 A mapping T : E −→ E is called partially bounded if T (C) is bounded for every
|
253 |
+
chain C in E. T is called uniformly partially bounded if all chains T (C) in E are bounded by
|
254 |
+
a unique constant. T is called bounded if T (E) is a bounded subset of E.
|
255 |
+
♦
|
256 |
+
Definition 2.8 A mapping T : E −→ E is called partially compact if T (C) is a relatively
|
257 |
+
compact subset of E for all totally ordered sets or chains C in E. T is called uniformly partially
|
258 |
+
compact if T (C) is a uniformly partially bounded and partially compact on E.
|
259 |
+
T is called
|
260 |
+
partially totally bounded if for any totally ordered and bounded subset C of E, T (C) is a relatively
|
261 |
+
compact subset of E. If T is partially continuous and partially totally bounded, then it is called
|
262 |
+
partially completely continuous on E.
|
263 |
+
♦
|
264 |
+
Remark 2.2 Note that every compact mapping on a partially normed linear space is partially
|
265 |
+
compact and every partially compactmapping is partially totally bounded, however the reverse
|
266 |
+
implications do not hold. Again, every completely continuous mapping is partially completely
|
267 |
+
continuous and every partially completely continuous mapping is partially continuous and partially
|
268 |
+
totally bounded, but the converse may not be true.
|
269 |
+
♦
|
270 |
+
Definition 2.9 The order relation ⪯ and the metric d on a non-empty set E are said to be
|
271 |
+
compatible if {xn} is a monotone, that is, monotone nondecreasing or monotone nondecreasing
|
272 |
+
sequence in E and if a subsequence {xnk} of {xn} converges to x∗ implies that the whole
|
273 |
+
sequence {xn} to x∗. Similarly, given a partially ordered normed linear space (E, ⪯, ∥ · ∥) the
|
274 |
+
order relation ⪯ and the norm ∥ · ∥ are said to be compatible if ⪯ and the metric d defined
|
275 |
+
through the norm ∥ · ∥ are compatible.
|
276 |
+
♦
|
277 |
+
Definition 2.10 A map T : E −→ E is called T -orbitally continuous on E if for any sequence
|
278 |
+
{xn} ⊆ O(x; T ) = {x, T x, T 2x, . . . , T nx, . . .} we have that xn → x∗ implies that T xn → T x∗
|
279 |
+
for each x ∈ E. The metric space E is called T -orbitally complete if every cauchy sequence
|
280 |
+
{xn} ⊆ O(x; T ) converses to a point x∗ ∈ E.
|
281 |
+
We need the following results in the sequel.
|
282 |
+
Let (E, ⪯, ∥ · ∥) be partially ordered Banach
|
283 |
+
algebra. Denote
|
284 |
+
E+ = {x ∈ E/x ⪰ θ} and K = {E+ ⊂ E/uv ∈ E+ for all u, v ∈ E+},
|
285 |
+
where θ is the zero element of E. The members K are called positive vectors in E.
|
286 |
+
Lemma 2.1 [15] If u1, u2, v1, v2 ∈ K are such that u1 ⪯ v1 and u2 ⪯ v2, then u1u2 ⪯ v1v2. ♦
|
287 |
+
Definition 2.11 An operator T : E −→ E is said to be positive if the range R(T ) of T is such
|
288 |
+
that R(T ) ⊆ K.
|
289 |
+
♦
|
290 |
+
Lemma 2.2 [12] If C1 and C2 are two bounded chains in a partially ordered Banach algebra
|
291 |
+
E, then
|
292 |
+
αp(C1 · C2) ≤ ∥C2∥αp(C1) + ∥C1∥αp(C2)
|
293 |
+
where ∥C∥ = sup{∥c∥, c ∈ C}.
|
294 |
+
♦
|
295 |
+
Theorem 2.1 [11] Let (E, ⪯, ∥.∥) be a partially ordered set and let T : E → E be a nondecreasing
|
296 |
+
mapping. Suppose that there is a metric d in X such that (E, d) is a T -orbitally complete metric
|
297 |
+
space. Assume that there exists a D-function ψ such that
|
298 |
+
d(T x, T y) ≤ ψ(d(x, y))
|
299 |
+
5
|
300 |
+
|
301 |
+
for all comparable elements x, y ∈ E satisfying ψ(r) < r for r > 0.Further assume that either
|
302 |
+
T is T -orbitally continuous on E or E is such that if {xn} is a nondecreasing sequence with
|
303 |
+
xn → x ∈ E, then x ⪯ x for all n ∈ N. If there is an element x0 ∈ E satisfying x0 ⪯ T x0 or
|
304 |
+
x0 ⪰ T x0, then T has a fixed point which is further unique if "every pair of elements in E has
|
305 |
+
a lower and an upper bound".
|
306 |
+
♦
|
307 |
+
Theorem 2.2 [11] Let (E, ⪯, ∥·∥) be a partially ordered Banach algebra. Let T : E −→ E be a
|
308 |
+
nondecreasing, partially compact and continuous mapping. Further if the order relation ⪯ and
|
309 |
+
the norm ∥ · ∥ in E are compatible and if there is an element x0 ∈ E satisfying x0 ⪯ T x0 or
|
310 |
+
x0 ⪰ T x0, then T has a fixed point.
|
311 |
+
♦
|
312 |
+
Theorem 2.3 [12] Let (E, ⪯, ∥ · ∥) be a regular partially ordered complete normed linear space
|
313 |
+
such that the order relation and ⪯ the norm ∥ · ∥ are compatible.
|
314 |
+
Let T : E −→ E be a
|
315 |
+
nondecreasing, partially continuous and partially bounded mapping. If T is partially nonlinear
|
316 |
+
D-set-contraction and if there exists an element x0 ∈ E such that x0 ⪯ T x0 or x0 ⪰ T x0, then
|
317 |
+
T has a fixed point x∗ and the sequence {T nx0} of successive iterations converges monotonically
|
318 |
+
to x∗.
|
319 |
+
♦
|
320 |
+
3
|
321 |
+
Reformulation of Dhage’s fixed point theorems
|
322 |
+
In this section, we prove some fixed point theorems in partially ordered Banach algebras. Our
|
323 |
+
results are formulated using some Dhage’s type fixed point. Now, we establish our first fixed
|
324 |
+
point theorem by modifying some assumptions of Theorem 4.1 in [12].
|
325 |
+
Theorem 3.1 Let S be non-empty closed and partially bounded subset of a regular partially
|
326 |
+
ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ in E are
|
327 |
+
compatible. Let A : E −→ K, B : S −→ K and C : E −→ E be three nondecreasing operators
|
328 |
+
satisfying the following conditions:
|
329 |
+
(i) A and C are partially nonlinear D-Lipschitzians with D-functions ψA and ψC,
|
330 |
+
(ii) B is continuous and partially compact,
|
331 |
+
(iii) There exists x0 ∈ S such that x0 ⪯ Ax0 ·By +Cx0 or x0 ⪰ Ax0 ·By +Cx0 for each y ∈ S,
|
332 |
+
(iv) Ax · By + Cx ∈ S for all y ∈ S
|
333 |
+
(v) Every pair of elements x, y ∈ E has a lower and an upper bound in E.
|
334 |
+
Then the equation (1.4) has a fixed point in Eas soon as MψA(r) + ψC(r) < r if r > 0, where
|
335 |
+
M = ∥B(E)∥.
|
336 |
+
♦
|
337 |
+
Proof.
|
338 |
+
Suppose that there exists x0 ∈ S such that x0 ⪯ Ax0 ·By +Cx0. Let y ∈ S and define
|
339 |
+
a mapping define a mapping Ay : S −→ S by the formula
|
340 |
+
Ay(x) = Ax · By + Cx.
|
341 |
+
Since A and B are positive and A, B and C are nondecreasing, Ay is nondecreasing Now, let
|
342 |
+
x1, x2 ∈ E be two comparable elements. Then
|
343 |
+
∥Ay(x1) − Ay(x2)∥
|
344 |
+
=
|
345 |
+
∥Ax1 · By + Cx1 − Ax2 · By − Cx2∥
|
346 |
+
≤
|
347 |
+
∥Ax1 · By − Ax2 · By∥ + ∥Cx1 − Cx2∥
|
348 |
+
≤
|
349 |
+
∥By∥∥Ax1 − Ax2∥ + ∥Cx1 − Cx2∥
|
350 |
+
≤
|
351 |
+
(MψA + ψC) (∥x1 − x2∥).
|
352 |
+
This implies that the operator Ay is a partially nonlinear D-contraction. Hence, by Theorem
|
353 |
+
2.1 there exist a unique point x∗ ∈ E such that
|
354 |
+
x∗ = Ax∗ · By + Cx∗.
|
355 |
+
6
|
356 |
+
|
357 |
+
because the hypothesis (iv) for all y ∈ S we have x∗ ∈ S. Define a mapping
|
358 |
+
T :
|
359 |
+
S
|
360 |
+
−→ S
|
361 |
+
y
|
362 |
+
�−→ x∗,
|
363 |
+
where x∗ is the unique solution of the equation Ax∗ · By + Cx∗. Since A, B and B′ are nonde-
|
364 |
+
creasing and B and B′ are positive , T is nondecreasing. Now we show that T is continuous.
|
365 |
+
Let {yn}∞
|
366 |
+
n=0 be any sequence in B(E) converging to a point y, Since S is closed, y ∈ S. Then,
|
367 |
+
∥T yn − T y∥
|
368 |
+
=
|
369 |
+
∥Ax∗
|
370 |
+
n · yn + Cx∗
|
371 |
+
n − Ax · y − Cx∥
|
372 |
+
≤
|
373 |
+
∥Ax∗
|
374 |
+
n · yn − Ax · y∥ + ∥Cx∗
|
375 |
+
n − Cx∥
|
376 |
+
≤
|
377 |
+
∥Ax∗
|
378 |
+
n · yn − Ax · yn∥ + ∥Ax · yn − Ax · y∥ + ∥Cx∗
|
379 |
+
n − Cx∥
|
380 |
+
≤
|
381 |
+
(MψA + ψc)(∥xn − x∥) + ∥Ax∥∥yn − y∥.
|
382 |
+
Hence
|
383 |
+
lim sup
|
384 |
+
n ∥T yn − T y∥ ≤ (MψA + ψc)(lim sup
|
385 |
+
n ∥xn − x∥) + ∥Ax∥ lim sup
|
386 |
+
n ∥yn − y∥.
|
387 |
+
This show that
|
388 |
+
lim
|
389 |
+
n→+∞ ∥T yn − T y∥ = 0 and the claim is approved. Next, we shows that T is
|
390 |
+
partially compact. In fact, let C be a chain in S, for any z ∈ C we have
|
391 |
+
∥Az∥
|
392 |
+
≤
|
393 |
+
∥Aa∥ + ψA(∥z − a∥)
|
394 |
+
≤
|
395 |
+
∥Aa∥ + ∥z − a∥
|
396 |
+
M
|
397 |
+
≤
|
398 |
+
c,
|
399 |
+
where c = ∥Aa∥ + diamC
|
400 |
+
M
|
401 |
+
for some fixed point a in C.
|
402 |
+
Let ε > 0 be given. By assumption (ii), we infer that B(C) is partially totally bounded, then
|
403 |
+
there exist a chain Y = {y1, . . . , yn} of point in C such that
|
404 |
+
B(C) ⊆
|
405 |
+
n�
|
406 |
+
i=1
|
407 |
+
Bδ(wi),
|
408 |
+
where wi = Byi and δ = 1
|
409 |
+
c(ε − (MφA(ε) + φC(ε))) and Bδ(wi) is an open ball in E centered at
|
410 |
+
wi of radius δ. Therefore, for any y ∈ C, we have yk ∈ Y such that
|
411 |
+
c∥Byi − By∥ ≤ δ.
|
412 |
+
Also, we have
|
413 |
+
∥T yk − T y∥
|
414 |
+
≤
|
415 |
+
∥Ax∗
|
416 |
+
k · Byk − Ax · By∥ − ∥Cx∗
|
417 |
+
k − Cx∥
|
418 |
+
≤
|
419 |
+
M(ψA + ψC)∥x∗
|
420 |
+
k − x∥ + ∥Ax∥∥Byk − By∥
|
421 |
+
≤
|
422 |
+
M(ψA + ψC)∥x∗
|
423 |
+
k − x∥ + c∥Byk − By∥.
|
424 |
+
Then
|
425 |
+
(I − M(ψA + ψC))(∥T yk − T y∥) ≤ c∥Byk − By∥.
|
426 |
+
So,
|
427 |
+
∥T (yk) − T (y)∥ < ε,
|
428 |
+
because y ∈ C is arbitrary,
|
429 |
+
T (S) ⊆
|
430 |
+
n
|
431 |
+
�
|
432 |
+
i=1
|
433 |
+
Bε(ki),
|
434 |
+
7
|
435 |
+
|
436 |
+
where ki = T (yi). As a result, T (S) is partially totally bounded in E. Hence, T is is partially
|
437 |
+
compact. The order relation ⪯ and the norm ∥.∥ are compatible, so the desired conclusion
|
438 |
+
follows of Theorem 2.2 we have T has a fixed point in S.
|
439 |
+
□
|
440 |
+
Now, modifying same assumptions of Theorem 4.8 in [13], we have the following result.
|
441 |
+
Theorem 3.2 Let S be closed and partially bounded subset of a regular partially ordered Banach
|
442 |
+
algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ are compatible in every
|
443 |
+
compact chain C of S. Let A, B : S → K and C : S −→ E be three nondecreasing operators
|
444 |
+
satisfying the following conditions
|
445 |
+
(i) A and C are partially nonlinear D-Lipschitzians with D-functions ψA and ψC respectively,
|
446 |
+
(ii) B is partially completely continuous ,
|
447 |
+
(iii)
|
448 |
+
�I − C
|
449 |
+
A
|
450 |
+
�−1
|
451 |
+
exist on B(S) and is nondecreasing,
|
452 |
+
(iv) There exist x0 ∈ S such that x0 ⪯ Ax0 · By + Cx0 or x0 ⪰ Ax0 · By + Cx0, for each y ∈ S,
|
453 |
+
(v) Ax · By + Cx ∈ S for all y ∈ S,
|
454 |
+
Then the equation (1.4) has a fixed point in S as soon as MψA(r) + ψC(r) < r if r > 0 where
|
455 |
+
M = ∥B(S)∥.
|
456 |
+
Proof.
|
457 |
+
Suppose that there exist x0 ⪯ Ax0 · By + Cx0. It is easy to check that the vector
|
458 |
+
x ∈ E is a solution for the equation (1.4), if and only if x is a fixed point for the operator
|
459 |
+
T :=
|
460 |
+
�I − C
|
461 |
+
A
|
462 |
+
�−1
|
463 |
+
B. From assumption (iii) it follows that, for each y ∈ S there is a unique
|
464 |
+
xy ∈ E such that
|
465 |
+
�I − C
|
466 |
+
A
|
467 |
+
�
|
468 |
+
xy = By
|
469 |
+
or, in an equivalently way
|
470 |
+
Axy · By + Cxy = xy.
|
471 |
+
Since the assumption (v) holds, then xy ∈ S. Hence the map T : S −→ S is well define. from
|
472 |
+
assumption (iii), it follows that T is nondecreasing. Now, in view of Theorem 2.2, it suffices
|
473 |
+
to prove that T is continuous and partially compact. Indeed let {yn}∞
|
474 |
+
n=0 be any sequence in S
|
475 |
+
converging to a point y. Because S is closed, y ∈ S. Now
|
476 |
+
∥T yn − T y∥
|
477 |
+
=
|
478 |
+
∥Ax∗
|
479 |
+
n · Byn + Cx∗
|
480 |
+
n − Ax∗ · By − Cx∗∥
|
481 |
+
≤
|
482 |
+
∥Ax∗
|
483 |
+
n · Byn − Ax∗ · By∥ + ∥Cx∗
|
484 |
+
n − Cx∗∥
|
485 |
+
≤
|
486 |
+
∥Ax∗
|
487 |
+
n · Byn − Ax∗ · Byn∥ + ∥Ax∗ · Byn − Ax∗ · By∥ + ∥Cx∗
|
488 |
+
n − Cx∗∥
|
489 |
+
≤
|
490 |
+
(MψA + ψC)(∥x∗
|
491 |
+
n − x∗∥) + ∥AT y∥∥Byn − By∥.
|
492 |
+
Hence,
|
493 |
+
lim
|
494 |
+
n sup ∥T yn − T y∥ ≤ (MψA + ψC) lim
|
495 |
+
n sup ∥T yn − T y∥ + ∥AT y∥ lim
|
496 |
+
n sup ∥Byn − By∥.
|
497 |
+
This shows that lim
|
498 |
+
n→∞ ∥Nyn − Ny∥ = 0 and the claim is approved. Next, we shows that T
|
499 |
+
is paritally compact. Since B is partially compact and
|
500 |
+
�I − C
|
501 |
+
A
|
502 |
+
�−1
|
503 |
+
is continuous, then the
|
504 |
+
composition mapping T =
|
505 |
+
�I − C
|
506 |
+
A
|
507 |
+
�−1
|
508 |
+
B is continuous and partially compact on E. Next, the
|
509 |
+
order relation ⪯ and the norm ∥ · ∥ in E are compatible. Hence, an application of Theorem 2.2
|
510 |
+
infer that T has, at least, one fixed point in S.
|
511 |
+
□
|
512 |
+
8
|
513 |
+
|
514 |
+
4
|
515 |
+
Application of Dhage’s fixed point to block matrix operator
|
516 |
+
In what follows, we will study the existence of a fixed point for the block matrix operators.
|
517 |
+
Theorem 4.1 Let (E, ⪯, ∥·∥) be a regular partially ordered Banach algebra such that the order
|
518 |
+
relation ⪯ and the norm ∥ · ∥ in E are compatible. Let A, C, D : E −→ E and B, B′ : E −→ K
|
519 |
+
be five nondecreasing operators satisfying the following assumptions:
|
520 |
+
(i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
|
521 |
+
ψA, ψB and ψC respectively,
|
522 |
+
(ii) (I − D)−1 exist and partially nonlinear D-Lipschitz with D-function ψφ and (I − D)−1C is
|
523 |
+
nondecreasing,
|
524 |
+
(iii) B′ is partially continuous and C is compact,
|
525 |
+
(iv) There exist x0 ∈ E, such that x0 ⪯ Ax0 + T x0 · T ′x0 or x0 ⪰ Ax0 + T x0 · T ′x0, where
|
526 |
+
T = B(I − D)−1C and T ′ = B′(I − D)−1C.
|
527 |
+
Then the operator matrix (1.3) has a fixed point in E × E, whenever Mψ(r) ≤ r if r > 0 with
|
528 |
+
ψ(r) = ψB ◦ ψφ ◦ ψC(r) + ψA(r) and M = ∥T ′(E)∥.
|
529 |
+
Proof.
|
530 |
+
Suppose that there is an element x0 ∈ E such that x0 ⪯ Ax0 + T x0 · T ′x0. Define a
|
531 |
+
mapping F : E −→ E by the formula
|
532 |
+
Fx = Ax + T x · T ′x.
|
533 |
+
Since B and B′ are positive and A, B, B′ and (I − D)−1C are nondecreasing we infer that F
|
534 |
+
is nondecreasing. Next, we claim that F is partially continuous. To do us, let {xn; n ∈ N}
|
535 |
+
be a sequence in E which converge to a point x such that xn and x are comparable. From
|
536 |
+
assumption (i), it follows that:
|
537 |
+
∥Fxn − Fx∥
|
538 |
+
=
|
539 |
+
∥Axn + T xn · T ′xn − Ax − T x · T ′x∥
|
540 |
+
≤
|
541 |
+
∥Axn − Ax∥ + ∥T xn · T ′xn − T x · T ′x∥
|
542 |
+
≤
|
543 |
+
∥Axn − Ax∥ + ∥T xn∥∥T ′xn − T ′
|
544 |
+
x∥ + ∥T ′x∥∥T xn − T x∥
|
545 |
+
≤
|
546 |
+
ψA + MψB ◦ ψφ ◦ ψC(∥xn − x∥) + ∥T xn∥∥T ′xn − T ′x∥.
|
547 |
+
From the partially continuity of B′, and taking limit supremum in the aforementioned inequality
|
548 |
+
yields that
|
549 |
+
lim
|
550 |
+
n→∞ ∥Fxn − Fx∥ = 0.
|
551 |
+
This proves that F is a partially continuous operators on E. Again by assumption (iv), it is
|
552 |
+
clear that x0 ⪯ Fx0. Moreover, it easy to show that F is partially bounded. Furthermore, we
|
553 |
+
show that F is a partially nonlinear D-set-contraction on E. Let C be a bounded chain in E.
|
554 |
+
Then by definition of F, we have
|
555 |
+
F(C) ⊆ A(C) + T (C)T ′(C).
|
556 |
+
Since F is nondecreasing and partially continuous F(C) is again a bounded chain in E. Keeping
|
557 |
+
in mind the relatively compactness of T ′(C) and making use of Lemma 2.2 together with the
|
558 |
+
subadditivity of the partially Kuratowski measure of noncompactness αp, enables us to have
|
559 |
+
αp(F(C))
|
560 |
+
≤
|
561 |
+
∥T (C))∥αp(T ′(C)) + ∥T ′(C)∥αp(T (C)) + αp(A(C))
|
562 |
+
≤
|
563 |
+
Mαp(T (C)) + αp(A(C))
|
564 |
+
≤
|
565 |
+
MψB ◦ ψφ ◦ ψC(αp(C)) + ψA(αp(C))
|
566 |
+
=
|
567 |
+
ψ(αp(C)),
|
568 |
+
where ψ(r) = ψA(r) + MψB ◦ ψφ ◦ ψC(r) < r for all r > 0. This shows that F is a partially
|
569 |
+
nonlinear D-set-contraction on E. Finally the relation ⪯ and the norm ∥ · ∥ are compatible, so
|
570 |
+
the desired conclusion follows by an application of Theorem 2.3 we have x = Ax + T x · T ′x has
|
571 |
+
a solution in E. Now, use the vector y = (I − D)−1Cx to achieve the proof.
|
572 |
+
□
|
573 |
+
9
|
574 |
+
|
575 |
+
Remark 4.1 If A is a contraction on S into itself with constant contraction k and B a partially
|
576 |
+
nonlinear D-lipshitzian with a D-function ψB, and C(S) ⊂ (I−D)(E), then the operator inverse
|
577 |
+
(I − A)−1B exist and partially nonlinear D-lipshiztian with a D-function ψ(r) =
|
578 |
+
1
|
579 |
+
1−kψB(r).
|
580 |
+
Next, we will combine Theorem 4.1 and Remark 4.1 in order to to obtain the following fixed
|
581 |
+
point theorem:
|
582 |
+
Corollary 4.1 Let (E, ⪯, ∥·∥) be a regular partially ordered Banach algebra such that the order
|
583 |
+
relation ⪯ and the norm ∥ · ∥ in E are compatible. Let A, C, D : E −→ E and B, B′ : E −→ K
|
584 |
+
are five nondecreasing operators satisfying the following assumptions:
|
585 |
+
(i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
|
586 |
+
ψA, ψB and ψC respectively,
|
587 |
+
(ii) D is a contraction with a contraction constant k and (I − D)−1C is nondecreasing,
|
588 |
+
(iii) B′ is partially continuous and C is partially compact, and C(E) ⊂ (I − D)(E)
|
589 |
+
(iv) x0 ⪯ Ax0 +T x0 ·T ′x0 or x0 ⪰ Ax0 +T x0 ·T ′x0, for some x0 ∈ E, where T = B(I −D)−1C
|
590 |
+
and T ′ = B′(I − D)−1C.
|
591 |
+
Then the operator matrix (1.3) has a fixed point in E × E, whenever Mψ(r) ≤ r if r > 0 with
|
592 |
+
ψ(r) = ψB ◦ (
|
593 |
+
1
|
594 |
+
1−k)ψC(r) + ψA(r) and M = ∥T ′(E)∥.
|
595 |
+
Based on the conditions C ≡ 0E and D = 1E in which 0E and 1E represents respectively the
|
596 |
+
zero and the unit element of the partially ordered Banach algebra E, we infer from Theorem
|
597 |
+
4.1 the following result:
|
598 |
+
Corollary 4.2 [12] Let (E, ⪯, ∥ · ∥) be a regular partially ordered Banach algebra such that the
|
599 |
+
order relation ⪯ and the norm ∥ · ∥ in E are compatible. Let A : E −→ E and B, B′ : E −→ K
|
600 |
+
be five nondecreasing operators satisfying the following assumptions:
|
601 |
+
(i) A, B and are partially bounded and partially nonlinear D-Lipschitzians with D-functions
|
602 |
+
ψA, ψB respectively,
|
603 |
+
(ii) B′ is partially continuous and compact,
|
604 |
+
(ii) There exist x0 ∈ E, such that x0 ⪯ Ax0 + Bx0 · B′x0 or x0 ⪰ Ax0 + Bx0 · B′x0.
|
605 |
+
Then the operator matrix (1.3) has a fixed point in E × E, whenever Mψ(r) ≤ r if r > 0 with
|
606 |
+
ψ(r) = ψB + ψA(r) and M = ∥B′(E)∥.
|
607 |
+
Next, we can modify some assumptions of Theorem 3.2 in order to study the problem in block
|
608 |
+
operator matrix.
|
609 |
+
Theorem 4.2 Let S be a non-empty closed partially bounded subset of a regular partially
|
610 |
+
ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ are
|
611 |
+
compatible in every compact chain C of S. Let A, C : S −→ E and B, B′, D : E −→ K be five
|
612 |
+
nondecreasing operators satisfying the following assumptions:
|
613 |
+
(i) A, B and C are partially nonlinear D-Lipschitzians with D-functions ψA, ψB and ψC
|
614 |
+
respectively,
|
615 |
+
(ii) (I − D)−1 is nondecreasing and partially nonlinear D-Lipschitzian with D-functions ψφ,
|
616 |
+
(iii) B′ is continuous and C is a partially compact operator such that C(S) ⊆ (I − D)(S)
|
617 |
+
(iv) Ax + T x · T ′y ∈ S for all y ∈ S where T = B(I − D)−1C and T ′ = B′(I − D)−1C,
|
618 |
+
(v)
|
619 |
+
�I − A
|
620 |
+
T
|
621 |
+
�−1
|
622 |
+
exist on T ′(S) and nondecreasing,
|
623 |
+
(vi) x0 ⪯ Ax0 + T x0 · T ′y or x0 ⪰ Ax0 + T x0 · T ′y, for each y ∈ S,
|
624 |
+
(vii) every pair of elements x, y ∈ E has a lower and an upper bound in E.
|
625 |
+
Then the operator matrix (1.3) has a fixed point in S × S, whenever Mψ(r) ≤ r if r > 0 with
|
626 |
+
ψ(r) = ψB ◦ ψφ ◦ ψC(r) + ψA(r) and M = ∥T ′(S)∥.
|
627 |
+
Proof.
|
628 |
+
Suppose that there is an element x0 ∈ E such that x0 ⪯ Ax0 + T x0 · T ′y. From
|
629 |
+
assumption (iv), it follows that for each y ∈ S, there exist a unique point x ∈ S such that
|
630 |
+
�I − A
|
631 |
+
T
|
632 |
+
�
|
633 |
+
x = T ′y
|
634 |
+
10
|
635 |
+
|
636 |
+
or, equivalently x = Ax + T x · T ′y. Because assumption (iv) hold, then x ∈ S. Therefore, we
|
637 |
+
can define F : S −→ S by the formula
|
638 |
+
F(x) =
|
639 |
+
�I − A
|
640 |
+
T
|
641 |
+
�−1
|
642 |
+
T ′x.
|
643 |
+
(4.1)
|
644 |
+
In view of assumption (v), it follows that, F is nondecreasing on E. Next, we will prove that
|
645 |
+
F is continuous. To see that, let {zn}∞
|
646 |
+
n=0 be any sequence on E such that zn → z, and let
|
647 |
+
|
648 |
+
|
649 |
+
|
650 |
+
yn = T ′(zn) and y = T ′(z)
|
651 |
+
xn =
|
652 |
+
�I − A
|
653 |
+
T
|
654 |
+
�−1
|
655 |
+
(yn) and x =
|
656 |
+
�I − A
|
657 |
+
T
|
658 |
+
�−1
|
659 |
+
(y).
|
660 |
+
Then, it easy to show that yn → y, and we have
|
661 |
+
�
|
662 |
+
xn
|
663 |
+
=
|
664 |
+
Axn + T xn · T ′yn
|
665 |
+
x
|
666 |
+
=
|
667 |
+
Ax + T x · T ′y.
|
668 |
+
So,
|
669 |
+
∥xn − x∥
|
670 |
+
=
|
671 |
+
∥Axn + T xn · T ′yn − Ax + T x · T ′y∥
|
672 |
+
≤
|
673 |
+
∥Axn − Ax∥ + ∥T xn · T ′yn − T x · T ′y∥
|
674 |
+
≤
|
675 |
+
∥Axn.yn − Ax.yn∥ + ∥Ax.yn − Ax.y∥ + ∥Cxn − Cx∥
|
676 |
+
≤
|
677 |
+
ψA + MψB ◦ ψφ ◦ ψC(∥xn − x∥) + ∥T x∥∥yn − y∥,
|
678 |
+
where ψ(r) = ψA(r) + (MψB ◦ ψφ ◦ ψC)(r) < r for all r > 0 and the constant M exists
|
679 |
+
in view of the fact T ′ is partially bounded operator on S.
|
680 |
+
Taking limit supermum in the
|
681 |
+
aforementioned inequality yields that F is continuous. Further, from assumption (iii), we show
|
682 |
+
that B′(I − D)−1C as well as F is partially compact. Finally the relation ⪯ and the norm ∥ · ∥
|
683 |
+
are compatible. Hence, an application of Theorem 2.2 infer that F has at least, one solution in
|
684 |
+
S × S. Now, use the vector y = (I − D)−1Cx to achieve the proof.
|
685 |
+
□
|
686 |
+
As a consequence we have the following fixed point result.
|
687 |
+
Corollary 4.3 Let S be a non-empty closed partially bounded subset of a regular partially
|
688 |
+
ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ in E
|
689 |
+
are compatible. Let A, C : S −→ E and B, B′, D : E −→ K be five nondecreasing operators
|
690 |
+
satisfying the following assumptions:
|
691 |
+
(i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
|
692 |
+
ψA, ψB and ψC respectively,
|
693 |
+
(ii) D is contraction with a contraction constant k and C(S) ⊂ (I − D)(S),
|
694 |
+
(iii) B′ is continuous and C is a partially compact operator,
|
695 |
+
(iv) x = Ax + T x · T ′y, y ∈ S ⇒ x ∈ S where T = B(I − D)−1C and T ′ = B′(I − D)−1C,
|
696 |
+
(v)
|
697 |
+
�I − A
|
698 |
+
T
|
699 |
+
�−1
|
700 |
+
exists on T ′(S) and nondecreasing,
|
701 |
+
(vi) x0 ⪯ Ax0 + T x0 · T ′x0 or x0 ⪰ Ax0 + T x0 · T ′x0, for some x0 ∈ E,
|
702 |
+
(vii) every pair of elements x, y ∈ E has a lower and an upper bound in E.
|
703 |
+
Then the operator matrix (1.3) has a fixed point in S × S, whenever Mψ(r) ≤ r if r > 0 with
|
704 |
+
ψ(r) = ψB ◦ (
|
705 |
+
1
|
706 |
+
1−k)ψC(r) + ψA(r) and M = ∥T ′(S)∥.
|
707 |
+
From Theorem 4.2 and corollary 4.3 , without any hurdle we can derive the following corollary.
|
708 |
+
Corollary 4.4 Let S be a non-empty closed partially bounded subset of a regular partially
|
709 |
+
ordered Banach algebra (E, ⪯, ∥ · ∥) such that the order relation ⪯ and the norm ∥ · ∥ in E
|
710 |
+
are compatible. Let A, C : S −→ E and B, B′, D : E −→ K be five nondecreasing operators
|
711 |
+
satisfying the following assumptions:
|
712 |
+
11
|
713 |
+
|
714 |
+
(i) A, B and C are partially bounded and partially nonlinear D-Lipschitzians with D-functions
|
715 |
+
ψA, ψB and ψC respectively,
|
716 |
+
(ii) D is contraction with a contraction constant k and C(S) ⊂ (I − D)(E),
|
717 |
+
(iii) B′ is partially completely continuous
|
718 |
+
(iv) x = Ax + T x · T ′y, y ∈ S ⇒ x ∈ S where T = B(I − D)−1C and T ′ = B′(I − D)−1C,
|
719 |
+
(v)
|
720 |
+
�I − A
|
721 |
+
T
|
722 |
+
�−1
|
723 |
+
exist on B′(E) and nondecreasing,
|
724 |
+
(vi) x0 ⪯ Ax0 + T x0 · T ′x0 or x0 ⪰ Ax0 + T x0 · T ′x0, for some x0 ∈ E,
|
725 |
+
(vii) every pair of elements x, y ∈ E has a lower and an upper bound in E.
|
726 |
+
Then the operator matrix (1.3) has a fixed point in S × E, whenever Mψ(r) ≤ r if r > 0 with
|
727 |
+
ψ(r) = ψB ◦ (
|
728 |
+
1
|
729 |
+
1−k)ψC(r) + ψA(r) and M = ∥T ′(E)∥.
|
730 |
+
5
|
731 |
+
Existence solutions for a system of functional differential
|
732 |
+
equation
|
733 |
+
The FDE (1.1) is considered in the function space E = C(J, R) of continuous real-valued
|
734 |
+
functions defined on J. We define a norm ∥ · ∥ and the order relation ⪯ in C(J, R) by
|
735 |
+
∥x∥∞ = sup
|
736 |
+
t∈J
|
737 |
+
|x(t)|
|
738 |
+
(5.1)
|
739 |
+
and
|
740 |
+
x ≤ y ⇐⇒ x(t) ≤ y(t)
|
741 |
+
(5.2)
|
742 |
+
for all t ∈ J. Clearly, C(J, R) is a Banach space with respect to above supremum norm and
|
743 |
+
also partially ordered with respect to the above partially order relation ≤. It is known that
|
744 |
+
the partially ordered Banach space C(J, R) has some nice properties with respect to the above
|
745 |
+
order relation in it. The following lemma follows by an application of Arzela-Ascolli theorem.
|
746 |
+
Lemma 5.1 [16] Let (C(J, R), ≤, ∥ · ∥) be a partially ordered Banach space with the norm ∥ · ∥
|
747 |
+
and the order relation ≤ defined by (5.1) and (5.2) respectively. Then ∥·∥ and ≤ are compatible
|
748 |
+
in every partially compact subset of C(J, R).
|
749 |
+
The purpose of this section is to apply theorem 4.1 to discuss the existence of solutions for the
|
750 |
+
following nonlinear quadratic functional differential equations QFDE (1.1).
|
751 |
+
We need the next definition in what follows.
|
752 |
+
Definition 5.1 A functions u, v ∈ C(J, R) is said to be a lower solution of the (1.1), if it
|
753 |
+
satisfies
|
754 |
+
|
755 |
+
|
756 |
+
|
757 |
+
|
758 |
+
|
759 |
+
|
760 |
+
|
761 |
+
|
762 |
+
|
763 |
+
|
764 |
+
|
765 |
+
|
766 |
+
|
767 |
+
|
768 |
+
|
769 |
+
�u(t) − f1(t, u(t))
|
770 |
+
f2(t, v(t))
|
771 |
+
�′
|
772 |
+
+ λ
|
773 |
+
�u(t) − f1(t, u(t))
|
774 |
+
f2(t, v(t))
|
775 |
+
�
|
776 |
+
≤ g(t, v(t))
|
777 |
+
v(t) ≤
|
778 |
+
1
|
779 |
+
1 − b(t)|u(t)| − p
|
780 |
+
�
|
781 |
+
t,
|
782 |
+
1
|
783 |
+
1 − b(t)|u(t)|
|
784 |
+
�
|
785 |
+
+ p(t, v(t))
|
786 |
+
�
|
787 |
+
u(0), v(0)
|
788 |
+
�
|
789 |
+
≤ (u0, v0) ∈ R2.
|
790 |
+
for all t ∈ J. Similarly, a functions u′, v′ ∈ C(J, R) is said to be an upper solution of the FDE
|
791 |
+
(1.1) if it satisfies the conditions above with the inequality reversed.
|
792 |
+
We consider the following set of assumptions in what follows:
|
793 |
+
(H0) The functions b : J −→ R is continuous.
|
794 |
+
(H1) The function t �−→ f1(t, 0) is bounded on J with bound F0.
|
795 |
+
12
|
796 |
+
|
797 |
+
(H2) f2 define a function f2 : J × R −→ R+ are nondecreasing in x for all t ∈ J.
|
798 |
+
(H3) There exist two constants L, K ∈ R∗
|
799 |
+
+ such that
|
800 |
+
0 < fi(t, x(t)) − fi(t, y(t)) ≤
|
801 |
+
L(x − y)
|
802 |
+
K + (x − y)
|
803 |
+
for all t ∈ J , i = 1, 2 and x, y ∈ R with x ≥ y. Moreover, L ≤ K.
|
804 |
+
(H4) The function p : J × R −→ R is nondecreasing in x for all t ∈ J and contraction with a
|
805 |
+
constant k.
|
806 |
+
(H5) The function g : J × R −→ R+ is nondecreasing and there exist a function h ∈ L1(J) such
|
807 |
+
that
|
808 |
+
∥g(t, x)∥ ≤ ∥h∥L1 for all t ∈ J and x ∈ R.
|
809 |
+
(H6) The QFDE (1.1) has a lower solution in C(J, R) × C(J, R)
|
810 |
+
Remark 5.1 Assume that the assumption (H6) holds.
|
811 |
+
Then a functions x ∈ C(J, R) is a
|
812 |
+
solution of (1.1) if and only if is a solution of the functional integral equation
|
813 |
+
|
814 |
+
|
815 |
+
|
816 |
+
|
817 |
+
|
818 |
+
|
819 |
+
|
820 |
+
x(t)
|
821 |
+
=
|
822 |
+
f1(t, x(t)) + f2(t, y(t))
|
823 |
+
�
|
824 |
+
ce−λt + e−λt
|
825 |
+
� t
|
826 |
+
0
|
827 |
+
eλsg(s, y(s))ds
|
828 |
+
�
|
829 |
+
y(t)
|
830 |
+
=
|
831 |
+
1
|
832 |
+
1 − b(t)|x(t)| − p
|
833 |
+
�
|
834 |
+
t,
|
835 |
+
1
|
836 |
+
1 − b(t)|x(t)|
|
837 |
+
�
|
838 |
+
+ p(t, y(t))
|
839 |
+
(5.3)
|
840 |
+
where c = x0 − f1(0, x0)
|
841 |
+
f2(0, y0)
|
842 |
+
.
|
843 |
+
Indeed, let g ∈ C(J, R). Assume first that x is a solution of the QFDE (1.1) define on J. By
|
844 |
+
definition, the function t �−→ x(t) − f1(t, x(t))
|
845 |
+
f2(t, y(t))
|
846 |
+
is continuous on J, and so, differentiable there,
|
847 |
+
whence
|
848 |
+
�x(t) − f1(t, x(t))
|
849 |
+
f2(t, y(t))
|
850 |
+
�′
|
851 |
+
is integrable on J. Applying integration to (1.1) from 0 to t, we
|
852 |
+
obtain the HIE (5.3) on J.
|
853 |
+
Conversely, assume that x satisfies Eq. (5.3). Then by direct differentiation we obtain the
|
854 |
+
first equation in QFDE (1.1). Again, substituting t = 0 in Eq. (5.3) yields
|
855 |
+
x(0) − f1(0, x(0))
|
856 |
+
f2(0, y(0))
|
857 |
+
= x0 − f1(0, x0)
|
858 |
+
f2(0, y0)
|
859 |
+
whence, (x(0), y(0)) = (x0, y0). Thus, the QFDE (1.1) holds.
|
860 |
+
Now, we are in a position to prove the following existence theorem for QFDE (1.1).
|
861 |
+
Theorem 5.1 Assume that the assumption (H0)) through (H7) hold. Furthermore, if
|
862 |
+
|
863 |
+
|
864 |
+
|
865 |
+
|
866 |
+
|
867 |
+
|
868 |
+
|
869 |
+
L
|
870 |
+
�����
|
871 |
+
x0 − f1(0, x0)
|
872 |
+
f2(0, y0)
|
873 |
+
���� + ∥h∥L1
|
874 |
+
�
|
875 |
+
≤ K
|
876 |
+
M1∥γ∥ + K ≤ 1 − k.
|
877 |
+
(5.4)
|
878 |
+
Then the system of the functional differential equations (1.1) has, at least, one solution in
|
879 |
+
C(J, R) × C(J, R).
|
880 |
+
♦
|
881 |
+
13
|
882 |
+
|
883 |
+
Proof.
|
884 |
+
Observe that the above problem (1.1) may be written in the following form
|
885 |
+
� x(t) = (Ax)(t) + (By)(t) · (B′y)(t)
|
886 |
+
y(t) = (Cx)(t) + (Dy)(t)
|
887 |
+
.
|
888 |
+
where A, B, C, D and B′ on C(J, R) defined by:
|
889 |
+
|
890 |
+
|
891 |
+
|
892 |
+
|
893 |
+
|
894 |
+
|
895 |
+
|
896 |
+
|
897 |
+
|
898 |
+
|
899 |
+
|
900 |
+
|
901 |
+
|
902 |
+
|
903 |
+
|
904 |
+
|
905 |
+
|
906 |
+
|
907 |
+
|
908 |
+
|
909 |
+
|
910 |
+
|
911 |
+
|
912 |
+
|
913 |
+
|
914 |
+
|
915 |
+
|
916 |
+
|
917 |
+
|
918 |
+
|
919 |
+
|
920 |
+
|
921 |
+
|
922 |
+
|
923 |
+
|
924 |
+
(Ax)(t) = f1(t, x(t))
|
925 |
+
(By)(t) = f2(t, y(t))
|
926 |
+
(Cx)(t) =
|
927 |
+
1
|
928 |
+
1 − b(t)|x(t)| − p
|
929 |
+
�
|
930 |
+
t,
|
931 |
+
1
|
932 |
+
1 − b(t)|x(t)|
|
933 |
+
�
|
934 |
+
(Dy)(t) = p(t, y(t))
|
935 |
+
(B′y)(t) = ce−λt + e−λt
|
936 |
+
� t
|
937 |
+
0
|
938 |
+
eλsg(s, y(s))ds.
|
939 |
+
From the above assumptions and the continuity of the integral, it follows that the operators
|
940 |
+
B, B′ : E −→ K. In order to apply Theorem 4.1, we have to verify the following steps.
|
941 |
+
Step 1: A, B, C, D and B′ are nondecreasing on E.
|
942 |
+
Let x, y ∈ E be such that x ≥ y. Then x(t) ≥ y(t) for all t ∈ J. Then by assumption (H3), we
|
943 |
+
obtain
|
944 |
+
Ax(t)
|
945 |
+
=
|
946 |
+
f1(t, x(t)
|
947 |
+
≥
|
948 |
+
f1(t, y(t)
|
949 |
+
=
|
950 |
+
Ay(t),
|
951 |
+
for all t ∈ J. This shows that the operator that the operator A is nondecreasing on E. Similarly,
|
952 |
+
by assumption (H3), we get
|
953 |
+
Bx(t)
|
954 |
+
=
|
955 |
+
f2(t, x(t)
|
956 |
+
≥
|
957 |
+
f2(t, y(t))
|
958 |
+
=
|
959 |
+
By(t),
|
960 |
+
for all t ∈ J. This shows that the operator B is also nondecreasing on E. Furthermore, by
|
961 |
+
assumption (H5), we get C is nondecreasing operator on E. Indeed, let x, y ∈ E such that
|
962 |
+
x(t) ≥ y(t)
|
963 |
+
Cx(t)
|
964 |
+
=
|
965 |
+
1
|
966 |
+
1 − b(t)|x(t)| − p
|
967 |
+
�
|
968 |
+
t,
|
969 |
+
1
|
970 |
+
1 − b(t)|x(t)|
|
971 |
+
�
|
972 |
+
≥
|
973 |
+
1
|
974 |
+
1 − b(t)|y(t)| − p
|
975 |
+
�
|
976 |
+
t,
|
977 |
+
1
|
978 |
+
1 − b(t)|y(t)|
|
979 |
+
�
|
980 |
+
=
|
981 |
+
Cy(t),
|
982 |
+
for all t ∈ J. This shows that the operator C is nondecreasing on E. Again, by assumption
|
983 |
+
(H4) , we obtain
|
984 |
+
Dx(t)
|
985 |
+
=
|
986 |
+
p(t, x(t)
|
987 |
+
≥
|
988 |
+
p(t, y(t))
|
989 |
+
=
|
990 |
+
Dy(t),
|
991 |
+
for all t ∈ J. This shows that the operator D is nondecreasing on E. Finally, by assumption
|
992 |
+
(H5) , we get
|
993 |
+
B′x(t)
|
994 |
+
=
|
995 |
+
ce−λt + e−λt
|
996 |
+
� t
|
997 |
+
0
|
998 |
+
e−λsg(s, x(s))ds
|
999 |
+
≥
|
1000 |
+
ce−λt + e−λt
|
1001 |
+
� t
|
1002 |
+
0
|
1003 |
+
e−λsg(s, y(s))ds
|
1004 |
+
=
|
1005 |
+
B′y(t),
|
1006 |
+
14
|
1007 |
+
|
1008 |
+
for all t ∈ J. This shows that the operator B′ is nondecreasing on E.
|
1009 |
+
Step 2: A, B and C are partially bounded and partially D-Lipschitzians on E.
|
1010 |
+
Let x ∈ E be arbitrary. Without loss of generality we assume that x ≥ 0. Then by assumptions
|
1011 |
+
(H1) and (H2), we have
|
1012 |
+
|Ax(t)|
|
1013 |
+
=
|
1014 |
+
|f1(t, x(t))|
|
1015 |
+
≤
|
1016 |
+
|f1(t, x(t)) − f1(t, 0)| + |f1(t, 0)|
|
1017 |
+
≤
|
1018 |
+
L∥x∥
|
1019 |
+
K + ∥x∥ + F0
|
1020 |
+
≤
|
1021 |
+
L + F0,
|
1022 |
+
for all t ∈ J. Taking the supremum over t in the above inequality, we obtain
|
1023 |
+
∥Ax∥ ≤ L + F0
|
1024 |
+
for all x ∈ E. So, A is bounded. This further implies that A is partially bounded on E.
|
1025 |
+
Next, let x, y ∈ E be such that x ≥ y. Then, we have
|
1026 |
+
|Ax(t) − Ay(t)|
|
1027 |
+
=
|
1028 |
+
|f1(t, x(t)) − f1(t, y(t))|
|
1029 |
+
≤
|
1030 |
+
L∥x − y∥
|
1031 |
+
K + ∥x − y ∥
|
1032 |
+
=
|
1033 |
+
ψA(∥x − y∥),
|
1034 |
+
for all t ∈ J, where ψA(r) =
|
1035 |
+
Lr
|
1036 |
+
K + r. Taking the supremum over t, we obtain
|
1037 |
+
∥Ax − Ay∥ ≤ ψA(∥x − y∥),
|
1038 |
+
for all x, y ∈ E with x ≥ y.
|
1039 |
+
Hence, A is a partial nonlinear D-Lipschitzian on E with a
|
1040 |
+
D-function ψA. By using the same argument, we conclude that B is partially bounded and
|
1041 |
+
partially D-Lipschitzian on E, where ψB(r) =
|
1042 |
+
Lr
|
1043 |
+
K + r . Also, we shall show that C is partially
|
1044 |
+
bounded and partially D-Lipschitzian. Indeed, for all t ∈ J, we get
|
1045 |
+
|Cx(t)|
|
1046 |
+
=
|
1047 |
+
����
|
1048 |
+
1
|
1049 |
+
1 − b(t)|x(t)| − p
|
1050 |
+
�
|
1051 |
+
t,
|
1052 |
+
1
|
1053 |
+
1 − b(t)|x(t)|
|
1054 |
+
�����
|
1055 |
+
≤
|
1056 |
+
1 +
|
1057 |
+
����p
|
1058 |
+
�
|
1059 |
+
t,
|
1060 |
+
1
|
1061 |
+
1 − b(t)|x(t)|
|
1062 |
+
�����
|
1063 |
+
≤
|
1064 |
+
1 + k
|
1065 |
+
This means that the operator C is partially bounded. Moreover, let x, y ∈ E such that x ≥ y.
|
1066 |
+
Then we get
|
1067 |
+
|Cx(t) − C(y)(t)|
|
1068 |
+
≤
|
1069 |
+
����
|
1070 |
+
1
|
1071 |
+
1 − b(t)|x(t)| − p
|
1072 |
+
�
|
1073 |
+
t,
|
1074 |
+
1
|
1075 |
+
1 ��� b(t)|x(t)|
|
1076 |
+
�
|
1077 |
+
−
|
1078 |
+
1
|
1079 |
+
1 − b(t)|y(t)| − p
|
1080 |
+
�
|
1081 |
+
t,
|
1082 |
+
1
|
1083 |
+
1 − b(t)|y(t)|
|
1084 |
+
�����
|
1085 |
+
≤
|
1086 |
+
����
|
1087 |
+
1
|
1088 |
+
1 − b(t)|x(t)| −
|
1089 |
+
1
|
1090 |
+
1 − b(t)|y(t)|
|
1091 |
+
���� +
|
1092 |
+
����p
|
1093 |
+
�
|
1094 |
+
t,
|
1095 |
+
1
|
1096 |
+
1 − b(t)|x(t)|
|
1097 |
+
�
|
1098 |
+
− p
|
1099 |
+
�
|
1100 |
+
t,
|
1101 |
+
1
|
1102 |
+
1 − b(t)|y(t)|
|
1103 |
+
�����
|
1104 |
+
≤
|
1105 |
+
(1 + k)
|
1106 |
+
����
|
1107 |
+
1
|
1108 |
+
1 − b(t)|x(t)| −
|
1109 |
+
1
|
1110 |
+
1 − b(t)|y(t)|
|
1111 |
+
����
|
1112 |
+
≤
|
1113 |
+
(1 + k)∥b∥|x(t) − y(t)|.
|
1114 |
+
Taking the supremum over t, we obtain that C is partially nonlinear D-Lipshitzian with D-
|
1115 |
+
function ψC(r) = (1 + k)∥b∥r
|
1116 |
+
15
|
1117 |
+
|
1118 |
+
Step 3 : (I − D)−1 is partially nonlinear D-Lipshitzian and (I − D)−1C is nondecreasing.
|
1119 |
+
Since D is contraction then (I − D)−1 exist and is a contraction with constant
|
1120 |
+
1
|
1121 |
+
1 − k . Conse-
|
1122 |
+
quently, (I − D)−1 is partially D-lipshitzian with D-function ψφ(r) =
|
1123 |
+
1
|
1124 |
+
1 − k r
|
1125 |
+
Now, we shaw that (I − D)−1C is nondecreasing. Since (I − D)−1Cx =
|
1126 |
+
1
|
1127 |
+
1 − b|x|, for all x ∈ E.
|
1128 |
+
Then for all x, y ∈ E such that x ≤ y we have
|
1129 |
+
(I − D)−1Cx =
|
1130 |
+
1
|
1131 |
+
1 − b|x| ≤
|
1132 |
+
1
|
1133 |
+
1 − b|y| = (I − D)−1Cy.
|
1134 |
+
Step 4 : B′ est partially continuous and C is compact.
|
1135 |
+
Let {xn}n∈N be a sequence in a chain C such that xn → x as n → ∞. Then by the dominated
|
1136 |
+
convergence theorem for integration, we obtain
|
1137 |
+
lim
|
1138 |
+
n−→∞ Bxn(t)
|
1139 |
+
=
|
1140 |
+
ce−λt + e−λt
|
1141 |
+
� t
|
1142 |
+
0
|
1143 |
+
lim
|
1144 |
+
n−→∞ eλsg(s, xn(s))ds
|
1145 |
+
=
|
1146 |
+
ce−λt + e−λt
|
1147 |
+
� t
|
1148 |
+
0
|
1149 |
+
eλsg(s, x(s))ds
|
1150 |
+
=
|
1151 |
+
Bx(t),
|
1152 |
+
for all t ∈ J. This shows that {Bxn} converges to Bx pointwise on J.
|
1153 |
+
Now we show that {Bxn}n∈N is an equicontinuous sequence of functions in E. Let t1, t2 ∈ J
|
1154 |
+
with t1 > t2 > 0. Then we have
|
1155 |
+
|Bxn(t2) − Bxn(t1)|
|
1156 |
+
≤
|
1157 |
+
��ce−λt2 − ce−λt1�� +
|
1158 |
+
����e−λt2
|
1159 |
+
� t2
|
1160 |
+
0
|
1161 |
+
eλsg(s, xn(s))ds
|
1162 |
+
−
|
1163 |
+
e−λt1 � t1
|
1164 |
+
0 eλsg(s, xn(s))ds
|
1165 |
+
���
|
1166 |
+
≤
|
1167 |
+
|ce−λt2 − ce−λt1| +
|
1168 |
+
����e−λt2
|
1169 |
+
� t2
|
1170 |
+
0
|
1171 |
+
eλsg(s, xn(s)) ds
|
1172 |
+
−
|
1173 |
+
e−λt2
|
1174 |
+
� t1
|
1175 |
+
0
|
1176 |
+
eλsg(s, xn(s))ds +e−λt2
|
1177 |
+
� t1
|
1178 |
+
0
|
1179 |
+
eλsg(s, xn(s))ds
|
1180 |
+
−
|
1181 |
+
e−λt1
|
1182 |
+
� t1
|
1183 |
+
0
|
1184 |
+
eλsg(s, xn(s))ds
|
1185 |
+
����
|
1186 |
+
≤
|
1187 |
+
|ce−λt2 − ce−λt1| +
|
1188 |
+
����e−λt2
|
1189 |
+
� t2
|
1190 |
+
t1
|
1191 |
+
eλsg(s, xn(s))ds
|
1192 |
+
����
|
1193 |
+
+
|
1194 |
+
����(e−λt2 − e−λt1)
|
1195 |
+
� t1
|
1196 |
+
0
|
1197 |
+
eλsg(s, xn(s))ds
|
1198 |
+
���� .
|
1199 |
+
This implies that lim
|
1200 |
+
t1→t2 |Bxn(t2) − Bxn(t1)| = 0 and consequently B is partially continuous.
|
1201 |
+
Next, we show that C is compact. To do this, for any x ∈ J
|
1202 |
+
|Cx(t)|
|
1203 |
+
=
|
1204 |
+
����
|
1205 |
+
1
|
1206 |
+
1 + b(t)|x(t)| − p
|
1207 |
+
�
|
1208 |
+
t,
|
1209 |
+
1
|
1210 |
+
1 + b(t)|x(t)|
|
1211 |
+
�����
|
1212 |
+
≤
|
1213 |
+
1 +
|
1214 |
+
����p
|
1215 |
+
�
|
1216 |
+
t,
|
1217 |
+
1
|
1218 |
+
1 + b(t)|x(t)|
|
1219 |
+
�����
|
1220 |
+
≤
|
1221 |
+
1 + k
|
1222 |
+
this show that C is bounded. Now we show that C is equicontinuous on E. For each t1, t2 ∈ J
|
1223 |
+
16
|
1224 |
+
|
1225 |
+
such that t2 > t1, we get
|
1226 |
+
|Cx(t2) − Cx(t1)|
|
1227 |
+
=
|
1228 |
+
����
|
1229 |
+
1
|
1230 |
+
1 + b(t)|x(t2)| − p
|
1231 |
+
�
|
1232 |
+
t2,
|
1233 |
+
1
|
1234 |
+
1 + b(t2)|x(t2)|
|
1235 |
+
�
|
1236 |
+
−
|
1237 |
+
1
|
1238 |
+
1 + b(t1)|x(t1)| − p
|
1239 |
+
�
|
1240 |
+
t1,
|
1241 |
+
1
|
1242 |
+
1 + b(t1)|x(t1)|
|
1243 |
+
�����
|
1244 |
+
≤
|
1245 |
+
����
|
1246 |
+
1
|
1247 |
+
1 + b(t)|x(t2)| −
|
1248 |
+
1
|
1249 |
+
1 + b(t1)|x(t1)|
|
1250 |
+
����
|
1251 |
+
+
|
1252 |
+
����p
|
1253 |
+
�
|
1254 |
+
t2,
|
1255 |
+
1
|
1256 |
+
1 + b(t2)|x(t2)|
|
1257 |
+
�
|
1258 |
+
− p
|
1259 |
+
�
|
1260 |
+
t1,
|
1261 |
+
1
|
1262 |
+
1 + b(t1)|x(t1)|
|
1263 |
+
�����
|
1264 |
+
≤
|
1265 |
+
∥b∥∞
|
1266 |
+
����
|
1267 |
+
x(t2) − x(t1)
|
1268 |
+
(1 + b(t2)|x(t2)|)(1 + b(t1)|x(t1)|)
|
1269 |
+
����
|
1270 |
+
+k∥b∥∞
|
1271 |
+
����
|
1272 |
+
x(t2) − x(t1)
|
1273 |
+
(1 + b(t2)|x(t2)|)(1 + b(t1)|x(t1)|)
|
1274 |
+
����
|
1275 |
+
≤
|
1276 |
+
(1 + k)∥b∥∞|x(t2) − x(t1)|.
|
1277 |
+
This implies that
|
1278 |
+
lim
|
1279 |
+
t2→t1 |Cx(t2) − Cx(t1)| = 0
|
1280 |
+
This means that C is equicontinuous on J. Then by the Arzela-Ascoli’s theorem [8] the closure
|
1281 |
+
of C(E) is relatively compact, consequently C is compact operator.
|
1282 |
+
Step 5: u satisfies the operator inequality u ≤ Au + B(I − D)−1Cu · B′(I − D)−1Cu.
|
1283 |
+
By assumption (H6), we have
|
1284 |
+
|
1285 |
+
|
1286 |
+
|
1287 |
+
|
1288 |
+
|
1289 |
+
|
1290 |
+
|
1291 |
+
|
1292 |
+
|
1293 |
+
|
1294 |
+
|
1295 |
+
|
1296 |
+
|
1297 |
+
|
1298 |
+
|
1299 |
+
�u(t) − f1(t, u(t))
|
1300 |
+
f2(t, v(t))
|
1301 |
+
�′
|
1302 |
+
+ λ
|
1303 |
+
�u(t) − f1(t, u(t))
|
1304 |
+
f2(t, v(t))
|
1305 |
+
�
|
1306 |
+
≤ g(t, v(t))
|
1307 |
+
v(t) ≤
|
1308 |
+
1
|
1309 |
+
1 − b(t)|u(t)| − p
|
1310 |
+
�
|
1311 |
+
t,
|
1312 |
+
1
|
1313 |
+
1 − b(t)|u(t)|
|
1314 |
+
�
|
1315 |
+
+ p(t, v(t))
|
1316 |
+
�
|
1317 |
+
u(0), v(0)
|
1318 |
+
�
|
1319 |
+
≤ (u0, v0) ∈ R2
|
1320 |
+
for all t ∈ J.
|
1321 |
+
Then, by Remark 2.1 we get
|
1322 |
+
|
1323 |
+
|
1324 |
+
|
1325 |
+
|
1326 |
+
|
1327 |
+
|
1328 |
+
|
1329 |
+
u(t)
|
1330 |
+
≤
|
1331 |
+
f1(t, u(t)) + f2(t, v(t))
|
1332 |
+
�
|
1333 |
+
ce−λt + e−λt
|
1334 |
+
� t
|
1335 |
+
0
|
1336 |
+
eλsg(s, v(s))ds
|
1337 |
+
�
|
1338 |
+
v(t)
|
1339 |
+
≤
|
1340 |
+
1
|
1341 |
+
1 − b(t)|u(t)| − p
|
1342 |
+
�
|
1343 |
+
t,
|
1344 |
+
1
|
1345 |
+
1 − b(t)|u(t)|
|
1346 |
+
�
|
1347 |
+
+ p(t, v(t))
|
1348 |
+
Hence, from definitions of the operators A, B, C, D and B′ it follows that
|
1349 |
+
u(t) ≤ Au(t) + B(I − D)−1Cu(t) · B′(I − D)−1Cu(t),
|
1350 |
+
for all t ∈ J. Taking the suprumum we have
|
1351 |
+
u ≤ Au + B(I − D)−1Cu · B′(I − D)−1Cu.
|
1352 |
+
Finally By using the assumption (H5), we have
|
1353 |
+
M
|
1354 |
+
=
|
1355 |
+
∥T ′(E)∥
|
1356 |
+
=
|
1357 |
+
����ce−λt + e−λt
|
1358 |
+
� t
|
1359 |
+
0
|
1360 |
+
eλtg(s, x(s))ds
|
1361 |
+
����
|
1362 |
+
≤
|
1363 |
+
|c| + ∥h∥L1.
|
1364 |
+
17
|
1365 |
+
|
1366 |
+
From equation (5.4), we infer that MψB ◦ ψφ ◦ ψC(r) + ψA(r) < r.
|
1367 |
+
Thus, the operators A, B, C, D and B′ satisfy all the requirement of Theorem 4.1 and so the
|
1368 |
+
QFDE (1.1) has a positive solution in C(J × R) × C(J × R).
|
1369 |
+
□
|
1370 |
+
Remark 5.2 The conclusion of Theorem 5.1 also remains true if we replace the assumption
|
1371 |
+
(H7) with the following one:
|
1372 |
+
(H′
|
1373 |
+
7) The QFDE (1.1) has a upper solution in C(J, R) × C(J, R)
|
1374 |
+
The proof under this new assumption is similar to Theorem 5.1 and the conclusion again follows
|
1375 |
+
by an application of Theorem 4.1.
|
1376 |
+
References
|
1377 |
+
[1] R. P. Agarwal, D. O′Regan and D. R. Sahu, Fixed Point Theory for Lipschitzian type
|
1378 |
+
Mappings with Applications, Springer, New York (2009).
|
1379 |
+
[2] R. P. Agarwal and D. O′Regan, Infinite Interval Problems for Differential, Difference and
|
1380 |
+
Integral Equations, Kluwer Acad. Publ., New York (2001).
|
1381 |
+
[3] D. D. Bainov and S. Hristova, Differential equations with maxima, Chapman and Hall/CRC
|
1382 |
+
Pure and Applied Mathematics, (2011).
|
1383 |
+
[4] J. Banas and M. Lecko, Fixed points of the product of operators in Banach algebras,
|
1384 |
+
Panamer. Math. J., 12(2002), no. 2, 101-109.
|
1385 |
+
[5] F. E. Browder, Fixed point theory and nonlinear problems, Bull. AMS, 9(1983), no. 1, 1-39.
|
1386 |
+
[6] J. Caballero, B. Lopez and K. Sadarangani, Existence of nondecreasing and continuous
|
1387 |
+
solutions of an integral equation with linear modifcation of the argument, Acta Math. Sin.
|
1388 |
+
(Engl. Ser.), 23(2007), no. 9, 1719-1728
|
1389 |
+
[7] S. Carl and S. Heikkila, Fixed point theory in ordered sets and applications, Springer,
|
1390 |
+
(2011).
|
1391 |
+
[8] R. F. Curtain and A. J. Pritchard, Functional analysis in modern applied mathematics,
|
1392 |
+
Academic press, (1977).
|
1393 |
+
[9] B. C. Dhage, On a fixed point theorem in Banach algebras with applications, Appl. Math.
|
1394 |
+
Lett., 18(2005), no. 3, 273-280.
|
1395 |
+
[10] B. C. Dhage, On some nonlinear alternatives of Leray-Schauder type and functional integral
|
1396 |
+
equations, Arch. Math. (Brno), 42(2006), no. 1, 11-23.
|
1397 |
+
[11] B. C. Dhage, Hybrid fixed point theory in partially ordered normed linear spaces and
|
1398 |
+
applications to fractional integral equations, Diff. Equa. Appl., 5(2013), no. 2, 155-184.
|
1399 |
+
[12] B. C. Dhage, Partially condensing mappings in partially ordered normed linear spaces and
|
1400 |
+
applications to functional integral equations, Tamkang J. Math., 45(2014), no. 4, 397-426.
|
1401 |
+
[13] B. C. Dhage, Nonlinear D-set-contraction mappings in partially ordered normed linear
|
1402 |
+
spaces and applications to functional hybrid integral equations, Malaya J. Mat., 3(2015),
|
1403 |
+
no. 1, 62-85.
|
1404 |
+
[14] B.C. Dhage, Dhage Iteration Method for Nonlinear First Order Hybrid Differential
|
1405 |
+
Equations with a Linear Perturbation of Second Type, Int. J. Anal. Appl., 12(2016), no. 1,
|
1406 |
+
49-61.
|
1407 |
+
18
|
1408 |
+
|
1409 |
+
[15] B. C. Dhage, Dhage iteration method for approximating positive solutions of quadratic
|
1410 |
+
functional differential equations, Malays. J. Mat. Sci., 6(2018), no. 1, 1-13
|
1411 |
+
[16] B.C. Dhage, S.B. Dhage, Approximating solutions of nonlinear pbvps of hybrid differential
|
1412 |
+
equations via hybrid fixed point theory, Indian J. Math. 57(2015), 103-119.
|
1413 |
+
[17] B. C. Dhage, S. B. Dhage and J. R. Graef, Dhage iteration method for approximationg the
|
1414 |
+
positive solution of IVPS for nonlinear first order quadratic neutral function differential
|
1415 |
+
equations with delay and maxima, Inter. J. Appl. Math., 31(2018), no. 1, 1-21
|
1416 |
+
[18] A. Fahem,
|
1417 |
+
A. Jeribi and N. Kaddachi,
|
1418 |
+
Existence of Solutions for a System of
|
1419 |
+
Chandrasekhar’s Equations in Banach algebras under weak topology,
|
1420 |
+
Filomat, 33(2019),
|
1421 |
+
no. 18, 5949-5957.
|
1422 |
+
[19] D. Guo, Partial order methods in nonlinear analysis, Shandong Academic Press, (1997).
|
1423 |
+
[20] D. Guo and V. Lakshmikantham, Nonlinear problems in abstract cones. Academic Press,
|
1424 |
+
New York, (1988)
|
1425 |
+
[21] A. Jeribi and B. Krichen, Nonlinear functional analysis in Banach spaces and Banach
|
1426 |
+
algebras. Fixed point theory under weak topology for nonlinear operators and block operator
|
1427 |
+
matrices with applications, Monographs and Research Notes in Mathematics. CRC Press,
|
1428 |
+
(2015).
|
1429 |
+
[22] A. Jeribi, N. Kaddachi and B. Krichen, Existence results for a system of nonlinear integral
|
1430 |
+
equations in Banach algebras under weak topology, Fixed Point Theory, 18(2017), no. 1,
|
1431 |
+
247-267
|
1432 |
+
[23] N. Kaddachi, A. Jeribi and B. Krichen, Fixed point theorems of block operator matrices on
|
1433 |
+
Banach algebras and an application to functional integral equations, Math. Methods Appl.
|
1434 |
+
Sci., 36(2013), no. 6, 659-673.
|
1435 |
+
[24] J. L. Li, Existence of continuous solutions of nonlinear Hammerstein integral equations
|
1436 |
+
proved by fixed point theorems on posets. J. Nonlinear Convex Anal., 17(2016), no. 7,
|
1437 |
+
1311-1323.
|
1438 |
+
[25] D. V. Mule and B. R. Ahirrao, Approximating solution of an initial and periodic boundary
|
1439 |
+
value problems for first order quadratic functional differential equations, Int. J. Pure Appl.
|
1440 |
+
Math., 113(2017), no. 2, 251-271.
|
1441 |
+
[26] J. J. Nieto and R. R. Lopez, Contractive mapping theorems in partially ordered sets and
|
1442 |
+
applications to ordinary differential equations, Order, 22(2005), no. 3, 223-239.
|
1443 |
+
19
|
1444 |
+
|
C9E1T4oBgHgl3EQfpwXL/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DNAyT4oBgHgl3EQfSPdR/content/tmp_files/2301.00081v1.pdf.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DNAyT4oBgHgl3EQfSPdR/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
DdE0T4oBgHgl3EQfQQD8/content/tmp_files/2301.02192v1.pdf.txt
ADDED
@@ -0,0 +1,2027 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Families of bosonic suppression laws beyond the permutation symmetry principle
|
2 |
+
M. E. O. Bezerra and V. S. Shchesnovich
|
3 |
+
Centro de Ciˆencias Naturais e Humanas, Universidade Federal do ABC, Santo Andr´e, SP, 09210-170 Brazil
|
4 |
+
(Dated: January 6, 2023)
|
5 |
+
Exact cancellation of quantum amplitudes in multiphoton interferences with Fock states at input,
|
6 |
+
the so-called suppression or zero transmission laws generalizing the Hong-Ou-Mandel dip, are useful
|
7 |
+
tool in quantum information and computation. It was recently suggested that all bosonic suppression
|
8 |
+
laws follow from a common permutation symmetry in the input quantum state and the unitary
|
9 |
+
matrix of interferometer.
|
10 |
+
By using the recurrence relations for interference of Fock states, we
|
11 |
+
find a wealth of suppression laws on the beamsplitter and tritter which are not explained by the
|
12 |
+
permutation symmetry principle. Our results reveal that in interference with Fock states on unitary
|
13 |
+
multiports there are whole families of suppression laws for arbitrary total number of bosons even on
|
14 |
+
asymmetric unitary multiports, beyond the previously formulated permutation symmetry principle.
|
15 |
+
Introduction.– One of the most distinctive features of
|
16 |
+
quantum theory is the superposition principle which, un-
|
17 |
+
der appropriate conditions, leads to the existence of to-
|
18 |
+
tally destructive interference in multi-path scenario, with
|
19 |
+
the probability of some outcomes being exactly zero.
|
20 |
+
When two single photons become indistinguishable they
|
21 |
+
bunch at the output of a balanced beamsplitter [1], which
|
22 |
+
is the consequence of destructive interferences in the co-
|
23 |
+
incidence outcomes.
|
24 |
+
This is the well-known Hong-Ou-
|
25 |
+
Mandel dip, which has found numerous applications such
|
26 |
+
as characterization of photon indistinguishability [2, 3],
|
27 |
+
generation and detection of entanglement [4–6] and de-
|
28 |
+
sign of efficient quantum gates [7] for all-optical compu-
|
29 |
+
tations. The exact cancellation be understood as the con-
|
30 |
+
sequence of a symmetry in the setup: the beamsplitter is
|
31 |
+
balanced and the Fock state of indistinguishable photons
|
32 |
+
is symmetric under the transposition of the input modes.
|
33 |
+
The totally destructive multiphoton interference for more
|
34 |
+
than two photons was found in many subsequent works,
|
35 |
+
including the even-odd number suppression events and
|
36 |
+
four-photon enhancement on a beamsplitter [8, 10], the
|
37 |
+
Hong-Ou-Mandel type effect in the coincidence counting
|
38 |
+
on the symmetric Bell (a.k.a. Fourier) multiports [13],
|
39 |
+
for which the conditions for all possible zero transmis-
|
40 |
+
sion laws were formulated [14] and generalized to both
|
41 |
+
bosons and fermions [16], and a series of experiments
|
42 |
+
with various numbers of photons [17, 18, 20–23]. These
|
43 |
+
works pointed on a connection between the suppression
|
44 |
+
laws and some underlying symmetry in the setup. Such
|
45 |
+
a connection was formulated as one common symmetry
|
46 |
+
principle [24, 25], which seemed to explain all previously
|
47 |
+
known suppression laws, for bosons and fermions, and
|
48 |
+
generalize them to a wide class of and unitary multiports
|
49 |
+
and input states.
|
50 |
+
In this work we reveal the existence of whole families
|
51 |
+
of suppression laws in quantum interferences with Fock
|
52 |
+
states on unitary multiports, which are not explained by
|
53 |
+
the common permutation symmetry principle.
|
54 |
+
Recurrence relation for quantum amplitudes.– We start
|
55 |
+
by demonstrating that the quantum amplitudes from
|
56 |
+
multi-photon interference on a linear unitary multiport
|
57 |
+
can be calculated by using the generating functions
|
58 |
+
method. Let ˆa†
|
59 |
+
k be the creation operator of optical mode
|
60 |
+
in input port k of a unitary multiport of size M and
|
61 |
+
consider the M-mode unnormalized coherent state in
|
62 |
+
y = (y1, . . . , yM)
|
63 |
+
|y⟩a = exp
|
64 |
+
� M
|
65 |
+
�
|
66 |
+
k=1
|
67 |
+
ykˆa†
|
68 |
+
k
|
69 |
+
�
|
70 |
+
|0⟩ =
|
71 |
+
�
|
72 |
+
m
|
73 |
+
M
|
74 |
+
�
|
75 |
+
k=1
|
76 |
+
ymk
|
77 |
+
k
|
78 |
+
√mk!|m⟩a (1)
|
79 |
+
where |m⟩a is a Fock state in M input modes m =
|
80 |
+
(m1, . . . , mM).
|
81 |
+
Introduce also analogous state |x⟩b,
|
82 |
+
where x = (x1, . . . , xM), for the output modes ˆb†
|
83 |
+
k, k =
|
84 |
+
1, . . . , M, related to the input modes by an unitary mul-
|
85 |
+
tiport U as follows
|
86 |
+
a†
|
87 |
+
k =
|
88 |
+
M
|
89 |
+
�
|
90 |
+
l=1
|
91 |
+
Uklb†
|
92 |
+
l .
|
93 |
+
(2)
|
94 |
+
The N-photon quantum amplitude b⟨n|m⟩a between the
|
95 |
+
input and output Fock states can be found from the gen-
|
96 |
+
erating function G(x, y) ≡ b⟨x|y⟩a:
|
97 |
+
b⟨n|m⟩a =
|
98 |
+
M
|
99 |
+
�
|
100 |
+
k=1
|
101 |
+
1
|
102 |
+
√mk!nk!
|
103 |
+
∂mk
|
104 |
+
∂ymk
|
105 |
+
k
|
106 |
+
∂nk
|
107 |
+
∂xnk
|
108 |
+
k
|
109 |
+
G(x, y)
|
110 |
+
�����
|
111 |
+
x=y=0
|
112 |
+
. (3)
|
113 |
+
Using the Baker-Campbell-Hausdorff formula for the
|
114 |
+
product of two exponents as in Eq.(1) we obtain
|
115 |
+
G(x, y) = exp
|
116 |
+
�
|
117 |
+
�
|
118 |
+
M
|
119 |
+
�
|
120 |
+
k,l=1
|
121 |
+
ykUklxl
|
122 |
+
�
|
123 |
+
� .
|
124 |
+
(4)
|
125 |
+
The expression in Eq.
|
126 |
+
(3) admits many recurrence
|
127 |
+
relations between the quantum amplitudes for different
|
128 |
+
total number of photons N. For instance, by fixing the
|
129 |
+
input state (computing the derivatives over y in Eq.(3))
|
130 |
+
and taking one derivative over xl we get
|
131 |
+
b⟨n|m⟩a =
|
132 |
+
M
|
133 |
+
�
|
134 |
+
k=1
|
135 |
+
�mk
|
136 |
+
nl
|
137 |
+
Ukl b⟨n − 1l|m − 1k⟩a
|
138 |
+
(5)
|
139 |
+
arXiv:2301.02192v1 [quant-ph] 3 Jan 2023
|
140 |
+
|
141 |
+
2
|
142 |
+
FIG. 1: Representation of the two interferometers that are
|
143 |
+
considered to exemplify our method: a) Beamsplitter, that
|
144 |
+
transforms two input modes into two output modes; b) Trit-
|
145 |
+
ter, that is a composition of three different beamsplitters B1,
|
146 |
+
B2, B3 and a control phase shifter θ. Here, each mk denotes
|
147 |
+
the number of photons in the input mode k and nl denotes
|
148 |
+
the number of photons in the output mode l.
|
149 |
+
where 1k ≡ (0, . . . , 0, 1, 0, . . . , 0), etc.
|
150 |
+
Eq.
|
151 |
+
(5) is also
|
152 |
+
a consequence of the fact that the quantum amplitude
|
153 |
+
is given by the symmetrization of a product of the cor-
|
154 |
+
responding N matrix elements of U, called the matrix
|
155 |
+
permanent, and its properties [26].
|
156 |
+
Let us now focus on a single output port l = 1, setting
|
157 |
+
n = (n1, nS), where nS = (n2, ..., nM).
|
158 |
+
Reusing the
|
159 |
+
recurrence relation of Eq. (5) repeatedly nl times for the
|
160 |
+
output modes l = 2, . . . , M we get the amplitude b⟨n|m⟩a
|
161 |
+
as a linear combination of the amplitudes b⟨n1, 0S|m′⟩a,
|
162 |
+
where m′ is the input configuration with fewer photons
|
163 |
+
that appears in each term of the expansion due to the
|
164 |
+
use of the recurrence relation. The latter can be easily
|
165 |
+
calculated directly. In the end we get the amplitude in
|
166 |
+
the form (see details in [28])
|
167 |
+
b⟨n|m⟩a =
|
168 |
+
�
|
169 |
+
n1!
|
170 |
+
nS!m!
|
171 |
+
� M
|
172 |
+
�
|
173 |
+
k=1
|
174 |
+
U mk−|nS|
|
175 |
+
k1
|
176 |
+
�
|
177 |
+
f n
|
178 |
+
m(U),
|
179 |
+
(6)
|
180 |
+
where f n
|
181 |
+
m(U) is some polynomial in the matrix elements
|
182 |
+
of U, which we call suppression function. This polyno-
|
183 |
+
mial allows to find zero transmission laws, which are their
|
184 |
+
roots.
|
185 |
+
Below we restrict ourselves to small numbers of pho-
|
186 |
+
tons in M −1 output ports (i.e., the power of the polyno-
|
187 |
+
mial f n
|
188 |
+
m(U) in Eq. (6)), setting |nS| = 1, 2 and illustrate
|
189 |
+
our method on beamsplitter and tritter, given in Fig. 1.
|
190 |
+
We will say that there is a “family of suppression
|
191 |
+
laws” on the M-dimensional interferometer if for the in-
|
192 |
+
put m and output n configurations of a given form, e.g.,
|
193 |
+
m = (m, m) and n = (n1, 1) for a beamsplitter, and an
|
194 |
+
arbitrary compatible total number of bosons there is a
|
195 |
+
suppression law for the interferometer matrix with the
|
196 |
+
elements given by the input and output configurations.
|
197 |
+
Families of suppression laws for beamsplitter.– Let us
|
198 |
+
first test the method using a beamsplitter, illustrated in
|
199 |
+
Fig.1(a), with matrix
|
200 |
+
B =
|
201 |
+
�
|
202 |
+
�
|
203 |
+
�
|
204 |
+
�
|
205 |
+
√τ
|
206 |
+
−√ρe−iϕ
|
207 |
+
√ρeiϕ
|
208 |
+
√τ
|
209 |
+
�
|
210 |
+
�
|
211 |
+
�
|
212 |
+
�
|
213 |
+
(7)
|
214 |
+
where τ = 1−ρ. In this case nS = n2. When considering
|
215 |
+
beamsplitter we can neglect the arbitrary phase ϕ as it
|
216 |
+
can be scaled out (however, when considering the tritter
|
217 |
+
decomposition, as in Fig. 1(b), this phase is an important
|
218 |
+
parameter).
|
219 |
+
First, for n2 = 1 the recurrence in Eq. (6) has the
|
220 |
+
following function
|
221 |
+
f (n1,1)
|
222 |
+
(m1,m2)(B) = (m1 + m2)τ − m1
|
223 |
+
(8)
|
224 |
+
which predicts that the following quantum amplitude
|
225 |
+
b⟨n1, 1|m1, m2⟩a = 0 for an arbitrary n1 ≥ 1 and the
|
226 |
+
transmission
|
227 |
+
τ (1) =
|
228 |
+
m1
|
229 |
+
m1 + m2
|
230 |
+
.
|
231 |
+
(9)
|
232 |
+
This suppression law coincides with the previous result
|
233 |
+
[27], obtained by another method. This family reduces
|
234 |
+
to the HOM effect [1] for the symmetric beamsplitter for
|
235 |
+
m1 = m2 = 1.
|
236 |
+
For n2 = 2 we get the suppression function
|
237 |
+
f (n1,2)
|
238 |
+
(m1,m2)(B) = (m1 + m2 − 1)(m1 + m2)
|
239 |
+
�
|
240 |
+
τ 2
|
241 |
+
−
|
242 |
+
2m1
|
243 |
+
m1 + m2
|
244 |
+
τ +
|
245 |
+
m1(m1 − 1)
|
246 |
+
(m1 + m2)(m1 + m2 − 1)
|
247 |
+
�
|
248 |
+
, (10)
|
249 |
+
which predicts another (previously unknown) suppres-
|
250 |
+
sion law ⟨n1, 2|m1, m2⟩ = 0 for the transmission
|
251 |
+
τ (2) =
|
252 |
+
m1
|
253 |
+
m1 + m2
|
254 |
+
�
|
255 |
+
�1 ±
|
256 |
+
�
|
257 |
+
m2/m1
|
258 |
+
m1 + m2 − 1
|
259 |
+
�
|
260 |
+
� .
|
261 |
+
(11)
|
262 |
+
This family of suppression laws contains also to the sym-
|
263 |
+
metric beamsplitter τ (2) = 1/2 for specific inputs, e.g.,
|
264 |
+
for four input photons b⟨2, 2|1, 3⟩a = 0 [8, 10]. Only such
|
265 |
+
cases can be explained by the permutation symmetry ap-
|
266 |
+
proach [14, 16, 24, 25] (in the above case transposition
|
267 |
+
symmetry of the output ports with n1 = n2 = 2).
|
268 |
+
The above approach allows one to derive all possible
|
269 |
+
the suppression laws for the beamsplitter. The compu-
|
270 |
+
tations, however, become quite involved as the minimum
|
271 |
+
number of bosons in the input and output ports scales up
|
272 |
+
(see [28] for more details). Nevertheless, general conclu-
|
273 |
+
sions are allowed by the fact that quantum amplitudes
|
274 |
+
b⟨n1, n2|m1, m2⟩a on a beamsplitter can be made real-
|
275 |
+
valued functions of its transmission τ by removing the
|
276 |
+
overall phase. Numerical simulations with various dis-
|
277 |
+
tributions of bosons (i.e., Fock states) reveal that the
|
278 |
+
number of zeros in such a quantum amplitude is given
|
279 |
+
|
280 |
+
a)
|
281 |
+
b)
|
282 |
+
m1
|
283 |
+
n2
|
284 |
+
B1
|
285 |
+
B3
|
286 |
+
0
|
287 |
+
m1
|
288 |
+
n3
|
289 |
+
B
|
290 |
+
B2
|
291 |
+
m2
|
292 |
+
n1
|
293 |
+
m3
|
294 |
+
0
|
295 |
+
0.1
|
296 |
+
0.2
|
297 |
+
0.3
|
298 |
+
0.4
|
299 |
+
0.5
|
300 |
+
0.6
|
301 |
+
0.7
|
302 |
+
0.8
|
303 |
+
0.9
|
304 |
+
1
|
305 |
+
-1
|
306 |
+
-0.5
|
307 |
+
0
|
308 |
+
0.5
|
309 |
+
n1,n2|m1m2
|
310 |
+
FIG. 2:
|
311 |
+
Typical behavior of the quantum amplitudes on a
|
312 |
+
beamsplitter and the interlaced zeros (the suppression laws).
|
313 |
+
Here we plot b⟨n1, n2|9, 4⟩a as functions of the beamsplitter
|
314 |
+
transmission τ for n1 = 3 (solid line), n1 = 4 (dash-dotted
|
315 |
+
line), and n1 = 5 (dashed line).
|
316 |
+
by the minimum number of bosons min(nl, mk) in the
|
317 |
+
four ports. Moreover, two quantum amplitudes related
|
318 |
+
by the exchange of a single boson have interlaced zeros:
|
319 |
+
between two zeros of one of them there is one zero of the
|
320 |
+
other, see also Fig. 2 (at the end points, τ = 0 and τ = 1,
|
321 |
+
a real-valued quantum amplitude is either equal to zero
|
322 |
+
or to ±1, which allows for the above bound on the total
|
323 |
+
number of zeros).
|
324 |
+
Families of suppression laws for tritter.– We now con-
|
325 |
+
sider the suppression laws on the tritter obtained by
|
326 |
+
an arrangement of three beamsplitters according to the
|
327 |
+
setup in Fig. 1(b) [9, 11]. Here each beamsplitter has
|
328 |
+
matrix Bj similar to that of Eq. (7) and has the trans-
|
329 |
+
mitivity τj and the phase ϕj. Moreover, an additional
|
330 |
+
phase plate θ is inserted in one of the optical paths. Our
|
331 |
+
tritter has in total seven free parameters, which is hard
|
332 |
+
to analyze in general. We will therefore focus on two spe-
|
333 |
+
cific families each having only two free parameters. For
|
334 |
+
the first family we set: τ2 = 2/3, τ3 = 1/2, ϕj = π/2,
|
335 |
+
leaving us with the free parameters τ1 and θ. It has the
|
336 |
+
following matrix
|
337 |
+
T (1) =
|
338 |
+
=
|
339 |
+
1
|
340 |
+
√
|
341 |
+
6
|
342 |
+
�
|
343 |
+
�
|
344 |
+
�
|
345 |
+
�
|
346 |
+
�
|
347 |
+
�
|
348 |
+
�
|
349 |
+
�
|
350 |
+
2√τ1, −√τ1eiθ − i√3ρ1, −√τ1eiθ + i√3ρ1
|
351 |
+
2√ρ1, −√ρ1eiθ + i√3τ1, −√ρ1eiθ − i√3τ1
|
352 |
+
√
|
353 |
+
2,
|
354 |
+
√
|
355 |
+
2eiθ,
|
356 |
+
√
|
357 |
+
2eiθ
|
358 |
+
�
|
359 |
+
�
|
360 |
+
�
|
361 |
+
�
|
362 |
+
�
|
363 |
+
�
|
364 |
+
�
|
365 |
+
�
|
366 |
+
.
|
367 |
+
(12)
|
368 |
+
For the second family we set: τ1 = τ3 = 1/2 and ϕj =
|
369 |
+
π/2 leaving us with the free parameters τ2 and θ. It has
|
370 |
+
the following matrix
|
371 |
+
T (2) = 1
|
372 |
+
2
|
373 |
+
�
|
374 |
+
�
|
375 |
+
�
|
376 |
+
�
|
377 |
+
�
|
378 |
+
�
|
379 |
+
�
|
380 |
+
�
|
381 |
+
√2τ2, −i − √ρ2eiθ,
|
382 |
+
i − √ρ2eiθ
|
383 |
+
√2τ2,
|
384 |
+
i − √ρ2eiθ,
|
385 |
+
−i − √ρ2eiθ
|
386 |
+
2√ρ2,
|
387 |
+
√2τ2eiθ,
|
388 |
+
√2τ2eiθ
|
389 |
+
�
|
390 |
+
�
|
391 |
+
�
|
392 |
+
�
|
393 |
+
�
|
394 |
+
�
|
395 |
+
�
|
396 |
+
�
|
397 |
+
.
|
398 |
+
(13)
|
399 |
+
The above tritter families reduce to the well-known sym-
|
400 |
+
metric tritter (i.e., Bell multiport) when θ = 0 and, in
|
401 |
+
the first case, τ1 = 1/2 or, in the second case, τ2 = 2/3.
|
402 |
+
For tritter, in contrast to beamsplitter, two input
|
403 |
+
mode occupations can vary for a given total number
|
404 |
+
of bosons.
|
405 |
+
We will focus below on the following two
|
406 |
+
particular families of input states m(I) = (n1, 1, 1) and
|
407 |
+
m(II) = (m, m, m), where n1 ≥ 1 and m ≥ 1 and oth-
|
408 |
+
erwise arbitrary.
|
409 |
+
This choice of specific inputs is dic-
|
410 |
+
tated by the need to compare with the suppression laws
|
411 |
+
due to permutation symmetry.
|
412 |
+
For |nS| = 1 we have
|
413 |
+
found suppression laws for the outputs n = (n1, 1, 0) and
|
414 |
+
n = (n1, 0, 1), considering only the inputs m(II). In ad-
|
415 |
+
dition, for |nS| = 2 we have found suppression laws for
|
416 |
+
the outputs n = (n1, 1, 1) and n = (n1, 2, 0), consider-
|
417 |
+
ing both of the previous inputs m(I) and m(II).
|
418 |
+
The
|
419 |
+
expressions for the corresponding suppression function
|
420 |
+
f n
|
421 |
+
m(T) are too complicated to be presented here (see de-
|
422 |
+
tails in [28]). Instead we give the results in Fig. 3 with
|
423 |
+
the explicit expressions for the tritter parameters given
|
424 |
+
in Table I. Note that Table I contains only some of all
|
425 |
+
possible suppression laws for the chosen inputs/outputs,
|
426 |
+
e.g., m = (m, 0, 1) or m = (m, 1, 0) also correspond to
|
427 |
+
other two families of suppression laws.
|
428 |
+
Suppression laws from the permutation symmetry.–
|
429 |
+
Only a fraction of the suppression laws discussed above
|
430 |
+
(given by the red circles on the dashed line in Fig. 3),
|
431 |
+
corresponding to the input m = (m, m, m) and out-
|
432 |
+
put n = (n1, 2, 0) (with n1 = 3m − 2), is explained by
|
433 |
+
the “general permutation symmetry principle” of Refs.
|
434 |
+
[24, 25] (see for more details Ref. [28]). These appear for
|
435 |
+
the symmetric tritter, with the three-dimensional Fourier
|
436 |
+
matrix
|
437 |
+
Ts =
|
438 |
+
1
|
439 |
+
√
|
440 |
+
3
|
441 |
+
�
|
442 |
+
�
|
443 |
+
�
|
444 |
+
�
|
445 |
+
�
|
446 |
+
�
|
447 |
+
�
|
448 |
+
�
|
449 |
+
1 − 1+i
|
450 |
+
√
|
451 |
+
3
|
452 |
+
2
|
453 |
+
−1+i
|
454 |
+
√
|
455 |
+
3
|
456 |
+
2
|
457 |
+
1
|
458 |
+
−1+i
|
459 |
+
√
|
460 |
+
3
|
461 |
+
2
|
462 |
+
− 1+i
|
463 |
+
√
|
464 |
+
3
|
465 |
+
2
|
466 |
+
1
|
467 |
+
1
|
468 |
+
1
|
469 |
+
�
|
470 |
+
�
|
471 |
+
�
|
472 |
+
�
|
473 |
+
�
|
474 |
+
�
|
475 |
+
�
|
476 |
+
�
|
477 |
+
,
|
478 |
+
(14)
|
479 |
+
which results by setting either τ1 = 1/2 in Eq. (12) or
|
480 |
+
τ2 = 2/3 in Eq. (13) and θ = 0, see also Fig. 1(b). Such
|
481 |
+
suppression laws also correspond to some symmetry of
|
482 |
+
the suppression function f n
|
483 |
+
m(U) in Eq. (6): the roots do
|
484 |
+
not depend on n1 and m. Interestingly, we have found
|
485 |
+
a new symmetric tritter �Ts with the suppression laws
|
486 |
+
obeying the same property. This new tritter corresponds
|
487 |
+
|
488 |
+
4
|
489 |
+
TABLE I: Suppression laws for tritter
|
490 |
+
θ = 0, π
|
491 |
+
θ = ± π
|
492 |
+
2
|
493 |
+
θ = 0, π
|
494 |
+
θ = ± π
|
495 |
+
2
|
496 |
+
b⟨n|m⟩a
|
497 |
+
τ1
|
498 |
+
τ1
|
499 |
+
τ2
|
500 |
+
τ2
|
501 |
+
b⟨n1, 1, 0|m, m, m⟩a
|
502 |
+
1
|
503 |
+
2
|
504 |
+
1
|
505 |
+
2
|
506 |
+
2
|
507 |
+
3
|
508 |
+
2
|
509 |
+
3
|
510 |
+
b⟨n1, 1, 1|n1, 1, 1⟩a
|
511 |
+
3n1(n1−1)
|
512 |
+
2(n1+1)(n1+2)
|
513 |
+
3n1
|
514 |
+
4(n1+1) , n1 ̸= 1 a
|
515 |
+
2n1(n1−1)
|
516 |
+
(n1+1)(n1+2)
|
517 |
+
4n1
|
518 |
+
(n1+1)(n1+2)
|
519 |
+
b⟨n1, 2, 0|n1, 1, 1⟩a
|
520 |
+
1
|
521 |
+
2 , n1 = 1, 2
|
522 |
+
(too long, see [28])
|
523 |
+
2
|
524 |
+
3 , n1 = 1, 2
|
525 |
+
(too long, see [28])
|
526 |
+
b⟨n1, 1, 1|m, m, m⟩a
|
527 |
+
1
|
528 |
+
2
|
529 |
+
�
|
530 |
+
1 ±
|
531 |
+
1
|
532 |
+
√m
|
533 |
+
�
|
534 |
+
1
|
535 |
+
2
|
536 |
+
2m−1
|
537 |
+
3m−1 ±
|
538 |
+
�
|
539 |
+
12(4m−1)
|
540 |
+
6(3m−1)
|
541 |
+
2
|
542 |
+
3,
|
543 |
+
2m
|
544 |
+
3m−1
|
545 |
+
b⟨n1, 2, 0|m, m, m⟩a
|
546 |
+
1
|
547 |
+
2
|
548 |
+
(too long, see [28])
|
549 |
+
2
|
550 |
+
3 ,
|
551 |
+
2m
|
552 |
+
3m−1
|
553 |
+
2m−1
|
554 |
+
3m−1 ±
|
555 |
+
�
|
556 |
+
12(4m−1)
|
557 |
+
6(3m−1)
|
558 |
+
aFor n1 = 1 and θ = ±π/2 there is a suppression law for the
|
559 |
+
tritter T (1) with an arbitrary τ1.
|
560 |
+
FIG. 3: Non-trivial suppression laws for outputs n = (n1, 1, 1)
|
561 |
+
and n = (n1, 2, 0).
|
562 |
+
Here the suppression laws for τj = 0
|
563 |
+
or τj = 1 are called trivial and then, are removed from the
|
564 |
+
graph. For the tritter T (1) we have the suppression laws for
|
565 |
+
inputs: a) m(I) = (n1, 1, 1) and b) m(II) = (m, m, m). For
|
566 |
+
the tritter T (2) we have the suppression laws for inputs: c)
|
567 |
+
m(I) = (n1, 1, 1) and d) m(II) = (m, m, m). The dashed line
|
568 |
+
corresponds to the symmetric tritter τ1 = 1/2 and τ2 = 2/3
|
569 |
+
for θ = 0.
|
570 |
+
to an orthogonal matrix, which has the form of Ts in Eq.
|
571 |
+
(14), as follows
|
572 |
+
�Ts =
|
573 |
+
1
|
574 |
+
√
|
575 |
+
3
|
576 |
+
�
|
577 |
+
�
|
578 |
+
�
|
579 |
+
�
|
580 |
+
�
|
581 |
+
�
|
582 |
+
�
|
583 |
+
�
|
584 |
+
1 − 1+
|
585 |
+
√
|
586 |
+
3
|
587 |
+
2
|
588 |
+
−1+
|
589 |
+
√
|
590 |
+
3
|
591 |
+
2
|
592 |
+
1
|
593 |
+
−1+
|
594 |
+
√
|
595 |
+
3
|
596 |
+
2
|
597 |
+
− 1+
|
598 |
+
√
|
599 |
+
3
|
600 |
+
2
|
601 |
+
1
|
602 |
+
1
|
603 |
+
1
|
604 |
+
�
|
605 |
+
�
|
606 |
+
�
|
607 |
+
�
|
608 |
+
�
|
609 |
+
�
|
610 |
+
�
|
611 |
+
�
|
612 |
+
.
|
613 |
+
(15)
|
614 |
+
The tritter �Ts is obtained by setting either τ1 = 1/2 in
|
615 |
+
Eq. (12) or τ2 = 2/3 in Eq. (13) and θ = π/2 (factoring
|
616 |
+
out the unimportant total phases in the output modes,
|
617 |
+
i.e., a diagonal unitary from the right with (1, i, i) on
|
618 |
+
the main diagonal). The tritter of Eq. (15) shares one
|
619 |
+
of the symmetries with that of Eq. (14): it is invariant
|
620 |
+
under the simultaneous permutation of rows 1 and 2 and
|
621 |
+
columns 2 and 3 (a different type of symmetry used in
|
622 |
+
the formulation of the “general permutation symmetry
|
623 |
+
principle” of Refs. [24, 25]). The suppression laws on the
|
624 |
+
symmetric tritter of Eq. (15) corresponding to the input
|
625 |
+
m(II) = (m, m, m) and output n = (n1, 1, 1) are due to
|
626 |
+
the roots of the suppression function f n
|
627 |
+
m(U) in Eq. (6)
|
628 |
+
that do not dependent on n1 and m (given by the blue
|
629 |
+
points on the dashed line in Fig. 3).
|
630 |
+
The symmetric tritter in Eq.
|
631 |
+
(15) can also be real-
|
632 |
+
ized by successive application of the transposition oper-
|
633 |
+
ation of the first and the third inputs (P13), followed by
|
634 |
+
a balanced beamsplitter on the second and third inputs
|
635 |
+
(B(τs)), and by the inverse of the symmetric tritter Ts,
|
636 |
+
i.e., we have
|
637 |
+
�Ts = P13 (1 � B(τs)) T †
|
638 |
+
s , where the beam-
|
639 |
+
splitter is given by Eq. (7) with τs = (
|
640 |
+
√
|
641 |
+
3 + i)/4. The
|
642 |
+
suppression laws for �Ts cannot be explained by the “gen-
|
643 |
+
eral permutation symmetry principle” of Refs. [24, 25]
|
644 |
+
which is applicable only to the standard symmetric trit-
|
645 |
+
ter Ts (see details in Ref. [28]).
|
646 |
+
In addition to the results discussed above, we also
|
647 |
+
have found the suppression functions for the amplitudes
|
648 |
+
|
649 |
+
1.0
|
650 |
+
0.9
|
651 |
+
0.8
|
652 |
+
0.7
|
653 |
+
0.6
|
654 |
+
F0.5
|
655 |
+
000000000
|
656 |
+
0.4
|
657 |
+
0.3
|
658 |
+
0.2
|
659 |
+
a)
|
660 |
+
b)
|
661 |
+
0.1
|
662 |
+
0.0
|
663 |
+
9 10
|
664 |
+
8
|
665 |
+
910
|
666 |
+
8
|
667 |
+
1
|
668 |
+
2
|
669 |
+
m
|
670 |
+
n1
|
671 |
+
1.0
|
672 |
+
0.9
|
673 |
+
0.8
|
674 |
+
0.7
|
675 |
+
0.6
|
676 |
+
0.5
|
677 |
+
0.4
|
678 |
+
0.3
|
679 |
+
0.2
|
680 |
+
c)
|
681 |
+
d)
|
682 |
+
0.1
|
683 |
+
0.0
|
684 |
+
910
|
685 |
+
9 10
|
686 |
+
3
|
687 |
+
4.
|
688 |
+
5
|
689 |
+
6
|
690 |
+
8
|
691 |
+
1
|
692 |
+
5
|
693 |
+
6
|
694 |
+
n1
|
695 |
+
m
|
696 |
+
n=(nl,l,l),θ=0,π
|
697 |
+
n=(nl,2,0),θ= ±π/2
|
698 |
+
n=(n1,1,1),θ= ±π/2
|
699 |
+
n=(n1,2,0),θ= +π/2
|
700 |
+
n=(n1,2,0),θ=0,π
|
701 |
+
n =(n1,2, 0),θ= π/25
|
702 |
+
b⟨n1, 1, 0|m, m, m⟩a and b⟨n1, 0, 1|m, m, m⟩a. These am-
|
703 |
+
plitudes are zero only for the case of symmetric tritters
|
704 |
+
τ1 = 1/2 or τ1 = 2/3, as shown in the first row of Table I.
|
705 |
+
Considering the permutation symmetry of Refs. [24, 25],
|
706 |
+
this result is already known only for the tritter Ts.
|
707 |
+
Conclusion.– We have found several families of sup-
|
708 |
+
pression laws on beamsplitter and on tritter for arbitrary
|
709 |
+
total number of photons, which are not explained by
|
710 |
+
the permutation symmetry principle advanced in Refs.
|
711 |
+
[14, 16, 24, 25]. We have given only a fraction of new
|
712 |
+
suppression laws on tritter for specific input/output con-
|
713 |
+
figurations, numerical simulations reveal the existence of
|
714 |
+
further families of the suppression laws not related to
|
715 |
+
the permutation symmetry principle.
|
716 |
+
Similar suppres-
|
717 |
+
sion laws, not explained by the permutation symmetry
|
718 |
+
principle, are expected to appear for multiports of any
|
719 |
+
size, since by using our generation function approach
|
720 |
+
one can, in principle, obtain all the suppression laws
|
721 |
+
for a multiport of any size (though this is impractical
|
722 |
+
by the complexity of the calculations which involve find-
|
723 |
+
ing roots of higher-order polynomials). One can, on the
|
724 |
+
other hand, explore the suppression laws experimentally,
|
725 |
+
since recently there has been breakthrough in controlled
|
726 |
+
production of Fock states with specified number of pho-
|
727 |
+
tons. The recent methods that are able to generate these
|
728 |
+
states include using heralded Fock states from a SPDC
|
729 |
+
process [33], the interaction of a coherent state with two-
|
730 |
+
level atoms [34], and by converting a coherent state into
|
731 |
+
a Fock state inside a resonator by radiation losses [35].
|
732 |
+
Our results also beg the important general question: Can
|
733 |
+
the discovered families of suppression laws follow from a
|
734 |
+
more general common symmetry principle? This could
|
735 |
+
be the direction for future work.
|
736 |
+
Acknowledgements.–
|
737 |
+
M.E.O.B.
|
738 |
+
was
|
739 |
+
supported
|
740 |
+
by
|
741 |
+
the S˜ao Paulo Research Foundation (FAPESP), grant
|
742 |
+
2021/03251-0 and V.S. was supported by the National
|
743 |
+
Council for Scientific and Technological Development
|
744 |
+
(CNPq) of Brazil, grant 307813/2019-3.
|
745 |
+
[1] C. K. Hong, Z. Y. Ou, and L. Mandel, Measurement
|
746 |
+
of subpicosecond time intervals between two photons by
|
747 |
+
interference, Phys. Rev. Lett. 59, 2044 (1987).
|
748 |
+
[2] Z. Y. Ou, Temporal distinguishability of an N-photon
|
749 |
+
state and its characterization by quantum interference,
|
750 |
+
Phys. Rev. A 74, 063808 (2006).
|
751 |
+
[3] F. W. Sun and C. W. Wong, Indistinguishability of inde-
|
752 |
+
pendent single photons , Phys. Rev. A 79, 013824 (2009).
|
753 |
+
[4] M. Zukowski, A. Zeilinger, M. A. Horne, Realizable
|
754 |
+
higher-dimensional two-particle entanglement via multi-
|
755 |
+
port beam splitters, Phys. Rev. A 55, 2564 (1997)
|
756 |
+
[5] X. B. Zou, K. Pahlke, and W. Mathis, Generation of
|
757 |
+
entangled photon states by using linear optical elements,
|
758 |
+
Phys. Rev. A 66, 014102 (2002).
|
759 |
+
[6] Y. Liang Lim and A. Beige, Multiphoton entanglement
|
760 |
+
through a Bell-multiport beam splitter, Phys. Rev. A 71,
|
761 |
+
06231 (2005).
|
762 |
+
[7] S. Scheel, K. Nemoto, W. J. Munro, and P. L. Knight,
|
763 |
+
Measurement-induced nonlinearity in linear optics, Phys.
|
764 |
+
Rev. A 68, 032310 (2003).
|
765 |
+
[8] R. A. Campos, B. E. A. Saleh, M. C. Teich, Quantum-
|
766 |
+
mechanical lossless beam splitter: SU(2) symmetry and
|
767 |
+
photon statistics, Phys. Rev. A 40, 1371 (1989).
|
768 |
+
[9] M. Reck, A. Zeilinger, H. J. Bernstein, and P. Bertani,
|
769 |
+
Experimental realization of any discrete unitary opera-
|
770 |
+
tor, Phys. Rev. Lett. 73, 58 (1994).
|
771 |
+
[10] Z. Y. Ou, J.-K. Rhee, and L. J. Wang, Observation of
|
772 |
+
Four-Photon Interference with a Beam Splitter by Pulsed
|
773 |
+
Parametric Down-Conversion, Phys. Rev. Lett. 83, 959
|
774 |
+
(1999).
|
775 |
+
[11] R. A. Campos, Three-photon Hong-Ou-Mandel interfer-
|
776 |
+
ence at a multiport mixer, Phys. Rev. A 62, 013809
|
777 |
+
(2000)
|
778 |
+
[12] X.-L. Niu, Y.-X. Gong, B.-H. Liu, Y.-F. Huang, G.-C.
|
779 |
+
Guo, Observation of a generalized bunching effect of six
|
780 |
+
photons, Opt. Lett. 34, 1297 (2009).
|
781 |
+
[13] Y. Liang Lim and A. Beige, Generalized Hong-Ou-
|
782 |
+
Mandel experiments with bosons and fermions, New J.
|
783 |
+
of Physics 7, 155 (2005).
|
784 |
+
[14] M. C. Tichy, M. Tiersch, F. Melo, F. Mintert, A. Buch-
|
785 |
+
leitner, Zero-Transmission law for multiport beam split-
|
786 |
+
ters, Phys. Rev. Lett. 104, 220405 (2010).
|
787 |
+
[15] A. Crespi, Suppression laws for multiparticle interference
|
788 |
+
in Sylvester interferometers, Phys. Rev. A 91, 013811
|
789 |
+
(2015)
|
790 |
+
[16] M. C. Tichy, M. Tiersch, F. Mintert, and A. Buchleit-
|
791 |
+
ner, Many-particle interference beyond many-boson and
|
792 |
+
many-fermion statistics, New J. of Physics 14, 093015
|
793 |
+
(2012).
|
794 |
+
[17] Z.-E. Su, Y. Li, P. P. Rohde, H.-L. Huang, X.-L. Wang,
|
795 |
+
L. Li, N.-L. Liu, J. P. Dowling, C.-Y. Lu, and J.-W. Pan,
|
796 |
+
Multiphoton Interference in Quantum Fourier Transform
|
797 |
+
Circuits and Applications to Quantum Metrology, Phys.
|
798 |
+
Rev. Lett. 119, 080502 (2017).
|
799 |
+
[18] A. Crespi, R. Osellame, R. Ramponi, M. Bentivegna, F.
|
800 |
+
Flamini, N. Spagnolo, N. Viggianiello, L. Innocenti, P.
|
801 |
+
Mataloni, and F. Sciarrino, Suppression law of quantum
|
802 |
+
states in a 3D photonic fast Fourier transform chip, Nat.
|
803 |
+
Commun. 7, 10469 (2016).
|
804 |
+
[19] N. Spagnolo, C. Vitelli, L. Aparo, P. Mataloni, F. Scia-
|
805 |
+
rrino, A. Crespi, R. Ramponi, and R. Osellame, Three-
|
806 |
+
photon bosonic coalescence in an integrated tritter, Nat.
|
807 |
+
Commun. 4, 1606 (2013).
|
808 |
+
[20] M. Tillmann, S.-H. Tan, S. E. Stoeckl, B. C. Sanders,
|
809 |
+
H. de Guise, R. Heilmann, S. Nolte, A. Szameit, and
|
810 |
+
P. Walther, Generalized Multiphoton Quantum Interfer-
|
811 |
+
ence, Phys. Rev. X 5, 041015 (2015).
|
812 |
+
[21] J. Carolan, C. Harrold, C. Sparrow, E. Mart´ın-L´opez, N.
|
813 |
+
J. Russell, J. W. Silverstone, P. J. Shadbolt, N. Matsuda,
|
814 |
+
M. Oguma, M. Itoh, G. D. Marshall, M. G. Thompson,
|
815 |
+
J. C. F. Matthews, T. Hashimoto, J.L. O’Brien, and A.
|
816 |
+
Laing, Universal Linear Optics, Science 349, 711 (2015).
|
817 |
+
[22] A. J. Menssen, A. E. Jones, B. J. Metcalf, M. C. Tichy,
|
818 |
+
S. Barz, W. S. Kolthammer, and I. A. Walmsley, Distin-
|
819 |
+
guishability and many-particle interference, Phys. Rev.
|
820 |
+
Lett. 118, 153603 (2017).
|
821 |
+
[23] S. Agne, J. Jin, J. Z. Salvail, K. J. Resch, T. Kauten, E.
|
822 |
+
Meyer-Scott, D. R. Hamel, G. Weihs, and T. Jennewein,
|
823 |
+
Observation of genuine three-photon interference, Phys.
|
824 |
+
Rev. Lett. 118, 153602 (2017).
|
825 |
+
|
826 |
+
6
|
827 |
+
[24] C. Dittel, G. Dufour, M. Walschaers, Totally destructive
|
828 |
+
many-particle interference, Phys. Rev. Lett. 120, 240404
|
829 |
+
(2018).
|
830 |
+
[25] C. Dittel, G. Dufour, M. Walschaers, G. Weihs, A.
|
831 |
+
Buchleitner, R. Keil, Totally destructive interference for
|
832 |
+
permutation-symmetric many-particle states, Phys. Rev.
|
833 |
+
A 97, 062116 (2018).
|
834 |
+
[26] H. Minc, Permanents, Encyclopedia of Mathematics and
|
835 |
+
Its Applications, Vol. 6 (Addison-Wesley Publ. Co.,
|
836 |
+
Reading, Mass., 1978).
|
837 |
+
[27] M. G. Jabbour, N. J. Cerf, Multiparticle quantum
|
838 |
+
interference
|
839 |
+
in
|
840 |
+
Bogoliubov
|
841 |
+
bosonic
|
842 |
+
transformations,
|
843 |
+
Phys.Rev.Res. 3, 043065 (2021).
|
844 |
+
[28] See the Supplemental Material.
|
845 |
+
[29] V. S. Shchesnovich, Partial indistinguishability theory
|
846 |
+
for multiphoton experiments in multiport devices, Phys.
|
847 |
+
Rev. A 91, 013844 (2015).
|
848 |
+
[30] M. C. Tichy, Sampling of partially distinguishable bosons
|
849 |
+
and the relation to the multidimensional permanent,
|
850 |
+
Phys. Rev. A 91, 022316 (2015).
|
851 |
+
[31] V. S. Shchesnovich, Assymptotic evaluation of bosonic
|
852 |
+
probability amplitudes in linear unitary networks in the
|
853 |
+
case of large number of bosons, Int. J. Quantum Inf. 11,
|
854 |
+
1350045 (2013).
|
855 |
+
[32] T. Engl., J. D. Urbina, K. Richter, Boson Sampling as
|
856 |
+
a canonical transformation: a semiclassical approach in
|
857 |
+
Fock state, Annalen der Physik 527, 737 (2015)
|
858 |
+
[33] J. Tiedau, T. J. Bartley, G. Harder, A. E. Lita, S. W.
|
859 |
+
Nam, T. Gerrits, C. Silberhorn, Scalability of parametric
|
860 |
+
down-conversion for generating higher-order Fock states,
|
861 |
+
Phys. Rev. A 100, 041802 (2019).
|
862 |
+
[34] M. Uria , P. Solano, C. Hermann-Avigliano, Determin-
|
863 |
+
istic Generation of Large Fock States, Phys. Rev. Lett.
|
864 |
+
125, 093603 (2020).
|
865 |
+
[35] N. Rivera, J. Sloan, Y. Salamin, J. D. Joannopoulos,
|
866 |
+
M. Soljacic, Creating large Fock states and massively
|
867 |
+
squeezed states in optics using systems with nonlinear
|
868 |
+
bound states in the continuum, Arxiv: 2211.01514
|
869 |
+
|
870 |
+
Supplementar material for
|
871 |
+
“Families of bosonic suppression laws beyond the permutation symmetry principle”
|
872 |
+
M. E. O. Bezerra and V. S. Shchesnovich
|
873 |
+
Centro de Ciˆencias Naturais e Humanas, Universidade Federal do ABC, Santo Andr´e, SP, 09210-170 Brazil
|
874 |
+
THE MATRIX OF THE TRITTER
|
875 |
+
The tritter is a three-mode interferometer that can be built in the triangular arrangement of three beamsplitters,
|
876 |
+
one mirror, and in our case, an additional phase plate. Let us consider Bj the matrices of each beamsplitter acting on
|
877 |
+
the input modes defined in Fig. 1(b) in the main text. We set the reflection phases of each beamsplitter as ϕj = π/2,
|
878 |
+
then the matrices of these beamsplitters are
|
879 |
+
B1 =
|
880 |
+
�
|
881 |
+
�
|
882 |
+
�
|
883 |
+
�
|
884 |
+
�
|
885 |
+
�
|
886 |
+
�
|
887 |
+
�
|
888 |
+
√τ1
|
889 |
+
i√ρ1 0
|
890 |
+
i√ρ1
|
891 |
+
√τ1
|
892 |
+
0
|
893 |
+
0
|
894 |
+
0
|
895 |
+
1
|
896 |
+
�
|
897 |
+
�
|
898 |
+
�
|
899 |
+
�
|
900 |
+
�
|
901 |
+
�
|
902 |
+
�
|
903 |
+
�
|
904 |
+
, B2 =
|
905 |
+
�
|
906 |
+
�
|
907 |
+
�
|
908 |
+
�
|
909 |
+
�
|
910 |
+
�
|
911 |
+
�
|
912 |
+
�
|
913 |
+
√τ2
|
914 |
+
0 i√ρ2
|
915 |
+
0
|
916 |
+
1
|
917 |
+
0
|
918 |
+
i√ρ2 0
|
919 |
+
√τ2
|
920 |
+
�
|
921 |
+
�
|
922 |
+
�
|
923 |
+
�
|
924 |
+
�
|
925 |
+
�
|
926 |
+
�
|
927 |
+
�
|
928 |
+
, B3 =
|
929 |
+
�
|
930 |
+
�
|
931 |
+
�
|
932 |
+
�
|
933 |
+
�
|
934 |
+
�
|
935 |
+
�
|
936 |
+
�
|
937 |
+
1
|
938 |
+
0
|
939 |
+
0
|
940 |
+
0
|
941 |
+
√τ3
|
942 |
+
i√ρ3
|
943 |
+
0 i√ρ3
|
944 |
+
√τ3
|
945 |
+
�
|
946 |
+
�
|
947 |
+
�
|
948 |
+
�
|
949 |
+
�
|
950 |
+
�
|
951 |
+
�
|
952 |
+
�
|
953 |
+
,
|
954 |
+
(1)
|
955 |
+
where ρk = 1 − τk for each k = 1, 2, 3. In addition, we need to define the matrices related to the additional phase
|
956 |
+
shifter Pθ = diag(1, 1, eiθ) and the ones related to the reflection phase in the first mode M1 = diag(−1, 1, 1), second
|
957 |
+
mode M2 = diag(1, −1, 1) and third mode M3 = diag(1, 1, −1).
|
958 |
+
Finally, the matrix of the tritter, denoted by T, is built by the sequence action of these matrices
|
959 |
+
T = M1B1M2B2PθB3M3
|
960 |
+
=
|
961 |
+
�
|
962 |
+
�
|
963 |
+
�
|
964 |
+
�
|
965 |
+
�
|
966 |
+
�
|
967 |
+
�
|
968 |
+
�
|
969 |
+
−√τ1τ2
|
970 |
+
i√ρ1τ3 + √τ1ρ2ρ3eiθ
|
971 |
+
√ρ1ρ3 + i√τ1ρ2τ3eiθ
|
972 |
+
i√ρ1τ2
|
973 |
+
−√τ1τ3 − i√ρ1ρ2ρ3eiθ
|
974 |
+
i√τ1ρ3 + √ρ1ρ2τ3eiθ
|
975 |
+
i√ρ2
|
976 |
+
i√τ2ρ3eiθ
|
977 |
+
−√τ2τ3eiθ
|
978 |
+
�
|
979 |
+
�
|
980 |
+
�
|
981 |
+
�
|
982 |
+
�
|
983 |
+
�
|
984 |
+
�
|
985 |
+
�
|
986 |
+
,
|
987 |
+
(2)
|
988 |
+
where in our notation, the rows are related to the input modes and the columns with the output modes, in contrast
|
989 |
+
to Ref. [1]. From Eq.(2), we arrive in the matrix T (1) of the main text by taking τ2 = 2/3 and τ3 = 1/2, preserving τ1
|
990 |
+
and θ as free parameters, and factoring a diagonal matrix diag(i, 1, 1) from the left and diag(i, i, −1) from the right.
|
991 |
+
Moreover, we arrive in the matrix T (2) by taking τ1 = τ3 = 1/2, preserving τ2 and θ as free parameters, and factoring
|
992 |
+
the same diagonal matrices of the previous one.
|
993 |
+
In the main text, we defined two types of symmetric tritters, denoted by Ts and �Ts. These tritters are obtained by
|
994 |
+
setting τ1 = τ3 = 1/2 and τ2 = 2/3 in Eq.(2), and are built explicitly from the following construction:
|
995 |
+
Ts(θ) =
|
996 |
+
�
|
997 |
+
�
|
998 |
+
�
|
999 |
+
�
|
1000 |
+
�
|
1001 |
+
�
|
1002 |
+
�
|
1003 |
+
�
|
1004 |
+
− 1
|
1005 |
+
√
|
1006 |
+
2
|
1007 |
+
i
|
1008 |
+
√
|
1009 |
+
2
|
1010 |
+
0
|
1011 |
+
i
|
1012 |
+
√
|
1013 |
+
2
|
1014 |
+
− 1
|
1015 |
+
√
|
1016 |
+
2 0
|
1017 |
+
0
|
1018 |
+
0
|
1019 |
+
1
|
1020 |
+
�
|
1021 |
+
�
|
1022 |
+
�
|
1023 |
+
�
|
1024 |
+
�
|
1025 |
+
�
|
1026 |
+
�
|
1027 |
+
�
|
1028 |
+
�
|
1029 |
+
�
|
1030 |
+
�
|
1031 |
+
�
|
1032 |
+
�
|
1033 |
+
�
|
1034 |
+
�
|
1035 |
+
�
|
1036 |
+
�
|
1037 |
+
2
|
1038 |
+
3 0
|
1039 |
+
i
|
1040 |
+
√
|
1041 |
+
3
|
1042 |
+
0
|
1043 |
+
1
|
1044 |
+
0
|
1045 |
+
i
|
1046 |
+
√
|
1047 |
+
3
|
1048 |
+
0
|
1049 |
+
�
|
1050 |
+
2
|
1051 |
+
3
|
1052 |
+
�
|
1053 |
+
�
|
1054 |
+
�
|
1055 |
+
�
|
1056 |
+
�
|
1057 |
+
�
|
1058 |
+
�
|
1059 |
+
�
|
1060 |
+
�
|
1061 |
+
�
|
1062 |
+
�
|
1063 |
+
�
|
1064 |
+
�
|
1065 |
+
�
|
1066 |
+
�
|
1067 |
+
�
|
1068 |
+
1 0
|
1069 |
+
0
|
1070 |
+
0 1
|
1071 |
+
0
|
1072 |
+
0 0 eiθ
|
1073 |
+
�
|
1074 |
+
�
|
1075 |
+
�
|
1076 |
+
�
|
1077 |
+
�
|
1078 |
+
�
|
1079 |
+
�
|
1080 |
+
�
|
1081 |
+
�
|
1082 |
+
�
|
1083 |
+
�
|
1084 |
+
�
|
1085 |
+
�
|
1086 |
+
�
|
1087 |
+
�
|
1088 |
+
�
|
1089 |
+
1
|
1090 |
+
0
|
1091 |
+
0
|
1092 |
+
0
|
1093 |
+
1
|
1094 |
+
√
|
1095 |
+
2 − i
|
1096 |
+
√
|
1097 |
+
2
|
1098 |
+
0
|
1099 |
+
i
|
1100 |
+
√
|
1101 |
+
2 − 1
|
1102 |
+
√
|
1103 |
+
2
|
1104 |
+
�
|
1105 |
+
�
|
1106 |
+
�
|
1107 |
+
�
|
1108 |
+
�
|
1109 |
+
�
|
1110 |
+
�
|
1111 |
+
�
|
1112 |
+
,
|
1113 |
+
(3)
|
1114 |
+
where we have Ts(0) = Ts and Ts(π/2) = �Ts, after factoring the appropriate diagonal matrices that do not contribute
|
1115 |
+
to the interference.
|
1116 |
+
SUPPRESSION FUNCTIONS
|
1117 |
+
It was proved in the main text that, when N photons enter a linear interferometer of dimension M in the M-mode
|
1118 |
+
input Fock state |m⟩a and are detected in the M-mode output Fock state |n⟩b, the corresponding amplitude is given
|
1119 |
+
arXiv:2301.02192v1 [quant-ph] 3 Jan 2023
|
1120 |
+
|
1121 |
+
2
|
1122 |
+
by
|
1123 |
+
b⟨n|m⟩a =
|
1124 |
+
M
|
1125 |
+
�
|
1126 |
+
k=1
|
1127 |
+
1
|
1128 |
+
√mk!nk!
|
1129 |
+
∂mk
|
1130 |
+
∂ymk
|
1131 |
+
k
|
1132 |
+
∂nk
|
1133 |
+
∂xnk
|
1134 |
+
k
|
1135 |
+
G(x, y)
|
1136 |
+
�����
|
1137 |
+
x=y=0
|
1138 |
+
, G(x, y) = exp
|
1139 |
+
�
|
1140 |
+
�
|
1141 |
+
M
|
1142 |
+
�
|
1143 |
+
k,l=1
|
1144 |
+
ykUklxl
|
1145 |
+
�
|
1146 |
+
� ,
|
1147 |
+
(4)
|
1148 |
+
where U is a unitary matrix related to the interferometer. For simplicity, since the number of photons is fixed at
|
1149 |
+
the input, we can take all the derivatives over the input variables yk in the generating function G(x, y) obtaining the
|
1150 |
+
following expression
|
1151 |
+
b⟨n|m⟩a =
|
1152 |
+
M
|
1153 |
+
�
|
1154 |
+
k=1
|
1155 |
+
1
|
1156 |
+
√nk!
|
1157 |
+
∂nk
|
1158 |
+
∂xnk
|
1159 |
+
k
|
1160 |
+
Gm(x)
|
1161 |
+
�����
|
1162 |
+
x=0
|
1163 |
+
, Gm(x) =
|
1164 |
+
M
|
1165 |
+
�
|
1166 |
+
k=1
|
1167 |
+
1
|
1168 |
+
√mk!
|
1169 |
+
� M
|
1170 |
+
�
|
1171 |
+
l=1
|
1172 |
+
Uklxl
|
1173 |
+
�mk
|
1174 |
+
,
|
1175 |
+
(5)
|
1176 |
+
where here, we have defined a generating function for each input configuration m.
|
1177 |
+
Taking the derivative over the output variable xl we obtain the following recurrence relation for this new generating
|
1178 |
+
function
|
1179 |
+
∂
|
1180 |
+
∂xl
|
1181 |
+
Gm(x) =
|
1182 |
+
M
|
1183 |
+
�
|
1184 |
+
k=1
|
1185 |
+
√mkUklGm−1k(x) ,
|
1186 |
+
(6)
|
1187 |
+
where 1k is a vector of dimension M with the k-th element being 1 and the others being zero, i.e.
|
1188 |
+
1k ≡
|
1189 |
+
(0, . . . , 0, 1, 0, . . . , 0). Then, replacing Eq.(6) in Eq.(5), we arrive in the recurrence for the amplitudes
|
1190 |
+
b⟨n|m⟩a =
|
1191 |
+
M
|
1192 |
+
�
|
1193 |
+
k=1
|
1194 |
+
�mk
|
1195 |
+
nl
|
1196 |
+
Ukl b⟨n − 1l|m − 1k⟩a .
|
1197 |
+
(7)
|
1198 |
+
As assumed in the main text, we focus on the mode l = 1, which can have an arbitrary number of photons
|
1199 |
+
n1 ≥ 1, and considered that the other modes have a small number of photons. Denoting the output configurations
|
1200 |
+
as n = (n1, nS), with nS = (n2, ..., nM), we can remove the photons in each mode of nS by using the recurrence
|
1201 |
+
relation of Eq. (7) repeatedly nl times for each output modes l = 2, . . . , M. Following this procedure, we obtain the
|
1202 |
+
amplitude b⟨n|m⟩a as a linear combination of the simple ones
|
1203 |
+
b⟨n1, 0S|m′⟩a =
|
1204 |
+
1
|
1205 |
+
√n1!
|
1206 |
+
∂n1
|
1207 |
+
∂xn1
|
1208 |
+
1
|
1209 |
+
Gm′(x1, 0, ..., 0)
|
1210 |
+
����
|
1211 |
+
x1=0
|
1212 |
+
=
|
1213 |
+
�
|
1214 |
+
n1!
|
1215 |
+
m′! U m′
|
1216 |
+
k
|
1217 |
+
k1 ,
|
1218 |
+
(8)
|
1219 |
+
where m′ is the input configuration with fewer photons that appears in each term of the expansion due to the use of
|
1220 |
+
the recurrence relation. Finally, factoring m! = m1!...mM! and the smallest order of Ukl, i.e. mk − |nS|, we obtain
|
1221 |
+
the amplitude in the form
|
1222 |
+
b⟨n|m⟩a =
|
1223 |
+
�
|
1224 |
+
n1!
|
1225 |
+
nS!m!
|
1226 |
+
� M
|
1227 |
+
�
|
1228 |
+
k=1
|
1229 |
+
U mk−|nS|
|
1230 |
+
k1
|
1231 |
+
�
|
1232 |
+
f n
|
1233 |
+
m(U),
|
1234 |
+
(9)
|
1235 |
+
where the function f n
|
1236 |
+
m(U) is called suppression function and is obtained by collecting the matrix elements that appear
|
1237 |
+
from the Eqs. (7),(8) and the terms remaining in the factorization. This function is a polynomial in the parameters
|
1238 |
+
of the interferometers √ρj and √τ j.
|
1239 |
+
Beamsplitter
|
1240 |
+
Outputs |n1, 1⟩b and |n1, 2⟩b
|
1241 |
+
First of all, we want to find suppression laws for the amplitudes with less photons in the output mode l = 2 by
|
1242 |
+
using the recurrence relation given by Eq.(7) to remove all the photons in this mode. Then, using this method for
|
1243 |
+
|
1244 |
+
3
|
1245 |
+
the output mode l = 2 one and two times, respectively, we arrive in the recurrence relations
|
1246 |
+
b⟨n|m⟩a =
|
1247 |
+
�m1
|
1248 |
+
n2
|
1249 |
+
U12 b⟨n − 12|m − 11⟩a +
|
1250 |
+
�m2
|
1251 |
+
n2
|
1252 |
+
U22 b⟨n − 12|m − 12⟩a,
|
1253 |
+
(10)
|
1254 |
+
b⟨n|m⟩a =
|
1255 |
+
�
|
1256 |
+
m1(m1 − 1)
|
1257 |
+
n2(n2 − 1) U 2
|
1258 |
+
12 b⟨n − 212|m − 211⟩a +
|
1259 |
+
�
|
1260 |
+
m2(m2 − 1)
|
1261 |
+
n2(n2 − 1) U 2
|
1262 |
+
22 b⟨n − 212|m − 212⟩a +
|
1263 |
+
+2
|
1264 |
+
�
|
1265 |
+
m1m2
|
1266 |
+
n2(n2 − 1)U12U22 b⟨n − 212|m − 11 − 12⟩a,
|
1267 |
+
(11)
|
1268 |
+
The first recurrence removes the photons n2 of the amplitudes b⟨n1, 1|m1, m2⟩a and the second of the amplitudes
|
1269 |
+
b⟨n1, 2|m1, m2⟩a. Then, we can use Eq.(8) obtaining Eq.(9) with the suppression functions
|
1270 |
+
f (n1,1)
|
1271 |
+
(m1,m1)(B) = m1B12B21 + m2B11B22
|
1272 |
+
= (m1 + m2)τ − m1,
|
1273 |
+
(12)
|
1274 |
+
f (n1,2)
|
1275 |
+
(m1,m2)(B) = m1(m1 − 1)B2
|
1276 |
+
12B2
|
1277 |
+
21 + 2m1m2B11B12B21B22 + m2(m2 − 1)B2
|
1278 |
+
11B2
|
1279 |
+
22
|
1280 |
+
= (m1 + m2)(m1 + m2 − 1)
|
1281 |
+
�
|
1282 |
+
τ 2 −
|
1283 |
+
2m1
|
1284 |
+
m1 + m2
|
1285 |
+
τ +
|
1286 |
+
m1(m1 − 1)
|
1287 |
+
(m1 + m2)(m1 + m2 − 1)
|
1288 |
+
�
|
1289 |
+
.
|
1290 |
+
(13)
|
1291 |
+
where we have considered the matrix of the beamsplitter B as our unitary matrix U. The roots of the these functions
|
1292 |
+
are the suppression laws found for the beamsplitter and are shown in Eqs.(9),(11) in the main text.
|
1293 |
+
Outputs |1, n2⟩b and |2, n2⟩b
|
1294 |
+
In addition to the considered in the main text, we also can find suppression laws for the amplitude that have fewer
|
1295 |
+
photons in the mode l = 1. For this case, we need to use Eq.(7) for this mode one and two times, respectively,
|
1296 |
+
obtaining the recurrence relations:
|
1297 |
+
b⟨n|m⟩a =
|
1298 |
+
�m1
|
1299 |
+
n1
|
1300 |
+
U11 b⟨n − 11|m − 11⟩a +
|
1301 |
+
�m2
|
1302 |
+
n1
|
1303 |
+
U21 b⟨n − 11|m − 12⟩a,
|
1304 |
+
(14)
|
1305 |
+
b⟨n|m⟩a =
|
1306 |
+
�
|
1307 |
+
m1(m1 − 1)
|
1308 |
+
n1(n1 − 1) U 2
|
1309 |
+
11 b⟨n − 211|m − 211⟩a +
|
1310 |
+
�
|
1311 |
+
m2(m2 − 1)
|
1312 |
+
n1(n1 − 1) U 2
|
1313 |
+
21 b⟨n − 211|m − 212⟩a +
|
1314 |
+
+2
|
1315 |
+
�
|
1316 |
+
m1m2
|
1317 |
+
n1(n1 − 1)U11U21 b⟨n − 211|m − 11 − 12⟩a,
|
1318 |
+
(15)
|
1319 |
+
and similarly to the previous case, these equations remove the photons in n1 of the amplitudes b⟨1, n2|m1, m2⟩a and
|
1320 |
+
b⟨2, n2|m1, m2⟩a respectively. Finally, we can use Eq.(8) obtaining Eq.(9) with the suppression functions
|
1321 |
+
f (1,n2)
|
1322 |
+
(m1,m1)(B) = m1B11B22 + m2B21B12
|
1323 |
+
= (m1 + m2)τ − m2,
|
1324 |
+
(16)
|
1325 |
+
f (2,n2)
|
1326 |
+
(m1,m2)(B) = m1(m1 − 1)B2
|
1327 |
+
11B2
|
1328 |
+
22 + 2m1m2B11B12B21B22 + m2(m2 − 1)B2
|
1329 |
+
21B2
|
1330 |
+
12
|
1331 |
+
= (m1 + m2)(m1 + m2 − 1)
|
1332 |
+
�
|
1333 |
+
τ 2 −
|
1334 |
+
2m2
|
1335 |
+
m1 + m2
|
1336 |
+
τ +
|
1337 |
+
m2(m2 − 1)
|
1338 |
+
(m1 + m2)(m1 + m2 − 1)
|
1339 |
+
�
|
1340 |
+
.
|
1341 |
+
(17)
|
1342 |
+
Note that, these functions have the same form as those of Eqs.(12),(13), however with m1 and m2 interchanged.
|
1343 |
+
Tritter
|
1344 |
+
Outputs |n1, 1, 0⟩b and |n1, 0, 1⟩b
|
1345 |
+
For the tritter, the simplest suppression laws are those with |nS| = 1, corresponding to the output configurations
|
1346 |
+
with nS = (1, 0) and nS = (0, 1). Then, for the first one, we need to use the recurrence once for l = 1, and for the
|
1347 |
+
|
1348 |
+
4
|
1349 |
+
second one, once for l = 2, obtaining respectively
|
1350 |
+
b⟨n|m⟩a =
|
1351 |
+
�m1
|
1352 |
+
n2
|
1353 |
+
U12 b⟨n − 12|m − 11⟩a +
|
1354 |
+
�m2
|
1355 |
+
n2
|
1356 |
+
U22 b⟨n − 12|m − 12⟩a +
|
1357 |
+
�m3
|
1358 |
+
n2
|
1359 |
+
U32 b⟨n − 12|m − 13⟩a,
|
1360 |
+
(18)
|
1361 |
+
b⟨n|m⟩a =
|
1362 |
+
�m1
|
1363 |
+
n3
|
1364 |
+
U13 b⟨n − 13|m − 11⟩a +
|
1365 |
+
�m2
|
1366 |
+
n3
|
1367 |
+
U23 b⟨n − 13|m − 12⟩a +
|
1368 |
+
�m3
|
1369 |
+
n3
|
1370 |
+
U33 b⟨n − 13|m − 13⟩a
|
1371 |
+
(19)
|
1372 |
+
where the first removes the photons in n2 of the amplitudes b⟨n1, 1, 0|m1, m2, m3⟩a and the second, the photons n3 of
|
1373 |
+
the amplitudes b⟨n1, 0, 1|m1, m2, m3⟩a. Then, from Eqs.(8),(9) we obtain the general expression for the suppression
|
1374 |
+
functions
|
1375 |
+
f (n1,1,0)
|
1376 |
+
m
|
1377 |
+
(U) = m1U12U21U31 + m2U11U22U31 + m3U11U21U32,
|
1378 |
+
(20)
|
1379 |
+
f (n1,0,1)
|
1380 |
+
m
|
1381 |
+
(U) = m1U13U21U31 + m2U11U23U31 + m3U11U21U33
|
1382 |
+
(21)
|
1383 |
+
Finally, considering our families of tritters T (1) and T (2) as the unitary transformation U of the previous equation,
|
1384 |
+
we have
|
1385 |
+
f (n1,1,0)
|
1386 |
+
m,m,m (T (1)) = −f (n1,0,1)
|
1387 |
+
m,m,m (T (1)) = m
|
1388 |
+
3 (2τ1 − 1),
|
1389 |
+
(22)
|
1390 |
+
f (n1,1,0)
|
1391 |
+
m,m,m (T (2)) = f (n1,0,1)
|
1392 |
+
m,m,m (T (2)) = m
|
1393 |
+
√
|
1394 |
+
2
|
1395 |
+
4
|
1396 |
+
(3τ2 − 2)√τ2eiθ
|
1397 |
+
(23)
|
1398 |
+
whose non-trivial roots are τ1 = 1/2 or τ2 = 2/3, which correspond to the symmetric tritters. These suppression laws
|
1399 |
+
are shown in the first row of Table I in the main text.
|
1400 |
+
Outputs |n1, 1, 1⟩b
|
1401 |
+
Now, for |nS| = 2 we will first consider the outputs with nS = (1, 1). Using Eq.(7) for the modes l = 2 and l = 3
|
1402 |
+
symultaneously we obtain the recurrence relation
|
1403 |
+
b⟨n|m⟩a =
|
1404 |
+
=
|
1405 |
+
�m1m2
|
1406 |
+
n2n3
|
1407 |
+
(U12U23 + U22U13) b⟨n − 11 − 12|m − 11 − 12⟩a +
|
1408 |
+
�
|
1409 |
+
m3(m3 − 1)
|
1410 |
+
n2n3
|
1411 |
+
U32U33 b⟨n − 11 − 12|m − 213⟩a +
|
1412 |
+
+
|
1413 |
+
�m1m3
|
1414 |
+
n2n3
|
1415 |
+
(U12U33 + U32U13) b⟨n − 11 − 12|m − 11 − 13⟩a +
|
1416 |
+
�
|
1417 |
+
m2(m2 − 1)
|
1418 |
+
n2n3
|
1419 |
+
U22U23 b⟨n − 11 − 12|m − 212⟩a +
|
1420 |
+
+
|
1421 |
+
�m2m3
|
1422 |
+
n2n3
|
1423 |
+
(U22U33 + U32U23) b⟨n − 11 − 12|m − 12 − 13⟩a +
|
1424 |
+
�
|
1425 |
+
m1(m1 − 1)
|
1426 |
+
n2n3
|
1427 |
+
U12U13 b⟨n − 11 − 12|m − 211⟩a,
|
1428 |
+
(24)
|
1429 |
+
which removes the photons in n2 and n3 of the amplitudes b⟨n1, 1, 1|m1, m2, m3⟩a. Then, using Eqs.(8),(9), we found
|
1430 |
+
the corresponding suppression function
|
1431 |
+
f (n1,1,1)
|
1432 |
+
m
|
1433 |
+
(U) =
|
1434 |
+
= U11U21U31
|
1435 |
+
�
|
1436 |
+
m1m2 (U12U23 + U22U13) U31 + m1m3 (U12U33 + U32U13) U21 + m2m3 (U22U33 + U32U23) U11
|
1437 |
+
�
|
1438 |
+
+
|
1439 |
+
+
|
1440 |
+
�
|
1441 |
+
m1(m1 − 1)U12U13U 2
|
1442 |
+
21U 2
|
1443 |
+
31 + m2(m2 − 1)U22U23U 2
|
1444 |
+
11U 2
|
1445 |
+
31 + m3(m3 − 1)U32U33U 2
|
1446 |
+
11U 2
|
1447 |
+
21
|
1448 |
+
�
|
1449 |
+
.
|
1450 |
+
(25)
|
1451 |
+
The previous equation has too many parameters: the input configurations mk, the tritter parameters ρj and θ. To
|
1452 |
+
find suppression laws it is convenient to consider inputs with only one parameter, in our case m(I) = (n1, 1, 1) and
|
1453 |
+
m(II) = (m, m, m), and our families of tritters T (1) and T (2) as the unitary transformation U. Then, for which one
|
1454 |
+
of these cases, the suppression functions of Eq.(25) are given by:
|
1455 |
+
f (n1,1,1)
|
1456 |
+
(n1,1,1) (T (1)) =
|
1457 |
+
√
|
1458 |
+
2
|
1459 |
+
18
|
1460 |
+
� �
|
1461 |
+
4ei2θ + 3(1 + ei2θ)n1 + (3 − ei2θ)n2
|
1462 |
+
1
|
1463 |
+
�
|
1464 |
+
τ1 − 3n1(n1 − 1)
|
1465 |
+
�√
|
1466 |
+
1 − τ1,
|
1467 |
+
(26)
|
1468 |
+
|
1469 |
+
5
|
1470 |
+
f (n1,1,1)
|
1471 |
+
(n1,1,1) (T (2)) =
|
1472 |
+
√
|
1473 |
+
2
|
1474 |
+
4
|
1475 |
+
�
|
1476 |
+
ei2θ �
|
1477 |
+
2 + 3n1 + n2
|
1478 |
+
1
|
1479 |
+
�
|
1480 |
+
τ2 + (3 − ei2θ)n1 − (1 + ei2θ)n2
|
1481 |
+
1
|
1482 |
+
��
|
1483 |
+
τ2(1 − τ2),
|
1484 |
+
(27)
|
1485 |
+
f (n1,1,1)
|
1486 |
+
(m,m,m)(T (1)) = m
|
1487 |
+
9
|
1488 |
+
�
|
1489 |
+
2(2m + ei2θ − 1)(τ1 − 1)τ1 + m − 1
|
1490 |
+
�
|
1491 |
+
,
|
1492 |
+
(28)
|
1493 |
+
f (n1,1,1)
|
1494 |
+
(m,m,m)(T (2)) = m
|
1495 |
+
8
|
1496 |
+
�
|
1497 |
+
3(3m − 1)ei2θτ 2
|
1498 |
+
2 − 2
|
1499 |
+
�
|
1500 |
+
(6m − 2)ei2θ − 1
|
1501 |
+
�
|
1502 |
+
τ2 + (4m − 2)ei2θ − 2
|
1503 |
+
�
|
1504 |
+
τ2,
|
1505 |
+
(29)
|
1506 |
+
The roots of the four previous equations given the suppression laws for the amplitudes b⟨n1, 1, 1|n1, 1, 1⟩a and
|
1507 |
+
b⟨n1, 1, 1|m, m, m⟩a. These results are shown in blue in Fig. 3 in the main text, where the non-trivial suppression
|
1508 |
+
laws are ignored (i.e. those that τ1, τ2 = 0, 1).
|
1509 |
+
Outputs |n1, 2, 0⟩b
|
1510 |
+
Furthermore, for |nS| = 2 we also considered the outputs with nS = (2, 0). In this case, we need to use Eq.(7) two
|
1511 |
+
times for l = 2, obtaining the recurrence relation
|
1512 |
+
b⟨n|m⟩a =
|
1513 |
+
=
|
1514 |
+
�
|
1515 |
+
m1(m1 − 1)
|
1516 |
+
n2(n2 − 1) U 2
|
1517 |
+
12 b⟨n − 212|m − 211⟩a +
|
1518 |
+
�
|
1519 |
+
m2(m2 − 1)
|
1520 |
+
n2(n2 − 1) U 2
|
1521 |
+
22 b⟨n − 212|m − 212⟩a +
|
1522 |
+
+
|
1523 |
+
�
|
1524 |
+
m3(m3 − 1)
|
1525 |
+
n2(n2 − 1) U 2
|
1526 |
+
32 b⟨n − 212|m − 213⟩a + 2
|
1527 |
+
�
|
1528 |
+
m1m2
|
1529 |
+
n2(n2 − 1)U12U22 b⟨n − 212|m − 11 − 12⟩a
|
1530 |
+
+2
|
1531 |
+
�
|
1532 |
+
m1m3
|
1533 |
+
n2(n2 − 1)U12U32 b⟨n − 212|m − 11 − 13⟩a + 2
|
1534 |
+
�
|
1535 |
+
m2m3
|
1536 |
+
n2(n2 − 1)U22U32 b⟨n − 212|m − 12 − 13⟩a,
|
1537 |
+
(30)
|
1538 |
+
which removes the photons in n2 of the amplitudes b⟨n1, 2, 0|m1, m2, m3⟩a. Then, using Eqs.(8),(9), we found the
|
1539 |
+
corresponding suppression function
|
1540 |
+
f (n1,2,0)
|
1541 |
+
m
|
1542 |
+
(U) = 2U11U21U31
|
1543 |
+
�
|
1544 |
+
m1m2U12U22U31 + m1m3U12U32U21 + m2m3U22U32U11
|
1545 |
+
�
|
1546 |
+
+
|
1547 |
+
+m1(m1 − 1)U 2
|
1548 |
+
12U 2
|
1549 |
+
21U 2
|
1550 |
+
31 + m2(m2 − 1)U 2
|
1551 |
+
22U 2
|
1552 |
+
11U 2
|
1553 |
+
31 + m3(m3 − 1)U 2
|
1554 |
+
32U 2
|
1555 |
+
11U 2
|
1556 |
+
21,
|
1557 |
+
(31)
|
1558 |
+
Finally, keeping only the parameters of interest, we have
|
1559 |
+
f (n1,2,0)
|
1560 |
+
(n1,1,1) (T (1)) =
|
1561 |
+
√
|
1562 |
+
2
|
1563 |
+
18
|
1564 |
+
�
|
1565 |
+
(4ei2θ − 3(ei2θ − 1)n1 − (3 + ei2θ)n2
|
1566 |
+
1)τ1 − 3n1(1 − n1)
|
1567 |
+
� √
|
1568 |
+
1 − τ1 +
|
1569 |
+
+
|
1570 |
+
√
|
1571 |
+
6
|
1572 |
+
9 ieiθ �
|
1573 |
+
n1(2 − n1) − (2 + n1 − n2
|
1574 |
+
1)τ1
|
1575 |
+
� √τ1,
|
1576 |
+
(32)
|
1577 |
+
f (n1,2,0)
|
1578 |
+
(n1,1,1) (T (2)) =
|
1579 |
+
√
|
1580 |
+
2
|
1581 |
+
4
|
1582 |
+
�
|
1583 |
+
(2 + 3n1 + n2
|
1584 |
+
1)ei2θτ2 −
|
1585 |
+
�
|
1586 |
+
3 + ei2θ + (ei2θ − 1)n1
|
1587 |
+
�
|
1588 |
+
n1
|
1589 |
+
� �
|
1590 |
+
τ2(1 − τ2) +
|
1591 |
+
+ 1
|
1592 |
+
√
|
1593 |
+
2ieiθ(1 − n1) [n1 − (1 + n1)τ2] √τ2,
|
1594 |
+
(33)
|
1595 |
+
f (n1,2,0)
|
1596 |
+
(m,m,m)(T (1)) = m
|
1597 |
+
9
|
1598 |
+
�
|
1599 |
+
(4m − 2 − 2ei2θ)(1 − τ1)τ1 − m + 1
|
1600 |
+
�
|
1601 |
+
+ 2m
|
1602 |
+
27 ieiθ(2τ1 − 1)
|
1603 |
+
�
|
1604 |
+
3τ1(1 − τ1),
|
1605 |
+
(34)
|
1606 |
+
f (n1,2,0)
|
1607 |
+
(m,m,m)(T (2)) = m
|
1608 |
+
8
|
1609 |
+
�
|
1610 |
+
(9m − 3)ei2θτ 2
|
1611 |
+
2 − 2
|
1612 |
+
�
|
1613 |
+
(6m − 2)ei2θ + 1
|
1614 |
+
�
|
1615 |
+
τ2 + 2
|
1616 |
+
�
|
1617 |
+
(2m − 1)ei2θ + 1
|
1618 |
+
��
|
1619 |
+
τ2,
|
1620 |
+
(35)
|
1621 |
+
Now, the roots of the four previous equations give the suppression laws for the amplitudes b⟨n1, 2, 0|n1, 1, 1⟩a and
|
1622 |
+
b⟨n1, 2, 0|m, m, m⟩a. These results are shown in red in Fig. 3, where the non-trivial suppression laws are also ignored.
|
1623 |
+
|
1624 |
+
6
|
1625 |
+
Suppression laws with constant solutions
|
1626 |
+
In addition, in Fig. 3 in the main text, we note four constant suppression laws for the reflectivities ρ2 = 1/3 and
|
1627 |
+
ρ1 = 1/2. It occurs because for these values the corresponding suppression functions are factorized in such a way that
|
1628 |
+
one of the terms does not depend on m, which corresponds to these constant solutions, as follows:
|
1629 |
+
f (n1,1,1)
|
1630 |
+
(m,m,m)(T (1))
|
1631 |
+
θ=±π/2
|
1632 |
+
=
|
1633 |
+
m(m − 1)
|
1634 |
+
9
|
1635 |
+
(2τ1 − 1)2,
|
1636 |
+
(36)
|
1637 |
+
f (n1,1,1)
|
1638 |
+
(m,m,m)(T (2))
|
1639 |
+
θ=±π/2
|
1640 |
+
=
|
1641 |
+
m
|
1642 |
+
8
|
1643 |
+
�
|
1644 |
+
(3m − 1)τ2 − 2m
|
1645 |
+
�
|
1646 |
+
(3τ2 − 2)τ2,
|
1647 |
+
(37)
|
1648 |
+
f (n1,2,0)
|
1649 |
+
(m,m,m)(T (1))
|
1650 |
+
θ=0,π
|
1651 |
+
=
|
1652 |
+
m
|
1653 |
+
27
|
1654 |
+
�
|
1655 |
+
3(m − 1)(2τ1 − 1) + 2i
|
1656 |
+
�
|
1657 |
+
3(1 − τ1)τ1
|
1658 |
+
�
|
1659 |
+
(2τ1 − 1),
|
1660 |
+
(38)
|
1661 |
+
f (n1,2,0)
|
1662 |
+
(m,m,m)(T (2))
|
1663 |
+
θ=0,π
|
1664 |
+
=
|
1665 |
+
−m
|
1666 |
+
8 [(3m ��� 1)τ2 − 2m] (3τ2 − 2)τ2,
|
1667 |
+
(39)
|
1668 |
+
Here, we note that the suppression functions of Eqs. (36)(38) have a common constant root τ1 = 1/2, and those of
|
1669 |
+
Eqs. (37),(39) the common constant root τ2 = 2/3. These suppression laws are plotted in Fig. 3(b),(d) in the main
|
1670 |
+
text as the points and circles on the dashed line. Here, only the suppression laws obtained from Eqs. (38),(39) are
|
1671 |
+
related to the symmetry principle of Refs. [2, 3].
|
1672 |
+
SUPPRESSION LAWS FROM PERMUTATION SYMMETRY
|
1673 |
+
In Refs. [2, 3] were developed suppression laws for interferometers related to some input symmetries. Now we will
|
1674 |
+
show that only a part of the suppression laws we found are related to these symmetries. First of all, denoting SM as
|
1675 |
+
the group of permutations of M elements and σ their elements, we define the action of the permutation operator Pσ
|
1676 |
+
in a M-dimensional vector as follows
|
1677 |
+
Pσ
|
1678 |
+
�
|
1679 |
+
�
|
1680 |
+
�
|
1681 |
+
�
|
1682 |
+
�
|
1683 |
+
�
|
1684 |
+
�
|
1685 |
+
�
|
1686 |
+
x1
|
1687 |
+
...
|
1688 |
+
xM
|
1689 |
+
�
|
1690 |
+
�
|
1691 |
+
�
|
1692 |
+
�
|
1693 |
+
�
|
1694 |
+
�
|
1695 |
+
�
|
1696 |
+
�
|
1697 |
+
=
|
1698 |
+
�
|
1699 |
+
�
|
1700 |
+
�
|
1701 |
+
�
|
1702 |
+
�
|
1703 |
+
�
|
1704 |
+
�
|
1705 |
+
�
|
1706 |
+
xσ−1(1)
|
1707 |
+
...
|
1708 |
+
xσ−1(M)
|
1709 |
+
�
|
1710 |
+
�
|
1711 |
+
�
|
1712 |
+
�
|
1713 |
+
�
|
1714 |
+
�
|
1715 |
+
�
|
1716 |
+
�
|
1717 |
+
,
|
1718 |
+
(40)
|
1719 |
+
Let an input configuration which is symmetric under the operation σ(m) = m and an interferometer U that satisfies:
|
1720 |
+
PσU = ZUΛ,
|
1721 |
+
(41)
|
1722 |
+
where Z is a diagonal unitary matrix related to external phases and Λ a diagonal matrix that contains the eigenvectors
|
1723 |
+
of Pσ. Then, according to [2], the outputs n satisfying λn1
|
1724 |
+
1 ...λnM
|
1725 |
+
M
|
1726 |
+
̸= 1 are suppressed and considering our choice of
|
1727 |
+
input/outputs, these laws are shown in Table I (a). Similarly, if we have outputs symmetrical under the operation
|
1728 |
+
σ(n) = n and an interferometer satisfying
|
1729 |
+
UP †
|
1730 |
+
σ = Λ∗UZ∗,
|
1731 |
+
(42)
|
1732 |
+
we have suppression for inputs m such that λm1
|
1733 |
+
1 ...λmM
|
1734 |
+
M
|
1735 |
+
̸= 1. These suppression laws are shown in Table I (b) for our
|
1736 |
+
choice of inputs/outputs.
|
1737 |
+
For the interference in a beamsplitter, we need to consider the group S2 = {I, (12)}. From our results, only the
|
1738 |
+
suppression laws for the amplitudes b⟨n1, 1|m, m⟩a are related to the symmetry principle, since they are zero for
|
1739 |
+
τ = 1/2, which corresponds to the beamsplitter symmetrical under the permutation (12).
|
1740 |
+
For the interference in a tritter, we need to consider the permutation group S3 = {I, (12), (13), (23), (123), (132)}.
|
1741 |
+
From our method, the suppression laws obtained for the amplitudes b⟨n1, 2, 0|m, m, m⟩a are related to the symmetry
|
1742 |
+
principle, since they are zero for the tritter Ts, which is symmetric under the permutations (123) and (321). Our
|
1743 |
+
tritters also can recover the suppression laws due to the permutations (12) and (23), however, these results are the
|
1744 |
+
trivial cases, where some τj = 0 or τj = 1. Now, denoting our tritters by T (k) = T (k)(τk, θ), these last suppression
|
1745 |
+
laws are shown in Table I.
|
1746 |
+
|
1747 |
+
7
|
1748 |
+
TABLE I: Suppression laws for tritter from permutation symmetry
|
1749 |
+
a) Output suppression configurations for symmetric inputs Pσ(m) = m
|
1750 |
+
σ
|
1751 |
+
U
|
1752 |
+
Z
|
1753 |
+
Λ
|
1754 |
+
Suppressions from Eq.(41)
|
1755 |
+
Suppressions from f n
|
1756 |
+
m(U)
|
1757 |
+
(12)
|
1758 |
+
T (2)(1, θ)
|
1759 |
+
diag(−1, −1, 1)
|
1760 |
+
diag(−1, 1, 1)
|
1761 |
+
⟨n1, 1, 1|m, m, m⟩ and
|
1762 |
+
⟨n1, 2, 0|m, m, m⟩ for odd n1
|
1763 |
+
⟨1, 1, 1|1, 1, 1⟩ and
|
1764 |
+
⟨1, 2, 0|1, 1, 1⟩
|
1765 |
+
(12)
|
1766 |
+
T (2)(0, 0)
|
1767 |
+
diag(i, −i, 1)
|
1768 |
+
diag(1, −1, 1)
|
1769 |
+
⟨n1, 1, 1|m, m, m⟩ for any n1
|
1770 |
+
Same
|
1771 |
+
(12)
|
1772 |
+
T (2)(0, π)
|
1773 |
+
diag(i, −i, 1)
|
1774 |
+
diag(1, 1, −1)
|
1775 |
+
⟨n1, 1, 1|m, m, m⟩ for any n1
|
1776 |
+
Same
|
1777 |
+
(123)
|
1778 |
+
Ts
|
1779 |
+
I
|
1780 |
+
diag(1, ei2π/3, ei4π/3)
|
1781 |
+
⟨n1, 2, 0|m, m, m⟩ for any n1
|
1782 |
+
Same
|
1783 |
+
(321)
|
1784 |
+
Ts
|
1785 |
+
I
|
1786 |
+
diag(1, ei4π/3, ei2π/3)
|
1787 |
+
⟨n1, 2, 0|m, m, m⟩ for any n1
|
1788 |
+
Same
|
1789 |
+
b) Input suppression configurations for symmetric outputs Pσ(n) = n
|
1790 |
+
σ
|
1791 |
+
U
|
1792 |
+
Z
|
1793 |
+
Λ
|
1794 |
+
Suppressions from Eq.(42)
|
1795 |
+
Suppressions from f n
|
1796 |
+
m(U)
|
1797 |
+
(23)
|
1798 |
+
T (1)(1, θ)
|
1799 |
+
I
|
1800 |
+
diag(1, −1, 1)
|
1801 |
+
⟨n1, 1, 1|n1, 1, 1⟩ and
|
1802 |
+
⟨n1, 1, 1|m, m, m⟩ for any n1
|
1803 |
+
Same
|
1804 |
+
(23)
|
1805 |
+
T (1)(0, θ)
|
1806 |
+
I
|
1807 |
+
diag(−1, 1, 1)
|
1808 |
+
⟨n1, 1, 1|n1, 1, 1⟩ and
|
1809 |
+
⟨n1, 1, 1|m, m, m⟩ for odd n1
|
1810 |
+
⟨1, 1, 1|1, 1, 1⟩
|
1811 |
+
(23)
|
1812 |
+
T (2)(1, θ)
|
1813 |
+
diag(1, −1, −1)
|
1814 |
+
diag(1, 1, −1)
|
1815 |
+
⟨n1, 1, 1|n1, 1, 1⟩ and
|
1816 |
+
⟨n1, 1, 1|m, m, m⟩ for any n1
|
1817 |
+
Same
|
1818 |
+
SUPPRESSION LAWS AND PARTIAL DISTINGUISHABILITY
|
1819 |
+
Photons are partially distinguishable due to degrees of freedom not acted upon by the interferometer, which are
|
1820 |
+
called the internal states. In Ref. [4] it has been conjectured that the zero probability in the output of multi-photon
|
1821 |
+
interference with partially distinguishable photons is invariably the result of an exact cancellation of the quantum
|
1822 |
+
amplitudes of only the completely indistinguishable photons. This conjecture generalizes the well-known HOM effect
|
1823 |
+
[5] to more than two photons and arbitrary interferometer (and also to non-ideal detectors) and the observations made
|
1824 |
+
in Ref. [6]. It has been confirmed by all suppression laws in Refs. [2, 3]. Thus, by the conjecture, any suppression
|
1825 |
+
law which is not broken by partial the distinguishability of photons needs other suppression laws for smaller total
|
1826 |
+
numbers of photons.
|
1827 |
+
Now, this effect will be illustrated for a simple case. Let an experimental setup where N photons are prepared
|
1828 |
+
from independent sources in either N pure internal states |φi⟩, i = 1, . . . , N. If, for instance, an input has one mode
|
1829 |
+
occupied by one photon and this photon is partially distinguishable from the rest of N − 1 photons, we can use just
|
1830 |
+
two internal states |1⟩ and |2⟩, with |φk⟩ = |1⟩ for 1 ≤ k ≤ N − 1 and |φN⟩ = cosα|1⟩ + sinα|2⟩. Note that, the last
|
1831 |
+
photon becomes indistinguishable from the others when α = 0 and distinguishable when α = π/2. Therefore, we have
|
1832 |
+
the following state at the input:
|
1833 |
+
ˆρm = 1
|
1834 |
+
m!
|
1835 |
+
N−1
|
1836 |
+
�
|
1837 |
+
i=1
|
1838 |
+
ˆa†
|
1839 |
+
ki,1ˆa†
|
1840 |
+
kN,φN |0⟩⟨0|
|
1841 |
+
N−1
|
1842 |
+
�
|
1843 |
+
i=1
|
1844 |
+
ˆaki,1ˆakN,φN , m! = m1!m2!...mM!,
|
1845 |
+
(43)
|
1846 |
+
where the first index of the creation/annihilation operators is related to the spatial mode and the second index to the
|
1847 |
+
internal state. The creation operator of the N-th photon is then given by:
|
1848 |
+
ˆa†
|
1849 |
+
kN,φN = cosα ˆa†
|
1850 |
+
kN,1 + sinα ˆa†
|
1851 |
+
kN,2,
|
1852 |
+
(44)
|
1853 |
+
We define a set of POVMs ˆΠn related to the detection of the photons in the configurations n at the output:
|
1854 |
+
ˆΠn = 1
|
1855 |
+
n!
|
1856 |
+
�
|
1857 |
+
j
|
1858 |
+
N
|
1859 |
+
�
|
1860 |
+
i=1
|
1861 |
+
ˆb†
|
1862 |
+
li,ji|0⟩⟨0|
|
1863 |
+
N
|
1864 |
+
�
|
1865 |
+
i=1
|
1866 |
+
ˆbli,ji , n! = n1!n2!...nM!,
|
1867 |
+
(45)
|
1868 |
+
|
1869 |
+
8
|
1870 |
+
where the sum in j is over the internal states ji = 1, 2. Then, after some calculations we can get the following
|
1871 |
+
expression for the probability:
|
1872 |
+
P(n|m, α) =
|
1873 |
+
�
|
1874 |
+
j
|
1875 |
+
Tr
|
1876 |
+
�
|
1877 |
+
ˆρm ˆΠn
|
1878 |
+
�
|
1879 |
+
=
|
1880 |
+
1
|
1881 |
+
m!n!
|
1882 |
+
�
|
1883 |
+
j
|
1884 |
+
�����⟨0|
|
1885 |
+
N
|
1886 |
+
�
|
1887 |
+
i=1
|
1888 |
+
ˆbli,ji
|
1889 |
+
N−1
|
1890 |
+
�
|
1891 |
+
i=1
|
1892 |
+
ˆa†
|
1893 |
+
ki,1
|
1894 |
+
�
|
1895 |
+
cosα ˆa†
|
1896 |
+
kN,1 + sinα ˆa†
|
1897 |
+
kN,2
|
1898 |
+
�
|
1899 |
+
|0⟩
|
1900 |
+
�����
|
1901 |
+
2
|
1902 |
+
= cos2α
|
1903 |
+
m!n!
|
1904 |
+
���⟨0
|
1905 |
+
�����
|
1906 |
+
N
|
1907 |
+
�
|
1908 |
+
i=1
|
1909 |
+
ˆbli,1
|
1910 |
+
N
|
1911 |
+
�
|
1912 |
+
i=1
|
1913 |
+
ˆa†
|
1914 |
+
ki,1|0⟩
|
1915 |
+
�����
|
1916 |
+
2
|
1917 |
+
+ sin2α
|
1918 |
+
m!n!
|
1919 |
+
�
|
1920 |
+
j
|
1921 |
+
�����⟨0|
|
1922 |
+
N
|
1923 |
+
�
|
1924 |
+
i=1
|
1925 |
+
ˆbli,ji
|
1926 |
+
N−1
|
1927 |
+
�
|
1928 |
+
i=1
|
1929 |
+
ˆa†
|
1930 |
+
ki,1ˆakN,2|0⟩
|
1931 |
+
�����
|
1932 |
+
2
|
1933 |
+
= cos2α |b⟨n|m⟩a|2 + sin2α
|
1934 |
+
m!n!
|
1935 |
+
�
|
1936 |
+
j
|
1937 |
+
�����⟨0|
|
1938 |
+
N
|
1939 |
+
�
|
1940 |
+
i=1
|
1941 |
+
ˆbli,ji
|
1942 |
+
N−1
|
1943 |
+
�
|
1944 |
+
i=1
|
1945 |
+
ˆa†
|
1946 |
+
ki,1
|
1947 |
+
� M
|
1948 |
+
�
|
1949 |
+
l=1
|
1950 |
+
Uklˆb†
|
1951 |
+
l,2
|
1952 |
+
�
|
1953 |
+
|0⟩
|
1954 |
+
�����
|
1955 |
+
2
|
1956 |
+
= cos2α |b⟨n|m⟩a|2 + sin2α
|
1957 |
+
M
|
1958 |
+
�
|
1959 |
+
l=1
|
1960 |
+
|Ukl|2 |b⟨n − 1l|m − 1k⟩a|2 .
|
1961 |
+
(46)
|
1962 |
+
In the previous equation, we have developed suppression laws for the amplitudes b⟨n|m⟩a in the main text. However,
|
1963 |
+
in principle, the other terms b⟨n − 1l|m − 1k⟩a are non zero and then we need to use another sequence of recurrence
|
1964 |
+
relations to eliminate the photons at n − 1l.
|
1965 |
+
Let us focus on the distinguishable projection of the previous equation. The sum over l has M non-zero terms, each
|
1966 |
+
one being a product of two probabilities: a probability of the transition of one distinguishable photon to one output
|
1967 |
+
mode l (such that nl > 0 in n) multiplied by the probability of detecting the remaining N −1 indistinguishable photons
|
1968 |
+
to the reduced output n − 1l. Except the trivial case of the single-photon probability being zero, all probabilities of
|
1969 |
+
detecting N − 1 photons in the outputs n − 1l should be zero for zero output probability of such N photons.
|
1970 |
+
To illustrate this effect in our results, let us consider the simple example, where have m1 + m2 photons interfer-
|
1971 |
+
ing in a beamsplitter and we want to calculate the probability P(n1, 1|m1, m2, α). Considering that the partially
|
1972 |
+
distinguishable photon is injected at the input mode k = 1, we arrive at the following probability:
|
1973 |
+
P(n1, 1|m1, m2, α) = cos2α|b⟨n|m⟩a|2 +
|
1974 |
+
+ sin2α
|
1975 |
+
�
|
1976 |
+
|U11|2|b⟨n1 − 1, 1|m1 − 1, m2⟩a|2 + |U12|2|b⟨n1, 0|m1 − 1, m2⟩a|2�
|
1977 |
+
,
|
1978 |
+
(47)
|
1979 |
+
where the first term is zero for τ = m1/(m1 +m2), according to the main text. However, ignoring the trivial solutions
|
1980 |
+
τ = 0, 1, the second term is zero when τ = (m1 − 1)/(m1 + m2 − 1) and the last is zero only for trivial solutions.
|
1981 |
+
Therefore the suppression law is broken, as the probability P(n1, 1|m1, m2, α) is no longer zero, because the three
|
1982 |
+
terms cannot be simultaneously zero for τ ̸= 0, 1.
|
1983 |
+
Now, let us consider the interference in the tritter T (1), with phase θ = π/2, and the probability P(n1, 1, 1|n1, 1, 1, α).
|
1984 |
+
If the partially distinguishable photon is injected at k = 1, we have
|
1985 |
+
P(n1, 1, 1|n1, 1, 1, α) = cos2α|b⟨n|m⟩a|2 + sin2α
|
1986 |
+
�
|
1987 |
+
|U11|2|b⟨n1 − 1, 1, 1|n1, 1, 0⟩a|2 +
|
1988 |
+
+|U12|2|b⟨n1, 0, 1|n1, 1, 0⟩a|2 + |U13|2|b⟨n1, 1, 0|n1, 1, 0⟩a|2�
|
1989 |
+
,
|
1990 |
+
(48)
|
1991 |
+
where the first term is zero for τ1 = 3n1/(4n1 + 1), according to the Table I in the main text. The other three need
|
1992 |
+
to satisfy respectively the following equations
|
1993 |
+
(n1 + 1)
|
1994 |
+
�
|
1995 |
+
τ1(1 − τ1) +
|
1996 |
+
√
|
1997 |
+
3(n1 + 1)τ1 −
|
1998 |
+
√
|
1999 |
+
3n1 = 0,
|
2000 |
+
(n1 + 1)
|
2001 |
+
�
|
2002 |
+
τ1(1 − τ1) −
|
2003 |
+
√
|
2004 |
+
3(n1 + 1)τ1 +
|
2005 |
+
√
|
2006 |
+
3n1 = 0,
|
2007 |
+
4(n1 + 1)τ1
|
2008 |
+
√
|
2009 |
+
1 − τ1 − 3
|
2010 |
+
√
|
2011 |
+
1 − τ1 = 0.
|
2012 |
+
(49)
|
2013 |
+
where the last lead to τ1 = 1 or τ1 = 3/4(n1 + 1), which are not solutions of the first two equations. Therefore, the
|
2014 |
+
probability P(n1, 1, 1|n1, 1, 1, α) cannot be zero.
|
2015 |
+
[1] R. A. Campos, Three-photon Hong-Ou-Mandel interference at a multiport mixer, Phys. Rev. A 62, 013809 (2000)
|
2016 |
+
|
2017 |
+
9
|
2018 |
+
[2] C. Dittel, G. Dufour, M. Walschaers, Totally destructive many-particle interference, Phys. Rev. Lett. 120, 240404 (2018).
|
2019 |
+
[3] C. Dittel, G. Dufour, M. Walschaers, G. Weihs, A. Buchleitner, R. Keil, Totally destructive interference for permutation-
|
2020 |
+
symmetric many-particle states, Phys. Rev. A 97, 062116 (2018).
|
2021 |
+
[4] V. S. Shchesnovich, Partial indistinguishability theory for multiphoton experiments in multiport devices, Phys. Rev. A 91,
|
2022 |
+
013844 (2015).
|
2023 |
+
[5] C. K. Hong, Z. Y. Ou, and L. Mandel, Measurement of subpicosecond time intervals between two photons by interference,
|
2024 |
+
Phys. Rev. Lett. 59, 2044 (1987).
|
2025 |
+
[6] M. C. Tichy, Sampling of partially distinguishable bosons and the relation to the multidimensional permanent, Phys. Rev.
|
2026 |
+
A 91, 022316 (2015).
|
2027 |
+
|
DdE0T4oBgHgl3EQfQQD8/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
E9E4T4oBgHgl3EQfGwxn/content/tmp_files/2301.04897v1.pdf.txt
ADDED
@@ -0,0 +1,1622 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04897v1 [gr-qc] 12 Jan 2023
|
2 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE
|
3 |
+
SPACETIME
|
4 |
+
ABSOS ALI SHAIKH1, FAIZUDDIN AHMED2 AND BISWA RANJAN DATTA3
|
5 |
+
Abstract. The objective of the paper is to study the geometric properties of the point-
|
6 |
+
like global monopole (briefly, PGM) spacetime, which is a static and spherically symmetric
|
7 |
+
solution of Einstein field equation. It is shown that PGM spacetime admits various types of
|
8 |
+
pseudosymmetric structures, such as, pseudosymmetry due to Weyl conformal curvature tensor,
|
9 |
+
pseudosymmetry due to concircular curvature tensor, pseudosymmetry due to conharmonic
|
10 |
+
curvature tensor, Ricci generalized conformal pseudosymmetric due to projective curvature
|
11 |
+
tensor, Ricci generalized projective pseudosymmetric etc. Moreover, it is proved that PGM
|
12 |
+
spacetime is 2-quasi Einstein, generalized quasi-Einstein, Einstein manifold of degree 2 and
|
13 |
+
its Weyl conformal curvature 2-forms are recurrent. It is also shown that the stress energy
|
14 |
+
momentum tensor of the PGM spacetime realizes several types of pseudosymmetry, and its Ricci
|
15 |
+
tensor is compatible for Riemann curvature, Weyl conformal curvature, projective curvature,
|
16 |
+
conharmonic curvature and concircular curvature. Further, it is shown that PGM spacetime
|
17 |
+
admits motion, curvature collineation and Ricci collineation. Also, the notion of curvature
|
18 |
+
inheritance (resp., curvature collineation) for the (1,3)-type curvature tensor is not equivalent
|
19 |
+
to the notion of curvature inheritance (resp., curvature collineation) for the (0,4)-type curvature
|
20 |
+
tensor as it is shown that such distinctive properties are possessed by PGM spacetime. Hence
|
21 |
+
the notions of curvature inheritance defined by Duggal [1] and Shaikh and Datta [2] are not
|
22 |
+
equivalent.
|
23 |
+
1. Introduction
|
24 |
+
Let M be a smooth and connected manifold of dimension n (≥ 3) equipped with a semi-
|
25 |
+
Riemannian metric g of signature (δ, n−δ), 0 ≤ δ ≤ n. If δ = 1 or n−1 (resp., δ = 0 or n), then
|
26 |
+
M is known as a Lorentzian (resp., Riemannian) manifold, and spacetimes are the mathemati-
|
27 |
+
cal models of 4-dimensional connected Lorentzian manifolds. Throughout the paper ∇, R, S, κ
|
28 |
+
respectively denote the Levi-Civita connection, Riemann curvature tensor of type (0, 4), Ricci
|
29 |
+
tensor of type (0, 2) and the scalar curvature of M.
|
30 |
+
Date: January 13, 2023.
|
31 |
+
2020 Mathematics Subject Classification. 53B20, 53B25, 53B30, 53B50, 53C15, 53C25, 53C35, 83C15.
|
32 |
+
Key words and phrases. Point-like global monopole metric, Einstein field equation, semisymmetric type
|
33 |
+
tensor, Weyl conformal curvature tensor, pseudosymmetric type curvature condition, 2-quasi-Einstein manifold.
|
34 |
+
1
|
35 |
+
|
36 |
+
2
|
37 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
38 |
+
To understand the symmetry of a semi-Riemannian manifold, curvature rigorously perform
|
39 |
+
a crucial role as in 1926 Cartan introduced the notion of locally symmetry [3] by the relation
|
40 |
+
∇R = 0 and the notion of semisymmetry [4] by the relation R · R = 0 in 1946 (later classified
|
41 |
+
by Szab´o [5–7]). During last eight decades, several differential geometers and physicists debil-
|
42 |
+
itated such curvature conditions to generalize the concept of symmetry in various directions,
|
43 |
+
which infers different generalized notions of symmetry, such as, pseudosymmetric manifolds
|
44 |
+
by Chaki [8, 9], pseudosymmetric manifolds by Adam´ow and Deszcz [10], weakly symmetric
|
45 |
+
manifolds by Tam´assy and Binh [11, 12], recurrent manifolds by Ruse [13–16], curvature 2-
|
46 |
+
forms of recurrent manifolds [17,18], several kinds of generalized recurrent manifolds by Shaikh
|
47 |
+
et al. [19–24] etc. We note that Som-Raychaudhuri spacetime [25], Robertson-Walker space-
|
48 |
+
time [26,27], G¨odel spacetime [28], Siklos spacetime [29], Robinson-Trautman spacetime [30] and
|
49 |
+
Reissner-Nordstr¨om spacetime [31] admit different pseudosymmetric type geometric structures.
|
50 |
+
There are two major aspects of geometric structures of a certain spacetime, one is for geom-
|
51 |
+
etry and another is its physical nature due to the Einstein field equation (briefly, EFE). The
|
52 |
+
main moto of this paper is to explore the geometric structures of PGM spacetime in terms of
|
53 |
+
curvatures appearing by means of first order as well as higher order covariant derivatives.
|
54 |
+
Again, to constitute gravitational potentials satisfying EFE, imposing of symmetry is a vital
|
55 |
+
tool, which implies that the geometrical symmetries play a crucial role in the theory of general
|
56 |
+
relativity. A geometric quantity is preserved along a vector field if the Lie derivative of certain
|
57 |
+
tensor vanishes with respect to that vector field, and the vanishing Lie derivative illustrates ge-
|
58 |
+
ometrical symmetries. Motion, curvature collineation, Ricci collineation etc. are the notions of
|
59 |
+
such symmetries. Katzin et al. [32,33] rigorously investigated the role of curvature collineation
|
60 |
+
in general relativity. In 1992, Duggal [1] introduced the notion of curvature inheritance general-
|
61 |
+
izing the concept of curvature collineation for the (1,3)-type curvature tensor. Recently, Shaikh
|
62 |
+
and Datta [2] introduced the concept of generalized curvature inheritance, which is a general-
|
63 |
+
ization of curvature collineation as well as curvature inheritance for the (0,4)-type curvature
|
64 |
+
tensor. During last three decades, a plenty of papers (see, [2,34–45]) appeared in the literature
|
65 |
+
regarding the investigations of such kinds of symmetries. In this papar, it is also found that
|
66 |
+
the PGM spacetime admits several symmetries, such as, motion, curvature collineation, Ricci
|
67 |
+
collineation and curvature inheritance. Also, it is shown that the notions of curvature inheri-
|
68 |
+
tance as well as curvature collineation for the (1,3)-type curvature tensor by Duggal [1] and for
|
69 |
+
the (0,4)-type curvature tensor by Shaikh and Datta [2] are not equivalent as PGM spacetime
|
70 |
+
|
71 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
72 |
+
3
|
73 |
+
realizes such distinctive properties.
|
74 |
+
Some Grand Unified Theories suggested that topological defects may have been produced
|
75 |
+
during the phase transition in the early universe through a spontaneous symmetry breaking
|
76 |
+
mechanism [46, 47]. There are different kinds of topological defects, and among them, cosmic
|
77 |
+
strings [48, 49] and global monopoles [50–53] have been widely studied in the literature. A
|
78 |
+
global monopole is a heavy object characterized by spherically symmetry and divergent mass.
|
79 |
+
The gravitational field of a static global monopole was found by Barriola et al. [50] and is
|
80 |
+
expected to be stable against spherical as well as polar perturbation.
|
81 |
+
The line element of PGM spacetime, which is a static and spherically symmetric metric in
|
82 |
+
(t, r, , θ, φ) coordinates, is described by [50]
|
83 |
+
ds2 = −dt2 + dr2
|
84 |
+
α2 + r2 (dθ2 + sin2 θ dφ2),
|
85 |
+
(1.1)
|
86 |
+
where α2 =
|
87 |
+
�
|
88 |
+
1 − 8πη2
|
89 |
+
0
|
90 |
+
�
|
91 |
+
< 1 depends on the energy scale η0. The parameter η0 represents the
|
92 |
+
dimensionless volumetric mass density of the PGM defect. Here, the different coordinates are
|
93 |
+
in the ranges −∞ < t < +∞,
|
94 |
+
0 ≤ r < ∞,
|
95 |
+
0 ≤ θ ≤ π
|
96 |
+
2, and 0 ≤ φ < 2 π. The PGM spacetime
|
97 |
+
reveals some interesting features delineated as follows:
|
98 |
+
(i) it is not globally flat, and possesses a naked curvature singularity on the axis given by
|
99 |
+
the Ricci scalar κ = 2 (α2−1)
|
100 |
+
r2
|
101 |
+
,
|
102 |
+
(ii) the area of a sphere of radius r in this manifold is not 4 π r2 but rather it is equal to
|
103 |
+
4 π α2 r2,
|
104 |
+
(iii) the surface θ = π
|
105 |
+
2 presents the geometry of a cone with the deficit angle ∇ φ = 8 π2 η2
|
106 |
+
0
|
107 |
+
and
|
108 |
+
(iv) there is no Newtonian-like gravitational potential: gtt = −1.
|
109 |
+
Furthermore, in this topological defect space-time geometry the solid angle of a sphere of
|
110 |
+
radius r is 4 π2 r2 α2 which is smaller than 4 π2 r2, and hence, there is a solid angle deficit
|
111 |
+
∇ Ω = 32 π2 η2
|
112 |
+
0. Other interesting features of this PGM spacetime have been given in details
|
113 |
+
in [54]. If α → 1, one can obtain the spherically symmetric Minkowski flat space line element.
|
114 |
+
The effects of global monopole in quantum mechanical systems have been studied in the liter-
|
115 |
+
ature (see, [54–80]).
|
116 |
+
The present paper exhibits several curvature properties of PGM spacetime accomplished by
|
117 |
+
the metric (1.1), such as, pseudosymmetry due to Weyl conformal curvature, pseudosymme-
|
118 |
+
try due to concircular curvature, pseudosymmetry due to conharmonic curvature etc. Also,
|
119 |
+
|
120 |
+
4
|
121 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
122 |
+
it is neither Einstein nor quasi-Einstein but it is an Einstein manifold of level 2, generalized
|
123 |
+
quasi Einstein, 2-quasi-Einstein manifold and conformal curvature 2-forms are recurrent, etc.
|
124 |
+
Moreover, it is shown that this metric is Ricci generalized conformal pseudosymmetric due to
|
125 |
+
projective curvature tensor, Ricci generalized projective pseudosymmetric etc. Ricci tensor is
|
126 |
+
neither Codazzi type nor cyclic parallel. Additionally, it is shown that the energy momentum
|
127 |
+
tensor also admits several types of pseudosymmetric structures and Ricci tensor is compatible
|
128 |
+
for Riemann, conformal, projective, concircular and conharmonic curvature tensors. Finally, it
|
129 |
+
is shown that with respect to certain vector fields the PGM spacetime reveals motion, curvature
|
130 |
+
collineation, Ricci collineation and curvature inheritance. Also, by exhibiting some distinctive
|
131 |
+
properties of PGM spacetime, it is shown that the notions of curvature inheritance for (1,3)-
|
132 |
+
type curvature tensor and the (0,4)-type curvature tensor are not equivalent.
|
133 |
+
The paper is organized in the following way: in Section 2 we have discussed various rudi-
|
134 |
+
mentary facts regarding various curvature tensors and their derivatives, which are essential
|
135 |
+
throughout the paper to investigate the geometric properties of PGM spacetime. Section 3 is
|
136 |
+
devoted to the study of several geometric structures of PGM spacetime and several interesting
|
137 |
+
findings are obtained. In Section 4, we determine some geometric structures due to energy
|
138 |
+
momentum tensor of the spacetime. In Section 5 it is shown that the PGM spacetime admits
|
139 |
+
some symmetries, such as, motion, curvature collineation, Ricci collineation and curvature in-
|
140 |
+
heritance. Also, the distinctness of the notions of curvature inheritance for (1,3)-type curvature
|
141 |
+
tensor and for (0,4)-type curvature tensor, has been exhibited for a PGM spacetime. Finally,
|
142 |
+
the last section consists of the conclusion of the paper briefly.
|
143 |
+
2. Preliminaries
|
144 |
+
The aim of this section is to explain different kinds of geometric structures originated by
|
145 |
+
appointing restrictions on the curvatures and their covariant derivatives, which are effective to
|
146 |
+
elaborate the symmetry of the PGM spacetime having certain geometric meanings. Also, the
|
147 |
+
notions of motion, curvature inheritance, Ricci inheritance are illustrated in this section.
|
148 |
+
For two symmetric second order covariant tensors ν1 and ν2, the Kulkarni-Nomizu product
|
149 |
+
ν1 ∧ ν2 is defined by (see, [81–83])
|
150 |
+
(ν1 ∧ ν2)(η1, η2, ι1, ι2)
|
151 |
+
=
|
152 |
+
ν1(η1, ι2)ν2(η2, ι1) + ν1(η2, ι1)ν2(η1, ι2)
|
153 |
+
−
|
154 |
+
ν1(η1, ι1)ν2(η2, ι2) − ν1(η2, ι2)ν2(η1, ι1),
|
155 |
+
|
156 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
157 |
+
5
|
158 |
+
where η1, η2, ι1, ι2 ∈ χ(M), the Lie algebra of all smooth vector fields on M. Now, We define
|
159 |
+
some endomorphisms given as follows: (see, [28,31,81,82,84,85])
|
160 |
+
(η1 ∧ν η2)ι
|
161 |
+
=
|
162 |
+
ν(η2, ι)η1 − ν(η1, ι)η2,
|
163 |
+
IR(η1, η2)
|
164 |
+
=
|
165 |
+
[∇η1, ∇η2] − ∇[η1,η2],
|
166 |
+
IC(η1, η2)
|
167 |
+
=
|
168 |
+
IR(η1, η2) −
|
169 |
+
1
|
170 |
+
n − 2
|
171 |
+
×
|
172 |
+
�
|
173 |
+
E η1 ∧g η2 + η1 ∧g E η2 −
|
174 |
+
κ
|
175 |
+
n − 1η1 ∧g η2
|
176 |
+
�
|
177 |
+
,
|
178 |
+
IK(η1, η2)
|
179 |
+
=
|
180 |
+
IR(η1, η2) −
|
181 |
+
1
|
182 |
+
n − 2 (E η1 ∧g η2 + η1 ∧g E η2) ,
|
183 |
+
IW(η1, η2)
|
184 |
+
=
|
185 |
+
IR(η1, η2) −
|
186 |
+
κ
|
187 |
+
n(n − 1) η1 ∧g η2,
|
188 |
+
IP(η1, η2)
|
189 |
+
=
|
190 |
+
IR(η1, η2) −
|
191 |
+
1
|
192 |
+
n − 1 η1 ∧S η2,
|
193 |
+
where ν is a (0,2) type symmetric tensor and E is the Ricci operator defined by S(η1, η2) =
|
194 |
+
g(η1, E (η2)).
|
195 |
+
Throughout this study we suppose that the smooth vector fields η, η1, η2 · · · ,
|
196 |
+
ι, ι1, ι2 · · · ∈ χ(M). Now, corresponding to an endomorphism I(ι1, ι2), a (0, 4)-tensor I can be
|
197 |
+
defined as
|
198 |
+
I(ι1, ι2, ι3, ι4) = g(I(ι1, ι2)ι3, ι4).
|
199 |
+
If the corresponding endomorphism I is replaced by IR (resp., IC, IK, IW and IP), the (0, 4)-
|
200 |
+
tensor I turns into the Riemann curvature tensor R (resp., conformal curvature C, conharmonic
|
201 |
+
curvature K, concircular curvature W and projective curvature P).
|
202 |
+
On a (0, r)-tensor ζ, r ≥ 1, we simulate an endomorphism I(ι1, ι2) to define (0, r + 2)-type
|
203 |
+
tensor I · ζ given as follows ( [25,86–89]):
|
204 |
+
(I · ζ)(η1, η2, · · · , ηr, ι1, ι2)
|
205 |
+
=
|
206 |
+
(I(ι1, ι2)ζ)(η1, η2, · · · , ηr)
|
207 |
+
=
|
208 |
+
−ζ(I(ι1, ι2)η1, η2, · · · , ηr) − · · · − ζ(η1, η2, · · · , I(ι1, ι2)ηr).
|
209 |
+
If we take I(ι1, ι2) = ι1 ∧ν ι2, then the (0, r + 2)-type tensor Q(ν, ζ) is known as Tachibana
|
210 |
+
tensor defined as ( [89–92])
|
211 |
+
Q(ν, ζ)(η1, η2, · · · , ηr, ι1, ι2) = ((ι1 ∧ν ι2)ζ)(η1, η2, · · · , ηr)
|
212 |
+
= ν(ι1, ι1)ζ(ι2, η2, · · · , ηr) + · · · + ν(ι1, ιr)ζ(η1, η2, · · · , ι2)
|
213 |
+
−ν(ι2, η1)ζ(ι1, η2, · · · , ηr) − · · · − ν(ι2, ηr)ζ(η1, η2, · · · , ι1).
|
214 |
+
|
215 |
+
6
|
216 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
217 |
+
In terms of the local coordinates, the tensor I · ζ and the Tachibana tensor Q(ν, ζ) can be
|
218 |
+
rewritten as
|
219 |
+
(I · ζ)b1b2...brαβ
|
220 |
+
=
|
221 |
+
−guv[Iαβb1vζub2...br + · · · + Iαβblvζb1b2...u],
|
222 |
+
Q(ν, ζ)b1b2...brαβ
|
223 |
+
=
|
224 |
+
νb1βζαb2...br + · · · + νbrβζb1b2...α
|
225 |
+
−
|
226 |
+
νb1αζβb2...br − · · · − νbrαζb1b2...β.
|
227 |
+
Definition 2.1. [10, 91, 93–99] If the condition I · ζ = fζQ(g, ζ) holds for a smooth scalar
|
228 |
+
function fζ on M, i.e., the tensors I · ζ and Q(g, ζ) are linearly dependent on M, then M is
|
229 |
+
called a ζ-pseudosymmetric manifold due to the tensor I. Also, if the tensors I · ζ and Q(S, ζ)
|
230 |
+
are linearly dependent by the relation I · ζ = �fζQ(S, ζ) with a smooth scalar function �fζ on
|
231 |
+
M, then M is called a Ricci generalized ζ-pseudosymmetric manifold due to the tensor I. In
|
232 |
+
particular, a ζ-semisymmetric manifold due to the tensor I is defined by the relation I · ζ = 0.
|
233 |
+
In the relation I · ζ = fζQ(g, ζ) if I = ζ = R, then M is simply called a pseudosymmetric
|
234 |
+
manifold and for I = R and ζ = K (resp., S, P, W and C), it is called conharmonic (resp.,
|
235 |
+
Ricci, projective, concircular and conformal) pseudosymmetric manifold.
|
236 |
+
Similarly, various
|
237 |
+
types of Ricci generalized pseudosymmetric and semisymmetric manifolds can be obtained by
|
238 |
+
considering I and ζ as others curvature tensors.
|
239 |
+
Again, if the Ricci tensor S is proportional to the metric tensor g on M, i.e., S = κ
|
240 |
+
ng, then M is
|
241 |
+
said to be an Einstein manifold [17], and the manifold M is called m-quasi-Einstein [85,100–102]
|
242 |
+
if the rank of (S−αg) is m for some scalar α, and in this case Ricci tensor locally takes the form
|
243 |
+
S = αg +βΓ⊗Γ with some scalars α, β and 1-form Γ. Also if α = 0, then the m-quasi-Einstein
|
244 |
+
manifold turns into a Ricci simple manifold.
|
245 |
+
We note that Morris-Thorne spacetime [103]
|
246 |
+
and G¨odel spacetime [28] are Ricci simple manifolds, Robertson-Walker spacetime [26] and
|
247 |
+
Siklos spacetime [29] are quasi-Einstein manifolds, Kantowski-Sachs spacetime [84] and Som-
|
248 |
+
Raychaudhuri spacetime [25] are 2-quasi Einstein manifolds and Kaigorodov spacetime [29] is
|
249 |
+
an Einstein manifold. For curvature properties of Robinson-Trautman metric, Melvin magnetic
|
250 |
+
metric and generalized pp-wave metric, etc., we refer the reader to see [30,104–106].
|
251 |
+
Definition 2.2. [107] The manifold M is said to be generalized quasi-Einstein if
|
252 |
+
S = αg + βΘ ⊗ Θ + γ(Θ ⊗ Σ + Σ ⊗ Θ)
|
253 |
+
holds for some smooth scalar functions α, β, γ and mutually orthogonal 1-forms Θ and Σ.
|
254 |
+
|
255 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
256 |
+
7
|
257 |
+
In the literature, there are other notions of generalized quasi-Einstein manifolds (see, Shaikh
|
258 |
+
[100]). But throughout the paper we will consider the generalized quasi-Einstein manifold by
|
259 |
+
Chaki [107] as given in Definition 2.2.
|
260 |
+
Definition 2.3. ( [17, 85, 91, 108]) If S2, S3, S4, defined by Sλ+1(ι1, ι2) = Sλ(ι1, E ι2) with
|
261 |
+
λ = 1, 2, 3, are linearly dependent by the relation
|
262 |
+
ℵ1g + ℵ2S + ℵ3S2 + ℵ4S3 + S4 = 0
|
263 |
+
(resp.,
|
264 |
+
ℵ5g + ℵ6S + ℵ7S2 + S3 = 0 and ℵ8g + ℵ9S + S2 = 0)
|
265 |
+
on M for some scalar functions ℵi (1 ≤ i ≤ 9), then M is called an Ein(4) (resp., Ein(3) and
|
266 |
+
Ein(2)) manifold.
|
267 |
+
It is noteworthy to mention that Melvin magnetic spacetime [109] and Siklos spacetime [29]
|
268 |
+
are Ein(2) manifolds, while Lifshitz spacetime [110] and Som-Raychaudhuri spacetime [25] are
|
269 |
+
Ein(3) manifolds.
|
270 |
+
Definition 2.4. [25, 85, 89, 111–114] If the Riemann-Christoffel curvature tensor R can be
|
271 |
+
expressed as a linear combination of the tensors g ∧g, g ∧S, S ∧S, g ∧S2, S ∧S2 and S2 ∧S2,
|
272 |
+
given by
|
273 |
+
R = (B1S2 + B2S + B3g) ∧ S2 + (B4S + B5g) ∧ S + B6(g ∧ g)
|
274 |
+
(resp.,
|
275 |
+
R = (B7S + B8g) ∧ S + B9g ∧ g)
|
276 |
+
for some scalars Bi, 1 ≤ i ≤ 9, then M is called a generalized Roter type (resp., Roter
|
277 |
+
type [86,114–117]) manifold.
|
278 |
+
We mention that Vaidya-Bonner spacetime [106] and Lifshitz spacetime [110] are generalized
|
279 |
+
Roter type manifold, and Nariai spacetime [105] and Melvin magnetic spacetime [109] are Roter
|
280 |
+
type manifold.
|
281 |
+
Definition 2.5. [11,12] A manifold M is called a weakly symmetric in the sense of Tam´assy
|
282 |
+
and Binh if the covariant derivative of Riemann curvature tensor R can be expressed in the
|
283 |
+
form
|
284 |
+
(∇XR)(η1, η2, η3, η4)
|
285 |
+
=
|
286 |
+
Π(X) ⊗ R(η1, η2, η3, η4) + Φ(η4) ⊗ R(η1, η2, η3, X)
|
287 |
+
+
|
288 |
+
Φ(η3) ⊗ R(η1, η2, X, η4) + Ψ(η2) ⊗ R(η1, X, η3, η4)
|
289 |
+
+
|
290 |
+
Ψ(η1) ⊗ R(X, η2, η3, η4),
|
291 |
+
|
292 |
+
8
|
293 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
294 |
+
where Π, Φ and Ψ are associated 1-forms on M. In particular, if Π = 2Φ = 2Ψ, it is a Chaki
|
295 |
+
pseudosymmetric manifold [8,9].
|
296 |
+
Definition 2.6. The Ricci tensor of a manifold M is cyclic parallel (see, [118–121]) if
|
297 |
+
(∇η1S)(η2, η3) + (∇η2S)(η3, η1) + (∇η3S)(η1, η2) = 0
|
298 |
+
holds and Codazzi type if the Ricci tensor realizes the relation (see, [122,123])
|
299 |
+
(∇η1S)(η2, η3) = (∇η2S)(η1, η3).
|
300 |
+
We note that the Ricci tensor of G¨odel spacetime [28] is cyclic parallel and the Ricci tensor
|
301 |
+
of (t − z)-type plane wave metric [104] is of Codazzi type.
|
302 |
+
Definition 2.7. ( [87,90,111,124–127])
|
303 |
+
Let ζ be a (0, 4)-type tensor on M. Then a symmetric (0,2)-type tensor ν corresponding to
|
304 |
+
the endomorphism Iν is said to be ζ-compatible if
|
305 |
+
ζ(Iνη1, ι, η2, η3) + ζ(Iνη2, ι, η3, η1) + ζ(Iνη3, ι, η1, η2) = 0,
|
306 |
+
holds on M. Again, if ϕ ⊗ ϕ is ζ-compatible for an 1-form ϕ, then ϕ is called a ζ-compatible.
|
307 |
+
Replacing ζ by the curvature tensor R (resp., C, W, P and K), the Riemann (resp., confor-
|
308 |
+
mal, concircular, projective and conharmonic) compatibility of ν can be obtained.
|
309 |
+
Definition 2.8. For a tensor I of type (0, 4), the curvature 2-forms Ωm
|
310 |
+
(I)l [128] are called
|
311 |
+
recurrent [18,129–131] if
|
312 |
+
S
|
313 |
+
η1,η2,η3(∇η1I)(η2, η3, ι, η) =
|
314 |
+
S
|
315 |
+
η1,η2,η3 σ(η1)I(η2, η3, ι, η)
|
316 |
+
holds on M, where S is the cyclic sum over η1, η2, η3 and for a (0, 2) tensor field ν, the 1-forms
|
317 |
+
∧(ν)l ( [128]) are called recurrent if (∇η1ν)(η2, ι) − (∇η2ν)(η1, ι) = σ(η1)ν(η2, ι) − σ(η2)ν(η1, ι),
|
318 |
+
for some 1-form σ.
|
319 |
+
Definition 2.9. ( [25,132,133]) For a (0, 4)-type tensor I if M admits the relation
|
320 |
+
S
|
321 |
+
η1,η2,η3 σ(η1) ⊗ I(η2, η3, ι, η) = 0,
|
322 |
+
where S is the cyclic sum over η1, η2, η3 and L(M) is the vector space of all 1-forms with
|
323 |
+
dimension ≥ 1, then M is called I-space by Venzi.
|
324 |
+
Now, we give some definitions of geometrical symmetries, such as, motion, curvature collineation,
|
325 |
+
curvature inheritance, Ricci collineation and Ricci inheritance, which are originated from the
|
326 |
+
Lie derivatives of several tensors.
|
327 |
+
|
328 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
329 |
+
9
|
330 |
+
Definition 2.10. A manifold M admits motion with respect to some vector field η if £ηg = 0,
|
331 |
+
where £η represents the Lie derivative with respect to η.
|
332 |
+
In 1969, Katzin et al. [32, 33] defined the notion of curvature collineation by vanishing Lie
|
333 |
+
derivative of the Riemann curvature tensor with respect to some vector field. Again, in 1992,
|
334 |
+
Duggal [1] generalizes the concept of curvature collineation by introducing the notion of curva-
|
335 |
+
ture inheritance.
|
336 |
+
Definition 2.11. ( [1]) A manifold M possesses curvature inheritance if there is a vector field
|
337 |
+
η which satisfies
|
338 |
+
£η �R = λ �R,
|
339 |
+
where λ is a scalar function and the (1,3)-type curvature tensor �R is associated with the (0,4)-
|
340 |
+
type curvature tensor R by the relation R(ι1, ι2, ι3, ι4) = g( �R(ι1, ι2)ι3, ι4). In particular, if λ = 0,
|
341 |
+
i.e., £η �R = 0, then it turns into curvature collineation [32,33].
|
342 |
+
Definition 2.12. ( [1]) A manifold M admits Ricci inheritance if it realizes the relation
|
343 |
+
£ηS = λS
|
344 |
+
for some vector field η and scalar function λ. Further, if λ = 0, it turns into Ricci collineation
|
345 |
+
(i.e., £ηS = 0).
|
346 |
+
Again, recently Shaikh and Datta [2] introduced the notion of generalized curvature inheri-
|
347 |
+
tance, which is defined as follows:
|
348 |
+
Definition 2.13. ( [2]) A manifold M admits generalized curvature inheritance if there is a
|
349 |
+
vector field η which possesses
|
350 |
+
£ηR = λR + λ1g ∧ g + λ2g ∧ S + λ3S ∧ S,
|
351 |
+
where λ, λ1, λ2, λ3 are the scalar functions. In particular, if λi = 0 for i = 1, 2, 3, then it M
|
352 |
+
admits curvature inheritance. Further, if λ = 0 = λi for i = 1, 2, 3, then it turns into curvature
|
353 |
+
collineation.
|
354 |
+
In this paper, it is shown that the notions of curvature inheritance in Definition 2.11 and
|
355 |
+
Definition 2.13 are not equivalent as shown by PGM spacetime.
|
356 |
+
|
357 |
+
10
|
358 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
359 |
+
3. Global monopole spacetime admitting geometric structures
|
360 |
+
In static and spherical coordinates (t, r, θ, φ) the line element of PGM spacetime is given by
|
361 |
+
(c = ℏ = G)
|
362 |
+
ds2 = −dt2 + dr2
|
363 |
+
α2 + r2 (dθ2 + sin2 θ dφ2),
|
364 |
+
(3.1)
|
365 |
+
which can be written as ds2 = gµν dxµ dxν, where g11 = −1, g22 =
|
366 |
+
1
|
367 |
+
α2, g33 = r2, g44 = r2 sin2 θ
|
368 |
+
and gij = 0, i ̸= j for i, j = 1, 2, 3, 4.
|
369 |
+
The non-vanishing components Γγ
|
370 |
+
µν of the Christoffel symbols of the second kind are given by
|
371 |
+
Γ3
|
372 |
+
23 = 1
|
373 |
+
r = Γ4
|
374 |
+
24,
|
375 |
+
Γ2
|
376 |
+
33 = −rα2,
|
377 |
+
Γ4
|
378 |
+
34 = cot θ,
|
379 |
+
Γ2
|
380 |
+
44 = −rα2 sin2 θ,
|
381 |
+
Γ3
|
382 |
+
44 = − cos θ sin θ.
|
383 |
+
The non-vanishing components (upto symmetry) of Riemann curvature tensor Rµνσλ and the
|
384 |
+
Ricci tensor of Sµν are obtained as follows:
|
385 |
+
R3434 = −r2(−1 + α2) sin2 θ;
|
386 |
+
(3.2)
|
387 |
+
S33 = −1 + α2, S44 = (−1 + α2) sin2 θ.
|
388 |
+
(3.3)
|
389 |
+
The scalar curvature κ is given by κ = 2(−1+α2)
|
390 |
+
r2
|
391 |
+
.
|
392 |
+
This leads to the following:
|
393 |
+
Proposition 3.1. The PGM spacetime (3.1) is neither Einstein nor quasi-Einstein manifold
|
394 |
+
but
|
395 |
+
(i) it is an Einstein manifold of degree 2, i.e., it fulfills the condition S2 = (−1+α2)
|
396 |
+
r2
|
397 |
+
S,
|
398 |
+
(ii) it is 2-quasi Einstein and generalized quasi-Einstein manifold,
|
399 |
+
(iii) its Riemann curvature can be decomposed by R =
|
400 |
+
r2
|
401 |
+
2(−1+α2)S ∧ S,
|
402 |
+
(iv) its Ricci tensor is Riemann compatible, conharmonic compatible, concircular compatible,
|
403 |
+
projective compatible and conformal compatible.
|
404 |
+
Let V1 = ∇R and V2 = ∇S. Then the non-vanishing components (upto symmetry) of the
|
405 |
+
covariant derivatives of the Riemann curvature tensor R and the Ricci tensor S are given by
|
406 |
+
V1
|
407 |
+
2334,4 = −r(−1 + α2) sin2 θ = −V1
|
408 |
+
2434,3, V1
|
409 |
+
3434,2 = 2r(−1 + α2) sin2 θ,
|
410 |
+
V2
|
411 |
+
23,3 = 1−α2
|
412 |
+
r , V2
|
413 |
+
24,4 = −(−1+α2) sin2 θ
|
414 |
+
r
|
415 |
+
, V2
|
416 |
+
33,2 = 2−2α2
|
417 |
+
r
|
418 |
+
, V2
|
419 |
+
44,2 = −2(−1+α2) sin2 θ
|
420 |
+
r
|
421 |
+
.
|
422 |
+
|
423 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
424 |
+
11
|
425 |
+
The components (upto symmetry) other than zero of the conformal curvature tensor C are
|
426 |
+
given below:
|
427 |
+
C1212 = −1+α2
|
428 |
+
3r2α2 , C1313 = 1−α2
|
429 |
+
6 , C1414 = −(−1+α2) sin2 θ
|
430 |
+
6
|
431 |
+
,
|
432 |
+
C2323 = 1
|
433 |
+
6 −
|
434 |
+
1
|
435 |
+
6α2, C2424 = (−1+α2) sin2 θ
|
436 |
+
6α2
|
437 |
+
, C3434 = −r2(−1+α2) sin2 θ
|
438 |
+
3
|
439 |
+
.
|
440 |
+
The components (upto symmetry) other than zero of the projective curvature tensor P are
|
441 |
+
shown as follows:
|
442 |
+
P1331 = −1+α2
|
443 |
+
3
|
444 |
+
, P1441 = 1
|
445 |
+
3(−1 + α2) sin2 θ, P2442 = −(−1+α2) sin2 θ
|
446 |
+
3α2
|
447 |
+
,
|
448 |
+
P2332 = 1
|
449 |
+
3(−1 +
|
450 |
+
1
|
451 |
+
α2), P3434 = −2
|
452 |
+
3r2(−1 + α2) sin2 θ = −P3443.
|
453 |
+
If V3 = ∇C, then the components other than zero of the covariant derivative of conformal
|
454 |
+
curvature tensor C are given by
|
455 |
+
V3
|
456 |
+
1212,2 = −2(−1+α2)
|
457 |
+
3r3α2
|
458 |
+
, V3
|
459 |
+
1213,3 = −1+α2
|
460 |
+
2r
|
461 |
+
, V3
|
462 |
+
1214,4 = (−1+α2) sin2 θ
|
463 |
+
2r
|
464 |
+
,
|
465 |
+
V3
|
466 |
+
1313,2 = −1+α2
|
467 |
+
3r
|
468 |
+
, V3
|
469 |
+
1414,2 = (−1+α2) sin2 θ
|
470 |
+
3r
|
471 |
+
, V3
|
472 |
+
2323,2 = −−1+α2
|
473 |
+
3rα2 , V3
|
474 |
+
2424,2 = −(−1+α2) sin2 θ
|
475 |
+
3rα2
|
476 |
+
,
|
477 |
+
V3
|
478 |
+
2334,4 = −r(−1+α2) sin2 θ
|
479 |
+
2
|
480 |
+
= −V3
|
481 |
+
2434,3, V3
|
482 |
+
3434,2 = 2r(−1+α2) sin2 θ
|
483 |
+
3
|
484 |
+
.
|
485 |
+
From the above tensor components, we can state the following:
|
486 |
+
Proposition 3.2. The PGM spacetime (3.1) realizes the following:
|
487 |
+
(i) its Ricci 1-forms are recurrent, i.e., ∇η1S(η2, η3) − ∇η2S(η1, η3) = ϑ(η1) ⊗ S(η2, η3) −
|
488 |
+
ϑ(η2) ⊗ S(η1, η3) for ϑ =
|
489 |
+
�
|
490 |
+
0, −1
|
491 |
+
r, 0, 0
|
492 |
+
�
|
493 |
+
,
|
494 |
+
(ii) its conformal curvature C is recurrent for the 1-form
|
495 |
+
�
|
496 |
+
0, 1
|
497 |
+
r, 0, 0
|
498 |
+
�
|
499 |
+
,
|
500 |
+
(iii) it is a R-space by Venzi for {0, 0, 1, 1},
|
501 |
+
(iv) it is Chaki pseudosymmetric for the 1-form Π =
|
502 |
+
�
|
503 |
+
0, −1
|
504 |
+
r, 0, 0
|
505 |
+
�
|
506 |
+
,
|
507 |
+
(v) it is semisymmetric as R · R = 0. Therefore, it is Ricci semisymmetric, conharmonic
|
508 |
+
semisymmetric, projective semisymmetric, concircular semisymmetric and conformal
|
509 |
+
semisymmetric, and hence it is also pseudosymmetric, Ricci pseudosymmetric, confor-
|
510 |
+
mal pseudosymmetic in the sense of Deszcz.
|
511 |
+
Let Z1 = C · R, Z2 = C · C, Z3 = P · C, H1 = Q(g, R), H2 = Q(g, C) and H3 = Q(S, C).
|
512 |
+
Then the components other than zero of Z1, Z2, Z3, H1, H2 and H3 are computed as follows:
|
513 |
+
Z1
|
514 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
515 |
+
6
|
516 |
+
= −Z1
|
517 |
+
1334,14, Z1
|
518 |
+
2434,23 = (−1+α2)2 sin2 θ
|
519 |
+
6α2
|
520 |
+
= −Z1
|
521 |
+
2334,24;
|
522 |
+
Z2
|
523 |
+
1223,13 = −(−1+α2)2
|
524 |
+
12r2α2
|
525 |
+
= −Z2
|
526 |
+
1213,23, Z2
|
527 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
528 |
+
12
|
529 |
+
= −Z2
|
530 |
+
1334,14,
|
531 |
+
Z2
|
532 |
+
1224,14 = −(−1+α2)2 sin2 θ
|
533 |
+
12r2α2
|
534 |
+
= −Z2
|
535 |
+
1214,24, Z2
|
536 |
+
2434,23 = (−1+α2)2 sin2 θ
|
537 |
+
12α2
|
538 |
+
= −Z2
|
539 |
+
2334,24;
|
540 |
+
|
541 |
+
12
|
542 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
543 |
+
Z3
|
544 |
+
1223,13 = −(−1+α2)2
|
545 |
+
9r2α2
|
546 |
+
= −Z3
|
547 |
+
1213,23, Z3
|
548 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
549 |
+
18
|
550 |
+
= −Z3
|
551 |
+
1334,14,
|
552 |
+
Z3
|
553 |
+
1224,14 = −(−1+α2)2 sin2 θ
|
554 |
+
9r2α2
|
555 |
+
= −Z3
|
556 |
+
1214,24, Z3
|
557 |
+
2434,23 = (−1+α2)2 sin2 θ
|
558 |
+
18α2
|
559 |
+
= −Z3
|
560 |
+
2334,24,
|
561 |
+
Z3
|
562 |
+
1223,31 = (−1+α2)2
|
563 |
+
9r2α2
|
564 |
+
= −Z3
|
565 |
+
1213,32, Z3
|
566 |
+
1434,31 = (−1+α2)2 sin2 θ
|
567 |
+
18
|
568 |
+
= −α2Z3
|
569 |
+
2434,32,
|
570 |
+
Z3
|
571 |
+
1224,41 = (−1+α2)2 sin2 θ
|
572 |
+
9r2α2
|
573 |
+
= −Z3
|
574 |
+
1214,42, Z3
|
575 |
+
1334,41 = −(−1+α2)2 sin2 θ
|
576 |
+
18
|
577 |
+
= −α2Z3
|
578 |
+
2334,42;
|
579 |
+
H1
|
580 |
+
1434,13 = r2(−1 + α2) sin2 θ = −H1
|
581 |
+
1334,14, H1
|
582 |
+
2434,23 = −r2(−1+α2) sin2 θ
|
583 |
+
α2
|
584 |
+
= −H1
|
585 |
+
2334,24;
|
586 |
+
H2
|
587 |
+
1223,13 = 1
|
588 |
+
2 −
|
589 |
+
1
|
590 |
+
2α2 = −H2
|
591 |
+
1213,23, H2
|
592 |
+
1434,13 = r2(−1+α2) sin2 θ
|
593 |
+
2
|
594 |
+
= −H2
|
595 |
+
1334,14,
|
596 |
+
H2
|
597 |
+
1224,14 = (−1+α2) sin2 θ
|
598 |
+
2α2
|
599 |
+
= −H2
|
600 |
+
1214,24, H2
|
601 |
+
2434,23 = −r2(−1+α2) sin2 θ
|
602 |
+
2α2
|
603 |
+
= −H2
|
604 |
+
2334,24;
|
605 |
+
H3
|
606 |
+
1223,13 = (−1+α2)2
|
607 |
+
3r2α2
|
608 |
+
= −H3
|
609 |
+
1213,23, H3
|
610 |
+
1434,13 = (−1+α2)2 sin2 θ
|
611 |
+
6
|
612 |
+
= −H3
|
613 |
+
1334,14,
|
614 |
+
H3
|
615 |
+
1224,14 = (−1+α2)2 sin2 θ
|
616 |
+
3r2α2
|
617 |
+
= −H3
|
618 |
+
1214,24, H3
|
619 |
+
2434,23 = −(−1+α2)2 sin2 θ
|
620 |
+
6α2
|
621 |
+
= −H3
|
622 |
+
2334,24.
|
623 |
+
The above calculation of tensors leads to the following:
|
624 |
+
Proposition 3.3. The PGM spacetime (3.1) satifies the pseudosymmetric type curvature con-
|
625 |
+
ditions
|
626 |
+
C · R = −(−1 + α2)
|
627 |
+
6r2
|
628 |
+
Q(g, R),
|
629 |
+
C · C = −(−1 + α2)
|
630 |
+
6r2
|
631 |
+
Q(g, C) and P · C = −1
|
632 |
+
3Q(S, C),
|
633 |
+
i.e., it is pseudosymmetric due to conformal curvature tensor, pseudosymmetric Weyl curvature
|
634 |
+
tensor and also Ricci generalized conformal peudosymmetric due to projective curvature tensor.
|
635 |
+
The components other than zero of the concircular curvature tensor W of PGM spacetime
|
636 |
+
are given by
|
637 |
+
W1212 = −(−1+α2)
|
638 |
+
6r2α2 , W1313 = −(−1+α2)
|
639 |
+
6
|
640 |
+
, W1414 = −(−1+α2) sin2 θ
|
641 |
+
6
|
642 |
+
,
|
643 |
+
W2323 = 1
|
644 |
+
6 −
|
645 |
+
1
|
646 |
+
6α2, W2424 = (−1+α2) sin2 θ
|
647 |
+
6α2
|
648 |
+
, W3434 = −5r2(−1+α2) sin2 θ
|
649 |
+
6
|
650 |
+
.
|
651 |
+
If V4 = ∇W, then the components other than zero of the covariant derivative of concircular
|
652 |
+
curvature tensor W are given by
|
653 |
+
V4
|
654 |
+
1212,2 = −1+α2
|
655 |
+
3r3α2 , V4
|
656 |
+
1313,2 = −1+α2
|
657 |
+
3r
|
658 |
+
, V4
|
659 |
+
1414,2 = (−1+α2) sin2 θ
|
660 |
+
3r
|
661 |
+
,
|
662 |
+
V4
|
663 |
+
2323,2 = −(−1+α2)
|
664 |
+
3rα2 , V4
|
665 |
+
2334,4 = −r(−1 + α2) sin2 θ = −V4
|
666 |
+
2434,3, V4
|
667 |
+
2424,2 = −(−1+α2) sin2 θ
|
668 |
+
3rα2
|
669 |
+
,
|
670 |
+
V4
|
671 |
+
3434,2 = 5(−1+α2)r sin2 θ
|
672 |
+
3
|
673 |
+
.
|
674 |
+
Let Z4 = W · R, Z5 = P · W, H4 = Q(S, W). Then the components other than zero of the
|
675 |
+
tensor Z4, Z5, H4 are given as follows:
|
676 |
+
Z4
|
677 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
678 |
+
6
|
679 |
+
= −Z4
|
680 |
+
1334,14, Z4
|
681 |
+
2434,23 = (−1+α2)2 sin2 θ
|
682 |
+
6α2
|
683 |
+
= −Z4
|
684 |
+
2334,24;
|
685 |
+
|
686 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
687 |
+
13
|
688 |
+
Z5
|
689 |
+
1223,13 = (−1+α2)2
|
690 |
+
18r2α2
|
691 |
+
= Z5
|
692 |
+
1213,32, Z5
|
693 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
694 |
+
18
|
695 |
+
= Z5
|
696 |
+
1334,41,
|
697 |
+
Z5
|
698 |
+
1224,14 = (−1+α2)2 sin2 θ
|
699 |
+
18r2α2
|
700 |
+
= −Z5
|
701 |
+
1214,42, Z5
|
702 |
+
1334,14 = (−1+α2)2 sin2 θ
|
703 |
+
18
|
704 |
+
= Z5
|
705 |
+
1434,31,
|
706 |
+
Z5
|
707 |
+
1213,23 = −(−1+α2)2
|
708 |
+
18r2α2
|
709 |
+
= Z5
|
710 |
+
1223,31, Z5
|
711 |
+
2434,23 = (−1+α2)2 sin2 θ
|
712 |
+
18α2
|
713 |
+
= −Z5
|
714 |
+
2334,42,
|
715 |
+
Z5
|
716 |
+
1214,24 = −(−1+α2)2 sin2 θ
|
717 |
+
18r2α2
|
718 |
+
= Z5
|
719 |
+
1224,41, Z5
|
720 |
+
2334,23 = −(−1+α2)2 sin2 θ
|
721 |
+
18α2
|
722 |
+
= Z5
|
723 |
+
2434,32,
|
724 |
+
H4
|
725 |
+
1223,13 = −(−1+α2)2
|
726 |
+
6r2α2
|
727 |
+
= −H4
|
728 |
+
1213,23, H4
|
729 |
+
1434,13 = (−1+α2)2 sin2 θ
|
730 |
+
6
|
731 |
+
= −H4
|
732 |
+
1334,14,
|
733 |
+
H4
|
734 |
+
1224,14 = −(−1+α2)2 sin2 θ
|
735 |
+
6r2α2
|
736 |
+
= −H4
|
737 |
+
1214,24, H4
|
738 |
+
2434,23 = −(−1+α2)2 sin2 θ
|
739 |
+
6α2
|
740 |
+
= −H4
|
741 |
+
2334,24.
|
742 |
+
From the above calculation of tensors we can infer the following:
|
743 |
+
Proposition 3.4. The PGM spacetime fulfills the curvature conditions
|
744 |
+
W · R = −(−1 + α2)
|
745 |
+
6r2
|
746 |
+
Q(g, R)
|
747 |
+
and
|
748 |
+
P · W = −1
|
749 |
+
3Q(S, W)
|
750 |
+
i.e., the spacetime is pseudosymmetric due to concircular curvature tensor and also Ricci gen-
|
751 |
+
eralized concircular peudosymmetric due to projective curvature tensor.
|
752 |
+
The components other than zero of the conharmonic curvature tensor K of PGM spacetime
|
753 |
+
are given below:
|
754 |
+
K1313 = 1−α2
|
755 |
+
2 , K1414 = −(−1+α2) sin2 θ
|
756 |
+
2
|
757 |
+
,
|
758 |
+
K2323 = 1
|
759 |
+
2 −
|
760 |
+
1
|
761 |
+
2α2, K2424 = (−1+α2) sin2 θ
|
762 |
+
2α2
|
763 |
+
.
|
764 |
+
If V5 = ∇K, then the components other than zero of the covariant derivative of conharmonic
|
765 |
+
curvature tensor K are given by
|
766 |
+
V5
|
767 |
+
1213,3 = −1+α2
|
768 |
+
2r
|
769 |
+
, V5
|
770 |
+
1214,4 = (−1+α2) sin2 θ
|
771 |
+
2r
|
772 |
+
= 1
|
773 |
+
2V5
|
774 |
+
1414,2, V5
|
775 |
+
1313,2 = −1+α2
|
776 |
+
r
|
777 |
+
,
|
778 |
+
V5
|
779 |
+
2323,2 = −
|
780 |
+
1+ 1
|
781 |
+
α2
|
782 |
+
r
|
783 |
+
, V5
|
784 |
+
2334,4 = −1
|
785 |
+
2r(−1 + α2) sin2 θ = −V5
|
786 |
+
2434,3, V5
|
787 |
+
2424,2 = −(−1+α2) sin2 θ
|
788 |
+
rα2
|
789 |
+
.
|
790 |
+
Let Z6 = K · R, Z7 = P · K, Z8 = P · P, H5 = Q(S, K) and H6 = Q(S, P). Then the
|
791 |
+
components other than zero of the tensors Z6, Z7, Z8, H5 and H6 are computed as follows:
|
792 |
+
Z6
|
793 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
794 |
+
2
|
795 |
+
= −Z6
|
796 |
+
1334,14, Z6
|
797 |
+
2434,23 = (−1+α2)2 sin2 θ
|
798 |
+
2α2
|
799 |
+
= −Z6
|
800 |
+
2334,24;
|
801 |
+
Z7
|
802 |
+
1434,13 = −(−1+α2)2 sin2 θ
|
803 |
+
6
|
804 |
+
= −Z7
|
805 |
+
1334,14, Z7
|
806 |
+
2434,23 = (−1+α2)2 sin2 θ
|
807 |
+
6α2
|
808 |
+
= −Z7
|
809 |
+
2334,24,
|
810 |
+
Z7
|
811 |
+
1434,31 = (−1+α2)2 sin2 θ
|
812 |
+
6
|
813 |
+
= −Z7
|
814 |
+
1334,41, Z7
|
815 |
+
2434,32 = −(−1+α2)2 sin2 θ
|
816 |
+
6α2
|
817 |
+
= −Z7
|
818 |
+
2334,42;
|
819 |
+
Z8
|
820 |
+
1333,13 = (−1+α2)2
|
821 |
+
9
|
822 |
+
= −Z8
|
823 |
+
1333,31, Z8
|
824 |
+
1443,13 = (−1+α2)2 sin2 θ
|
825 |
+
9
|
826 |
+
= Z8
|
827 |
+
3441,13 = Z8
|
828 |
+
1334,14 = Z8
|
829 |
+
3431,41,
|
830 |
+
Z8
|
831 |
+
1444,14 = (−1+α2)2 sin4 θ
|
832 |
+
9
|
833 |
+
= −Z8
|
834 |
+
1444,41, Z8
|
835 |
+
3431,14 = −(−1+α2)2 sin2 θ
|
836 |
+
9
|
837 |
+
= Z8
|
838 |
+
1443,31 = Z8
|
839 |
+
3441,31 = Z8
|
840 |
+
1334,41,
|
841 |
+
Z8
|
842 |
+
2333,23 = −(−1+α2)2
|
843 |
+
9α2
|
844 |
+
= −Z8
|
845 |
+
2333,32, Z8
|
846 |
+
2443,23 = −(−1+α2)2 sin2 θ
|
847 |
+
9α2
|
848 |
+
= Z8
|
849 |
+
3442,23 = Z8
|
850 |
+
2334,24 = Z8
|
851 |
+
3432,24,
|
852 |
+
Z8
|
853 |
+
2444,24 = −(−1+α2)2 sin4 θ
|
854 |
+
9α2
|
855 |
+
= −Z8
|
856 |
+
2444,42, Z8
|
857 |
+
3432,24 = (−1+α2)2 sin2 θ
|
858 |
+
9α2
|
859 |
+
= Z8
|
860 |
+
2443,32 = Z8
|
861 |
+
3442,32 = Z8
|
862 |
+
2334,42;
|
863 |
+
H5
|
864 |
+
1434,13 = (−1+α2)2 sin2 θ
|
865 |
+
2
|
866 |
+
= −H5
|
867 |
+
1334,14, H5
|
868 |
+
2434,23 = −(−1+α2)2 sin2 θ
|
869 |
+
2α2
|
870 |
+
= −H5
|
871 |
+
2334,24;
|
872 |
+
|
873 |
+
14
|
874 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
875 |
+
H6
|
876 |
+
1333,13 = −(−1+α2)2
|
877 |
+
3
|
878 |
+
, H6
|
879 |
+
1443,13 = −(−1+α2)2 sin2 θ
|
880 |
+
3
|
881 |
+
= H6
|
882 |
+
3441,13 = H6
|
883 |
+
1334,14 = −H6
|
884 |
+
3431,14,
|
885 |
+
H6
|
886 |
+
1444,14 = −(−1+α2)2 sin4 θ
|
887 |
+
3
|
888 |
+
, H6
|
889 |
+
2333,23 = (−1+α2)2
|
890 |
+
3α2
|
891 |
+
,
|
892 |
+
H6
|
893 |
+
2443,23 = (−1+α2)2 sin2 θ
|
894 |
+
3α2
|
895 |
+
= H6
|
896 |
+
3442,23 = H6
|
897 |
+
2334,24 = −H6
|
898 |
+
3432,24,
|
899 |
+
H6
|
900 |
+
2444,24 = (−1+α2)2 sin4 θ
|
901 |
+
3α2
|
902 |
+
;
|
903 |
+
The above computation of tensors leads to the following:
|
904 |
+
Proposition 3.5. The PGM spacetime (3.1) fulfills the following pseudosymmetric type cur-
|
905 |
+
vature conditions:
|
906 |
+
K · R = −(−1 + α2)
|
907 |
+
2r2
|
908 |
+
Q(g, R),
|
909 |
+
P · K = −1
|
910 |
+
3Q(S, K) and
|
911 |
+
P · P = −1
|
912 |
+
3Q(S, P),
|
913 |
+
i.e., the spacetime is pseudosymmetric due to conharmonic curvature tensor, Ricci generalized
|
914 |
+
conharmonic peudosymmetric due to projective curvature tensor and Ricci generalized projective
|
915 |
+
pseudosymmetric.
|
916 |
+
From the above propositions, we can state that the PGM spacetime (3.1) admits the following
|
917 |
+
curvature restricted geometric properties:
|
918 |
+
Theorem 3.1. The PGM spacetime (3.1) reveals the following curvature properties:
|
919 |
+
(i) it is pseudosymmetric due to conformal curvature tensor as C · R = −(−1+α2)
|
920 |
+
6r2
|
921 |
+
Q(g, R).
|
922 |
+
Hence C · S = −(−1+α2)
|
923 |
+
6r2
|
924 |
+
Q(g, S), C · C = −(−1+α2)
|
925 |
+
6r2
|
926 |
+
Q(g, C) (i.e., pseudosymmetric Weyl
|
927 |
+
conformal curvature tensor), C · W = −(−1+α2)
|
928 |
+
6r2
|
929 |
+
Q(g, W), C · P = −(−1+α2)
|
930 |
+
6r2
|
931 |
+
Q(g, P) and
|
932 |
+
C · K = −(−1+α2)
|
933 |
+
6r2
|
934 |
+
Q(g, K),
|
935 |
+
(ii) it realizes pseudosymmetry due to concircular curvature tensor as W·R = −(−1+α2)
|
936 |
+
6r2
|
937 |
+
Q(g, R).
|
938 |
+
Hence W · S = −(−1+α2)
|
939 |
+
6r2
|
940 |
+
Q(g, S), W · C = −(−1+α2)
|
941 |
+
6r2
|
942 |
+
Q(g, C), W · W = −(−1+α2)
|
943 |
+
6r2
|
944 |
+
Q(g, W),
|
945 |
+
W · P = −(−1+α2)
|
946 |
+
6r2
|
947 |
+
Q(g, P) and W · K = −(−1+α2)
|
948 |
+
6r2
|
949 |
+
Q(g, K),
|
950 |
+
(iii) it admits pseudosymmetry due to conharmonic curvature tensor as K·R = −(−1+α2)
|
951 |
+
2r2
|
952 |
+
Q(g, R).
|
953 |
+
Hence K · S = −(−1+α2)
|
954 |
+
2r2
|
955 |
+
Q(g, S), K · C = −(−1+α2)
|
956 |
+
2r2
|
957 |
+
Q(g, C), K · W = −(−1+α2)
|
958 |
+
2r2
|
959 |
+
Q(g, W),
|
960 |
+
K · P = −(−1+α2)
|
961 |
+
2r2
|
962 |
+
Q(g, P) and K · K = −(−1+α2)
|
963 |
+
2r2
|
964 |
+
Q(g, K),
|
965 |
+
(iv) it is Ricci generalized conformal pseudosymmetric due to projective curvature tensor as
|
966 |
+
P · C = −1
|
967 |
+
3Q(S, C). Hence P · P = −1
|
968 |
+
3Q(S, P), P · W = −1
|
969 |
+
3Q(S, W) and P · K =
|
970 |
+
−1
|
971 |
+
3Q(S, K),
|
972 |
+
(v) it is a Venzi space for {0, 0, 1, 1}, hence its curvature 2-forms are recurrent,
|
973 |
+
(vi) its conformal curvature 2-forms are recurrent for the 1-form
|
974 |
+
�
|
975 |
+
0, 1
|
976 |
+
r, 0, 0
|
977 |
+
�
|
978 |
+
,
|
979 |
+
(vii) its Ricci 1-forms are recurrent for the 1-form
|
980 |
+
�
|
981 |
+
0, −1
|
982 |
+
r, 0, 0
|
983 |
+
�
|
984 |
+
,
|
985 |
+
(viii) it is Chaki pseudosymmetric for the 1-form
|
986 |
+
�
|
987 |
+
0, −1
|
988 |
+
r, 0, 0
|
989 |
+
�
|
990 |
+
,
|
991 |
+
(ix) it is Chaki pseudo Ricci symmetric for the 1-form
|
992 |
+
�
|
993 |
+
0, −1
|
994 |
+
r, 0, 0
|
995 |
+
�
|
996 |
+
,
|
997 |
+
|
998 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
999 |
+
15
|
1000 |
+
(x) its Riemann curvature can be decomposed as R =
|
1001 |
+
r2
|
1002 |
+
2(−1+α2)S ∧ S. Hence, it is an Ein(2)
|
1003 |
+
spacetime with S2 = (−1+α2)
|
1004 |
+
r2
|
1005 |
+
S,
|
1006 |
+
(xi) it is a generalized quasi-Einstein manifold for α = 1
|
1007 |
+
2(r2+
|
1008 |
+
√
|
1009 |
+
4 + r4), β = 1
|
1010 |
+
2(r2−
|
1011 |
+
√
|
1012 |
+
4 + r4),
|
1013 |
+
γ = 1, Θ=
|
1014 |
+
�
|
1015 |
+
−
|
1016 |
+
√
|
1017 |
+
(2+r4+r2√
|
1018 |
+
4+r4)
|
1019 |
+
√
|
1020 |
+
2
|
1021 |
+
, 1, 0, 0
|
1022 |
+
�
|
1023 |
+
and Σ=
|
1024 |
+
�
|
1025 |
+
(r2−
|
1026 |
+
√
|
1027 |
+
4+r4)√
|
1028 |
+
(2+r4+r2√
|
1029 |
+
4+r4)
|
1030 |
+
2
|
1031 |
+
√
|
1032 |
+
2
|
1033 |
+
, 0, 0, 0
|
1034 |
+
�
|
1035 |
+
and
|
1036 |
+
(xii) its Ricci tensor is compatible for the curvature R, C, K, W and P.
|
1037 |
+
Corollary 3.1. The PGM spacetime is Chaki pseudosymmetric and hence it is weakly symmet-
|
1038 |
+
ric in the sense of Tam´assy and Binh for the associated 1-forms Π=
|
1039 |
+
�
|
1040 |
+
0, −2
|
1041 |
+
r, 0, 0
|
1042 |
+
�
|
1043 |
+
, Ψ=
|
1044 |
+
�
|
1045 |
+
0, −1
|
1046 |
+
r, 0, 0
|
1047 |
+
�
|
1048 |
+
and Φ=
|
1049 |
+
�
|
1050 |
+
0, −1
|
1051 |
+
r, 0, 0
|
1052 |
+
�
|
1053 |
+
.
|
1054 |
+
Remark 3.1. From the calculation with various tensors, it can be mentioned that the PGM
|
1055 |
+
spacetime (3.1) does not admit certain geometric structures, which are described as follows:
|
1056 |
+
(i) it is neither recurrent nor recurrent for C, P, W, K,
|
1057 |
+
(ii) its Ricci tensor is neither of Codazzi type nor cyclic parallel,
|
1058 |
+
(iii) it is not a Venzi space for C, P, W, K,
|
1059 |
+
(iv) it is not Ricci generalized pseudosymmetric (i.e., R · R and Q(S, R) are linearly inde-
|
1060 |
+
pendent),
|
1061 |
+
(v) it is neither Einstein nor quasi-Einstein and
|
1062 |
+
(vi) its curvature 2-forms are not recurrent for K, P and W.
|
1063 |
+
4. Energy momentum tensor of PGM spacetime
|
1064 |
+
From the EFE the stress energy momentum tensor T of a spacetime is given by
|
1065 |
+
T = 1
|
1066 |
+
τ
|
1067 |
+
�
|
1068 |
+
S −
|
1069 |
+
���
|
1070 |
+
2 − Λ
|
1071 |
+
�
|
1072 |
+
g
|
1073 |
+
�
|
1074 |
+
,
|
1075 |
+
where τ = 8πG
|
1076 |
+
c4 , c is the velocity of light in vacuum, Λ is the cosmological constant and G is
|
1077 |
+
the gravitational constant. The only non-vanishing components (upto symmetry) of the energy
|
1078 |
+
momentum tensor T are given by
|
1079 |
+
T11 = −1+α2
|
1080 |
+
8r2 , T22 = −(−1+α2)
|
1081 |
+
8r2α2 .
|
1082 |
+
Hence the non-vanishing components of covariant derivative of the energy momentum tensor
|
1083 |
+
T are given by
|
1084 |
+
T11,2 = −(−1+α2)
|
1085 |
+
4r3
|
1086 |
+
, T22,2 = (−1+α2)
|
1087 |
+
4r3α2 ,
|
1088 |
+
T23,3 = −(−1+α2)
|
1089 |
+
8r
|
1090 |
+
, T24,4 = −(−1+α2) sin2 θ
|
1091 |
+
8r
|
1092 |
+
.
|
1093 |
+
Let C · T = C1, W · T = W1, K · T = K1 and Q(g, T) = Q1. Then the components other
|
1094 |
+
than zero of the tensor C1, W1, K1 and Q1 are calculated as follows:
|
1095 |
+
C1
|
1096 |
+
1313 = (−1+α2)2
|
1097 |
+
48r2
|
1098 |
+
=
|
1099 |
+
1
|
1100 |
+
sin2 θC1
|
1101 |
+
1414,
|
1102 |
+
C1
|
1103 |
+
2323 = −(−1+α2)2
|
1104 |
+
48r2α2
|
1105 |
+
=
|
1106 |
+
1
|
1107 |
+
sin2 θC1
|
1108 |
+
2424;
|
1109 |
+
|
1110 |
+
16
|
1111 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
1112 |
+
W1
|
1113 |
+
1313 = (−1+α2)2
|
1114 |
+
48r2
|
1115 |
+
=
|
1116 |
+
1
|
1117 |
+
sin2 θW1
|
1118 |
+
1414,
|
1119 |
+
W1
|
1120 |
+
2323 = −(−1+α2)2
|
1121 |
+
48r2α2
|
1122 |
+
=
|
1123 |
+
1
|
1124 |
+
sin2 θW1
|
1125 |
+
2424;
|
1126 |
+
K1
|
1127 |
+
1313 = (−1+α2)2
|
1128 |
+
16r2
|
1129 |
+
=
|
1130 |
+
1
|
1131 |
+
sin2 θK1
|
1132 |
+
1414,
|
1133 |
+
K1
|
1134 |
+
2323 = −(−1+α2)2
|
1135 |
+
16r2α2
|
1136 |
+
=
|
1137 |
+
1
|
1138 |
+
sin2 θK1
|
1139 |
+
2424;
|
1140 |
+
Q1
|
1141 |
+
1313 = −(−1+α2)
|
1142 |
+
8
|
1143 |
+
=
|
1144 |
+
1
|
1145 |
+
sin2 θQ1
|
1146 |
+
1414,
|
1147 |
+
Q1
|
1148 |
+
2323 = (−1+α2)
|
1149 |
+
8α2
|
1150 |
+
=
|
1151 |
+
1
|
1152 |
+
sin2 θQ1
|
1153 |
+
2424.
|
1154 |
+
From the above calculations we can state the following:
|
1155 |
+
Theorem 4.1. The PGM spacetime (3.1) admits certain pseudosymmetric type curvature con-
|
1156 |
+
ditions for the energy momentum tensor T given as follows:
|
1157 |
+
(i) C ·T = −(−1+α2)
|
1158 |
+
6r2
|
1159 |
+
Q(g, T), i.e., the nature of the energy momentum tensor is conformally
|
1160 |
+
pseudosymmetric,
|
1161 |
+
(ii) W·T = −(−1+α2)
|
1162 |
+
6r2
|
1163 |
+
Q(g, T), i.e., the nature of the energy momentum tensor is concircularly
|
1164 |
+
pseudosymmetric,
|
1165 |
+
(iii) K · T = −(−1+α2)
|
1166 |
+
2r2
|
1167 |
+
Q(g, T), i.e., the nature of the energy momentum tensor is conhar-
|
1168 |
+
monically pseudosymmetric,
|
1169 |
+
(iv) the energy momentum tensor T is compatible for Riemann, projective, conharmonic,
|
1170 |
+
conformal and concircular curvature tensors.
|
1171 |
+
5. Curvature inheritance realized by PGM spacetime
|
1172 |
+
Let χ(M) be the Lie algebra of all smooth vector fields on an n-dimensional smooth semi-
|
1173 |
+
Riemannian manifold M. Then the Lie subalgebra K(M) of all Killing vector fields contains at
|
1174 |
+
most n(n+1)/2 linearly independent Killing vector fields. If M is of constant scalar curvature,
|
1175 |
+
K(M) consists of exactly n(n+1)/2 linearly independent vector fields. In Section 3 it has been
|
1176 |
+
shown that the PGM spacetime possesses non-constant scalar curvature κ given by 2(α2−1)/r2.
|
1177 |
+
In this section some Killing vector fields on PGM spacetime are exhibited and it is shown that
|
1178 |
+
the PGM spacetime admits curvature collineation, Ricci collineation and curvature inheritance
|
1179 |
+
for some non-Killing vector fields.
|
1180 |
+
Proposition 5.1. The PGM spacetime admits motion for the vector fields
|
1181 |
+
∂
|
1182 |
+
∂t and
|
1183 |
+
∂
|
1184 |
+
∂φ, i.e., the
|
1185 |
+
vector fields
|
1186 |
+
∂
|
1187 |
+
∂t and
|
1188 |
+
∂
|
1189 |
+
∂φ on PGM spacetime are Killing (£ ∂
|
1190 |
+
∂tg = 0 and £ ∂
|
1191 |
+
∂φ g = 0).
|
1192 |
+
Corollary 5.1. As
|
1193 |
+
∂
|
1194 |
+
∂t and
|
1195 |
+
∂
|
1196 |
+
∂φ are Killing vector fields, the vector field λ ∂
|
1197 |
+
∂t + µ ∂
|
1198 |
+
∂φ is also Killing
|
1199 |
+
for any constants λ and µ, i.e., £λ ∂
|
1200 |
+
∂t +µ ∂
|
1201 |
+
∂φg = 0 for all real numbers λ and µ.
|
1202 |
+
In this section we have considered the non-Killing vector fields
|
1203 |
+
∂
|
1204 |
+
∂r,
|
1205 |
+
∂
|
1206 |
+
∂θ, λ ∂
|
1207 |
+
∂r + µ ∂
|
1208 |
+
∂θ (λ and µ
|
1209 |
+
are constants), in the direction of which the Lie derivative of various tensors are computed.
|
1210 |
+
The non-zero components of the (1,3)-type curvature tensor �R are given as follows:
|
1211 |
+
�R3
|
1212 |
+
434 = (1 − α2) sin2 θ,
|
1213 |
+
�R3
|
1214 |
+
334 = −(1 − α2)
|
1215 |
+
(5.1)
|
1216 |
+
|
1217 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
1218 |
+
17
|
1219 |
+
and the non-vanishing components of the (0,4)-type curvature tensor R are given in (3.2). From
|
1220 |
+
the components of �R provided in (5.1), we have £ ∂
|
1221 |
+
∂r �R = 0, which leads to the following:
|
1222 |
+
Proposition 5.2. The PGM spacetime admits curvature collineation for the non-Killing vector
|
1223 |
+
field ξ =
|
1224 |
+
∂
|
1225 |
+
∂r as it possesses £ξ �R = 0.
|
1226 |
+
Again, Duggal (Theorem 3, [1]) proved that if a manifold admits curvature inheritance, it
|
1227 |
+
also realizes Ricci inheritance, and hence the above proposition implies the following:
|
1228 |
+
Corollary 5.2. The PGM spacetime realizes Ricci collineation for the non-Killing vector field
|
1229 |
+
ξ =
|
1230 |
+
∂
|
1231 |
+
∂r, i.e., £ξS = 0.
|
1232 |
+
For the non-Killing vector field η =
|
1233 |
+
∂
|
1234 |
+
∂θ, the non-vanishing components of £η �R and £ηS, are
|
1235 |
+
computed as follows:
|
1236 |
+
(£η �R)3
|
1237 |
+
434 = (1 − α2) sin 2θ = −(£η �R)3
|
1238 |
+
443,
|
1239 |
+
(5.2)
|
1240 |
+
(£ηS)44 = −(1 − α2) sin 2θ.
|
1241 |
+
(5.3)
|
1242 |
+
From the tensor components in (5.2) and (5.3), we note the following remarks:
|
1243 |
+
Remark 5.1. For the non-Killing vector field η =
|
1244 |
+
∂
|
1245 |
+
∂θ, there exists no scalar function λ such
|
1246 |
+
that the PGM spacetime possesses the relation £η �R = λ �R, i.e., with respect to the non-
|
1247 |
+
Killing vector field
|
1248 |
+
∂
|
1249 |
+
∂θ the PGM spacetime admits neither curvature collineation nor curvature
|
1250 |
+
inheritance (in sense of Definition 2.11) for the (1,3)-type curvature tensor �R.
|
1251 |
+
Remark 5.2. For the non-Killing vector field η =
|
1252 |
+
∂
|
1253 |
+
∂θ, there exists no scalar function λ such
|
1254 |
+
that the PGM spacetime realizes £ηS = ��S, i.e., with respect to the non-Killing vector field
|
1255 |
+
∂
|
1256 |
+
∂θ the PGM spacetime possesses neither Ricci collineation nor Ricci inheritance.
|
1257 |
+
Now, for the non-Killing vector fields ξ =
|
1258 |
+
∂
|
1259 |
+
∂r and η =
|
1260 |
+
∂
|
1261 |
+
∂θ, the non-vanishing components of
|
1262 |
+
£ξR and £ηR, are calculated as follows:
|
1263 |
+
(£ξR)3434 = (£ξR)4343 = −2(α2 − 1)r sin2 θ = −(£ξR)3443 = −(£ξR)4334,
|
1264 |
+
(£ηR)3434 = (£ηR)4343 = −(α2 − 1)r2 sin 2θ = −(£ηR)3443 = −(£ηR)4334,
|
1265 |
+
This leads to the following:
|
1266 |
+
Proposition 5.3. The PGM spacetime admits curvature inheritance (in the sense of Definition
|
1267 |
+
2.13) for the vector fields ξ =
|
1268 |
+
∂
|
1269 |
+
∂r and η =
|
1270 |
+
∂
|
1271 |
+
∂θ as it realizes the relations
|
1272 |
+
£ξR = 2
|
1273 |
+
rR
|
1274 |
+
and
|
1275 |
+
£ηR = 2 cot θ R.
|
1276 |
+
|
1277 |
+
18
|
1278 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
1279 |
+
If λ and µ are any non-zero constants, the non-zero components of £ξR for the vector field
|
1280 |
+
V = λ ∂
|
1281 |
+
∂r + µ ∂
|
1282 |
+
∂θ are given as follows:
|
1283 |
+
(£V R)3434 = (£V R)4343 = −2(α2 − 1)r sin θ(µr cos θ + λ sin θ) = −(£V R)3443 = −(£V R)4334.
|
1284 |
+
The above components of £λ ∂
|
1285 |
+
∂r +µ ∂
|
1286 |
+
∂θ R lead to the following:
|
1287 |
+
Proposition 5.4. For the vector field ξ = λ ∂
|
1288 |
+
∂r + µ ∂
|
1289 |
+
∂θ, the PGM spacetime possesses curvature
|
1290 |
+
inheritance (Definition 2.13) in the sense of Shaikh and Datta [2] as it satisfy the relation
|
1291 |
+
£ξR = 2(λ + µr cot θ)
|
1292 |
+
r
|
1293 |
+
R.
|
1294 |
+
Incorporating the above propositions and their consequences, we can state the following:
|
1295 |
+
Theorem 5.1. The PGM spacetime reveals the following symmetry properties:
|
1296 |
+
(i) it admits motion for the vector fields
|
1297 |
+
∂
|
1298 |
+
∂t and
|
1299 |
+
∂
|
1300 |
+
∂φ,
|
1301 |
+
(ii) if λ, µ are any non-zero constants, it possesses motion for the vector field λ ∂
|
1302 |
+
∂t + µ ∂
|
1303 |
+
∂φ,
|
1304 |
+
(iii) it admits curvature collineation (in the sense of Definition 2.11) and hence Ricci collineation
|
1305 |
+
with respect to the non-Killing vector field
|
1306 |
+
∂
|
1307 |
+
∂r, in fact, £ ∂
|
1308 |
+
∂r �R = 0 and £ ∂
|
1309 |
+
∂r S = 0,
|
1310 |
+
(iv) it admits curvature inheritance (in the sense of Definition 2.13) for the non-Killing
|
1311 |
+
vector fields
|
1312 |
+
∂
|
1313 |
+
∂r and
|
1314 |
+
∂
|
1315 |
+
∂θ, in fact,
|
1316 |
+
£ ∂
|
1317 |
+
∂r R = 2
|
1318 |
+
rR
|
1319 |
+
and
|
1320 |
+
£ ∂
|
1321 |
+
∂θ R = 2 cot θ R,
|
1322 |
+
(v) for any non-zero constants λ, µ it realizes curvature inheritance (in the sense of Defini-
|
1323 |
+
tion 2.13) for the non-Killing vector field λ ∂
|
1324 |
+
∂r + µ ∂
|
1325 |
+
∂θ, in fact,
|
1326 |
+
£λ ∂
|
1327 |
+
∂r +µ ∂
|
1328 |
+
∂θ R = 2(λ + µr cot θ)
|
1329 |
+
r
|
1330 |
+
R.
|
1331 |
+
Remark 5.3. It is interesting to note that the PGM spacetime with respect to the non-Killing
|
1332 |
+
vector field
|
1333 |
+
∂
|
1334 |
+
∂r, admits curvature collineation for the (1,3)-type curvature tensor �R. But it does
|
1335 |
+
not realize curvature collineation for the (0,4)-type curvature tensor R, whereas it possesses
|
1336 |
+
curvature inheritance for the (0,4)-type curvature tensor R. Also, we mention that with respect
|
1337 |
+
to the non-Killing vector field ∂
|
1338 |
+
∂θ, the PGM spacetime admits curvature inheritance for the (0,4)-
|
1339 |
+
type curvature tensor R, but it realizes neither curvature collineation nor curvature inheritance
|
1340 |
+
for the (1,3)-type curvature tensor �R. Hence it follows that the notion of curvature inheritance
|
1341 |
+
(resp., curvature collineation) for (1,3)-type curvature tensor (Definition 2.11) in the sense of
|
1342 |
+
Duggal [1] and the notion of curvature inheritance (resp., curvature collineation) for (0,4)-type
|
1343 |
+
curvature tensor (Definition 2.13) in the sense of Shaikh and Datta [2] are not equivalent.
|
1344 |
+
|
1345 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
1346 |
+
19
|
1347 |
+
6. Conclusions
|
1348 |
+
In this paper, we have investigated various curvature restricted geometric properties of PGM
|
1349 |
+
spacetime. It is proved that the spacetime is not Ricci generalized pseudosymmetric, but it
|
1350 |
+
admits various type of pseudosymmetric type curvature conditions, such as, pseudosymmetry
|
1351 |
+
due to Weyl conformal curvature tensor, pseudosymmetry due to conharmonic curvature tensor,
|
1352 |
+
Ricci generalized conformal pseudosymmetry due to projective curvature tensor. Also, it is
|
1353 |
+
proved that the spacetime is Einstein manifold of degree 2, generalized quasi-Einstein and
|
1354 |
+
2-quasi Einstein manifold (see, Theorem 3.1).
|
1355 |
+
Moreover, the energy momentum tensor of
|
1356 |
+
PGM spacetime satisfies several pseudosymmetric type curvature conditions, and both of its
|
1357 |
+
Ricci tensor and energy momentum tensor are compatible for Riemann, conformal, projective,
|
1358 |
+
conharmonic and concircular curvature (see, Theorem 4.1). Finally, it is shown that the PGM
|
1359 |
+
spacetime admits curvature collineation, Ricci collineation for the (1,3)-curvature tensor and
|
1360 |
+
curvature inheritance for the (0,4) curvature tensor with respect to certain non-Killing vector
|
1361 |
+
fields (see, Theorem 5.1). Also, some non-Killing vector fields are exhibited (see, Remark 5.3),
|
1362 |
+
with respect to which it is shown that the notions of curvature inheritance (also, of curvature
|
1363 |
+
collineation) for the (1,3)-type curvature tensor by Duggal [1] and for the (0,4)-type curvature
|
1364 |
+
tensor by Shaikh and Datta [2] are distinct (see, Remark 5.1 and Remark 5.3).
|
1365 |
+
Acknowledgment
|
1366 |
+
B. R. Datta is grateful to the Council of Scientific and Industrial Research (CSIR File No.:
|
1367 |
+
09/025(0253)/2018-EMR-I), Govt. of India, for the award of SRF (Senior Research Fellow-
|
1368 |
+
ship). All the algebraic computations of Section 3 to 5 are performed by a program in Wolfram
|
1369 |
+
Mathematica.
|
1370 |
+
References
|
1371 |
+
[1] Duggal, K. L., Curvature inheritance symmetry in Riemannian spaces with applications to fluid space times,
|
1372 |
+
J. Math. Phys., 33(9) (1992), 2989–2997.
|
1373 |
+
[2] Shaikh, A. A. and Datta, B. R., Ricci solitons and curvature inheritance on Robinson-Trautman spacetimes
|
1374 |
+
(2022) arXiv preprint arXiv:2209.03749.
|
1375 |
+
[3] Cartan, ´E., Sur une classe remarquable d’espaces de Riemannian, Bull. Soc. Math. France, 54 (1926), 214-
|
1376 |
+
264.
|
1377 |
+
[4] Cartan, ´E., Le¸cons sur la g´eom´etrie des espaces de Riemann, 2nd ed., Paris, 1946.
|
1378 |
+
[5] Szab´o, Z. I., Structure theorems on Riemannian spaces satisfying R(X, Y ) · R = 0, I. The local version, J.
|
1379 |
+
Diff. Geom., 17 (1982), 531–582.
|
1380 |
+
[6] Szab´o, Z. I., Classification and construction of complete hypersurfaces satisfying R(X, Y )·R = 0, Acta Sci.
|
1381 |
+
Math., 47 (1984), 321–348.
|
1382 |
+
|
1383 |
+
20
|
1384 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
1385 |
+
[7] Szab´o, Z. I., Structure theorems on Riemannian spaces satisfying R(X, Y ) · R = 0, II, The global version,
|
1386 |
+
Geom. Dedicata, 19 (1985), 65–108.
|
1387 |
+
[8] Chaki, M. C., On pseudosymmetric manifolds, An. S¸tiint¸. Univ. AL. I. Cuza Ia¸si. Mat. (N.S.) Sect. Ia,
|
1388 |
+
33(1) (1987), 53–58.
|
1389 |
+
[9] Chaki, M. C., On pseudo Ricci symmetric manifolds, Bulgarian J. Phys., 15 (1988), 526–531.
|
1390 |
+
[10] Adam´ow, A. and Deszcz, R., On totally umbilical submanifolds of some class of Riemannian manifolds,
|
1391 |
+
Demonstratio Math., 16 (1983), 39–59.
|
1392 |
+
[11] T´amassy, L. and Binh, T. Q., On weakly symmetric and weakly projective symmetric Riemannian manifolds,
|
1393 |
+
Colloq. Math. Soc. J. Bolyai, 50 (1989), 663–670.
|
1394 |
+
[12] Tam´assy, L. and Binh, T. Q., On weak symmetries of Einstein and Sasakian manifolds, Tensor (N. S.), 53
|
1395 |
+
(1993), 140–148.
|
1396 |
+
[13] Ruse, H. S., On simply harmonic spaces, J. London Math. Soc., 21 (1946), 243–247.
|
1397 |
+
[14] Ruse, H. S., On simply harmonic ‘kappa spaces’ of four dimensions, Proc. London Math. Soc., 50 (1949),
|
1398 |
+
317–329.
|
1399 |
+
[15] Ruse, H. S., Three dimensional spaces of recurrent curvature, Proc. London Math. Soc., 50 (1949), 438–446.
|
1400 |
+
[16] Walker, A. G., On Ruse’s spaces of recurrent curvature, Proc. London Math. Soc., 52 (1950), 36–64.
|
1401 |
+
[17] Besse, A. L., Einstein Manifolds, Springer-Verlag, Berlin, Heidelberg, 1987.
|
1402 |
+
[18] Lovelock, D. and Rund, H., Tensors, differential forms and variational principles, Courier Dover ublica-
|
1403 |
+
tions, 1989.
|
1404 |
+
[19] Shaikh, A. A., Al-Solamy, F. R. and Roy, I., On the existence of a new class of semi-Riemannian manifolds,
|
1405 |
+
Mathematical Sciences, 7 (2013), 46.
|
1406 |
+
[20] Shaikh, A. A. and Patra, A., On a generalized class of recurrent manifolds, Arch. Math. (BRNO), 46
|
1407 |
+
(2010), 71–78.
|
1408 |
+
[21] Shaikh, A. A. and Roy, I., On quasi generalized recurrent manifolds, Math. Pannon, 21(2) (2010), 251–263.
|
1409 |
+
[22] Shaikh, A. A. and Roy, I., On weakly generalized recurrent manifolds, Ann. Univ. Sci. Budapest, E¨otv¨os
|
1410 |
+
Sect. Math., 54 (2011), 35–45.
|
1411 |
+
[23] Shaikh, A. A., Roy, I. and Kundu, H., On the existence of a generalized class of recurrent manifolds, An.
|
1412 |
+
S¸tiint¸. Univ. Al. I. Cuza Ia¸si. Mat. (N. S.), LXIV(2) (2018), 233–251.
|
1413 |
+
[24] Shaikh, A. A., Roy, I. and Kundu, H., On some generalized recurrent manifolds, Bull. Iranian Math. Soc.,
|
1414 |
+
43(5) (2017), 1209–1225.
|
1415 |
+
[25] Shaikh, A. A. and Kundu, H., On warped product generalized Roter type manifolds, Balkan J. Geom. Appl.,
|
1416 |
+
21(2) (2016), 82–95.
|
1417 |
+
[26] Arslan, K., Deszcz, R., Ezenta¸s, R., Hotlo´s, M. and Murathan, C., On generalized Robertson-Walker
|
1418 |
+
spacetimes satisfying some curvature condition, Turkish J. Math., 38(2) (2014), 353–373.
|
1419 |
+
[27] Deszcz, R. and Kucharski, M., On curvature properties of certain generalized Robertson-Walker spacetimes,
|
1420 |
+
Tsukuba J. Math., 23(1) (1999), 113–130.
|
1421 |
+
[28] Deszcz, R., Hotlo´s, M., Je�lowicki, J., Kundu, H. and Shaikh, A. A., Curvature properties of G¨odel metric,
|
1422 |
+
Int. J. Geom. Methods Mod. Phys., 11 (2014), 1450025. Erratum: Curvature properties of G¨odel metric,
|
1423 |
+
Int. J. Geom. Methods Mod. Phys., 16 (2019), 1992002.
|
1424 |
+
[29] Shaikh, A. A., Das, L., Kundu, H. and Chakraborty, D., Curvature properties of Siklos metric, Diff. Goem.-
|
1425 |
+
Dyn. Syst., 21 (2019), 167–180.
|
1426 |
+
[30] Shaikh, A. A., Ali, M. and Ahsan, Z., Curvature properties of Robinson-Trautman metric, J. Geom., 109(2)
|
1427 |
+
(2018), 1–20. DOI: 10.1007/s00022-018-0443-1
|
1428 |
+
|
1429 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
1430 |
+
21
|
1431 |
+
[31] Kowalczyk, D., On the Reissner-Nordstr¨om-de Sitter type spacetimes, Tsukuba J. Math., 30(2) (2006),
|
1432 |
+
363–381.
|
1433 |
+
[32] Katzin, G. H., Livine, J. and Davis, W. R., Curvature collineations: A fundamental symmetry property
|
1434 |
+
of the space-times of general relativity defined by the vanishing Lie derivative of the Riemann curvature
|
1435 |
+
tensor, J. Math. Phys., 10(4) (1969), 617–629.
|
1436 |
+
[33] Katzin, G. H., Livine, J. and Davis, W. R., Groups of curvature collineations in Riemannian space-times
|
1437 |
+
which admit fields of parallel vectors, J. Math. Phys., 11 (1970), 1578–1580.
|
1438 |
+
[34] Ahsan, Z., Algebra of space-matter tensor in general relativity, Indian J. Pure Appl. Math., 8(9) (1977),
|
1439 |
+
1055–1061.
|
1440 |
+
[35] Ahsan, Z., On the Nijenhuis tensor for null electromagnetic field, J. Math. Phys. Sci., 21(5) (1987), 515–
|
1441 |
+
526.
|
1442 |
+
[36] Ahsan, Z., Symmetries of the Electromagnetic Fields in General Relativity, Acta Phys. Sinica, 4 (1995),
|
1443 |
+
337.
|
1444 |
+
[37] Ahsan, Z., A symmetry property of the space-time of general relativity in terms of the space-matter tensor,
|
1445 |
+
Braz. J. Phys. 26(3) (1996), 572-576.
|
1446 |
+
[38] Ahsan, Z., On a geometrical symmetry of the space-time of General Relativity, Bull. Call. Math. Soc.,
|
1447 |
+
97(3) (2005), 191.
|
1448 |
+
[39] Ahsan, Z. and Ali, M., On some properties of W-curvature tensor, Palestine J. Math., 3(1) (2014), 61–69.
|
1449 |
+
[40] Ahsan, Z. and Ali, M., Symmetries of Type D Pure Radiation Fields, Int. J. Theo. Phys., 51 (2012),
|
1450 |
+
2044-2055.
|
1451 |
+
[41] Ahsan, Z. and Husain, S. I., Null electromagnetic fields, total gravitational radiation and collineations in
|
1452 |
+
general relativity, Annali di Mathematical Pura ed Applicata, 126 (1980), 379396.
|
1453 |
+
[42] Ali, M. and Ahsan Z., Ricci Solitons and Symmetries of Spacetime Manifold of General Relativity Global
|
1454 |
+
J. Adv. Research Classical Mod. Geom., 1(2) (2012), 75–84.
|
1455 |
+
[43] Shaikh, A. A., Ali, M., Salman, M. and Zengin, F. O., Curvature inheritance symmetry on M-projectively
|
1456 |
+
flat spacetimes, Int. J. Geom. Methods Mod. Phys., (accepted).
|
1457 |
+
[44] Ahsan, Z., Collineation in electromagnetic field in general relativity- The null field case, Tamkang J. Maths.,
|
1458 |
+
9(2) (1978), 237.
|
1459 |
+
[45] Ahsan, Z., Algebraic classification of space-matter tensor in general relativity, Indian J. Pure Appl. Math.,
|
1460 |
+
8(2) (1977), 231–237
|
1461 |
+
[46] T. W. B. Kibble, Phys. Rep. 67, 183 (1980).
|
1462 |
+
[47] A. Vilenkin, Phys. Rep. 121, 263 (1985).
|
1463 |
+
[48] W. A. Hiscock, Phys. Rev. D 31, 3288 (1985).
|
1464 |
+
[49] S. Zare, H. Hassanabadi and M. de Montigny, Gen. Relativ. Grav. 52, 25 (2020).
|
1465 |
+
[50] M. Barriola and A. Vilenkin, Phys. Rev. Lett. 63, 341 (1989).
|
1466 |
+
[51] D. P. Bennett and S. H. Rhie, Phys. Rev. Lett. 65, 1709 (1990).
|
1467 |
+
[52] T. R. P. Carames, J. C. Fabris, E. R. Bezzera de Mello and H. Belich, Eur. Phys. J. C 77, 496 (2017).
|
1468 |
+
[53] E. R. Bezerra de Mello and C. Furtado, Phys. Rev. D 56, 1345 (1997).
|
1469 |
+
[54] E. R. Bezerra de Mello, Braz. J. Phys. 31, 211 (2001).
|
1470 |
+
[55] C. Furtado and F. Moraes, J. Phys. A: Math. Gen. 33, 5513 (2000).
|
1471 |
+
[56] A. L. C. de Oliveira and E. R. B. de Mello, Int. J. Mod. Phys. A 18, 3175 (2003).
|
1472 |
+
[57] E. R. B. de Mello and C. Furtado, Phys. Rev. D 56, 1345 (1997).
|
1473 |
+
[58] A. L. Cavalcanti de Oliveira and E. R. B. de Mello, Int. J. Mod. Phys. A 18, 2051 (2003).
|
1474 |
+
|
1475 |
+
22
|
1476 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
1477 |
+
[59] A. Boumali and H. Aounallah, Adv. High Energy Phys. 2018, 1031763 (2018).
|
1478 |
+
[60] E. A. F. Braganca, R. L. L. Vit´oria, H. Belich and E. R. Bezerra de Mello, Eur. Phys. J. C 80, 206 (2020).
|
1479 |
+
[61] M. de Montigny, H. Hassanabadi, J. Pinfold and S. Zare, Eur. Phys. J. Plus 136, 788 (2021).
|
1480 |
+
[62] M. de Montigny, J. Pinfold, S. Zare and H. Hassanabadi, Eur. Phys. J. Plus 137, 54 (2022).
|
1481 |
+
[63] E. R. Bezerra de Mello, A. A. Saharian, Class. Quantum Grav. 29, 135007 (2012).
|
1482 |
+
[64] E. R. Bezerra de Mello and A. A. Saharian, Class. Quantum Grav. 24, 2389 (2007).
|
1483 |
+
[65] D. Barbosa, U. de Freitas and E. R. Bezerra de Mello, Class. Quantum Grav. 28, 065009 (2011).
|
1484 |
+
[66] F. C. Carvalho and E. R. Bezerra de Mello, Class. Quantum Grav. 18, 1637 (2001).
|
1485 |
+
[67] F. C. Carvalho and E. R. B. de Mello, Class. Quantum Grav. 18, 5455 (2001).
|
1486 |
+
[68] E. R. B. de Mello, Class. Quantum Grav. 19, 5141 (2002).
|
1487 |
+
[69] A. L. Cavalcanti de Oliveira and E R Bezerra de Mello, Class. Quantum Grav. 23, 5249 (2006).
|
1488 |
+
[70] K. Jusufi, M. C. Werner, A. Banerjee and A. ¨Ovg¨un, Phys. Rev. D 95, 104012 (2017).
|
1489 |
+
[71] T. Ono, A. Ishihara H. Asada, Phys. Rev. D 99, 124030 (2019).
|
1490 |
+
[72] J. Morris, Phys. Rev. D 49, 1105 (1994).
|
1491 |
+
[73] F. Ahmed, Sci. Rep. 12, 8794 (2021).
|
1492 |
+
[74] R. L. L. Vitoria and H. Belich, Phys. Scr. 94, 125301 (2019).
|
1493 |
+
[75] Geusa de A. Marques and Valdir B. Bezerra, Class. Quantum Gravit. 19, 985 (2002).
|
1494 |
+
[76] P. Nwabuzor, C. Edet, A. N. Ikot, U. Okorie, M. Ramantswana, R. Horchani, A. H. A.-Aty, G. Rampho,
|
1495 |
+
Entropy 23 (8), 1060 (2021).
|
1496 |
+
[77] F. Ahmed, Phys. Scr. 98, 015403 (2023).
|
1497 |
+
[78] F. Ahmed, Mol. Phys. 120, 2124935 (2022).
|
1498 |
+
[79] F. Ahmed, arXiv:2209.13490[quant-ph].
|
1499 |
+
[80] F. Ahmed, arXiv:2210.04617[hep-th].
|
1500 |
+
[81] Deszcz, R., G�logowska, M., Hotlo´s, M. and Sawicz, K., A Survey on Generalized Einstein Metric Conditions,
|
1501 |
+
Advances in Lorentzian Geometry, Proceedings of the Lorentzian Geometry Conference in Berlin, AMS/IP
|
1502 |
+
Studies in Advanced Mathematics, 49, S.-T. Yau (series ed.), M. Plaue, A.D. Rendall and M. Scherfner
|
1503 |
+
(eds.), 2011, 27-46.
|
1504 |
+
[82] G�logowska, M., Semi-Riemannian manifolds whose Weyl tensor is a Kulkarni-Nomizu square, Publ. Inst.
|
1505 |
+
Math. (Beograd) (N.S.), 72(86) (2002), 95–106.
|
1506 |
+
[83] Shaikh, A. A., Kundu, H. and Ali, Md. S., On warped product super generalized recurrent manifolds, An.
|
1507 |
+
S¸tiint¸. Univ. Al. I. Cuza Ia¸si. Mat. (N. S.), LXIV(1) (2018), 85–99.
|
1508 |
+
[84] Shaikh, A. A. and Chakraborty, D., Curvature properties of Kantowski-Sachs metric, J. Geom. Phys., 160
|
1509 |
+
(2021), 103970. DOI: 10.1016/j.geomphys.2020.103970
|
1510 |
+
[85] Shaikh, A. A. and Kundu, H, On generalized Roter type manifolds, Kragujevac J. Math., 43(3) (2019),
|
1511 |
+
471–493.
|
1512 |
+
[86] Deszcz, R. and G�logowska, M., Some examples of nonsemisymmetric Ricci-semisymmetric hypersurfaces,
|
1513 |
+
Colloq. Math., 94 (2002), 87–101.
|
1514 |
+
[87] Deszcz, R., G�logowska, M., Hotlo´s, M. and S.ent¨urk, Z., On certain quasi-Einstein semi-symmetric hyper-
|
1515 |
+
surfaces, Ann. Univ. Sci. Budapest E¨otv¨os Sect. Math., 41 (1998), 151–164.
|
1516 |
+
[88] Deszcz, R. and Hotlo´s, M., On hypersurfaces with type number two in spaces of constant curvature, Ann.
|
1517 |
+
Univ. Sci. Budapest E¨otv¨os Sect. Math., 46 (2003), 19–34.
|
1518 |
+
[89] Shaikh, A. A., Deszcz, R., Hotlo´s, M., Je�lowicki, J. and Kundu, H., On pseudosymmetric manifolds, Publ.
|
1519 |
+
Math. Debrecen, 86(3-4) (2015), 433-456.
|
1520 |
+
|
1521 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
1522 |
+
23
|
1523 |
+
[90] Deszcz, R., G�logowska, M., Plaue, M., Sawicz, K. and Scherfner, M., On hypersurfaces in space forms
|
1524 |
+
satisfying particular curvature conditions of Tachibana type, Kragujevac J. Math., 35 (2011), 223–247.
|
1525 |
+
[91] Shaikh, A. A. and Kundu, H., On equivalency of various geometric structures, J. Geom., 105 (2014),
|
1526 |
+
139–165. DOI: 10.1007/s00022-013-0200-4
|
1527 |
+
[92] Tachibana, S., A Theorem on Riemannian manifolds of positive curvature operator, Proc. Japan Acad., 50
|
1528 |
+
(1974), 301–302.
|
1529 |
+
[93] Deszcz, R., On pseudosymmetric spaces, Bull. Belg. Math. Soc., Ser. A, 44 (1992), 1–34.
|
1530 |
+
[94] Deszcz, R., Curvature properties of a pseudosymmetric manifolds, Colloq. Math., 62 (1993), 139–147.
|
1531 |
+
[95] Deszcz, R., Glogowska, M., Hotlo´s, M. and Sawicz, K., Hypersurfaces in space forms satisfying a particular
|
1532 |
+
roter type equation, https://doi.org/10.48550/arXiv.2211.06700
|
1533 |
+
[96] Deszcz, R., G�logowska, M., Hotlo´s, M. and Zafindratafa, G., On some curvature conditions of pseudosym-
|
1534 |
+
metric type, Period. Math. Hungarica, 70(2) (2015), 153–170.
|
1535 |
+
[97] Deszcz, R., G�logowska, M., Hotlo´s, M., Zafindratafa, G., Hypersurfaces in space forms satisfying some
|
1536 |
+
curvature conditions, J. Geom. Phys., 99 (2016), 218–231.
|
1537 |
+
[98] Shaikh, A. A. and Kundu, H., On some curvature restricted geometric structures for projective curvature
|
1538 |
+
tensor, Int. J. Geom. Methods Mod. Phys., 15 (2018), 1850157.
|
1539 |
+
[99] Shaikh, A. A. and Kundu, H., On warped product manifolds satisfying some pseudosymmetric type condi-
|
1540 |
+
tions, Diff. Geom. - Dyn. Syst., 19 (2017), 119–135.
|
1541 |
+
[100] Shaikh, A. A., On pseudo quasi-Einstein manifolds, Period. Math. Hungarica, 59(2) (2009), 119–146.
|
1542 |
+
[101] Shaikh, A. A., Kim, Y. H. and Hui, S. K., On Lorentzian quasi Einstein manifolds, J. Korean Math.
|
1543 |
+
Soc., 48 (2011), 669–689. Erratum: On Lorentzian quasi Einstein manifolds, J. Korean Math. Soc., 48(6)
|
1544 |
+
(2011), 1327–1328.
|
1545 |
+
[102] Shaikh, A. A., Yoon, D. W. and Hui, S. K.,
|
1546 |
+
On quasi-Einstein spacetimes, Tsukuba J. Math., 33(2)
|
1547 |
+
(2009), 305–326.
|
1548 |
+
[103] Eyasmin, S., Chakraborty, D. and Sarkar, M., Curvature properties of Morris-Thorne Wormhole metric,
|
1549 |
+
J. Geom. Phys., 174(2) (2022), 104457.
|
1550 |
+
[104] Eyasmin, S. and Chakraborty, D., Curvature properties of (t-z)-type plane wave metric, J. Geom. Phys.,
|
1551 |
+
160 (2021), 104004.
|
1552 |
+
[105] Shaikh, A. A., Ali, A., Alkhaldi, A. H. and Chakraborty, D., Curvature properties of Nariai spacetimes,
|
1553 |
+
Int. J. Geom. Methods Mod. Phys., 17(03) (2020), 2050034. DOI: 10.1142/S0219887820500346
|
1554 |
+
[106] Shaikh, A. A., Datta, B. R. and Chakraborty, D., On some curvature properties of Vaidya-Bonner metric,
|
1555 |
+
Int. J. Geom. Methods. Phys., https://doi.org/10.1142/S0219887821502054.
|
1556 |
+
[107] Chaki, M. C., On generalized quasi-Einstein manifolds, Publ. Math. Debrecen, 58 (2001), 683–691.
|
1557 |
+
[108] Shaikh, A. A. and Kundu, H., On curvature properties of Som-Raychaudhuri spacetime, J. Geom., 108(2)
|
1558 |
+
(2016), 501–515.
|
1559 |
+
[109] Shaikh, A. A., Ali, A., Alkhaldi, A. H. and Chakraborty, D., Curvature properties of Melvin magnetic
|
1560 |
+
metric, J. Geom. Phys., 150 (2020), 103593. DOI: 10.1016/j.geomphys.2019.103593.
|
1561 |
+
[110] Shaikh, A. A., Srivastava, S. K. and Chakraborty, D., Curvature properties of anisotropic scale invariant
|
1562 |
+
metrics, Int. J. Geom. Meth. Mod. Phys., 16 (2019), 1950086.
|
1563 |
+
[111] Deszcz, R., G�logowska, M., Je�lowicki, L., Petrovi´c-Torga˘sev, M. and Zafindratafa, G., On Riemann and
|
1564 |
+
Weyl compatible tensors, Publ. Inst. Math. (Beograd) (N.S.), 94(108) (2013), 111–124.
|
1565 |
+
[112] Deszcz, R., G�logowska, M., Je�lowicki, J. and Zafindratafa, Z., Curvature properties of some class of warped
|
1566 |
+
product manifolds, Int. J. Geom. Methods Mod. Phys., 13 (2016), 1550135.
|
1567 |
+
|
1568 |
+
24
|
1569 |
+
A. A. SHAIKH, F. AHMED & B. R. DATTA
|
1570 |
+
[113] Deszcz, R., G�logowska, M., Petrovi´c-Torga˘sev, M. and Verstraelen, L., Curvature properties of some class
|
1571 |
+
of minimal hypersurfaces in Euclidean spaces, Filomat, 29 (2015), 479–492.
|
1572 |
+
[114] Deszcz, R., On Roter type manifolds, 5-th Conference on Geometry and Topology of Manifolds, April 27
|
1573 |
+
- May 3, 2003, Krynica, Poland.
|
1574 |
+
[115] Deszcz, R., Plaue, M. and Scherfner, M., On Roter type warped products with 1-dimensional fibres, J.
|
1575 |
+
Geom. Phys., 69 (2013), 1–11.
|
1576 |
+
[116] G�logowska, M., On Roter type manifolds, Pure and Applied Differential Geometry- PADGE, (2007),
|
1577 |
+
114–122.
|
1578 |
+
[117] Deszcz, R., G�logowska, M., Petrovi´c-Torga˘sev, M. and Verstraelen, L., On the Roter type of Chen ideal
|
1579 |
+
submanifolds, Results Math., 59 (2011), 401–413.
|
1580 |
+
[118] Shaikh, A. A. and Binh, T. Q., On some class of Riemannian manifolds, Bull. Transilv. Univ., 15(50)
|
1581 |
+
(2008), 351–362.
|
1582 |
+
[119] Shaikh, A. A. and Jana, S. K., On weakly cyclic Ricci symmetric manifolds, Ann. Pol. Math., 89(3)
|
1583 |
+
(2006), 139–146.
|
1584 |
+
[120] Shaikh, A. A. and Jana, S. K., On quasi-conformally flat weakly Ricci symmetric manifolds, Acta Math.
|
1585 |
+
Hungar., 115(3) (2007), 197–214.
|
1586 |
+
[121] Gray, A., Einstein-like manifolds which are not Einstein, Geom. Dedicata, 7 (1978), 259–280.
|
1587 |
+
[122] Simon, U., Codazzi tensors, Glob. Diff. Geom. and Glob. Ann., Lecture notes, 838, Springer-Verlag, 1981,
|
1588 |
+
289–296.
|
1589 |
+
[123] Ferus, D., A remark on Codazzi tensors on constant curvature space, Glob. Diff. Geom. Glob. Ann.,
|
1590 |
+
Lecture notes 838, Springer, 1981.
|
1591 |
+
[124] Mantica, C. A. and Molinari, L. G., Extended Derdzinski-Shen theorem for curvature tensors, Colloq.
|
1592 |
+
Math., 128 (2012), 1–6.
|
1593 |
+
[125] Mantica, C. A. and Molinari, L. G., Weyl compatible tensors, Int. J. Geom. Methods Mod. Phys., 11(08)
|
1594 |
+
(2014), 1450070.
|
1595 |
+
[126] Defever, F. and Deszcz, R., On semi-Riemannian manifolds satisfying the condition R · R = Q(S, R),
|
1596 |
+
in:Geometry and Topology of Submanifolds III, World Sci., River Edge, NJ, (1991), 108-130.
|
1597 |
+
[127] Mantica, C. A. and Molinari, L. G., Riemann compatible tensors, Colloq. Math., 128 (2012), 197–210.
|
1598 |
+
[128] Suh, Y. J., Kwon, J-H. and Pyo, Y. S., On semi-Riemannian manifolds satisfying the second Bianchi
|
1599 |
+
identity, J. Korean Math. Soc., 40(1) (2003), 129–167.
|
1600 |
+
[129] Mantica, C. A. and Suh, Y. J., The closedness of some generalized curvature 2-forms on a Riemannian
|
1601 |
+
manifold I, Publ. Math. Debrecen, 81(3-4) (2012), 313–326.
|
1602 |
+
[130] Mantica, C. A. and Suh, Y. J., The closedness of some generalized curvature 2-forms on a Riemannian
|
1603 |
+
manifold II, Publ. Math. Debrecen, 82(1) (2013), 163–182.
|
1604 |
+
[131] Mantica, C. A. and Suh, Y. J., Recurrent conformal 2-forms on pseudo-Riemannian manifolds, Int. J.
|
1605 |
+
Geom. Methods Mod. Phy., 11(6) (2014), 1450056 (29 pages).
|
1606 |
+
[132] Prvanovi´c, M., On weakly symmetric Riemannian manifolds, Publ. Math. Debrecen, 46(1-2) (1995),
|
1607 |
+
19–25.
|
1608 |
+
[133] Venzi, P., Una generalizzazione degli spazi ricorrenti, Rev. Roumaine Math. Pures Appl., 30 (1985),
|
1609 |
+
295–305.
|
1610 |
+
|
1611 |
+
GEOMETRICAL PROPERTIES OF A POINT-LIKE GLOBAL MONOPOLE SPACETIME
|
1612 |
+
25
|
1613 |
+
1,3 Department of Mathematics,
|
1614 |
+
University of Burdwan, Golapbag,
|
1615 |
+
Burdwan-713104, West Bengal, India
|
1616 |
+
Email address: [email protected] ; [email protected]
|
1617 |
+
Email address: [email protected]
|
1618 |
+
2 Department of Physics,
|
1619 |
+
University of Science & Technology Meghalaya,
|
1620 |
+
Ri-Bhoi, Meghalaya-793101, India,
|
1621 |
+
Email address: [email protected] ; [email protected]
|
1622 |
+
|
E9E4T4oBgHgl3EQfGwxn/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
EtAzT4oBgHgl3EQfUPx6/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:254aca6501f60b4e66d9ba6d7dfa5fde2fb68404c8cd5a05722f7bebea2e57ac
|
3 |
+
size 180977
|
FNAyT4oBgHgl3EQf4_q8/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:7be12527da67621f06f40aa9d7877bccfa82f633d214163eb77e2336915c556a
|
3 |
+
size 205798
|
HNAzT4oBgHgl3EQfxf6-/content/tmp_files/2301.01740v1.pdf.txt
ADDED
@@ -0,0 +1,3023 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
Ground state of superheavy elements with 120 ≤ Z ≤ 170: systematic study of the
|
2 |
+
electron-correlation, Breit, and QED effects
|
3 |
+
I. M. Savelyev,1 M. Y. Kaygorodov,1 Y. S. Kozhedub,1 A. V. Malyshev,1 I. I. Tupitsyn,1 and V. M. Shabaev1, 2
|
4 |
+
1Department of Physics, St.
|
5 |
+
Petersburg State University,
|
6 |
+
7/9 Universitetskaya nab., 199034 St.
|
7 |
+
Petersburg, Russia
|
8 |
+
2National Research Centre “Kurchatov Institute” B.P. Konstantinov Petersburg
|
9 |
+
Nuclear Physics Institute, Gatchina, Leningrad district 188300, Russia
|
10 |
+
(Dated: January 5, 2023)
|
11 |
+
For superheavy elements with atomic numbers 120 ≤ Z ≤ 170, the concept of the ground-state
|
12 |
+
configuration is being reexamined. To this end, relativistic calculations of the electronic structure
|
13 |
+
of the low-lying levels are carried out by means of the Dirac-Fock and configuration-interaction
|
14 |
+
methods. The magnetic and retardation parts of the Breit interaction as well as the QED effects are
|
15 |
+
taken into account. The influence of the relativistic, QED, and electron-electron correlation effects
|
16 |
+
on the determination of the ground-state is analyzed.
|
17 |
+
I.
|
18 |
+
INTRODUCTION
|
19 |
+
Mendeleev’s Periodic Table is an empirically sup-
|
20 |
+
ported scheme which allows one to categorize the phys-
|
21 |
+
ical and chemical properties of the elements by linking
|
22 |
+
them with the rule of the successive occupation of the
|
23 |
+
atomic orbitals. With increasing the atomic number Z,
|
24 |
+
relativistic effects grow substantially. They can signifi-
|
25 |
+
cantly alter various properties of the elements as com-
|
26 |
+
pared with their lighter homologues. A classical example
|
27 |
+
of the relativistic effects is the yellow color of gold [1–3].
|
28 |
+
In the region of the superheavy elements (SHEs) belong-
|
29 |
+
ing to the 7th period of the Table, the interplay between
|
30 |
+
the relativistic and electron-electron correlation effects
|
31 |
+
gives rise to the trends of deviation from the periodic
|
32 |
+
law [4–8]. Some of these deviations, such as a different
|
33 |
+
ground-state configuration of Lr (Z = 103) relative to
|
34 |
+
its lighter homologue Lu (Z = 71), are confirmed exper-
|
35 |
+
imentally [9], the others, like a positive electron affinity
|
36 |
+
in Og (Z = 118), are predicted only theoretically [10–
|
37 |
+
14]. Whether the 8th-period SHEs (with Z > 118) fit
|
38 |
+
the Periodic Table and obey the periodic law is an open
|
39 |
+
intriguing question. For instance, this period brings into
|
40 |
+
play the previously-never-met 5g shell, and the corre-
|
41 |
+
sponding electronic-structure feature no doubt must be
|
42 |
+
presented in possible extensions of the Periodic Table. In
|
43 |
+
addition, the influence of the quantum-electrodynamics
|
44 |
+
(QED) effects on the SHE ground states has not been
|
45 |
+
investigated systematically so far.
|
46 |
+
A review of the current status of the problem and
|
47 |
+
an extension of the Periodic Table up to Z = 172 based
|
48 |
+
on the Dirac-Fock (DF) calculations, also known as the
|
49 |
+
relativistic Hartree-Fock ones, are presented in Ref. [15],
|
50 |
+
see also a very recent review [16]. This upper bound is
|
51 |
+
determined by the fact that at higher values of Z the
|
52 |
+
lowest (1s) Dirac level “dives” into the negative-energy
|
53 |
+
continuum, provided a reasonable model for the nuclear
|
54 |
+
charge distribution is employed [17–28].
|
55 |
+
The key point for the description of the SHE prop-
|
56 |
+
erties is determination of the ground-state configuration.
|
57 |
+
The first attempts to advance the study of the SHEs be-
|
58 |
+
yond the 7th period and to conjecture on their chemical
|
59 |
+
and physical properties were undertaken in the 1970s [29–
|
60 |
+
34]. Throughout the years, the issue was addressed by
|
61 |
+
using various one-configuration methods [35, 36]. It soon
|
62 |
+
became clear that in many cases the total energies of var-
|
63 |
+
ious configurations differ very little from each other, and
|
64 |
+
more sophisticated configuration-interaction calculations
|
65 |
+
are necessary. Taking into account the correlation effects
|
66 |
+
may lead to a change in the ground-state configuration.
|
67 |
+
Some SHEs from the 8th period were studied within
|
68 |
+
the many-configuration approaches [37–46]. The only pa-
|
69 |
+
per that went beyond the one-configuration approxima-
|
70 |
+
tion for all the 8th period elements is Ref. [47].
|
71 |
+
The
|
72 |
+
multiconfiguration Dirac–Fock method was used there to
|
73 |
+
account for the interaction between energetically close
|
74 |
+
configurations in the SHEs with Z ≤ 164. As a result, in
|
75 |
+
about 50% of cases the ground-state configurations found
|
76 |
+
in Ref. [47] differ from the ones obtained in the previous
|
77 |
+
Dirac-Fock-Slater calculations [34], where no electron-
|
78 |
+
electron correlation effects were considered. In Ref. [47],
|
79 |
+
only the ground-state configurations were reported with-
|
80 |
+
out any information on the level structure. The stability
|
81 |
+
of the obtained results with respect to the accuracy of
|
82 |
+
the correlation treatment was not discussed in that work
|
83 |
+
as well.
|
84 |
+
There are also some other issues that need to be clar-
|
85 |
+
ified when discussing the SHE ground states. Does the
|
86 |
+
one-configuration description remain valid for so com-
|
87 |
+
plex systems possessing quite a large number of valence
|
88 |
+
shells with, in particular, the 5g one among them? In
|
89 |
+
other words, it seems reasonable that the ground-state
|
90 |
+
arXiv:2301.01740v1 [physics.atom-ph] 4 Jan 2023
|
91 |
+
|
92 |
+
2
|
93 |
+
level of the SHEs generally can not be found without
|
94 |
+
taking into account the electron-correlation effects, but
|
95 |
+
is it possible, in principle, to describe with a sufficient
|
96 |
+
accuracy this state using a single configuration?
|
97 |
+
Can
|
98 |
+
previously unaccounted QED effects change the ground
|
99 |
+
state of the SHEs? The present paper aims to investigate
|
100 |
+
these points in the framework of the relativistic Dirac-
|
101 |
+
Fock method and the configuration-interaction method in
|
102 |
+
the basis of the Dirac-Fock-Sturm orbitals [48–50]. In our
|
103 |
+
calculations, in order to investigate a possible influence
|
104 |
+
of the QED effects on the electronic structure and the
|
105 |
+
ground-state configuration, both the methods are paired
|
106 |
+
with the model-QED-operator approach [51, 52] which
|
107 |
+
has been recently extended to the region 120 ≤ Z ≤ 170
|
108 |
+
in Ref. [53].
|
109 |
+
The paper is organized as follows.
|
110 |
+
In Sec. II, an
|
111 |
+
overview of the methods and their main implementation
|
112 |
+
features are presented.
|
113 |
+
The numerical details and the
|
114 |
+
particular aspects of the calculation procedure are given
|
115 |
+
in Sec. III. We discuss the obtained results and compare
|
116 |
+
them with the previous calculations in Sec. IV. Sec. V
|
117 |
+
concludes the paper with a brief summary.
|
118 |
+
The atomic units are used throughout the paper.
|
119 |
+
II.
|
120 |
+
THEORETICAL APPROACHES AND
|
121 |
+
METHODS
|
122 |
+
In the present work, to explore the SHE ground
|
123 |
+
states we use the Dirac-Fock (DF) and configuration-
|
124 |
+
interaction (CI) methods. The issue is studied from the
|
125 |
+
different perspectives using the one- as well as the many-
|
126 |
+
configuration approaches.
|
127 |
+
We consider a relativistic configuration K defined
|
128 |
+
by the occupation numbers {qa}Ns
|
129 |
+
a=1, where the index a
|
130 |
+
enumerates the relativistic shells. For the list of the rela-
|
131 |
+
tivistic shells (n1l1j1)q1 . . . (nNslNsjNs)qNs (n is the prin-
|
132 |
+
cipal quantum number, l and j are the orbital and total
|
133 |
+
angular momenta, respectively), we first determine the
|
134 |
+
DF energy obtained within the relativistic-configuration-
|
135 |
+
average (RAV) approximation, also known in the litera-
|
136 |
+
ture as the jj-average one [54]. The corresponding total
|
137 |
+
DF energy can be formally written as
|
138 |
+
EDF
|
139 |
+
RAV(K) = 1
|
140 |
+
Nd
|
141 |
+
�
|
142 |
+
α∈K
|
143 |
+
⟨α| ˆHDC|α⟩ ,
|
144 |
+
(1)
|
145 |
+
where α ≡ detα{ϕDF
|
146 |
+
i
|
147 |
+
} are the Slater determinant con-
|
148 |
+
structed from the one-electron DF orbitals ϕDF
|
149 |
+
i
|
150 |
+
belong-
|
151 |
+
ing to the configuration K, Nd is the number of these de-
|
152 |
+
terminants, and ˆHDC ≡ ˆHD + ˆV C is the many-electron
|
153 |
+
Dirac-Coulomb Hamiltonian. In the DF-RAV approxi-
|
154 |
+
mation, the summation in the functional (1), which can
|
155 |
+
be performed analytically, is equivalent to the summa-
|
156 |
+
tion over the relativistic terms J of the configuration K
|
157 |
+
taking into account their multiplicities [55, 56]. The DF
|
158 |
+
equations can be derived by varying Eq. (1) with the ev-
|
159 |
+
ident constraints due to the orthonormality conditions.
|
160 |
+
The DF orbitals ϕDF
|
161 |
+
i
|
162 |
+
and the energy EDF
|
163 |
+
RAV(K) are then
|
164 |
+
obtained by solving the corresponding DF equations. We
|
165 |
+
note that only the Coulomb-interaction operator ˆVC is in-
|
166 |
+
cluded self-consistently into the DF equations.
|
167 |
+
The Breit-interaction correction to the average en-
|
168 |
+
ergy EDF
|
169 |
+
RAV(K) of the configuration K is evaluated per-
|
170 |
+
turbatively as
|
171 |
+
∆EB
|
172 |
+
RAV(K) = 1
|
173 |
+
Nd
|
174 |
+
�
|
175 |
+
α∈K
|
176 |
+
⟨α| ˆV B|α⟩ ,
|
177 |
+
(2)
|
178 |
+
where the determinants α are constructed from ϕDF
|
179 |
+
i
|
180 |
+
and
|
181 |
+
ˆV B is the Breit-interaction operator.
|
182 |
+
The QED cor-
|
183 |
+
rections are treated using the model-QED-operator ap-
|
184 |
+
proach developed in Refs. [51–53].
|
185 |
+
We mention also
|
186 |
+
some alternative methods to approximately account for
|
187 |
+
the QED effects in many-electron systems, see, e.g.,
|
188 |
+
Refs. [40, 44, 57–62]. For very recent applications and de-
|
189 |
+
velopments of the model-QED-operator methods, which
|
190 |
+
include the calculations of the QED effects in molecules,
|
191 |
+
we refer to Refs. [63–67]. Like the Breit-interaction con-
|
192 |
+
tribution, the QED correction in the RAV approximation
|
193 |
+
is calculated as the relativistic-configuration-average ex-
|
194 |
+
pectation value of the model-QED operator ˆV Q,
|
195 |
+
∆EQ
|
196 |
+
RAV(K) = 1
|
197 |
+
Nd
|
198 |
+
�
|
199 |
+
α∈K
|
200 |
+
⟨α| ˆV Q|α⟩ .
|
201 |
+
(3)
|
202 |
+
Finally, for the configuration K, we consider the average
|
203 |
+
energy including the Breit correction and QED effects,
|
204 |
+
EDCBQ
|
205 |
+
RAV (K) = EDF
|
206 |
+
RAV(K) + ∆EB
|
207 |
+
RAV(K) + ∆EQ
|
208 |
+
RAV(K) .
|
209 |
+
(4)
|
210 |
+
Hereinafter, this scheme is referred to as the DCBQ-RAV
|
211 |
+
one.
|
212 |
+
To resolve the level structure for the configura-
|
213 |
+
tion K, one can try to find a single-configuration DF wave
|
214 |
+
function and corresponding energy for the jj-coupling
|
215 |
+
term using the energy functional constructed for a given
|
216 |
+
value of J. However, if this approach is employed for an
|
217 |
+
open-shell system possessing a complex level structure, it
|
218 |
+
often proves impossible to adequately select a proper lin-
|
219 |
+
ear combination of many-electron wave functions solely
|
220 |
+
from symmetry considerations. It turns out that most
|
221 |
+
of the SHEs have several open shells, and, therefore, this
|
222 |
+
straightforward scheme may result in a wrong level struc-
|
223 |
+
ture. In the present work, the level structure of the con-
|
224 |
+
figuration K is resolved by means of the CI approach
|
225 |
+
for the Dirac-Coulomb-Breit (DCB) Hamiltonian sup-
|
226 |
+
plemented with the model-QED operator. The DCBQ
|
227 |
+
|
228 |
+
3
|
229 |
+
Hamiltonian reads as
|
230 |
+
ˆHDCBQ = Λ+ �
|
231 |
+
ˆHD + ˆV C + ˆV B + ˆV Q�
|
232 |
+
Λ+ ,
|
233 |
+
(5)
|
234 |
+
where Λ+ is the product of one-electron projectors on
|
235 |
+
the positive-energy solutions of the DF-RAV equations.
|
236 |
+
The eigenvalue problem induced by the Hamiltonian (5)
|
237 |
+
in the space of all the determinants α arising from the
|
238 |
+
single relativistic configuration (SRC) K describes the
|
239 |
+
splitting of the levels,
|
240 |
+
ˆHDCBQΨSRC(K, JM) = EDCBQ
|
241 |
+
SRC
|
242 |
+
ΨSRC(K, JM) ,
|
243 |
+
(6)
|
244 |
+
where M means the projection of J.
|
245 |
+
However, in case of energetically close configura-
|
246 |
+
tions, their strong interaction and mixing may result in
|
247 |
+
changes of the level structure. To account for the corre-
|
248 |
+
lation effects, we consider a larger CI problem,
|
249 |
+
ˆHDCBQΨCI(JM) = EDCBQ
|
250 |
+
CI
|
251 |
+
(J)ΨCI(JM) ,
|
252 |
+
(7)
|
253 |
+
in the space spanned by the Slater determinants gener-
|
254 |
+
ated not only from the configuration K but also from a
|
255 |
+
given list of relativistic configurations (see details in the
|
256 |
+
next section). In the present calculations, the CI method
|
257 |
+
in the basis of the Dirac-Fock-Sturm orbitals is used (CI-
|
258 |
+
DFS) [48–50]. At the CI level, the Breit and QED cor-
|
259 |
+
rections are taken into account, according to Eqs. (5) –
|
260 |
+
(7), by including the corresponding terms into the Dirac-
|
261 |
+
Coulomb Hamiltonian.
|
262 |
+
Finally, we emphasize that the main goal of the
|
263 |
+
present study is not to obtain the most accurate the-
|
264 |
+
oretical predictions for the SHE energy-level structure,
|
265 |
+
since in the cases of complex configurations this can be
|
266 |
+
a separate extremely complicated task. Instead, we aim
|
267 |
+
at a reliable determination of the ground-state levels and
|
268 |
+
the configurations they belong to within a series of the
|
269 |
+
adequate relativistic calculations.
|
270 |
+
Having discussed the methods, let us proceed to de-
|
271 |
+
tails of their application in the scope of the present work.
|
272 |
+
III.
|
273 |
+
DETAILS OF THE CALCULATIONS
|
274 |
+
In the present work, all the calculations of the en-
|
275 |
+
ergy levels of SHE are performed employing the Fermi
|
276 |
+
model for the nuclear-charge distribution.
|
277 |
+
The root-
|
278 |
+
mean-square radius of the nucleus (in fm) is given by
|
279 |
+
R =
|
280 |
+
�
|
281 |
+
3
|
282 |
+
5Rsphere,
|
283 |
+
Rsphere = 1.2A1/3,
|
284 |
+
(8)
|
285 |
+
where for the nucleon number A we use the approximate
|
286 |
+
formula from Ref. [20],
|
287 |
+
A = 0.00733Z2 + 1.30Z + 63.6.
|
288 |
+
(9)
|
289 |
+
The value of A obtained from Eq. (9) is rounded to the
|
290 |
+
nearest integer. This choice of the nuclear size is consis-
|
291 |
+
tent with the one made in Ref. [53].
|
292 |
+
The SHE ground-state configuration is a priori un-
|
293 |
+
known. As described in the previous section, we use three
|
294 |
+
schemes to define the ground-state configuration. The
|
295 |
+
first scheme is based on the DF-RAV method. Probing
|
296 |
+
various configurations K, we determine the ground-state
|
297 |
+
one as the configuration K∗ with the lowest average en-
|
298 |
+
ergy EDCBQ
|
299 |
+
RAV (K∗).
|
300 |
+
For each Z, the list of all possible
|
301 |
+
configuration-candidates for the role of the ground one
|
302 |
+
is constructed by distributing Ne = Z − Ncore valence
|
303 |
+
electrons over the valence relativistic shells. The number
|
304 |
+
of the core-shell electrons Ncore and the list of the va-
|
305 |
+
lence shells are presented in Table I. We consider as the
|
306 |
+
valence shells those ones which, according to our prelim-
|
307 |
+
inary calculations, are most likely to be occupied in the
|
308 |
+
ground state.
|
309 |
+
TABLE I. The list of the relativistic shells used to generate
|
310 |
+
the relativistic configurations for which the DF-RAV equa-
|
311 |
+
tions are solved.
|
312 |
+
The absence of the lower index j in the
|
313 |
+
column “Core shells” means that all relativistic orbitals cor-
|
314 |
+
responding to the nonrelativistic one are fully occupied. The
|
315 |
+
probe configurations are generated according to the following
|
316 |
+
rule: the core shells are fully occupied, the Z − Ncore valence
|
317 |
+
electrons are distributed over the valence shells. The nota-
|
318 |
+
tions [Rn] and [Og] represent the closed-shell configurations
|
319 |
+
of radon and oganesson atoms, respectively.
|
320 |
+
Z
|
321 |
+
Core shells
|
322 |
+
Ncore
|
323 |
+
Valence shells
|
324 |
+
120 – 121
|
325 |
+
[Rn]5f 6d 7s 7p1/2
|
326 |
+
114
|
327 |
+
7p3/2 8s 8p1/2 7d3/2
|
328 |
+
122 – 123
|
329 |
+
[Og]
|
330 |
+
118
|
331 |
+
8s 8p1/2 7d3/2 6f5/2
|
332 |
+
124 – 133
|
333 |
+
[Og]8s
|
334 |
+
120
|
335 |
+
8p1/2 6f5/2 7d3/2 5g7/2
|
336 |
+
134 – 144
|
337 |
+
[Og]8s 5g7/2
|
338 |
+
128
|
339 |
+
8p1/2 6f5/2 7d3/2 5g9/2
|
340 |
+
145 – 146
|
341 |
+
[Og]8s 8p1/2 5g7/2
|
342 |
+
130
|
343 |
+
6f5/2 7d3/2 5g9/2 9s
|
344 |
+
147 – 155
|
345 |
+
[Og]8s 8p1/2 5g
|
346 |
+
140
|
347 |
+
6f5/2 7d3/2 6f7/2 9s
|
348 |
+
156 – 160
|
349 |
+
[Og]8s 8p1/2 5g 6f5/2
|
350 |
+
146
|
351 |
+
6f7/2 7d3/2 9s 7d5/2
|
352 |
+
161 – 165
|
353 |
+
[Og]8s 8p1/2 5g 6f
|
354 |
+
154
|
355 |
+
7d3/2 7d5/2 9s 8p3/2
|
356 |
+
166 – 168
|
357 |
+
[Og]8s 8p1/2 5g 6f 7d3/2
|
358 |
+
158
|
359 |
+
7d5/2 9s 8p3/2 9p1/2
|
360 |
+
169 – 170
|
361 |
+
[Og]8s 8p1/2 5g 6f 7d
|
362 |
+
164
|
363 |
+
9s 8p3/2 9p1/2 7f5/2
|
364 |
+
As an example, in Table II for the SHEs with Z =
|
365 |
+
125 and Z = 140, seven configurations K with the lowest
|
366 |
+
relativistic-configuration-average energies EDF
|
367 |
+
RAV(K) are
|
368 |
+
presented.
|
369 |
+
For each configuration K given relative to
|
370 |
+
the closed-shell one, the total DF-RAV energy and the
|
371 |
+
energies obtained by successively adding the Breit and
|
372 |
+
QED corrections are placed in the fourth, fifth, and sixth
|
373 |
+
columns of Table II, respectively. The configurations are
|
374 |
+
sorted in ascending order of the energy EDF
|
375 |
+
RAV(K), i.e.,
|
376 |
+
the first entry corresponds to the configuration with the
|
377 |
+
lowest energy. The relative changes in the order of the
|
378 |
+
configurations after addition of the corrections are indi-
|
379 |
+
cated by the symbols ▽ (down) and △ (up). The absence
|
380 |
+
|
381 |
+
4
|
382 |
+
of these symbols corresponds to the case when the con-
|
383 |
+
figuration position in the sorted list does not change.
|
384 |
+
TABLE II. The relativistic-configuration-average energies for the SHEs with Z = 125 and Z = 140 evaluated for the configura-
|
385 |
+
tions K using the DF method, EDF
|
386 |
+
RAV, with the addition of the Breit-interaction correction, +∆EB
|
387 |
+
RAV, and with the additional
|
388 |
+
accounting for the QED correction, +∆EQ
|
389 |
+
RAV, (a.u.). The configurations are presented relative to the closed-shell configuration
|
390 |
+
and sorted in the ascending order of the energy EDF
|
391 |
+
RAV. In the last two columns, the symbols ▽ (down) and △ (up) indicate the
|
392 |
+
change in the order of the configurations relative to the order in the preceding column. The absence of these symbols means
|
393 |
+
that there is no change in the position of the configuration. In particular, the QED effects do not affect the order.
|
394 |
+
Z
|
395 |
+
Closed Shells
|
396 |
+
K
|
397 |
+
EDF
|
398 |
+
RAV
|
399 |
+
+∆EB
|
400 |
+
RAV
|
401 |
+
+∆EQ
|
402 |
+
RAV
|
403 |
+
125
|
404 |
+
[Og]8s2
|
405 |
+
1/2
|
406 |
+
8p1
|
407 |
+
1/26f 4
|
408 |
+
5/2
|
409 |
+
−64 846.3116
|
410 |
+
−64 718.7639 ▽3
|
411 |
+
−64 627.5323
|
412 |
+
8p1
|
413 |
+
1/26f 3
|
414 |
+
5/25g1
|
415 |
+
7/2
|
416 |
+
−64 846.3061
|
417 |
+
−64 718.7781 △1
|
418 |
+
−64 627.5496
|
419 |
+
8p1
|
420 |
+
1/27d1
|
421 |
+
3/26f 2
|
422 |
+
5/25g1
|
423 |
+
7/2
|
424 |
+
−64 846.3033
|
425 |
+
−64 718.7718 △1
|
426 |
+
−64 627.5421
|
427 |
+
8p2
|
428 |
+
1/26f 2
|
429 |
+
5/25g1
|
430 |
+
7/2
|
431 |
+
−64 846.3007
|
432 |
+
−64 718.7680 △1
|
433 |
+
−64 627.5377
|
434 |
+
7d1
|
435 |
+
3/26f 4
|
436 |
+
5/2
|
437 |
+
−64 846.2769
|
438 |
+
−64 718.7300 ▽1
|
439 |
+
−64 627.4988
|
440 |
+
8p1
|
441 |
+
1/27d1
|
442 |
+
3/26f 3
|
443 |
+
5/2
|
444 |
+
−64 846.2697
|
445 |
+
−64 718.7182 ▽1
|
446 |
+
−64 627.4854
|
447 |
+
7d1
|
448 |
+
3/26f 3
|
449 |
+
5/25g1
|
450 |
+
7/2
|
451 |
+
−64 846.2680
|
452 |
+
−64 718.7408 △2
|
453 |
+
−64 627.5127
|
454 |
+
140
|
455 |
+
[Og]8s2
|
456 |
+
1/28p2
|
457 |
+
1/25g8
|
458 |
+
7/2
|
459 |
+
7d2
|
460 |
+
3/26f 2
|
461 |
+
5/25g6
|
462 |
+
9/2
|
463 |
+
−93 548.8504
|
464 |
+
−93 320.7516 ▽1
|
465 |
+
−93 179.0799
|
466 |
+
7d1
|
467 |
+
3/26f 3
|
468 |
+
5/25g6
|
469 |
+
9/2
|
470 |
+
−93 548.8479
|
471 |
+
−93 320.7539 △1
|
472 |
+
−93 179.0837
|
473 |
+
7d1
|
474 |
+
3/26f 4
|
475 |
+
5/25g5
|
476 |
+
9/2
|
477 |
+
−93 548.7928
|
478 |
+
−93 320.6719 ▽1
|
479 |
+
−93 178.9986
|
480 |
+
7d3
|
481 |
+
3/26f 1
|
482 |
+
5/25g6
|
483 |
+
9/2
|
484 |
+
−93 548.7738
|
485 |
+
−93 320.6697 ▽1
|
486 |
+
−93 178.9965
|
487 |
+
6f 4
|
488 |
+
5/25g6
|
489 |
+
9/2
|
490 |
+
−93 548.7689
|
491 |
+
−93 320.6791 △2
|
492 |
+
−93 179.0103
|
493 |
+
6f 5
|
494 |
+
5/25g5
|
495 |
+
9/2
|
496 |
+
−93 548.7559
|
497 |
+
−93 320.6398
|
498 |
+
−93 178.9679
|
499 |
+
7d2
|
500 |
+
3/26f 3
|
501 |
+
5/25g5
|
502 |
+
9/2
|
503 |
+
−93 548.7488
|
504 |
+
−93 320.6229
|
505 |
+
−93 178.9480
|
506 |
+
As one can see from the examples given in Ta-
|
507 |
+
ble II, the Breit-interaction correction can change the
|
508 |
+
ground-state configuration within the RAV approxima-
|
509 |
+
tion.
|
510 |
+
For Z = 125, Table II demonstrates that when
|
511 |
+
only the Coulomb interaction is taken into account the
|
512 |
+
ground-state configuration is 8p1
|
513 |
+
1/26f 4
|
514 |
+
5/2. However, when
|
515 |
+
we add the Breit-interaction correction evaluated accord-
|
516 |
+
ing to Eq. (2), the configuration 8p1
|
517 |
+
1/26f 3
|
518 |
+
5/25g1
|
519 |
+
7/2 turns
|
520 |
+
out to be the lowest-energy one. All the other six con-
|
521 |
+
figurations change their order as well.
|
522 |
+
A similar con-
|
523 |
+
figuration reordering occurs for the SHE with Z = 140
|
524 |
+
as well.
|
525 |
+
However, in the latter case some configu-
|
526 |
+
rations retain their positions.
|
527 |
+
Without the Breit in-
|
528 |
+
teraction, the ground-state configuration for Z = 140
|
529 |
+
is 7d2
|
530 |
+
3/26f 2
|
531 |
+
5/25g6
|
532 |
+
9/2, but with this correction taken into ac-
|
533 |
+
count the lowest-energy configuration is 7d1
|
534 |
+
3/26f 3
|
535 |
+
5/25g6
|
536 |
+
9/2.
|
537 |
+
For both demonstrated cases, the QED correction does
|
538 |
+
not change the ground-state configuration and the sorted
|
539 |
+
configuration list as a whole.
|
540 |
+
After the configurations with the lowest average en-
|
541 |
+
ergies EDCBQ
|
542 |
+
RAV (K) are found, we explore their level struc-
|
543 |
+
ture using the DCBQ-SRC approach. To determine the
|
544 |
+
ground-state level, we choose seven configurations with
|
545 |
+
the lowest DCBQ-RAV energies and for each level belong-
|
546 |
+
ing to these configurations solve the DCBQ-SRC prob-
|
547 |
+
lem (6). The configuration with the lowest DCBQ-SRC
|
548 |
+
energy is considered to be the ground-state configura-
|
549 |
+
tion in the DCBQ-SRC approach, and the corresponding
|
550 |
+
level gives the ground-state level. Since for most SHEs, a
|
551 |
+
few selected DCBQ-RAV energies are close to each other,
|
552 |
+
we bear in mind that the DCBQ-SRC consideration can
|
553 |
+
change the ground-state configuration.
|
554 |
+
-64627.65
|
555 |
+
-64627.60
|
556 |
+
-64627.55
|
557 |
+
-64627.50
|
558 |
+
-64627.45
|
559 |
+
-64627.40
|
560 |
+
8p1
|
561 |
+
1/26f3
|
562 |
+
5/25g1
|
563 |
+
7/2
|
564 |
+
RAV
|
565 |
+
8p1
|
566 |
+
1/27d1
|
567 |
+
3/26f2
|
568 |
+
5/25g1
|
569 |
+
7/2
|
570 |
+
RAV
|
571 |
+
J = 13/2
|
572 |
+
J = 17/2
|
573 |
+
EDCBQ (a.u.)
|
574 |
+
FIG. 1.
|
575 |
+
Relativistic-configuration-average energies EDCBQ
|
576 |
+
RAV
|
577 |
+
calculated
|
578 |
+
for
|
579 |
+
the
|
580 |
+
configurations
|
581 |
+
8p1
|
582 |
+
1/26f 3
|
583 |
+
5/25g1
|
584 |
+
7/2
|
585 |
+
(left)
|
586 |
+
and 8p1
|
587 |
+
1/27d1
|
588 |
+
3/26f 2
|
589 |
+
5/25g1
|
590 |
+
7/2 (right) of the SHE with Z = 125
|
591 |
+
and all the possible levels which contribute to these average
|
592 |
+
energies. For the lowest DCBQ-SRC levels the total angular
|
593 |
+
momentum quantum numbers J are shown.
|
594 |
+
|
595 |
+
5
|
596 |
+
The last statement is illustrated in Fig. 1, where the
|
597 |
+
average energies EDCBQ
|
598 |
+
RAV (K) of the SHE with Z = 125
|
599 |
+
are presented for two configurations having the lowest
|
600 |
+
average energies: K = 8p1
|
601 |
+
1/26f 3
|
602 |
+
5/25g1
|
603 |
+
7/2 (left) and ˜K =
|
604 |
+
8p1
|
605 |
+
1/27d1
|
606 |
+
3/26f 2
|
607 |
+
5/25g1
|
608 |
+
7/2 (right). For each configuration, we
|
609 |
+
show all the levels EDCBQ
|
610 |
+
SRC
|
611 |
+
(K, J) contributing to the
|
612 |
+
relativistic-configuration-average energy.
|
613 |
+
For the low-
|
614 |
+
est DCBQ-SRC levels, the total angular momenta J
|
615 |
+
are presented.
|
616 |
+
One can see, that the average energy
|
617 |
+
of the configuration K is lower than the energy of the
|
618 |
+
configuration ˜K by about EDCBQ
|
619 |
+
RAV ( ˜K) − EDCBQ
|
620 |
+
RAV (K) =
|
621 |
+
0.0065 a.u. (see also Table II). However, the lowest
|
622 |
+
level J = 17/2 of the configuration ˜K lies lower than
|
623 |
+
the lowest level J = 13/2 of the configuration K by
|
624 |
+
about EDCBQ
|
625 |
+
SRC
|
626 |
+
(K, 13/2) − EDCBQ
|
627 |
+
SRC
|
628 |
+
( ˜K, 17/2) = 0.0245 a.u.
|
629 |
+
This kind of behavior is not a specific feature of the SHE
|
630 |
+
with Z = 125, but rather an example of some general
|
631 |
+
trend observed for many other SHEs as well.
|
632 |
+
The DCBQ-RAV and DCBQ-SRC schemes are one-
|
633 |
+
configuration approaches and therefore they do not take
|
634 |
+
into account the electron-correlation effects i.e. mixing of
|
635 |
+
the different configurations. Below, we discuss the influ-
|
636 |
+
ence of the electron-electron correlations on the order of
|
637 |
+
the SHE lowest levels. To this end, for each Z we perform
|
638 |
+
the independent CI-DFS calculations for seven reference
|
639 |
+
configurations with the lowest DCBQ-RAV energies se-
|
640 |
+
lected at the previous stage. For each configuration, we
|
641 |
+
evaluate the three lowest levels and determine their to-
|
642 |
+
tal angular momenta J. The level with the lowest en-
|
643 |
+
ergy EDCBQ
|
644 |
+
CI
|
645 |
+
(J) is the ground-state level. Within this ap-
|
646 |
+
proach, the ground-state level depends on how accurately
|
647 |
+
we solve the CI problem. We investigate the dependence
|
648 |
+
of the level order on the number of virtual orbitals by
|
649 |
+
performing two different CI-DFS calculations referred to
|
650 |
+
as “DCBQ-CI1” and “DCBQ-CI2”. In both schemes, the
|
651 |
+
single (S) and double (D) excitations from the reference
|
652 |
+
configuration determined at the DCBQ-RAV stage are
|
653 |
+
considered. The DCBQ-CI1 scheme can be thought of
|
654 |
+
as a CI problem with a relatively small number of the
|
655 |
+
virtual orbitals, whereas the DCBQ-CI2 scheme includes
|
656 |
+
more virtual orbitals. The list of the active and virtual
|
657 |
+
orbitals used in both CI calculations is presented in Ta-
|
658 |
+
ble III. The occupied orbitals, which are not mentioned
|
659 |
+
in the table, are treated as the frozen core. The active
|
660 |
+
orbitals as well as the virtual orbitals, which are involved
|
661 |
+
in the most important configurations, are taken as the
|
662 |
+
solutions of the DF equations, whereas the other virtual
|
663 |
+
orbitals are obtained from the solutions of the DFS equa-
|
664 |
+
tions.
|
665 |
+
TABLE III. The list of the active and virtual relativistic shells employed in the “DCBQ-CI1” and “DCBQ-CI2” calculations.
|
666 |
+
The absence of the lower index indicates that for a given l both the relativistic orbitals with l − 1/2 and l + 1/2 are included
|
667 |
+
in the CI problem.
|
668 |
+
Z
|
669 |
+
Active valence shells
|
670 |
+
Virtual shells
|
671 |
+
DCBQ-CI1
|
672 |
+
DCBQ-CI2
|
673 |
+
120 – 121
|
674 |
+
7p3/28s1/28p1/27d3/2
|
675 |
+
8p3/27d5/2
|
676 |
+
9s1/29p8d6f5g
|
677 |
+
122 – 123
|
678 |
+
8s1/28p1/27d3/26f5/2
|
679 |
+
8p3/27d5/26f7/2
|
680 |
+
9s1/29p8d7f5g
|
681 |
+
124 – 133
|
682 |
+
8p1/26f5/27d3/25g7/2
|
683 |
+
8p3/27d5/26f7/25g9/2
|
684 |
+
9s1/29p8d7f6g
|
685 |
+
134 – 144
|
686 |
+
8p1/26f5/27d3/25g9/2
|
687 |
+
8p3/26f7/27d5/2
|
688 |
+
9s1/29p1/28d3/27f5/26g7/2
|
689 |
+
145 – 146
|
690 |
+
6f5/27d3/25g9/29s1/2
|
691 |
+
8p3/26f7/27d5/2
|
692 |
+
10s1/29p8d7f6g
|
693 |
+
147 – 155
|
694 |
+
6f5/27d3/26f7/29s1/2
|
695 |
+
8p3/27d5/2
|
696 |
+
10s1/29p8d7f6g
|
697 |
+
156 – 160
|
698 |
+
6f7/27d3/29s1/27d5/2
|
699 |
+
8p3/2
|
700 |
+
10s1/29p8d7f6g
|
701 |
+
161 – 165
|
702 |
+
7d3/27d5/29s1/28p3/2
|
703 |
+
10s1/29p8d7f6g
|
704 |
+
166 – 168
|
705 |
+
7d3/27d5/29s1/28p3/29p1/2
|
706 |
+
9p3/2
|
707 |
+
10s1/210p8d7f6g
|
708 |
+
169 – 170
|
709 |
+
7d5/29s1/28p3/29p1/27f5/2
|
710 |
+
7f7/29p3/2
|
711 |
+
10s1/210p8d8f6g
|
712 |
+
The correlation effects can result in exotic scenarios
|
713 |
+
for the level structure. An example is presented in Ta-
|
714 |
+
ble IV, where the lowest levels with J = 0, 1, 2, 3 and
|
715 |
+
the related configurations of the SHE with Z = 168
|
716 |
+
are shown.
|
717 |
+
One can see that within the DCBQ-SRC
|
718 |
+
approximation, when the electron-electron correlations
|
719 |
+
are neglected, the level with J = 1, EDCBQ
|
720 |
+
SRC
|
721 |
+
(J = 1) =
|
722 |
+
−202904.8013 a.u., lies below the levels with J = 2,
|
723 |
+
EDCBQ
|
724 |
+
SRC
|
725 |
+
(J = 2)
|
726 |
+
=
|
727 |
+
−202904.7871 a.u. and J
|
728 |
+
=
|
729 |
+
0,
|
730 |
+
EDCBQ
|
731 |
+
SRC
|
732 |
+
(J = 0) = −202904.7789 a.u.
|
733 |
+
If we account
|
734 |
+
for the electronic correlations by means of the DCBQ-
|
735 |
+
CI1 scheme, the level with J = 1 rises above the level
|
736 |
+
with J = 2 and exceeds it by about 0.025 a.u. When we
|
737 |
+
improve the description of the electron-electron correla-
|
738 |
+
tions using the DCBQ-CI2 scheme, the level with J = 1
|
739 |
+
becomes the lowest one again and the level with J = 0
|
740 |
+
falls below the level with J = 2. In this case, the dif-
|
741 |
+
ference between the levels with J = 0 and J = 1 consti-
|
742 |
+
tutes about 0.01 a.u. This demonstrates that with the
|
743 |
+
|
744 |
+
6
|
745 |
+
improvement of the correlation treatment the changes in
|
746 |
+
the ground-state levels may occur. More importantly, the
|
747 |
+
dominant configurations of levels with J = 0, 1, 2 do not
|
748 |
+
coincide with each other. Therefore, one can expect that
|
749 |
+
not only levels which belong to the same configuration
|
750 |
+
can interchange, but also the rearrangements involving
|
751 |
+
the levels of other configurations are possible.
|
752 |
+
TABLE IV. The lowest-level energies EDCBQ(J) for levels J = 0, 1, 2, 3 calculated by means of the DCBQ-SRC, DCBQ-CI1,
|
753 |
+
and DCBQ-CI2 schemes for the SHE with Z = 168 (a.u.). For the DCBQ-SRC values, the configurations of these levels are
|
754 |
+
presented. For the DCBQ-CI1 and DCBQ-CI2 results, the configurations contributing with the weights of at least 0.05 are
|
755 |
+
given.
|
756 |
+
J
|
757 |
+
DCBQ-SRC
|
758 |
+
DCBQ-CI1
|
759 |
+
DCBQ-CI2
|
760 |
+
K
|
761 |
+
EDCBQ
|
762 |
+
SRC
|
763 |
+
(K, J)
|
764 |
+
K
|
765 |
+
EDCBQ
|
766 |
+
CI
|
767 |
+
(J)
|
768 |
+
K
|
769 |
+
EDCBQ
|
770 |
+
CI
|
771 |
+
(J)
|
772 |
+
0
|
773 |
+
9s2
|
774 |
+
1/29p2
|
775 |
+
1/2
|
776 |
+
−202904.7789
|
777 |
+
0.87 · 9s2
|
778 |
+
1/29p2
|
779 |
+
1/2+
|
780 |
+
0.07 · 9s2
|
781 |
+
1/28p2
|
782 |
+
3/2+
|
783 |
+
0.05 · 8p2
|
784 |
+
3/29p2
|
785 |
+
1/2
|
786 |
+
−202904.8206
|
787 |
+
0.91 · 9s2
|
788 |
+
1/29p2
|
789 |
+
1/2
|
790 |
+
−202904.9561
|
791 |
+
1
|
792 |
+
9s2
|
793 |
+
1/28p1
|
794 |
+
3/29p1
|
795 |
+
1/2 −202904.8013
|
796 |
+
0.92 · 9s2
|
797 |
+
1/28p1
|
798 |
+
3/29p1
|
799 |
+
1/2+
|
800 |
+
0.07 · 8p3
|
801 |
+
3/29p1
|
802 |
+
1/2
|
803 |
+
−202904.8247
|
804 |
+
0.94 · 9s2
|
805 |
+
1/28p1
|
806 |
+
3/29p1
|
807 |
+
1/2
|
808 |
+
−202904.9652
|
809 |
+
2
|
810 |
+
9s1
|
811 |
+
1/28p2
|
812 |
+
3/29p1
|
813 |
+
1/2 −202904.7871
|
814 |
+
0.55 · 9s1
|
815 |
+
1/28p2
|
816 |
+
3/29p1
|
817 |
+
1/2+
|
818 |
+
0.24 · 9s1
|
819 |
+
1/28p1
|
820 |
+
3/29p2
|
821 |
+
1/2+
|
822 |
+
0.20 · 9s1
|
823 |
+
1/28p3
|
824 |
+
3/2
|
825 |
+
−202904.8491
|
826 |
+
0.81 · 9s1
|
827 |
+
1/28p2
|
828 |
+
3/29p1
|
829 |
+
1/2+
|
830 |
+
0.09 · 9s1
|
831 |
+
1/28p1
|
832 |
+
3/29p2
|
833 |
+
1/2+
|
834 |
+
0.07 · 9s1
|
835 |
+
1/28p3
|
836 |
+
3/2
|
837 |
+
−202904.9542
|
838 |
+
3
|
839 |
+
9s1
|
840 |
+
1/28p2
|
841 |
+
3/29p1
|
842 |
+
1/2 −202904.7319
|
843 |
+
0.99 · 9s1
|
844 |
+
1/28p2
|
845 |
+
3/29p1
|
846 |
+
1/2
|
847 |
+
−202904.7385
|
848 |
+
0.96 · 9s1
|
849 |
+
1/28p2
|
850 |
+
3/29p1
|
851 |
+
1/2
|
852 |
+
−202904.8835
|
853 |
+
IV.
|
854 |
+
RESULTS
|
855 |
+
To begin with, we calculate the average energies of
|
856 |
+
the configurations including the Breit interaction and
|
857 |
+
QED effects within the DCBQ-RAV method.
|
858 |
+
For all
|
859 |
+
the SHEs in the range 120 ≤ Z ≤ 170, the configura-
|
860 |
+
tions with the lowest average energy are presented in Ta-
|
861 |
+
ble V. The ground-state configurations are shown rela-
|
862 |
+
tive to the closed-shell configurations given in the sec-
|
863 |
+
ond column.
|
864 |
+
Our results (the column “DCBQ-RAV”)
|
865 |
+
are compared with the results of Ref. [34], where the
|
866 |
+
calculations were performed using the Dirac-Fock-Slater
|
867 |
+
method for Z up to 173, the results of Ref. [29], where
|
868 |
+
the DF method was employed for Z up to 131, and, fi-
|
869 |
+
nally, the results of Ref. [35], where the calculations were
|
870 |
+
based on the relativistic density functional theory and
|
871 |
+
121 ≤ Z ≤ 131 were considered. We note that in Ref. [29]
|
872 |
+
the Gaunt-interaction correction was taken into account
|
873 |
+
perturbatively, while the Coulomb electron-electron in-
|
874 |
+
teraction was treated self-consistently within the density
|
875 |
+
functional theory.
|
876 |
+
Moreover, since the non-relativistic
|
877 |
+
notations were used in Refs. [29, 35], we retain them in
|
878 |
+
Table V without any changes.
|
879 |
+
Within the DCBQ-RAV approximation, the general
|
880 |
+
trend of the occupation rule with the growth of Z is as
|
881 |
+
follows: after the 8s1/2 shell is filled for Z = 120, the elec-
|
882 |
+
trons begin to occupy the 8p1/2, 7d3/2, and 6f5/2 shells.
|
883 |
+
According to our calculations, the first electron in the
|
884 |
+
5g7/2 shell appears for Z = 125.
|
885 |
+
Starting from this
|
886 |
+
atomic number, the 5g series begins.
|
887 |
+
For Z = 126,
|
888 |
+
the 8p1/2 shell becomes the closed one.
|
889 |
+
With a fur-
|
890 |
+
ther increase for Z, the 5g7/2 and 5g9/2 shells are subse-
|
891 |
+
quently occupied with the electrons. The partially occu-
|
892 |
+
pied 7d3/2 and 6f5/2 shells remain the valence ones and
|
893 |
+
their occupation numbers exhibit little changes. This 5g-
|
894 |
+
occupation process is completed at Z = 144 which has
|
895 |
+
the fully occupied 5g7/2 and 5g9/2 shells and partially
|
896 |
+
occupied 7d3/2 and 6f5/2 shells.
|
897 |
+
After both the relativistic 5g shells are filled, the
|
898 |
+
6f shells begin to be occupied quite systematically: 6f5/2
|
899 |
+
and 6f7/2 become fully occupied for Z
|
900 |
+
= 148 and
|
901 |
+
Z = 155, respectively.
|
902 |
+
The 7d3/2 shell is unoccupied
|
903 |
+
for Z = 155 and it remains partially occupied for the
|
904 |
+
other Z in this region becoming closed only for Z = 158.
|
905 |
+
Finally, the SHE with Z
|
906 |
+
= 164 has the configura-
|
907 |
+
tion [Og]8s2
|
908 |
+
1/28p2
|
909 |
+
1/25g8
|
910 |
+
7/25g10
|
911 |
+
9/26f 6
|
912 |
+
5/26f 8
|
913 |
+
7/27d4
|
914 |
+
3/27d6
|
915 |
+
5/2 with
|
916 |
+
all the relativistic shells being occupied.
|
917 |
+
Notably, the 8p3/2 shell is not filled along the se-
|
918 |
+
quence Z = 120 − 166 that is due to a large spin-orbital
|
919 |
+
splitting of the 8p shell.
|
920 |
+
The DF-RAV calculations
|
921 |
+
|
922 |
+
7
|
923 |
+
TABLE V. The ground-state configurations of superheavy elements with atomic numbers 120 ≤ Z ≤ 170 evaluated within the
|
924 |
+
DCBQ-RAV method, taking into account the Breit interaction and QED effects. The configurations are shown relative to the
|
925 |
+
closed-shell ones, which are presented in the column “Closed shells”. [Og] corresponds to the configuration of the oganesson
|
926 |
+
atom. The succeeding records in this column show the relativistic orbitals which have to be added to the previous ones to
|
927 |
+
obtain the closed-shell configurations for heavier atoms. The results of the present work, “DCBQ-RAV”, are compared with the
|
928 |
+
results of Refs. [29, 34, 35].
|
929 |
+
Z
|
930 |
+
Closed shells
|
931 |
+
DCBQ-RAV
|
932 |
+
Fricke and Soff [34]
|
933 |
+
Mann and Waber [29]
|
934 |
+
Umemoto and Saito [35]
|
935 |
+
120
|
936 |
+
[Og]
|
937 |
+
8s2
|
938 |
+
1/2
|
939 |
+
8s2
|
940 |
+
1/2
|
941 |
+
8s2
|
942 |
+
121
|
943 |
+
+8s2
|
944 |
+
1/2
|
945 |
+
8p1
|
946 |
+
1/2
|
947 |
+
8p1
|
948 |
+
1/2
|
949 |
+
8p1
|
950 |
+
8p1
|
951 |
+
122
|
952 |
+
8p1
|
953 |
+
1/2 7d1
|
954 |
+
3/2
|
955 |
+
8p1
|
956 |
+
1/2 7d1
|
957 |
+
3/2
|
958 |
+
8p17d1
|
959 |
+
8p2
|
960 |
+
123
|
961 |
+
8p1
|
962 |
+
1/2 7d1
|
963 |
+
3/2 6f 1
|
964 |
+
5/2
|
965 |
+
8p1
|
966 |
+
1/2 7d1
|
967 |
+
3/2 6f 1
|
968 |
+
5/2
|
969 |
+
8p17d16f 1
|
970 |
+
8p17d16f 1
|
971 |
+
124
|
972 |
+
8p1
|
973 |
+
1/2 6f 3
|
974 |
+
5/2
|
975 |
+
8p1
|
976 |
+
1/2 6f 3
|
977 |
+
5/2
|
978 |
+
8p16f 3
|
979 |
+
8p26f 2
|
980 |
+
125
|
981 |
+
8p1
|
982 |
+
1/2 6f 3
|
983 |
+
5/2 5g1
|
984 |
+
7/2
|
985 |
+
8p1
|
986 |
+
1/2 6f 3
|
987 |
+
5/2 5g1
|
988 |
+
7/2
|
989 |
+
8p16f 35g1
|
990 |
+
8p16f 4
|
991 |
+
126
|
992 |
+
8p2
|
993 |
+
1/2 6f 2
|
994 |
+
5/2 5g2
|
995 |
+
7/2
|
996 |
+
8p1
|
997 |
+
1/2 7d1
|
998 |
+
3/2 6f 2
|
999 |
+
5/2 5g2
|
1000 |
+
7/2
|
1001 |
+
8p26f 25g2
|
1002 |
+
8p16f 45g1
|
1003 |
+
127
|
1004 |
+
+8p2
|
1005 |
+
1/2
|
1006 |
+
6f 2
|
1007 |
+
5/2 5g3
|
1008 |
+
7/2
|
1009 |
+
6f 2
|
1010 |
+
5/2 5g3
|
1011 |
+
7/2
|
1012 |
+
8p26f 25g3
|
1013 |
+
8p26f 35g2
|
1014 |
+
128
|
1015 |
+
6f 2
|
1016 |
+
5/2 5g4
|
1017 |
+
7/2
|
1018 |
+
6f 2
|
1019 |
+
5/2 5g4
|
1020 |
+
7/2
|
1021 |
+
8p26f 25g4
|
1022 |
+
8p26f 35g3
|
1023 |
+
129
|
1024 |
+
6f 2
|
1025 |
+
5/2 5g5
|
1026 |
+
7/2
|
1027 |
+
6f 2
|
1028 |
+
5/2 5g5
|
1029 |
+
7/2
|
1030 |
+
8p26f 25g5
|
1031 |
+
8p26f 35g4
|
1032 |
+
130
|
1033 |
+
6f 2
|
1034 |
+
5/2 5g6
|
1035 |
+
7/2
|
1036 |
+
6f 2
|
1037 |
+
5/2 5g6
|
1038 |
+
7/2
|
1039 |
+
8p26f 25g6
|
1040 |
+
8p26f 35g5
|
1041 |
+
131
|
1042 |
+
6f 2
|
1043 |
+
5/2 5g7
|
1044 |
+
7/2
|
1045 |
+
6f 2
|
1046 |
+
5/2 5g7
|
1047 |
+
7/2
|
1048 |
+
8p26f 25g7
|
1049 |
+
8p26f 35g6
|
1050 |
+
132
|
1051 |
+
7d1
|
1052 |
+
3/2 6f 1
|
1053 |
+
5/2 5g8
|
1054 |
+
7/2
|
1055 |
+
6f 2
|
1056 |
+
5/2 5g8
|
1057 |
+
7/2
|
1058 |
+
133
|
1059 |
+
+5g8
|
1060 |
+
7/2
|
1061 |
+
6f 3
|
1062 |
+
5/2
|
1063 |
+
6f 3
|
1064 |
+
5/2
|
1065 |
+
134
|
1066 |
+
6f 4
|
1067 |
+
5/2
|
1068 |
+
6f 4
|
1069 |
+
5/2
|
1070 |
+
135
|
1071 |
+
6f 4
|
1072 |
+
5/2 5g1
|
1073 |
+
9/2
|
1074 |
+
6f 4
|
1075 |
+
5/2 5g1
|
1076 |
+
9/2
|
1077 |
+
136
|
1078 |
+
6f 4
|
1079 |
+
5/2 5g2
|
1080 |
+
9/2
|
1081 |
+
6f 4
|
1082 |
+
5/2 5g2
|
1083 |
+
9/2
|
1084 |
+
137
|
1085 |
+
7d1
|
1086 |
+
3/2 6f 3
|
1087 |
+
5/2 5g3
|
1088 |
+
9/2
|
1089 |
+
7d1
|
1090 |
+
3/2 6f 3
|
1091 |
+
5/2 5g3
|
1092 |
+
9/2
|
1093 |
+
138
|
1094 |
+
7d1
|
1095 |
+
3/2 6f 3
|
1096 |
+
5/2 5g4
|
1097 |
+
9/2
|
1098 |
+
7d1
|
1099 |
+
3/2 6f 3
|
1100 |
+
5/2 5g4
|
1101 |
+
9/2
|
1102 |
+
139
|
1103 |
+
7d1
|
1104 |
+
3/2 6f 3
|
1105 |
+
5/2 5g5
|
1106 |
+
9/2
|
1107 |
+
7d2
|
1108 |
+
3/2 6f 2
|
1109 |
+
5/2 5g5
|
1110 |
+
9/2
|
1111 |
+
140
|
1112 |
+
7d1
|
1113 |
+
3/2 6f 3
|
1114 |
+
5/2 5g6
|
1115 |
+
9/2
|
1116 |
+
7d1
|
1117 |
+
3/2 6f 3
|
1118 |
+
5/2 5g6
|
1119 |
+
9/2
|
1120 |
+
141
|
1121 |
+
7d2
|
1122 |
+
3/2 6f 2
|
1123 |
+
5/2 5g7
|
1124 |
+
9/2
|
1125 |
+
7d2
|
1126 |
+
3/2 6f 2
|
1127 |
+
5/2 5g7
|
1128 |
+
9/2
|
1129 |
+
142
|
1130 |
+
7d2
|
1131 |
+
3/2 6f 2
|
1132 |
+
5/2 5g8
|
1133 |
+
9/2
|
1134 |
+
7d2
|
1135 |
+
3/2 6f 2
|
1136 |
+
5/2 5g8
|
1137 |
+
9/2
|
1138 |
+
143
|
1139 |
+
7d2
|
1140 |
+
3/2 6f 2
|
1141 |
+
5/2 5g9
|
1142 |
+
9/2
|
1143 |
+
7d2
|
1144 |
+
3/2 6f 2
|
1145 |
+
5/2 5g9
|
1146 |
+
9/2
|
1147 |
+
144
|
1148 |
+
7d3
|
1149 |
+
3/2 6f 1
|
1150 |
+
5/2 5g10
|
1151 |
+
9/2
|
1152 |
+
7d3
|
1153 |
+
3/2 6f 1
|
1154 |
+
5/2 5g10
|
1155 |
+
9/2
|
1156 |
+
145
|
1157 |
+
+5g10
|
1158 |
+
9/2
|
1159 |
+
7d2
|
1160 |
+
3/2 6f 3
|
1161 |
+
5/2
|
1162 |
+
7d2
|
1163 |
+
3/2 6f 3
|
1164 |
+
5/2
|
1165 |
+
146
|
1166 |
+
7d2
|
1167 |
+
3/2 6f 4
|
1168 |
+
5/2
|
1169 |
+
7d2
|
1170 |
+
3/2 6f 4
|
1171 |
+
5/2
|
1172 |
+
147
|
1173 |
+
7d2
|
1174 |
+
3/2 6f 5
|
1175 |
+
5/2
|
1176 |
+
7d2
|
1177 |
+
3/2 6f 5
|
1178 |
+
5/2
|
1179 |
+
148
|
1180 |
+
7d2
|
1181 |
+
3/2 6f 6
|
1182 |
+
5/2
|
1183 |
+
7d2
|
1184 |
+
3/2 6f 6
|
1185 |
+
5/2
|
1186 |
+
149
|
1187 |
+
+6f 6
|
1188 |
+
5/2
|
1189 |
+
7d3
|
1190 |
+
3/2
|
1191 |
+
7d3
|
1192 |
+
3/2
|
1193 |
+
150
|
1194 |
+
7d4
|
1195 |
+
3/2
|
1196 |
+
7d4
|
1197 |
+
3/2
|
1198 |
+
151
|
1199 |
+
7d3
|
1200 |
+
3/2 6f 2
|
1201 |
+
7/2
|
1202 |
+
7d3
|
1203 |
+
3/2 6f 2
|
1204 |
+
7/2
|
1205 |
+
152
|
1206 |
+
7d3
|
1207 |
+
3/2 6f 3
|
1208 |
+
7/2
|
1209 |
+
7d3
|
1210 |
+
3/2 6f 3
|
1211 |
+
7/2
|
1212 |
+
153
|
1213 |
+
7d2
|
1214 |
+
3/2 6f 5
|
1215 |
+
7/2
|
1216 |
+
7d2
|
1217 |
+
3/2 6f 5
|
1218 |
+
7/2
|
1219 |
+
154
|
1220 |
+
7d2
|
1221 |
+
3/2 6f 6
|
1222 |
+
7/2
|
1223 |
+
7d2
|
1224 |
+
3/2 6f 6
|
1225 |
+
7/2
|
1226 |
+
155
|
1227 |
+
9s1
|
1228 |
+
1/2 6f 8
|
1229 |
+
7/2
|
1230 |
+
7d2
|
1231 |
+
3/2 6f 7
|
1232 |
+
7/2
|
1233 |
+
156
|
1234 |
+
+6f 8
|
1235 |
+
7/2
|
1236 |
+
7d2
|
1237 |
+
3/2
|
1238 |
+
7d2
|
1239 |
+
3/2
|
1240 |
+
157
|
1241 |
+
7d3
|
1242 |
+
3/2
|
1243 |
+
7d3
|
1244 |
+
3/2
|
1245 |
+
158
|
1246 |
+
7d4
|
1247 |
+
3/2
|
1248 |
+
7d4
|
1249 |
+
3/2
|
1250 |
+
159
|
1251 |
+
+7d4
|
1252 |
+
3/2
|
1253 |
+
9s1
|
1254 |
+
1/2
|
1255 |
+
9s1
|
1256 |
+
1/2
|
1257 |
+
160
|
1258 |
+
7d1
|
1259 |
+
5/2 9s1
|
1260 |
+
1/2
|
1261 |
+
7d1
|
1262 |
+
5/2 9s1
|
1263 |
+
1/2
|
1264 |
+
161
|
1265 |
+
7d2
|
1266 |
+
5/2 9s1
|
1267 |
+
1/2
|
1268 |
+
7d2
|
1269 |
+
5/2 9s1
|
1270 |
+
1/2
|
1271 |
+
162
|
1272 |
+
7d4
|
1273 |
+
5/2
|
1274 |
+
7d4
|
1275 |
+
5/2
|
1276 |
+
163
|
1277 |
+
7d5
|
1278 |
+
5/2
|
1279 |
+
7d5
|
1280 |
+
5/2
|
1281 |
+
164
|
1282 |
+
7d6
|
1283 |
+
5/2
|
1284 |
+
7d6
|
1285 |
+
5/2
|
1286 |
+
165
|
1287 |
+
+7d6
|
1288 |
+
5/2
|
1289 |
+
9s1
|
1290 |
+
1/2
|
1291 |
+
9s1
|
1292 |
+
1/2
|
1293 |
+
166
|
1294 |
+
9s2
|
1295 |
+
1/2
|
1296 |
+
9s2
|
1297 |
+
1/2
|
1298 |
+
167
|
1299 |
+
+9s2
|
1300 |
+
1/2
|
1301 |
+
8p1
|
1302 |
+
3/2
|
1303 |
+
9p1
|
1304 |
+
1/2
|
1305 |
+
168
|
1306 |
+
8p1
|
1307 |
+
3/2 9p1
|
1308 |
+
1/2
|
1309 |
+
9p2
|
1310 |
+
1/2
|
1311 |
+
169
|
1312 |
+
8p1
|
1313 |
+
3/2 9p2
|
1314 |
+
1/2
|
1315 |
+
8p1
|
1316 |
+
3/2 9p2
|
1317 |
+
1/2
|
1318 |
+
170
|
1319 |
+
8p2
|
1320 |
+
3/2 9p2
|
1321 |
+
1/2
|
1322 |
+
8p2
|
1323 |
+
3/2 9p2
|
1324 |
+
1/2
|
1325 |
+
|
1326 |
+
8
|
1327 |
+
for Z = 166 shows that the spin-orbital splitting of the
|
1328 |
+
8p shell is about 80 eV. The first 8p3/2 electron appears in
|
1329 |
+
the SHE with Z = 167, after the 9s1/2 shell becomes the
|
1330 |
+
closed one. However, for Z = 168 the 9p1/2 shell turns
|
1331 |
+
out to be more energetically advantageous than the 8p3/2
|
1332 |
+
one. The 8p3/2 shell is not fully occupied even for the last
|
1333 |
+
considered SHE with Z = 170. Another remarkable ob-
|
1334 |
+
servation found in our DCBQ-RAV calculations is that
|
1335 |
+
for Z = 155 the configuration with the valence 9s1/2 elec-
|
1336 |
+
tron turn out to be more energetically beneficial than
|
1337 |
+
the configuration with 7d3/2 electrons, whereas its neigh-
|
1338 |
+
bors — Z = 154 and Z = 156 — have two electrons in
|
1339 |
+
the 7d3/2 shell. Next time the 9s1/2 electron appears in
|
1340 |
+
the series Z = 159 – 161, and, finally, the 9s1/2 shell es-
|
1341 |
+
tablishes on the regular basis starting from the element
|
1342 |
+
with Z = 165.
|
1343 |
+
Throughout the calculations we found that the
|
1344 |
+
ground-state configuration may change due to the Breit-
|
1345 |
+
interaction corrections, see the discussion in Sec. III. This
|
1346 |
+
kind of changes is observed for Z = 125 and Z = 140 and
|
1347 |
+
never occurs for the other values of Z. Concerning the
|
1348 |
+
QED corrections, we deduce that within the DCBQ-RAV
|
1349 |
+
approach they never change the ground-state configura-
|
1350 |
+
tion for the SHEs under consideration. In general, our
|
1351 |
+
DCBQ-RAV ground-state configurations coincide with
|
1352 |
+
the DF-RAV ones, obtained without the Breit and QED
|
1353 |
+
corrections, in all cases except for Z = 125 and Z = 140.
|
1354 |
+
Our DCBQ-RAV results for Z = 120 – 131 are in
|
1355 |
+
full agreement with the results of Ref. [29]. The obtained
|
1356 |
+
ground-state configurations agree with the related results
|
1357 |
+
of Ref. [35] for the SHEs with 121 ≤ Z ≤ 123, but differ
|
1358 |
+
for the other available values of Z. Our DF-RAV results
|
1359 |
+
differ from the results of Ref. [34] obtained without the
|
1360 |
+
Breit and QED corrections for eight of the considered
|
1361 |
+
SHEs, namely, for Z = 125, 126, 132, 139, 140, 155, 167,
|
1362 |
+
and 168.
|
1363 |
+
For Z = 155, our results predict that 9s1/2
|
1364 |
+
electron unexpectedly jumps in the 6f7/2-occupation se-
|
1365 |
+
quence.
|
1366 |
+
Perhaps the configuration with the valence
|
1367 |
+
9s1/2 electron was not considered in Ref. [34].
|
1368 |
+
As
|
1369 |
+
for the other discrepancies, they seem to have a non-
|
1370 |
+
systematical nature and might be due to the Slater
|
1371 |
+
exchange-interaction approximation used in Ref. [34].
|
1372 |
+
Nevertheless, the real reasons for these deviations remain
|
1373 |
+
unclear to us.
|
1374 |
+
Proceeding with the analysis, we are aimed at find-
|
1375 |
+
ing the configuration of the lowest-energy level.
|
1376 |
+
We
|
1377 |
+
employ the CI-DFS method using the one-configuration
|
1378 |
+
scheme DCBQ-SRC as well as the more elaborated
|
1379 |
+
schemes DCBQ-CI1 and DCBQ-CI2. As in the DCBQ-
|
1380 |
+
RAV approach, in these schemes the Breit and QED cor-
|
1381 |
+
rections are included, however, in the non-perturbative
|
1382 |
+
manner. The thorough description of the CI calculations
|
1383 |
+
is presented in Sec. III.
|
1384 |
+
In Table VI, we give the levels with the lowest DCBQ
|
1385 |
+
energies for the SHEs with 120 ≤ Z ≤ 170 obtained in
|
1386 |
+
three considered CI schemes. Additionally, the quantum
|
1387 |
+
numbers J of these levels are listed. For the DCBQ-SRC
|
1388 |
+
results, the configurations which the ground-state levels
|
1389 |
+
belong to are given. The DCBQ-CI1 and DCBQ-CI2 re-
|
1390 |
+
sults include the electron-electron correlation effects. For
|
1391 |
+
these data, we list the configurations contributing to the
|
1392 |
+
ground levels with the weight of at least 0.05. Following
|
1393 |
+
the structure of the previous table, the configurations are
|
1394 |
+
given relative to the closed-shell ones. The obtained re-
|
1395 |
+
sults are compared with the results of the previous mul-
|
1396 |
+
ticonfiguration Dirac-Fock calculations [47].
|
1397 |
+
The non-
|
1398 |
+
relativistic notations of Ref. [47] are retained.
|
1399 |
+
A comparison of Tables V and VI shows that the
|
1400 |
+
configurations of the ground levels obtained within the
|
1401 |
+
SRC approach differ from the RAV ground-state config-
|
1402 |
+
urations in almost half of the cases (for convenience, the
|
1403 |
+
corresponding values of Z are typed in a bold font). This
|
1404 |
+
result indicates the complex level structure of the SHEs,
|
1405 |
+
which is discussed in details for Z = 125 in Sec. III.
|
1406 |
+
The subsequent discussion consists of two parts. At
|
1407 |
+
first, we identify general trends for the results of the
|
1408 |
+
many-configuration calculations and compare them with
|
1409 |
+
the single-configuration ones. We note, that the DCBQ-
|
1410 |
+
CI1 and DCBQ-CI2 results are, in general, not much
|
1411 |
+
different. Therefore, in this part we often drop the in-
|
1412 |
+
dices "1" or "2" and use the generalized designation
|
1413 |
+
"DCBQ-CI" for the many-configuration calculations. In
|
1414 |
+
the second part, we compare the results obtained by the
|
1415 |
+
configuration-interaction method CI1 and CI2 with each
|
1416 |
+
other.
|
1417 |
+
Exactly as the DCBQ-RAV scheme predicts, our
|
1418 |
+
many-configuration DCBQ-CI results detect the first ap-
|
1419 |
+
pearance of the 5g electron in the ground state for the
|
1420 |
+
SHE with Z = 125. However, in contrast to the DCBQ-
|
1421 |
+
RAV results, the DCBQ-CI schemes predict that the 5g
|
1422 |
+
shell becomes closed for Z = 145 instead of Z = 144. In
|
1423 |
+
the range Z = 125 – 132, the many-configuration calcula-
|
1424 |
+
tions reveal that the dominant configurations of the ob-
|
1425 |
+
tained ground-state levels in all eight cases differ from the
|
1426 |
+
ones obtained within the DCBQ-RAV approach. More-
|
1427 |
+
over, a configuration mixing in the ground states takes
|
1428 |
+
place for some SHEs in range Z = 125 – 145 as the 5g
|
1429 |
+
shells are gradually occupied.
|
1430 |
+
In most of the consid-
|
1431 |
+
ered cases, the weights of the dominant configurations
|
1432 |
+
lie in range 0.80 – 0.90. The configurations with the dif-
|
1433 |
+
ferent occupation numbers for the 8p1/2, 7d3/2, 6f5/2,
|
1434 |
+
and 5g7/2,9/2 shells are admixed. The DCBQ-CI schemes
|
1435 |
+
show that starting from Z = 130 the dominant con-
|
1436 |
+
figuration of the ground-state level has the 8p1/2 shell
|
1437 |
+
fully occupied. However, the configurations with the par-
|
1438 |
+
tially occupied 8p1/2 shell contribute (with the weights
|
1439 |
+
|
1440 |
+
9
|
1441 |
+
about 0.05 or higher) to these levels up approximately
|
1442 |
+
Z ≈ 135 − 137.
|
1443 |
+
A mixture of the configurations with the partially oc-
|
1444 |
+
cupied 7d3/2 and 6f5/2 shells occurs also in the range Z =
|
1445 |
+
147 – 151. The situation with the ground states becomes
|
1446 |
+
more clear starting from the SHE with Z = 152, when the
|
1447 |
+
6f5/2 shell turns out to be fully occupied. Up to Z = 165,
|
1448 |
+
the weights of the dominant configurations are larger
|
1449 |
+
than 0.90, and in most of the cases the dominant con-
|
1450 |
+
figurations of the ground-state levels coincide with the
|
1451 |
+
ground-state configurations obtained within the DCBQ-
|
1452 |
+
RAV approach.
|
1453 |
+
In particular, the fact that the SHE
|
1454 |
+
with Z = 164 possesses the ground-state configuration
|
1455 |
+
with all the relativistic shells closed is confirmed by the
|
1456 |
+
more elaborated methods.
|
1457 |
+
The SHEs with Z = 168
|
1458 |
+
and Z = 169 demonstrate within the DCBQ-CI1 scheme
|
1459 |
+
poorly resolved dominant configurations of the ground-
|
1460 |
+
state levels. For instance, the DCBQ-CI1 weight of the
|
1461 |
+
dominant configuration for Z = 168 is only 0.55, which
|
1462 |
+
was not the case even for the SHEs with the open 5g7/2
|
1463 |
+
and 5g9/2 shells. However, increasing the number of the
|
1464 |
+
active orbitals remedies the situation, and for Z = 168
|
1465 |
+
the DCBQ-CI2 scheme yields the dominant-configuration
|
1466 |
+
weight equal to 0.92. This is due to the fact that the levels
|
1467 |
+
interchange, see the corresponding discussion in Sec. III.
|
1468 |
+
The
|
1469 |
+
overall
|
1470 |
+
trends
|
1471 |
+
obtained
|
1472 |
+
in
|
1473 |
+
our
|
1474 |
+
many-
|
1475 |
+
configuration calculations are the following.
|
1476 |
+
First,
|
1477 |
+
the configurations which have the lowest levels within
|
1478 |
+
the DCBQ-SRC approach are the dominant ones con-
|
1479 |
+
tributing to the ground-state levels within the DCBQ-CI
|
1480 |
+
approach in about 80% of the considered cases. Second,
|
1481 |
+
the ground-state levels obtained without the electronic
|
1482 |
+
correlations using the DCBQ-SRC scheme in about 75%
|
1483 |
+
of the cases coincide with the ones obtained by means
|
1484 |
+
of the DCBQ-CI approach. The deviations are mainly
|
1485 |
+
concentrated in the range Z = 131 − 138, where the
|
1486 |
+
5g7/2 and 5g9/2 shells are partially occupied and strong
|
1487 |
+
interaction between several configurations takes place.
|
1488 |
+
The simultaneous change of the dominant configuration
|
1489 |
+
and the ground-state level when passing from the DCBQ-
|
1490 |
+
SRC to the DCBQ-CI method occurs for, e.g., Z = 131.
|
1491 |
+
In this case the first scheme yields JSRC
|
1492 |
+
=
|
1493 |
+
25/2
|
1494 |
+
of the configuration KSRC
|
1495 |
+
=
|
1496 |
+
8p1
|
1497 |
+
1/27d1
|
1498 |
+
3/26f 3
|
1499 |
+
5/25g6
|
1500 |
+
7/2,
|
1501 |
+
whereas the second scheme predicts the lowest level
|
1502 |
+
to be JCI
|
1503 |
+
= 21/2 with the dominant configuration
|
1504 |
+
being KCI
|
1505 |
+
=
|
1506 |
+
8p2
|
1507 |
+
1/26f 3
|
1508 |
+
5/25g6
|
1509 |
+
7/2
|
1510 |
+
with the weight of
|
1511 |
+
about 0.82 − 0.85.
|
1512 |
+
Now we proceed to contrast of the two DCBQ-CI
|
1513 |
+
schemes results. Compared to the DCBQ-CI1 data, the
|
1514 |
+
more accurate treatment of the electron-electron corre-
|
1515 |
+
lations by means of the DCBQ-CI2 approach results in
|
1516 |
+
the changes of the ground-state level in 4 of 51 cases.
|
1517 |
+
In 3 of these 4 cases, the configuration which gives the
|
1518 |
+
maximum contribution to the ground-state level changes
|
1519 |
+
as well. These SHEs, which need particular attention,
|
1520 |
+
are the ones with Z = 130, 137, 143, and 168. For in-
|
1521 |
+
stance, for Z = 130, the level J = 14 of the dom-
|
1522 |
+
inant configuration K = 8p1
|
1523 |
+
1/27d1
|
1524 |
+
3/26f 3
|
1525 |
+
5/25g5
|
1526 |
+
7/2 is pre-
|
1527 |
+
dicted to be the ground-state one in both DCBQ-SRC
|
1528 |
+
and DCBQ-CI1 schemes: KSRC = KCI1 = K.
|
1529 |
+
How-
|
1530 |
+
ever, the electronic correlations evaluated by means of the
|
1531 |
+
DCBQ-CI2 scheme change the ground-state level, and it
|
1532 |
+
becomes J = 12 with the dominant configuration be-
|
1533 |
+
ing KCI2 = 8p2
|
1534 |
+
1/26f 3
|
1535 |
+
5/25g5
|
1536 |
+
7/2 ̸= K.
|
1537 |
+
We compare our DCBQ-CI2 results with the only
|
1538 |
+
available systematic many-configuration calculations of
|
1539 |
+
Ref. [47] where the Breit interaction was taken into ac-
|
1540 |
+
count as well. Since the quantum numbers J which char-
|
1541 |
+
acterize the ground-state levels are not presented in that
|
1542 |
+
paper, we are able to compare only the configurations.
|
1543 |
+
We found a disagreement in the configurations contribut-
|
1544 |
+
ing to the ground states for the SHEs with Z = 123 – 128,
|
1545 |
+
Z = 130, Z = 136 – 137, Z = 143 – 144, Z = 152 – 156,
|
1546 |
+
and Z = 163. It is difficult to reveal a possible reason
|
1547 |
+
of the discrepancy due to the lack of the computational
|
1548 |
+
details given in Ref. [47].
|
1549 |
+
The changes of the ground-state levels in transition
|
1550 |
+
from the DCBQ-CI1 to the DCBQ-CI2 calculations and
|
1551 |
+
the deviations from the previous results raise the fol-
|
1552 |
+
lowing question: can hypothetical larger CI calculations
|
1553 |
+
change the obtained ground states as the DCBQ-CI2
|
1554 |
+
scheme changes the ground states in comparison with
|
1555 |
+
the DCBQ-CI1 one?
|
1556 |
+
A comprehensive answer can be
|
1557 |
+
given only within the scope of the corresponding large-
|
1558 |
+
scale CI calculations.
|
1559 |
+
However, to get an idea of the
|
1560 |
+
cases for which the correlation effects may change the
|
1561 |
+
dominant configuration of the ground-state level, we in-
|
1562 |
+
vestigate the behavior of the energy difference between
|
1563 |
+
the ground-state level and the closest level belonging to a
|
1564 |
+
different dominant configuration for both our DCBQ-CI
|
1565 |
+
calculations. This study allows us to determine whether
|
1566 |
+
the ground-state level is in some sense isolated from levels
|
1567 |
+
of other configurations and whether the electronic corre-
|
1568 |
+
lations break down this isolation. The absolute values of
|
1569 |
+
the corresponding differences are presented in Table VII.
|
1570 |
+
The SHE with Z = 120 is omitted in Table VII, since it
|
1571 |
+
possesses the ground-state configuration K∗ = [Og]8s2
|
1572 |
+
1/2
|
1573 |
+
that causes no doubt.
|
1574 |
+
As it is seen from Table VII, some SHEs have
|
1575 |
+
a clear separation of the ground-state level from lev-
|
1576 |
+
els of other configurations which almost does not de-
|
1577 |
+
pend on the correlation-treatment scheme. For instance,
|
1578 |
+
for Z = 121, the separations of the levels in the DCBQ-
|
1579 |
+
|
1580 |
+
10
|
1581 |
+
TABLE VII. The absolute values of the energy difference between the ground-state level of the dominant configuration K∗
|
1582 |
+
and the closest excited level belonging to the dominant configuration which is different from K∗ for the SHEs in the range
|
1583 |
+
121 ≤ Z ≤ 170 (a.u.). The results are presented for the DCBQ-CI1 and DCBQ-CI2 schemes.
|
1584 |
+
Z
|
1585 |
+
CI1
|
1586 |
+
CI2
|
1587 |
+
Z
|
1588 |
+
CI1
|
1589 |
+
CI2
|
1590 |
+
Z
|
1591 |
+
CI1
|
1592 |
+
CI2
|
1593 |
+
Z
|
1594 |
+
CI1
|
1595 |
+
CI2
|
1596 |
+
Z
|
1597 |
+
CI1
|
1598 |
+
CI2
|
1599 |
+
121
|
1600 |
+
0.0399
|
1601 |
+
0.0378
|
1602 |
+
131
|
1603 |
+
0.0047
|
1604 |
+
0.0069
|
1605 |
+
141
|
1606 |
+
0.0195
|
1607 |
+
0.0106
|
1608 |
+
151
|
1609 |
+
0.0176
|
1610 |
+
0.0114
|
1611 |
+
161
|
1612 |
+
0.0103
|
1613 |
+
0.0059
|
1614 |
+
122
|
1615 |
+
0.0127
|
1616 |
+
0.0107
|
1617 |
+
132
|
1618 |
+
0.0083
|
1619 |
+
0.0118
|
1620 |
+
142
|
1621 |
+
0.0143
|
1622 |
+
0.0046
|
1623 |
+
152
|
1624 |
+
0.0059
|
1625 |
+
0.0122
|
1626 |
+
162
|
1627 |
+
0.0094
|
1628 |
+
0.0016
|
1629 |
+
123
|
1630 |
+
0.0299
|
1631 |
+
0.0351
|
1632 |
+
133
|
1633 |
+
0.0254
|
1634 |
+
0.0204
|
1635 |
+
143
|
1636 |
+
0.0015
|
1637 |
+
0.0116
|
1638 |
+
153
|
1639 |
+
0.0062
|
1640 |
+
0.0129
|
1641 |
+
163
|
1642 |
+
0.0111
|
1643 |
+
0.0176
|
1644 |
+
124
|
1645 |
+
0.0050
|
1646 |
+
0.0046
|
1647 |
+
134
|
1648 |
+
0.0313
|
1649 |
+
0.0270
|
1650 |
+
144
|
1651 |
+
0.0013
|
1652 |
+
0.0129
|
1653 |
+
154
|
1654 |
+
0.0107
|
1655 |
+
0.0008
|
1656 |
+
164
|
1657 |
+
0.0492
|
1658 |
+
0.0542
|
1659 |
+
125
|
1660 |
+
0.0062
|
1661 |
+
0.0057
|
1662 |
+
135
|
1663 |
+
0.0165
|
1664 |
+
0.0125
|
1665 |
+
145
|
1666 |
+
0.0539
|
1667 |
+
0.0376
|
1668 |
+
155
|
1669 |
+
0.0108
|
1670 |
+
0.0257
|
1671 |
+
165
|
1672 |
+
0.0424
|
1673 |
+
0.0443
|
1674 |
+
126
|
1675 |
+
0.0106
|
1676 |
+
0.0126
|
1677 |
+
136
|
1678 |
+
0.0062
|
1679 |
+
0.0095
|
1680 |
+
146
|
1681 |
+
0.0352
|
1682 |
+
0.0273
|
1683 |
+
156
|
1684 |
+
0.0136
|
1685 |
+
0.0110
|
1686 |
+
166
|
1687 |
+
0.0153
|
1688 |
+
0.0305
|
1689 |
+
127
|
1690 |
+
0.0070
|
1691 |
+
0.0089
|
1692 |
+
137
|
1693 |
+
0.0011
|
1694 |
+
0.0043
|
1695 |
+
147
|
1696 |
+
0.0398
|
1697 |
+
0.0349
|
1698 |
+
157
|
1699 |
+
0.0208
|
1700 |
+
0.0212
|
1701 |
+
167
|
1702 |
+
0.0022
|
1703 |
+
0.0096
|
1704 |
+
128
|
1705 |
+
0.0116
|
1706 |
+
0.0123
|
1707 |
+
138
|
1708 |
+
0.0248
|
1709 |
+
0.0303
|
1710 |
+
148
|
1711 |
+
0.0715
|
1712 |
+
0.0760
|
1713 |
+
158
|
1714 |
+
0.0529
|
1715 |
+
0.0555
|
1716 |
+
168
|
1717 |
+
0.0244
|
1718 |
+
0.0091
|
1719 |
+
129
|
1720 |
+
0.0071
|
1721 |
+
0.0034
|
1722 |
+
139
|
1723 |
+
0.0370
|
1724 |
+
0.0322
|
1725 |
+
149
|
1726 |
+
0.0583
|
1727 |
+
0.0568
|
1728 |
+
159
|
1729 |
+
0.0568
|
1730 |
+
0.0581
|
1731 |
+
169
|
1732 |
+
0.0066
|
1733 |
+
0.0087
|
1734 |
+
130
|
1735 |
+
0.0022
|
1736 |
+
0.0009
|
1737 |
+
140
|
1738 |
+
0.0237
|
1739 |
+
0.0088
|
1740 |
+
150
|
1741 |
+
0.0295
|
1742 |
+
0.0300
|
1743 |
+
160
|
1744 |
+
0.0308
|
1745 |
+
0.0285
|
1746 |
+
170
|
1747 |
+
0.0287
|
1748 |
+
0.0324
|
1749 |
+
CI1 and DCBQ-CI2 schemes constitute 0.0399 a.u.
|
1750 |
+
and 0.0378 a.u., respectively. In other cases, the ground-
|
1751 |
+
state level becomes more isolated from the levels of other
|
1752 |
+
configurations as the correlation treatment is improved.
|
1753 |
+
So, for Z = 155, the separation increases from 0.0108 a.u.
|
1754 |
+
in the DCBQ-CI1 scheme to 0.0257 a.u. in the DCBQ-
|
1755 |
+
CI2 one. In spite of this, it is difficult to formulate for
|
1756 |
+
all the systems under consideration a reliable criteria to
|
1757 |
+
determine if the dominant configuration contributing to
|
1758 |
+
the ground-state level does change with increase of the
|
1759 |
+
configuration-space. From this point of view, the most
|
1760 |
+
suspicious SHEs are the ones which have a small (less
|
1761 |
+
than a few thousandths of a.u.) separation between the
|
1762 |
+
considered levels within the DCBQ-CI2 scheme. In addi-
|
1763 |
+
tion, we also include in this category the cases where the
|
1764 |
+
separation between the levels significantly decreases in
|
1765 |
+
the DCBQ-CI2 scheme compared to the DCBQ-CI1 re-
|
1766 |
+
sults. Analyzing the data in Table VII, we consider the
|
1767 |
+
SHEs with Z = 129, 130, 137, 140, 142, 154, 161, 162, 168,
|
1768 |
+
and 169 as those that can possibly have a different domi-
|
1769 |
+
nant configuration of the ground-state level than the one
|
1770 |
+
obtained within the DCBQ-CI2 scheme. These elements
|
1771 |
+
have to be studied within the more elaborated electron-
|
1772 |
+
correlation calculations.
|
1773 |
+
V.
|
1774 |
+
CONCLUSION
|
1775 |
+
In the scope of the present paper, we have performed
|
1776 |
+
the extensive relativistic study of the ground states of
|
1777 |
+
the superheavy elements in the range 120 ≤ Z ≤ 170.
|
1778 |
+
The Breit interaction is rigorously taken into in the cal-
|
1779 |
+
culations, and the QED effects are considered within
|
1780 |
+
the model-QED-operator approach [51–53]. The ground-
|
1781 |
+
state configurations are first determined by means of
|
1782 |
+
the Dirac-Fock method in the relativistic-configuration-
|
1783 |
+
average approximation. It is deduced that the QED ef-
|
1784 |
+
fects can not change the ground-state configuration in
|
1785 |
+
contrast to the Breit interaction.
|
1786 |
+
To resolve the level structure of the configurations,
|
1787 |
+
the ground-state levels are found using the configuration-
|
1788 |
+
interaction method in the basis of the Dirac-Fock-Sturm
|
1789 |
+
orbitals. We study the general trends in the order of oc-
|
1790 |
+
cupation of orbitals in the SHE. We obtain that in spite of
|
1791 |
+
the complex electronic structure of the considered SHEs,
|
1792 |
+
the ground-state levels have distinct dominant configura-
|
1793 |
+
tions with the weights exceeding 0.85. Finally, we demon-
|
1794 |
+
strate that the electron-correlation effects can change the
|
1795 |
+
dominant configuration of the ground-state level.
|
1796 |
+
For
|
1797 |
+
some SHEs, the large-scale calculations are needed in or-
|
1798 |
+
der to more reliably determine the ground states and
|
1799 |
+
the structure of low-lying energy levels.
|
1800 |
+
Nevertheless,
|
1801 |
+
the ground-state configurations of the SHEs obtained in
|
1802 |
+
the present work within the many-configuration approach
|
1803 |
+
can be used as a solid basis for accurate calculations of
|
1804 |
+
various atomic properties of these elements as well as
|
1805 |
+
to examine the role of the electron-electron correlations,
|
1806 |
+
QED, and relativistic effects on the Periodic Law.
|
1807 |
+
VI.
|
1808 |
+
ACKNOWLEDGEMENTS
|
1809 |
+
We thank Yu. Ts. Oganessian for stimulating dis-
|
1810 |
+
cussions. Valuable conversations with E. Eliav, V. Per-
|
1811 |
+
shina, and A. V. Titov are also gratefully acknowl-
|
1812 |
+
edged. The work was supported by the Ministry of Sci-
|
1813 |
+
ence and Higher Education of the Russian Federation
|
1814 |
+
within Grant No. 075-10-2020-117.
|
1815 |
+
|
1816 |
+
11
|
1817 |
+
[1] P. Pyykkö and J. P. Desclaux, Accounts of Chemical Re-
|
1818 |
+
search 12, 276 (1978).
|
1819 |
+
[2] P. Pyykkö, Chemical Reviews 88, 563 (1988).
|
1820 |
+
[3] P. Pyykkö, Chemical Reviews 112, 371 (2012).
|
1821 |
+
[4] Y. T. Oganessian and V. K. Utyonkov, Reports on
|
1822 |
+
Progress in Physics 78, 036301 (2015).
|
1823 |
+
[5] Y. T. Oganessian, A. Sobiczewski, and G. M. Ter-
|
1824 |
+
Akopian, Physica Scripta 92, 023003 (2017).
|
1825 |
+
[6] V. Pershina, Nuclear Physics A 944, 578 (2015).
|
1826 |
+
[7] V. Pershina, Radiochimica Acta 107, 833 (2019).
|
1827 |
+
[8] S. A. Giuliani, Z. Matheson, W. Nazarewicz, E. Olsen, P.-
|
1828 |
+
G. Reinhard, J. Sadhukhan, B. Schuetrumpf, N. Schunck,
|
1829 |
+
and P. Schwerdtfeger, Reviews of Modern Physics 91,
|
1830 |
+
011001 (2019).
|
1831 |
+
[9] T. K. Sato, M. Asai, A. Borschevsky, T. Stora, N. Sato,
|
1832 |
+
Y. Kaneya, K. Tsukada, C. E. Düllmann, K. Eber-
|
1833 |
+
hardt, E. Eliav, S. Ichikawa, U. Kaldor, J. V. Kratz,
|
1834 |
+
S. Miyashita, Y. Nagame, K. Ooe, A. Osa, D. Renisch,
|
1835 |
+
J. Runke, M. Schädel, P. Thörle-Pospiech, A. Toyoshima,
|
1836 |
+
and N. Trautmann, Nature 520, 209 (2015).
|
1837 |
+
[10] E. Eliav, U. Kaldor, Y. Ishikawa, and P. Pyykkö, Physical
|
1838 |
+
Review Letters 77, 5350 (1996).
|
1839 |
+
[11] I. Goidenko, L. Labzowsky, E. Eliav, U. Kaldor, and
|
1840 |
+
P. Pyykkö, Physical Review A 67, 020102 (2003).
|
1841 |
+
[12] B. G. C. Lackenby, V. A. Dzuba, and V. V. Flambaum,
|
1842 |
+
Physical Review A 98, 042512 (2018).
|
1843 |
+
[13] Y. Guo, L. F. Pašteka, E. Eliav, and A. Borschevsky,
|
1844 |
+
Advances in Quantum Chemistry 83, 107 (2021).
|
1845 |
+
[14] M. Y. Kaygorodov, L. V. Skripnikov, I. I. Tupitsyn,
|
1846 |
+
E. Eliav, Y. S. Kozhedub, A. V. Malyshev, A. V. Oleyn-
|
1847 |
+
ichenko, V. M. Shabaev, A. V. Titov, and A. V. Zait-
|
1848 |
+
sevskii, Physical Review A 104, 012819 (2021).
|
1849 |
+
[15] P. Pyykkö, Physical Chemistry Chemical Physics 13, 161
|
1850 |
+
(2011).
|
1851 |
+
[16] O. R. Smits, P. Indelicato, W. Nazarewicz, M. Piibeleht,
|
1852 |
+
and P. Schwerdtfeger, hal-03884148 (2022).
|
1853 |
+
[17] I. Pomeranchuk and J. Smorodinsky, J. Phys. USSR 9,
|
1854 |
+
97 (1945).
|
1855 |
+
[18] V. Voronkov and N. Kolesnikov, Zh. Eksp. Teor. Fiz. 39,
|
1856 |
+
189 (1961), [Sov. Phys. JETP 12, 136 (1961)].
|
1857 |
+
[19] S. S. Gershtein and Y. B. Zel’dovich, Zh. Eksp. Teor. Fiz.
|
1858 |
+
57, 654 (1969), [Sov. Phys. JETP 30, 358 (1970)]; Lett.
|
1859 |
+
Nuovo Cimento 1, 835 (1969).
|
1860 |
+
[20] W. Pieper and W. Greiner, Z. Phys. 218, 327 (1969).
|
1861 |
+
[21] Y. B. Zel’dovich and V. S. Popov, Usp. Fiz. Nauk 105,
|
1862 |
+
403 (1971), [Sov. Phys. Usp. 14, 673 (1972)].
|
1863 |
+
[22] W.
|
1864 |
+
Greiner,
|
1865 |
+
B.
|
1866 |
+
Müller,
|
1867 |
+
and
|
1868 |
+
J.
|
1869 |
+
Rafelski,
|
1870 |
+
Quantum Electrodynamics of Strong Fields,
|
1871 |
+
1st
|
1872 |
+
ed.,
|
1873 |
+
Theoretical and Mathematical Physics (Springer Berlin,
|
1874 |
+
Heidelberg, 1985).
|
1875 |
+
[23] V. S. Popov, Yad. Fiz. 64, 421 (2001), [Phys. At. Nucl.
|
1876 |
+
64, 367 (2001)].
|
1877 |
+
[24] S. I. Godunov, B. Machet, and M. I. Vysotsky, The Eu-
|
1878 |
+
ropean Physical Journal C 77, 782 (2017).
|
1879 |
+
[25] J. Rafelski, J. Kirsch, B. Müller, J. Reinhardt, and
|
1880 |
+
W. Greiner, Probing QED Vacuum with Heavy Ions
|
1881 |
+
(Springer, Cham, 2017) pp. 211–251.
|
1882 |
+
[26] R. V. Popov, V. M. Shabaev, D. A. Telnov, I. I. Tupitsyn,
|
1883 |
+
I. A. Maltsev, Y. S. Kozhedub, A. I. Bondarev, N. V.
|
1884 |
+
Kozin, X. Ma, G. Plunien, T. Stöhlker, D. A. Tumakov,
|
1885 |
+
and V. A. Zaytsev, Phys. Rev. D 102, 076005 (2020).
|
1886 |
+
[27] D. N. Voskresensky, Universe 7, 104 (2021).
|
1887 |
+
[28] A. Krasnov and K. Sveshnikov, Modern Physics Letters
|
1888 |
+
A 37, 2250136 (2022).
|
1889 |
+
[29] J. B. Mann and J. T. Waber, The Journal of Chemical
|
1890 |
+
Physics 53, 2397 (1970).
|
1891 |
+
[30] C. Lu, T. Carlson, F. Malik, T. Tucker, and C. Nestor,
|
1892 |
+
Atomic Data and Nuclear Data Tables 3, 1 (1971).
|
1893 |
+
[31] B. Fricke, W. Greiner, and J. T. Waber, Theoretica chim-
|
1894 |
+
ica acta 21, 235 (1971).
|
1895 |
+
[32] B. Fricke and J. T. Waber, The Journal of Chemical
|
1896 |
+
Physics 57, 371 (1972).
|
1897 |
+
[33] J. Desclaux, Atomic Data and Nuclear Data Tables 12,
|
1898 |
+
311 (1973).
|
1899 |
+
[34] B. Fricke and G. Soff, Atomic Data and Nuclear Data
|
1900 |
+
Tables 19, 83 (1977).
|
1901 |
+
[35] K. Umemoto and S. Saito, Journal of the Physical Society
|
1902 |
+
of Japan 65, 3175 (1996).
|
1903 |
+
[36] Z. Zhou, J. Kas, J. Rehr, and W. Ermler, Atomic Data
|
1904 |
+
and Nuclear Data Tables 114, 262 (2017).
|
1905 |
+
[37] E. Eliav, S. Shmulyian, U. Kaldor, and Y. Ishikawa, The
|
1906 |
+
Journal of Chemical Physics 109, 3954 (1998).
|
1907 |
+
[38] E. Eliav, A. Landau, Y. Ishikawa, and U. Kaldor, Journal
|
1908 |
+
of Physics B: Atomic, Molecular and Optical Physics 35,
|
1909 |
+
1693 (2002).
|
1910 |
+
[39] I. S. Lim, P. Schwerdtfeger, B. Metz, and H. Stoll, The
|
1911 |
+
Journal of Chemical Physics 122, 104103 (2005).
|
1912 |
+
[40] P. Indelicato, J. P. Santos, S. Boucard, and J.-P. De-
|
1913 |
+
sclaux, The European Physical Journal D 45, 155 (2007).
|
1914 |
+
[41] P. Indelicato, J. Bieroń, and P. Jönsson, Theoretical
|
1915 |
+
Chemistry Accounts 129, 495 (2011).
|
1916 |
+
[42] L. V. Skripnikov, N. S. Mosyagin, and A. V. Titov, Chem-
|
1917 |
+
ical Physics Letters 555, 79 (2013).
|
1918 |
+
[43] A. Borschevsky, V. Pershina, E. Eliav, and U. Kaldor,
|
1919 |
+
The Journal of Chemical Physics 138, 124302 (2013).
|
1920 |
+
[44] J. S. M. Ginges and J. C. Berengut, Physical Review A
|
1921 |
+
93, 052509 (2016); Journal of Physics B: Atomic, Molec-
|
1922 |
+
ular and Optical Physics 49, 095001 (2016).
|
1923 |
+
[45] A. V. Zaitsevskii, Y. A. Demidov, N. S. Mosyagin, L. V.
|
1924 |
+
Skripnikov, and A. V. Titov, Rad. Applic. 1, 132 (2016).
|
1925 |
+
[46] I. I. Tupitsyn, A. V. Malyshev, D. A. Glazov, M. Y.
|
1926 |
+
Kaygorodov, Y. S. Kozhedub, I. M. Savelyev, and V. M.
|
1927 |
+
Shabaev, Optika i Spektroskopiya 129, 841 (2021), [Opt.
|
1928 |
+
Spectrosc. 129, 1038 (2021)].
|
1929 |
+
[47] V. I. Nefedov, M. B. Trzhaskovskaya, and V. G. Yarzhem-
|
1930 |
+
skii, Doklady Physical Chemistry 408, 149 (2006).
|
1931 |
+
[48] I. I. Tupitsyn, V. M. Shabaev, J. R. Crespo López-
|
1932 |
+
Urrutia, I. Draganić, R. Soria Orts, and J. Ullrich, Phys-
|
1933 |
+
ical Review A 68, 022511 (2003).
|
1934 |
+
|
1935 |
+
12
|
1936 |
+
[49] I. I. Tupitsyn, A. V. Volotka, D. A. Glazov, V. M.
|
1937 |
+
Shabaev,
|
1938 |
+
G. Plunien,
|
1939 |
+
J. R. Crespo López-Urrutia,
|
1940 |
+
A. Lapierre, and J. Ullrich, Physical Review A 72, 062503
|
1941 |
+
(2005).
|
1942 |
+
[50] I. I. Tupitsyn, N. A. Zubova, V. M. Shabaev, G. Plunien,
|
1943 |
+
and T. Stöhlker, Physical Review A 98, 022517 (2018).
|
1944 |
+
[51] V. M. Shabaev, I. I. Tupitsyn, and V. A. Yerokhin, Phys-
|
1945 |
+
ical Review A 88, 012513 (2013).
|
1946 |
+
[52] V. M. Shabaev, I. I. Tupitsyn, and V. A. Yerokhin, Com-
|
1947 |
+
puter Physics Communications 189, 175 (2015); 223, 69
|
1948 |
+
(2018).
|
1949 |
+
[53] A. V. Malyshev, D. A. Glazov, V. M. Shabaev, I. I. Tupit-
|
1950 |
+
syn, V. A. Yerokhin, and V. A. Zaytsev, Physical Review
|
1951 |
+
A 106, 012806 (2022).
|
1952 |
+
[54] I. Lindgren and A. Rosen, Case Studies in Atomic Physics
|
1953 |
+
IV 4, 93 (1975).
|
1954 |
+
[55] I. P. Grant, Proceedings of the Royal Society of London.
|
1955 |
+
Series A. Mathematical and Physical Sciences 262, 555
|
1956 |
+
(1961).
|
1957 |
+
[56] I. Grant, Advances in Physics 19, 747 (1970).
|
1958 |
+
[57] P. Indelicato and J. P. Desclaux, Physical Review A 42,
|
1959 |
+
5139 (1990).
|
1960 |
+
[58] P. Pyykkö and L.-B. Zhao, Journal of Physics B: Atomic,
|
1961 |
+
Molecular and Optical Physics 36, 1469 (2003).
|
1962 |
+
[59] I. Draganić, J. R. Crespo López-Urrutia, R. DuBois,
|
1963 |
+
S. Fritzsche, V. M. Shabaev, R. S. Orts, I. I. Tupit-
|
1964 |
+
syn, Y. Zou, and J. Ullrich, Physical Review Letters 91,
|
1965 |
+
183001 (2003).
|
1966 |
+
[60] V. V. Flambaum and J. S. M. Ginges, Physical Review
|
1967 |
+
A 72, 052115 (2005).
|
1968 |
+
[61] C. Thierfelder and P. Schwerdtfeger, Physical Review A
|
1969 |
+
82, 062503 (2010).
|
1970 |
+
[62] I. I. Tupitsyn and E. V. Berseneva, Optika i Spek-
|
1971 |
+
troskopiya 114, 743 (2013), [Opt. Spectrosc. 114, 682
|
1972 |
+
(2013)].
|
1973 |
+
[63] L. V. Skripnikov, The Journal of Chemical Physics 154,
|
1974 |
+
201101 (2021).
|
1975 |
+
[64] L. V. Skripnikov, D. V. Chubukov, and V. M. Shakhova,
|
1976 |
+
The Journal of Chemical Physics 155, 144103 (2021).
|
1977 |
+
[65] A. Sunaga and T. Saue, Molecular Physics 119, e1974592
|
1978 |
+
(2021).
|
1979 |
+
[66] A. Sunaga, M. Salman, and T. Saue, The Journal of
|
1980 |
+
Chemical Physics 157, 164101 (2022).
|
1981 |
+
[67] A. V. Oleynichenko, A. V. Zaitsevskii, N. S. Mosyagin,
|
1982 |
+
A. N. Petrov, E. Eliav, and A. V. Titov, Preprints 2022,
|
1983 |
+
2022120530 (2022).
|
1984 |
+
|
1985 |
+
13
|
1986 |
+
TABLE VI: The levels with lowest total energies, the main configurations contributing to them, and the total angular momenta
|
1987 |
+
J evaluated by means of the DCBQ-SRC, DCBQ-CI1, and DCBQ-CI2 schemes for the SHEs with the atomic numbers 120 ≤
|
1988 |
+
Z ≤ 170. For the DCBQ-CI1 and DCBQ-CI2 results, the configurations with weights of at least 0.05 are presented. The
|
1989 |
+
configurations obtained are given relative to the closed-shell configurations listed in the column “Closed shells”. In the first
|
1990 |
+
column, the values of Z typed in the bold font indicate the cases when the ground-state configurations obtained within the
|
1991 |
+
DCBQ-RAV and DCBQ-SRC methods differ. In addition, the following notations around Z are adopted to assist the reader
|
1992 |
+
in navigation through the table. The underline “
|
1993 |
+
” means that the ground-state JSRC level evaluated using the DCBQ-SRC
|
1994 |
+
approach differs from the JCI1 one calculated by means of the DCBQ-CI1 approach, JSRC ̸= JCI1. The left vertical line “|
|
1995 |
+
”
|
1996 |
+
signalizes that the configuration KSRC which the ground-state SRC level belongs to differs from the dominant configuration KCI1
|
1997 |
+
of the ground-state CI1 level, KSRC ̸= KCI1. The overline “
|
1998 |
+
” represents the fact that JCI1 ̸= JCI2. Finally, the right vertical
|
1999 |
+
line “
|
2000 |
+
|” stands for the case KCI1 ̸= KCI2. The obtained ground-state levels are compared with the results of Ref. [47]. The
|
2001 |
+
non-relativistic notation of Ref. [47] are retained.
|
2002 |
+
Z
|
2003 |
+
Closed
|
2004 |
+
DCBQ-SRC
|
2005 |
+
JSRC
|
2006 |
+
DCBQ-CI1
|
2007 |
+
JCI1
|
2008 |
+
DCBQ-CI2
|
2009 |
+
JCI2
|
2010 |
+
Ref. [47]
|
2011 |
+
Shells
|
2012 |
+
120
|
2013 |
+
[Og]
|
2014 |
+
8s2
|
2015 |
+
1/2
|
2016 |
+
0
|
2017 |
+
0.94 · 8s2
|
2018 |
+
1/2
|
2019 |
+
0
|
2020 |
+
0.93 · 8s2
|
2021 |
+
1/2
|
2022 |
+
0
|
2023 |
+
8s2
|
2024 |
+
121
|
2025 |
+
8s2
|
2026 |
+
1/28p1
|
2027 |
+
1/2
|
2028 |
+
1/2
|
2029 |
+
0.92 · 8s2
|
2030 |
+
1/28p1
|
2031 |
+
1/2
|
2032 |
+
1/2
|
2033 |
+
0.91 · 8s2
|
2034 |
+
1/28p1
|
2035 |
+
1/2
|
2036 |
+
1/2
|
2037 |
+
8s28p1
|
2038 |
+
122
|
2039 |
+
8s2
|
2040 |
+
1/28p1
|
2041 |
+
1/27d1
|
2042 |
+
3/2
|
2043 |
+
2
|
2044 |
+
0.85 · 8s2
|
2045 |
+
1/28p1
|
2046 |
+
1/27d1
|
2047 |
+
3/2+
|
2048 |
+
0.09 · 8s1
|
2049 |
+
1/28p1
|
2050 |
+
1/27d2
|
2051 |
+
3/2
|
2052 |
+
2
|
2053 |
+
0.84 · 8s2
|
2054 |
+
1/28p1
|
2055 |
+
1/27d1
|
2056 |
+
3/2+
|
2057 |
+
0.07 · 8s1
|
2058 |
+
1/28p1
|
2059 |
+
1/27d2
|
2060 |
+
3/2
|
2061 |
+
2
|
2062 |
+
7d18p1
|
2063 |
+
123
|
2064 |
+
8s2
|
2065 |
+
1/28p1
|
2066 |
+
1/27d1
|
2067 |
+
3/26f1
|
2068 |
+
5/2
|
2069 |
+
9/2
|
2070 |
+
0.83 · 8s2
|
2071 |
+
1/28p1
|
2072 |
+
1/27d1
|
2073 |
+
3/26f1
|
2074 |
+
5/2+
|
2075 |
+
0.14 · 8s1
|
2076 |
+
1/28p1
|
2077 |
+
1/27d2
|
2078 |
+
3/26f1
|
2079 |
+
5/2
|
2080 |
+
9/2
|
2081 |
+
0.82 · 8s2
|
2082 |
+
1/28p1
|
2083 |
+
1/27d1
|
2084 |
+
3/26f1
|
2085 |
+
5/2+
|
2086 |
+
0.09 · 8s1
|
2087 |
+
1/28p1
|
2088 |
+
1/27d2
|
2089 |
+
3/26f1
|
2090 |
+
5/2
|
2091 |
+
9/2
|
2092 |
+
6f28p1
|
2093 |
+
|124
|
2094 |
+
+8s2
|
2095 |
+
8p1
|
2096 |
+
1/27d1
|
2097 |
+
3/26f2
|
2098 |
+
5/2
|
2099 |
+
6
|
2100 |
+
0.83 · 8p1
|
2101 |
+
1/26f3
|
2102 |
+
5/2+
|
2103 |
+
0.10 · 8p1
|
2104 |
+
1/26f2
|
2105 |
+
5/26f1
|
2106 |
+
7/2
|
2107 |
+
5
|
2108 |
+
0.85 · 8p1
|
2109 |
+
1/26f3
|
2110 |
+
5/2+
|
2111 |
+
0.07 · 8p1
|
2112 |
+
1/26f2
|
2113 |
+
5/26f1
|
2114 |
+
7/2
|
2115 |
+
5
|
2116 |
+
6f28p2
|
2117 |
+
125
|
2118 |
+
8p1
|
2119 |
+
1/27d1
|
2120 |
+
3/26f2
|
2121 |
+
5/25g1
|
2122 |
+
7/2 17/2
|
2123 |
+
0.96 · 8p1
|
2124 |
+
1/27d1
|
2125 |
+
3/26f2
|
2126 |
+
5/25g1
|
2127 |
+
7/2
|
2128 |
+
17/2
|
2129 |
+
0.94 · 8p1
|
2130 |
+
1/27d1
|
2131 |
+
3/26f2
|
2132 |
+
5/25g1
|
2133 |
+
7/2
|
2134 |
+
17/2
|
2135 |
+
0.81 · 5g16f28p2+
|
2136 |
+
0.17 · 5g16f17d28p1+
|
2137 |
+
0.02 · 6f37d18p1
|
2138 |
+
126
|
2139 |
+
8p1
|
2140 |
+
1/27d1
|
2141 |
+
3/26f2
|
2142 |
+
5/25g2
|
2143 |
+
7/2
|
2144 |
+
10
|
2145 |
+
0.93 · 8p1
|
2146 |
+
1/27d1
|
2147 |
+
3/26f2
|
2148 |
+
5/25g2
|
2149 |
+
7/2
|
2150 |
+
10
|
2151 |
+
0.92 · 8p1
|
2152 |
+
1/27d1
|
2153 |
+
3/26f2
|
2154 |
+
5/25g2
|
2155 |
+
7/2
|
2156 |
+
10
|
2157 |
+
0.998 · 5g26f38p1+
|
2158 |
+
0.002 · 5g26f28p2
|
2159 |
+
127
|
2160 |
+
8p1
|
2161 |
+
1/27d1
|
2162 |
+
3/26f2
|
2163 |
+
5/25g3
|
2164 |
+
7/2 27/2
|
2165 |
+
0.95 · 8p1
|
2166 |
+
1/27d1
|
2167 |
+
3/26f2
|
2168 |
+
5/25g3
|
2169 |
+
7/2
|
2170 |
+
27/2
|
2171 |
+
0.94 · 8p1
|
2172 |
+
1/27d1
|
2173 |
+
3/26f2
|
2174 |
+
5/25g3
|
2175 |
+
7/2
|
2176 |
+
27/2
|
2177 |
+
0.88 · 5g36f28p2+
|
2178 |
+
0.12 · 5g36f17d28p1
|
2179 |
+
128
|
2180 |
+
8p1
|
2181 |
+
1/27d1
|
2182 |
+
3/26f2
|
2183 |
+
5/25g4
|
2184 |
+
7/2
|
2185 |
+
14
|
2186 |
+
0.80 · 8p1
|
2187 |
+
1/27d1
|
2188 |
+
3/26f2
|
2189 |
+
5/25g4
|
2190 |
+
7/2+
|
2191 |
+
0.14 · 8p1
|
2192 |
+
1/27d1
|
2193 |
+
3/26f2
|
2194 |
+
5/25g3
|
2195 |
+
7/25g1
|
2196 |
+
9/2
|
2197 |
+
14
|
2198 |
+
0.81 · 8p1
|
2199 |
+
1/27d1
|
2200 |
+
3/26f2
|
2201 |
+
5/25g4
|
2202 |
+
7/2+
|
2203 |
+
0.13 · 8p1
|
2204 |
+
1/27d1
|
2205 |
+
3/26f2
|
2206 |
+
5/25g3
|
2207 |
+
7/25g1
|
2208 |
+
9/2
|
2209 |
+
14
|
2210 |
+
0.88 · 5g46f28p2+
|
2211 |
+
0.12 · 5g46f17d28p1
|
2212 |
+
129
|
2213 |
+
8p1
|
2214 |
+
1/27d1
|
2215 |
+
3/26f3
|
2216 |
+
5/25g4
|
2217 |
+
7/2 29/2
|
2218 |
+
0.93 · 8p1
|
2219 |
+
1/27d1
|
2220 |
+
3/26f3
|
2221 |
+
5/25g4
|
2222 |
+
7/2+
|
2223 |
+
0.06 · 8p1
|
2224 |
+
1/27d1
|
2225 |
+
3/26f2
|
2226 |
+
5/25g4
|
2227 |
+
7/26f1
|
2228 |
+
7/2
|
2229 |
+
29/2
|
2230 |
+
0.94 · 8p1
|
2231 |
+
1/27d1
|
2232 |
+
3/26f3
|
2233 |
+
5/25g4
|
2234 |
+
7/2
|
2235 |
+
29/2
|
2236 |
+
5g46f37d18p1
|
2237 |
+
130|
|
2238 |
+
8p1
|
2239 |
+
1/27d1
|
2240 |
+
3/26f3
|
2241 |
+
5/25g5
|
2242 |
+
7/2
|
2243 |
+
14
|
2244 |
+
0.92 · 8p1
|
2245 |
+
1/27d1
|
2246 |
+
3/26f3
|
2247 |
+
5/25g5
|
2248 |
+
7/2+
|
2249 |
+
0.06 · 8p1
|
2250 |
+
1/27d1
|
2251 |
+
3/26f2
|
2252 |
+
5/25g5
|
2253 |
+
7/26f1
|
2254 |
+
7/2
|
2255 |
+
14
|
2256 |
+
0.85 · 8p2
|
2257 |
+
1/26f3
|
2258 |
+
5/25g5
|
2259 |
+
7/2+
|
2260 |
+
0.06 · 7d2
|
2261 |
+
3/26f3
|
2262 |
+
5/25g5
|
2263 |
+
7/2
|
2264 |
+
12
|
2265 |
+
5g56f37d18p1
|
2266 |
+
|131
|
2267 |
+
8p1
|
2268 |
+
1/27d1
|
2269 |
+
3/26f3
|
2270 |
+
5/25g6
|
2271 |
+
7/2 25/2
|
2272 |
+
0.82 · 8p2
|
2273 |
+
1/26f3
|
2274 |
+
5/25g6
|
2275 |
+
7/2+
|
2276 |
+
0.06 · 7d2
|
2277 |
+
3/26f3
|
2278 |
+
5/25g6
|
2279 |
+
7/2+
|
2280 |
+
0.06 · 8p1
|
2281 |
+
1/27d2
|
2282 |
+
3/26f2
|
2283 |
+
5/25g6
|
2284 |
+
7/2+
|
2285 |
+
0.05 · 8p2
|
2286 |
+
1/26f2
|
2287 |
+
5/25g6
|
2288 |
+
7/26f1
|
2289 |
+
7/2
|
2290 |
+
21/2
|
2291 |
+
0.85 · 8p2
|
2292 |
+
1/26f3
|
2293 |
+
5/25g6
|
2294 |
+
7/2+
|
2295 |
+
0.05 · 7d2
|
2296 |
+
3/26f3
|
2297 |
+
5/25g6
|
2298 |
+
7/2
|
2299 |
+
21/2
|
2300 |
+
0.86 · 5g66f38p2+
|
2301 |
+
0.14 · 5g66f27d28p1
|
2302 |
+
|132
|
2303 |
+
8p1
|
2304 |
+
1/27d1
|
2305 |
+
3/26f3
|
2306 |
+
5/25g7
|
2307 |
+
7/2
|
2308 |
+
10
|
2309 |
+
0.84 · 8p2
|
2310 |
+
1/26f3
|
2311 |
+
5/25g7
|
2312 |
+
7/2+
|
2313 |
+
0.08 · 8p1
|
2314 |
+
1/27d2
|
2315 |
+
3/26f2
|
2316 |
+
5/25g7
|
2317 |
+
7/2+
|
2318 |
+
0.06 · 7d2
|
2319 |
+
3/26f3
|
2320 |
+
5/25g7
|
2321 |
+
7/2
|
2322 |
+
6
|
2323 |
+
0.87 · 8p2
|
2324 |
+
1/26f3
|
2325 |
+
5/25g7
|
2326 |
+
7/2+
|
2327 |
+
0.05 · 7d2
|
2328 |
+
3/26f3
|
2329 |
+
5/25g7
|
2330 |
+
7/2
|
2331 |
+
6
|
2332 |
+
5g76f38p2
|
2333 |
+
|
2334 |
+
14
|
2335 |
+
TABLE VI. (Continuation.)
|
2336 |
+
Z
|
2337 |
+
Closed
|
2338 |
+
DCBQ-SRC
|
2339 |
+
JSRC
|
2340 |
+
DCBQ-CI1
|
2341 |
+
JCI1
|
2342 |
+
DCBQ-CI2
|
2343 |
+
JCI2
|
2344 |
+
Ref. [47]
|
2345 |
+
Shells
|
2346 |
+
|133
|
2347 |
+
8p1
|
2348 |
+
1/27d1
|
2349 |
+
3/26f3
|
2350 |
+
5/25g8
|
2351 |
+
7/2 13/2
|
2352 |
+
0.83 · 8p2
|
2353 |
+
1/26f3
|
2354 |
+
5/25g8
|
2355 |
+
7/2+
|
2356 |
+
0.09 · 8p1
|
2357 |
+
1/27d2
|
2358 |
+
3/26f2
|
2359 |
+
5/25g8
|
2360 |
+
7/2
|
2361 |
+
9/2
|
2362 |
+
0.87 · 8p2
|
2363 |
+
1/26f3
|
2364 |
+
5/25g8
|
2365 |
+
7/2
|
2366 |
+
9/2
|
2367 |
+
5g86f38p2
|
2368 |
+
|134 +5g8
|
2369 |
+
7/2
|
2370 |
+
8p1
|
2371 |
+
1/27d1
|
2372 |
+
3/26f4
|
2373 |
+
5/2
|
2374 |
+
6
|
2375 |
+
0.82 · 8p2
|
2376 |
+
1/26f4
|
2377 |
+
5/2+
|
2378 |
+
0.07 · 8p1
|
2379 |
+
1/27d2
|
2380 |
+
3/26f3
|
2381 |
+
5/2+
|
2382 |
+
0.06 · 7d2
|
2383 |
+
3/26f4
|
2384 |
+
5/2
|
2385 |
+
4
|
2386 |
+
0.84 · 8p2
|
2387 |
+
1/26f4
|
2388 |
+
5/2+
|
2389 |
+
0.05 · 8p1
|
2390 |
+
1/27d2
|
2391 |
+
3/26f3
|
2392 |
+
5/2+
|
2393 |
+
0.05 · 7d2
|
2394 |
+
3/26f4
|
2395 |
+
5/2
|
2396 |
+
4
|
2397 |
+
5g86f48p2
|
2398 |
+
|135
|
2399 |
+
8p2
|
2400 |
+
1/27d1
|
2401 |
+
3/26f3
|
2402 |
+
5/25g1
|
2403 |
+
9/2 13/2
|
2404 |
+
0.82 · 8p2
|
2405 |
+
1/26f4
|
2406 |
+
5/25g1
|
2407 |
+
9/2+
|
2408 |
+
0.08 · 8p1
|
2409 |
+
1/27d2
|
2410 |
+
3/26f3
|
2411 |
+
5/25g1
|
2412 |
+
9/2+
|
2413 |
+
0.05 · 7d2
|
2414 |
+
3/26f4
|
2415 |
+
5/25g1
|
2416 |
+
9/2
|
2417 |
+
5/2
|
2418 |
+
0.85 · 8p2
|
2419 |
+
1/26f4
|
2420 |
+
5/25g1
|
2421 |
+
9/2+
|
2422 |
+
0.06 · 8p1
|
2423 |
+
1/27d2
|
2424 |
+
3/26f3
|
2425 |
+
5/25g1
|
2426 |
+
9/2
|
2427 |
+
5/2
|
2428 |
+
5g96f48p2
|
2429 |
+
136
|
2430 |
+
8p2
|
2431 |
+
1/27d1
|
2432 |
+
3/26f3
|
2433 |
+
5/25g2
|
2434 |
+
9/2
|
2435 |
+
3
|
2436 |
+
0.91 · 8p2
|
2437 |
+
1/27d1
|
2438 |
+
3/26f3
|
2439 |
+
5/25g2
|
2440 |
+
9/2+
|
2441 |
+
0.05 · 7d3
|
2442 |
+
3/26f3
|
2443 |
+
5/25g2
|
2444 |
+
9/2
|
2445 |
+
4
|
2446 |
+
0.89 · 8p2
|
2447 |
+
1/27d1
|
2448 |
+
3/26f3
|
2449 |
+
5/25g2
|
2450 |
+
9/2
|
2451 |
+
4
|
2452 |
+
5g106f48p2
|
2453 |
+
|137|
|
2454 |
+
8p2
|
2455 |
+
1/27d1
|
2456 |
+
3/26f3
|
2457 |
+
5/25g3
|
2458 |
+
9/2 19/2
|
2459 |
+
0.80 · 8p2
|
2460 |
+
1/26f4
|
2461 |
+
5/25g3
|
2462 |
+
9/2+
|
2463 |
+
0.11 · 8p1
|
2464 |
+
1/27d2
|
2465 |
+
3/26f3
|
2466 |
+
5/25g3
|
2467 |
+
9/2
|
2468 |
+
13/2
|
2469 |
+
0.89 · 8p2
|
2470 |
+
1/27d1
|
2471 |
+
3/26f3
|
2472 |
+
5/25g3
|
2473 |
+
9/2
|
2474 |
+
17/2
|
2475 |
+
5g116f48p2
|
2476 |
+
138
|
2477 |
+
+8p2
|
2478 |
+
1/2
|
2479 |
+
7d1
|
2480 |
+
3/26f3
|
2481 |
+
5/25g4
|
2482 |
+
9/2
|
2483 |
+
6
|
2484 |
+
0.91 · 7d1
|
2485 |
+
3/26f3
|
2486 |
+
5/25g4
|
2487 |
+
9/2
|
2488 |
+
7
|
2489 |
+
0.89 · 7d1
|
2490 |
+
3/26f3
|
2491 |
+
5/25g4
|
2492 |
+
9/2
|
2493 |
+
7
|
2494 |
+
5g126f37d18p2
|
2495 |
+
139
|
2496 |
+
7d1
|
2497 |
+
3/26f3
|
2498 |
+
5/25g5
|
2499 |
+
9/2
|
2500 |
+
13/2
|
2501 |
+
0.92 · 7d1
|
2502 |
+
3/26f3
|
2503 |
+
5/25g5
|
2504 |
+
9/2
|
2505 |
+
13/2
|
2506 |
+
0.91 · 7d1
|
2507 |
+
3/26f3
|
2508 |
+
5/25g5
|
2509 |
+
9/2
|
2510 |
+
13/2
|
2511 |
+
5g136f37d18p2
|
2512 |
+
|140
|
2513 |
+
7d2
|
2514 |
+
3/26f2
|
2515 |
+
5/25g6
|
2516 |
+
9/2
|
2517 |
+
6
|
2518 |
+
0.90 · 7d1
|
2519 |
+
3/26f3
|
2520 |
+
5/25g6
|
2521 |
+
9/2+
|
2522 |
+
0.05 · 7d1
|
2523 |
+
3/26f2
|
2524 |
+
5/25g6
|
2525 |
+
9/26f1
|
2526 |
+
7/2
|
2527 |
+
6
|
2528 |
+
0.90 · 7d1
|
2529 |
+
3/26f3
|
2530 |
+
5/25g6
|
2531 |
+
9/2
|
2532 |
+
6
|
2533 |
+
5g146f37d18p2
|
2534 |
+
141
|
2535 |
+
7d2
|
2536 |
+
3/26f2
|
2537 |
+
5/25g7
|
2538 |
+
9/2
|
2539 |
+
9/2
|
2540 |
+
0.93 · 7d2
|
2541 |
+
3/26f2
|
2542 |
+
5/25g7
|
2543 |
+
9/2
|
2544 |
+
9/2
|
2545 |
+
0.91 · 7d2
|
2546 |
+
3/26f2
|
2547 |
+
5/25g7
|
2548 |
+
9/2
|
2549 |
+
9/2
|
2550 |
+
5g156f27d28p2
|
2551 |
+
142
|
2552 |
+
7d2
|
2553 |
+
3/26f2
|
2554 |
+
5/25g8
|
2555 |
+
9/2
|
2556 |
+
2
|
2557 |
+
0.91 · 7d2
|
2558 |
+
3/26f2
|
2559 |
+
5/25g8
|
2560 |
+
9/2
|
2561 |
+
2
|
2562 |
+
0.89 · 7d2
|
2563 |
+
3/26f2
|
2564 |
+
5/25g8
|
2565 |
+
9/2
|
2566 |
+
2
|
2567 |
+
5g166f27d28p2
|
2568 |
+
143
|
2569 |
+
7d2
|
2570 |
+
3/26f3
|
2571 |
+
5/25g8
|
2572 |
+
9/2
|
2573 |
+
5/2
|
2574 |
+
0.93 · 7d2
|
2575 |
+
3/26f3
|
2576 |
+
5/25g8
|
2577 |
+
9/2
|
2578 |
+
3/2
|
2579 |
+
0.92 · 7d2
|
2580 |
+
3/26f3
|
2581 |
+
5/25g8
|
2582 |
+
9/2
|
2583 |
+
1/2
|
2584 |
+
5g176f27d28p2
|
2585 |
+
144
|
2586 |
+
7d2
|
2587 |
+
3/26f3
|
2588 |
+
5/25g9
|
2589 |
+
9/2
|
2590 |
+
7
|
2591 |
+
0.96 · 7d2
|
2592 |
+
3/26f3
|
2593 |
+
5/25g9
|
2594 |
+
9/2
|
2595 |
+
7
|
2596 |
+
0.94 · 7d2
|
2597 |
+
3/26f3
|
2598 |
+
5/25g9
|
2599 |
+
9/2
|
2600 |
+
7
|
2601 |
+
0.95 · 5g176f27d38p2+
|
2602 |
+
0.05 · 5g176f47d18p2
|
2603 |
+
145
|
2604 |
+
7d2
|
2605 |
+
3/26f3
|
2606 |
+
5/25g10
|
2607 |
+
9/2
|
2608 |
+
13/2
|
2609 |
+
0.96 · 7d2
|
2610 |
+
3/26f3
|
2611 |
+
5/25g10
|
2612 |
+
9/2
|
2613 |
+
13/2
|
2614 |
+
0.93 · 7d2
|
2615 |
+
3/26f3
|
2616 |
+
5/25g10
|
2617 |
+
9/2
|
2618 |
+
13/2
|
2619 |
+
5g186f37d28p2
|
2620 |
+
146
|
2621 |
+
+5g10
|
2622 |
+
9/2
|
2623 |
+
7d2
|
2624 |
+
3/26f4
|
2625 |
+
5/2
|
2626 |
+
6
|
2627 |
+
0.95 · 7d2
|
2628 |
+
3/26f4
|
2629 |
+
5/2
|
2630 |
+
6
|
2631 |
+
0.91 · 7d2
|
2632 |
+
3/26f4
|
2633 |
+
5/2
|
2634 |
+
6
|
2635 |
+
6f47d28p2
|
2636 |
+
147
|
2637 |
+
7d2
|
2638 |
+
3/26f5
|
2639 |
+
5/2
|
2640 |
+
7/2
|
2641 |
+
0.89 · 7d2
|
2642 |
+
3/26f5
|
2643 |
+
5/2+
|
2644 |
+
0.07 · 7d2
|
2645 |
+
3/26f4
|
2646 |
+
5/26f1
|
2647 |
+
7/2
|
2648 |
+
9/2
|
2649 |
+
0.88 · 7d2
|
2650 |
+
3/26f5
|
2651 |
+
5/2+
|
2652 |
+
0.05 · 7d2
|
2653 |
+
3/26f4
|
2654 |
+
5/26f1
|
2655 |
+
7/2
|
2656 |
+
9/2
|
2657 |
+
6f57d28p2
|
2658 |
+
148
|
2659 |
+
7d2
|
2660 |
+
3/26f6
|
2661 |
+
5/2
|
2662 |
+
2
|
2663 |
+
0.94 · 7d2
|
2664 |
+
3/26f6
|
2665 |
+
5/2
|
2666 |
+
2
|
2667 |
+
0.93 · 7d2
|
2668 |
+
3/26f6
|
2669 |
+
5/2
|
2670 |
+
2
|
2671 |
+
6f67d28p2
|
2672 |
+
149
|
2673 |
+
7d3
|
2674 |
+
3/26f6
|
2675 |
+
5/2
|
2676 |
+
3/2
|
2677 |
+
0.96 · 7d3
|
2678 |
+
3/26f6
|
2679 |
+
5/2
|
2680 |
+
3/2
|
2681 |
+
0.93 · 7d3
|
2682 |
+
3/26f6
|
2683 |
+
5/2
|
2684 |
+
3/2
|
2685 |
+
6f67d38p2
|
2686 |
+
150
|
2687 |
+
7d3
|
2688 |
+
3/26f6
|
2689 |
+
5/26f1
|
2690 |
+
7/2
|
2691 |
+
2
|
2692 |
+
0.85 · 7d3
|
2693 |
+
3/26f6
|
2694 |
+
5/26f1
|
2695 |
+
7/2+
|
2696 |
+
0.11 · 7d3
|
2697 |
+
3/26f5
|
2698 |
+
5/26f2
|
2699 |
+
7/2
|
2700 |
+
2
|
2701 |
+
0.89 · 7d3
|
2702 |
+
3/26f6
|
2703 |
+
5/26f1
|
2704 |
+
7/2+
|
2705 |
+
0.06 · 7d3
|
2706 |
+
3/26f5
|
2707 |
+
5/26f2
|
2708 |
+
7/2
|
2709 |
+
2
|
2710 |
+
6f77d38p2
|
2711 |
+
151
|
2712 |
+
7d3
|
2713 |
+
3/26f6
|
2714 |
+
5/26f2
|
2715 |
+
7/2
|
2716 |
+
9/2
|
2717 |
+
0.89 · 7d3
|
2718 |
+
3/26f6
|
2719 |
+
5/26f2
|
2720 |
+
7/2+
|
2721 |
+
0.09 · 7d3
|
2722 |
+
3/26f5
|
2723 |
+
5/26f3
|
2724 |
+
7/2
|
2725 |
+
9/2
|
2726 |
+
0.89 · 7d3
|
2727 |
+
3/26f6
|
2728 |
+
5/26f2
|
2729 |
+
7/2+
|
2730 |
+
0.06 · 7d3
|
2731 |
+
3/26f5
|
2732 |
+
5/26f3
|
2733 |
+
7/2
|
2734 |
+
9/2
|
2735 |
+
6f87d38p2
|
2736 |
+
152 +6f6
|
2737 |
+
5/2
|
2738 |
+
7d2
|
2739 |
+
3/26f4
|
2740 |
+
7/2
|
2741 |
+
6
|
2742 |
+
0.95 · 7d2
|
2743 |
+
3/26f4
|
2744 |
+
7/2
|
2745 |
+
6
|
2746 |
+
0.92 · 7d2
|
2747 |
+
3/26f4
|
2748 |
+
7/2
|
2749 |
+
6
|
2750 |
+
6f97d38p2
|
2751 |
+
153
|
2752 |
+
7d2
|
2753 |
+
3/26f5
|
2754 |
+
7/2
|
2755 |
+
11/2
|
2756 |
+
0.96 · 7d2
|
2757 |
+
3/26f5
|
2758 |
+
7/2
|
2759 |
+
11/2
|
2760 |
+
0.93 · 7d2
|
2761 |
+
3/26f5
|
2762 |
+
7/2
|
2763 |
+
11/2
|
2764 |
+
6f107d38p2
|
2765 |
+
|
2766 |
+
15
|
2767 |
+
TABLE VI. (Continuation.)
|
2768 |
+
Z
|
2769 |
+
Closed
|
2770 |
+
DCBQ-SRC
|
2771 |
+
JSRC
|
2772 |
+
DCBQ-CI1
|
2773 |
+
JCI1
|
2774 |
+
DCBQ-CI2
|
2775 |
+
JCI2
|
2776 |
+
Ref. [47]
|
2777 |
+
Shells
|
2778 |
+
154
|
2779 |
+
7d2
|
2780 |
+
3/26f6
|
2781 |
+
7/2
|
2782 |
+
6
|
2783 |
+
0.98 · 7d2
|
2784 |
+
3/26f6
|
2785 |
+
7/2
|
2786 |
+
6
|
2787 |
+
0.95 · 7d2
|
2788 |
+
3/26f6
|
2789 |
+
7/2
|
2790 |
+
6
|
2791 |
+
6f117d38p2
|
2792 |
+
|155
|
2793 |
+
7d2
|
2794 |
+
3/26f7
|
2795 |
+
7/2
|
2796 |
+
7/2
|
2797 |
+
0.99 · 9s1
|
2798 |
+
1/26f8
|
2799 |
+
7/2
|
2800 |
+
1/2
|
2801 |
+
0.94 · 9s1
|
2802 |
+
1/26f8
|
2803 |
+
7/2
|
2804 |
+
1/2
|
2805 |
+
6f127d38p2
|
2806 |
+
156
|
2807 |
+
7d2
|
2808 |
+
3/26f8
|
2809 |
+
7/2
|
2810 |
+
2
|
2811 |
+
0.97 · 7d2
|
2812 |
+
3/26f8
|
2813 |
+
7/2
|
2814 |
+
2
|
2815 |
+
0.97 · 7d2
|
2816 |
+
3/26f8
|
2817 |
+
7/2
|
2818 |
+
2
|
2819 |
+
6f137d38p2
|
2820 |
+
157
|
2821 |
+
+6f8
|
2822 |
+
7/2
|
2823 |
+
7d3
|
2824 |
+
3/2
|
2825 |
+
3/2
|
2826 |
+
0.96 · 7d3
|
2827 |
+
3/2
|
2828 |
+
3/2
|
2829 |
+
0.96 · 7d3
|
2830 |
+
3/2
|
2831 |
+
3/2
|
2832 |
+
6f147d38p2
|
2833 |
+
158
|
2834 |
+
7d4
|
2835 |
+
3/2
|
2836 |
+
0
|
2837 |
+
0.98 · 7d4
|
2838 |
+
3/2
|
2839 |
+
0
|
2840 |
+
0.96 · 7d4
|
2841 |
+
3/2
|
2842 |
+
0
|
2843 |
+
6f147d48p2
|
2844 |
+
159 +7d4
|
2845 |
+
3/2
|
2846 |
+
9s1
|
2847 |
+
1/2
|
2848 |
+
1/2
|
2849 |
+
0.98 · 9s1
|
2850 |
+
1/2
|
2851 |
+
1/2
|
2852 |
+
0.96 · 9s1
|
2853 |
+
1/2
|
2854 |
+
1/2
|
2855 |
+
6f147d48p29s1
|
2856 |
+
160
|
2857 |
+
7d1
|
2858 |
+
5/29s1
|
2859 |
+
1/2
|
2860 |
+
3
|
2861 |
+
0.96 · 7d1
|
2862 |
+
5/29s1
|
2863 |
+
1/2
|
2864 |
+
3
|
2865 |
+
0.95 · 7d1
|
2866 |
+
5/29s1
|
2867 |
+
1/2
|
2868 |
+
3
|
2869 |
+
6f147d58p29s1
|
2870 |
+
161
|
2871 |
+
7d2
|
2872 |
+
5/29s1
|
2873 |
+
1/2
|
2874 |
+
9/2
|
2875 |
+
0.97 · 7d2
|
2876 |
+
5/29s1
|
2877 |
+
1/2
|
2878 |
+
9/2
|
2879 |
+
0.92 · 7d2
|
2880 |
+
5/29s1
|
2881 |
+
1/2
|
2882 |
+
9/2
|
2883 |
+
6f147d68p29s1
|
2884 |
+
162
|
2885 |
+
7d3
|
2886 |
+
5/29s1
|
2887 |
+
1/2
|
2888 |
+
5
|
2889 |
+
0.98 · 7d3
|
2890 |
+
5/29s1
|
2891 |
+
1/2
|
2892 |
+
5
|
2893 |
+
0.96 · 7d3
|
2894 |
+
5/29s1
|
2895 |
+
1/2
|
2896 |
+
5
|
2897 |
+
6f147d78p29s1
|
2898 |
+
163
|
2899 |
+
7d5
|
2900 |
+
5/2
|
2901 |
+
5/2
|
2902 |
+
0.96 · 7d5
|
2903 |
+
5/2
|
2904 |
+
5/2
|
2905 |
+
0.95 · 7d5
|
2906 |
+
5/2
|
2907 |
+
5/2
|
2908 |
+
6f147d88p29s1
|
2909 |
+
164
|
2910 |
+
7d6
|
2911 |
+
5/2
|
2912 |
+
0
|
2913 |
+
0.98 · 7d6
|
2914 |
+
5/2
|
2915 |
+
0
|
2916 |
+
0.96 · 7d6
|
2917 |
+
5/2
|
2918 |
+
0
|
2919 |
+
6f147d108p2
|
2920 |
+
165 +7d6
|
2921 |
+
5/2
|
2922 |
+
9s1
|
2923 |
+
1/2
|
2924 |
+
1/2
|
2925 |
+
0.98 · 9s1
|
2926 |
+
1/2
|
2927 |
+
1/2
|
2928 |
+
0.96 · 9s1
|
2929 |
+
1/2
|
2930 |
+
1/2
|
2931 |
+
166
|
2932 |
+
9s2
|
2933 |
+
1/2
|
2934 |
+
0
|
2935 |
+
0.84 · 9s2
|
2936 |
+
1/2 + 0.10 · 8p2
|
2937 |
+
3/2
|
2938 |
+
0
|
2939 |
+
0.90 · 9s2
|
2940 |
+
1/2
|
2941 |
+
0
|
2942 |
+
|167
|
2943 |
+
9s1
|
2944 |
+
1/28p1
|
2945 |
+
3/29p1
|
2946 |
+
1/2
|
2947 |
+
3/2
|
2948 |
+
0.88 · 9s2
|
2949 |
+
1/28p1
|
2950 |
+
3/2 + 0.06 · 8p3
|
2951 |
+
3/2
|
2952 |
+
3/2
|
2953 |
+
0.91 · 9s2
|
2954 |
+
1/28p1
|
2955 |
+
3/2
|
2956 |
+
3/2
|
2957 |
+
|168|
|
2958 |
+
9s2
|
2959 |
+
1/28p1
|
2960 |
+
3/29p1
|
2961 |
+
1/2
|
2962 |
+
1
|
2963 |
+
0.55 · 9s1
|
2964 |
+
1/28p2
|
2965 |
+
3/29p1
|
2966 |
+
1/2+
|
2967 |
+
0.24 · 9s1
|
2968 |
+
1/28p1
|
2969 |
+
3/29p2
|
2970 |
+
1/2+
|
2971 |
+
0.20 · 9s1
|
2972 |
+
1/28p3
|
2973 |
+
3/2
|
2974 |
+
2
|
2975 |
+
0.94 · 9s2
|
2976 |
+
1/28p1
|
2977 |
+
3/29p1
|
2978 |
+
1/2
|
2979 |
+
1
|
2980 |
+
169
|
2981 |
+
9s2
|
2982 |
+
1/28p2
|
2983 |
+
3/29p1
|
2984 |
+
1/2
|
2985 |
+
3/2
|
2986 |
+
0.76 · 9s2
|
2987 |
+
1/28p2
|
2988 |
+
3/29p1
|
2989 |
+
1/2+
|
2990 |
+
0.16 · 9s2
|
2991 |
+
1/28p1
|
2992 |
+
3/29p2
|
2993 |
+
1/2+
|
2994 |
+
0.06 · 9s2
|
2995 |
+
1/28p3
|
2996 |
+
3/2
|
2997 |
+
3/2
|
2998 |
+
0.83 · 9s2
|
2999 |
+
1/28p2
|
3000 |
+
3/29p1
|
3001 |
+
1/2+
|
3002 |
+
0.07 · 9s2
|
3003 |
+
1/28p1
|
3004 |
+
3/29p2
|
3005 |
+
1/2
|
3006 |
+
3/2
|
3007 |
+
170
|
3008 |
+
9s2
|
3009 |
+
1/28p2
|
3010 |
+
3/29p2
|
3011 |
+
1/2
|
3012 |
+
2
|
3013 |
+
0.96 · 9s2
|
3014 |
+
1/28p2
|
3015 |
+
3/29p2
|
3016 |
+
1/2
|
3017 |
+
2
|
3018 |
+
0.93 · 9s2
|
3019 |
+
1/28p2
|
3020 |
+
3/29p2
|
3021 |
+
1/2
|
3022 |
+
2
|
3023 |
+
|
HNAzT4oBgHgl3EQfxf6-/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
INE2T4oBgHgl3EQf_Qm3/content/tmp_files/2301.04247v1.pdf.txt
ADDED
@@ -0,0 +1,2039 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
1 |
+
arXiv:2301.04247v1 [math.OA] 10 Jan 2023
|
2 |
+
Projective Hilbert modules and sequential approximations
|
3 |
+
Lawrence G. Brown and Huaxin Lin
|
4 |
+
January 12, 2023
|
5 |
+
Abstract
|
6 |
+
We show that, when A is a separable C∗-algebra, every countably generated Hilbert
|
7 |
+
A-module is projective (with bounded module maps as morphisms).
|
8 |
+
We also study the
|
9 |
+
approximate extensions of bounded module maps. In the case that A is a σ-unital simple
|
10 |
+
C∗-algebra with strict comparison and every strictly positive lower semicontinuous affine
|
11 |
+
function on quasitraces can be realized as the rank of an element in Cuntz semigroup, we show
|
12 |
+
that the Cuntz semigroup is the same as unitarily equivalent class of countably generated
|
13 |
+
Hilbert A-modules if and only if A has stable rank one.
|
14 |
+
1
|
15 |
+
Introduction
|
16 |
+
We study Hilbert module over a C∗-algebra A. A Hilbert A -module H is said to be projective
|
17 |
+
(with bounded module maps as morphisms) if, for any Hilbert A-modules H1 and H2, any
|
18 |
+
bounded module map ϕ : H → H1 and any surjective bounded module map s : H2 → H1, there
|
19 |
+
is always a bounded module map ψ : H → H2 such that ϕ = s ◦ ψ. It is easy to see that, when
|
20 |
+
A is a unital C∗-algebra, a direct sum A(n) of n copies of A is a projective Hilbert A-module.
|
21 |
+
However, it is not known that this holds for non-unital C∗-algebras. One observes that, for a
|
22 |
+
non-unital C∗-algebra A, it itself is not algebraically finitely generated as an A-module. The
|
23 |
+
characterization of projective Hilbert modules over a C∗-algebra A seems to remain elusive for
|
24 |
+
decades. Evidence, on the other hand, suggests that most countably generated Hilbert modules
|
25 |
+
are projective.
|
26 |
+
In this paper, we will confirm that, for any separable C∗-algebra A, every
|
27 |
+
countably generated Hilbert A-module is projective.
|
28 |
+
It is attempting to classify countably generated Hilbert A-modules. It was shown in [11] that,
|
29 |
+
when A has stable rank one, unitary equivalence classes of Hilbert A-modules are determined by
|
30 |
+
the Cuntz semigroup of A. One might prefer a more quantified description of Hilbert A-modules
|
31 |
+
using some version of dimension functions. Indeed, in the case that A is a separable simple
|
32 |
+
C∗-algebra such that its purely non-compact elements in the Cuntz semigroup are determined
|
33 |
+
by strictly positive lower semicontinuous affine functions on its quasitraces, then one wishes to
|
34 |
+
use the same functions to described those Hilbert A-modules which are not algebraically finitely
|
35 |
+
generated. We show that in this case, Cuntz equivalence classes are the same as unitary equiva-
|
36 |
+
lence classes of countably generated Hilbert A-modules if and only if A has tracial approximate
|
37 |
+
oscillation zero, or equivalently, in this case, A has stable rank one. This is a partial converse
|
38 |
+
of the theorem in [11] mentioned above.
|
39 |
+
Injective Hilbert A-modules were studied in [33]. If A is not an AW ∗-algebra, then A itself
|
40 |
+
is not an injective Hilbert A-module (with bounded module maps as morphisms) (see Theorem
|
41 |
+
3.14 of [33]). Even if we only consider bounded module maps with adjoints, there are only very
|
42 |
+
few injective Hilbert modules. It was shown in [33] that a countably generated Hilbert A-module
|
43 |
+
is *-injective if only if it is orthogonal complementary. Let H be a countably generated Hilbert
|
44 |
+
A-module. Suppose that H0 ⊂ H1 are Hilbert A-modules and ϕ : H0 → H is a bounded module
|
45 |
+
1
|
46 |
+
|
47 |
+
map.
|
48 |
+
As we mentioned ϕ may not be extended to a bounded module map from H1 to H.
|
49 |
+
However, we show that one may find a sequence of bounded module maps ϕn : H1 → H with
|
50 |
+
∥ϕn∥ ≤ ∥ϕ∥ such that limn→∞ ∥ϕn(x) − ϕ(x)∥ = 0 for all x ∈ H0 (note that H0 is not assumed
|
51 |
+
to be separable). This result may be stated as every countably generated Hilbert module over
|
52 |
+
a σ-unital C∗-algebra A is “sequentially approximately injective”. With the same spirit, we
|
53 |
+
show that every countably generated Hilbert module over a σ-unital C∗-algebra is “sequentially
|
54 |
+
approximately projective”.
|
55 |
+
The paper is organized as follows: Section 2 collects some easy facts about projective Hilbert
|
56 |
+
modules and algebraically finitely generated Hilbert modules over a C∗-algebra. Section 3 dis-
|
57 |
+
cusses some basic results about countably generated Hilbert A-modules. In Section 4, we show
|
58 |
+
that, under the assumption that A is a σ-unital simple C∗-algebra with strict comparison and
|
59 |
+
the canonical (dimension function) map Γ from Cuntz semigroup to lower semi-continuous affine
|
60 |
+
functions on quasitraces �
|
61 |
+
QT(A) is surjective, countably generated (but not algebraically gener-
|
62 |
+
ated) Hilbert A-modules can be classified by these lower semi-continuous affine functions if and
|
63 |
+
only if A has stable rank one. This is a partial converse of a theorem in [11]. We also show that,
|
64 |
+
assume that A is a σ-unital simple C∗-algebra with finite radius of comparison, then a countably
|
65 |
+
generated Hilbert A-module with infinite quasitrace is unitarily equivalent to l2(A). In section
|
66 |
+
5, we show that every countably generated Hilbert module over a separable C∗-algebra A is
|
67 |
+
always projective. Section 6 shows that every Hilbert A-module is “approximately injective,”
|
68 |
+
and every countably generated Hilbert module over a σ-unital C∗-algebra A is “approximately
|
69 |
+
projective”.
|
70 |
+
Acknowledgement: This work is based on a preprint [35] of 2010. A draft of the current
|
71 |
+
paper was formed in 2014. The second named author was partially supported by a NSF grant
|
72 |
+
(DMS-1954600). Both authors would like to acknowledge the support during their visits to the
|
73 |
+
Research Center of Operator Algebras at East China Normal University which is partially sup-
|
74 |
+
ported by Shanghai Key Laboratory of PMMP, Science and Technology Commission of Shanghai
|
75 |
+
Municipality (#13dz2260400 and #22DZ2229014).
|
76 |
+
2
|
77 |
+
Easy facts about projective Hilbert modules
|
78 |
+
Definition 2.1. Let A be a C∗-algebra. For an integer n ≥ 1, denote by A(n) the (right) Hilbert
|
79 |
+
A-module of orthogonal direct sum of n copies of A. If x = (a1, a2, ..., an), y = (b1, b2, ..., bn),
|
80 |
+
then
|
81 |
+
⟨x, y⟩ =
|
82 |
+
n
|
83 |
+
�
|
84 |
+
i=1
|
85 |
+
a∗
|
86 |
+
nbn.
|
87 |
+
Denote by HA, or l2(A), the standard countably generated Hilbert A-module
|
88 |
+
HA = {{an} :
|
89 |
+
k
|
90 |
+
�
|
91 |
+
n=1
|
92 |
+
a∗
|
93 |
+
nan converges in norm as k → ∞},
|
94 |
+
where the inner product is defined by
|
95 |
+
⟨{an}, {bn}⟩ =
|
96 |
+
∞
|
97 |
+
�
|
98 |
+
n=1
|
99 |
+
a∗
|
100 |
+
nbn.
|
101 |
+
Let H be a Hilbert A-module. denote by H♯ the set of all bounded A-module maps from H
|
102 |
+
to A. For each y ∈ H, define ˆy(x) = ⟨y, x⟩ for all x ∈ H. Then ˆy ∈ H♯. We say H is self-dual, if
|
103 |
+
every f ∈ H♯ has the form ˆy for some y ∈ H.
|
104 |
+
2
|
105 |
+
|
106 |
+
If H1, H2 are Hilbert A-modules, denote by B(H1, H2) the space of all bounded module maps
|
107 |
+
from H1 to H2. If T ∈ B(H1, H2), denote by T ∗ : H2 → H♯
|
108 |
+
1 the bounded module maps defined
|
109 |
+
by
|
110 |
+
T ∗(y)(x) = ⟨y, Tx⟩ for all x ∈ H1 and y ∈ H2.
|
111 |
+
If T ∗ ∈ B(H2, H1), one says that T has an adjoint T ∗. Denote by L(H1, H2) the set of all
|
112 |
+
bounded A-module maps in B(H1, H2) with adjoints. Let H be a Hilbert A-module. In what
|
113 |
+
follows, denote B(H) = B(H, H) and L(H) = L(H, H). B(H) is a Banach algebra and L(H) is
|
114 |
+
a C∗-algebra.
|
115 |
+
For x, y ∈ H, define θx,y ∈ L(H) by θx,y(z) = x⟨y, z⟩ for all z ∈ H. Denote by F(H) the linear
|
116 |
+
span of those module maps with the form θx,y, where x, y ∈ H. Denote by K(H) the closure of
|
117 |
+
F(H). K(H) is a C∗-algebra. It follows from a result of Kasparov ([26]) that L(H) = M(K(H)),
|
118 |
+
the multiplier algebra of K(H), and, by [31], B(H) = LM(K(H)), the left multiplier algebra of
|
119 |
+
K(H).
|
120 |
+
Suppose that H1 and H2 are Hilbert A-submodules of a Hilbert A-module H. Then K(Hi)
|
121 |
+
is a hereditary C∗-subalgebra of K(H), i = 1, 2, (see Lemma 2.13 [33]). Denote by K(H1, H2)
|
122 |
+
the subspace of K(H) consists of module maps of the form STL, where S ∈ K(H2), T ∈ B(H)
|
123 |
+
and L ∈ K(H1), where K(H2) and K(H1) are viewed as hereditary C∗-subalgebras of K(H).
|
124 |
+
Note that K(H1, H2) is the closure of the linear span of those module maps with the form θx,y,
|
125 |
+
where x ∈ H2 and y ∈ H1.
|
126 |
+
It is convenient to have an example that H ̸= H♯. Let A be a C∗-algebra with a sequence
|
127 |
+
{dn} of mutually orthogonal positive elements with ∥dn∥ = 1. Define f({an}) = �∞
|
128 |
+
n=1 dnan for
|
129 |
+
all {an} ∈ HA. Then f is a bounded module map but f ̸∈ H.
|
130 |
+
Two Hilbert A-modules are said to be unitarily equivalent, or isomorphic, if there is an
|
131 |
+
invertible map U ∈ B(H1, H2) such that
|
132 |
+
⟨U(x1), U(x2)⟩ = ⟨x1, x2⟩ for all x1, x2 ∈ H1.
|
133 |
+
(see [41] for further basic information).
|
134 |
+
Definition 2.2. Let A be a C∗-algebra and H a Hilbert A-module and H1 the A∗∗-Hilbert
|
135 |
+
module extension of H constructed in Section 4 of [41], Denote by H∼ the self-dual Hilbert A∗∗-
|
136 |
+
module H♯
|
137 |
+
1 (see Section 4 of [41]). Every bounded module map in B(H, H♯) can be uniquely
|
138 |
+
extended to a bounded module map in B(H∼). (This easily follows from the construction of H∼
|
139 |
+
and 3.6 of [41]. See also 1.3 of [31].) If H is self-dual, then B(H) = L(E) (see 3.5 of [41]). Thus
|
140 |
+
M(K(H)) = LM(K(H)) = QM(K(H)). If in addition, A is a W ∗-algebra, B(H) is also a W ∗
|
141 |
+
-algebra. In particular, B(H∼) is a W ∗-algebra. Since all maps in B(H, H♯) can be uniquely
|
142 |
+
extended to a maps in B(H∼), we conclude that B(H∼) is a W ∗ -algebra containing K(H),
|
143 |
+
M(K(H)), LM(K(H) and QM(K(H)).
|
144 |
+
Definition 2.3. Let H be a Hilbert A-module and F ⊂ H be a subset. We say that H is
|
145 |
+
generated by F (as a Hilbert A-module), if the linear combination of elements of the form
|
146 |
+
{za : z ∈ F, a ∈ A} is dense in H.
|
147 |
+
We say H is algebraically generated by F, if every element x ∈ H is a linear combination of
|
148 |
+
elements of the form {za : z ∈ F, a ∈ ˜A}. Note that we write a ∈ ˜A instead a ∈ A to include the
|
149 |
+
element z. H is algebraically finitely generated if H is algebraically generated by a finite subset
|
150 |
+
F. See Corollary 2.13 for some clarification.
|
151 |
+
Now we turn to the projectivity of Hilbert modules.
|
152 |
+
Definition 2.4. Let A be a C∗-algebra and H be a Hilbert A-module.
|
153 |
+
We say that H is
|
154 |
+
∗-projective, if, for any Hilbert A-modules H1 and H2, any module map ϕ ∈ L(H, H2) and any
|
155 |
+
3
|
156 |
+
|
157 |
+
surjective module map s ∈ L(H1, H2), there exists a module map ψ ∈ L(H, H1) such that
|
158 |
+
s ◦ ψ = ϕ.
|
159 |
+
(e 2.1)
|
160 |
+
Note here we assume that s, ϕ and ψ have adjoint module maps.
|
161 |
+
Theorem 2.5. Let A be a C∗-algebra.
|
162 |
+
(1) Suppose that H and H1 are Hilbert A-modules and s ∈ L(H1, H) is surjective. Then
|
163 |
+
there is ψ1 ∈ L(H, H1) such that
|
164 |
+
s ◦ ψ1 = idH.
|
165 |
+
(e 2.2)
|
166 |
+
Moreover, ψ1(H) is an orthogonal summand of H1 and ψ1(H) is unitarily equivalent to H.
|
167 |
+
(2) Every Hilbert A-module is ∗-projective.
|
168 |
+
Proof. For (1), let s be as described. We note that s has a closed range. Define T : H1 ⊕ H →
|
169 |
+
H1⊕H by T(h1 ⊕h) = 0⊕s(h1) for h1 ∈ H1 and h ∈ H. Then T ∈ L(H1⊕H) = M(K(H1⊕H))
|
170 |
+
(see Theorem 1.5 of [31]). It follows from Lemma 2.4 of [33] that
|
171 |
+
H1 ⊕ H = kerT ⊕ |T|(H1 ⊕ H).
|
172 |
+
(e 2.3)
|
173 |
+
Let T = V |T| be the polar decomposition in (K(H1 ⊕ H))∗∗. Note that the proof of Lemma
|
174 |
+
2.4 of [33] shows that 0 is an isolated point of |T| or |T| is invertible. So the same holds for
|
175 |
+
(T ∗T), and hence the same holds for (TT ∗). Let S = (TT ∗)−1, where the inverse is taken in the
|
176 |
+
hereditary C∗-subalgebra L(H) ⊂ L(H1 ⊕ H). Since s is surjective,
|
177 |
+
|TT ∗|(H) = H.
|
178 |
+
(e 2.4)
|
179 |
+
Note that T ∗ = |T|V ∗, V |T|V ∗ = |TT ∗|1/2 and V ∗|TT ∗|1/2 = T ∗. Hence
|
180 |
+
L1 := V ∗(TT ∗)−1/2 = V ∗(TT ∗)1/2S = T ∗S ∈ L(H1 ⊕ H).
|
181 |
+
(e 2.5)
|
182 |
+
This also implies that L1(H) = V ∗((TT ∗)−1/2(H)) = V ∗(H) is closed. Moreover, V ∗ gives a
|
183 |
+
unitary equivalence of H and L1(H). One then checks that
|
184 |
+
TL1 = V |T|V ∗(TT ∗)−1/2 = P,
|
185 |
+
(e 2.6)
|
186 |
+
where P is the range projection of (TT ∗)1/2 which gives the identity map on H. Since both T
|
187 |
+
and L1 are in L(H1 ⊕ H), so is P. One then defines ψ1 = L1P|H : H → H1. Thus s ◦ ψ1 = idH.
|
188 |
+
Next we note that H ⊂ kerT and |T|(H1⊕H) = |T|(H1) ⊂ H1. It follows that kerT = H0⊕H.
|
189 |
+
By (e 2.3) again, H1 ⊕ H = H0 ⊕ H ⊕ |T|(H1). It follows that |T|(H) is an orthogonal summand
|
190 |
+
of H1.
|
191 |
+
On the other hand, since ψ1(H) = L1(H) = V ∗(H), ψ1(H) is closed. But we also have
|
192 |
+
ψ1(H) = T ∗S(H) = T ∗T(H1) = |T|(H1). As we have shown that L1(H) is unitarily equivalent
|
193 |
+
to H, this proves the “Moreover” part of (1).
|
194 |
+
To show that every Hilbert A-module H is ∗-projective, let H1 and H2 be Hilbert A-modules,
|
195 |
+
ϕ : H → H1 and s : H2 → H1 be bounded module maps with adjoints, where s is surjective.
|
196 |
+
We now apply the statement of (1).
|
197 |
+
Note that (1) holds for any Hilbert A-module, in particular, it holds for H1 (in place of H).
|
198 |
+
Since s is surjective, we obtain ψ1 ∈ L(H1, H2) such that
|
199 |
+
s ◦ ψ1 = idH1.
|
200 |
+
(e 2.7)
|
201 |
+
Define ψ = ψ1 ◦ ϕ : H → H2. Then s ◦ ψ = s ◦ ψ1 ◦ ϕ = ϕ.
|
202 |
+
4
|
203 |
+
|
204 |
+
Remark 2.6. (i) It is probably worth noting that, in part (1) of Theorem 2.5, ∥ψ∥ = ∥|ss∗|−1/2∥
|
205 |
+
(the inverse is taken in L(H)), and, for the second part, ∥ψ∥ = ∥|ss∗|−1/2 ◦ ϕ∥. This, probably,
|
206 |
+
may not be improved.
|
207 |
+
The next three propositions are easy facts, but perhaps, not entirely trivial. We include
|
208 |
+
here for the clarity of our further discussion. After an earlier version ([35]) of this note was first
|
209 |
+
posted (in 2010), Leonel Robert informed us that, using Proposition 2.5 above, he has a proof
|
210 |
+
that the converse of the following also holds, i.e., if H is algebraically finitely generated, then
|
211 |
+
K(H) has an identity (see Proposition 2.11).
|
212 |
+
Proposition 2.7. Let A be a C∗-algebra and H be a Hilbert A-module. Suppose that 1H ∈
|
213 |
+
K(H). Then H is algebraically finitely generated.
|
214 |
+
Proof. Let F(H) be the linear span of rank one module maps of the form θξ,ζ for ξ, ζ ∈ H. Since
|
215 |
+
F(H) is dense in K(H), there is T ∈ F(H) such that
|
216 |
+
∥1H − T∥ < 1/4.
|
217 |
+
(e 2.8)
|
218 |
+
It follows that T is invertible. There are ξ1, ξ2, ..., ξn, ζ1, ζ2, ..., ζn ∈ H such that
|
219 |
+
T(ξ) =
|
220 |
+
n
|
221 |
+
�
|
222 |
+
j=1
|
223 |
+
ξj < ζj, ξ > for all ξ ∈ H.
|
224 |
+
(e 2.9)
|
225 |
+
But TH = H. This implies that �n
|
226 |
+
j=1 ξjA = H.
|
227 |
+
Definition 2.8. Let A be a C∗-algebra and H be a Hilbert A-module. We say H is projective
|
228 |
+
(with bounded module maps as morphisms), if for any Hilbert modules H1 and H2 and any
|
229 |
+
bounded surjective module map s : H2 → H1 and any bounded module map ϕ : H → H1,
|
230 |
+
there is a bounded module map ψ : H → H2 such that s ◦ ψ = ϕ. So we have the following
|
231 |
+
commutative diagram:
|
232 |
+
H
|
233 |
+
H1
|
234 |
+
H2
|
235 |
+
ϕ
|
236 |
+
ψ
|
237 |
+
s
|
238 |
+
(e 2.10)
|
239 |
+
Proposition 2.9. Let A be a C∗-algebra and H be a Hilbert A-module for which K(H) has an
|
240 |
+
identity. Then H is a projective Hilbert A-module.
|
241 |
+
Proof. Denote by ˜A the minimum unitization of A. Note that H is a Hilbert ˜A-module. We
|
242 |
+
may write ˜A(N) = e1 ˜A ⊕ e2 ˜A ⊕ · · · ⊕ eN ˜A, where ⟨ei, ei⟩ = 1 ˜
|
243 |
+
A. Let us first show that ˜A(N) is a
|
244 |
+
projective Hilbert ˜A-module.
|
245 |
+
Suppose that H1 and H2 are Hilbert ˜A-modules, s : H2 → H1 is a surjective bounded
|
246 |
+
module map and ϕ : ˜A(N) → H1 is a bounded module map. Let xi = ϕ(ei), 1 ≤ i ≤ N. Since s
|
247 |
+
is surjective, one chooses yi ∈ H2 such that
|
248 |
+
s(yi) = xi, 1 ≤ i ≤ N.
|
249 |
+
(e 2.11)
|
250 |
+
Define a module map ψ : ˜A(N) → H1
|
251 |
+
ψ(h) =
|
252 |
+
N
|
253 |
+
�
|
254 |
+
i=1
|
255 |
+
yi⟨ei, h⟩ for all h = ⊕N
|
256 |
+
i=1ai,
|
257 |
+
5
|
258 |
+
|
259 |
+
where ai ∈ A, 1 ≤ i ≤ N. Then ϕ ∈ K(H, H2). Moreover
|
260 |
+
s ◦ ψ(ei) = xi⟨ei, ei⟩ = xi = ϕ(ei), 1 ≤ i ≤ N.
|
261 |
+
(e 2.12)
|
262 |
+
It follows that s ◦ ψ = ϕ.
|
263 |
+
Now we consider the general case. From 2.7, H is algebraically finitely generated. Therefore,
|
264 |
+
a theorem of Kasparov ([26]) shows that H = PH ˜
|
265 |
+
A for some projection P ∈ L(H ˜
|
266 |
+
A). The fact
|
267 |
+
that 1H ∈ K(H) implies that P ∈ K(H ˜
|
268 |
+
A). Therefore there is an integer N ≥ 1 and a projection
|
269 |
+
P1 ∈ MN( ˜A) such that PH is unitarily equivalent to P1H ˜
|
270 |
+
A. In other words, one may assume
|
271 |
+
that H is a direct summand of ˜A(N).
|
272 |
+
Write ˜A(N) = H ⊕ H′ for some Hilbert ˜A-module H′. Let H0 and H1 be Hilbert A-modules,
|
273 |
+
s : H0 → H1 be a surjective bounded module map and ϕ : H → H1 be another bounded module
|
274 |
+
map. We view them as ˜A-modules and ˜A-module maps. Let ι : H → H ⊕ H′ be the embedding
|
275 |
+
and j : H ⊕ H′ → H be the projection. Then j ◦ ι = idH. We then have the following diagram:
|
276 |
+
H
|
277 |
+
←j
|
278 |
+
H ⊕ H′
|
279 |
+
←ι H
|
280 |
+
↓ϕ
|
281 |
+
H1
|
282 |
+
ևs
|
283 |
+
H0
|
284 |
+
Recall that these are Hilbert ˜A-modules and bounded ˜A-module maps. Since we have shown
|
285 |
+
H ⊕ H′ = ˜A(N) is projective, we obtain a bounded module map ψ1 : H ⊕ H′ → H1 such that
|
286 |
+
the following commutes:
|
287 |
+
H
|
288 |
+
←j
|
289 |
+
H ⊕ H′
|
290 |
+
←ι H
|
291 |
+
↓ϕ
|
292 |
+
↓ψ1
|
293 |
+
H1
|
294 |
+
ևs
|
295 |
+
H0
|
296 |
+
So s ◦ ψ1 = ϕ ◦ j. Define ψ = ψ1 ◦ ι. So s ◦ ψ = s ◦ ψ1 ◦ ι = ϕ ◦ j ◦ ι = ϕ.
|
297 |
+
Remark 2.10. (1) One may notice that we do not provide an estimate of ∥ψ∥ in Proposition
|
298 |
+
2.9. Note that s induces a one-to one and surjective Banach module map ˜s : H2/kers → H1.
|
299 |
+
Therefore its inverse ˜s−1 is bounded. In the proof, for any ǫ > 0, one may choose yi ∈ H2 such
|
300 |
+
that ∥yi∥ ≤ ∥˜s−1 ◦ ϕ∥ + ǫ/
|
301 |
+
√
|
302 |
+
N. Then one may be able to estimate that ∥ψ∥ ≤
|
303 |
+
√
|
304 |
+
N∥˜s−1 ◦ ϕ∥ + ǫ.
|
305 |
+
It is not clear one can do better than that in these lines of proof.
|
306 |
+
(2) The fact that ⟨ei, ei⟩ = 1 ˜
|
307 |
+
A is crucial in the proof. It should be noted that, when A is
|
308 |
+
not unital, the argument in the proof of Proposition 2.9 does not imply that A(n) is projective
|
309 |
+
(with bounded module maps as morphisms). However, we do not assume that A is unital in
|
310 |
+
Proposition 2.9 (but K(H) is unital). On the other hand, one should be warned that, if A is not
|
311 |
+
unital and H = A(n), then K(H) = Mn(A) which is never unital. There are projective Hilbert
|
312 |
+
modules for which K(H) is not unital. In fact, in Theorem 5.3 below, we show that A(n) is
|
313 |
+
always projective when A is separable.
|
314 |
+
(3) Let H1 = xA and H2 = yA. Define a module map ψ : xA → yA by ϕ(xa) = ya for all
|
315 |
+
a ∈ A. In general such a module map may not be bounded. Consider A = C([0, 1]) and x(t) = t
|
316 |
+
and y = 1A. Let ψ : xA → yA be defined by ψ(xf) = f for all f ∈ C([0, 1]). This module map
|
317 |
+
is not bounded. We do not know that A(n) is projective in general when A is not unital and not
|
318 |
+
separable (see Lemma 6.7).
|
319 |
+
(4) One may also mention that if H1, H2, ..., Hn are projective Hilbert A-modules then
|
320 |
+
�n
|
321 |
+
i=1 Hi is also projective.
|
322 |
+
Proposition 2.11 (L. Robert). Let A be a C∗-algebra and H be an algebraically finitely gen-
|
323 |
+
erated Hilbert A-module. Then K(H) is unital and H is self-dual.
|
324 |
+
6
|
325 |
+
|
326 |
+
Proof. Write H = �n
|
327 |
+
i=1 ξi ˜A (where ξi ∈ H). Put H1 = ˜A(n). We view both H and H1 as Hilbert
|
328 |
+
˜A-modules. Write H1 = �n
|
329 |
+
i=1 ei ˜A, where ei = 1 ˜
|
330 |
+
A, 1 ≤ i ≤ n. Define a module map s : H1 → H
|
331 |
+
by s(ei) = ξi, 1 ≤ i ≤ n. Then
|
332 |
+
s(h) =
|
333 |
+
n
|
334 |
+
�
|
335 |
+
i=1
|
336 |
+
ξi⟨ei, h⟩ for all h ∈ H1.
|
337 |
+
(e 2.13)
|
338 |
+
In other words s = �n
|
339 |
+
i=1 θξi,ei ∈ K(H1, H). In particular, s ∈ L(H1, H). Since H is algebraically
|
340 |
+
generated by {ξ1, ξ2, .., ξn}, s is surjective. We then proceed the same proof of Theorem 2.5
|
341 |
+
to obtain the bounded module map L1 = T ∗S. Note, in this case, T ∈ K(H1 ⊕ H) and hence
|
342 |
+
L1 ∈ K(H1 ⊕ H). It follows that s ◦ ψ1 ∈ K(H) (with notation in the proof of 2.5). Since
|
343 |
+
s ◦ ψ1 = idH, we conclude that K(H) is unital.
|
344 |
+
By Theorem 2.5, ψ1(H) is an orthogonal summand of H1 = ˜A(n). Let U : H → ψ1(H) be a
|
345 |
+
bounded module map which implements the unitary equivalence. Note that U ∈ L(H, ψ1(H)).
|
346 |
+
Let Q : H1 → ψ1(H) be the projection of H1 onto the orthogonal summand ψ1(H).
|
347 |
+
Suppose that f ∈ H♯, i.e., f : H → A is a bounded module map. Define ˜f : H1 → A
|
348 |
+
by ˜f(h) = f ◦ U −1 ◦ Q(h)) for all h ∈ H1. Note that f(x) = ˜f(U(x)) for all x ∈ H. Since
|
349 |
+
H1 = ˜A(n) is self-dual, there is g ∈ H1 such that ˜f(h) = ⟨g, h⟩ for all h ∈ H1. If x ∈ H, then
|
350 |
+
f(x) = ˜f(U(x)) = ⟨g, Q(U(x))⟩. Hence f(x) = ⟨(QU)∗(g), x⟩ for all x ∈ H. Since (QU)∗(g) ∈ H,
|
351 |
+
this shows that H = H♯ and H is self-dual.
|
352 |
+
Lemma 2.12 (cf. Proposition 1.4.5 of [42]). Let A be a C∗-algebra and H a Hilbert A-module
|
353 |
+
and x ∈ H. Then, for any 0 < α < 1/2, there exists y ∈ xA ⊂ H with ⟨y, y⟩1/2 = ⟨x, x⟩1/2−α
|
354 |
+
such that x = y · ⟨x, x⟩α.
|
355 |
+
Proof. We first consider Hilbert ˜A module x ˜A. Put a = ⟨x, x⟩, an = (1/n + a)−α and xn =
|
356 |
+
x · (1/n + a)−α, n ∈ N. We will show that {xn} is a Cauchy sequence.
|
357 |
+
Put βn,m = (1/n + a)−α − (1/m + a)−α, n, m ∈ N. Then
|
358 |
+
∥xβn,m∥ = ∥(βn,m⟨x, x⟩βn,m)1/2∥ = ∥a1/2βn,m∥.
|
359 |
+
Since a1/2(1/n+a)−α converges to a1/2−α in norm. we conclude that ∥xβn,m∥ → 0 as n, m → ∞.
|
360 |
+
It follows that xn → yα for some yα ∈ H. Hence xn⟨x, x⟩α → yα⟨x, x⟩α. Moreover, ⟨yα, yα⟩1/2 =
|
361 |
+
limn→∞ a1/2an = a1/2−α (converge in norm).
|
362 |
+
Similarly, limn→∞ ∥x − xanaα∥ = limn→∞ ∥a1/2(1 − anaα)∥ = 0. Since xnaα = xanaα,
|
363 |
+
we obtain that limn→∞ xnaα = x. It follows that x = yα⟨x, x⟩α. Choose α < α′ < 1/2. Then
|
364 |
+
(1/n+a)−α′aα′−α ∈ A. Since limn→∞ x(1/n+a)−α′aα′−α = limn→∞ x(1/n+a)−α′(1/n+a)α′−α =
|
365 |
+
limn→∞ x(1/n + a)−α = yα, yα ∈ xA.
|
366 |
+
Let us end this section with the following clarification on Definition 2.3.
|
367 |
+
Corollary 2.13. Let H be a Hilbert A-module and F ⊂ H be a subset.
|
368 |
+
(1) Then F ⊂ {z · a : z ∈ F, a ∈ A}.
|
369 |
+
(2) If H is algebraically finitely generated, then there are x1, x2, ..., xn ∈ H such that H =
|
370 |
+
{�n
|
371 |
+
i=1 xiai : ai ∈ A} (see Definition 2.3).
|
372 |
+
Proof. For (1), let z ∈ F. By Lemma 2.12, we may write z = y⟨z, z⟩α for some 0 < α < 1/2 and
|
373 |
+
y ∈ H. Let {eλ} ⊂ A be an approximate identity. Then zeλ = y⟨z, z⟩αeλ → y⟨z, z⟩ = z. Hence
|
374 |
+
z ∈ {z · a : z ∈ F, a ∈ A} (So in Definition 2.3, F is in the closure of {za : z ∈ F and a ∈ A}.)
|
375 |
+
For (2), suppose that H = �n
|
376 |
+
i=1 xi ˜A. By Lemma 2.12, we may write xi = yi⟨xi, xi⟩α for
|
377 |
+
some 0 < α < 1/2 and yi ∈ H, 1 ≤ i ≤ n. Let H0 = �n
|
378 |
+
i=1 yiA ⊂ H. Since xi = yi⟨xi, xi⟩α ∈ H0,
|
379 |
+
H ⊂ H0. It follows that H = �n
|
380 |
+
i=1 yiA.
|
381 |
+
7
|
382 |
+
|
383 |
+
3
|
384 |
+
Countably generated Hilbert modules
|
385 |
+
Let A be a C∗-algebra and H1 and H2 be a pair of Hilbert A-modules. In this section we discuss
|
386 |
+
the question when H1 is unitarily equivalent to a Hilbert A-submodule of H2. The main result
|
387 |
+
of this section is Theorem 3.6 which provide some answer to the question. For the connection
|
388 |
+
to Cuntz semigroup, see Corollary 3.9.
|
389 |
+
Lemma 3.1. Let A be a C∗-algebra and H a Hilbert A-module. Let {Eλ} be an approximate
|
390 |
+
identity for K(H). Then, for any ǫ > 0 and any finite subset F ⊂ H, there is λ0 such that, for
|
391 |
+
all λ ≥ λ0,
|
392 |
+
∥Eλ(x) − x∥ < ǫ.
|
393 |
+
(e 3.14)
|
394 |
+
Proof. Let F = {ξ1, ξ2, ..., ξk} and ǫ > 0. Without loss of generality, we may assume that
|
395 |
+
0 ̸= ∥ξi∥ ≤ 1, 1 ≤ i ≤ k. There is 1/3 < α < 1/2 such that
|
396 |
+
∥⟨ξi, ξi⟩1−α − ⟨ξi, ξi⟩α∥ = ∥⟨ξi, ξi⟩α(⟨ξi, ξi⟩1−2α − 1)∥ < ǫ/3, 1 ≤ i ≤ k.
|
397 |
+
(e 3.15)
|
398 |
+
By Lemma 2.12, write ξi = ζi⟨ξi, ξi⟩α with ⟨ζi, ζi⟩ = ⟨ξi, ξi⟩1−2α, 1 ≤ i ≤ k. Put Si = θζi,ζi,
|
399 |
+
1 ≤ i ≤ k. Then, for 1 ≤ i ≤ k,
|
400 |
+
∥Si(ξi) − ξi∥ = ∥ζi⟨ζi, ξi⟩ − ξi∥ = ∥ζi⟨ξi, ξi⟩1−α − ζi⟨ξi, ξi⟩α∥ < ǫ/3.
|
401 |
+
There exists λ0 such that, for all λ ≥ λ0,
|
402 |
+
∥EλSi − Si∥ < ǫ/3, 1 ≤ i ≤ k.
|
403 |
+
(e 3.16)
|
404 |
+
It follows that, for all λ ≥ λ0,
|
405 |
+
∥Eλ(ξi) − ξi∥
|
406 |
+
≤
|
407 |
+
∥Eλ(ξi) − EλSi(ξi)∥ + ∥EλSi(ξi) − Si(ξi)∥ + ∥Si(ξi) − ξi∥
|
408 |
+
<
|
409 |
+
∥Eλ∥∥ξi − Si(ξi)∥ + ǫ/3 + ǫ/3 < ǫ,
|
410 |
+
1 ≤ i ≤ k.
|
411 |
+
At least part of the following is known, in fact, (1) ⇔ (2) is known as Corollary 1.5 of [39].
|
412 |
+
We also think that the rest of them are known. Note that even H is countably generated it may
|
413 |
+
not be separable when A is not separable.
|
414 |
+
Proposition 3.2 (cf. Corollary 1.5 of [39]). Let A be a C∗-algebra and H be a Hilbert A-module.
|
415 |
+
Then the following are equivalent.
|
416 |
+
(1) H is countably generated,
|
417 |
+
(2) K(H) is σ-unital and
|
418 |
+
(3) There exists an increasing sequence of module maps En ∈ K(H)+ with ∥En∥ ≤ 1 such
|
419 |
+
that
|
420 |
+
lim
|
421 |
+
n→∞ ∥Enx − x∥ = 0 for all x ∈ H.
|
422 |
+
(e 3.17)
|
423 |
+
Proof. As mentioned above, by Corollary 1.5 of [39], (1) ⇔ (2).
|
424 |
+
(1) ⇒ (3): Let {xn} be a sequence of elements in the unit ball of H such that H is generated
|
425 |
+
by {xn} as Hilbert A-module. Let Fn be the set of those elements with the form xia, 1 ≤ i ≤ n
|
426 |
+
and a ∈ A with ∥a∥ ≤ n. Note that ∪∞
|
427 |
+
n=1span(Fn) is dense in H. Warning: Fn is not a finite
|
428 |
+
subset.
|
429 |
+
8
|
430 |
+
|
431 |
+
For each n ∈ N, there exists 0 < 1/3 < αn < 1/2 such that, for any 0 ≤ b ≤ 1 in A,
|
432 |
+
∥b1/2−αn(1 − b1−2αn)bαn∥ ≤ 1/n2.
|
433 |
+
(e 3.18)
|
434 |
+
By Lemma 2.12, choose ξi,n ∈ xiA such that xi = ξi,n⟨xi, xi⟩αn with ⟨ξi,n, ξi,n⟩ = ⟨xi, xi⟩1−2αn.
|
435 |
+
Put bi = ⟨xi, xi⟩, n ∈ N. Then
|
436 |
+
θξi,n,ξi,n(xia) = ξi,n⟨ξi,n, ξi,nbαn
|
437 |
+
i ⟩a = ξi,n⟨ξi,n, ξi,n⟩bαn
|
438 |
+
i a = ξi,nb1−αn
|
439 |
+
i
|
440 |
+
a.
|
441 |
+
Then, for any ∥a∥ ≤ n and i, n ∈ N, by (e 3.18),
|
442 |
+
∥θξi,n,ξi,n(xia) − xia∥2
|
443 |
+
=
|
444 |
+
∥ξi,n(b1−αn
|
445 |
+
i
|
446 |
+
− bαn
|
447 |
+
i )a∥2 = ∥ξi,n(b1−2αn
|
448 |
+
i
|
449 |
+
− 1)bαn
|
450 |
+
i a∥2
|
451 |
+
(e 3.19)
|
452 |
+
=
|
453 |
+
∥a∗bαn
|
454 |
+
i (b1−2αn
|
455 |
+
i
|
456 |
+
− 1)⟨ξi,n, ξi,n⟩(b1−2αn
|
457 |
+
i
|
458 |
+
− 1)bαn
|
459 |
+
i a∥
|
460 |
+
(e 3.20)
|
461 |
+
=
|
462 |
+
∥b1/2−αn
|
463 |
+
i
|
464 |
+
(1 − b1−2αn
|
465 |
+
i
|
466 |
+
)bαn
|
467 |
+
i a∥2 ≤ (1/n)4∥a∥2 < 1/n2. (e 3.21)
|
468 |
+
By using an approximate identity of K(H), we obtain an increasing sequence of {En} ∈ A+
|
469 |
+
with ∥En∥ ≤ 1 such that
|
470 |
+
∥Enθξi,nξi,n − θξi,n,ξi,n∥ < 1/n2, 1 ≤ i ≤ n.
|
471 |
+
(e 3.22)
|
472 |
+
It follows that, for any m ≥ n and a ∈ A with ∥a∥ ≤ n, by (e 3.21) and (e 3.22),
|
473 |
+
∥Em(xia) − xia∥
|
474 |
+
≤
|
475 |
+
∥Em(xia − θξi,m,ξi,m(xia))∥ + ∥Em ◦ θξi,m,ξi,m(xia) − θξi,m,ξi,m(xia)∥
|
476 |
+
+∥θξi,mξi,m(xia) − xia∥
|
477 |
+
<
|
478 |
+
1/m + ∥xa∥/m2 + 1/m2 < 2/m + 1/m2.
|
479 |
+
(e 3.23)
|
480 |
+
Since ∪∞
|
481 |
+
i=1span(Fi) is dense in H, this proves (3).
|
482 |
+
(3) ⇒ (2): Let {En} be an increasing sequence in K(H)+ with ∥En∥ ≤ 1 such that
|
483 |
+
lim
|
484 |
+
n→∞ ∥En(x) − x∥ = 0 for all x ∈ H.
|
485 |
+
(e 3.24)
|
486 |
+
Fix x1, x2, ..., xN, y1, y2, ..., yN ∈ H. Let S = �N
|
487 |
+
j=1 θxj,yj and
|
488 |
+
M = N · max ∥{∥yj∥; 1 ≤ j ≤ N}.
|
489 |
+
For any ǫ > 0, there exists n0 ∈ N such that
|
490 |
+
∥Em(xj) − xj∥ <
|
491 |
+
ǫ
|
492 |
+
(M + 1), 1 ≤ j ≤ N.
|
493 |
+
(e 3.25)
|
494 |
+
whenever m ≥ n0. Then, for any m ≥ n0 and, for any z ∈ H,
|
495 |
+
∥EmS(z) − S(z)∥ = ∥
|
496 |
+
N
|
497 |
+
�
|
498 |
+
j=1
|
499 |
+
(Emxj − xj)⟨yj, z⟩∥ ≤ (
|
500 |
+
ǫ
|
501 |
+
(M + 1))
|
502 |
+
m
|
503 |
+
�
|
504 |
+
j=1
|
505 |
+
∥yj∥∥z∥ < ∥z∥ǫ.
|
506 |
+
(e 3.26)
|
507 |
+
It follows that limn→∞ ∥EmS − S∥ = 0. Since F(H) is dense in K(H), this implies that K(H)
|
508 |
+
is σ-unital.
|
509 |
+
Definition 3.3. Let H be a Hilbert A-module and G ⊂ H be a subset. We say G is A-weakly
|
510 |
+
dense in H, if, for any finite subset F ⊂ H, ǫ > 0, and any x ∈ H, there is g ∈ G such that
|
511 |
+
∥⟨(x − g), z⟩∥ < ǫ for all z ∈ F.
|
512 |
+
(e 3.27)
|
513 |
+
(see Remark 6.2).
|
514 |
+
9
|
515 |
+
|
516 |
+
One may compare the next proposition with Lemma 1.3 of [39].
|
517 |
+
Proposition 3.4. Let A be a σ-unital C∗-algebra and H be a Hilbert A-module.
|
518 |
+
(1) Let s ∈ K(H)+. Then s is a strictly positive element of K(H) if s(H) is A-weakly dense
|
519 |
+
in H, and, if s is a strictly positive element of K(H), then s(H) is dense in H.
|
520 |
+
(2) Let H1 and H2 be Hilbert A-modules and T ∈ K(H1, H2) such that T(H1) is A-weakly
|
521 |
+
dense in H2, then TT ∗ ∈ K(H2) is a strictly positive element of K(H2).
|
522 |
+
Proof. For (1), we note that, by Lemma 1.3 of [39], s is a strictly positive element if and only
|
523 |
+
s(H) is dense in H.
|
524 |
+
We now suppose that s(H) is A-weakly dense in H. Without loss of generality, we may
|
525 |
+
assume that ∥s∥ ≤ 1. Let p be the open projection associated with s, i.e., s1/n ր p. Put
|
526 |
+
ηn = ∥s1/ns − s∥, n ∈ N. Then limn→∞ ηn = 0.
|
527 |
+
Fix ǫ > 0. Let x, y ∈ H such that ∥x∥, ∥y∥ ≤ 1. Choose ξ1, ξ2 ∈ H such that ∥ξ1∥, ∥ξ2∥ ≤ 1.
|
528 |
+
Then, there is ξ ∈ H such that
|
529 |
+
∥⟨s(ξ) − ξ1, y⟩∥ < ǫ/2.
|
530 |
+
(e 3.28)
|
531 |
+
Then
|
532 |
+
∥⟨θξ1,ξ2(x) − θs(ξ),ξ2(x), y⟩∥ = ∥⟨ξ1⟨ξ2, x⟩, y⟩ − ⟨s(ξ)⟨ξ2, x⟩, y⟩∥
|
533 |
+
(e 3.29)
|
534 |
+
= ∥⟨ξ2, x⟩∗⟨ξ1 − s(ξ), y⟩∥ < ǫ/2.
|
535 |
+
(e 3.30)
|
536 |
+
We estimate that
|
537 |
+
∥⟨s1/nθξ1,ξ2(x) − θξ1,ξ2(x), y⟩∥
|
538 |
+
=
|
539 |
+
∥⟨s1/n(θξ1,ξ2 − θs(ξ),ξ2)(x), y⟩∥
|
540 |
+
+∥⟨(θs1/ns(ξ),ξ2(x) − θs(ξ1),ξ2(x)), y⟩∥ + ∥⟨(θs(ξ),ξ2(x) − θξ1,ξ2(x)), y⟩∥
|
541 |
+
<
|
542 |
+
∥s1/n∥∥(θξ1,ξ2 − θs(ξ),ξ2)(x), y⟩∥ + ηn + ǫ/2
|
543 |
+
<
|
544 |
+
ǫ + ηn.
|
545 |
+
(e 3.31)
|
546 |
+
Fix n ∈ N, let ǫ → 0. We obtain that
|
547 |
+
∥⟨s1/nθξ1,ξ2(x) − θξ1,ξ2(x), y⟩∥ ≤ ηn.
|
548 |
+
This holds for all y ∈ H with ∥y∥ ≤ 1. It follows that
|
549 |
+
∥s1/nθξ1,ξ2(x) − θξ1,ξ2(x)∥ < ηn, n ∈ N.
|
550 |
+
(e 3.32)
|
551 |
+
Since (e 3.32) holds for every x ∈ H with ∥x∥ ≤ 1, we obtain that
|
552 |
+
∥s1/nθξ1,ξ2 − θξ1,ξ2∥ < ηn, n ∈ N.
|
553 |
+
(e 3.33)
|
554 |
+
Since linear combinations of module maps of the form θξ1,ξ2 is dense in K(H), we obtain, for
|
555 |
+
any k ∈ K(H),
|
556 |
+
lim
|
557 |
+
n→∞ ∥s1/nk − k∥ = 0 = lim
|
558 |
+
n→∞ ∥k1/2(1 − s1/n)k1/2∥.
|
559 |
+
(e 3.34)
|
560 |
+
It follows that ∥k1/2(1 − p)k1/2∥ = 0, or pk = k for all k ∈ K(H). Thus p is the open projection
|
561 |
+
associated with the hereditary C∗-subalgebra K(H) (see Lemma 2.13 of [33]). It then follows
|
562 |
+
that s is a strictly positive element of K(H).
|
563 |
+
For (2), let H = H1 ⊕ H2. Define ˜T ∈ K(H) by ˜T(h1 ⊕ h2) = 0 ⊕ T(h1) for h1 ∈ H1 and
|
564 |
+
h2 ∈ H2. Let ˜T = V ( ˜T ∗ ˜T)1/2 be the polar decomposition of ˜T in K(H)∗∗. Then we may write
|
565 |
+
T = ˜T|H1 = V (T ∗T)1/2. Since T ∈ K(H1, H2), T ∗ ∈ K(H2, H1).
|
566 |
+
10
|
567 |
+
|
568 |
+
Recall that T ∗ = |T|V ∗, V |T|V ∗ = |TT ∗|1/2 and V ∗|TT ∗|1/2 = T ∗. Hence T = (TT ∗)1/2V.
|
569 |
+
We then write T = (TT ∗)1/4(TT ∗)1/4V. Note that (TT ∗)1/4V ∈ K(H) and (TT ∗)1/4V (H) ⊂ H2.
|
570 |
+
It follows that (TT ∗)1/4(H2) is A -weakly dense in H2, as T(H) = (TT ∗)1/4((TT ∗)1/4V (H)) is
|
571 |
+
A-weakly dense in H2. By (1), this implies that (TT ∗)1/4 is a strictly positive element of K(H2).
|
572 |
+
Hence TT ∗ is a strictly positive element of K(H2).
|
573 |
+
3.5. Let A be a C∗-algebra, H1, H2 be Hilbert A-modules and T ∈ B(H1, H2). Note T ∗ ∈
|
574 |
+
B(H2, H♯
|
575 |
+
1) and, for any y ∈ H1, T ∗(y)(x) = ⟨y, Tx⟩ for all x ∈ H1. We may view H1 ⊂ H♯
|
576 |
+
1. We
|
577 |
+
say T ∗(H2) is dense in H1, if T ∗(H2) ⊃ H1 (even though T ∗(H2) may not be in H1). Recall that
|
578 |
+
TK∗
|
579 |
+
0 ∈ K(H1, H2), for any K0 ∈ K(H1) which has an adjoint (TK∗
|
580 |
+
0)∗ = K0T ∗ ∈ K(H2, H1). If
|
581 |
+
we write T ∈ LM(K(H1, H2)), then, in general, T ∗ ∈ RM(K(H2, H1)). In particular, K0T ∗ ∈
|
582 |
+
K(H2, H1) for all K0 ∈ K(H1). These will be used in the next theorem.
|
583 |
+
The equivalence of (a) and (d) in part (2) of next theorem is known (see Theorem 4.1 of
|
584 |
+
[19]).
|
585 |
+
Theorem 3.6. Let A be a C∗-algebra and H1 and H2 be Hilbert A-modules. Suppose that H2
|
586 |
+
is countably generated.
|
587 |
+
(1) Then H2 is unitarily equivalent to a Hilbert A-submodule of H1 if and only if there is
|
588 |
+
bounded module map T : H1 → H2 such that T(H1) is A-weakly dense in H2.
|
589 |
+
(2) Suppose that H1 is also countably generated. Then the following are equivalent:
|
590 |
+
(a) H1 and H2 are unitarily equivalent as Hilbert A-module;
|
591 |
+
(b) there exists a bounded module map T ∈ B(H1, H2) such that T(H1) is A-weakly dense in
|
592 |
+
H2 and (K0T ∗)(H2) is A-weakly dense in H1 for any strictly positive element K0 ∈ K(H1);
|
593 |
+
(c) there exists a bounded module map T ∈ B(H1, H2) such that T(H1) is dense in H2 and
|
594 |
+
T ∗(H2) is dense in H1 (see 3.5);
|
595 |
+
(d) There is an invertible bounded module map T ∈ B(H1, H2).
|
596 |
+
Proof. For (1), the “only if” part is clear. Let us assumes that there is T ∈ B(H1, H2) whose
|
597 |
+
range is A-weakly dense in H2.
|
598 |
+
Suppose that H2 is generated by {x1, x2, ..., xn, ...}. For each n ∈ N, there exists a sequence
|
599 |
+
{yn,k} in H2 such that,
|
600 |
+
∥⟨T(yn,k) − xn, xi⟩∥ < (
|
601 |
+
1
|
602 |
+
k + n) max{∥xi∥ : 1 ≤ i ≤ n + k}, 1 ≤ i ≤ n + k.
|
603 |
+
Hence, for any fixed n and, any y ∈ H, limk→∞ ∥⟨T(yn,k) − xn, y⟩∥ = 0. It follows that the set
|
604 |
+
of linear combinations of elements in {T(yn,k)a : n, k ∈ N, a ∈ A} is A-weakly dense in H2. Let
|
605 |
+
H3 ⊂ H1 be the closure of A-submodule generated by {yn,k : k, n ∈ N}. Then H3 is a countably
|
606 |
+
generated Hilbert A-submodule of H1 such that T(H3) is A-weakly dense in H2.
|
607 |
+
Put H = H3 ⊕ H2. In what follows we may identify T with the map ˜T(h3 ⊕ h2) = 0 ⊕ T(h3)
|
608 |
+
for h3 ∈ H3 and h2 ∈ H2, whenever it is convenient. We may also view K(H2) and K(H3) as
|
609 |
+
hereditary C∗-subalgebras of K(H) (see Lemma 2.13 of [33]).
|
610 |
+
Applying Corollary 1.5 of [39] (see Lemma 3.2 above for convenience), we obtain strictly
|
611 |
+
positive elements K0 ∈ K(H3) ⊂ K(H) and L ∈ K(H2) ⊂ K(H), respectively. If follows from
|
612 |
+
(1) of Proposition 3.4 that K0(H3) is dense in H3. Thus TK0(H3) is A-weakly dense in H2.
|
613 |
+
Applying part (2) of Proposition 3.4, we conclude that S = (TK0)(TK0)∗ is a strictly positive
|
614 |
+
element of K(H2).
|
615 |
+
Therefore the range projection Ps of S in K(H3)∗∗ is the same as the range projection
|
616 |
+
of L. Write (TK0)∗ = US1/2 in the polar decomposition of (TK0)∗ in K(H)∗∗. Note that
|
617 |
+
(TK0)∗ = K1/2
|
618 |
+
0
|
619 |
+
(TK1/2
|
620 |
+
0
|
621 |
+
)∗ = US1/2. It follows that U(S1/2(H)) ⊂ H3. Since S1/2 is a strictly
|
622 |
+
11
|
623 |
+
|
624 |
+
positive element of K(H2), H2 = S1/2H2. Hence U(H2) ⊂ H3. Note that UY ∈ K0 · K(H) for
|
625 |
+
any Y ∈ K(H). In particular, US′U ∗ ∈ K0 · K(H) · K0 = K(H3) for all S′ ∈ K(H2). We also
|
626 |
+
have UH2 ⊂ H3. Moreover
|
627 |
+
US1/nU ∗ ր UPsU ∗ = Q,
|
628 |
+
(e 3.35)
|
629 |
+
where Ps is the range projection of S (in K(H)∗∗) and Q is an open projection of K(H)∗∗, and
|
630 |
+
QUPs = U. It follows that U ∗U = Ps and UH2 ⊂ H3 is unitarily equivalent to H2. This proves
|
631 |
+
(1)
|
632 |
+
For (2). Let us first show that (b) ⇒ (a). We keep the notation used in the proof of part (1).
|
633 |
+
But since H1 is now assumed to be countably generated, we choose H3 = H1. In particular, K0
|
634 |
+
is a strictly positive element of K(H1). With notation in (1), it suffices to show that U(H2) is
|
635 |
+
dense in H1. Since K0T ∗(H) is A-weakly dense in H1, by Proposition 3.4, K0T ∗TK0 is a strictly
|
636 |
+
positive element in K(H1). By (1) of Proposition 3.4, K0T ∗TK0(H1) is dense in H1. Because
|
637 |
+
TK0(H1) ⊂ H2, this implies that K0T ∗(H2) is actually dense in H2.
|
638 |
+
Since K0T ∗ = US1/2, and K0T ∗(H2) is dense in H1, U(S1/2(H2)) is dense in H1. As in the
|
639 |
+
proof of (1) above, S1/2(H2) ⊂ H2. Hence, indeed, U(H2) is dense in H1.
|
640 |
+
Now consider (c) ⇒ (b). It suffices to show that K0T ∗(H2) is dense in H1.
|
641 |
+
Fix z ∈ H1. Since K0 is a strictly positive element, by Proposition 3.4, K0(H1) is dense in
|
642 |
+
H1. There exists a sequence zn ∈ H1 such that
|
643 |
+
lim
|
644 |
+
n→∞ ∥K0(zn) − z∥ = 0
|
645 |
+
(e 3.36)
|
646 |
+
By the assumption of (c), for each n ∈ N, there exists a sequence of elements yn,k ∈ H2 such
|
647 |
+
that (we do not assume that T ∗(yn,k) ∈ H1)
|
648 |
+
lim
|
649 |
+
k→∞ ∥T ∗(yn,k) − zn∥ = 0.
|
650 |
+
(e 3.37)
|
651 |
+
Thus, one obtain a subsequence {ym(n)} ⊂ {yn,k : k, n ∈ N} such that
|
652 |
+
lim
|
653 |
+
n→∞ ∥K0T ∗(ym(n)) − z∥ = 0.
|
654 |
+
(e 3.38)
|
655 |
+
This shows that K0T ∗(H2) is dense in H1, as desired.
|
656 |
+
It is clear that (a) ⇒ (b), (a) ⇒ (c) and (a) ⇒ (d).
|
657 |
+
It remains to show that (d) ⇒ (b). We will apply the proof of (1) first. But since H1 is
|
658 |
+
countably generated, choose H3 = H1. Let K0 be a strictly positive element of K(H1). Since T
|
659 |
+
is invertible, T(H1) is dense in H2. Therefore, it suffices to show that K0T ∗(H2) is A-weakly
|
660 |
+
dense in H1. Let H = H1 ⊕ H2. We will view K(H1) and K(H2) as hereditary C∗-subalgebras
|
661 |
+
of K(H). So T is identified with the bounded module map (h1 ⊕ h2) �→ 0 ⊕ T(h1) and T −1
|
662 |
+
is identified with the bounded module map (h1 ⊕ h2) �→ T −1(h2) ⊕ 0. In what follows, we
|
663 |
+
use the fact that (T −1)∗ = (T ∗)−1 and we will also work in H∼, if necessary (see Definition
|
664 |
+
2.2). In this way, we may write T ∗, (T −1)∗ ∈ RM(K(H)). Hence, if E ∈ K(H2) ⊂ K(H),
|
665 |
+
E(T ∗)−1 = E(T −1)∗ ∈ K(H).
|
666 |
+
Let {En} be an approximate identity for K(H2). For any finite subset F ⊂ H2 in the unit
|
667 |
+
ball of H2, and ǫ > 0, by Lemma 3.1, there is n0 ∈ N such that, for all n ≥ n0,
|
668 |
+
∥T −1En(x) − T −1(x)∥ < ǫ/(∥T ∗∥ + 1)(∥K0∥ + 1) for all x ∈ F.
|
669 |
+
(e 3.39)
|
670 |
+
It follows that, for any y ∈ H1 with ∥y∥ ≤ 1,
|
671 |
+
∥⟨(En(T ∗)−1 − (T ∗)−1)(y), x⟩∥
|
672 |
+
=
|
673 |
+
∥⟨y, (T −1En − T −1)(x)⟩∥
|
674 |
+
(e 3.40)
|
675 |
+
≤
|
676 |
+
∥y∥∥∥T −1En(x) − T −1(x)∥
|
677 |
+
(e 3.41)
|
678 |
+
<
|
679 |
+
ǫ/(∥T ∗∥ + 1)(∥K0∥ + 1)
|
680 |
+
(e 3.42)
|
681 |
+
12
|
682 |
+
|
683 |
+
for all x ∈ F. Thus
|
684 |
+
∥⟨T ∗En(T ∗)−1(y) − y, x⟩∥
|
685 |
+
=
|
686 |
+
∥⟨T ∗En(T ∗)−1(y) − T ∗(T ∗)−1(y), x⟩∥
|
687 |
+
(e 3.43)
|
688 |
+
<
|
689 |
+
ǫ/(∥K0∥ + 1).
|
690 |
+
(e 3.44)
|
691 |
+
Hence
|
692 |
+
∥⟨K0T ∗En(T ∗)−1(y) − K0(y), x⟩∥ < ǫ.
|
693 |
+
(e 3.45)
|
694 |
+
Since En(T ∗)−1 = En(T −1)∗ ∈ K(H), we have En(T ∗)−1(H1) ⊂ H2. Also, by (1) of Lemma 3.4,
|
695 |
+
K0(H1) is dense in H1. It follows from (e 3.45) that K0T ∗(H2) is A-weakly dense in H1.
|
696 |
+
Remark 3.7. Theorem 3.6 may provide a correction to 2.2 of [33] (which was not used there).
|
697 |
+
As the reader may expect that Theorem 3.6 will lead some discussion about the Cuntz
|
698 |
+
semigroups. Indeed we will discuss this in next section. But let us end this section with the
|
699 |
+
following corollary.
|
700 |
+
Definition 3.8. Let A be a C∗-algebra and b ∈ A+. Denote by Her(b) = bAb the hereditary
|
701 |
+
C∗-subalgebra of A. Suppose also a ∈ A+. Let us write a
|
702 |
+
∼< b if there is x ∈ A such that x∗x = a
|
703 |
+
and xx∗ ∈ Her(b) (see [15] and this notation in [32]).
|
704 |
+
Corollary 3.9. Let A be a C∗-algebra and let a, b ∈ A+. Suppose that H1 = aA and H2 = bA.
|
705 |
+
Then a
|
706 |
+
∼< b, if there is T ∈ B(H2, H1) whose range is A-weakly dense, and if a
|
707 |
+
∼< b, then there
|
708 |
+
is T ∈ B(H2, H1) which has dense range.
|
709 |
+
Proof. Suppose that a
|
710 |
+
∼< b, i.e., there is x ∈ A such that
|
711 |
+
x∗x = a and xx∗ ∈ Her(b) = bAb.
|
712 |
+
(e 3.46)
|
713 |
+
Then, for any c ∈ A, (x∗bc)(x∗bc)∗ = x∗bcc∗bx ∈ aAa. It follows that x∗bc ∈ aA = H2 for all
|
714 |
+
c ∈ A. Define T : H2 → H1 by T(bc) = x∗bc for all c ∈ A. Then T ∈ B(H2, H1). Since x∗x = a,
|
715 |
+
by Dini’s theorem, x∗b1/nx converges to a in norm. Since T is a bounded module map, we
|
716 |
+
conclude that T(H2) is dense in H1.
|
717 |
+
Now we assume that there is T ∈ B(H2, H1) whose range is A-weakly dense in H1. Note
|
718 |
+
that a is a strictly positive element of K(H1) and b is a strictly positive element of K(H2),
|
719 |
+
respectively. By Proposition 3.4, b(H2) is dense in H2. It follows that Tb(H2) is A-weakly dense
|
720 |
+
in H1. By (2) of Proposition 3.4, c = (Tb)(Tb)∗ is a strictly positive element of Her(a). Write
|
721 |
+
(Tb)∗ = uc1/2 as polar decomposition in A∗∗. Then uy ∈ A for all y ∈ aA. Put x = ua1/2. Then
|
722 |
+
x∗x = a and xx∗ ∈ K(H2) = Her(b).
|
723 |
+
(e 3.47)
|
724 |
+
4
|
725 |
+
Equivalence classes of Hilbert modules and stable rank one
|
726 |
+
Now let us discuss the possibility to use quasitraces to measure Hilbert A-modules. We will
|
727 |
+
consider the question stated in 4.5. Moreover, we will discuss the case that unitary equivalence
|
728 |
+
classes of Hilbert A-submodules can be determined by the Cuntz semigroup.
|
729 |
+
Definition 4.1. Let A be a σ-unital C∗-algebra. Then one may identify A ⊗ K with K(HA).
|
730 |
+
Denote by CH(A) the unitary equivalence classes [H] of countably generated Hilbert A-modules
|
731 |
+
(where H is a countably generated Hilbert A-module).
|
732 |
+
13
|
733 |
+
|
734 |
+
One may define [H1] + [H2] to be the unitarily equivalent class [H1 ⊕ H2]. Then CH(A)
|
735 |
+
becomes a semigroup.
|
736 |
+
Let a, b ∈ (A ⊗ K)+. We write a≈∼b, if there exists x ∈ A ⊗ K such that x∗x = a and xx∗ is
|
737 |
+
a strictly positive element of Her(b). In the terminology of [40], a ≈∼ b is the same as a ∼ b′ ∼= b
|
738 |
+
in [40].
|
739 |
+
Next proposition states that “≈∼” is an equivalence relation.
|
740 |
+
Let a ∈ (A ⊗ K)+. Define Ha = a(HA). Let H be a countably generated Hilbert A-module.
|
741 |
+
Then by [39] (see Proposition 3.2, for convenience), K(H) is σ-unital. We may view H as a
|
742 |
+
Hilbert A-submodule of HA = l2(A). Let b ∈ K(H) be a strictly positive element of K(H).
|
743 |
+
Then, by Proposition 3.4, Hb := bHA = bH = H. If c ∈ K(H) is another strictly positive
|
744 |
+
element, then Hc = Hb.
|
745 |
+
Let pa, pb be the open projections corresponding to a and b (in (A ⊗ K)∗∗), respectively.
|
746 |
+
Define pa ≈cu pb if there is v ∈ (A ⊗ K)∗∗ such that v∗v = pa and vv∗ = pb and, for any
|
747 |
+
c ∈ Her(a) and d ∈ Her(b), vc, v∗d ∈ A ⊗ K. See also [15] and [16].
|
748 |
+
We would like to remind the reader of the following statement.
|
749 |
+
Proposition 4.2 (Proposition 4.3 and 4.2 of [40]). Let A be a σ-unital C∗-algebra and a, b ∈
|
750 |
+
(A ⊗ K)+. Then the following are equivalent.
|
751 |
+
(1) a ≈∼ b;
|
752 |
+
(2) pa ≈cu pb and
|
753 |
+
(3) [Ha] = [Hb] in CH(A).
|
754 |
+
Moreover, “ ≈∼ ” is an equivalence relation.
|
755 |
+
4.3. By subsection 4 of [9], there are examples of stably finite and separable C∗-algebras A
|
756 |
+
which contain positive elements a ∼ b in Cu(A) but a ̸≈∼ b.
|
757 |
+
4.4. (1) Let A be a σ-unital C∗-algebra of stable rank one. By Theorem 3 of [11], a ∼ b in
|
758 |
+
Cu(A) if and only if Ha and Hb are unitarily equivalent. One may ask whether the converse
|
759 |
+
holds. Theorem 4.9 provides a partial answer to the question.
|
760 |
+
(2) Let A be a σ-unital simple C∗-algebra and Ped(A) be its Pedersen ideal.
|
761 |
+
Let a ∈
|
762 |
+
Ped(A) ∩ A+. Then Her(a) ⊗ K ∼= A ⊗ K, by Brown’s stable isomorphism theorem ([4]). One
|
763 |
+
notes that Her(a) is algebraically simple. To study the Cuntz semigroup of A, or the semigroup
|
764 |
+
CH(A), one may consider Her(a) instead of A.
|
765 |
+
(3) Let us now assume that A is algebraically simple. Let �
|
766 |
+
QT(A) be the set of all 2-quasi-
|
767 |
+
traces defined on the Pedersen ideal of A⊗K. Let QT(A) be the set of 2-quasi-traces τ ∈ �
|
768 |
+
QT(A)
|
769 |
+
such that ∥τ|A∥ = 1. Let us assume that QT(A) ̸= ∅. It follows from Proposition 2.9 of [20] that
|
770 |
+
0 ̸∈ QT(A)
|
771 |
+
w. Recall that QT(A)
|
772 |
+
w is a compact set (see Proposition 2.9 of [20]).
|
773 |
+
Denote by Aff+(QT(A)
|
774 |
+
w) the set of all continuous affine functions f on the compact con-
|
775 |
+
vex set QT(A)
|
776 |
+
w such that f = 0, or f(τ) > 0 for all τ ∈ QT(A)
|
777 |
+
w. Let LAff+(QT(A)
|
778 |
+
w)
|
779 |
+
be the set of those lowe-semi-continuous affine functions f on QT(A)
|
780 |
+
w such that there are
|
781 |
+
fn ∈ Aff+(QT(A)
|
782 |
+
w) such that fn ր f (point-wisely). We allow f has value ∞.
|
783 |
+
(4) In what follows, for any 0 < δ < 1, denote by fδ a function in C([0, ∞)) with 0 ≤ fδ(t) ≤ 1
|
784 |
+
for all t ∈ [0, ∞), fδ(t) = 0 if t ∈ [0, δ/2], fδ(t) = 1 if t ∈ [δ, ∞) and fδ(t) is linear on (δ/2, δ).
|
785 |
+
Let a, b ∈ (A ⊗ K)+. Define
|
786 |
+
dτ(a) = lim
|
787 |
+
n→∞ τ(f1/n(a)) for all τ ∈ �
|
788 |
+
QT(A).
|
789 |
+
Note f1/n(a) ∈ Ped(A)+ for each n ∈ N.
|
790 |
+
14
|
791 |
+
|
792 |
+
(5) Let A be an algebraically simple C∗-algebra with QT(A) ̸= ∅. We say A has strict
|
793 |
+
comparison (of Blackdar, see [3]), if, for any a, b ∈ (A ⊗ K)+, dτ(a) < dτ(b) for all τ ∈ QT(A)
|
794 |
+
w
|
795 |
+
implies that a ≲ b in Cu(A).
|
796 |
+
(6) A is said to have finite radius of comparison, if there is 0 < r < ∞ such that, for any
|
797 |
+
a, b ∈ (A ⊗ K)+, a ≲ b, whenever dτ(a) + r < dτ(b) for all τ ∈ QT(A)
|
798 |
+
w (see [50]).
|
799 |
+
If A is σ-unital simple which is not algebraically simple, we may pick a nonzero element
|
800 |
+
e ∈ Ped(A)+ and consider Her(a) ⊗ K ∼= A ⊗ K. Then we say that A has strict comparison (or
|
801 |
+
has finite radius comparison), if Her(e) does. It should be noted that this definition does not
|
802 |
+
depend on the choice of e. Note that, in both cases above, we always assume that �
|
803 |
+
QT(A) ̸= {0}.
|
804 |
+
4.5. In this section, we will consider the following question: Suppose that dτ(b) is much larger
|
805 |
+
than dτ(a) for all τ ∈ QT(A)
|
806 |
+
w. Does it follow that a
|
807 |
+
∼< b?, or equivalently, that Ha is unitarily
|
808 |
+
equivalent to a Hilbert A-submodule of Hb?
|
809 |
+
4.6. (7) Define a map Γ : Cu(A) → LAff+(QT(A)
|
810 |
+
w) by Γ([a])(τ) = �
|
811 |
+
[a](τ) = dτ(a) for all
|
812 |
+
τ ∈ QT(A)
|
813 |
+
w.
|
814 |
+
(8) It is proved by M. Rordam [46] that, for a unital finite simple C∗-algebra A, if A
|
815 |
+
is Z-stable then A has stable rank one. Robert [44] showed that any σ-unital simple stably
|
816 |
+
projectionless Z-stable C∗-algebra A has almost stable rank one. Recently, it is shown that,
|
817 |
+
any σ-unital finite simple Z-stable C∗-algebra has stable rank one (see [21]).
|
818 |
+
A part of the Toms-Winter conjecture states that, for a separable amenable simple C∗-
|
819 |
+
algebra A, A is Z-stable if and only if A has strict comparison. It follows from [46] and [18]
|
820 |
+
that if A is Z-stable, then A has strict comparison and Γ is surjective. The remaining open
|
821 |
+
question is whether a separable amenable simple C∗-algebra A with strict comparison is always
|
822 |
+
Z-stable. There are steady progresses to resolve the remaining problem ([28], [47], [52], [55],
|
823 |
+
[48], [14], [36] and [37], for example).
|
824 |
+
Since strict comparison is a property for Cu(A), one may ask the question whether a separable
|
825 |
+
amenable simple C∗-algebra A whose Cu(A) behaves like a separable simple Z-stable C∗-algebra
|
826 |
+
is in fact Z-stable. To be more precise, let us assume that A is a separable simple C∗-algebra
|
827 |
+
such that Cu(A) = V (A) ⊔ (LAff+(�
|
828 |
+
QT(A)) \ {0}) = CH(A), where V (A) is the sub-semigroup
|
829 |
+
of Cu(A) whose elements are represented by projections, i.e., A has strict comparison, Γ is
|
830 |
+
surjective and Cu(A) = CH(A). The question is whether such A is Z-stable, if we also assume A
|
831 |
+
is amenable. Theorem 4.9 shows that such C∗-algebras always have stable rank one, by showing
|
832 |
+
that these C∗-algebras have tracial approximate oscillation zero (see 4.7). It should be also
|
833 |
+
mentioned that if A is a separable unital simple C∗-algebra with stable rank one, then Γ is
|
834 |
+
surjective (see [48] and [2]).
|
835 |
+
To state the next lemma, let us recall the definition of tracial approximate oscillation zero.
|
836 |
+
Definition 4.7. Let A be a C∗-algebra with �
|
837 |
+
QT(A) \ {0} ̸= ∅. Let S ⊂ �
|
838 |
+
QT(A) be a compact
|
839 |
+
subset. Define, for each a ∈ (A ⊗ K)+,
|
840 |
+
ω(a)|S
|
841 |
+
=
|
842 |
+
lim
|
843 |
+
n→∞ sup{dτ(a) − τ(f1/n(a)) : τ ∈ S}
|
844 |
+
(e 4.48)
|
845 |
+
(see A1 of [17] and Definition 4.1 of [20]). We will assume that A is algebraically simple and only
|
846 |
+
consider the case that S = QT(A)
|
847 |
+
w, and in this case, we will write ω(a) instead of ω(a)|QT(A)
|
848 |
+
w,
|
849 |
+
in this paper. It should be mentioned that ω(a) = 0 if and only if dτ(a) is continuous (and
|
850 |
+
finite) on QT(A)
|
851 |
+
w.
|
852 |
+
In this case, (when ∥a∥
|
853 |
+
2,QT (A)w < ∞, for example, a ∈ Ped(A ⊗ K)), we write ΩT(a) =
|
854 |
+
ΩT (a)|S = 0, if there is a sequence bn ∈ Ped(A ⊗ K) ∩ Her(a)+ such that ∥bn∥ ≤ ∥a∥,
|
855 |
+
lim
|
856 |
+
n→∞ ω(bn) = 0 and
|
857 |
+
lim
|
858 |
+
n→∞ ∥a − bn∥
|
859 |
+
2,QT (A)w = 0,
|
860 |
+
(e 4.49)
|
861 |
+
15
|
862 |
+
|
863 |
+
where ∥x∥
|
864 |
+
2,QT (A)w = sup{τ(x∗x)1/2 : τ ∈ QT(A)
|
865 |
+
w} (see Proposition 4.8 of [20]). If ω(a) = 0,
|
866 |
+
then ΩT (a) = 0 (see the paragraph after Definition 4.7 of [20]).
|
867 |
+
Even if A is not algebraically simple (but σ-unital and simple), we may fix a nonzero element
|
868 |
+
e ∈ Ped(A) ∩ A+ (so that Her(e) ⊗ K ∼= A ⊗ K) and choose S = QT(Her(e))
|
869 |
+
w. Then, for any
|
870 |
+
a ∈ (A ⊗ K)+ with ∥a∥2,S < ∞, we write ΩT (a) = 0 if ΩT (a)|S = 0 (this does not depend on the
|
871 |
+
choice of e, see Proposition 4.9 of [20]).
|
872 |
+
A σ-unital simple C∗-algebra A is said to have tracial approximate oscillation zero, if ΩT (a) =
|
873 |
+
0 for every positive element a ∈ Ped(A ⊗ K).
|
874 |
+
Lemma 4.8. Let A be a σ-untal algebraically simple C∗-algebra with QT(A) ̸= ∅, strict com-
|
875 |
+
parison and surjective Γ. For any a ∈ (A ⊗ K)+, there is b ∈ (A ⊗ K)+, such that Γ([a]) = Γ([b])
|
876 |
+
in Cu(A) such that ΩT(b) = 0.
|
877 |
+
Proof. Recall that we assume that QT(A) ̸= ∅. Let g ∈ LAff+(QT(A)
|
878 |
+
w) be such that �
|
879 |
+
[a] = g.
|
880 |
+
There is a sequence of increasing gn ∈ Aff+(QTA) such that gn ր g (pointwisely).
|
881 |
+
Put f1 = g1 − (1/4)g1 ∈ Aff+(QT(A)
|
882 |
+
w) and α1 = 1/4. Then g2(τ) > f1(τ) for all τ ∈
|
883 |
+
QT(A)
|
884 |
+
w. Choose 0 < α2 < 1/22+1 such that (1 − α2)g2(τ) > f1(τ) for all τ ∈ QT(A)
|
885 |
+
w.
|
886 |
+
Put f2 = (1 − α2)g2. Suppose that 0 < αi < 1/22+i is chosen, i = 1, 2, ..., n, such that (1 −
|
887 |
+
αi+1)gi+1(τ) > (1−αi)gi(τ) for all τ ∈ QT(A)
|
888 |
+
w, i = 1, 2, ..., n−1. Then gn+1(τ) > (1−αn)gn(τ)
|
889 |
+
for all τ ∈ QT(A)
|
890 |
+
w. Choose 0 < αn+1 < 1/22+n such that (1 − αn+1)gn+1(τ) > (1 − αn)gn(τ)
|
891 |
+
for all τ ∈ QT(A)
|
892 |
+
w. Define fn+1 = (1 − αn+1)gn+1 ∈ Aff+(QT(A)
|
893 |
+
w). By induction, we obtain a
|
894 |
+
strictly increasing sequence fn ∈ Aff+(QT(A)
|
895 |
+
w) such that fn ր g.
|
896 |
+
Define h1 = f1 and hn = fn − fn−1 for n ≥ 2. Then hn ∈ Aff+(QT(A)
|
897 |
+
w) and g = �∞
|
898 |
+
n=1 hn
|
899 |
+
(converges point-wisely). Since Γ is surjective, there are an ∈ (A ⊗ K)+ such that �
|
900 |
+
[an](τ) =
|
901 |
+
dτ(an) = hn, n ∈ N. We may assume that aiaj = 0 if i ̸= j. Define b ∈ (A ⊗ K)+ by b =
|
902 |
+
�∞
|
903 |
+
n=1 an/n.
|
904 |
+
Then �[b] = g. In other words, Γ([a]) = Γ([b]).
|
905 |
+
For each m ∈ N, since �
|
906 |
+
[an] is continuous on QT(A)
|
907 |
+
w, (by Lemma 4.5 of [20]), choose en,m ∈
|
908 |
+
Her(an) with 0 ≤ en,m ≤ 1 such that {en,m}m∈N forms an approximate identity (for Her(an)),
|
909 |
+
dτ(an) − τ(en,m) < 1/2n+m for all τ ∈ QT(A)
|
910 |
+
w, and ω(en,m) < 1/2n+m.
|
911 |
+
(e 4.50)
|
912 |
+
Define en = �n
|
913 |
+
j=1 ej,n. Since aiaj = 0, if i ̸= j, we have that 0 ≤ en ≤ 1, and {en} forms an
|
914 |
+
approximate identity for Her(b). By (2) of Proposition 4.4 of [20], we compute that
|
915 |
+
ω(en) ≤
|
916 |
+
n
|
917 |
+
�
|
918 |
+
j=1
|
919 |
+
ω(ej,n) <
|
920 |
+
n
|
921 |
+
�
|
922 |
+
j=1
|
923 |
+
1/2j+n = 1/2n.
|
924 |
+
(e 4.51)
|
925 |
+
Hence limn→∞ ω(en) = 0 and, by Proposition 5.7 of [20], ΩT (b) = 0.
|
926 |
+
Theorem 4.9. Let A be a σ-unital simple C∗-algebra with strict comparison and surjective Γ
|
927 |
+
(which is not purely infinite). Then the following are equivalent:
|
928 |
+
(1) for any a, b ∈ (A ⊗ K)+, [a] = [b] in Cu(A) if and only if a ≈∼ b;
|
929 |
+
(2) A has stable rank one;
|
930 |
+
(3) Cu(A) = CH(A);
|
931 |
+
(4) for any a, b ∈ (A ⊗ K)+, [a] = [b] in Cu(A) if and only if Hilbert A-module Ha and Hb
|
932 |
+
are unitarily equivalent.
|
933 |
+
Proof. (2) ⇒ (3) follows from Theorem 3 of [11].
|
934 |
+
(3) ⇔ (4) follows from the definition.
|
935 |
+
16
|
936 |
+
|
937 |
+
(1) ⇔ (4) follows from Proposition 4.2.
|
938 |
+
(3) ⇒ (2): We will show that A has tracial approximate oscillation zero (see Definition 5.1
|
939 |
+
of [20]).
|
940 |
+
Let a ∈ (Ped(A ⊗ K)) with 0 ≤ a ≤ 1. Suppose that Γ([a]) is continuous. Then ω([a]) = 0.
|
941 |
+
Hence ΩT (a) = 0. Now suppose that Γ([a]) is not continuous.
|
942 |
+
In particular, [a] cannot be
|
943 |
+
represented by a projection. By Lemma 4.8, there exists b ∈ (A ⊗ K)+ such that ΩT(b) = 0 and
|
944 |
+
Γ([a]) = Γ([b]). Since we now assume that Γ([a]) is not continuous neither is Γ([b]). Hence both
|
945 |
+
[a] and [b] are not represented by projections. As we assume that A has strict comparison, this
|
946 |
+
implies that [a] = [b].
|
947 |
+
Since (3) holds, a(HA) is unitarily equivalent to b(HA). We have shown (3) ⇔ (4) and (1) ⇔
|
948 |
+
(4). By Proposition 4.2, there is a partial isometry v ∈ (A⊗K)∗∗ such that v∗cv ∈ a(A ⊗ K)a for
|
949 |
+
all c ∈ b(A ⊗ K)b and v∗bv is a strict positive element of a(A ⊗ K)a. It follows that ΩT(a) = 0.
|
950 |
+
Since this holds for every a ∈ Ped(A ⊗ K), A has tracial approximate oscillation zero.
|
951 |
+
By
|
952 |
+
Theorem 9.4 of [20], A has stable rank one, i.e., (2) holds.
|
953 |
+
Let us end this section with the following partial answer to the question in 4.5. Note that
|
954 |
+
dτ(b) is as large as one can possibly have.
|
955 |
+
Theorem 4.10. Let A be a σ-unital simple C∗-algebra with finite radius of comparison. Suppose
|
956 |
+
that a, b ∈ (A ⊗ K)+ such that dτ(b) = ∞ for all τ ∈ �
|
957 |
+
QT(A) \ {0}. Then
|
958 |
+
(1) a
|
959 |
+
∼< b and Ha is unitarily equivalent to an orthogonal summand of Hb,
|
960 |
+
(2) Hb ∼= HA as Hilbert A-module, and
|
961 |
+
(3) Her(b) ∼= A ⊗ K.
|
962 |
+
Proof. Put B = b(A ⊗ K)b. Let us show that B is stable.
|
963 |
+
We will use the characterization
|
964 |
+
of stable C∗-algebras of [25].
|
965 |
+
Moreover, we use the following fact: If A has finite radius of
|
966 |
+
comparison and c, b ∈ (A ⊗ K)+ such that dτ(d) < ∞ and dτ(b) = ∞ for all τ ∈ �
|
967 |
+
QT(A) \ {0},
|
968 |
+
then d ≲ b.
|
969 |
+
Let c ∈ B+ such that there exists e ∈ B+ such that ec = c. Working in the commutative
|
970 |
+
C∗-subalgebra generated by c and e, we conclude that, if 0 < δ < 1/2, fδ(e)c = c.
|
971 |
+
Let b1 := (1 − f1/8(e))1/2b(1 − f1/8(e))1/2. Then
|
972 |
+
b1c = cb1 = 0.
|
973 |
+
(e 4.52)
|
974 |
+
Note that f1/16(e) ∈ Ped(A ⊗ K)+. Therefore
|
975 |
+
dτ(f1/8(e)) ≤ τ(f1/16(e)) < ∞ for all τ ∈ �
|
976 |
+
QT(A).
|
977 |
+
We also have
|
978 |
+
b ≲ b1/2(1 − f1/8(e))b1/2 ⊕ b1/2f1/8(e)b1/2.
|
979 |
+
(e 4.53)
|
980 |
+
Since b1/2f1/8(e)b1/2 ≲ f1/8(e), then dτ(b1/2f1/8(e)b1/2) < ∞ for all τ ∈ �
|
981 |
+
QT(A). Hence
|
982 |
+
dτ(b1) = dτ(b1/2(1 − f1/8(e))b1/2) = ∞ for all τ ∈ �
|
983 |
+
QT(A) \ {0}.
|
984 |
+
(e 4.54)
|
985 |
+
Since A has finite radius of comparison, as mentioned above, we have that
|
986 |
+
f1/8(e) ≲ b1.
|
987 |
+
(e 4.55)
|
988 |
+
There is, by Lemma 2.2 of [45], x ∈ A ⊗ K such that
|
989 |
+
x∗x = f1/16(f1/8(e)) and xx∗ ∈ Her(b1).
|
990 |
+
(e 4.56)
|
991 |
+
17
|
992 |
+
|
993 |
+
Let x = v|x| be the polar decomposition of x in A∗∗. Then ϕ : Her(f1/6(f1/8(e))) → Her(b1) de-
|
994 |
+
fined by ϕ(d) = vdv∗ for all d ∈ Her(f1/6(f1/8(e))) is homomorphism. Note that f1/6(f1/8(e)) ≤
|
995 |
+
f1/4(e) and f1/4(e)c = c. Put y = vc1/2. Then y ∈ A ⊗ K and y∗y = c and yy∗ ∈ Her(b1). Hence
|
996 |
+
c = yy∗ and c ⊥ yy∗.
|
997 |
+
(e 4.57)
|
998 |
+
Since c is chosen arbitrarily in B+ with the property that there is e ∈ B+ such that ec = c, it
|
999 |
+
follows from Theorem 2.1 of [25] that B is stable. By Brown’s stable isomorphism theorem ([4]),
|
1000 |
+
B ∼= A ⊗ K. This proves (3).
|
1001 |
+
Since B is stable, there is a sequence of mutually orthogonal nonzero elements b0,n ∈ B+
|
1002 |
+
(n ∈ N) such that b0,1
|
1003 |
+
≈∼ b0,n for all n ∈ N and b0 = �∞
|
1004 |
+
n=1 b0,n/n ∈ B is a strictly positive
|
1005 |
+
element. We have Hb0,n ∼= Hb0,m for all n, m ∈ N. It follows that Hb = Hb0 ∼= l2(Hb0) as Hilbert
|
1006 |
+
A-modules. By Proposition 7.4 of [29], l2(Hb0) ∼= l2(A) = HA as Hilbert A-module. This proves
|
1007 |
+
(2).
|
1008 |
+
For (1), since we have shown that Hb ∼= HA, we may apply Kasparov’s absorbing theorem
|
1009 |
+
([26]).
|
1010 |
+
5
|
1011 |
+
Projective Hilbert Modules
|
1012 |
+
The main result of this section is Theorem 5.6 which states that, for separable C∗-algebra A,
|
1013 |
+
every countably generated Hilbert A-module is projective.
|
1014 |
+
Note that in the following statement, we use the fact that B(H) = LM(H) (see Theorem
|
1015 |
+
1.5 of [33]).
|
1016 |
+
Lemma 5.1. Let A be a C∗-algebra and H be Hilbert A-modules. Suppose that T ∈ B(H) is
|
1017 |
+
a bounded module map such that T(H) is a Hilbert A-submodule of H and L ∈ LM(K(H)) the
|
1018 |
+
corresponding left multiplier. Then LK(H) = K(T(H)).
|
1019 |
+
Proof. Let H1 = T(H) and F(H) be the linear span of bounded module maps of the form θx,y
|
1020 |
+
for x, y ∈ H. Note that Lb(x) = Tb(x) for all b ∈ K(H) and x ∈ H.
|
1021 |
+
Let ξ, ζ ∈ H1 ⊂ H. Since T : H → H1 is surjective, there is x ∈ H such that T(x) = ξ. Then
|
1022 |
+
T ◦ θx,ζ = θξ,ζ. This implies that LF(H) = F(H1). Let H0 = kerT be as a Hilbert submodule of
|
1023 |
+
H. Then K(H0) ⊂ K(H) is a hereditary C∗-subalgebra of K(H) (see Lemma 2.13 of [33]). Let
|
1024 |
+
p be the open projection in K(H)∗∗ corresponding to K(H0). Then (working in H∼ if necessary)
|
1025 |
+
Lp = 0 and Lb = L(1 − p)b for all b ∈ K(H). We identify H/H0 with (1 − p)H (⊂ H∼). Let
|
1026 |
+
˜T : (1 − p)H → H1 be the bounded module map induced by T which has a bounded inverse
|
1027 |
+
˜T −1 as T is surjective. Note that ˜T −1(T(z)) = (1 − p)z for all z ∈ H.
|
1028 |
+
To show that T(K(H)) = K(H1), fix S ∈ K(H1). Let Sn ∈ F(H1) be such that
|
1029 |
+
limn→∞ ∥Sn − S∥ = 0. Since LF(H) = F(H1), we may choose Fn ∈ F(H) such that LFn = Sn,
|
1030 |
+
n ∈ N. Then, for any x ∈ H, ˜T −1(LFn(x)) = (1 − p)Fn(x).
|
1031 |
+
We claim that {(1 − p)Fn} converges in norm to an element of the form (1 − p)b for some
|
1032 |
+
b ∈ K(H). Note that, for any n, m ∈ N, and any x ∈ H,
|
1033 |
+
∥(1 − p)Fn(x) − (1 − p)Fm(x)∥ = ∥ ˜T −1(LFn(x) − LFm(x))∥ ≤ ∥ ˜T −1∥∥Sn − Sm∥∥x∥.
|
1034 |
+
This implies that {(1−p)Fn} is Cauchy in norm and it must converges to an element of the form
|
1035 |
+
(1 − p)b for some b ∈ K(H), as (1 − p)K(H) is closed. It then follows that, for any b ∈ K(H),
|
1036 |
+
Lb = L(1 − p)b = lim
|
1037 |
+
n→∞ L(1 − p)Fn = lim
|
1038 |
+
n→∞ Sn = S.
|
1039 |
+
This shows that LK(H) = K(H1).
|
1040 |
+
18
|
1041 |
+
|
1042 |
+
Definition 5.2. Let H and H1 be Hilbert A-modules and T : H1 → H be a surjective bounded
|
1043 |
+
module map. Then T induces an invertible bounded map ˜T : H1/kerT → H from Banach A-
|
1044 |
+
modules H1/kerT onto H. Denote by ˜T −1 : H → H1/kerT the inverse (which is also bounded).
|
1045 |
+
Theorem 5.3. Let A be a σ-unital C∗-algebra.
|
1046 |
+
For any countably generated Hilbert A-modules H1, H2, H3, any bounded module maps T1 :
|
1047 |
+
H1 → H3 and T2 : H2 → H3. Suppose that T1 is surjective, then there is a bounded module map
|
1048 |
+
T3 : H2 → H1 such that
|
1049 |
+
T1 ◦ T3 = T2.
|
1050 |
+
Moreover, ∥T3∥ = ∥ ˜T −1
|
1051 |
+
1
|
1052 |
+
◦ T2∥.
|
1053 |
+
Proof. Without loss of generality, we may assume that ∥T2∥ = 1. Let H4 = H1 ⊕ HA, H5 =
|
1054 |
+
H2 ⊕ HA and H6 = H3 ⊕ HA. Let T4 = T1 ⊕ idHA : H4 → H6 and T5 = T2 ⊕ idHA : H5 → H6.
|
1055 |
+
Suppose T1 is surjective. Then T4 is surjective. Suppose that there is a bounded module map
|
1056 |
+
T ′ : H5 → H4 such that
|
1057 |
+
T4 ◦ T ′ = T5 and ∥T ′∥ = ∥ ˜T −1
|
1058 |
+
4
|
1059 |
+
◦ T5∥
|
1060 |
+
One computes that
|
1061 |
+
∥ ˜T −1
|
1062 |
+
4
|
1063 |
+
◦ T5∥ = ∥ ˜T −1
|
1064 |
+
1
|
1065 |
+
◦ T2∥.
|
1066 |
+
One also has that
|
1067 |
+
T4 ◦ T ′|H2 = T5|H2 = T2.
|
1068 |
+
Since range(T2) ⊂ H3, T4(T ′(H2)) = T5(H2) ⊂ H3. Let P1 : H4 → H1, PHA : H4 → HA
|
1069 |
+
and P3 : H6 → H3 be the orthogonal projections.
|
1070 |
+
Then P3 ◦ T4 ◦ T ′|H2 = T2. Write T ′ =
|
1071 |
+
P1T ′ + (1H4 − P1)T ′. Note that 1H4 − P1 = PHA and P3T4(1H4 − P1) = 0. Then
|
1072 |
+
P3 ◦ T4 ◦ T ′|H2
|
1073 |
+
=
|
1074 |
+
P3 ◦ T4 ◦ P1 ◦ T ′|H2 + P3 ◦ T4 ◦ (1H4 − P1) ◦ T ′|H2
|
1075 |
+
(e 5.58)
|
1076 |
+
=
|
1077 |
+
P3 ◦ T4 ◦ P1 ◦ T ′|H2 + 0
|
1078 |
+
(e 5.59)
|
1079 |
+
=
|
1080 |
+
T1 ◦ P1 ◦ T ′|H2.
|
1081 |
+
(e 5.60)
|
1082 |
+
Define T = P1 ◦ T ′|H2. Then, by (e 5.60),
|
1083 |
+
T1 ◦ T = T2 and ∥T∥ = ∥P1 ◦ T ′|H2∥ = ∥ ˜T −1
|
1084 |
+
1
|
1085 |
+
◦ T2∥.
|
1086 |
+
(e 5.61)
|
1087 |
+
Therefore, without loss of generality, we may assume that H1 ∼= H2 ∼= H3 = HA. Put B =
|
1088 |
+
A⊗K. B is a σ-unital C∗-algebra. We view T1 as a bounded module map from HA onto HA. Let
|
1089 |
+
H0 = ker T1. Then H0 is a Hilbert A-submodule of HA and K(H0) ⊂ K(HA) = B is a hereditary
|
1090 |
+
C∗-subalgebra (see Lemma 2.13 of [33]). Let p ∈ B∗∗ be the open projection corresponding to
|
1091 |
+
the hereditary C∗-subalgebra K(H0). Let L1 ∈ LM(B) be given by the bounded module map
|
1092 |
+
T1 (see Theorem 1.5 of [31]). Note that L1b(z) = T1(b(z)) for all z ∈ HA and b ∈ B. For any
|
1093 |
+
a ∈ K(H0) ⊂ B, L1a = 0. It follows that L1p = 0 and L1(1 − p) = L1.
|
1094 |
+
Let J = K(H0)B be the right ideal of K(HA) = B. Consider the quotient Banach B-
|
1095 |
+
module B/J. Note that the module map ¯b �→ (1 − p)b is an isometry.
|
1096 |
+
So we may identify
|
1097 |
+
B/J with (1 − p)B. Define ˜L1 : B/J → B by ˜L1((1 − p)b) = L1b for b ∈ B. Viewing B
|
1098 |
+
as a Hilbert B-module, one has K(B) = B. By Lemma 5.1, viewing B as Hilbert B-module,
|
1099 |
+
L1B = L1K(B) = K(B) = B. It follows that ˜L1 is also a surjective map and hence has bounded
|
1100 |
+
inverse as a bounded linear map.
|
1101 |
+
Denote its inverse as ˜L−1
|
1102 |
+
1 . Note that ˜L−1
|
1103 |
+
1 L1b = (1 − p)b
|
1104 |
+
for b ∈ B (recall that L1 is surjective).
|
1105 |
+
In particular, ˜L−1
|
1106 |
+
1
|
1107 |
+
is a bounded module map from
|
1108 |
+
K(HA) = B to (1 − p)B.
|
1109 |
+
We may also use the identification HA/H0 = (1 − p)HA. Now T1 induces a bounded module
|
1110 |
+
map ˜T1 from (1 − p)HA onto HA which has a bounded inverse ˜T −1
|
1111 |
+
1 . Let L2 ∈ LM(B) be given
|
1112 |
+
19
|
1113 |
+
|
1114 |
+
by the bounded module map T2. Then the map L2 : B → B given by L2(b) = L2b for all b ∈ B
|
1115 |
+
is a bounded B-module map from B into B = K(HA).
|
1116 |
+
Consider the bounded B-module map ˜L−1
|
1117 |
+
1
|
1118 |
+
◦ L2 : B → B/J. Then, by 3.11 of [6], there exists
|
1119 |
+
a bounded module map L : B → B such that
|
1120 |
+
(1 − p)L = ˜L−1
|
1121 |
+
1
|
1122 |
+
◦ L2 and ∥L∥ = ∥˜L−1
|
1123 |
+
1
|
1124 |
+
◦ L2∥.
|
1125 |
+
(e 5.62)
|
1126 |
+
It follows that ˜L1(1 − p)L = L2. Recall that ˜L1(1 − p) = L1. Therefore
|
1127 |
+
L1 ◦ L = L2.
|
1128 |
+
(e 5.63)
|
1129 |
+
We identify L with a left multiplier in LM(B) (see Theorem 1.5 of [31]). Let T : H1 = HA →
|
1130 |
+
HA = H3 be the bounded module map given by L (see again Theorem 1.5 of [31]). Then we
|
1131 |
+
obtain that
|
1132 |
+
T1 ◦ T = T2 and ∥T∥ = ∥ ˜T −1
|
1133 |
+
1
|
1134 |
+
◦ T2∥.
|
1135 |
+
(e 5.64)
|
1136 |
+
The commutative diagrams on B level may be illustrated as follows (with π : B → B/J the
|
1137 |
+
quotient map given by (1 − p))
|
1138 |
+
B
|
1139 |
+
↓L2
|
1140 |
+
ցL
|
1141 |
+
B
|
1142 |
+
ևL1
|
1143 |
+
B
|
1144 |
+
�L−1
|
1145 |
+
1
|
1146 |
+
↕�L1
|
1147 |
+
ւπ
|
1148 |
+
B/J
|
1149 |
+
and
|
1150 |
+
B
|
1151 |
+
−→L
|
1152 |
+
B
|
1153 |
+
�L−1
|
1154 |
+
1
|
1155 |
+
L2 ↓
|
1156 |
+
ւπ
|
1157 |
+
B/J
|
1158 |
+
.
|
1159 |
+
Corollary 5.4. Let A be a σ-unital C∗-algebra and let
|
1160 |
+
0 → H1 →ι H2 →s H3 → 0
|
1161 |
+
be a short exact sequence of countably generated Hilbert A-modules. Then it splits. Moreover,
|
1162 |
+
the splitting map j : H3 → H2 has ∥j∥ = ∥˜s−1∥.
|
1163 |
+
Proof. Consider the diagram:
|
1164 |
+
H2
|
1165 |
+
↓s
|
1166 |
+
H3
|
1167 |
+
idH3
|
1168 |
+
։
|
1169 |
+
H3
|
1170 |
+
By Theorem 5.3, there is a bounded module map T : H3 → H2 such that
|
1171 |
+
s ◦ T = idH3 and ∥T∥ = ∥˜s−1∥.
|
1172 |
+
We need the following lemma which the authors could not locate a reference.
|
1173 |
+
Lemma 5.5. Let X be a Banach space and let H be a separable Banach space. Suppose that
|
1174 |
+
T : X → H is a surjective bounded linear map. Then there is a separable subspace Y ⊂ X such
|
1175 |
+
that TX = H.
|
1176 |
+
20
|
1177 |
+
|
1178 |
+
Proof. Note that the Open Mapping Theorem applies here. From the open mapping theorem
|
1179 |
+
(or a proof of it), there is δ > 0 for which T(B(0, a)) is dense in O(0, aδ) for any a > 0, where
|
1180 |
+
B(0, a) = {x ∈ X : ∥x∥ ≤ a} and O(0, b) = {h ∈ H : ∥h∥ < b}. For each rational number r > 0,
|
1181 |
+
since H is separable, one may find a countable set Er ⊂ B(0, r) such that T(Er) is dense in
|
1182 |
+
O(0, rδ). Let Y be the closed subspace generated by ∪r∈Q+Er.
|
1183 |
+
Let d = δ/2 and let y0 ∈ O(0, d). Then T(Y ∩ B(0, 1/2)) is dense in O(0, d). Choose ξ1 ∈
|
1184 |
+
Y ∩ B(0, 1/2) such that
|
1185 |
+
∥y0 − Tξ1∥ < δ/22.
|
1186 |
+
(e 5.65)
|
1187 |
+
In particular,
|
1188 |
+
y1 = y0 − Tξ1 ∈ O(0, δ/22).
|
1189 |
+
(e 5.66)
|
1190 |
+
Since T(Y ∩ B(0, 1/22)) is dense in O(0, δ/22), one obtains ξ2 ∈ Y ∩ B(0, 1/22) such that
|
1191 |
+
∥y1 − Tξ2∥ < δ/23.
|
1192 |
+
(e 5.67)
|
1193 |
+
In other words,
|
1194 |
+
y2 = y1 − Tξ2 = y0 − (Tξ1 + Tξ2) ∈ O(0, δ/23).
|
1195 |
+
(e 5.68)
|
1196 |
+
Continuing this process, one obtains a sequence of elements {ξn} ⊂ Y for which ξn ∈ B(0, 1/2n)
|
1197 |
+
and
|
1198 |
+
∥y0 − (Tξ1 + Tξ2 + · · · + Tξn)∥ < δ/2n+1, n = 1, 2, ....
|
1199 |
+
(e 5.69)
|
1200 |
+
Define ξ0 = �∞
|
1201 |
+
n=1 ξn. Note that the sum converges in norm and therefore ξ0 ∈ Y. By the
|
1202 |
+
continuity of T,
|
1203 |
+
Tξ0 = y0.
|
1204 |
+
(e 5.70)
|
1205 |
+
This implies that T(Y ) ⊃ O(0, d). It follows that T(Y ) = H.
|
1206 |
+
Theorem 5.6. Let A be a separable C∗-algebra. Then every countably generated Hilbert A-
|
1207 |
+
module is projective in the following sense:
|
1208 |
+
For any Hilbert A-modules H1, H2, H3, any bounded module maps T1 : H1 → H3 and T2 :
|
1209 |
+
H2 → H3. Suppose that T1 is surjective and H2 is countably generated, then there is a bounded
|
1210 |
+
module map T3 : H2 → H1 such that
|
1211 |
+
T1 ◦ T3 = T2.
|
1212 |
+
Moreover, ∥T3∥ = ∥ ˜T −1
|
1213 |
+
1
|
1214 |
+
◦ T2∥.
|
1215 |
+
The statement above may be illustrated as follows:
|
1216 |
+
H2
|
1217 |
+
H3
|
1218 |
+
H1
|
1219 |
+
T2
|
1220 |
+
T3
|
1221 |
+
T1
|
1222 |
+
(e 5.71)
|
1223 |
+
21
|
1224 |
+
|
1225 |
+
Proof. Let H′
|
1226 |
+
3 be the Hilbert A-module generated by T2(H2). Since H2 is countably generated,
|
1227 |
+
so is H′
|
1228 |
+
3. Since A is separable, H′
|
1229 |
+
3 is separable. Let H′
|
1230 |
+
1 = T −1(H′
|
1231 |
+
3), the pre-image of H′
|
1232 |
+
3 under
|
1233 |
+
T1. So T1|H′
|
1234 |
+
1 : H′
|
1235 |
+
1 → H′
|
1236 |
+
3 is surjective. Then, by Lemma 5.5, there is a separable Banach subspace
|
1237 |
+
of S ⊂ H′
|
1238 |
+
1 such that T1(S) = H′
|
1239 |
+
3. Let {xn} be a dense subset of S. Define H′′
|
1240 |
+
1 to be the closure of
|
1241 |
+
span{xna : a ∈ A, n = 1, 2, ....}. Then H′′
|
1242 |
+
1 is a countably generated Hilbert A-module. Moreover,
|
1243 |
+
S ⊂ H′′
|
1244 |
+
1 ⊂ H′
|
1245 |
+
1 ⊂ H1. But T1(S) = H′
|
1246 |
+
3. Therefore T1(H′′
|
1247 |
+
1 ) = H′
|
1248 |
+
3. We have the following diagram:
|
1249 |
+
H2
|
1250 |
+
H′′
|
1251 |
+
3
|
1252 |
+
H′′
|
1253 |
+
1
|
1254 |
+
T2
|
1255 |
+
T1
|
1256 |
+
(e 5.72)
|
1257 |
+
Now H′
|
1258 |
+
1, H2 and H′′
|
1259 |
+
3 are all countably generated. By 5.3, there exists T3 : H2 → H′′
|
1260 |
+
1 ⊂ H1 such
|
1261 |
+
that
|
1262 |
+
T1 ◦ T3 = T2 and ∥T3∥ = ∥ ˜T −1
|
1263 |
+
1
|
1264 |
+
◦ T2∥.
|
1265 |
+
(e 5.73)
|
1266 |
+
Corollary 5.7. Let A be a separable C∗-algebra and let
|
1267 |
+
0 → H1 →ι H2 →s H3 → 0
|
1268 |
+
be a short exact sequence of Hilbert A-modules. Suppose that H3 is countably generated. Then
|
1269 |
+
the short exact sequence splits. Moreover, the splitting map j : H3 → H2 has ∥j∥ = ∥˜s−1∥.
|
1270 |
+
Corollary 5.8. Let A be a separable C∗-algebra.
|
1271 |
+
(1) Suppose that H is a countably generated Hilbert A-module. Then, for any short exact
|
1272 |
+
sequence of Hilbert A-modules
|
1273 |
+
0 → H0
|
1274 |
+
j→ H1
|
1275 |
+
s→ H2 → 0,
|
1276 |
+
one has the following short exact sequence:
|
1277 |
+
0 → B(H, H0)
|
1278 |
+
j∗
|
1279 |
+
→ B(H, H1) s∗
|
1280 |
+
→ B(H, H2) → 0,
|
1281 |
+
where j∗(ϕ) = j ◦ ϕ for ϕ ∈ B(H, H0) and s∗(ψ) = s ◦ ψ for ψ ∈ B(H, H1).
|
1282 |
+
(2) Suppose that H2 is countably generated. Then, for any Hilbert A-module H, and any
|
1283 |
+
short exact sequence of Hilbert A-modules:
|
1284 |
+
0 → H0
|
1285 |
+
j→ H1
|
1286 |
+
s→ H2 → 0,
|
1287 |
+
One has the splitting short exact sequence
|
1288 |
+
0 → B(H, H0)
|
1289 |
+
j∗
|
1290 |
+
→ B(H, H1) s∗
|
1291 |
+
→ B(H, H2) → 0,
|
1292 |
+
(e 5.74)
|
1293 |
+
Proof. For (1), let us only show that s∗ is surjective. Let ψ ∈ B(H, H2). Since s : H1 → H2 is
|
1294 |
+
surjective, by Theorem 5.6, H is projective. There is ˜ψ ∈ B(H, H1) such that s ◦ ˜ψ = ψ. This
|
1295 |
+
implies that s∗ is surjective.
|
1296 |
+
For (2), by Corollary 5.7, there exists ψ : H2 → H1 such that s ◦ ψ = idH2. For each
|
1297 |
+
T ∈ B(H, H2), define ψ ◦ T : H → H1. Then s ◦ (ψ ◦ T) = T. Hence s∗ is surjective. This
|
1298 |
+
implies that (e 5.74) is a short exact. Moreover, map ψ above also gives a splitting map ψ∗ :
|
1299 |
+
B(H, H2) → B(H, H1).
|
1300 |
+
22
|
1301 |
+
|
1302 |
+
Definition 5.9. A finitely generated free Hilbert A-module is a Hilbert A-module with the form
|
1303 |
+
H = e1A⊕e2A⊕· · · ⊕enA, where ⟨ei, ei⟩ = pi is a projection in A, i = 1, 2, ..., n. Such a module
|
1304 |
+
is always self-dual (see, for example, Proposition 2.11).
|
1305 |
+
There is a notion of torsion free modules. Every Hilbert A-module is torsion free in the
|
1306 |
+
following sense. Let x ∈ H be a non-zero element and xa = 0 for some a ∈ A. Then a must be
|
1307 |
+
a left zero divisor. In fact, if xa = 0, then a⟨x, x⟩a = 0, or ⟨x, x⟩1/2a = 0. Then a must be a left
|
1308 |
+
zero divisor.
|
1309 |
+
One may define a Hilbert A-module H to be flat, if, for any bounded module map T : F → H,
|
1310 |
+
where F is a finitely generated free Hilbert A-module, there exists a free Hilbert A-module G
|
1311 |
+
and a bounded module map ϕ : F → G and a bounded module map ψ : G → H such that
|
1312 |
+
ϕ(kerT) = 0 and ψ ◦ ϕ = T as described as the following commutative diagram:
|
1313 |
+
G
|
1314 |
+
րϕ
|
1315 |
+
ցψ
|
1316 |
+
kerT ֒→
|
1317 |
+
F
|
1318 |
+
T
|
1319 |
+
−→
|
1320 |
+
H
|
1321 |
+
ϕ(kerT) = 0
|
1322 |
+
This is equivalent to say the following: for any x1, x2, ..., xm ∈ H, if there are ai ∈ A, 1 ≤ i ≤ m,
|
1323 |
+
such that �m
|
1324 |
+
i=1 xiai = 0, there must be some integer n, yj ∈ H, 1 ≤ j ≤ m and bi,j ∈ A,
|
1325 |
+
1 ≤ j ≤ m, 1 ≤ i ≤ n, such that �m
|
1326 |
+
i=1 aibi,j = 0 and xi = �n
|
1327 |
+
j=1 ai,jyj, 1 ≤ i ≤ m.
|
1328 |
+
Proposition 5.10. Let A be a σ-unital C∗-algebra and H be any Hilbert A-module. Suppose
|
1329 |
+
that F is a self-dual Hilbert A-module and T ∈ B(F, H). Then there are bounded module maps
|
1330 |
+
ϕ : F → F and ψ : F → H such that ψ ◦ ϕ = T and ϕ|kerT = 0. In particular, every Hilbert
|
1331 |
+
A-module is flat.
|
1332 |
+
Proof. Since F is self-dual, Therefore T ∗ maps H into F (instead into F ♯), or T ∗ ∈ B(H, F). In
|
1333 |
+
other words, T ∈ L(F, H). Put H1 = F ⊕ H. Define S ∈ B(H1) by
|
1334 |
+
S(f ⊕ h) = 0 ⊕ T(f) for all ∈ F and h ∈ H.
|
1335 |
+
Then S∗ ∈ B(H1). Let S = V |S| be the polar decomposition of S in L(H)∗∗. Then V |S|1/2, |S|1/2 ∈
|
1336 |
+
L(H1). In other words, |T|1/2 ∈ L(F) and V |T|1/2 ∈ L(F, H).
|
1337 |
+
Now define ϕ : F → F by ϕ = |T|1/2 and ψ : F → H by ψ = V |T|1/2. Then ϕ|kerT = 0 and
|
1338 |
+
ψ ◦ ϕ = V |T| = T.
|
1339 |
+
If F is a finitely generated free Hilbert A-module, then F is self-dual. So the above applies.
|
1340 |
+
Consequently H is flat.
|
1341 |
+
6
|
1342 |
+
Sequential approximation
|
1343 |
+
Let A be a C∗-algebra and H0 ⊂ H be Hilbert A-modules. Suppose that ϕ : H0 → A is a
|
1344 |
+
bounded module map. Consider the Hahn-Banach type of extension question: whether there
|
1345 |
+
is a bounded module map ψ : H → A such that ψ|H0 = ϕ (and ∥ψ∥ = ∥ϕ∥). If H0 ⊂ H is
|
1346 |
+
an arbitrary pair of Hilbert A-modules. This is to ask whether A is an injective Hilbert A-
|
1347 |
+
module with bounded module maps as morphisms. By Theorem 3.8 of [33], if A is a monotone
|
1348 |
+
complete C∗-algebra, then A is an injective Hilbert A-module. Conversely, if A is an injective
|
1349 |
+
Hilbert A-module, then A must be an AW ∗-algebra (see Theorem 3.14 of [33]). In fact, injective
|
1350 |
+
Hilbert A-modules are rare. It may never happen when A is a separable but infinite dimensional
|
1351 |
+
C∗-algebra (see [33] for some further discussion).
|
1352 |
+
In what follows, when x, y ∈ H and ǫ > 0, we may write x ≈ǫ y if ∥x − y∥ < ǫ.
|
1353 |
+
23
|
1354 |
+
|
1355 |
+
Let H be a Hilbert A-module and H♯ = B(H, A), the Banach A-module of all bounded
|
1356 |
+
A-module maps from H to A. Recall that H♯ ̸= H in general (see the end of 2.1). However, let
|
1357 |
+
us include the following approximation result.
|
1358 |
+
Theorem 6.1. Let H be a Hilbert A-module and ϕ : H → A be a bounded module map. Then,
|
1359 |
+
for any finite subset F ⊂ H, and any ǫ > 0, there exists x ∈ H such that
|
1360 |
+
∥ϕ(ξ) − ⟨x, ξ⟩∥ < ǫ for all ξ ∈ F and ∥x∥ ≤ ∥ϕ∥.
|
1361 |
+
(e 6.75)
|
1362 |
+
Proof. We may assume that ∥ϕ∥ ̸= 0. Let H1 = H ⊕ A and P1, PA ∈ L(H1) be the projections
|
1363 |
+
from H1 onto H and onto A, respectively. Define T ∈ B(H1) by T = ϕ ◦ P1. Note that, for
|
1364 |
+
x ∈ H, T(x) = ϕ(x) and ∥T∥ = ∥ϕ∥.
|
1365 |
+
Let F = {ξ1, ξ2, ..., ξk} ⊂ H and ǫ > 0. Without loss of generality, we may assume that
|
1366 |
+
0 ̸= ∥ξi∥ ≤ 1, 1 ≤ i ≤ k. Let {Eλ} be an approximate identity for K(H). By Lemma 3.1, there
|
1367 |
+
exists λ0 such that, for all λ ≥ λ0,
|
1368 |
+
∥Eλ(x) − x∥ < ǫ/4(∥ϕ∥ + 1) for all x ∈ F
|
1369 |
+
(e 6.76)
|
1370 |
+
Fix λ ≥ λ0. Applying Theorem 1.5 of [31], B(H1) = LM(K(H1)). It follows that TEλP1 ∈
|
1371 |
+
K(H1). Note also that ∥TEλP1∥ ̸= 0. Therefore, there are y′
|
1372 |
+
1, y′
|
1373 |
+
2, ..., y′
|
1374 |
+
m, z1, z2, ..., zm ∈ H1 such
|
1375 |
+
that
|
1376 |
+
∥TEλP1 −
|
1377 |
+
m
|
1378 |
+
�
|
1379 |
+
j=1
|
1380 |
+
θy′
|
1381 |
+
j,zj∥ < ǫ/8, 1 ≤ j ≤ m.
|
1382 |
+
Then
|
1383 |
+
∥
|
1384 |
+
m
|
1385 |
+
�
|
1386 |
+
j=1
|
1387 |
+
θy′
|
1388 |
+
j,zj∥ ≤ ∥TEλP1∥ + ǫ/8.
|
1389 |
+
(e 6.77)
|
1390 |
+
Put β =
|
1391 |
+
∥TEλP1∥
|
1392 |
+
∥TEλP1∥+ǫ/8 and yj = βy′
|
1393 |
+
j, 1 ≤ j ≤ m. Then
|
1394 |
+
m
|
1395 |
+
�
|
1396 |
+
j=1
|
1397 |
+
θyj,zj = β
|
1398 |
+
m
|
1399 |
+
�
|
1400 |
+
j=1
|
1401 |
+
θy′
|
1402 |
+
j,zj and ∥
|
1403 |
+
m
|
1404 |
+
�
|
1405 |
+
j=1
|
1406 |
+
θyj,zj∥ ≤ ∥TEλP1∥ ≤ ∥ϕ∥.
|
1407 |
+
(e 6.78)
|
1408 |
+
Moreover,
|
1409 |
+
∥TEλP1 −
|
1410 |
+
m
|
1411 |
+
�
|
1412 |
+
j=1
|
1413 |
+
θyj,zj∥ ≤ ∥TEλP1 −
|
1414 |
+
m
|
1415 |
+
�
|
1416 |
+
j=1
|
1417 |
+
θy′
|
1418 |
+
j,z′
|
1419 |
+
j∥ + (1 − β)∥
|
1420 |
+
m
|
1421 |
+
�
|
1422 |
+
j=1
|
1423 |
+
θy′
|
1424 |
+
j,z′
|
1425 |
+
j∥
|
1426 |
+
(e 6.79)
|
1427 |
+
< ǫ/8 + (1 − β)(∥TEλP1∥ + ǫ/8) = ǫ/8 + ǫ/8 = ǫ/4.
|
1428 |
+
(e 6.80)
|
1429 |
+
Denote L = �m
|
1430 |
+
j=1 θyj,zj. Then, by (e 6.78), ∥L∥ ≤ ∥ϕ∥. Note that P1 ∈ L(H1). Therefore, for
|
1431 |
+
all z ∈ H, θyj,zjP1(z) = yj⟨zj, P1z⟩ = yj⟨P1zj, z⟩ = θyj,P1zj(z), 1 ≤ j ≤ m. By replacing zj by
|
1432 |
+
P1zj, we may assume that zj ∈ H. Recall PATEλP1 = TEλP1. Hence PAyj ∈ A, 1 ≤ j ≤ m.
|
1433 |
+
Put aj = (P1yj)∗, 1 ≤ j ≤ m. Then, by (e 6.76), (e 6.80),
|
1434 |
+
ϕ(ξi) = T(ξi) ≈ǫ/4 TEλP1(ξi) ≈ǫ/4 L(ξi) =
|
1435 |
+
m
|
1436 |
+
�
|
1437 |
+
j=1
|
1438 |
+
a∗
|
1439 |
+
j⟨zj, ξi⟩.
|
1440 |
+
(e 6.81)
|
1441 |
+
Choose x = �m
|
1442 |
+
j=1 zjaj. Then L(ξi) = ⟨x, ξi⟩, i ∈ N. Hence
|
1443 |
+
∥ϕ(ξi) − ⟨x, ξi⟩∥ < ǫ,
|
1444 |
+
i = 1, 2, ..., k.
|
1445 |
+
(e 6.82)
|
1446 |
+
24
|
1447 |
+
|
1448 |
+
It remains to show that ∥x∥ ≤ ∥ϕ∥. However, we have
|
1449 |
+
∥x∥ = ∥⟨x, x/∥x∥⟩∥ = ∥L(x/∥x∥)∥ ≤ ∥L∥ ≤ ∥ϕ∥.
|
1450 |
+
(e 6.83)
|
1451 |
+
Remark 6.2. Theorem 6.1 also shows that H may not be A-weakly closed, in the case that
|
1452 |
+
H ̸= H♯ (see 3.3).
|
1453 |
+
In the following statement, note that, H may not be a separable Banach space when A is
|
1454 |
+
not separable.
|
1455 |
+
Theorem 6.3. Let H be a countably generated Hilbert A-module and ϕ : H → A be a bounded
|
1456 |
+
module map. Then, there exists xn ∈ H, n ∈ N, such that ∥xn∥ ≤ ∥ϕ∥ and
|
1457 |
+
lim
|
1458 |
+
n→∞ ∥ϕ(ξ) − ⟨xn, ξ⟩∥ = 0 for all ξ ∈ H.
|
1459 |
+
(e 6.84)
|
1460 |
+
Proof. We need to modify the proof of Theorem 6.1. Let {En} be an approximate identity
|
1461 |
+
for K(H) (by Theorem 3.2). Let H1 = H ⊕ A, P1, PA and T be as in the proof of Theorem
|
1462 |
+
6.1. Consider TEnP1 ∈ K(H). As in the proof of Theorem 6.1, we obtain Ln ∈ K(H) with
|
1463 |
+
∥Ln∥ ≤ ∥TEnP1∥ ≤ ∥ϕ∥ such that
|
1464 |
+
∥TEnP1 − Ln∥ < 1/2n,
|
1465 |
+
(e 6.85)
|
1466 |
+
where Ln = �m(n)
|
1467 |
+
j=1 θxn,j,yn,j. Put PA(xn,j) = a∗
|
1468 |
+
n,j, 1 ≤ j ≤ m(n), n ∈ N. For any ǫ > 0 and any
|
1469 |
+
z ∈ H, we may choose n(x) such that, for all n ≥ n(x),
|
1470 |
+
∥EnP1(z) − z∥ < ǫ/2(∥ϕ∥ + 1).
|
1471 |
+
(e 6.86)
|
1472 |
+
Then, if n ≥ n(x),
|
1473 |
+
ϕ(z) ≈ǫ/2 TEnP1(y) ≈∥z∥/2n Ln(z) =
|
1474 |
+
m(n)
|
1475 |
+
�
|
1476 |
+
j=1
|
1477 |
+
a∗
|
1478 |
+
n,j⟨yn,j, z⟩.
|
1479 |
+
(e 6.87)
|
1480 |
+
Choose xn = �m(n)
|
1481 |
+
j=1 yn,jan,j, n ∈ N. The same proof as the end of the proof of Theorem 6.1
|
1482 |
+
shows that, for all n ≥ n(x),
|
1483 |
+
ϕ(z) ≈ǫ/2+∥z∥/2n L(z) = ⟨xn, z⟩ and ∥xn∥ ≤ ∥ϕ∥.
|
1484 |
+
(e 6.88)
|
1485 |
+
The theorem then follows.
|
1486 |
+
As mentioned at the beginning of this section, injective Hilbert A-modules are rare. However,
|
1487 |
+
one may have some approximate extensions of bounded module maps. Let B0, B1 and C be C∗-
|
1488 |
+
algebras and ϕ : B0 → C be a contractive completely positive linear map. If C is amenable (or
|
1489 |
+
B0 is), then, for any ǫ > 0 and any finite subset F ⊂ B0, there exists a contractive completely
|
1490 |
+
positive linear map ψ : B → C such that
|
1491 |
+
∥ϕ(b) − ψ(b)∥ < ǫ for all b ∈ F.
|
1492 |
+
It is very useful feature of amenable C∗-algebras.
|
1493 |
+
With the same spirit, let us present the
|
1494 |
+
following approximate extension result:
|
1495 |
+
25
|
1496 |
+
|
1497 |
+
Theorem 6.4. Let A be a C∗-algebra, H0, H1, H be Hilbert A-modules such that H0 ⊂ H1 and
|
1498 |
+
ϕ : H0 → H be a bounded module map.
|
1499 |
+
Then, for any ǫ > 0 and any finite subset F ⊂ H0, there exists a bounded module map
|
1500 |
+
ψ : H1 → H such that ∥ψ∥ ≤ ∥ϕ∥ and
|
1501 |
+
∥ψ(x) − ϕ(x)∥ < ǫ for all x ∈ F.
|
1502 |
+
(e 6.89)
|
1503 |
+
The above may be illustrated as follows:
|
1504 |
+
H1
|
1505 |
+
H0
|
1506 |
+
H
|
1507 |
+
ψ
|
1508 |
+
⟲ε
|
1509 |
+
ϕ
|
1510 |
+
on F.
|
1511 |
+
(e 6.90)
|
1512 |
+
If, in addition, H0 is countably generated, then there exists ψn : H1 → H, n ∈ N, such that
|
1513 |
+
∥ψn∥ ≤ ∥ϕ∥ and
|
1514 |
+
lim
|
1515 |
+
n→∞ ∥ψn(x) − ϕ(x)∥ = 0 for all x ∈ H0.
|
1516 |
+
(e 6.91)
|
1517 |
+
Proof. We may assume that ∥ϕ∥ ̸= 0. Let H2 = H0 ⊕ H and H3 = H1 ⊕ H. We view H2
|
1518 |
+
as a Hilbert A-submodule of H3. Let P0 ∈ L(H2) be the projection from H2 onto H0, and let
|
1519 |
+
P1, PH ∈ L(H3) be the projections from H3 onto H1 and onto H, respectively. Define T ∈ B(H2)
|
1520 |
+
by T = ϕ ◦ P0. Let F ⊂ H0 be a finite subset and ǫ > 0.
|
1521 |
+
Let {Eλ} be an approximate identity for K(H0). By Lemma 3.1, there exists λ0 such that,
|
1522 |
+
for all λ ≥ λ0,
|
1523 |
+
∥Eλ(x) − x∥ < ǫ/(∥ϕ∥ + 1) for all x ∈ F.
|
1524 |
+
(e 6.92)
|
1525 |
+
Applying Theorem 1.5 of [31], we have that B(H2) = LM(K(H2)). It follows that (for a fixed
|
1526 |
+
λ ≥ λ0) TEλP0 ∈ K(H2). Applying Lemma 2.13 of [33], we obtain Tλ ∈ K(H3) such that
|
1527 |
+
∥Tλ∥ = ∥TEλP0∥ and Tλ|H2 = TEλP0.
|
1528 |
+
(e 6.93)
|
1529 |
+
Put ψ = PHTλ. Note that (recall that T(H2) ⊂ H)
|
1530 |
+
∥ψ∥ = ∥TEλP0∥ and ψ|H2 = TEλP0.
|
1531 |
+
(e 6.94)
|
1532 |
+
We may view ψ as a bounded module map from H1 to H with ∥ψ∥ ≤ ∥T∥ = ∥ϕ∥. We estimate
|
1533 |
+
that, for x ∈ F, by (e 6.92) and (e 6.94),
|
1534 |
+
∥ψ(x) − ϕ(x)∥
|
1535 |
+
=
|
1536 |
+
∥ψ(x) − T(x)∥ = ∥ψ(x) − TEλP0(x)∥ + ∥TEλP0(x) − T(x)∥
|
1537 |
+
<
|
1538 |
+
0 + ∥T∥∥Eλ(x) − x∥ < ǫ.
|
1539 |
+
(e 6.95)
|
1540 |
+
This proves the first part of the theorem.
|
1541 |
+
For the second part of the theorem, by Theorem 3.2, let {En} be an approximate identity
|
1542 |
+
for K(H0) with En+1En = En, n ∈ N. Replacing Eλ by En, we obtain Tn ∈ K(H3) such that
|
1543 |
+
∥Tn∥ = ∥TEnP0∥ and Tn|H2 = TEnP0.
|
1544 |
+
(e 6.96)
|
1545 |
+
Put ψn = PHTn, n ∈ N. Then
|
1546 |
+
∥ψn∥ ≤ ∥ϕ∥ and ψn|H2 = TEnP0, n ∈ N.
|
1547 |
+
(e 6.97)
|
1548 |
+
We then use the fact that limn→∞ ∥En(x) − x∥ = 0 for all x ∈ H0 (see again Theorem 3.2).
|
1549 |
+
26
|
1550 |
+
|
1551 |
+
Corollary 6.5. Let A be a C∗-algebra and H0 ⊂ H be Hilbert A-modules. Suppose that there
|
1552 |
+
is a bounded module map ϕ : H0 → A. Then, for any ǫ > 0 and any finite subset F ⊂ H0, there
|
1553 |
+
exists a bounded module map ψ : H → A such that
|
1554 |
+
∥ϕ(x) − ψ(x)∥ < ǫ for all x ∈ F and ∥ψ∥ ≤ ∥ϕ∥.
|
1555 |
+
(e 6.98)
|
1556 |
+
If, in addition, H0 is countably generated Hilbert A-module, then there exists a sequence of
|
1557 |
+
bounded module maps ψn : H → A such that
|
1558 |
+
lim
|
1559 |
+
n→∞ ∥ψn(x) − ϕ(x)∥ = 0 for all x ∈ H and ∥ψn∥ ≤ ∥ϕ∥ for all n ∈ N.
|
1560 |
+
(e 6.99)
|
1561 |
+
Remark 6.6. In the light of Theorem 6.4, one may think that every Hilbert A-module is
|
1562 |
+
“approximately injective”. Next, let us turn to “approximate projectivity”.
|
1563 |
+
Lemma 6.7. Let A be a σ-unital C∗-algebra and H = A(k) (for some k ∈ N). Suppose that
|
1564 |
+
H1, H2 are Hilbert A-modules, ϕ : H → H1 is a bounded module map and s : H2 → H1 is a
|
1565 |
+
surjective bounded module map. Then there exists a sequence of bounded module maps ψn : H →
|
1566 |
+
H2 and an increasing sequence of Hilbert A-submodules Xn ⊂ H such that ∪∞
|
1567 |
+
n=1Xn = H,
|
1568 |
+
s ◦ ψm|Hn = ϕ|Hn
|
1569 |
+
for all m ≥ n.
|
1570 |
+
(e 6.100)
|
1571 |
+
Moreover there exists a sequence of module maps Tn : H → Xn such that ∥Tn∥ ≤ 1 and
|
1572 |
+
lim
|
1573 |
+
n→∞ ∥Tn(h) − h∥ = 0, T2n+j|Hn = idHn, n, j ∈ N,
|
1574 |
+
(e 6.101)
|
1575 |
+
and s ◦ ϕn(h) = ϕ(Tn(h)) for all h ∈ H.
|
1576 |
+
(e 6.102)
|
1577 |
+
In particular,
|
1578 |
+
lim
|
1579 |
+
n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
|
1580 |
+
(e 6.103)
|
1581 |
+
Proof. Fix a strictly positive element e ∈ A. Write A(n) = e1A⊕e2A⊕· · ·⊕enA, where ei = e1/2
|
1582 |
+
(1 ≤ i ≤ n). Let f1/n ∈ C([0, ∞)) be defined in (4) of 4.4, n ∈ N.
|
1583 |
+
For each n ∈ N, define Xn = �k
|
1584 |
+
i=1 f1/n(ei)A. Note that Xn ⊂ Xn+1, n ∈ N, and ∪∞
|
1585 |
+
n=1Xn =
|
1586 |
+
A(k) = H.
|
1587 |
+
Let xn,i = ϕ(f1/2n(ei)), 1 ≤ i ≤ k, and n ∈ N. Choose ym,i ∈ H2 such that s(ym.i) = xm,i,
|
1588 |
+
1 ≤ i ≤ m and m ∈ N. Define ψn : H → H2 by
|
1589 |
+
ψn(h) =
|
1590 |
+
k
|
1591 |
+
�
|
1592 |
+
i=1
|
1593 |
+
yn,i⟨f1/2n(ei), h⟩ for all h ∈ H.
|
1594 |
+
(e 6.104)
|
1595 |
+
It follows that ψn ∈ K(H, H2). If h = �k
|
1596 |
+
i=1 f1/n(e)ai, where ai ∈ A, then
|
1597 |
+
ψn(h) =
|
1598 |
+
k
|
1599 |
+
�
|
1600 |
+
i=1
|
1601 |
+
yn,if1/n(e)ai.
|
1602 |
+
(e 6.105)
|
1603 |
+
27
|
1604 |
+
|
1605 |
+
Hence, for h = �k
|
1606 |
+
i=1 f1/n(ei)ai, where ai ∈ A (1 ≤ i ≤ k), and for any j ≥ 0,
|
1607 |
+
s(ψn+j(
|
1608 |
+
k
|
1609 |
+
�
|
1610 |
+
i=1
|
1611 |
+
f1/n(ei)ai))
|
1612 |
+
=
|
1613 |
+
s(
|
1614 |
+
k
|
1615 |
+
�
|
1616 |
+
i=1
|
1617 |
+
yn+j,if1/n(e)ai)
|
1618 |
+
(e 6.106)
|
1619 |
+
=
|
1620 |
+
k
|
1621 |
+
�
|
1622 |
+
i=1
|
1623 |
+
ϕ(f1/2(n+j)(ei))f1/n(e)ai
|
1624 |
+
(e 6.107)
|
1625 |
+
=
|
1626 |
+
k
|
1627 |
+
�
|
1628 |
+
i=1
|
1629 |
+
ϕ(f1/2(n+j)(ei)f1/n(e))ai
|
1630 |
+
(e 6.108)
|
1631 |
+
=
|
1632 |
+
k
|
1633 |
+
�
|
1634 |
+
i=1
|
1635 |
+
ϕ(f1/n(ei))ai = ϕ(
|
1636 |
+
k
|
1637 |
+
�
|
1638 |
+
i=1
|
1639 |
+
f1/n(ei)ai).
|
1640 |
+
(e 6.109)
|
1641 |
+
It follows that, for any m ≥ n,
|
1642 |
+
s ◦ ψm|Hn = ϕ|Hn.
|
1643 |
+
(e 6.110)
|
1644 |
+
Next consider the module map Tn : H → Xn defined by Tn(h) = �k
|
1645 |
+
i=1 f1/n(ei)⟨f1/n(ei), h⟩
|
1646 |
+
for all h ∈ H. In other words, Tn ∈ K(H, H2) and Tn(�k
|
1647 |
+
i=1 ai) = �k
|
1648 |
+
i=1 f1/n(e)2ai for any
|
1649 |
+
�k
|
1650 |
+
i=1 ai ∈ A(k). Hence ∥Tn∥ = 1. Moreover (for any ai ∈ A),
|
1651 |
+
T2n+j(
|
1652 |
+
k
|
1653 |
+
�
|
1654 |
+
i=1
|
1655 |
+
f1/n(e)ai)
|
1656 |
+
=
|
1657 |
+
k
|
1658 |
+
�
|
1659 |
+
i=1
|
1660 |
+
f1/(2n+j)(e)2f1/n(e)ai
|
1661 |
+
(e 6.111)
|
1662 |
+
=
|
1663 |
+
k
|
1664 |
+
�
|
1665 |
+
i=1
|
1666 |
+
f1/n(e)ai.
|
1667 |
+
(e 6.112)
|
1668 |
+
Hence
|
1669 |
+
T2n+j|Xn = idXn, n, j ∈ N.
|
1670 |
+
(e 6.113)
|
1671 |
+
It follows, for any h = �k
|
1672 |
+
i=1 ai, also by (e 6.104), that
|
1673 |
+
s ◦ ψn+j(h)
|
1674 |
+
=
|
1675 |
+
k
|
1676 |
+
�
|
1677 |
+
i=1
|
1678 |
+
xn+j,i⟨f1/2(n+j)(ei), ai⟩
|
1679 |
+
(e 6.114)
|
1680 |
+
=
|
1681 |
+
k
|
1682 |
+
�
|
1683 |
+
i=1
|
1684 |
+
ϕ(f1/2(n+j)(ej))f1/2(n+j)(e)ai) = ϕ(Tn+j(h)).
|
1685 |
+
(e 6.115)
|
1686 |
+
To see the last part of the lemma, fix h = �k
|
1687 |
+
i=1 ai ∈ A(k). Let ǫ > 0. Choose n ∈ N such
|
1688 |
+
that
|
1689 |
+
∥f1/n(e)2ai − ai∥ < ǫ/k(∥ϕ∥ + 1), 1 ≤ i ≤ k.
|
1690 |
+
(e 6.116)
|
1691 |
+
Hence, for any j ∈ N,
|
1692 |
+
∥ϕ(Tn+j(h)) − ϕ(h)∥ < ǫ
|
1693 |
+
(e 6.117)
|
1694 |
+
It follows that, for this h and for any j ∈ N,
|
1695 |
+
∥s ◦ ψn+j(h) − ϕ(h)∥
|
1696 |
+
≤
|
1697 |
+
∥s ◦ ψn+j(h) − ϕ(Tn+j(h))∥ + ∥ϕ(Tn+j(h)) − ϕ(h)∥
|
1698 |
+
=
|
1699 |
+
0 + ǫ.
|
1700 |
+
28
|
1701 |
+
|
1702 |
+
From (e 6.116), we also have
|
1703 |
+
lim
|
1704 |
+
n→∞ ∥Tn(h) − h∥ = 0 for all h ∈ H.
|
1705 |
+
(e 6.118)
|
1706 |
+
Theorem 6.8. Let A be a σ-unital C∗-algebra and H a countably generated Hilbert A-module.
|
1707 |
+
Suppose that H1 and H2 are Hilbert A-modules, and ϕ : H → H1 is a bounded module map
|
1708 |
+
and s : H2 → H1 is a surjective bounded module map. Then there exists a sequence of bounded
|
1709 |
+
module maps ψn : H → H2 such that
|
1710 |
+
lim
|
1711 |
+
n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
|
1712 |
+
(e 6.119)
|
1713 |
+
The following approximately commutative diagram may illustrate the statement of Theorem
|
1714 |
+
6.8 (with ǫn → 0):
|
1715 |
+
H
|
1716 |
+
H1
|
1717 |
+
H2 .
|
1718 |
+
ψn
|
1719 |
+
ϕ
|
1720 |
+
⟲εn
|
1721 |
+
s
|
1722 |
+
(e 6.120)
|
1723 |
+
Proof. We first prove the theorem for H = HA = l2(A).
|
1724 |
+
So now we assume that H = l2(A). Put Yn = A(n), n ∈ N. We view Yn ⊂ Yn+1 as an
|
1725 |
+
increasing sequence of Hilbert A-submodules of H = l2(A) and the closure of the union is H.
|
1726 |
+
By applying Lemma 6.7, we obtain, for each n ∈ N, an increasing sequence of Hilbert A-
|
1727 |
+
submodules Xn,j ⊂ Xn,j+1 such that ∪∞
|
1728 |
+
j=1Xn,j = Yn, and there exists a sequence of bounded
|
1729 |
+
module maps ψn,j : Yn → H2 and module maps Tn,j : Yn → Xn,j with ∥Tn,j∥ ≤ 1 such that
|
1730 |
+
s ◦ ψn,j+i|Xn,j = ϕ|Xn,j, j, i ∈ N,
|
1731 |
+
(e 6.121)
|
1732 |
+
Tn,2j+i|Xn,j = id|Xn,j, j, i ∈ N, and
|
1733 |
+
(e 6.122)
|
1734 |
+
lim
|
1735 |
+
j→∞ ∥Tn,j(h) − h∥ = 0 for all h ∈ Yn and
|
1736 |
+
(e 6.123)
|
1737 |
+
s ◦ ψn,j(h) = ϕ(Tn,j(h)) for all h ∈ Yn and j ∈ N.
|
1738 |
+
(e 6.124)
|
1739 |
+
Note that Yn = A(n) ⊂ A(n+1) = Yn+1, n ∈ N, therefore we may arrange so that
|
1740 |
+
Xn,j ⊂ Xn+1,j for all j ∈ N and n ∈ N.
|
1741 |
+
(e 6.125)
|
1742 |
+
Define Pn : H → Yn by Pn(�∞
|
1743 |
+
n=1 an) = �n
|
1744 |
+
i=1 ai, where �∞
|
1745 |
+
n=1 a∗
|
1746 |
+
nan converges, i.e, �∞
|
1747 |
+
n=1 an ∈
|
1748 |
+
l2(A) = H. Then Pn is a projection from H = HA onto A(n).
|
1749 |
+
Now define
|
1750 |
+
ψn = ψn,2n ◦ Pn : H → H2, n ∈ N.
|
1751 |
+
(e 6.126)
|
1752 |
+
We will verify that ψn meets the requirements.
|
1753 |
+
Fix h = �∞
|
1754 |
+
n=1 an ∈ l2(A) = H. There is n0 ∈ N such that, for all n ≥ m ≥ n0,
|
1755 |
+
∥Pm(h) − h∥ < ǫ/6(∥ϕ∥ + 1) and ∥Pn(h) − Pm(h)∥ < ǫ/6(∥ϕ∥ + 1).
|
1756 |
+
(e 6.127)
|
1757 |
+
For Pn0(h) ∈ A(n0), there is n1 ∈ N such that, for all n ≥ n1
|
1758 |
+
∥Tn0,n(Pn0(h)) − Pn0(h)∥ < ǫ/6(∥ϕ∥ + 1).
|
1759 |
+
(e 6.128)
|
1760 |
+
Since Tn0,n(Pn0(h)) ∈ Xn0,n ⊂ Xn,n (see (e 6.125)), by (e 6.122),
|
1761 |
+
Tn,2n(Tn0,n(Pn0(h))) = Tn0,n(Pn0(h)).
|
1762 |
+
(e 6.129)
|
1763 |
+
29
|
1764 |
+
|
1765 |
+
Hence, if n ≥ n1 + n0, by (e 6.129) and by (e 6.128),
|
1766 |
+
∥Tn,2n(Pn0(h)) − Pn0(h)∥ = ∥Tn,2n(Pn0(h)) − Tn,2n(Tn0,n(Pn0(h)))∥
|
1767 |
+
(e 6.130)
|
1768 |
+
+∥Tn,2n((Tn0,n(Pn0(h)))) − Pn0(h)∥
|
1769 |
+
(e 6.131)
|
1770 |
+
≤
|
1771 |
+
∥Tn,2n∥∥Pn0(h) − Tn0,n(Pn0(h))∥ + ∥Tn0,n(Pn0(h)) − Pn0(h)∥
|
1772 |
+
(e 6.132)
|
1773 |
+
<
|
1774 |
+
ǫ/6(∥ϕ∥ + 1) + ǫ/6(∥ϕ∥ + 1)
|
1775 |
+
(e 6.133)
|
1776 |
+
=
|
1777 |
+
ǫ/3(∥ϕ∥ + 1).
|
1778 |
+
(e 6.134)
|
1779 |
+
We also estimate that, if n ≥ n1 +n0, by both parts of (e 6.127) and the inequalities right above,
|
1780 |
+
∥Tn,2n(Pn(h)) − h∥
|
1781 |
+
≤
|
1782 |
+
∥Tn,2n(Pn(h)) − Pn0(h)∥ + ∥Pn0(h) − h∥
|
1783 |
+
<
|
1784 |
+
∥Tn,2n(Pn(h) − Pn0(h))∥ + ∥Tn,2n(Pn0(h)) − Pn0(h)∥ + ǫ/6(∥ϕ∥ + 1)
|
1785 |
+
<
|
1786 |
+
∥Tn,2n∥(ǫ/3(∥ϕ∥ + 1)) + ǫ/3(∥ϕ∥ + 1)) + ǫ/3(∥ϕ∥ + 1)
|
1787 |
+
=
|
1788 |
+
ǫ/(∥ϕ∥ + 1).
|
1789 |
+
(e 6.135)
|
1790 |
+
We then have, by (e 6.126), (e 6.124) and (e 6.135),
|
1791 |
+
∥s ◦ ψn(h) − ϕ(h)∥
|
1792 |
+
≤
|
1793 |
+
∥s ◦ ψn,2n(P 2
|
1794 |
+
n(h)) − ϕ(Tn,2n(Pn(h)))∥ + ∥ϕ(Tn,2n(Pn(h))) − ϕ(h)∥
|
1795 |
+
< 0 + ǫ.
|
1796 |
+
Next we consider the general case that H is an arbitrary countably generated Hilbert A-
|
1797 |
+
module. By Kasparov’s absorbing theorem ([26]), there is a Hilbert module isomorphism U :
|
1798 |
+
H⊕l2(A) → l2(A). Define j : H → H⊕l2(A) to be the obvious embedding and p : H⊕l2(A) → H
|
1799 |
+
the projection. Thus p◦j = idH. Define Φ = ϕ◦p◦U −1 : l2(A) → H1. Then we have the following
|
1800 |
+
commutative diagram:
|
1801 |
+
l2(A)
|
1802 |
+
U ↕U−1
|
1803 |
+
ցΦ
|
1804 |
+
H ⊕ l2(A)
|
1805 |
+
ϕ◦p
|
1806 |
+
−→
|
1807 |
+
H1.
|
1808 |
+
In particular, Φ ◦ U(x) = ϕ(x) for all x ∈ H. By what have been proved above, there exists a
|
1809 |
+
sequence of module maps Ψn : l2(A) → H2 such that
|
1810 |
+
lim
|
1811 |
+
n→∞ ∥s ◦ Ψn(z) − Φ(z)∥ = 0 for all z ∈ l2(A).
|
1812 |
+
(e 6.136)
|
1813 |
+
Define ψn : H → H2 by ψn(x) = Ψn ◦ U(x) for all x ∈ H. It follows that
|
1814 |
+
, lim
|
1815 |
+
n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = lim
|
1816 |
+
n→∞ ∥s ◦ Ψn(U(x)) − Φ(U(x))∥ = 0.
|
1817 |
+
(e 6.137)
|
1818 |
+
Remark 6.9. Note that, in Lemma 6.7, for any ǫ > 0, we may choose ∥yn∥ ≤ ∥˜s−1 ◦ ϕ∥ + ǫ. So
|
1819 |
+
we may estimate that ∥ψn∥ ≤
|
1820 |
+
√
|
1821 |
+
k(∥˜s−1 ◦ ϕ∥ + ǫ), which unfortunately depends on k. Therefore
|
1822 |
+
we do not have an estimate on the norm of ψn in Theorem 6.8. This is also the reason that the
|
1823 |
+
proof seems a little more involved than expected (as we need a complicated statement in Lemma
|
1824 |
+
6.7). If {∥ψn∥} were, at least, uniformly bounded, then the proof would be much shorter.
|
1825 |
+
However, under the assumption that A has real rank zero, in the next statement, we then
|
1826 |
+
have a better estimate on the norm on ψn.
|
1827 |
+
30
|
1828 |
+
|
1829 |
+
Theorem 6.10. Let A be a σ-unital C∗-algebra of real rank zero and H a countably generated
|
1830 |
+
Hilbert A-module. Suppose that ϕ : H → H1 is a bounded module map and s : H2 → H1 is a
|
1831 |
+
surjective bounded module map. Then there exists a sequence of module maps ψn : H → H2
|
1832 |
+
such that
|
1833 |
+
∥ψn∥ ≤ ∥˜s−1 ◦ ϕ∥ and
|
1834 |
+
lim
|
1835 |
+
n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
|
1836 |
+
(e 6.138)
|
1837 |
+
Proof. Since H is countably generated, by Corollary 1.5 of [39] (see (Lemma 3.2, for convenience),
|
1838 |
+
K(H) is a σ-unital hereditary C∗-subalgebra of A ⊗ K (see also Lemma 2.13 of [33]). Let {Pm}
|
1839 |
+
be an approximate identity for K(H) consisting of projections.
|
1840 |
+
Put H0,m = Pm(H). Then
|
1841 |
+
K(H0,m) = PmK(H)Pm is unital. It follows from Proposition 2.7 that H0,m is algebraically
|
1842 |
+
finitely generated, say, by {ξm,i : 1 ≤ i ≤ d(m)}, where ∥ξm,i∥ = 1. It is important to note that
|
1843 |
+
H0,m ⊂ H0,m′ if m < m′.
|
1844 |
+
Fix m ∈ N. Let H1,m be the Hilbert A-submodule of H1 generated by {xm,i = ϕ(ξm,i) : 1 ≤
|
1845 |
+
i ≤ d(m)}. Since H0,m ⊂ H0,m′, H1,m ⊂ H1,m′, if m < m′.
|
1846 |
+
Then K(H1,m) is a σ-unital hereditary C∗-subalgebra of A ⊗ K (see Lemma 3.2), m ∈ N.
|
1847 |
+
Since A has real rank zero, so is K(H1,m), m ∈ N. Let {pm,k}∞
|
1848 |
+
k=1 be an approximate identity
|
1849 |
+
for K(H1,m). Let H1,m,k = pm,k(H1,m), k, m ∈ N. Since H1,m ⊂ H1,m′, if m ≤ m′, K(H1,m) ⊂
|
1850 |
+
K(H1,m′) (see Lemma 2.13 of [33]). So we may assume that
|
1851 |
+
∥pm+1,kpm,k − pm,k∥ <
|
1852 |
+
1
|
1853 |
+
2k+m+1(∥ϕ∥ + 1), k, m ∈ N.
|
1854 |
+
(e 6.139)
|
1855 |
+
Note that K(H1,m,k) = pm,kK(H1,m)pm,k which is unital. It follows from Proposition 3.2
|
1856 |
+
that H1,m,k is algebraically finitely generated, say, by zm,k,1, zm,k,2, ..., zm,k,r(m,k) as A-module.
|
1857 |
+
Choose ym,k,j ∈ H2 such that s(ym,k,j) = zm,k,j, 1 ≤ j ≤ r(m, k), k, m ∈ N. Let H2,m,k be the
|
1858 |
+
Hilbert A-submodule of H2 generated by {ym,k,j : 1 ≤ k = j ≤ r(m, k)} as Hilbert A-module.
|
1859 |
+
Then, since H1,m,k is algebraically generated by zm,k,1, zm,k,2, ..., zm,k,r(i,k) as A-module,
|
1860 |
+
s(H2,m,k) = H1,m,k. In other words, s|H2,m,k is surjective (onto H1,m,k).
|
1861 |
+
Fix an integer m ∈ N. Define ϕm,k : H → H1,m,k by
|
1862 |
+
ϕm,k(x) = pm,k ◦ ϕ(Pm(x))
|
1863 |
+
(e 6.140)
|
1864 |
+
for all x ∈ H. Note that ∥ϕm,k∥ ≤ ∥ϕ∥, m, k ∈ N.
|
1865 |
+
Now H2,m,k is countably generated, it follows from Theorem 5.3 that there is a module map
|
1866 |
+
ψm,k : H → H2,m,k such that
|
1867 |
+
s ◦ ψm,k = ϕm,k for all k, m ∈ N, and
|
1868 |
+
(e 6.141)
|
1869 |
+
∥ψm,k∥ ≤ ∥˜s−1 ◦ ϕm,k∥ ≤ ∥˜s−1 ◦ ϕ∥.
|
1870 |
+
(e 6.142)
|
1871 |
+
Define ψn = ψn,n, n ∈ N. Then ∥ψn∥ ≤ ∥˜s−1 ◦ ϕ∥ for all n ∈ N. We will check that
|
1872 |
+
lim
|
1873 |
+
n→∞ ∥s ◦ ψn(x) − ϕ(x)∥ = 0 for all x ∈ H.
|
1874 |
+
(e 6.143)
|
1875 |
+
To check this, let ǫ > 0 and x ∈ H with ∥x∥ ≤ 1. Let M = (∥s∥ + 1)(∥˜s−1 ◦ ϕ∥ + 1). By Lemma
|
1876 |
+
3.1 , there is n0 ∈ N such that
|
1877 |
+
∥x − Pm(x)∥ < ǫ/8M and ∥Pm(x) − Pm′(x)∥ < ǫ/8M for all m′, m ≥ n0.
|
1878 |
+
(e 6.144)
|
1879 |
+
There is also k0 ∈ N with 1/k0 < ǫ/4 such that, for any k ≥ k0,
|
1880 |
+
∥pn0,k(ϕ(Pn0(x))) − ϕ(Pn0(x))∥ < ǫ/4.
|
1881 |
+
(e 6.145)
|
1882 |
+
31
|
1883 |
+
|
1884 |
+
If n ≥ n0 and for all k ∈ N, we have, if k ≥ k0 + n0, by (e 6.145) and (e 6.139),
|
1885 |
+
pk,k(ϕ(Pn0(x)))
|
1886 |
+
≈ǫ/4
|
1887 |
+
pk,kpn0,k0(ϕ(Pn0(x)))
|
1888 |
+
(e 6.146)
|
1889 |
+
≈1/2k0
|
1890 |
+
pn0,k0(Pn0(x)) ≈ǫ/4 Pn0(x).
|
1891 |
+
(e 6.147)
|
1892 |
+
Then (recall that H0,n0 ⊂ H0,n, if n0 < n), by (e 6.144), (e 6.140), (e 6.141) and (e 6.146), when
|
1893 |
+
n ≥ n0 + k0 + (4/ǫ),
|
1894 |
+
∥s ◦ ψn(x) − ϕ(x)∥
|
1895 |
+
≤
|
1896 |
+
∥s ◦ ψn(x) − s ◦ ψn,n(Pn0(x))∥ + ∥s ◦ ψn,n(Pn0(x)) − ϕ(x)∥
|
1897 |
+
<
|
1898 |
+
∥s ◦ ψn∥∥x − Pn0(x)∥ + ∥s ◦ ψn,n(Pn0(x)) − ϕ(Pn0(x))∥ +
|
1899 |
+
+∥ϕ(Pn0(x)) − ϕ(x)∥
|
1900 |
+
(e 6.148)
|
1901 |
+
<
|
1902 |
+
ǫ/8 + ∥s ◦ ψn,n(Pn0(x)) − ϕn,n(Pn0(x))∥
|
1903 |
+
+∥pn,n(ϕ(Pn0(x))) − ϕ(Pn0(x))∥ + ǫ/4
|
1904 |
+
(e 6.149)
|
1905 |
+
<
|
1906 |
+
ǫ/8 + 0 + (1/2k0 + ǫ/2) + ǫ/8 < ǫ.
|
1907 |
+
Remark 6.11. This paper was based on a preprint [35] of 2010. However, some of the original
|
1908 |
+
part of [35] have been out of dated. A draft of the current version was made in 2014 including
|
1909 |
+
improved results in section 5. Parts of section 4 and section 6 are added recently.
|
1910 |
+
References
|
1911 |
+
[1] C. Akemann and F. Shultz, Perfect C∗-algebras, Mem. Amer. Math. Soc. 55 (1985), no.
|
1912 |
+
326, xiii+117 pp
|
1913 |
+
[2] R. Antoine, F. Perera, L. Robert, and H. Thiel, C∗-algebras of stable rank one and their
|
1914 |
+
Cuntz semigroups, Duke Math. J., to appear. arXiv:1809.03984.
|
1915 |
+
[3] B. Blackadar, Comparison theory for simple C∗-algebras. Operator algebras and applica-
|
1916 |
+
tions, Vol. 1, 21–54, London Math. Soc. Lecture Note Ser., 135, Cambridge Univ. Press,
|
1917 |
+
Cambridge, 1988.
|
1918 |
+
[4] L. G. Brown, Stable isomorphism of hereditary subalgebras of C∗-algebras, Pacific J. Math.
|
1919 |
+
71 (1977), 335–348.
|
1920 |
+
[5] L. G. Brown, Close hereditary C∗-subalgebra and the structure of quasi-multipliers, Proc.
|
1921 |
+
Royal Soc. Edinburgh, 147A (2017), 263–292, DOI:10.1017/S0308210516000172.
|
1922 |
+
[6] L. G. Brown, Semicontinuity and multipliers of C∗-algebras, Can J. Math., 40 (1988),
|
1923 |
+
865-988.
|
1924 |
+
[7] L. G. Brown, Homotopy of projection in C∗-algebras of stable rank one, Recent advances
|
1925 |
+
in operator algebras (Orlans, 1992). Astrisque No. 232 (1995), 115–120.
|
1926 |
+
[8] L. G. Brown and G. K. Pedersen, On the geometry of the unit ball of a C∗-algebra, J.
|
1927 |
+
Reine Angew. Math. 469 (1995), 113–147.
|
1928 |
+
[9] N. Brown and A. Ciuperca, Isomorphism of Hilbert modules over stably finite C∗-algebras,
|
1929 |
+
J. Funct. Anal. 257 (2009), 332–339.
|
1930 |
+
[10] N. Brown, F. Perera and A. Toms, The Cuntz semigroup, the Elliott conjecture, and
|
1931 |
+
dimension functions on C∗-algebras, J. Reine Angew. Math. 621 (2008), 191–211.
|
1932 |
+
32
|
1933 |
+
|
1934 |
+
[11] K. Coward, G. Elliott and C. Ivanescu, The Cuntz semigroup as an invariant for C∗-
|
1935 |
+
algebras, J. Reine Angew. Math. 623 (2008), 161–193.
|
1936 |
+
[12] J. Castillejos, S. Evington, A. Tikuisis, S. White, W. Winter, Nuclear dimension of simple
|
1937 |
+
C∗-algebras, Invent. Math. 224 (2021), 245–290.
|
1938 |
+
[13] J. Castillejos and S. Evington, Nuclear dimension of simple stably projectionless C∗-
|
1939 |
+
algebras, Anal. PDE 13 (2020), 2205–2240.
|
1940 |
+
[14] J. Castillejos, S. Evington, A. Tikuisis, and S. White, Uniform property Γ, Int. Math. Res.
|
1941 |
+
Not., to appear.
|
1942 |
+
[15] J. Cuntz, The structure of multiplication and addition in simple C∗-algebras, Math. Scand.
|
1943 |
+
40 (1977), 215–233.
|
1944 |
+
[16] J. Cuntz, Dimension functions on simple C∗-algebras, Math. Ann. 233 (1978), 145–153.
|
1945 |
+
[17] G. A. Elliott, G. Gong, H. Lin and Z. Niu, The classification of simple separable KK-
|
1946 |
+
contractible C∗-algebras with finite nuclear dimension, J. Geom. Phys. 158 (2020), 103861,
|
1947 |
+
51 pp.
|
1948 |
+
[18] G. A. Elliott, L. Robert, and L. Santiago, The cone of lower semicontinuous traces on a
|
1949 |
+
C*-algebra, Amer. J. Math 133 (2011), 969–1005.
|
1950 |
+
[19] M. Frank, Geometrical aspects of Hilbert C∗-modules, Positivity 3 (1999), 215–243.
|
1951 |
+
[20] X.
|
1952 |
+
Fu
|
1953 |
+
and
|
1954 |
+
H.
|
1955 |
+
Lin,
|
1956 |
+
Tracial
|
1957 |
+
approximate
|
1958 |
+
oscillation
|
1959 |
+
zero
|
1960 |
+
and
|
1961 |
+
stable
|
1962 |
+
rank
|
1963 |
+
one,
|
1964 |
+
arXiv:2112.14007.
|
1965 |
+
[21] X. Fu, K. Li, and H. Lin, Tracial approximate divisibility and stable rank one. J. London
|
1966 |
+
Math. Soc. 106 (2022), 3008–3042, https://doi.org/10.1112/jlms.12654.
|
1967 |
+
[22] G. Gong, C. Jiang, L. Li, Hausdorffified algebraic K1-groups and invariants for C∗-algebras
|
1968 |
+
with the ideal property, Ann. K-Theory 5 (2020), 43–78.
|
1969 |
+
[23] G. Gong and H. Lin, Almost multiplicative morphisms and K-theory, Internat. J. Math.
|
1970 |
+
11 (2000), 983–1000.
|
1971 |
+
[24] G. Gong and H. Lin, On classification of simple non-unital amenable C*-algebras, III: the
|
1972 |
+
range and the reduction, Ann. K-Theory 7 (2022), 279–384.
|
1973 |
+
[25] J. v. B. Hjelmborg and M. Rørdam, On stability of C∗-algebras, J. Funct. Anal. 155 (1998),
|
1974 |
+
153–170.
|
1975 |
+
[26] G. Kasparov, Hilbert C∗-modules: theorems of Stinespring and Voiculescu, J. Operator
|
1976 |
+
Theory 4 (1980), 133–150.
|
1977 |
+
[27] E. Kirchberg and M. Rørdam, Non-simple purely infinite C∗-algebras, Amer. J. Math. 122
|
1978 |
+
(2000), 637–666.
|
1979 |
+
[28] E. Kirchberg and M. Rørdam, Central sequence C∗-algebras and tensorial absorption of
|
1980 |
+
the Jiang-Su algebra, J. Reine Angew. Math., 695 (2014), 175–214.
|
1981 |
+
[29] E. C. Lance, Hilbert C∗-Modules, A Toolkit for Operator Algebraists, London Math. Soc.
|
1982 |
+
Lecture Note Ser., vol. 210, Cambridge University Press, Cambridge, 1995.
|
1983 |
+
33
|
1984 |
+
|
1985 |
+
[30] H. Lin, Equivalent open projections and corresponding hereditary C∗-subalgebras, J. Lon-
|
1986 |
+
don Math. Soc. 41 (1990), 295–301.
|
1987 |
+
[31] H. Lin, Bounded module maps and pure completely positive maps, J. Operator Theory 26
|
1988 |
+
(1991), 121–138.
|
1989 |
+
[32] H. Lin, Simple C∗-algebras with continuous scales and simple corona algebras, Proc. Amer.
|
1990 |
+
Math. Soc. 112 (1991), 871–880.
|
1991 |
+
[33] H. Lin, Injective Hilbert C∗-modules, Pacific J. Math. 154 (1992), 131–164.
|
1992 |
+
[34] H. Lin, An introduction to the classification of amenable C∗-algebras, World Scientific
|
1993 |
+
Publishing Co., Inc., River Edge, NJ, 2001. xii+320 pp. ISBN: 981-02-4680-3.
|
1994 |
+
[35] H. Lin, Cuntz semigroups of C∗-algebras of stable rank one and projective Hilbert modules,
|
1995 |
+
arXiv:1001.4558, 2010.
|
1996 |
+
[36] H. Lin, Hereditary uniform property Γ, Sci. China, Math. to appear,
|
1997 |
+
https://doi.org/10.1007/s11425-022-2005-x.
|
1998 |
+
[37] H. Lin Tracial approximation and Z-stability, preprint, arXiv:2205.04013
|
1999 |
+
[38] H. Lin and P. Ng, Extensions of C∗-algebras by a small ideal, Inter. Math. Res. Not., pp.
|
2000 |
+
1-89, rnac115, https://doi.org/10.1093/imrn/rnac115, May 2022.
|
2001 |
+
[39] J. Mingo and W . Phillips, Equivariant triviality theorems for Hilbert C∗-modules, Proc.
|
2002 |
+
Amer. Math. Soc, 91 (1984), 225–236.
|
2003 |
+
[40] E. Ortega, M. Rørdam, Mikael and H. Thiel, The Cuntz semigroup and comparison of
|
2004 |
+
open projections, J. Funct. Anal. 260 (2011), 3474–3493.
|
2005 |
+
[41] W. Paschke, Inner product modules over B∗-algebras, Trans. Amer. Math. Soc, 182 (1973),
|
2006 |
+
443–468.
|
2007 |
+
[42] G. K. Pedersen, C∗-algebras and their Automorphism Group, L.M.S monographs, Aca-
|
2008 |
+
demic Press, London, New York, San Francisco, 1979.
|
2009 |
+
[43] G. K. Pedersen, Unitary extensions and polar decompositions in a C∗-algebra, J. Operator
|
2010 |
+
Theory 17 (1987), 357–364.
|
2011 |
+
[44] L. Robert, Remarks on Z-stable projectionless C∗-algebras. Glasg. Math. J. 58 (2016),
|
2012 |
+
no. 2, 273–277.
|
2013 |
+
[45] M. Rørdam, On the structure of simple C∗-algebras tensored with a UHF-algebra. II, J.
|
2014 |
+
Funct. Anal. 107 (1992), 255–269.
|
2015 |
+
[46] M. Rørdam, The stable and the real rank of Z-absorbing C∗-algebras. Internat. J. Math.
|
2016 |
+
15 (2004), no. 10, 1065–1084.
|
2017 |
+
[47] Y. Sato, Trace spaces of simple nuclear C∗-algebras with finite-dimensional extreme bound-
|
2018 |
+
ary, preprint 2012, http://arxiv.org/abs/1209.3000.
|
2019 |
+
[48] H. Thiel, Ranks of operators in simple C∗-algebras with stable rank one, Comm. Math.
|
2020 |
+
Phys. 377 (2020), 37–76.
|
2021 |
+
[49] A. Tikuisis, Nuclear dimension, Z-stability, and algebraic simplicity for stably projection-
|
2022 |
+
less C*-algebras, Math. Ann. 358 (2014), nos. 3-4, 729–778.
|
2023 |
+
34
|
2024 |
+
|
2025 |
+
[50] A. S. Toms. Flat dimension growth for C∗-algebras, J. Funct. Anal., 238 (2006), 678–708.
|
2026 |
+
[51] A. Toms, On the classification problem for nuclear C∗-algebras. Ann. of Math. 167 (2008),
|
2027 |
+
1029–1044.
|
2028 |
+
[52] A. Toms, S. White and W. Winter, Z-stability and finite dimensional tracial boundaries,
|
2029 |
+
Int. Math. Res. Not. IMRN 2015, no. 10, 2702–2727.
|
2030 |
+
[53] W. Winter, Nuclear dimension and Z-stability of pure C*-algebras, Invent. Math. 187
|
2031 |
+
(2012), no. 2, 259–342.
|
2032 |
+
[54] S. Zhang, Certain C∗-algebras with real rank zero and their corona and multiplier algebras.
|
2033 |
+
I, Pacific J. Math. 155 (1992), 169–197
|
2034 |
+
[55] W. Zhang, Tracial state space with non-compact extreme boundary, J. Funct. Anal. 267
|
2035 |
+
(2014) 2884–2906.
|
2036 |
+
email: [email protected]
|
2037 |
+
email: [email protected]
|
2038 |
+
35
|
2039 |
+
|
INE2T4oBgHgl3EQf_Qm3/content/tmp_files/load_file.txt
ADDED
The diff for this file is too large to render.
See raw diff
|
|
MNAzT4oBgHgl3EQfV_xV/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:ad0e617cdd21db26bae78eacf863ddf5505e4f258def820f9a3b537c612156b9
|
3 |
+
size 80647
|
MtE0T4oBgHgl3EQfjQEE/content/2301.02455v1.pdf
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:31459e6057eb6bf5d9e1cb11317e7b4f4471e03d757b3f036b2b79ba37e2c9e8
|
3 |
+
size 433232
|
MtE0T4oBgHgl3EQfjQEE/vector_store/index.faiss
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:2c94a2860a9f0f66ca77f91fbe042a7987c6b351c649cea6add5c88762b9103f
|
3 |
+
size 1638445
|
MtE0T4oBgHgl3EQfjQEE/vector_store/index.pkl
ADDED
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
1 |
+
version https://git-lfs.github.com/spec/v1
|
2 |
+
oid sha256:d6aca197acd1e5655236fb1c2a4ce3692bbfdf6ea620b72095f1e8915aeac0f8
|
3 |
+
size 74722
|